4719654 2000-01-24  04:38  /52 rader/ Postmaster
Mottagare: Bugtraq (import) <9459>
Ärende: NIS security advisory : password method downgrade
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
X-Operating-System: Linux ns 2.2.13
Message-ID:  <20000122011507.A30744@asit.ro>
Date:         Sat, 22 Jan 2000 01:15:07 +0200
Reply-To: Stefan Laudat <stefan@ASIT.RO>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Stefan Laudat <stefan@ASIT.RO>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

	
		Hello all,
	
	I've seen that some of you noticed a lot of features about
programs that downgrade the encryption method of the passwords from
MD5 to DES and that should be a shame to distribution packagers.
	The dish of the day is the Yellow Pages/NIS (NYS?) suite
shipped with the pristine RedHat 6.1. After a standard blank
installation the rpc.yppasswd (when used via ypasswd by  domain
lusers from all over the place) shamelessly uses the old
(deprecated?) 8-character-limited des password encryption,
butt-slapping the idea of site security and raising from their graves
old pwcracks and John the Rippers that could easily bruteforce into
your password files. Thus your new shiny md5 crypted shadow is gone,
and the 8-chars passwords are back.
	I've tested this only with RedHat 6.1 but some of you may have
the opportunity to test it with other new Linux distributions and
if it works please announce.
	To Aleph1: do not ask for a patch as in previous bounced messages,
i do not intend to take part or envolve in the YP developement team as
neither in the ssh team. As a full end-user I do not care about them.
	To everyone: protect your NIS ports as required in the
ypserv config files.
	To NYS team: please provide patches for this, I love NIS, and
do not make SuSE a RedHat clone (as it is), they both suck.
	To kiddies: just press delete and move along next post, you are
too dumb to run a password cracker.

still unemployed,
--

Stefan Laudat
Data Networks Analyst
ASIT SA
----------------------------------------------------------------
Skills page http://www.tekmetrics.com/transcript.shtml?pid=30777
----------------------------------------------------------------

HELP!!!! I'm being held prisoner in /usr/games/lib!
(4719654) ------------------------------------------(Ombruten)

4724084 2000-01-25  03:47  /66 rader/ Postmaster
Mottagare: Bugtraq (import) <9485>
Ärende: Re: NIS security advisory : password method downgrade
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: BUGTRAQ@SECURITYFOCUS.COM
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-ID:  <20000124075858.A11549@Wotan.suse.de>
Date:         Mon, 24 Jan 2000 07:58:58 +0100
Reply-To: Thorsten Kukuk <kukuk@SUSE.DE>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Thorsten Kukuk <kukuk@SUSE.DE>
X-To:         Stefan Laudat <stefan@ASIT.RO>
X-cc:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000122011507.A30744@asit.ro>; from Stefan Laudat on Sat 
             Jan 22, 2000 at 01:15:07AM +0200

Hi,

On Sat, Jan 22, Stefan Laudat wrote:

> 	
> 		Hello all,
> 	
> 	I've seen that some of you noticed a lot of features about
> programs that downgrade the encryption method of the passwords from
> MD5 to DES and that should be a shame to distribution packagers.
> 	The dish of the day is the Yellow Pages/NIS (NYS?) suite
> shipped with the pristine RedHat 6.1. After a standard blank installation
> the rpc.yppasswd (when used via ypasswd by  domain lusers from all over the
> place) shamelessly uses the old (deprecated?) 8-character-limited des
> password encryption, butt-slapping the idea of site security and
> raising from their graves old pwcracks and John the Rippers that
> could easily bruteforce into your password files. Thus your new shiny md5
> crypted shadow is gone, and the 8-chars passwords are back.

This is wrong. rpc.yppasswdd doesn't encrypt any passwords, it only
saves the encrypted, new password which it gets from the client.
It works perfect, since you can send rpc.yppasswdd md5 hashes as
password and it will not change this back to DES encryption.

> 	I've tested this only with RedHat 6.1 but some of you may have
> the opportunity to test it with other new Linux distributions and
> if it works please announce.

Then the yppasswd client is not able to handle md5 hashes. My pam_unix
Module for the next SuSE Linux release can handle this if you don't
use yppasswd, but /bin/passwd.

> 	To Aleph1: do not ask for a patch as in previous bounced messages,
> i do not intend to take part or envolve in the YP developement team as
> neither in the ssh team. As a full end-user I do not care about them.
> 	To everyone: protect your NIS ports as required in the
> ypserv config files.
> 	To NYS team: please provide patches for this, I love NIS, and
> do not make SuSE a RedHat clone (as it is), they both suck.

Sorry, but SuSE Linux is NO RedHat clone and there already exist PAM
Modules which can handle this. And the NIS developing is done by SuSE.

  Thorsten

--
Thorsten Kukuk       http://www.suse.de/~kukuk/       kukuk@suse.de
SuSE GmbH            Schanzaeckerstr. 10            90443 Nuernberg
Linux is like a Vorlon.  It is incredibly powerful, gives terse,
cryptic answers and has a lot of things going on in the background.
(4724084) ------------------------------------------(Ombruten)

4724098 2000-01-25  04:42  /64 rader/ Postmaster
Mottagare: Bugtraq (import) <9488>
Ärende: Re: NIS security advisory : password method downgrade
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: BUGTRAQ@SECURITYFOCUS.COM
MIME-Version: 1.0
Content-Type: TEXT/plain; charset=us-ascii
Content-MD5: mYFZTHAs54HdHi0jX4uyiQ==
Message-ID:  <200001241140.LAA05334@otis.UK.Sun.COM>
Date:         Mon, 24 Jan 2000 11:40:03 +0000
Reply-To: Darren Moffat - Solaris Sustaining Engineering <darren.moffat@sunuk.UK.Sun.COM>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Darren Moffat - Solaris Sustaining Engineering <darren.moffat@sunuk.UK.Sun.COM>
X-To:         stefan@ASIT.RO
X-cc:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

>	The dish of the day is the Yellow Pages/NIS (NYS?) suite
>shipped with the pristine RedHat 6.1. After a standard blank installation
>the rpc.yppasswd (when used via ypasswd by  domain lusers from all over the
>place) shamelessly uses the old (deprecated?) 8-character-limited des

This is required to make it NIS(YP) otherwise it won't be able to
interoperate with other systems running NIS.  The md5 and other
alternate passwords are Linux/BSD extensions to the password
table/map that are not available in a lot of other UNIX systems.
Handing out md5 encrypted passwords means that is no longer NIS(YP)
but some Linux extension - if a commercial vendor did this lots of
people would complain about proprietary incompatible extensions to an
open protocol.

It would be much better to run NIS+ or LDAP as your naming service if
you are concerned about people running password crackers over your
passwd table/map.  NIS+ and LDAP allow you to control which users can
actually see the encrypted password when a getpw*() call is made.
This can be done because they have the concept of row & column
permissions much like a standard UNIX filesystem.

NIS has several other fundamental security short comings that have
been solved in NIS+ and other more modern naming services.  If you
are concerned about security of your naming service you really
shouldn't be using NIS at all.

>place) shamelessly uses the old (deprecated?) 8-character-limited des
>password encryption, butt-slapping the idea of site security and
>raising from their graves old pwcracks and John the Rippers that
>could easily bruteforce into your password files. Thus your new shiny
md5 >crypted shadow is gone, and the 8-chars passwords are back.

Secondly the encryption algorithm used in traditional UNIX passwords
is not itself limited to 8-chars.  Traditionally passwords in UNIX
were limited to 8-chars because login and friends called getpass()
which is defined to return a string of 8-chars + null.  Now Solaris,
Linux and possibly others use PAM and the PAM conversation functions
tend to call getpassphrase() or other functions (possibly GUIs) that
make the new limit 256-chars.


In summary I suggest that the Linux ypserv/rpc.yppasswd is not changed
to do this by default and it if it changed then it is made clear to
the admin when it is setup that enabling such a feature means they are
nolonger running traditional NIS(YP) and interoperability with other
systems will probably be broken and this is because they have enabled
this non standard extension.

--
Darren J Moffat
(4724098) ------------------------------------------(Ombruten)