Subject: Re: NetBSD-3.1 was attacked: Bug of SSHD or cyrus-sasl?
To: Steven M. Bellovin <smb@cs.columbia.edu>
From: Geert Hendrickx <ghen@telenet.be>
List: netbsd-users
Date: 01/12/2007 23:41:02
[irrelevant lists removed]
On Fri, Jan 12, 2007 at 01:24:24PM -0500, Steven M. Bellovin wrote:
> > But still, I find it difficult to believe how quickly people assume the
> > box is rooted just because a user account was compromised. Is it really
> > that easy to get root on NetBSD? Or is it just simply unknown how many
> > compromises there are?
>
> It's unknown and unknowable.
>
> To take a random example, here's the current vulnerabilities list from
> idefense.com:
>
> [...]
>
> Note that this list is just for this month -- new vulnerabilities just
> announced within the last two weeks. At least five of them could affect
> NetBSD users. The X vulnerabilities affect XFree86 and Xorg; I wouldn't
> be surprised if vnc were vulnerable, too. The X vulnerabilities, I
> should note, are described as local exploits. (Aside: that site likes
> you have Javascript enabled, but often the workaround for browser holes
> is "disable Javascript"....)
>
> Want more? There were 27 security advisories for NetBSD last year alone.
> On January 1, 2006, pkg-vulnerabilities was 1657 lines long; today, it's
> 2385 lines long.
So, you guys have no local users on your systems ... ?
Isn't that exactly why many daemons (mail, web, dns, ...) run as non-root;
if they get cracked, the entire system is not compromised? The concept of
unprivileged users is the corner stone of the UNIX security model.
Geert