New Remote Root in Mac OS X 445
Cysgod writes "I've released a security advisory detailing a new remote root vulnerability in Mac OS X 10.3, 10.2 and possibly earlier versions." The main thrust is that it exploits a problem in the DHCP client, to gain root access, and turning off various services can prevent attack. It is unclear why an exploit was made public before Apple resolved the problem. Apple's fix is apparently scheduled for a December release.
i thought i would never say this (Score:5, Funny)
thank goodness iam running Windows
Re:i thought i would never say this (Score:5, Funny)
Re:i thought i would never say this (Score:5, Funny)
Re:i thought i would never say this (Score:5, Insightful)
Re:i thought i would never say this (Score:3, Insightful)
Ohh, and both MS and Apple have had a security vulnerbility for their browser this month on top of the OS vulnerbilities listed above.
Linux doesn't seem to have had any new security vulnerbilities announced this month, though a few security fixes are filtering through for vulnerbilities announced in October. Both WinXP and OS X also had some similar fixes for earlier bugs.
Lo
Re:i thought i would never say this (Score:4, Informative)
Re:i thought i would never say this (Score:5, Funny)
Its the only way to be safe.
Blasted City Folks! (Score:4, Funny)
Re:i thought i would never say this (Score:3, Informative)
Bad Fruit on Apple though. Since they probably don't want to remove the automagical "Just Works" functionality I have a feel
Exploitability Questionable (Score:5, Informative)
This definitely makes the exploit less likely...
Re:Exploitability Questionable (Score:4, Interesting)
yeah i don't know if they use dhcp or what but i imagine so.
(i don't have a laptop, thank you very much please give me one)
Re:Exploitability Questionable (Score:5, Informative)
If you were a Mac person, you would know that Mac people never shut their laptops down, only put them to sleep. Why go though a slow boot on your iBook when it wakes up as soon as the lid is up?
As many moderated up quotes from the article tell us, this problem is only a problem when the services are started, which is on boot. Which is not on wake-from-sleep.
I do not mean to trivialize this hole. To me, it seems obvious why it is there. Apple wants LDAP-enabled, OSX Server managed networks to work out of the box. This includes the ability to mount shares anywhere on the client system, which is insanely powerful and useful in a trusted setup.
Trusted is, of course, the operative term there. Apple needs to fix this or disable the services by default. People who need it can enable it themselves.
Re:Exploitability Questionable (Score:5, Funny)
Re:Exploitability Questionable (Score:4, Funny)
Actually, it's just called "explorer". Go ahead and check, I bet you've got this malware running on your Windows PC right now.
Does it not require directory access turned on? (Score:3, Redundant)
if so this is pretty much a non-bug since it would require some idiot to both be doing remote authentication and be plugged into a dhcp network. For that matter one could just pretend to be a known authtication host and provi
Re:Exploitability Questionable (Score:5, Informative)
You can just go into Directory Access and uncheck LDAP and NetInfo to be immune to the issue even if you use DHCP. I always do this. While this guy thinks he is early in reporting this bug, rogue NetInfo servers are not a new thing (though rogue LDAP servers would be more recent). There used to be an article in NextAnswers from the late 80s about how to track them down. I always customized these settings when I first get a OS X system to avoid this very thing.
Oh please, spare us your generalizations! (Score:5, Interesting)
Give me a break. That is anything but a true statement, and one born of prejudice. Apple, Microsoft, those hardworking folks making Linux better all recognize that flaws exist in software and work hard to do something about it. Software by nature is large and complex, the product of human efforts. And as such, it will not be perfect. For all the hard work of programmers throughout the world, mistakes will happen. But companies like Apple work hard to correct them quickly. If you develop software like I do, you will understand that you can't just issue a patch and expect the problem to stop. You have to test the patch thoroughly to make sure that it does not create unintended problems of its own. To say that Apple sweeps security flaws under the rug is an insult, not only to Apple, but to any developer that has to correct the problems of an exploit. Save your venom instead for the jerks and script kiddies who are the real problem, not Apple.
Default? (Score:5, Informative)
I'm not aware that SSH was enabled by default in any version of Mac OS X.
Re:Default? (Score:5, Informative)
Re:Default? (Score:5, Informative)
the exploit as I understand is this: evil dhcp server gives you an IP addr and also an evil LDAP server, which if your mac is configured to do so, will allow the LDAP server to authenticate root level users too (besides other fun admin stuff like mount points).
this behavior is actually useful for 'lab full of macs)' scenarios and, as I understand, has been an admin 'feature' since the NeXTStep days.
Re:Default? (Score:5, Informative)
It is important to note that having all your services turned off is *not* protection against this bug.
The malicious LDAP server also gets to dictate your mountpoints to you. This means malicious executables can be mounted anywhere in your filesystem. Including places where they can be expected to be executed.
A trivial exploit of this would be to replace the directory with crontabs and set up a crontab and an executable to run as root. Suddenly sshd *is* enabled.
I'll try to answer other questions as I can. This got posted when I was horseback riding, I submitted it at 9am....
Call me an Apple Apologist, but.. (Score:5, Insightful)
OK, there's a hole. Still, when Apple (or OpenBSD) have a security hole it's newsworthy rather than just Business As Usual.. unlike other companies which promise security but can't deliver.
Re:Call me an Apple Apologist, but.. (Score:5, Insightful)
If someone can screw up your machine if they're sitting at it, or have an account on it, or are on the same (unswitched) subnet, that's annoying. If they can crash your machine remotely, or bring down its network stack, or DOS it to death with just one remote machine, that's really annoying. But when they can take it over, that's when it steps beyond annoying and becomes newsworthy.
-fred
Re:Call me an Apple Apologist, but.. (Score:5, Insightful)
Re:Call me an Apple Apologist, but.. (Score:3, Informative)
Re:Call me an Apple Apologist, but.. (Score:5, Funny)
Re:Call me an Apple Apologist, but.. (Score:3, Informative)
I'm also glad that the only machine at the office that ever has remote login turned on is on a static IP address and isn't running dhcpd at all (and it doesn't have it turned on now anyway). And we aren't using directory services on the desktop for any authentication at all, so even the DHC
Re:Call me an Apple Apologist, but.. (Score:3, Informative)
Re:Call me an Apple Apologist, but.. (Score:3, Informative)
Yu said the redirection feature could also be exploited to download and execute a malicious file on a user's system. [atnewyork.com]
You're right, it needs the browser to work. Still pretty damn close to a remote root exploit, in a Windows environment anyway. Visit a malicious webpage, and bang! you're rooted.
Re:Call me an Apple Apologist, but.. (Score:3, Informative)
Seriously, Liu Die Yu has once again torn IE a new one. He's a very talented vulnerability researcher. I wish I had the money to help him get a computer, but I don't.
People can donate via paypal here [clik.to], if they want.
He's very good, very responsible. Doesn't bash on Microsoft in his reports. It all appears to be acedemic with him. Help him out if you can.
What does this mean to the average home user? (Score:4, Informative)
1. A home user with dialup, running no external services, with the firewall turned on.
2. A home user with DSL/CABLE, running behind NAT. And for fun, let's add Airport. Also not running any services, firewall on.
For the non-technical
Re:What does this mean to the average home user? (Score:5, Insightful)
The real worry is folks with an Airport card wandering around with their powerbook.
The Exploit only works from the same subnet (As it relies on DHCP)
Re:What does this mean to the average home user? (Score:3, Insightful)
So if you're on the same physical/logical subnet with no routing required between machines, the exploit is possible.
Didn't to post AC
Re:What does this mean to the average home user? (Score:5, Insightful)
The fix is rudimentary, just go into your
If you need configuration information from a LDAP or NetInfo server (ie. at work), you could always create a new Location under your Network system preferences panel and go back to Directory Access, disable the relevant LDAP and NetInfo services on all your other locations except your work location. If you can't trust your work not to try to hack your computer with this exploit, you've got bigger fish to fry.
For most home/SOHO users who are behind their own home router/firewalls and have otherwise trustworthy family members/roomates/co-inhibitants, this is a non issue (then again, if the people who live with you are trying to hack you are living with you, you have another far greater problems to deal with than this exploit : ). People on a shared subnet (like Cable Modem users) at risk if you're not behind a local/home hardware router/gateway device and someone else on your subnet wants to play "Hack the neighbor's Mac" with this exploit. I think you should be able to trust the DHCP information being handed to you by your DSL provider (again, if you can't then your problems go WAAAAAY beyond this exploit), no big deal. Correct me if I'm wrong but, I'm pretty sure my off the shelf LinkSys router doesn't know what to do with LDAP or NetInfo configuration info handed down by my ISP even if they did hand out any, and it certainly isn't set to pass it through to my internal subnet.
But then again, what are you thinking NOT being behind at least a inexpensive (they're what, like under $100 now even with 802.11g?) NAT/SPI firewall that's up and running 24/7 regardless of how your computer is configured if you're on Cable Modem or DSL at home?
In short, a easy fix and not really a problem for most home/SOHO users. You can breath easy now.
DaveC
The Reason the exploit was made public.. (Score:5, Insightful)
Just because the exploit isn't public, doesn't mean that somebody else doesn't know!
Re:The Reason the exploit was made public.. (Score:5, Informative)
History of this Advisory & Vendor Contact Log
2003-10-09 Initial version of this advisory
2003-10-09 Apple Computer notified
2003-10-09 Apple Computer confirmed receipt and forwarded to eng. team
2003-10-11 Minor edits, also added "Philosophical Issues" and "Path to Root"
2003-10-14 Apple Computer assigns specific point of contact
2003-10-14 Requested confirmation of issue with Apple Computer
2003-10-15 Apple Computer confirms issue
(2003-10-24 Original deadline given to Apple for acknowledging issue)
(2003-10-24 Mac OS X 10.3 is released with this known issue)
(2003-10-28 Mac OS X 10.3 Security Update released, does not address issue)
2003-10-28 Requested update of fix status from Apple Computer
2003-10-28 Apple Computer proposes Nov. 3 fix date
2003-10-29 Apple Computer reneges on Nov. 3 date
2003-10-29 Requested fix in "2 or 3 weeks" from Apple Computer
(2003-11-04 Mac OS X 10.3 Security Update released, does not address issue)
(2003-11-15 Mac OS X 10.3.1 is released with this known issue)
2003-11-17 Requested update of fix status from Apple Computer
2003-11-18 Requested update of fix status from Apple Computer
(2003-11-19 Mac OS X 10.3.1 Security Update released, does not address issue)
2003-11-19 Apple Computer replies "scheduled to go out in December's update"
2003-11-19 Deadline of Nov. 26 given to Apple Computer
2003-11-25 Minor edits, made "Path to Root" a little more work for the script kiddies
2003-11-26 Advisory issued (48 days after initial vendor notification)
Re:The Reason the exploit was made public.. (Score:5, Insightful)
Re:The Reason the exploit was made public.. (Score:5, Insightful)
I'm not trolling here, just genuinely wondering...
Re:The Reason the exploit was made public.. (Score:5, Insightful)
Then, 5 days before December, they release the advisory.
I don't think it's unreasonable for Apple to take some time confirming the exploit, and planning an update. Remember when they released an update that broke things?
I *do* think it's unreasonable for Carrel to demand deadlines to Apple
Re:The Reason the exploit was made public.. (Score:4, Insightful)
This exploit would take any qualified engineer at Apple less than a day to confirm, and it is serious enough that it shouldn't have to wait for a 10.x.z update to be fixed (and, in fact, 10.3 and 10.3.1, as well as in independent security update have all been released since Apple was notified of this issue). Any way that the entire system can be compromised remotely should be fixed immediately. Apple has released a few security updates that were completely independent of a whole system update, and they should have done exactly that in this case.
I love OS X, but this is completely unacceptable. I'm just glad my Macs don't use dhcp.
Re:The Reason the exploit was made public.. (Score:5, Interesting)
Re:The Reason the exploit was made public.. (Score:5, Interesting)
The mere fact that it should be fixed immediately does not at all mean that Apple MUST just quickly hack something together and just release it to the public.
Guess what, in theory, all computers SHOULD IMMEDIATELY be secure out of the box and never ever require any patch. But this is real life. not utopia.
I have yet to see a tested, reliable proposed patch for this vulnerability at the open-source darwin resources. My guess is it is far from being a trivial fix, and chances are Apple wants to thoroughly test it before releasing it.
All Carrel is doing is demanding a deadline that was different from what Apple told him. He could have very-well just waited another month before releasing his advisory. Chances of someone else finding out about it on their own *and* managing to slither their way onto vulnerable subnets, write and execute an exploit, all this within, say, at most 30 days from the day this story popped-up and the latest possible day in december, are fucking slim to none. It is also NOT like this vulnerability would allow a script writer to write a worm that could quickly spread to the internet. Sure, entire subnets could be affected at a time, but the exploit would remain WITHIN the subnet, spreading it out to other networks would require sending email viruses or other stupid PEBKAC-based annoyances. Oh and the victim machine has to be initiating a dhcp request for it to get owned, which typically only happens at boot/startup time, or connection/disconnection. I can see laptop on large corporate networks being vulnerable, but again, a malicious machine would have to make its way INSIDE the network: it needs to live within 802.11b/g range and/or local hub. The offending machine could very easily be traced and its owner hung by the balls.
Yes Apple reneged on their original deadline, chances are they had good reason and were trying to address that botched 10.2.8 release to have a stable base system to release another security patch on. As long as they communicate timeline information back to him, they clearly are NOT giving him the run-around. December is not unreasonable provided what we get is a stable, reliable fix. Confirming a vulnerability can be a far fucking cry from having a successful patch implemented and released, if the fix for the vulnerability is not trivial. For example, a mere buffer-overflow vulnerability in a piece of C code is typically a trivial fix. Revamping DHCP is not necessarily.
Does Carrel's advisory offer a code fix to the Darwin Core? NO it doesn't. Has the potential issue of rogue evil Netinfo servers been around for a while? YES IT HAS.
Some geeks should consider getting laid [fleshlight.com] once in a while and resist the amazing trepidations of unleashing a juicy piece of information that'll quench a lifetime's worth karma-whoring lust.
Re:The Reason the exploit was made public.. (Score:3, Interesting)
Watch out Bill (Score:3, Funny)
Damn (Score:5, Insightful)
Re:Damn (Score:3, Insightful)
It seems pretty irresponsible not to release a timely patch to a know root exploit. Would you people please make up your minds on the standards by which you judge a software company.
Making rounds (Score:4, Interesting)
Apparently, it took 48 days from the time he informed Apple until now. Looks like he was itching to post something. There's his 15 minutes of fame.
Re:Making rounds (Score:3, Insightful)
Yes, the built-in root (uid 0) account in OS X is disabled.
But, this exploit *replaces* that local uid 0 with one from a malicious remote directory service.
So, the Apple root-account default is circumvented.
Re:Making rounds (Score:4, Informative)
Re:Making rounds (Score:5, Insightful)
I'd hardly consider waiting 48 days 'itching'.
Sounds very responsible in my opinion.
What is telling (Score:4, Informative)
I'm pretty sure it was Apple that could boast of no exploits against them (this was OS9 days). Sad to see that go, if it's true. Any unix-os is a friend of mine
Simon
Re:What is telling (Score:5, Funny)
He's a friend of SCO! Burn him!
Nothing is infallible (Score:5, Insightful)
For instance, there's still this [theregister.co.uk] unpatched hole in IE that MS doesn't seem inclined to do much about right now. So much for their "on average a patch in 24 hours" policy they were claiming. Looks like they'll get their patch out around the same time Apple does. I guess we hope that means that they've tested it this time...
Jedidiah
What is the fix? (Score:5, Insightful)
Obviously, the fix is not quite so easy: instead of just updating a binary or two, Apple needs to devise a program/an advisory that will alert users to the problem, and that also makes sure people don't shoot themselves in the foot (turn option off, suddently you can't log in anymore).
Devising such a thing, and testing it in a wide variety of environments will take time, so I wouldn't blame Apple for "reacting slowly" just yet.
Re:What is the fix? (Score:5, Informative)
Workarounds
There are a variety of avenues to avoiding this vulnerability...
1. Disable any network authorization services from obtaining settings from DHCP:
* in Directory Access, select LDAPv3 in the Services tab, click "Configure...", uncheck "Use DHCP-supplied LDAP Server"
* in Directory Access, select NetInfo in the Services tab, click "Configure...", uncheck "Attempt to connect using broadcast protocol" and "Attempt to connect using DHCP protocol"
* in Directory Access, uncheck LDAPv3 and NetInfo in the Services tab, if you don't intend to use them
2. Turning off DHCP on all interfaces on your affected Mac OS X machine can also keep you from being affected.
For added security, be sure to disable any unused network ports:
* turn the AirPort card off or remove it, if it is not being used.
Comment removed (Score:4, Interesting)
Re:If you are unsure why it was made public... (Score:4, Insightful)
If it was made public, many who frequent this site might have been made aware of it and thus could try to take appropriate measures to protect themselves.
Not exploitable in the default configuration, at l (Score:5, Interesting)
This means that the dhcp server can provide authoritative information about anything ldap handles, including user accounts. So Mallory can use a rogue dhcp server to give herself a root account on your system.
But unless I'm mistaken, the default configuration still doesn't allow her to do anything with it. sshd and afpd are turned off by default, so even having a root account doesn't get you anything unless you physically sit down at the box and log in locally.
I think I'd prefer that the system defaulted to not trusting other hosts for anything beyond network numbers, but I don't think that issue will lead immediately to a rash of rooted osx machines.
Re:Not exploitable in the default configuration, a (Score:3, Interesting)
Re:Not exploitable in the default configuration, a (Score:3, Interesting)
what boggles my mind is that this exploit is labeled as a "remote" exploit. while it is technically true, i'd like people to start qualifying the concept of "remote": an offending machine would need to live within a fairly close geographical location to exploit this vulnerability as it would need to be plugged
Slashdotting to the rescue! (Score:5, Funny)
Slashdotting to the rescue! Apple has at least a few more hours now.
Good News? (Score:3, Insightful)
Re:Good News? (Score:5, Insightful)
Re:Good News? (Score:3, Informative)
You mean like:
$ sudo bash
What is the difference, if any, between having an enabled root account and a user account with sudo access to every command (ie. bash)?
Cheers
Re:Good News? (Score:4, Insightful)
if you log in as root, no one knows who you really are. if you "sudo bash", that command gets logged, and its still possible to determine who you really are.
personally I try to avoid using "sudo bash", because its too easy to screw something up when you're root. but sometimes I get lazy.
bigger problem (Score:3, Insightful)
I might be going out on a limb here, but I would venture to say that there's a much bigger threat because the dude could just kick my door down and take my entire computer away with him. Then he can have all my data, and all of my applications, and my hardware too. Meanwhile, some other loser nerd is still mucking around trying to get this "hack" to work, but the guy who jacked me is walking away with my machine.
I understand this security issue is a threat and all, but I just don't see why anyone should be overly concerned. People seem to come up with scary stories like this about all kinds of things, hyping the facts up to make it seem like everyone who owns a Mac today is going to have a nerd take over their machine and steal all of their stuff. It reminds me of the pains people will go to in order to "secure" their machines, but then do something completely insecure like walk away from their desk for 10 minutes without password-protecting their machine.
Re:bigger problem (Score:4, Insightful)
Person breaks into your place, steals your computer. You know about it, you can call the cops. You can also change bank account info, credit cards, passwords, or any other information you might keep on your computer (they're used for more than just porn, ya know
Someone hacks in remotely, you have no clue it happened. They can do what they want, when they want, and there's absolutely nothing you can do about it.
Re:bigger problem (Score:3, Insightful)
I think there is a common mis-conception out there about the intentions of crackers. You don't have to have valuable data on your computer to ha
why? (Score:5, Funny)
no SCO news!
Here's a mirror (Score:3, Informative)
Link for the extra-lazy: here
Whoops (Score:3, Informative)
Reason for release of info (Score:4, Insightful)
I suspect the reason why this info was released was simple: Apple went and released the 10.3 upgrade with a known remote-root vulnerability in it after having acknowledged the existence of the vulnerability.
To me, knowing that this vulnerability exists would be critical. I don't run a Mac, but I attach to possibly hostile networks routinely. Normally I can firewall my machine to block attacks, but I can't firewall off DHCP and still use the network. Were I using a Mac and OSX, I'd very much want to know that I needed to take immediate steps to avoid giving someone the keys to my machine just by plugging in at the local coffee house.
Release of this information may constitute a problem for Apple, and may mean a lot of fast work for OSX users. Not releasing it, though, would mean a lot more work for OSX users who get their machines rooted, and a lot more work for the rest of us who have to fend off attacks and other crud routed through those rooted boxes.
Re:Yeah but.. (Score:3, Insightful)
Oh, forgot the most important one: it doesn't matter whether you've enabled sshd or not. Remember that this vulnerability allows them to control network mounts on your machine via the relevant DHCP parameters. That means that they can mount their startup directories over top of yours, and theirs have things configured to start sshd. Presto, your machine now has sshd running and ready to accept logins even if you've disabled it, because your configuration no longer applies.
Re:Ummm (Score:3, Informative)
Alternatively, if they knew your OS version, they could replace
Background info (Score:5, Insightful)
You can override a DHCP server, even by mistake (Score:3, Interesting)
I've been bitten by this myself: I have cable at home, and someone on the same subnet has (presumably) set up their NAT box backwards, so when I request a DHCP address, I get one of their internal addresses (192.168.100.x) as well as one from the ISP. Because they're on the same subnet and the ISP's DHCP server is elsewhere on the net
Why it was made public (Score:4, Insightful)
"It is unclear why an exploit was made public before Apple resolved the problem. Apple's fix is apparently scheduled for a December release."
Bastille Linux works on Mac OS X (Score:4, Interesting)
If this is interesting to you, please join our mailing list and/or e-mail me via jay AT bastille HYPHEN linux DOT org.
why? (Score:3, Insightful)
Dude this happens almost every time. It doesn't matter the vendor, if it's MS, Oracle, RedHat, or Apple...no matter. Exploit warnings always preceed the patch. It's how it is.
Is this a quick fix? (Score:3, Interesting)
Show-boating, grand-standing (Score:5, Insightful)
This exploit means nothing to very little the average user simply because no remote services are enabled by default. I'm using a 10.2.8 box right this minute and I had to enable Remote Login and Personal File Sharing.
I really don't know where to start talking when it comes to the idiocy of releasing an exploit, not just a proof of concept, prior to the vendor releasing a fix. Apple wasn't dragging their heels. The whole timeframe is under 1.5 months. It is certainly not unreasonable to expect their programmers to spend time working on a bug fix. Hell the development cycle alone is more than a month if not two. So they didn't make the November 3 date. That's less than a month from the date the bug was reported. That's no surprise. I'd hate to rush a fix out that fast too. So the 10.3 Security Update and 10.3.1 Security Updates didn't fix it. Does he not realize that they were in the pipeline for testing back at the beginning of October? They aren't going to insert another code change in the middle of testing.
IMHO this guy is show-boating, grand-standing, and showing that he has unreasonable expectations. The security vulnerability isn't that great. It's a hole, yes. It's not nearly as serious as a security hole in IE in which ALL IE installations are affected by "default." I think this guy should seriously be flogged for releasing an exploit at the same time as the advisory. That's just plain ridiculous. IMHO that alone speaks wonders about this guy. It's idiotic acts like this that seriously make me wonder about full disclosure. Anyhow, I've said my piece. Move along.
Re:Show-boating, grand-standing (Score:3, Insightful)
This exploit means a ton to the average user; the directory server you authenticate too can dictate what mount points you have.. allowing me to have target machines mount all sorts of interesting things. Bad, bad scene.
As far as the timeline for releasing the vulnerability goes, it appear
Re:Show-boating, grand-standing (Score:3, Informative)
As far as your understanding of the timeline goes, you should RTFA. He notified Apple, and they did respond. He is just unjustifiably impatient.
Re:Show-boating, grand-standing (Score:3, Informative)
AUTHOR: FAQs answered (Score:5, Informative)
Is my machine safe if I have the root account "turned off"?
No. The account attacking can be uid 0 and have any other name in the universe that is a valid account name.
Is my machine safe if I have all remote access services "turned off"?
*NO*, and please quit saying it is. This exploit allows malicious people full control of where things are mounting on your system. They can mount malware anywhere. Including places that can virtually guarantee executiong of their target code. For example, an attacker could cause their evil data to be mounted in place of crontabs and have their fake root's crontab point to an evil executable mounted there or somewhere else.
Why did you release this when you did?
This was an exploitable remote root vulnerability. After Apple reneged on the Nov. 3rd release date I gave them 2-3 weeks. After the 2-3 weeks were up, I asked for the status and they said "December". Meanwhile, users are left exposed and independent rediscovery seemed fairly likely. And maybe by someone less scrupulous than myself. I felt I was being strung along and that the issue may never get properly addressed so I set a hard deadline at that point. They didn't meet it, and I issued my advisory.
It would not be fair of me to let Mac users hang out in the breeze for more than 2 months on an issue of this magnitude. You may disagree, but I have no regrets about my actions and feel that I was more than fair to Apple Computer and its users.
(As I mentioned in a previous post, I was out horseback riding by the time
Re:AUTHOR: FAQs answered (Score:5, Informative)
It doesn't seem to me at all unclear "why an exploit was made public before Apple resolved the problem". In fact this seems very clear in what you wrote:
The wiretrip policy linked above is quite clear on how long to give a vendor ("maintainer") to come up with a fix:
This is clarified a bit on what it means to "respond" in the FAQ section:
According to policy, you would have been OK (if somewhat rude) releasing this after 5 work days from initial contact. Extending it through 48 calendar days and several patch cycles seems extraordinarily generous.
I wouldn't feel at all bad about the timeline followed. If anything it shows remarkable restraint.
subnet exploit ?! (Score:4, Informative)
You MAY say MacOS X Server got SSH turned on so will be vulnerable, but you must enter a static IP address at the system setup, that means you've no DHCP options unless you manually change it to DHCP later at "System Preference". By the way, if you do use DHCP to hand out server IP address you deserve to get rooted.
Anyway I get enough laugh out of some amateur security people today. Movie at 11.
No panic, just reconfigure (Score:5, Informative)
Just open the Directory Access tool and deselect:
LDAPv3, NetInfo, SLP
done!
I.M.H.O., Apple made the same mistake as MS in this case: Enable everything in case someone might need it. And don't worry about the bad guys
Re:And now the question of support... (Score:3, Informative)
CNET article (Score:3, Informative)
Re:And now the question of support... (Score:5, Informative)
Yes, all we have to go on is Apple's past record of continuing to provide security fixes for previous versions of OS X and OS 9.
Re:Local insecurity (Score:5, Insightful)
Not true (Score:3, Interesting)
If you can get repeated undected physical access to the machine, you can probably eventually trojan your way to root, though it might involve things as intricate as trojaning the bootloader and whatever utility you're using to decrypt the filesystem.
Re:Local insecurity (Score:3, Informative)
But in any case, having physical access to any machine WILL give you admin access anyway. If you really want the data, just crack the case open and pick the hard drive up.
The real issue is REMOTE security, and MacOS X has a wonderful track record on that. The flaw mentionned in the article is hardly
Re:Local insecurity (Score:3, Interesting)
snip...
I love my Mac, but Mac OS X is not a secure OS.
All of the *BSD assume that if you have local physical access to the machine, that you should be able to reset the root password.
You can fight this by encrypting portions of your file-system - at boot time, you unlock the encrypted filessystem with a pass-phrase. If somone reboots your computer, of turns off the power - they would have to get you to u
Just use an Open Firmware password. (Score:5, Informative)
You will then need to enter this password to enter single user mode or boot from a CD.
Note that this still doesn't fully secure your machine unless it's physically secured, as someone can simply reset the OF password by changing the amount of RAM in the machine, then zapping the PRAM.
Makes securing a powerbook pretty much impossible, but otherwise...
Re:Local insecurity (Score:5, Informative)
The solution is documented in /etc/ttys, simply change the secure of the console to a insecure:
I.e. The lines you want to edit is/are (with sudo viconsole "/usr/libexec/getty std.9600" vt100 on insecure
console "/System/Library/CoreServices/loginwindow.app/Cont ents/MacOS/loginwindow" vt100 on insecure onoption="/usr/libexec/getty std.9600"
Given that you propably still want to be able to log in if you have to - you propably also want to do:
netinfo or other default passwd: sudo passwd root
default passwd file used during early boot stages sudo passwd -i file root
Note that in most cases you want to change both.
Dw
Re:Local insecurity (Score:5, Informative)
Once set, you cannot boot from anything but the default startup disk. Also you need to enter the root password to enter single-user. (If root is enabled.)
Re:Damn (Score:3, Informative)
Anyway, somebody has to be plugged into your LAN before they can take advantage of this security hole, i.e. they must be on your subnet. If you are behind a NAT device you are safe, unless somebody can get in via wireless or by plugging in.
I'm not worried.
Re:I remember this guy. (Score:5, Informative)
I may have reason to believe that the seeded copies of 10.3.2 are, in fact, still vulnerable to this bug by default. But I can't say for sure because if I did know for sure, that would mean that someone violated their NDA and that would be bad news for someone. Live in fear of Apple Legal.
It's not a real happy conundrum. I found out one week ago that Apple was planning to release in December after having previously agreed in principle to a date sometime in November. I felt that I was being strung along like a ball of yarn, but I didn't want to be unreasonable so I gave them 1 more week. They never replied and cut off all contact with me. And here we are.
And FWIW, since it's been mentioned, I'm not an Apple hater, I love my PowerBook.