|
Sniffing in the Sun: History of a Disasterby Sarah Gordon and I. Nedelchev [email protected] February 1994 The Warning On February 3rd, 1994, Computer Emergency Response Team issued the following warning. What followed was a flurry of activity by the media, system administrators and users. CERT came out with a software "patch" to detect the sniffer which had brought about this panic. Rumours and accusations flew: How accurate was the warning? What's going on? Is the Internet under attack? Users are still suffering the consequences of the sniffer attack, now, some 6 months after the announcement by CERT. This article profiles the people, players and code involved. For most people, the story begins here, with this: the "official warning": February 3, 1994 Ongoing Network Monitoring Attacks ----------------------------------------------------------------- In the past week, CERT has observed a dramatic increase in reports of intruders monitoring network traffic. Systems of some service providers have been compromised, and all systems that offer remote access through rlogin, telnet, and FTP are at risk. Intruders have already captured access information for tens of thousands of systems across the Internet. The current attacks involve a network monitoring tool that uses the promiscuous mode of a specific network interface, /dev/nit, to capture host and user authentication information on all newly opened FTP, telnet, and rlogin sessions. In the short-term, CERT recommends that all users on sites that offer remote access change passwords on any network-accessed account. In addition, all sites having systems that support the /dev/nit interface should disable this feature if it is not used and attempt to prevent unauthorized access if the feature is necessary. A procedure for accomplishing this is described in Section III.B.2 below. Systems known to support the interface are SunOS 4.x (Sun3 and Sun4 architectures) and Solbourne systems; there may be others. Sun Solaris systems do not support the /dev/nit interface. If you have a system other than Sun or Solbourne, contact your vendor to find if this interface is supported. While the current attack is specific to /dev/nit, the short-term workaround does not constitute a solution. The best long-term solution currently available for this attack is to reduce or eliminate the transmission of reusable passwords in clear-text over the network.Sexy Sites Invite Compromise But the story really doesn't begin with the "OFFICIAL WARNING". Sexy sites. Hackers love sexy sites. Well known users, famous/interesting people. Security experts. Ambience. This makes for the sexy site. Hacker bait. Systems like The Well and Panix are "sexy sites", full of desireable users, with desireable information. According to an unidentified participant in the Panix hack, there were "many user and security experts such as Shabbir Shafdar, Phiber Optik, etc. The size of the system and users from Sun, Inc., EFF, HP, and SGI contributed to its magnetism." Spiders, crackers, system hackers--pick your term. Some of the individuals who made use of the sunsniffer -are- malicious. Case in point, a group using the name of "Posse". Security experts say some members of this group are based in Philadelphia and Phoenix. Those in the know say this group is well known in the hacker community as malicious manipulators who take down systems for the thrill of watching them crumble. According to information published in the Wall Street Journal, this group is under investigation for their alleged break-ins and compromise of multiple systems. Yet, our sources for the information we're bringing you today show no tinge of malice or ill-intent. In fact, they have attempted to bring these flaws to the attention of security "professionals". for a long time, well before CERT made this announcement. The reaction on the part of many security experts has been less than appreciative. Whatever the reasons for this, the ones paying the largest price are the users. Users who have lost their privacy, been compromised, and in many cases are still not even aware of it! Who is "The Posse"? Chris Goggans, former hacker turned security consultant, had this to say about the break-ins: (quote used with permission, from the firewalls mailing list) "The biggest perpetrators of the recent break ins (recent meaning the last year or so) have been a group of miscreants who are oftimes referred to as "The Posse. ". How did this happen? According to an article published in Secure Computing, "Hackers are all different. Some are very methodical, working their way down a checklist. Some never get beyond looking for suid programs lying around. Some only use one hole, relying on it to the exclusion of everything else." How did the sunsniffer get into the Panix machine, where it could begin its task of finding your passwords, and other information?
"When I got in, I noticed that most and trivial security holes were plugged they fixed rdist, all the known vulnerabilities in kernel, expreserve, loadmodule, LD_* environment variables, however I paid attention to some suid script in /usr/local/something dir, SUID scripts owned by root is a biggest hole I have ever seen. I have been laughing for some time then all I did was ln -s /usr/local/something/script ./-i and then I executed ./-i, and it forked /bin/sh -i (bourne shell in an interactive mode) as root. so was I...Everything is OK Now!! -- NOT! How widespread is the problem? CERT announced a "dramatic increase" in monitoring. Increase? How much is tolerable? If one system is known to be monitored, is that acceptable? How many does it take before it becomes worthy of issuing a patch or warning? Commercial service providers are seen by their users as secure places to transact business. The information superhighway is being built on the premise that the ground under these roads is stable. If it isn't, shouldn't those travelling the roads, negotiating the turns and using the bridges be informed they are subject to collapse at any time? Not only are thousands of 'users' analogous to people driving without a license being turned loose on the information tollroad, other users are expecting the roads to be 'policed' and 'safe'. We know they are not. CERT knows they are not. Why now? Why release this information now and not a year ago when it was abundantly clear to anyone with any insight into the hacking scene that this was going on? If the Panix public system had not publicly announced their compromise, would it have taken yet longer for this to be brought to the attention of the people? You've seen above how simple the break-in was to accomplish. Some folks think Panix was wrong for going public. Sweep it under the rug, they say..with the rest of the dirt... In the matter of this particular "wide spread" compromise, however, there is an interesting twist. CERT issued a detector for the sniffer; however, there is already a modified version of the sniffer which can easily evade this detection. And, the hackers have come up with a detector for their modified version of the sniffer. It's part of what seems to be an ongoing contest. Holes are found, patched, and new ones are found. Who's to blame? Some would say CERT is to blame, for being slow in announcing the fixes. But, is this fair? CERT is only made up of people, and they certainly aren't magicians. They can't know every hole in ever OS, and its not their fault the holes are there, or that they are discovered. Some would say system designers. But, can we expect them to know every possible way their design may be exploited? If they waited til every possibility in the world was known, they would never release a single system. Hackers? They find the holes. Some say they are irresponsible for even looking for them. Users? They don't insist the systems they use are up to date patching holes; for the most part, they don't even know the holes exist! We don't know who to blame, but we do know a little about the sunsniffer. The Meat What is this sniffer that is getting all of the recent attention? sunsniffer.c: the idea: The device /dev/nit is the network interface tap. It can be configured to read/write from/to different interfaces. The program sunsniffer.c configures it to read from some ethernet interface like le0, le1, etc. Roughly speaking this utility opens /dev/nit in READ_ONLY mode and reads each incoming packet from the chosen ethernet interface. Several headers (layers) have to be stripped on different levels as well, as not all packets may be of interest to the sniffer owner. He's only looking for logins via ftp, telnet, or rlogin. To find them, the sniffer opens /dev/nit for reading. An infinite loop is set up to read incoming packets and strip the headers from them. The 'meat' of the data is written to a log file. Basically /dev/nit is a device where from one can read *ALL* travelling packets on the specified interface (in this case some ethernet interface). These packets hold things like your login name. Your password. Your confidential information. One can read ALL travelling packets on the local ethernet medium (cable) only if the device is put into promiscuous mode, at least in this version of the program. A modified version of the sniffer, which allows reading of packets only destined to the local machine (the machine the sniffer is running on), does not require promiscuous mode. And, if someone uses this modified version (which is easily enough configurable for any beginner ueberhacker), they can evade detection by the CERT fix. In fact, a fix for this modification has been written by Beavis and Butthead, and circulated via the computer underground. Uhh huh..huh.... Setting the interface into promiscuous mode is the most malicious act of the sunsniffer, because in such a mode one can extract the confidential info from packets not even related to the machine he is on - *all* packets travelling on the local ethernet cable. What if there is a backbone router on the same cable? The ueberhacker would be able to retrieve information for some totally remote sites, which use a machine connected to the same ethernet cable only for routing purposes. Sniffing is not a new technique. It's been around for ages. There are sniffers which log all of the keystrokes on DOS based machines. There are Mac based sniffers. There is even rumour of sniffer programs for the Amiga. However, unlike with most other sniffing programs, physical access to the machine is not required. The tool used to accomplish this 'sniffing' is not new. Its been around for at least a year, maybe longer. CERT's "fix" failed to mention that sniffing is not limited to UNIX machines. CERT's initial announcement failed to mention that the removal of /dev/nit will not remove the threat of sniffers. In fact, removal of /dev/nit may well cause other problems, but in the land where passwords are unencrypted and holes are unpatched though solutions DO exist, what are a few 'problems'. It gets much better. The sunsniffer.c program was found on several public FTP sites. Since the time we found them, they have been removed. The question is, how many other people found them before they were removed? An Ongoing Problem Why go to all this trouble? Here is what one of the WELL hackers had to say about it:
" After a while, one system begins to seem like another. There just seems to be no point sometimes. But then you pick up a magazine and see about a groovy new software package that is coming out, or a new online service with influential people on, and you start getting the urge. Hacking has been so romanticized by the media that you can't HELP but get excited sometimes.Speaking of the prying government, there have been speculations that the announcement of sniffing incidents is connected with problems related to the infamous Clipper chip. Is the release of this advisory part of a conspiracy to gain public support for Clipper? There are several ways to look at this. We don't think any of them apply. Surely the public would not be so gullible as to think the Clipper chip was the solution to this problem. The sniffing problem is not limited to the United States of America. Case in point: Germany's ZDF television informed the public on Feb. 5th, that hackers had invaded a network which was in place to protect US Armed forces even in the case of a nuclear war. Users scurried to change their passwords, as news of this hack spread to radio and television, and some newspapers. Was this information accurate? According to some sources, this information came from two agencies, German press agency, and Agence France Press. The following text, taken from a Usenet comp.risks newsgroup (and translated by the poster, if we understand correctly), gives the rundown:
"Washington, February 5 (AFP) - Computer pirates have cracked the largest computer network in the world. Totally 20 million users on 'Internet' should receive new passwords, told the emergency committee installed by US ministry of defence. Internet is used by universities, government agencies, enterprises and private persons. The network was established in times of the Cold War to serve US Armed Forces also in case of Atomic War as 'invulnerable' information network. The hackers, so far unidenti- fied, succeeded according to the emergency committee to read data from ten thousands of systems on 'Internet'. They succeeded by using a program named 'Trojan Horse' which allows legal access to Internet central com- puter but then does not go any further. "Trojan horse? Perhaps they refer to the patched login program that has been in existence, and widely and well used for years. Pirates? What does software theft or 'appropriation' have to do with this? Was internet established to serve US Armed forces in the event of Atomic war? Are the hackers unidentified? There have been some reports indicating it is not known if the hackers left 'trojans or viruses' loose on the machines. This sort of hysteria can lead to nothing good. We've seen the effects of mass hysteria during the Michelangelo "crisis". True, there was a problem. No one can deny viruses are a problem. All one has to do is a bit of investigation into the socio-economic costs of viruses to see just how much a problem they really are. But, just as happened when the doomsayers heralded Michelangelo as a coming apocalypse, we are seeing the ripples of desensitization regarding the sunsniffer incident: "Ignore the warnings, it's just more media hype. " But is it? There remain a lot of unanswered questions. Who's in control here? We can answer that question with this one: " Who Will Save Us from Ourselves? " You control the horizontal...you control the vertical.....we now return control of the Internet to you. Take it or be taken. CERT CONTACT INFORMATION: CERT advisories may be obtained using anonymous file-transfer protocol (FTP) to reach cert.org. The advisories are in the /pub/cert_advisories directory. If you prefer to use the postal service, you can contact CERT at: CERT Coordination Center, Software Engineering Institute, Carnegie Mellon University, Pittsburgh 15213-3890. CERT's electronic-mail address is [email protected]. UPDATE-- Postscript: Even as this article was about to be published, word (and evidence) reached us of continued attacks on 'trusted' Internet hosts. The administrators of rahul.net, a San Jose CA-based Internet service provider, posted a message to several security-related Usenet newsgroups stating
"On July 6, at slightly after 2 am local time (PDT, 7 hours west of UTC), an intruder installed a TCP/IP-sniffing daemon on one of the machines at a2i communications (domain rahul.net). The sniffer was discovered and disabled on the evening of the same day, about 18 hours later. During this time, the daemon collected data including passwords."They then went on to give a detailed description of the intruder's tracks on the system (the usual set-uid backdoors and port-hopping gateways), and ended with a list of sites found in the log. The list contained 268 sites, including hosts belonging to MIT, the US Navy and Air Force, Sun Microsystems, IBM, NASA, CERFNet, and universities in Canada, Israel, the Netherlands, Taiwan and Belgium. All this and more from one sniffer, running 18 hours. Of course, not all sniffer incidents are so public. Through the usual channels (pgp'd file sent from an anon remailer), we were given yet another look at the results of our friend the sniffer. What we received was a file that appeared to be the logfile generated by the now-infamous sniffer. The machine belongs to a respected university, and has among its users a well-known security expert/author with close ties to CERT (the administrators of the machine have been contacted to inform them of the breach). What follows is a piece of that log. (Note: names have been crossed out or changed to prevent embarrassment & lawsuits.) Using logical device ie0 [/dev/nit] Output to stdout. Log started at => Fri May 13 20:15:20 [pid 24591] -- TCP/IP LOG -- TM: Fri May 13 20:18:59 -- PATH: xxxx1.yyy.zzzzzz.edu(966) => aaan.yyy.zzzzzz.edu(rlogin) STAT: Fri May 13 20:21:17, 192 pkts, 128 bytes [DATA LIMIT] DATA: :bogus: : mike : adm5/9600 : 8o4enYzO : f mike@fred : : chf(127)(127)(127)(127)(127)rlogin mark : f mark(127)(127)(127)(127)(127)qo(127)(127)(127)quota : (127)passwd : 8o4enYzO : 8o4enYzO : 8o4enYzO : rlog --This is just a snippet, the actual log is much longer. It details the actions of every user on the machine, and those machines nearby. As the preceeding piece shows, changing passwords is not enough, if the intruder can log you even as you type the new entry. What do we do, who do we turn to, when even the watchmen are being watched? It could be that it's time to start thinking about new approaches to problems which have been around a long time, and which are not going to go away.
About the Authors
Sarah Gordon's work in various areas of IT Security can be found profiled in
various publications including the New York Times, Computer Security Journal
and Virus Bulletin. She is a frequent speaker at such diverse conferences
as those sponsored by NSA/NIST/NCSC and DEFCON. Recently appointed to the
Wildlist Board of Directors, she is actively involved in the development
of anti-virus software test criteria and methods. She may be reached as
[email protected]
|