All of lore.kernel.org
 help / color / mirror / Atom feed
From: Dean Anderson <dean@av8.com>
To: Russell Coker <russell@coker.com.au>
Cc: "Carsten P. Gehrke" <Carsten@rollinghorse.com>, <selinux@tycho.nsa.gov>
Subject: Re: Linuxfromscratch.org
Date: Wed, 23 Jul 2003 17:24:08 -0400 (EDT)	[thread overview]
Message-ID: <Pine.LNX.4.44.0307231702310.22745-100000@vista.av8.net> (raw)
In-Reply-To: <200307231144.38947.russell@coker.com.au>

Technically, we can only say we don't know that it is in the GCC builds.
But we also get compilers and operating systems from many places.

The Kernigan hack predated GCC, and the GNU project, which was only
started after Stallmen reverse engineered the password encryption
algorithm, and was barred from ATT source code. It also predates my active
involvement, so I can't say if it actually happened or if it was just
documented as possible. The way it has been passed to me is that it
actually happened, and was distributed--though this was
pre-commercialization/pre SysV.

The only way to check for it would be to decompile code with a tool that
wasn't altered to remove the evidence--note that it is hard to be too
paranoid when you really start to think about the possibilities. It is
tremendously hard to have truly trustworthy tools.

Shared libraries and loadable modules make this even harder today, since
the trusted executable may load untrusted shared libraries, or system
calls may be altered (as some root kits actually do).

I do recall in the OSF/1 B1 secure effort (though memory fades) that if
one had kernel loader privilege, one could subvert all other privileges
and thereby defeat the B1 requirement of separate roles/privileges.  I
recall that it was thought that no system with loadable kernel modules
could ever be B1 secure, unless it was based on a trusted microkernel,
which only loaded additional personality modules which would be unable to
alter certain security functions. (Unix being a personality module).  The
OSF also had a research effort in micro kernels, based on Mach, and had a
working OSF/1 personality for it, but the personality was never shipped.

		--Dean

P.S. It still seems that Russell Coker has some overzealous antispam
measures, which violate the email ethics standards promoted by the EFF.
http://www.eff.org/Spam_cybersquatting_abuse/Spam/position_on_junk_email.html

On Wed, 23 Jul 2003, Russell Coker wrote:

> On Wed, 23 Jul 2003 11:09, Carsten P. Gehrke wrote:
> > Is this true of the GNU C compiler suite as well?  And if so, would it not
> > be possible to remove it from the compiler?  How does it work?  Does it
> > look at the code, or is anything called login.c susceptible?  Why has this
> > not been removed in the open-source code?  How can I check to see if this
> > backdoor exists?
>
> This is not in the current GCC builds, if it ever was.
>
> There are a variety of stories concerning this, some say that it was just
> commented code to illustrate a point, some say that it was in there with full
> nasty capabilities but was removed years ago (>10 years).
>
> There is no need to worry about this particular exploit right now, but there
> are issues with the potential for creating others of the same type.
>
> --
> http://www.coker.com.au/selinux/   My NSA Security Enhanced Linux packages
> http://www.coker.com.au/bonnie++/  Bonnie++ hard drive benchmark
> http://www.coker.com.au/postal/    Postal SMTP/POP benchmark
> http://www.coker.com.au/~russell/  My home page
>
>
> --
> This message was distributed to subscribers of the selinux mailing list.
> If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
> the words "unsubscribe selinux" without quotes as the message.
>


--
This message was distributed to subscribers of the selinux mailing list.
If you no longer wish to subscribe, send mail to majordomo@tycho.nsa.gov with
the words "unsubscribe selinux" without quotes as the message.

  parent reply	other threads:[~2003-07-24 12:15 UTC|newest]

Thread overview: 24+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2003-07-22  1:42 Linuxfromscratch.org Charlie Watts
2003-07-22 20:06 ` Linuxfromscratch.org Russell Coker
2003-07-22 20:49   ` Linuxfromscratch.org Dean Anderson
2003-07-23 15:09     ` Linuxfromscratch.org Carsten P. Gehrke
2003-07-23 15:44       ` Linuxfromscratch.org Russell Coker
2003-07-23 20:01         ` Linuxfromscratch.org Dale Amon
2003-07-23 21:24         ` Dean Anderson [this message]
2003-07-23 19:34       ` Linuxfromscratch.org karlm
2003-07-23 22:08         ` Linuxfromscratch.org Dean Anderson
2003-07-24 14:06           ` Linuxfromscratch.org Dale Amon
2003-07-24 14:16           ` Linuxfromscratch.org Dale Amon
2003-07-24 14:18             ` Linuxfromscratch.org Dale Amon
2003-07-24 17:40         ` Linuxfromscratch.org Colin Walters
2003-07-24 18:52           ` Linuxfromscratch.org Dean Anderson
2003-07-27 15:28             ` Linuxfromscratch.org Tom
2003-07-27 20:13               ` Linuxfromscratch.org Colin Walters
2003-07-28 17:17                 ` Linuxfromscratch.org Tom
2003-07-24 19:42           ` Linuxfromscratch.org Russell Coker
2003-07-27 15:19         ` Linuxfromscratch.org Tom
2003-07-23 20:26       ` Linuxfromscratch.org Lukasz Luzar
2003-07-24  0:29         ` Linuxfromscratch.org Dale Amon
2003-07-24  6:39           ` Linuxfromscratch.org Brian May
2003-07-24 12:32             ` Linuxfromscratch.org Dale Amon
2003-07-23  1:17   ` Linuxfromscratch.org Carsten P. Gehrke

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=Pine.LNX.4.44.0307231702310.22745-100000@vista.av8.net \
    --to=dean@av8.com \
    --cc=Carsten@rollinghorse.com \
    --cc=russell@coker.com.au \
    --cc=selinux@tycho.nsa.gov \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.