Computer Genius siezes control of San Francisco

N&P: Discuss governments, nations, politics and recent related news here.

Moderators: Alyrium Denryle, Edi, K. A. Pital

User avatar
Solauren
Emperor's Hand
Posts: 10424
Joined: 2003-05-11 09:41pm

Post by Solauren »

Destructionator XIII wrote: [qoute="Solauren"]If a security hole is deliberate, and the client and the programmer knows about it, it's not a hole, it's a 'backdoor'.
And when an illegitimate attacker uses it, what's it called then?[/quote]

Joke: A Microsoft Program?

Seriously: The client agreed to it, and had the option of going 'No'. Most consider it 'acceptable risk'. Depending on the nature of the backdoor, it could be anything from a minor inconvience, to 'restore it from backups, we've lost a few hours work'.
User avatar
Winston Blake
Sith Devotee
Posts: 2529
Joined: 2004-03-26 01:58am
Location: Australia

Post by Winston Blake »

Solauren wrote:Any programmer / company that wants repeat business or referrals and a good reputation will explain the security set up to a client, in detail. Including 'now then, with all that said, if you want, we can make the program so that, worse case scenario and everyone is locked out, we would be able to get it. If you don't want that, we can make sure to not include this feature.'
I have an idea; please explain what's wrong with it. Instead of an actual vulnerability, why not keep the details of some secret top-level account in a safe. These details are only to be released in case of a serious problem, and only to someone with the proper authorisation and a confirmed identity.

E.g. Someone calls up and says 'Bob abused his access and changed all our passwords, I'm the designated Emergency Person, can you send your Emergency Person over with the secret password? I'll be waiting with 100 points of ID.' Screw the programmers - only the software company's vetted Emergency Person (or Persons) should have the keys to the password safe.

Do it on a Friday night - same deal as before.
User avatar
Solauren
Emperor's Hand
Posts: 10424
Joined: 2003-05-11 09:41pm

Post by Solauren »

That's what I've been trying to get at the entire time. Thank you for explaining the basic idea better then me.

The 'secret password' would, by some, be considered a security hole. Especially if it's on a secret user account that can't be removed.

(One programmer would still have to be aware of it, just make sure that programmer is the CEO or owner of the company).

However, if three people know it, it itself is properly secured, and is 200 or so digits and using the entire Ascii table, that's 255 x 254 x 253... possible passwords.
User avatar
Xon
Sith Acolyte
Posts: 6206
Joined: 2002-07-16 06:12am
Location: Western Australia

Post by Xon »

If you have physical access to the machine or a local login account to the database server, it really doesnt matter if you have proper access through the actual system itself.

And frankly any recovery scheme needs to be able to simply blast away whatever is actually there regardless of permisions or how the hell will you recover from permisions being wacked?
"Okay, I'll have the truth with a side order of clarity." ~ Dr. Daniel Jackson.
"Reality has a well-known liberal bias." ~ Stephen Colbert
"One Drive, One Partition, the One True Path" ~ ars technica forums - warrens - on hhd partitioning schemes.
User avatar
Xon
Sith Acolyte
Posts: 6206
Joined: 2002-07-16 06:12am
Location: Western Australia

Post by Xon »

All it takes to own an entire Windows Domain, is to have a local admin account and trick a Domain/Forest Administrator to log into that system on which that local admin has access to.

Everything after that is simply time saving.
"Okay, I'll have the truth with a side order of clarity." ~ Dr. Daniel Jackson.
"Reality has a well-known liberal bias." ~ Stephen Colbert
"One Drive, One Partition, the One True Path" ~ ars technica forums - warrens - on hhd partitioning schemes.
User avatar
Darth Wong
Sith Lord
Sith Lord
Posts: 70028
Joined: 2002-07-03 12:25am
Location: Toronto, Canada
Contact:

Post by Darth Wong »

Solauren's dogged defense of his "I leave a backdoor open" idea is a wonder to watch. Now he's talking about it being documented and discussed with the customer so that the admin knows exactly what it is. If that's the case, then a malicious admin who wanted to sabotage the system would know about it as well, so he would disable it. So much for this brilliant solution; the fact is that his "backdoor" solution only works if the admin doesn't know about it, which is unacceptable and which he disavows himself.
Image
"It's not evil for God to do it. Or for someone to do it at God's command."- Jonathan Boyd on baby-killing

"you guys are fascinated with the use of those "rules of logic" to the extent that you don't really want to discussus anything."- GC

"I do not believe Russian Roulette is a stupid act" - Embracer of Darkness

"Viagra commercials appear to save lives" - tharkûn on US health care.

http://www.stardestroyer.net/Mike/RantMode/Blurbs.html
User avatar
Solauren
Emperor's Hand
Posts: 10424
Joined: 2003-05-11 09:41pm

Post by Solauren »

Darth Wong wrote:Solauren's dogged defense of his "I leave a backdoor open" idea is a wonder to watch. Now he's talking about it being documented and discussed with the customer so that the admin knows exactly what it is. If that's the case, then a malicious admin who wanted to sabotage the system would know about it as well, so he would disable it. So much for this brilliant solution; the fact is that his "backdoor" solution only works if the admin doesn't know about it, which is unacceptable and which he disavows himself.
Hard coded backdoors can't be disabled.

That's the idea behind them.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Post by phongn »

Solauren wrote:Hard coded backdoors can't be disabled.

That's the idea behind them.
You seem awfully confident in your ability to (1) make sure your backdoor is secure and (2) that a savvy administrator couldn't cook something up to defeat your backdoor.
User avatar
Solauren
Emperor's Hand
Posts: 10424
Joined: 2003-05-11 09:41pm

Post by Solauren »

Depends on the administrator.

One with sufficient programming knowledge, no problem. Hell, one with sufficient programming knowledge and familairity with the system probably wouldn't need the backdoor.

But, that's the same with any security.

As for the backdoor being secure, username / password combinations of 200 characters a piece are hard to crack.

Mind you, 20 or 30 for each can be difficult enough.
User avatar
Sarevok
The Fearless One
Posts: 10681
Joined: 2002-12-24 07:29am
Location: The Covenants last and final line of defense

Post by Sarevok »

Solauren :

Just what exactly are you talking about ? Some program that works across a network which can not be breached except via a backdoor ?
I have to tell you something everything I wrote above is a lie.
User avatar
Darth Wong
Sith Lord
Sith Lord
Posts: 70028
Joined: 2002-07-03 12:25am
Location: Toronto, Canada
Contact:

Post by Darth Wong »

Solauren wrote:Depends on the administrator.

One with sufficient programming knowledge, no problem. Hell, one with sufficient programming knowledge and familairity with the system probably wouldn't need the backdoor.

But, that's the same with any security.
Ah, so this solution relies upon a malicious network administrator not being too familiar with computers.
Image
"It's not evil for God to do it. Or for someone to do it at God's command."- Jonathan Boyd on baby-killing

"you guys are fascinated with the use of those "rules of logic" to the extent that you don't really want to discussus anything."- GC

"I do not believe Russian Roulette is a stupid act" - Embracer of Darkness

"Viagra commercials appear to save lives" - tharkûn on US health care.

http://www.stardestroyer.net/Mike/RantMode/Blurbs.html
rhoenix
Jedi Council Member
Posts: 1910
Joined: 2006-04-22 07:52pm

Post by rhoenix »

Ok, first a caveat: I am not (yet) Cisco certified, and my opinion comes from my schooling in network administration, and IP security. I also grant that there are likely CCNA & even CCIE-certified people here; I welcome your comments, thoughts, and possible corrections.

In reading the OP,
Article wrote:Childs, who works in the city Department of Technology, allegedly created a password that gave him exclusive access to the city's new FiberWAN (wide area network), authorities told the newspaper. He has refused to divulge the password, leaving other system administrators locked out.
- If he password-locked the Fiber-WAN switch, then this isn't a simple "put haxor cd in drive and reboot, lol" kind of fix. Some serious black hat stuff is going to have to get broken out to try to access this switch if the (new) admins want to try dodging the rather depressing alternative of replacing the switch and rebuilding all the routing and network data; e.g. uploading a "specialized" firmware update to the Fiber switch, if they can do that without the password.

- A programmer who left a backdoor in a Fiber switch on the manufacturer's side would very probably get shit-canned and frog-marched out the instant the backdoor was discovered, and possibly even sued. That's a potentially huge liability for a company who relies upon sales of such equipment.

- Unless Captain Douchebag Admin in the OP coughs up the password, or another way is found...the routing tables for the entire WAN are going to have to be rewritten, the firewall rules replaced, and all the links re-tested for consistency, in addition to obviously replacing the fiber switch that's currently password-locked.
User avatar
Ariphaos
Jedi Council Member
Posts: 1739
Joined: 2005-10-21 02:48am
Location: Twin Cities, MN, USA
Contact:

Post by Ariphaos »

Solauren wrote:Yes, perfectly.
Having written several programs with password capability for work, I always either write a program or backdoor access method. [/quote]

Now this is a wonderful statement to have posted publicly on the web for any potential employer to see.
Give fire to a man, and he will be warm for a day.
Set him on fire, and he will be warm for life.
User avatar
Resinence
Jedi Knight
Posts: 847
Joined: 2006-05-06 08:00am
Location: Australia

Post by Resinence »

Solauren wrote:
Darth Wong wrote:Solauren's dogged defense of his "I leave a backdoor open" idea is a wonder to watch. Now he's talking about it being documented and discussed with the customer so that the admin knows exactly what it is. If that's the case, then a malicious admin who wanted to sabotage the system would know about it as well, so he would disable it. So much for this brilliant solution; the fact is that his "backdoor" solution only works if the admin doesn't know about it, which is unacceptable and which he disavows himself.
Hard coded backdoors can't be disabled.

That's the idea behind them.
How are you storing these 200 character passwords? How many special characters do you use? How complex is the has function? Do you salt the hashes? Ever heard of rainbow tables?

I get the feeling your backdoor isn't as secure as you think it is.
“Most people are other people. Their thoughts are someone else's opinions, their lives a mimicry, their passions a quotation.” - Oscar Wilde.
User avatar
atg
Jedi Master
Posts: 1418
Joined: 2005-04-20 09:23pm
Location: Adelaide, Australia

Post by atg »

Further news from Slashdot
"A source with direct knowledge of San Francisco's IT infrastructure has tipped off Paul Venezia to the real story behind Terry Childs' lockout of San Francisco's network, providing a detailed account of the city's FiberWAN, interdepartmental politics, and Terry Childs himself. Childs pleaded not guilty to charges of tampering yesterday and is being held on $5 million bail. According to the source, Childs' purview was limited to the city's FiberWAN — a network he himself built and, believing no one competent enough to touch the network but himself, guarded religiously, sharing details with no one, including routing configuration and log-in information. Childs was so concerned about the network's security that he refused even to write router and switch configurations to flash. But what may prove difficult for the prosecution in its case against Childs is that his restricted access to the network was widely known and accepted among managers and the city's other network engineers. Venezia, who has been suspicious of the official story from the start, suspects that the Childs case may be that 'of an overprotective admin who believed he was protecting the network — and by extension, the city — from other administrators whom he considered inferior, and perhaps even dangerous.' Further evidence is that fact that the network, from what Venezia understands, has been running smoothly since Childs' arrest."
Follow the link to slashdot and there are links to other sources of info.
Paul Venezia wrote:Why San Francisco's network admin went rogue
An inside source reveals details of missteps and misunderstandings in the curious case of Terry Childs, network kidnapper


By Paul Venezia

July 18, 2008

Last Sunday, Terry Childs, a network administrator employed by the City of San Francisco, was arrested and taken into custody, charged with four counts of computer tampering. He remains in jail, held on $5 million bail. News reports have depicted a rogue admin taking a network hostage for reasons unknown, but new information from a source close to the situation presents a different picture.

In posts to my blog, I postulated about what might have occurred. Based on the small amount of public information, I guessed that the situation revolved around the network itself, not the data or the servers. A quote from a city official that Cisco was getting involved seemed to back that up, so I assumed that Childs must have locked down the routers and switches that form the FiberWAN network, and nobody but Childs knew the logins. If this were true, then regaining control over those network components would cause some service disruption, but would hardly constitute the "millions of dollars in damages" that city representatives feared.

Apparently, I wasn’t far off the mark. In response to one of by blog posts, a source with direct knowledge of the City of San Francisco’s IT infrastructure and of Childs himself offered to tell me everything he knew about the situation, under condition that he remain anonymous. I agreed, and within an hour, a long e-mail arrived in my in box, painting a very detailed picture of the events. Based on this information, the case of Terry Childs appears to be much more – and much less – than previously reported.

A man and his network
It seems that Terry Childs is a very intelligent man. According to my source, Childs holds a Cisco Certified Internetwork Expert certification, the highest level of certification offered by Cisco. He has worked in the city’s IT department for five years, and during that time has become simply indispensable.

Although Childs was not the head architect for the city’s FiberWAN network, he is the one -- and only one -- that built the network, and was tasked with handling most of the implementation, including the acquisition, configuration, and installation of all the routers and switches that comprise the network. According to my source's e-mail, his purview extended only to the network and had nothing to do with servers, databases, or applications:

“Terry's area of responsibility was purely network. As far as I know (which admittedly is not very far), he did not work on servers, except maybe VoIP servers, AAA servers, and similar things directly related to the administration of the network. My suspicion is that you are right about how he was 'monitoring e-mail'; it was probably via a sniffer, IPS, or possibly a spam-filtering/antivirus appliance. But that's just conjecture on my part.”

Like many network administrators who work in the rarified air of enterprise network architecture and administration, Childs apparently trusted no one but himself with the details of the network, including routing configuration and login information. Again, from the source's e-mail:

“The routing configuration of the FiberWAN is extremely complex. Probably more so than it ought to be; I sometimes got the feeling that, in order to maintain more centralized control over the routing structure, [Childs] bent some of the rules of MPLS networks and caused problems for himself in terms of maintaining the routing.

“Because the system was so complex (and also because he didn't involve any of the other network engineers in his unit), Terry was the only person who fully understood the FiberWAN configuration. Therefore, to prevent inadvertent disruption of this admittedly critical network, he locked everyone else out. I know most of the networking equipment … does use centralized AAA, but I get the impression he may have configured the FiberWAN equipment for local authentication only.”

Childs' attitude toward other administrators is by no means unusual in the IT industry. This is generally due to the fact that admins who are tasked with constructing and maintaining networks of this size and scope care for them like children, and eventually come to believe that no one else could have the knowledge and skills to touch the delicate configurations that form the heart of the network.

Sole administrator
A key point made in the e-mail is that Childs' managers and coworkers all knew that he was the only person with administrative access to the network. In fact, it was apparently known and accepted in many levels of the San Francisco IT department. Again, quoting from the e-mail:

“This is where it gets tricky for the prosecution, IMO, because the localized authentication, with Terry as sole administrator, has been in place for months, if not years. His coworkers knew it (my coworkers and I were told many times by Terry's coworkers, 'If your request has anything to do with the FiberWAN, it'll have to wait for Terry. He's the only one with access to those routers'). His managers knew it.

"Other network engineers for the other departments of the City knew it. And everyone more or less accepted it.

"No one wanted the thing to come crashing down because some other network admin put a static route in there and caused a black hole; on the other hand, some of us did ask ourselves, 'What if Terry gets hit by a truck?' If a configuration is known and accepted, is that 'tampering'?”

My source appears to believe that Childs' motivation was the antithesis of tampering, and that Childs did everything possible to maintain the integrity of the network, perhaps to a fault:

“He's very controlling of his networks -- especially the FiberWAN. In an MPLS setup, you have 'provider edge' (PE) routers and 'customer edge' (CE) routers. He controlled both PE and CE, even though our department was the customer; we were only allowed to connect our routers to his CE routers, so we had to extend our routing tables into his equipment and vice versa, rather than tunneling our routing through the MPLS system.”

Dedicated engineer
Like so many other high-level network administrators, Childs seems to have taken his job extremely seriously, to the point of arrogance and, perhaps, burnout.

“Terry was very dedicated to his career as an engineer. He is a CCIE (probably the only one in the City government), and spent much of his free time studying and learning more -- the MPLS for the FiberWAN, VoIP some of the departments are rolling out, other new technologies for our 311 and E911 systems, etc. He worked very hard, evenings and weekends in addition to full-time 8-5 work, and rarely took vacations. His classification is 'professional,' so he doesn't earn overtime pay, only comp time -- which like many of us he never really had the opportunity to use. He was on standby more or less 24-7-365; whereas in the private sector, in a company of 20,000 or more employees, you'd expect to find multiple engineers rotating that standby status, I'm pretty sure he was always the guy on call.”

This attitude is, again, not uncommon among high-level IT administrators. Neither is the fact that they tend to eschew what they perceive to be unnecessary questioning and bureaucratic “nonsense.”

“Terry also, obviously, had a terrible relationship with his superiors. I should point out that he's not just a network engineer -- he was the lead network engineer for the entire City. His bosses were all managerial rather than technical, and while the other engineers did not actually report to Terry, they did defer to him in any technical matters. Even the network architect left it to Terry to actually figure out implementation. Terry felt that his direct superior was intrusive, incompetent, and obstructive, and that the managers above him had no real idea of what was going on, and were more interested in office politics than in getting anything done.

"[Childs] complained that they spent more time doing paperwork -- change requests, documentation, etc. -- than actually implementing or fixing anything (a common complaint among engineers, I know). He complained about being overworked (which he was, and which his colleagues are even more now) and that many of his colleagues were incompetent freeloaders (also not entirely without basis).

"You could see him getting red in the face whenever he started talking about his department. And once you were on Terry's bad side (which thankfully I never was), that's where you stayed, and you'd get only the most grudging assistance from him from then on. Whether any of his complaints were valid or not, I can't really say, but I don't think that's as relevant as how Terry felt.”

Keys to the kingdom
If Childs' sole proprietorship of the FiberWAN network was normal operating procedure, how did the tensions between Childs and his managers come to a head? Why was Childs arrested on Sunday? There have been reports that the city’s newly hired head of security may have pushed for Childs to open the FiberWAN doors to other admins. My source doesn’t know for sure, but offers some insight:

“I don't know much about his actions in the last few weeks. It's been a couple of months, at least, since I've even spoken to him, and even then it was probably only in reference to some specific request or ticket. But I can imagine that being the subject of disciplinary action by his supervisors for 'performance' issues would be absolutely infuriating to him. I can imagine that his response would be, 'How can you say my performance is poor when I've been doing what no one else here was willing or able enough to do?'"

If Childs was pressured to give up the keys to the network that he had built and tended for so long, would he go so far as to explicitly prevent anyone else from tinkering with his charge?

“I can imagine that [Childs'] response to a demand to open up authentication to the FiberWAN would be, 'Why? So you can screw it up and bring the City network crashing to a halt?' I can even imagine that, under so much pressure, he'd take steps (deleting or hiding config backups, for instance) to make sure he was the only one in control.”

These tales offer significant insight into what may have occurred between Childs and the FiberWAN network hostage situation. Rather than a case of a rogue administrator attempting to cause damage to the network by locking out other administrators, this may be a case of an overprotective admin who believed he was protecting the network – and by extension, the city – from other administrators whom he considered inferior, and perhaps even dangerous. One important fact seems to be in Childs' favor, if reports that the network has continued to run smoothly since his arrest are true. My source corroborates this.

“As for the impact of [Childs'] actions to the rest of the City, the mayor's statement basically has it right. The network is completely up and running. No servers that I'm aware of are affected. No one has had any downtime (yet). But until they get back into those routers, they can't make any changes. I don't know yet if Terry's lockout applies only to the FiberWAN or also to the other routers, firewalls, switches, etc. in the City network.”

Laying the blame
My source doesn’t appear to harbor any ill will toward Childs for this situation, and even believes that the city may be worse off with Childs out of the picture and that some of the blame should be shouldered by Childs' superiors.

“It's a real shame. The city is losing a good network engineer -- probably the best, technically, that they've ever had. Ultimately he has no one to blame but himself, but it's too bad his superiors weren't better about establishing and enforcing policies about authentication, backups, auditing, cross-training, and separation/rotation of duties.

"You'll note the papers have referred to the new information security manager. It's only been a month or so since the City even had an information security policy, and even that is a bare, unmodified template from CCISDA that's awaiting discussion and alteration by a committee that hasn't been formed yet. (When I asked Terry if we could get a copy of the City's network security policy some months ago, he told me, 'I've been trying to get them to approve one for years. I've written ones up and submitted them, but they don't want to do it, because they don't want to be held to it.')”

He also points out that by forcing the issue, the city may have significantly reduced its ability to use and control its own network.

“The one impact they haven't mentioned is that Terry was one of only two engineers assigned to special projects and to do major routing changes and perimeter firewall configuration. The service level, even after they regain control of the network, is going to be way down, until they can fill his mighty big shoes.”

My source had many good things to say about Childs, but did not shy from negative comments, noting that Childs has a bad temper and can be very defensive.

“As for Terry's character, I can imagine this happening. He takes great personal and professional pride in his work -- to a fault. He can be very defensive if someone suggests there's something wrong with the way his network is set up, and that's been a problem for us (as his customer) a couple of times. Terry has a bad temper.

"He's the sort of person who, while his bile is up, won't budge an inch – and then will call you a couple of hours later and acknowledge that maybe your suggestion was right, after all, or maybe here's an even better way to handle things.”

The inner sanctum
Later in the e-mail, my source offered some insight into what may be at the core of the issue: Childs was so paranoid about the security of the network that he even refused to write router and switch configs to flash, which would mean that if the device was powered off, all configurations would be lost.

“At one point he was concerned about the security of the FiberWAN routers in remote offices, so he had them set up without saving the config to flash. 'If they go down, I'll get alerted, and connect up to them and reload the config.' Great, except we have power outages all the time in this city, some of those devices aren't on UPSes, and what happens if you're on vacation? And what about the 15 to 60 minutes it might take you to connect up and reload? He eventually conceded and (ahem) decided that disabling password recovery was sufficient security.”

If Childs did this with some or all of the switches and routers comprising the FiberWAN network, then password recovery without significant network disruption becomes a bigger problem. Without firsthand knowledge of the state of those routers and switches, there’s no good way to know, unfortunately.

If the details given to me in this e-mail are accurate, it would appear that this case is not nearly what it seemed originally. Perhaps it comes with the pressure and responsibility of the job, or the belief that the network they’ve built is simply too complex for mere mortals to comprehend, but it’s not uncommon for highly skilled network administrators to become overprotective of their networks, or for networks of significant size to become an extension of the person who built them.

It certainly appears that Terry Childs believed San Francisco’s FiberWAN network was his baby, and that by refusing to allow others to access the inner sanctum was in the best interests of the city, the citizens, and perhaps most importantly, himself.
Linky
User avatar
Winston Blake
Sith Devotee
Posts: 2529
Joined: 2004-03-26 01:58am
Location: Australia

Post by Winston Blake »

Solauren wrote:That's what I've been trying to get at the entire time. Thank you for explaining the basic idea better then me.

The 'secret password' would, by some, be considered a security hole. Especially if it's on a secret user account that can't be removed.

(One programmer would still have to be aware of it, just make sure that programmer is the CEO or owner of the company).
Aware of it, yeah, but I assume the default password would be quickly changed by the authorised persons.
As for the backdoor being secure, username / password combinations of 200 characters a piece are hard to crack.

Mind you, 20 or 30 for each can be difficult enough.
You see, you didn't actually say in your previous posts that this backdoor was password protected. I got the impression it was something anybody could access, if they just knew 'where it was', so to speak.

Now, do you give up access to this backdoor to some special vetted person? Or are you one yourself? Or is it part of this supposedly common programming practice for the 'bricklayer' to keep a copy of the 'backdoor keys'?
User avatar
loomer
Sith Marauder
Posts: 4260
Joined: 2005-11-20 07:57am

Post by loomer »

Solauren, if I could, I would review every line of code you have ever written for anyone.

And if I found a single unauthorized loophole, I would report you to the correct authorities. What you are defending is unethical as it puts people, by extension of the information contained within these systems, at risk. Unless the backdoor is built only into a low importance system (A backdoor to reset some office guy's password? That's okay. A backdoor to get into, say, a social security database... Not so okay.), it should not exist. Even with the assent of the contractor, such an act remains unethical.
"Doctors keep their scalpels and other instruments handy, for emergencies. Keep your philosophy ready too—ready to understand heaven and earth. In everything you do, even the smallest thing, remember the chain that links them. Nothing earthly succeeds by ignoring heaven, nothing heavenly by ignoring the earth." M.A.A.A
User avatar
Durandal
Bile-Driven Hate Machine
Posts: 17927
Joined: 2002-07-03 06:26pm
Location: Silicon Valley, CA
Contact:

Post by Durandal »

Solauren wrote:When you password protect a Zip file, you can no longer unzip it. You can view the Zip's contents, but you can't do anything else.

There are programs out there that will copy a zip file, and in the process, deliberately remove the password from the copy.

Oh no! PKZIP has a security vulnerability!
Uh, yeah, it does. StuffIt had a similar vulnerability years and years ago. When StuffIt wrote a password-protected archive, it would store the password, in encrypted form, in the archive's resource fork. The problem was that it wouldn't actually encrypt the data. So all you had to do was open up ResEdit and delete the password resource and viola! You could decompress the archive.

StuffIt fixed this flaw.
I wouldn't be surprised if someone has made a program that will unzip the original file, and then tell you what the password is. (Note: I've never actually found one that does that)

What I'm talking about, or trying to say, is the same idea. Someone will know how to defeat any system, either through an accidental security hole, deliberate security backdoor, or because they know the system at the code level, and understand how it works, and know, or can figure out, a way to defeat it.
Then the writer designed it extremely poorly. Take it from someone who actually has written a secure system in an operating system. I sure as hell didn't leave backdoors. When designing a secure system, you should always approach it with the goal of a secure design such that open-sourcing your code wouldn't reveal flaws in the design. Hell, if I included a "Oh and by the way, just do this and this to completely bypass everything the system is designed to achieve" in my pitches of my idea, I would've been laughed out of the conference rooms.
Hell, Durandal also just pointed out how freaking easy it is for a good programmer to put in a security hole that no one may ever notice. It's so easy, and common, they hold contests for it!
It's not easy and common. Doing something like using an improper prototype of time() to smash a debug variable and write a cipher to an improperly-handled file descriptor is something that takes a lot of creativity. And it's not just a security hole that no one will notice. It's a security hole that, if someone does notice, looks like an innocent mistake.

As to the whole debate about putting in backdoors and such ... it's the client's request. If the client wants a master account, well then, give him a master account and password. It's his problem to keep it secure, not yours. You just have to design the system in such a way that casual inspection wouldn't reveal the presence of this account or the password associated with it. This isn't exactly unheard of. Both Mac OS X and Solaris, for example, have a single-user mode that you can boot the machine into that'll give you root access to the system. The caveat is that you need physical access to the machine.

If, when designing a secure system, you leave in a backdoor regardless of whether the client tells you to, then that's a serious breach of ethics.
Damien Sorresso

"Ever see what them computa bitchez do to numbas? It ain't natural. Numbas ain't supposed to be code, they supposed to quantify shit."
- The Onion
User avatar
Spyder
Sith Marauder
Posts: 4465
Joined: 2002-09-03 03:23am
Location: Wellington, New Zealand
Contact:

Post by Spyder »

Xon wrote:All it takes to own an entire Windows Domain, is to have a local admin account and trick a Domain/Forest Administrator to log into that system on which that local admin has access to.

Everything after that is simply time saving.
Can you reset a password for someone else's domain account when you're logged in as a local admin?
:D
User avatar
Beowulf
The Patrician
Posts: 10621
Joined: 2002-07-04 01:18am
Location: 32ULV

Post by Beowulf »

Technically, no, you can't change a domain account as a local admin. However, if you have local admin privileges, you can change the system files to do anything you want, at which point if a domain admin logs in, you can cause a domain admin to do anything you want.
"preemptive killing of cops might not be such a bad idea from a personal saftey[sic] standpoint..." --Keevan Colton
"There's a word for bias you can't see: Yours." -- William Saletan
User avatar
Spyder
Sith Marauder
Posts: 4465
Joined: 2002-09-03 03:23am
Location: Wellington, New Zealand
Contact:

Post by Spyder »

Beowulf wrote:Technically, no, you can't change a domain account as a local admin. However, if you have local admin privileges, you can change the system files to do anything you want, at which point if a domain admin logs in, you can cause a domain admin to do anything you want.
Is that just a danger while the domain admin is using the system or can they do something along the lines of exploiting the local profile?
:D
User avatar
Resinence
Jedi Knight
Posts: 847
Joined: 2006-05-06 08:00am
Location: Australia

Post by Resinence »

Spyder wrote: Is that just a danger while the domain admin is using the system or can they do something along the lines of exploiting the local profile?
Let's say your a local admin, and you want to be a domain admin;

Start digging through the system, chuck a bunch of registry autostart entries to start a small program or script that once executed will create a new user account with xx username and yy password, with full domain access. Since you are only a local admin, you can't create a domain admin account, obviously. But now that the system has been messed with all you have to do is wait for Mr. Admin to log onto that machine, script/prog autostarts... with his permissions. BAM! Account.
“Most people are other people. Their thoughts are someone else's opinions, their lives a mimicry, their passions a quotation.” - Oscar Wilde.
User avatar
Spyder
Sith Marauder
Posts: 4465
Joined: 2002-09-03 03:23am
Location: Wellington, New Zealand
Contact:

Post by Spyder »

Resinence wrote:
Spyder wrote: Is that just a danger while the domain admin is using the system or can they do something along the lines of exploiting the local profile?
Let's say your a local admin, and you want to be a domain admin;

Start digging through the system, chuck a bunch of registry autostart entries to start a small program or script that once executed will create a new user account with xx username and yy password, with full domain access. Since you are only a local admin, you can't create a domain admin account, obviously. But now that the system has been messed with all you have to do is wait for Mr. Admin to log onto that machine, script/prog autostarts... with his permissions. BAM! Account.
Ah, should have thought of that. *hugs runas*
:D
Post Reply