** CONFIDENTIAL ** (fwd)

Date: Sun, 15 Dec 1996 04:10:21 -0400
From: Neale Partington <neale@gpfn.sk.ca>
To: csuite development <csuite-dev@chebucto.ns.ca>

next message in archive
next message in thread
previous message in archive
Index of Subjects


fyi.  Don't know if this is fixed in the new release, or not?  I've also 
sent another message after this one with some follow-up info.

          ___
   /|  / /  / Neale Partington
  / | / /__/ President, Great Plains Free-Net Inc.,
 /  |/ /    Regina, Sk., Canada         Neale@gpfn.sk.ca
 GPFN OFFICE (voice):  306-569-8554   MODEM POOL: 306-569-8555
 Members get access to express lines as well.

---------- Forwarded message ----------
Date: Fri, 13 Dec 1996 01:34:49 -0600 (CST)
From: Michael Lee <mlee@GPFN1.GPFN.SK.CA>
To: Daryle Niedermayer <daryle@gpfn.sk.ca>,
    Neale Partington <neale@gpfn.sk.ca>, Robert Greenfield <rhg@gpfn.sk.ca>
Subject: ** CONFIDENTIAL **


The following is a collection of the conversation regarding Gale (aa075) 
and "shell" accounts.  I did not mail this to the execs list because that 
list is publically viewable and the information I am about to tell should 
not be viewable by the public.  You should forward this information to 
the appropriate groups/execs/system people, I didn't because I didn't know 
who should be getting this information except the people who have the 
root access (you guys). :-)


On Fri, 6 Dec 1996, Robert Greenfield wrote:

> On Fri, 6 Dec 1996, Gord Fisch wrote:
> 
> > Gale got me with a 'talk' on the system the other night. She was saying a
> > while ago "wouldn't it be nice to have a shell account" and now she does.
> > 
> > I guess I'm wondering who all has shell accounts, who sets them up and if
> > it really matters to me (who should it matter to?).  Just wondering  8)
>
> First there were shell accounts.... This is before csuite. Shell accounts
> need much more learning to use. They also give the user much more freedom
> of activity than a csuite account grants. I'd be unhappy to see folks
> receiving shell accounts who are not fully trusted and who are not
> otherwise involved in taking care of the gpfn computer, Bob

---

On Fri, 6 Dec 1996, Daryle Niedermayer wrote:

> My next question is:
>
> Who gave Gale a shell acount?

---

On Sat, 7 Dec 1996, Daryle Niedermayer wrote:

> I fingered Gale earlier today and confirmed that he only has a csuite 
> account. Either he has a different account on a different system which is 
> a shell account, or he has found a way to crack out of the lynx 
> pseudo-OS, or he just thinks he has a shell account, I don't know.

---

On 12 Dec 1996, Daryle Niedermayer wrote:

> I just killed off a running vi session by Michael Lee with the following 
> ps entry:
> 8 R  1109 15356 15355 80  79 20 fc542cc0    265          pts/15  412:35 vi

-----------------------

To put it in a nutshell, I'VE PASSED THE SECURITY FEATURES OF "OUR" 
CSUITE/LYNX SETUP AND ENTERED THE SHELL!!!

Please note however, that I have little and I mean very little unix 
experience (about 2 UofR CS classes) and if I can do it, imagine someone 
with a bit more experience can do.

I did this in about 2 stages (which I will document), however some spots 
can be bypassed.  Like I said I don't have much unix experience and now 
that I rethink the situation I know some steps are not necessary in order 
to go into the shell.

Stage 1:
I have the "w" command in my opening .login file, and upon login many 
times I've seen Gale (sorry to pick on Gale, but this did sort of revolve 
around him) "what" as something like 

User     tty           login@  idle   JCPU   PCPU  what
aa075    pts/0        12:02am           11      2  lynxexec:/var/csuite/bin/../../../bi

(the above was an example)
"what" cuts it off after x number of characters so I couldn't tell 
exactly what he was doing.  Upon doing my own investigation and using my 
csuite member account (the  aa ones) I tried doing a "j"ump using 
lynxexec command.  Sure, it didn't let me, but then I tried something 
that I learned from the Saskatoon free-net.  In the beginning SFN told 
people that they won't let you randomly telnet to a location by using the 
jump command, but if you put a telnet link in a page they would let you.  
Well, I used what I remembered and tried putting a lynexec command as a 
link in my bookmarks page and voila it worked.  

First, I copied the same link as presented to me on the footer of the 
screen for the mail link (I have advanced setup in user settings).  So I 
put lynexec:/var/csuite/bin/mail as a link and it worked, so I tried 
others things outside the bin directory by using simple unix parent 
directory calls like lynexec:/var/csuite/bin/../../../bin/"unix command" 
because Gale had part of that in the what field (sure it part was cut off 
but I filled in the blank).  Well, most of the commands worked including 
talk, who, w, vi, etc..  Some had to be made fresh everytime like the talk 
command because you had to specify who you wanted to talk to, but it worked.
(The vi editor worked as noted above with the runaway process, since vi 
(I don't think) is available to csuite users since pico is the text editor).

Yes, I know this isn't the shell, but almost all executable files can be 
used if the correct path was used.

Next, I tried to execute one of the "sh"ells, which brings me to stage two.


Stage 2:
I tried executing one of the shells like csh, ksh, etc. earlier in the day, 
but they didn't work well.  I had a [x]% prompt (where x is a number) but 
whenever I type a command it didn't work.  I returned later in the day 
after remembering about the hidden dot files.  Apparently, you can't edit 
dot files in pico (in csuite), but vi (using the lynxexec method) will.  
So, I copied my unix shell .login and .cshrc files over and tried it that 
way and launched csh again.  It didn't work and still had the [x]% prompt.
I then remembered the set command and I noticed that the path was to the 
/var/csuite/bin directory so that only what executable files in that 
directory was allowed to launch.  So, switching back to my unix mlee shell 
account, I checked my set variables and used the same paths as in my shell 
account to the newly discovered csuite/unix account and now I had all the 
commands of a normal shell user.  I tweaked some lines in my .cshrc file 
and now everytime I launch csh from my csuite bookmark file, I get the 
gpfn1[x]% prompt and am a shell user.

Of course I went the hard way, I realize that I didn't need the .login 
and .cshrc files.  All I had to do after lauching csh was to set proper 
paths and the commands would work and THEN make dot files.

Solutions:
1) The most important would be to disallow lynxexec commands outside the 
csuite directories.  If this can be done, everything sould be okay 
because you won't have to worry about dot files (because the current pico 
already is set up so you can't create them) and nothing outside the 
csuite can be executed (the csh).

Other solutions???

That is about it, it is 1:30am now - a bit past my bedtime.

Later.

PS.  I hope you guys don't think I'm a security threat, afterall I've had 
my unix shell account for 1.5+ years and I don't think I've caused any 
trouble :-)   And, no, I'm not a hacker - actually this would be the 
first thing I've actually tried and "cracked".  I am just trying to plug 
any holes in this system, and to see it run smoothly... since I am a paid 
voting member of the "society" and want it to continue to serve the 
community. 


---
Michael Lee - mlee@gpfn.sk.ca
[1] Information Provider (BBS List)... since Aug. '95
http://www.gpfn.sk.ca/inet/bbslist/index.html
[2] Public Download Area (PDA) - Macintosh Admini