lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <3E71BE64C6ECD8449CD5A236F700FA96814633@odcexch.wei.owhc.net>
From: mbassett at omaha.com (Bassett, Mark)
Subject: FW: Mail delivery failed: returning message to sender

This is the 3rd time I have gotten this bounce.  Who do I email to get
this bastard off the list?

Mark Bassett
Network Administrator
World media company
Omaha.com
402-898-2079

-----Original Message-----
From: Mail Delivery System [mailto:postmaster@...ycs.com] 
Sent: Friday, October 24, 2003 2:44 PM
To: Bassett, Mark
Subject: Mail delivery failed: returning message to sender

This message was created automatically by mail delivery software
(HiveMail).

A message that you sent could not be delivered to its recipient(s).
The error was:
    Unknown mailbox.

------ This is a copy of the message, including all the headers. ------

Return-path: <full-disclosure-admin@...ts.netsys.com>
Envelope-to: dont@...ycs.com
Delivery-date: Fri, 24 Oct 2003 15:39:07 -0400
Received: from [199.201.233.10] (helo=netsys.com)
	by dime9.dizinc.com with esmtp (Exim 4.24)
	id 1AD7m7-00030d-4V
	for dont@...ycs.com; Fri, 24 Oct 2003 15:39:07 -0400
Received: from NETSYS.COM (localhost [127.0.0.1])
	by netsys.com (8.11.6p2-2003-09-16/8.11.6) with ESMTP id
h9OJ23G11553;
	Fri, 24 Oct 2003 15:02:03 -0400 (EDT)
Received: from odcexch.wei.owhc.net (nat19.strataone.com [66.180.7.19]
(may be forged))
	by netsys.com (8.11.6p2-2003-09-16/8.11.6) with ESMTP id
h9OIvK709021
	for <full-disclosure@...ts.netsys.com>; Fri, 24 Oct 2003
14:57:20 -0400 (EDT)
content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Subject: RE: Linux (in)security (Was: Re: [Full-Disclosure] Re: No
Subject)
X-MimeOLE: Produced By Microsoft Exchange V6.0.5762.3
Message-ID:
<3E71BE64C6ECD8449CD5A236F700FA968199CC@...exch.wei.owhc.net>
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Thread-Topic: Linux (in)security (Was: Re: [Full-Disclosure] Re: No
Subject)
Thread-Index: AcOZGP5Bb3AfDn26RMin6LvHXqQieABRseOQ
From: "Bassett, Mark" <mbassett@...ha.com>
To: "Paul Schmehl" <pauls@...allas.edu>,
<full-disclosure@...ts.netsys.com>
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by netsys.com id
h9OIvK709021
Sender: full-disclosure-admin@...ts.netsys.com
Errors-To: full-disclosure-admin@...ts.netsys.com
X-BeenThere: full-disclosure@...ts.netsys.com
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe:
<http://lists.netsys.com/mailman/listinfo/full-disclosure>,
	
<mailto:full-disclosure-request@...ts.netsys.com?subject=unsubscribe>
List-Id: Discussion of security issues
<full-disclosure.lists.netsys.com>
List-Post: <mailto:full-disclosure@...ts.netsys.com>
List-Help:
<mailto:full-disclosure-request@...ts.netsys.com?subject=help>
List-Subscribe:
<http://lists.netsys.com/mailman/listinfo/full-disclosure>,
	
<mailto:full-disclosure-request@...ts.netsys.com?subject=subscribe>
List-Archive: <http://lists.netsys.com/pipermail/full-disclosure/>
Date: Fri, 24 Oct 2003 13:57:13 -0500

I think something we are also forgetting is that statistically *nix
users are people who are computer geeks.  Average joe #1 buys his pc
from Best buy pre-loaded with windows XP and has no clue how to install
it.  Currently vendor pre-loaded *nix machines aren't very popular,
which means in order to have linux on your machine, you must
download/purchase it and load it yourself.  Most people don't want to
mess with the hassle of the whole thing, aside from the fact that it
doesn't play new game #1313413.  All this means is that the *typical*
*nix user knows what they are doing and therefore knows to keep the
machine updated. 

--These same users on Windows (and who probably also run windows boxes)
would also be unaffected by the rash of 'sploits-- 

Until we start seeing vendor pre-loads going to Joe Blow, *nix will
still be the O/S of servers, and geeks. (no offense to geeks out there,
I'm one too ;) )  

Mark Bassett
Network Administrator
World media company
Omaha.com
402-898-2079


-----Original Message-----
From: Paul Schmehl [mailto:pauls@...allas.edu] 
Sent: Wednesday, October 22, 2003 10:19 PM
To: full-disclosure@...ts.netsys.com
Subject: Re: Linux (in)security (Was: Re: [Full-Disclosure] Re: No
Subject)

--On Wednesday, October 22, 2003 6:00 PM -0600 Bruce Ediger 
<eballen1@...st.net> wrote:
>
> The real questions go something like:
>
> "Source code for Unix viruses has been available for years, from
sources
> almost too numerous to mention.  Why haven't Unix viruses become
epidemic
> the way that Windows viruses have?"
>
The usual argument is that Windows is more ubiquitous than Unix and is 
therefore the target of choice.  I would argue that the *real* reason is

that Windows is more ubiquitous as a *desktop* operating system and is 
therefore the target of choice.  However, that's changing.  Linux is 
gaining in the desktop space and so is Mac OS X, which is really
"exposed" 
for the first time.  By that I mean that previous Mac OSes weren't as 
easily attacked remotely because they used Appletalk rather than TCP/IP.

(Yes, Macophiles, I know TCP/IP was available before OS X.)

The real key to prevalence of malware, IMNSHO, is the ease of attack
*and* 
the potential pool of victims.  People think it's really stupid to
"surf" 
the Internet using an administrator account on Windows.  Well what do
you 
think the neophyte Linux users are doing?  I seriously doubt you'll find

many that have a regular account and use su or sudo to do administrative

tasks.  They're bound to run in to something sooner or later that they
find 
irritating (like being prompted for root's password every time they try
to 
run up2date on RedHat) and they'll do the same thing they always do on a

desktop system.  They'll start logging in as root because they don't get

"pestered" by all those warning messages and they can install software
any 
time they want.  (Mind you, Windows still has a long way to go in that 
regard.  MS doesn't make it easy to run as an unprivileged user, that's
for 
sure.)

And when folks are on the net, logged in as root, on a Unix box, they're

just as susceptible to worms and viruses as any Windows user is.  All it

takes is some momentum in the desktop space and the stats will change. 
When the average desktop user can figure out how to burn CDs, listen to 
music and print on *nix as easily as they can do it on Windows, you'll
see 
more and more malware for *nix as they move over to it (if they do.)

Now I am *not* arguing that Windows is the best OS to use (or even a
good 
one for that matter) or even that Windows is no easier to attack than
*nix. 
But worms and viruses will follow desktop users, not OSes, no question 
about it.

> "Security problems of the same magnitude as .ida buffer overflows, or
> MSRPC buffer overflows exist in unix programs like Sendmail and
others.
> Why hasn't a worm materialized for this problem?"
>
Because unpatched apache isn't installed *and* running on *nix boxes by 
default.  We had 90 boxes hit by Code Red.  Only one was an "IT" box,
and 
that one had just been installed and was *at* windowsupdate when it got 
infected.  Of the other 89, all but three were desktop systems.  When
Nimda 
hit, we had 40.  All 40 were desktops.  People who know what they're
doing 
don't get infected with that crap.  People who don't, do.  What OS
they're 
using is irrelevant.

> "The scalper worm didn't effect nearly as many hosts as msblast did.
> Why not?  Why did the scalper worm seem to die out, yet wormwatch.org
> still records many hits from much older worms like SQLSpida and
Nimda?"
>
Because desktop users don't patch.  Scalper didn't make much headway 
because *very few* desktop *nix boxes run Apache, and servers that do
are 
admined by people who understand the need to patch.

Remember the SunOS.Poisonbox.worm?  That made pretty good headway on 
Solaris boxes and can still be found today.  What did it attack?
Sadmind, 
which few server admins would ever run and far fewer would run
unpatched. 
Only desktop users have that on and don't want to be bothered with 
patching.  And they got infected.  Every *nix infection that I've had to

deal with has been a desktop system, not a server.

Why do you think wuftpd is so heavily attacked?  I think it's because
it's 
had many holes *and* lots of desktop users run it because it lets them 
easily move files around.

> And I guess you can generalize and ask why the Windows "culture"
generates
> so many problems of such a magnitude, that last so long?  My home
office
> web server got a Code Red hit on Sept 19th 2003, for example.  Other
> computing cultures (Unix, Mac, etc) don't seem to exhibit this.  Why
not?

Well, historically *nix was for the clued in.  All others were excluded.

And Mac wasn't easily exploited due to Appletalk.  But all that's
changing.

KDE has been riddled with security problems.  Once the number of desktop

users using KDE reaches critical mass (whatever that is) you'll start 
seeing more and more malware on *nix.  Malware follows negligent users, 
*not* OSes.

> Shouldn't we focus our efforts on figuring out what aspects of Linux
or
> Mac cultures keep epidemics from occuring?  It's certainly a waste of
> breath to point out that OS X has horrendous security flaws when none
of
> them turn into grotesque epidemics like Sobig.f.
>
Well, think about it for a minute.  You're going to write a virus that's

designed to trojan machines so you can use them in a massive distributed

spam network.  What do you attack?  The 5 million Mac machines
worldwide? 
Or the 150 million Windows boxes?  If your rate of success is 1 in 500,
you 
get 2,000 bots with Mac and 300,000 with Windows.  Which would you
choose?

I don't doubt that there is some politicization in malware production 
(people who hate Gates and his OS and want to embarrass him any way they

can), but most malware authors are simply trying to get the most bang
for 
the buck, if you will.  They'll follow the desktop crowd wherever it
leads 
them.  And they won't have any more difficulty infecting KDE users than 
they do Windows users.

Paul Schmehl (pauls@...allas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
AVIEN Founding Member
http://www.utdallas.edu

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


************************************************************
Omaha World-Herald Company computer systems are for business use only.
This e-mail was scanned by MailSweeper
************************************************************

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ