[15669] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ftpd: the advisory version

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Thu Jul 6 16:29:38 2000

Mime-Version: 1.0
Content-Type: text/plain
Message-ID:  <20000706004634.8C95935DC2@smb.research.att.com>
Date:         Wed, 5 Jul 2000 20:46:34 -0400
Reply-To: smb@RESEARCH.ATT.COM
From: "Steven M. Bellovin" <smb@RESEARCH.ATT.COM>
X-To:         Tom Perrine <tep@sdsc.edu>
To: BUGTRAQ@SECURITYFOCUS.COM

In message <200007021934.MAA01251@lart>, Tom Perrine writes:

...
>
>However, the port-1024 thing must be laid directly at the feet of the
>Berkeley folks.  That ports<1024 must be "trusted" (for various values
>of "trust") was a hack they put in so that they could delegate
>responsibilty for authenticaion and other things to the client-side
>host in the notorious "r-command" protocols.
>
>"Of course we can trust this unencrypted, unverified data; it came
>from a host somewhere that was probably running UNIX, and from a
>low-numbered port, therefore it was running as root, and therefore
>should be trusted completely, no additional authentication required."

...
>
>To be slightly less inflammatory, they (Berkeley) were quite correct
>in their port 1024 hack, based on their assumptions:

No, they weren't, and they knew it.  Dragging out my ancient 4.2bsd
manual:

	"The authentication procedure used here assumes the integrity
	of each client machine and the connecting medium.  This is
	insecure, but is useful in an "open" environment.

	"A facility to allow all data exchanges to be encrypted
	should be present."

They used the word "insecure", not me...

home help back first fref pref prev next nref lref last post