lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 16 Dec 2010 16:25:27 -0500 From: musnt live <musntlive@...il.com> To: full-disclosure@...ts.grok.org.uk Subject: Backdoor in OpenBSD Explained proof of Theo's lieying Is we has packet we is do this: 1) Program is write to take copy of messages before encryption and is write to tmp file 2) Program is write to split tmp file and insert into fragments on wire at 2bytes 3) Program is write to send to random source and is someone watch, who care. Is never tell 2 bytes is sifted for reassemble elsewhere. Is you send packets to gOOgle, no one stop think about this. Packets =====-> Google | | 2bytes sniffed { reassemble bytes later } Is anyone see packets who can tell what is go through the wire? No one. Is ICMP used for covert backdoor or is this message can be sent when someone browse in HTTP header later, or, e.g.: Network Stack Program -- is someone ping with special ICMP code -- come to papa -- you send response to knocker with 2bytes in unreachable. Knocker reassemble full message. Sidechannel backdoor! Network stack program possible to blame as is Theo change ICMP in 2007 and he also was spoofing time, do not is believe me, is see for yourself: http://seclists.org/bugtraq/2005/Jul/93 From: Theo de Raadt <deraadt () cvs openbsd org> Date: Wed, 06 Jul 2005 20:17:36 -0600 Is yet, he send in 2007. For why is he underhanded the world? 's/Demi/Theo/g http://www.moviequotes.com/fullquote.cgi?qnum=167829 ' _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists