Security Flaws In Linux SMBFS 347
An anonymous reader points out this SecurityFocus alert, which starts "The Linux kernel is reported susceptible to multiple remote vulnerabilities in the SMBFS network file system. These vulnerabilities may lead to the execution of attacker-supplied machine code, information disclosure of kernel memory, or kernel crashes, denying service to legitimate users. Versions of the kernel in both the 2.4, and the 2.6 series are reported susceptible to various issues."
It's a FEATURE (Score:5, Funny)
Re:It's a FEATURE (Score:2, Funny)
Re:OSS is quick to please (Score:3, Informative)
history of linux exploits (Score:3, Interesting)
Re:history of linux exploits (Score:5, Informative)
Re:history of linux exploits (Score:4, Informative)
The Linux Weekly News security page would be a good place to start. If you then went back and looked through the security pages of the weekly editions, you'd probably have a pretty complete database.
http://lwn.net/security [lwn.net]
Re:history of linux exploits (Score:5, Informative)
http://www.linuxsecurity.com/advisori
Open Source Vunerability Database (not just for Open source software, but the database itself is open source)
http://www.osvdb.org/
That is probably the best and it offers vendor contact information, detailed analysis and RSS plugins.
Secunia Security and Virus information
http://secunia.com/
Security Focus:
http://www.securityfocus.com/
So on and so forth.
Re:history of linux exploits (Score:2)
I'm sure Microsoft has been keeping track of the exploits. They may be a bit skinny on the fixes, though.
But... (Score:2, Interesting)
Re:But... (Score:3, Interesting)
Re:But... (Score:4, Funny)
Re:But... (Score:4, Insightful)
I don't know how many times I've heard clueless admins tell me that they aren't patching for something because its only exploitable locally...
Re:But... (Score:5, Informative)
Probably not. Quote [securityfocus.com]:
SecurityFocus have this down as a "Design Error". Is that in the design of the implementation, or the design of the protocol? Can we start blaming Microsoft for bugs in Linux now?
Re:But... (Score:2, Informative)
Re:But... (Score:3, Insightful)
a compromised machine.
remomove from the LAN/WAN, disect then reinstall. Its the only safe way.
Re:But... (Score:4, Funny)
Re:But... (Score:2)
Would the BSD concept of privilege separation work better, without configuration, out of the box? </talking out of orifices>
this is NOT samba (smbd) (Score:5, Informative)
Re:this is NOT samba (smbd) (Score:2, Informative)
Re:this is NOT samba (smbd) (Score:3, Informative)
But this [samba.org] is.
Everyone makes mistakes (Score:2, Insightful)
No shiat. (Score:2, Insightful)
I think that one of the major misunderstandings that many people have is that software will be absolutely perfect. It won't be. We deal with systems with many layers of complexity, and sometimes these things fall through the cracks.
If you want a perfectly secure system, you'll have to audit the code personally.
Re:Everyone makes mistakes (Score:2, Funny)
The difference is the opportunity to take action through the utilization of an openly available codebase.
Re:Everyone makes mistakes (Score:2)
Re:Everyone makes mistakes (Score:5, Insightful)
Re:Everyone makes mistakes (Score:2)
Re:Everyone makes mistakes (Score:2, Interesting)
This kind of comment disturbs me. I never know how far down the conspiracy theory line I should allow my paranoia to run. The statement is prima facie true, so what requirement is there for such proof except to Microsoft FUDrakers?
Is microsoft paying people to post their marketing crap like this, or is it merely that trolling is its own reward?
One reason for microkernel OSs (Score:2)
Re:Everyone makes mistakes (Score:2)
Re:Everyone makes mistakes (Score:2)
Six months?? Six days would be a long time.
It's 2004, and there's no excuse (Score:3, Interesting)
One and a half of those things are no longer true, and most of the sec
Re:Irony isn't something you dewrinkle clothes wit (Score:2)
Absolutely correct. Well, probably. You see, if there are unseen holes in the protocol itself which make a secure implementation difficult, it's sorta like being parked on a busy freeway - yes, the guy who drove into your car is 100% at fault legally, but we all know that the technical/legal answer is far from the moral answer.
I'm not saying that MS is even morally at fault here. Just pointing out that, until we know the details (and we'll likely never know the details sufficiently), there is that possi
Re:Irony isn't something you dewrinkle clothes wit (Score:4, Insightful)
More likely the truth is that smart developers for Linux and smart developers for MS make mistakes and will continue to do so. My only complaint is that there shouldn't be a double-standard.
Re:Everyone makes mistakes (Score:3, Insightful)
Oh, come on now! Is this going to be used as justification for bugs/issues in Linux all the while berating Microsoft for theirs?
Re:Everyone makes mistakes (Score:4, Informative)
But Linux is supposed to better because it has armies and armies of passionate volunteers.
Re:Everyone makes mistakes, (Score:2)
yeah ... (Score:3, Funny)
Hmmm..... (Score:2, Funny)
MS Technology (Score:4, Informative)
NOT Originally MS Technology (Score:5, Informative)
Re:NOT Originally MS Technology (Score:2)
ROTFL!
Man you've got a good sense of humor.
Re:NOT Originally MS Technology (Score:2, Interesting)
I don't know much about this specific bug, but c'mon people, there have been linux security bugs concerning technologies and protocols Microsoft hasn't
Re:MS Technology (Score:2)
Freely available Cross platform alternatives for file sharing include FTP, GNUTELLA, and a host of other lesser known protocols. FTP was what I used, a server dameon on my *nix box, and depending on what I was doing either some freeware client on windows, or else the good old ftp.exe. which was BSD license code that windows used because 'It was BSD License, and was one less thing
Re:MS Technology (Score:2, Insightful)
Re:MS Technology (Score:5, Insightful)
Yeah... it NFS just has plenty of holes of its own. I would be the first to say that I think that SMBFS is crap, but NFS isn't the network filesystem that we should be holding up as a good system to emulate.
Re:MS Technology (Score:2, Informative)
NFS uses ONC RPC. ONC RPC supports any security
flavor the ONC RPC library implementor choses.
RFC 2203 is an security flavor that supports
GSS-API, which works over Kerberos and
Public Key Infrastructure. Solaris, AIX, NetApp,
EMC, Hummingbird have NFS/Kerberos via RFC 2203.
The bits are sort of there in Linux 2.6, and
should be there for when Red Hat and Suse release
enterprise editions of Linux 2.6.
Re:MS Technology (Score:4, Interesting)
Second, NFS is just as "full of holes" as SMB/CIFS. I'd even wager that its inherrent security model is worse. From my experience, it's also significantly less stable, and does not scale well at all, let alone dynamically on a large network.
On a network where everyone is a peer, SMB/CIFS seems like the better option to me.
Re:MS Technology (Score:2)
RPC (NFS runs over RPC) vulnerabilities have been among the most numerous over the years, and NFS security sucks even apart from that.
Re:MS Technology (Score:5, Informative)
Are you kidding? From a security point of view, past versions of NFS have been an absolute disaster, far worse than SMB. You can run NFS only if you have complete trust in your network infrastructure and every single machine on it. Sun's engineers must have been on drugs when designing it.
NFSv4 may fix some of those problems, but it hasn't been widely deployed yet, and it is far more complex than it has a right to be given its limited functionality. All network file systems for Linux currently have major problems of one kind or another (they are one of incompatible, immature, insecure, etc.).
Re:MS Technology (Score:3, Insightful)
ERROR! (Score:2, Funny)
REASON - NFS used with in 10 words of the word secure.
RESULT - AHHHH!!!!
Re:MS Technology (Score:3, Interesting)
Re:MS Technology (Score:3, Informative)
If you want want authentication and authorization for file sharing under Linux, AFS is probably your only real choice besides Samba.
And before this goes off the front page... (Score:4, Interesting)
Re:And before this goes off the front page... (Score:5, Informative)
that'd be fine if new kernels didn't break you... (Score:2, Informative)
Normally, I wouldn't bother to mention about this. But slashdot somehow thought someone mentioning that SP2 was worthless because it had compatibility problems was worth a major mod-up.
So I figure pointing out how Linux also bundles incompatibilities with security fixes should be very well received, right?
Re:that'd be fine if new kernels didn't break you. (Score:2)
Re:And before this goes off the front page... (Score:3, Interesting)
Re:And before this goes off the front page... (Score:2)
Re:And before this goes off the front page... (Score:3, Informative)
Re:And before this goes off the front page... (Score:2)
Red Hat != Linux
Re:And before this goes off the front page... (Score:2)
1. Commanding respect by virtue of age, dignity, character, or position.
2. Worthy of reverence, especially by religious or historical association: venerable relics.
3. Venerable Abbr. Ven. or V.
1. Roman Catholic Church. Used as a form of address for a person who has reached the first stage of canonization.
2. Used as a form of address for an archdeacon in the Anglican Church or the Episcopal Church.
Ignoring parts of speech for a moment, that makes for a pretty f
Re:And before this goes off the front page... (Score:2)
Then just update what you want. Nothing is stopping you.
If you can't figure out how, get apt and Synaptic...run Synaptic, and update.
I'm glad this hit slashdot (Score:5, Informative)
Re:I'm glad this hit slashdot (Score:4, Funny)
This message was brought to you by the department of redundancy department.
Re:I'm glad this hit slashdot (Score:3, Insightful)
Re:I'm glad this hit slashdot (Score:4, Informative)
The only downside that I have seen to using CIFS is that - at least on Slackware - mount.cifs doesn't seem to be included by default.
It's trivial to obtain, but kind of difficult to mount CIFS filesystems without it...
Note also that the old SMBFS is subject to the annoying 2GB file size limit, while CIFS is not, if you still need an excuse to switch. As far as I can tell, you can use CIFS for any server where you would previously have been using SMBFS, so you ought to be able to just switch without any hassles.
Re:I'm glad this hit slashdot (Score:4, Informative)
Re:I'm glad this hit slashdot (Score:2)
smbfs -> cifs is easy (Score:5, Informative)
After these minor changes that took me all of 3 minutes to make, I no longer have smbfs anywhere on this network.
Re:I'm glad this hit slashdot (Score:2)
Re:I'm glad this hit slashdot (Score:2)
Because linux does not fully support an implimentation any longer - an implimentation spec that was long ago abandoned by the people that made it, and was only being supported in linux to aid those people forced to use it - Linux is just as bad as MS for not supporting Microsoft's product, which Microsoft itself will not support - even though they're the ones that got the money?
Re:I'm glad this hit slashdot (Score:2)
You don't see an uproar over a lack of support for MSIE 4.0 do you? The upgrade is free and available to all, just like CifsFS is on Linux systems. If someone chooses to not keep their system up to date they are on their own.
But, if you think otherwise, then maybe I should ask for support for my 486 that has a 2.0.something kernel that hasn't been turned on in years.
Re:I'm glad this hit slashdot (Score:3, Interesting)
SMB is the protocol used pre-win2k. CIFS is everything after that. It makes little sense to modify (or expect) a device driver to support something that is outside the scope of it's designed purpose. Thus, along came cifsfs, which does indeed support the higher features (and very well might not work in a 'backward compatible' fashion, for all I know). Thus, you wouldn't need both if you didn't have any newer|older windows syste
The link doesnt actually tell you anything (Score:5, Informative)
More information also here [securityfocus.com]
Don't worry! (Score:5, Funny)
Already fixed? (Score:2)
Timeline... (Score:3, Interesting)
Re:Timeline... (Score:3, Informative)
Opensource does not guarantee quick fixes of bugs. Case in point.. many ATM cards remain in the experimental stage and crash on atmsigd 6 years on. Similar bugs with the arcnet driver will probably never be fixed.
Opensource software is 'generally' better in quality and security, but there are absolutely no guarantees.
Re:Timeline... (Score:3)
ATM == asynchronous transfer mode [google.com], try plugging things into Google before making silly comments...
Does this apply to FreeBSD? (Score:3, Interesting)
$FreeBSD: src/sys/fs/smbfs/smbfs.h,v 1.8 2003/02/08 05:48:04 tjr
Now... (Score:3, Insightful)
Cb..
Re:Now... (Score:2)
As opposed to that made by code monkeys?
Re:Now... (Score:2)
Re:Now... (Score:2)
That which is created by woman, on the other hand...
Re:Now... (Score:3, Informative)
Never let facts [securityfocus.com] get in the way of a good rant:
To exploit any of these vulnerabilities an attacker needs control
over the answers of the connected smb server. This could be achieved
by man in the middle attacks or by taking over the smb server with
f.e. the recently disclosed vulnerability in Samba 3.x
While any of these vulnerabilities can be easily used as remote
denial of service exploits against Linux systems, it is uncl
53 day turnaround, is that good? (Score:2, Interesting)
Really a two-part turnaround (Score:4, Informative)
Looking at their schedule, it is unclear what actually happened. Note that on 25 September 2004 they made their initial contact, but on 22 October 2004 they say they sent a second round of vulnerabilities in, followed by a set of patches on 27 October. The developers would then have to take all these patches, compare it to anything they may have come up with in the meantime, and make sure they didn't break anything else.
The public disclosure occured 17 November 2004, about 20 days later, after about a week's worth of testing time as 2.4.28-rc3. Personally, I would not have liked them to have announced on the first set of vulnerabilities if there was some knowledge between October and November that more issues were being found. Otherwise everyone and their kin would be combing the code looking for any issues missed in smbfs.
Re:53 day turnaround, is that good? (Score:3, Interesting)
That does it! (Score:2)
Why not use webdavs or sftp? (Score:3, Informative)
Another option is sftp. I am not sure how easy that is to do under windows and osx but I expect someone has a vfs layer for it under those. Under kde and gnome sftp is transparent to work with and it should be very secure, that is the way I usually share files is with sftp.
The advantage of both of these is that they are entirely user space. Worrying about speed with these file sharing seems seems pretty silly in most cases. You have such vastly more cpu power available then the system needs for file sharing that trading security for speed which is what many of these systems is doing is ridiculous. We should be designing stuff for security first and speed second since who cares how fast a machine can be compromised is. As long as it is fast enough that is fine.
Another thing really needed is more use of safer libraries. Code is not an asset it is a LIABILITY the more of it you have the worse off you are. You need to offload as much stuff to common libraries, using higher level languages which have more safety features built in etc. In the end you will end up with safer and more reliable programs and strangely enough most of them will tend to be faster for many reasons.
I think I'm immune (Score:3, Interesting)
If I actually wanted to run a Windows box for some reason, I'd probably just run open-source NFS and CUPS clients on that. A non-secret, non-proprietary protocol is always going to be inherently more secure than a secret, proprietary one; because there is a proper distinction between what really needs to be kept secret for security reasons, and what can't be kept secret because the source code is available to all.
No. (Score:2)
Re:Confused... (Score:4, Informative)
Filesystems by necessity have to be implemented to some extent in the kernel because they have to hook the VFS layer. However, you make a very good point that it does seem to be a big risk to implement the entirety of smbfs in kernel space.
Recent Linux kernels (I think 2.4 onward) have a mechanism for doing what are called user space filesystems. Basically, the kernel only knows enough to talk to a daemon which implements the filesystem and exposes it to the kernel. In this manner there is a very well defined interface between the kernel and user code which hopefully is bug free.
In some ways this is sort of a partial microkernel design. With that comes the inherent loss of speed having to do the context switches between kernel and user mode. In the normal filesystem case you have a context switch from user to kernel mode, the file is accessed, and then back to user mode. In the case of a filesystem implemented in user mode you have to switch from user mode to kernel mode, then to user mode in the FS daemon then back to kernel mode then back to user mode in the process trying to access the file. And that is the best case. Throw in a scheduler without the knowledge of which process is waiting for what and messaging between two user space processes through the kernel can be extremely costly!
In this case, yes, I think I probably would have recoded smbfs to use the user mode filesystem handler. But the code was already written years ago to live entirely in kernel space before there was really any sort of well defined standard for a user space file system. Given that this is as far as I can remember the only major bug in it one might say that it hasn't really been that bad having it in kernel space.
So the tradeoff becomes do you want to have it in user space (where it would still vulnerable to DoS in this case) and sacrifice some speed or do you want it to run in the kernel at full speed?
Re: (Score:2, Informative)
Re:Wow, A Flaw (Score:4, Informative)
Re:Wow, A Flaw (Score:2)
Re:I love open source... (Score:2)
A Linux developer can't exploit a Windows bug because that would make him a Windows developer and you said that a Windows developer does nothing until a Linux developer exploits it but he can't because
Correction (Score:2)
Re:I'm not suprised about this. (Score:2)
Total non-sequitur.