4802789 2000-02-16 02:21 /80 rader/ Postmaster Mottagare: Bugtraq (import) <9800> Ärende: ANNOUNCE: Medusa DS9 security system ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: bugtraq@securityfocus.com X-NCC-RegID: sk.napri MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Message-ID: <Pine.LNX.4.20.0002151638370.4039-100000@marsquake.terminus.sk> Date: Tue, 15 Feb 2000 17:38:49 +0100 Reply-To: Milan WWW Pikula <www@BANAN.NAPRI.SK> Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: Milan WWW Pikula <www@BANAN.NAPRI.SK> X-To: medusa@medusa.fornax.sk, linux-kernel@vger.rutgers.edu securedistros@nl.linux.org, bugtraq@securityfocus.com security@rak.isternet.sk, linux@linux.cz linux-security@redhat.com To: BUGTRAQ@SECURITYFOCUS.COM Greetings, I'd like to announce the release of stable version of the security system Medusa DS9. It's purpose is to increase the security of OS Linux. Medusa it one of projects of the Slovak Linux user group (SkLUG). It can be downloaded at http://medusa.fornax.sk/ Medusa consists of two major parts - linux kernel changes and the user-space daemon. Kernel changes do the monitoring of syscalls, filesystem actions, processes and they implement the communication protocol. Security daemon communicates with the kernel using character device to send and receive "packets". Daemon contains the whole logic and implements the concrete security policy. That means, that medusa can (as opposite to another approaches) implement any model of data protection - it depends only on configuration file, which is in fact an program in the internal programming language, somewhat similiar to C. At the logical level there are these changes: * separation of processes, files and IPC to the independent groups (virtual subsystems) * ability to detect, disable or modify any system call from any process * ability to detect, ... selected "process actions" like sending signals, exec, ... * ability to detect, redirect, ... selected file actions, such as access to the file and so * ability to enforce process to execute an arbitrary code. This feature is usefull to enforce logging drom that process and so. I'd like to answer some of frequently asked questions here: Q what relation is between medusa and capabilities? A medusa SUPPORTS linux capabilities and can test, set or change them. Q how remarkable is the slowdown of this communication between the kernel and user-space daemon in the real usage? A actually it's insensible. medusa was designed with the question of speed in mind, so all informations are stored in kernel. you can specify exactly what actions do you need to be watched. on the real servers with about 50 shell-account users, where we test medusa, is traffic about 11 packets per second or less. the fact that the daemon is in userspace, gives it the comfort in deciding about security reasons and it increases the portability of the whole system. (bsd?:) Q where it works? A linux 2.2.13, 2.2.14, intel. SMP is not fully tested, but it's reported to work. we are working on alpha port and other platforms will follow. Q where can I find more information? A at http://medusa.fornax.sk/ and in ``doc'' subdirectory in the source package. Kind regards, Medusa development team Marek Zelem Martin Ockajak Milan Pikula -- Milan Pikula, WWW. Finger me for Geek Code. http://fornax.elf.stuba.sk/~www, www@fornax.elf.stuba.sk .. dajte mi pevnu linku a pohnem zemegulou .. (4802789) ------------------------------------------ 4807835 2000-02-17 11:11 /37 rader/ Postmaster Mottagare: Bugtraq (import) <9822> Ärende: Re: ANNOUNCE: Medusa DS9 security system ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: BUGTRAQ@SECURITYFOCUS.COM MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Message-ID: <Pine.LNX.4.21.0002152205430.7827-100000@eckhart.stderr.org> Date: Tue, 15 Feb 2000 22:32:39 -0600 Reply-To: elijah wright <elw@DNS1.STDERR.ORG> Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: elijah wright <elw@DNS1.STDERR.ORG> X-cc: BUGTRAQ@SECURITYFOCUS.COM To: BUGTRAQ@SECURITYFOCUS.COM In-Reply-To: <Pine.LNX.4.20.0002151638370.4039-100000@marsquake.terminus.sk> > communicates with the kernel using character device to send and receive > "packets". Daemon contains the whole logic and implements the concrete > security policy. That means, that medusa can (as opposite to another [...] > * ability to enforce process to execute an arbitrary code. This feature > is usefull to enforce logging drom that process and so. the fact that your program has both a userspace and a kernel-space component makes it almost immediately suspect as "vulnerable". kind of funny for me to get to reply to a "security tool" announcement with a notice-of-warning. has the source to the userspace module been audited yet? hopefully by someoen other than the authors? that last part sounds like it might make, with a few mods, a great 3l33t h@x0r tool :) perhaps it might be most useful to someone good enough to get a rootshell but not good enough to hack away at the process table by themselves. all in all, this thing scares me. elijah (4807835) ------------------------------------------(Ombruten)