[8479] in bugtraq

home help back first fref pref prev next nref lref last post

Re: tcpd -DPARANOID doesn't work, and never did

daemon@ATHENA.MIT.EDU (Jim Dennis)
Tue Nov 10 14:47:42 1998

Date: 	Mon, 9 Nov 1998 20:49:02 -0800
Reply-To: Jim Dennis <jimd@STARSHINE.ORG>
From: Jim Dennis <jimd@STARSHINE.ORG>
X-To:         Wietse Venema <wietse@PORCUPINE.ORG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <19981109215623.B4B12458A1@spike.porcupine.org> Message
              Apparently From Wietse Venema <wietse@PORCUPINE.ORG> Dated Mon,
              09 Nov 1998 16:56:23 EST.

> The claim made in the SUBJECT line is incorrect.
>
> First of all, whether or not the attack fails depends on the BIND
> version being used; for example, the once widely-used BIND 4.8
> forces the TTL to be at least five minutes, stopping the attack.
>
> Secondly, it depends on what native naming service the system uses.
> Naming services such as NIS have their own cacheing mechanisms,
> stopping the attack.
>
> You can immunize BIND against this and other short TTL attacks by
> patching the source or the executable file so that min_cache_ttl
> is, for example, 300 seconds. That is sufficient to stop the attack.

        Are you talking about the resolver libraries, or
        are you assuming that the clients will be talking to
        some caching NS under our administrative control?

> The logdaemon rshd/rlogind aren't vulnerable to the attack, but
> that should not surprise anyone.

> Lastly, I'm responsible only for bugs in my own code. What happens
> in other rshd/rlogind implementations is beyond my control.

>         Wietse

> According to "D. J. Bernstein" <djb@CR.YP.TO>:
>> Once upon a time, rshd/rlogind checked for trusted hosts as follows:

>>    Use DNS PTR records to find a name for the remote IP address,
>>    and check that the name is in a list of trusted host names.

>> Of course, this check is worthless, even if you have secure IP
>> and secure DNS. An attacker simply sets up a PTR record from his
>> own IP address to one of your trusted host names.

        Right.  All this check proves is that the attacker
        has control of someone's reverse DNS mappings.

>> This attack became widely known in mid-1991. Wietse Venema promptly
>> released a new version of his log_tcp package, with a tcpd -DPARANOID
>> option providing ``protection against rlogin and rsh attacks.'' System
>> administrators installed tcpd and breathed a collective sigh of relief.

        Oddly enough I've never heard Wietse claim that
        PARANOID provides "protection against rlogins and rsh
        attacks."   His man pages describe the behavior of
        -DPARANOID and of the PARANOID keyword in the options file
        with no promises express or implied.

        Also anyone who thinks that PARANOID would protect from
        rsh attacks is deluded.  You *at least* need anti-address
        spoofing at your perimeter/border firewalls/packet filters
        to even *hope* to prevent those attacks over those lines.

        rsh requests with spoofed source addresses can do all of
        their exploit within a single packet (never receiving the
        results of that --- but potentially opening up an *overt*
        channel back to themselves).

        I seem to recall that Wietse said as much in the class that
        I took from him.

>> But -DPARANOID didn't stop the attacks!

>> Here's the combined procedure used by tcpd -DPARANOID and rshd/rlogind
>> to check for trusted hosts:

>>    (1) Use DNS PTR records to find a name for the remote IP address.

>>    (2) Use DNS A records to find the IP addresses for that name.

>>    (3) Drop the connection if the remote IP address is not one of the
>>        IP addresses for that name.

> And, drop the connection if the hostname found with (1) does not
> match the hostname found with (2).

        Right.  We're checking to see if there if the forward and
        reverse lookups are consistent.  This means that we are
        extending our zone of trust (and exposure) to the maintainer
        of the zones which we list in our /etc/hosts.allow.

        Any sysadmin worth his salt should realize that address
        spoofing and tcp hijacking are at least a couple of
        remaining vulnerabilties.


>>    (4) Use DNS PTR records to find a name for the remote IP address,
>>        and check that the name is in a list of trusted host names.

>> The A records for all trusted hosts can be controlled
>> locally. With secure IP and secure DNS, there's no way for a
>> trusted host name in #1 to survive the check in #3 unless the
>> remote IP address is listed as an A record for that name.

>> But who says the attacker has to use a trusted host name in #1?
>> He doesn't need a trusted host name until #4! The attacker simply

>>    * responds to the PTR query in #1 with a low-TTL name that points to
>>      an A record under his control;

>>    * pauses so that the PTR result is no longer cached;

>>    * responds to the A query in #2 with his IP address; and then

>>    * responds to the new PTR query in #4 with a trusted host name.

        Oh!  So anyone one in any of our hosts.allow might
        be able to impersonate any other hosts in our hosts.allow.

        While it's an interesting weakness (sounds like a DNS
        race condition) it should hardly be a surprise to
        any sysadmin.  The obvious problem is that there are
        two reverse lookups (in this case).  One by tcpd and
        another by rshd/rlogind.

        One obvious solution (to this particular exploit) is to use
        versions of rshd/rlogind that are compiled with libwrap
        -- and to use that directly. Then only one PTR lookup is
        performed.  Another method would be for tcpd to pass the
        reverse name to the rshd via a command line option (already
        supported on the tcpd side).    It's actually kind of silly
        to do *two* PTR lookups for the same request.

>> Nobody knows how many tcpd-``protected'' hosts were compromised
>> through this attack before vendors fixed their rshd/rlogind
>> programs.

        Nobody knows how many people practice wishful thinking when
        they read through a program's features.

        Anyone who thought that tcpd (with or without PARANOID
        checks) was some sort of "magic bullet" was and his
        sadly mistaken.  It provides one set of tests.

>> tcpd -DPARANOID is still the default today. People who try to use
>> tcpd for public services end up losing connections from thousands
>> of hosts.  New sysadmins often have trouble tracking down the
>> problem, since tcpd doesn't take responsibility for its own error
>> messages. I'm eliminating tcpd from the qmail FAQ; the advantages
>> of relying on familiar software are outweighed by the -DPARANOID
>> support hassle.

        None of my systems have -DPARANOID (most are straight
        Red Hat --- not personally compiled by me, FOR SHAME!)
        --- though all have the "extended options" available,
        and I can use the PARANOID keyword in any event.

        An FAQ is intended to answer *frequent* questions.  Removing
        information from one fails in this basic intent.  Mentioning
        that connection timeouts are likely to be caused by
        inconsistencies between forward and reverse lookups (as
        performed by tcpd and libwrap linked programs), and
        referring the reader to the tcpd man pages or some TCP
        Wrappers FAQ (is there one?) takes about 30 words!

        This is likely to be a "frequent question" regardless of
        whether you address it in your FAQ or not.

>> Cynics will note that there are many other examples of security
>> scares being exploited to sell software that adds far more
>> inconvenience for normal users than for attackers. No wonder
>> security has such a bad name!

        There may be "many examples of security scares ...."
        and this may be such an example.

        The cynic in me suggests that you found an interesting
        potential vulnerability and have chosen a sensationalist
        tone in which to present it.  The cynic in me wonders if you
        haven't stirred up enough controversy recently, are feeling
        neglected, and looking for your flamefix.  But then the
        cynic in me also wonders if this is some obtuse way to
        attempt to undermine the credibility of someone who has been
        working on a competitor to one of your products.   The cynic
        in me has also heard that you are qmail's worst eneny.

        I hear that VMAILER should be shipping anytime now.

        I can't see where Wietse has promulgated any such scare and
        he certainly hasn't "sold" his utilities. (Not that I'm
        implying that you have --- last I heard qmail is free.  So
        you don't appear to be motivated by financial profits).

        As for the inconvenience --- if you don't like it; don't
        use it. If you really don't like it, suggest something
        better, or just suggest that people "not do that."

        People who have unreasonable expectactions, and people who
        assume that their superficial understanding of a mechanism
        warrants unquestioned reliance on that understanding, will
        fail in their security efforts.

--
Jim Dennis  (800) 938-4078              consulting@starshine.org
Proprietor, Starshine Technical Services:  http://www.starshine.org

home help back first fref pref prev next nref lref last post