* [gentoo-user] CoreOS vulnerability inherited from Gentoo? @ 2016-05-31 16:30 James 2016-05-31 17:44 ` Mick 0 siblings, 1 reply; 10+ messages in thread From: James @ 2016-05-31 16:30 UTC (permalink / raw To: gentoo-user Here is an interesting read:: Security brief: CoreOS Linux Alpha remote SSH issue May 19, 2016 · By Matthew Garrett <snippets> Gentoo defaults to ending the PAM configuration with an optional pam_permit. This meant that failing both pam_unix and pam_sss on CoreOS systems would surprisingly result in authentication succeeding, and access being granted. The operator user was not used by CoreOS, but existed because it exists in the Gentoo Portage system from which CoreOS is derived. <end/snippets> Full read [1]. It kinda shows that CoreOS is derived from Gentoo and not ChromeOS; at least when time to blame a security lapse elsewhere.... enjoy, James [1] https://coreos.com/blog/ ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [gentoo-user] CoreOS vulnerability inherited from Gentoo? 2016-05-31 16:30 [gentoo-user] CoreOS vulnerability inherited from Gentoo? James @ 2016-05-31 17:44 ` Mick 2016-05-31 17:59 ` Michael Cook ` (2 more replies) 0 siblings, 3 replies; 10+ messages in thread From: Mick @ 2016-05-31 17:44 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 912 bytes --] On Tuesday 31 May 2016 16:30:27 James wrote: > Here is an interesting read:: > > Security brief: CoreOS Linux Alpha remote SSH issue > May 19, 2016 · By Matthew Garrett > > <snippets> > > Gentoo defaults to ending the PAM configuration with an optional pam_permit. > > This meant that failing both pam_unix and pam_sss on CoreOS systems would > surprisingly result in authentication succeeding, and access being granted. > > The operator user was not used by CoreOS, but existed because it exists in > the Gentoo Portage system from which CoreOS is derived. > <end/snippets> > > Full read [1]. It kinda shows that CoreOS is derived from Gentoo > and not ChromeOS; at least when time to blame a security lapse elsewhere.... > > > enjoy, > James > > [1] https://coreos.com/blog/ Does this mean we need to do anything to improve the security of our systems? -- Regards, Mick [-- Attachment #2: This is a digitally signed message part. --] [-- Type: application/pgp-signature, Size: 473 bytes --] ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [gentoo-user] CoreOS vulnerability inherited from Gentoo? 2016-05-31 17:44 ` Mick @ 2016-05-31 17:59 ` Michael Cook 2016-05-31 18:44 ` [gentoo-user] " James 2016-05-31 18:07 ` [gentoo-user] " Max R.D. Parmer 2016-06-01 7:11 ` Neil Bothwick 2 siblings, 1 reply; 10+ messages in thread From: Michael Cook @ 2016-05-31 17:59 UTC (permalink / raw To: gentoo-user On 05/31/2016 01:44 PM, Mick wrote: > On Tuesday 31 May 2016 16:30:27 James wrote: >> Here is an interesting read:: >> >> Security brief: CoreOS Linux Alpha remote SSH issue >> May 19, 2016 · By Matthew Garrett >> >> <snippets> >> >> Gentoo defaults to ending the PAM configuration with an optional pam_permit. >> >> This meant that failing both pam_unix and pam_sss on CoreOS systems would >> surprisingly result in authentication succeeding, and access being granted. >> >> The operator user was not used by CoreOS, but existed because it exists in >> the Gentoo Portage system from which CoreOS is derived. >> <end/snippets> >> >> Full read [1]. It kinda shows that CoreOS is derived from Gentoo >> and not ChromeOS; at least when time to blame a security lapse elsewhere.... >> >> >> enjoy, >> James >> >> [1] https://coreos.com/blog/ > > Does this mean we need to do anything to improve the security of our systems? > I tried logging in as operator with any password, it did not work for me. Unsure if that's because of my SSH set up or not though. The blog post does however mention reverting their SSSD change did fix the issue, so I assume if you set up SSSD the same way they did you would have issues. With that being said, maybe it would be a good idea for the gentoo pam team to set up pambase to support SSSD and not cause issues. (Currently if you want to set up SSSD you are left to do it manually) ^ permalink raw reply [flat|nested] 10+ messages in thread
* [gentoo-user] Re: CoreOS vulnerability inherited from Gentoo? 2016-05-31 17:59 ` Michael Cook @ 2016-05-31 18:44 ` James 0 siblings, 0 replies; 10+ messages in thread From: James @ 2016-05-31 18:44 UTC (permalink / raw To: gentoo-user Michael Cook <mcook <at> mackal.net> writes: > >> [1] https://coreos.com/blog/ > > Does this mean we need to do anything to improve the security of our systems? It's going to depend, but surely a wide audience needs to poke at this... > I tried logging in as operator with any password, it did not work for > me. Unsure if that's because of my SSH set up or not though. The blog > post does however mention reverting their SSSD change did fix the issue, > so I assume if you set up SSSD the same way they did you would have > issues. With that being said, maybe it would be a good idea for the > gentoo pam team to set up pambase to support SSSD and not cause issues. > (Currently if you want to set up SSSD you are left to do it manually) I simple went looking for a pam<*>.conf file to make a simple edit and then test. It took me on a journey, so I posted here, figuring one of the others had already ferreted out the details.... Oddly, I was looking at DPI (deep packet inspection) tools readily available for gentoo, to test some protocols, including ssh*. I found nDPI and libndpi in overlays and suricata, which purports to be able to perform deep packet inspections and is Netfilter compatible. Since dpi can be a big drain on resources (of a single host), I was hoping somebody had already migrated a dpi family of codes to a gentoo cluster of some sort. Naddah. Ziltchen. Verboten! Since much of routing and network engines have move to clusters (sdn, nvf, etc) dpi is king of the hill for hot analytics..... Those folks deeply into penetration (professional assessment types) means are the best source for understanding dpi semantics. Every thing I have found where folks are migrating dpi to clusters, these companies, projects and experts are being snapped up by large corps, agencies and otherwise going 'off grid'. I'm not too sure what to make of all of this, but the pam issue is only the tip of the berg.....ymmv. hth, James ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [gentoo-user] CoreOS vulnerability inherited from Gentoo? 2016-05-31 17:44 ` Mick 2016-05-31 17:59 ` Michael Cook @ 2016-05-31 18:07 ` Max R.D. Parmer 2016-05-31 21:02 ` Max R.D. Parmer 2016-06-01 7:11 ` Neil Bothwick 2 siblings, 1 reply; 10+ messages in thread From: Max R.D. Parmer @ 2016-05-31 18:07 UTC (permalink / raw To: gentoo-user On Tue, May 31, 2016, at 10:44, Mick wrote: > On Tuesday 31 May 2016 16:30:27 James wrote: > > Here is an interesting read:: > > > > Security brief: CoreOS Linux Alpha remote SSH issue > > May 19, 2016 · By Matthew Garrett > > > > <snippets> > > > > Gentoo defaults to ending the PAM configuration with an optional pam_permit. > > > > This meant that failing both pam_unix and pam_sss on CoreOS systems would > > surprisingly result in authentication succeeding, and access being granted. > > > > The operator user was not used by CoreOS, but existed because it exists in > > the Gentoo Portage system from which CoreOS is derived. > > <end/snippets> > > > > Full read [1]. It kinda shows that CoreOS is derived from Gentoo > > and not ChromeOS; at least when time to blame a security lapse elsewhere.... > > > > > > enjoy, > > James > > > > [1] https://coreos.com/blog/ > > Does this mean we need to do anything to improve the security of our > systems? The interaction seems to be problematic when SSSD is introduced to the mix, as the SSSD documentation seems to assume a fallthrough to pam_permit.so. With a merely empty user password, I cannot trigger this issue. I will have to try with an expired account and a locked account later. the pam_permit.so line was introduced here: https://gitweb.gentoo.org/proj/pambase.git/commit/?id=ac9023eecfe3c13d212c548bb9d5d1b42a4e044b At the very least, it does seem like it ought to be pam_deny.so instead. I wonder if this issue is still even relevant for Kerberos users? https://bugs.gentoo.org/show_bug.cgi?id=333393 ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [gentoo-user] CoreOS vulnerability inherited from Gentoo? 2016-05-31 18:07 ` [gentoo-user] " Max R.D. Parmer @ 2016-05-31 21:02 ` Max R.D. Parmer 0 siblings, 0 replies; 10+ messages in thread From: Max R.D. Parmer @ 2016-05-31 21:02 UTC (permalink / raw To: gentoo-user On Tue, May 31, 2016, at 11:07, Max R.D. Parmer wrote: > On Tue, May 31, 2016, at 10:44, Mick wrote: > > On Tuesday 31 May 2016 16:30:27 James wrote: > > > Here is an interesting read:: > > > > > > Security brief: CoreOS Linux Alpha remote SSH issue > > > May 19, 2016 · By Matthew Garrett > > > > > > <snippets> > > > > > > Gentoo defaults to ending the PAM configuration with an optional pam_permit. > > > > > > This meant that failing both pam_unix and pam_sss on CoreOS systems would > > > surprisingly result in authentication succeeding, and access being granted. > > > > > > The operator user was not used by CoreOS, but existed because it exists in > > > the Gentoo Portage system from which CoreOS is derived. > > > <end/snippets> > > > > > > Full read [1]. It kinda shows that CoreOS is derived from Gentoo > > > and not ChromeOS; at least when time to blame a security lapse elsewhere.... > > > > > > > > > enjoy, > > > James > > > > > > [1] https://coreos.com/blog/ > > > > Does this mean we need to do anything to improve the security of our > > systems? > > The interaction seems to be problematic when SSSD is introduced to the > mix, as the SSSD documentation seems to assume a fallthrough to > pam_permit.so. With a merely empty user password, I cannot trigger this > issue. I will have to try with an expired account and a locked account > later. > > the pam_permit.so line was introduced here: > https://gitweb.gentoo.org/proj/pambase.git/commit/?id=ac9023eecfe3c13d212c548bb9d5d1b42a4e044b > > At the very least, it does seem like it ought to be pam_deny.so instead. > > I wonder if this issue is still even relevant for Kerberos users? > https://bugs.gentoo.org/show_bug.cgi?id=333393 > Yeah -- doesn't work with a locked or expired account either. ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [gentoo-user] CoreOS vulnerability inherited from Gentoo? 2016-05-31 17:44 ` Mick 2016-05-31 17:59 ` Michael Cook 2016-05-31 18:07 ` [gentoo-user] " Max R.D. Parmer @ 2016-06-01 7:11 ` Neil Bothwick 2016-06-02 13:44 ` [gentoo-user] " James 2 siblings, 1 reply; 10+ messages in thread From: Neil Bothwick @ 2016-06-01 7:11 UTC (permalink / raw To: gentoo-user [-- Attachment #1: Type: text/plain, Size: 940 bytes --] On Tue, 31 May 2016 18:44:10 +0100, Mick wrote: > > The operator user was not used by CoreOS, but existed because it > > exists in the Gentoo Portage system from which CoreOS is derived. > > <end/snippets> > > > > Full read [1]. It kinda shows that CoreOS is derived from Gentoo > > and not ChromeOS; at least when time to blame a security lapse > > elsewhere.... ChromeOS is based on Gentoo, so if CoreOS is based no ChromeOS it is a second generation Gentoo derivative. > Does this mean we need to do anything to improve the security of our > systems? The report seems to be saying that the problem is caused by using the Gentoo default config, which assumes a Gentoo environment. So it's fine on Gentoo. But it won't hurt to run glsa-check from time to time (my sync script does it every time and mails me if there's a problem). -- Neil Bothwick Everything else being equal, fat people use more soap. [-- Attachment #2: OpenPGP digital signature --] [-- Type: application/pgp-signature, Size: 181 bytes --] ^ permalink raw reply [flat|nested] 10+ messages in thread
* [gentoo-user] Re: CoreOS vulnerability inherited from Gentoo? 2016-06-01 7:11 ` Neil Bothwick @ 2016-06-02 13:44 ` James 2016-06-02 14:31 ` Max R.D. Parmer 0 siblings, 1 reply; 10+ messages in thread From: James @ 2016-06-02 13:44 UTC (permalink / raw To: gentoo-user Neil Bothwick <neil <at> digimed.co.uk> writes: > > Does this mean we need to do anything to improve the security of our > > systems? > The report seems to be saying that the problem is caused by using the > Gentoo default config, which assumes a Gentoo environment. So it's fine > on Gentoo. But it won't hurt to run glsa-check from time to time (my sync > script does it every time and mails me if there's a problem). Which file contains the purported malaised default configration? I just want to manually inspect it and verify for myself. curiously, James ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [gentoo-user] Re: CoreOS vulnerability inherited from Gentoo? 2016-06-02 13:44 ` [gentoo-user] " James @ 2016-06-02 14:31 ` Max R.D. Parmer 2016-06-02 16:21 ` James 0 siblings, 1 reply; 10+ messages in thread From: Max R.D. Parmer @ 2016-06-02 14:31 UTC (permalink / raw To: gentoo-user On Thu, Jun 2, 2016, at 06:44, James wrote: > Neil Bothwick <neil <at> digimed.co.uk> writes: > > > > > Does this mean we need to do anything to improve the security of our > > > systems? > > > The report seems to be saying that the problem is caused by using the > > Gentoo default config, which assumes a Gentoo environment. So it's fine > > on Gentoo. But it won't hurt to run glsa-check from time to time (my sync > > script does it every time and mails me if there's a problem). > > Which file contains the purported malaised default configration? > I just want to manually inspect it and verify for myself. /etc/pam.d/system-auth which is provided by pambase: https://gitweb.gentoo.org/proj/pambase.git/ ^ permalink raw reply [flat|nested] 10+ messages in thread
* [gentoo-user] Re: CoreOS vulnerability inherited from Gentoo? 2016-06-02 14:31 ` Max R.D. Parmer @ 2016-06-02 16:21 ` James 0 siblings, 0 replies; 10+ messages in thread From: James @ 2016-06-02 16:21 UTC (permalink / raw To: gentoo-user Max R.D. Parmer <maxp <at> trystero.is> writes: > > Which file contains the purported malaised default configration? > > I just want to manually inspect it and verify for myself. > /etc/pam.d/system-auth which is provided by pambase: > https://gitweb.gentoo.org/proj/pambase.git/ Huh. I looked at that and concluded it could not possibly be the problem. I went a bit deeper at coreOS and found that they are using pambase-20101024 from 2010. Double_huh. I had heard they were behind on updating may ebuilds, but that is ridiculous. Here are the details should anyone be interested:: https://github.com/coreos/coreos-overlay/commit/ 048faeb3b1b1a693dec3bdb47b127b8d71c48c13 I (previously) had high regards for CoreOS, but not keeping things current is usually the largest source of problems and sploits, imho. thx, James ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2016-06-02 16:22 UTC | newest] Thread overview: 10+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2016-05-31 16:30 [gentoo-user] CoreOS vulnerability inherited from Gentoo? James 2016-05-31 17:44 ` Mick 2016-05-31 17:59 ` Michael Cook 2016-05-31 18:44 ` [gentoo-user] " James 2016-05-31 18:07 ` [gentoo-user] " Max R.D. Parmer 2016-05-31 21:02 ` Max R.D. Parmer 2016-06-01 7:11 ` Neil Bothwick 2016-06-02 13:44 ` [gentoo-user] " James 2016-06-02 14:31 ` Max R.D. Parmer 2016-06-02 16:21 ` James
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox