[7824] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Security Hole in Axent ESM

daemon@ATHENA.MIT.EDU (Michael Shields)
Mon Aug 31 16:54:14 1998

Mail-Copies-To: never
Date: 	Mon, 31 Aug 1998 18:24:30 +0000
Reply-To: Michael Shields <shields@CROSSLINK.NET>
From: Michael Shields <shields@CROSSLINK.NET>
X-To:         Andy Church <achurch@DRAGONFIRE.NET>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  Andy Church's message of "Sun, 30 Aug 1998 01:01:12 EDT"

In article <199808300501.BAA08612@Bahamut.dragonfire.net>,
Andy Church <achurch@DRAGONFIRE.NET> wrote:
>      In other words, if you can't manually set the clock back, get the
> system to do it for you.  And if the system doesn't allow the clock to
> "turn over", then all sorts of things will go bonkers when the clock hits
> its maximum (cron jobs, for one), turning this into a DoS of sorts.  So I
> don't see this as a particularly effective measure.  One way I could see to
> make this more effective would be to use 64-bit times and disallow both
> setting the clock back and changing the top 2 bits to anything other than
> zero.  This would break the rollover attack without causing any premature
> Y2k-like problems (2^62 seconds ~= 10^13 years).

This is still a DOS of sorts, as you can set the clock to 2^62-1, and
then it will be impossible to return the clock to the correct time
without rebooting.  Many things will probably be unhappy to find
themselves 10^13 years in the future.
--
Shields, CrossLink.

home help back first fref pref prev next nref lref last post