[15669] in bugtraq
Re: ftpd: the advisory version
daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Thu Jul 6 16:29:38 2000
Mime-Version: 1.0
Content-Type: text/plain
Message-ID: <20000706004634.8C95935DC2@smb.research.att.com>
Date: Wed, 5 Jul 2000 20:46:34 -0400
Reply-To: smb@RESEARCH.ATT.COM
From: "Steven M. Bellovin" <smb@RESEARCH.ATT.COM>
X-To: Tom Perrine <tep@sdsc.edu>
To: BUGTRAQ@SECURITYFOCUS.COM
In message <200007021934.MAA01251@lart>, Tom Perrine writes:
...
>
>However, the port-1024 thing must be laid directly at the feet of the
>Berkeley folks. That ports<1024 must be "trusted" (for various values
>of "trust") was a hack they put in so that they could delegate
>responsibilty for authenticaion and other things to the client-side
>host in the notorious "r-command" protocols.
>
>"Of course we can trust this unencrypted, unverified data; it came
>from a host somewhere that was probably running UNIX, and from a
>low-numbered port, therefore it was running as root, and therefore
>should be trusted completely, no additional authentication required."
...
>
>To be slightly less inflammatory, they (Berkeley) were quite correct
>in their port 1024 hack, based on their assumptions:
No, they weren't, and they knew it. Dragging out my ancient 4.2bsd
manual:
"The authentication procedure used here assumes the integrity
of each client machine and the connecting medium. This is
insecure, but is useful in an "open" environment.
"A facility to allow all data exchanges to be encrypted
should be present."
They used the word "insecure", not me...