public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* RE: please kindly get back to me
@ 2002-06-03 15:33 Holzrichter, Bruce
  2002-06-03 19:00 ` Matti Aarnio
  0 siblings, 1 reply; 25+ messages in thread
From: Holzrichter, Bruce @ 2002-06-03 15:33 UTC (permalink / raw)
  To: linux-kernel

> 
> ATTN:   
> I STUMBLED IN TO YOUR CONTACT BY STROCK OF LUCK AFRTER 
> A LONG SEARCH FOR AN HONEST AND TRUST WORTHY PERSON WHO
> -

Darn, someone has to show these spammers how to use a spell checker.  How am
I supposed to get my daily dose of morning laughter if I need to spell check
all this coming in?  ;o)

B.

^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: please kindly get back to me
@ 2002-06-04 21:49 Jesse Pollard
  0 siblings, 0 replies; 25+ messages in thread
From: Jesse Pollard @ 2002-06-04 21:49 UTC (permalink / raw)
  To: mhw, J Sloan
  Cc: M. Edward (Ed) Borasky, Larry McVoy, Matti Aarnio,
	Holzrichter, Bruce, linux-kernel

"Michael H. Warfield" <mhw@wittsend.com>:
...
> 
> 	It's not theoretical and it's not just in the labs.  It's real
> and it's in the wild now.  It just doesn't have the population
> density and the monclonal culture to make it go BANG like the Windows
> worms go.  Yet...
> 
...

So which do you think is better:

1. buy/write/update virus software to catch/trap the virus

2. Fix the security hole.

I put my money on #2.

There are several ways to trap attacks on daemons that have such
vulnerabilities. And using virus scanners CANNOT keep up.

The obvious solution is:

1. Use one of the high security  patches (SELinux or RSBAC) and use
   compartmentalization to keep the problem under control.
2. Use the detected problem to locate and fix the security problem in
   the daemon.

Virus scanners cannot keep up. The virus that does the damage is the one
the scanner doesn't recognize. This is equivalent to the bug that wasn't
fixed.

Generation and propagation of a patch is nearly as fast if not faster
than generating another virus signature; and is a LOT more effective.

The high security patches allow the system to continue functioning even
in the presence of the virus, as long as the virus itself is compartmented.
At one time, there was some discription of the Ramen/lion worm attempting
to attack a SELinux based system.. and failed. It did get in the daemon,
but was then isolated from the rest of the system.

I do believe that the kernel can be improved - not including daemon services
in the kernel itself is one (tux?,nfs?,... yes they work faster, but is it
worth the security risk?).

-------------------------------------------------------------------------
Jesse I Pollard, II
Email: pollard@navo.hpc.mil

Any opinions expressed are solely my own.

^ permalink raw reply	[flat|nested] 25+ messages in thread
* Re: please kindly get back to me
@ 2002-06-04  4:26 Hank Leininger
  0 siblings, 0 replies; 25+ messages in thread
From: Hank Leininger @ 2002-06-04  4:26 UTC (permalink / raw)
  To: linux-kernel

On 2002-06-03, J Sloan <joe@tmsusa.com> wrote:

> The thing with linux/unix "virii" is, they
> are actually for the most part trojans -
> they've been in labs for years, the problem
> is that there is no suitable transport vector!

> You'd have to dupe an unwitting superuser
> (now there's a dangerous combination) into
> running the "virus" by hand - sort of like
> the "honor system" virus....

...You mean like, get them to run './configure' ?[1][2]
...Or installing an RPM with trojanned binaries or install-time scripts,
without checking a signature?[3]

Unfortunately that's all too easy.  Viruses, no.  Malware, you bet.  We
can't get too complacent while laughing at the virus phenomenon.

[1] http://marc.theaimsgroup.com/?l=bugtraq&m=102233939226053&w=2
    http://marc.theaimsgroup.com/?l=bugtraq&m=102285523803434&w=2
[2] They don't have to do this as root, either.  If they do it from an
    account that can escalate privileges (i.e. is allowed to su or sudo)
    then it's game over anyway, albeit with more steps.
[3] And of course signatures are useless if the signer was owned first.
    Probably major distros are reasonably safe[4], but not Joe Random who
    produces packages and distributes them...
[4] They're not out to get you; they've already got you:
    http://www.acm.org/classics/sep95/

--
Hank Leininger <hlein@progressive-comp.com>
ALL YOUR BASE ARE BELONG TO KEN THOMPSON

^ permalink raw reply	[flat|nested] 25+ messages in thread
* RE: please kindly get back to me
@ 2002-06-04  2:04 Matt_Domsch
  2002-06-04  3:17 ` J Sloan
  0 siblings, 1 reply; 25+ messages in thread
From: Matt_Domsch @ 2002-06-04  2:04 UTC (permalink / raw)
  To: matti.aarnio; +Cc: linux-kernel

> On Mon, 2002-06-03 at 20:23, Matti Aarnio wrote:
> I think there are several free codes of this kind 
> available, but my time
> has been chronically over-subscribed to do radical things 
> like taking this kind of codes into use.

I've been using SpamAssassin on lists.us.dell.com for a couple months now.
It's pretty effective, but of course not perfect - maybe one a month gets
through, though I'm dealing with less traffic than vger.  I'm not actually
filtering linux-kernel-digest or -daily-digest, except to verify that the
mail actually was sent from vger and not some spammer.  With procmail
recipies, it works quite well.  Because I'm using mailman, it's a
multi-stage thing.  Procmail does the heavy lifting, and mailman sticks
suspected spam in the moderator queue.

/etc/aliases has:
linux-poweredge:         "|procmail -m /etc/procmailrcs/spamfilter post
linux-poweredge"

/etc/procmailrcs/spamfilter has:
# drop known spam senders in our killfile
:0
* ? formail -x"From" -x"From:" -x"Sender:" -x"X-Envelope-Sender:" | egrep
-is -f
 /home/mailman/SPAMMERS
/dev/null

:0fw
| spamc

# This avoids having to moderate completely obvious spam.
# Send obvious spam to /var/spool/mail/caught-spam
# Eventually we'll just send it to /dev/null instead.
:0
* ? formail -x"X-Spam-Status:" | sed -e 's/hits=//g' | \
    awk '{if ($2 < 10) exit 1}'
caught-spam

:0
|/home/mailman/mail/wrapper $1 $2


Messages that match known spammers are dropped.
Messages with scores < 5 are considered not spam.
Messages with scores 5-10 are caught by Mailman filters and dropped into
moderator queue
Messages with scores > 10 are stored in caught-spam, could be /dev/null - it
hasn't missed yet.
Mailman then has its own list of things to catch for moderation, and I've
mimic'd vger's filters too.

Successful messages give automatic whitelist points to the author, which
cuts down on false positives from people who post regularly.  In all I'm
quite pleased.  A useful addition would be automatic updates of rules as
they get added to CVS, but SpamAssassin isn't mature enough to allow such
quiet yet.

Thanks,
Matt

-- 
Matt Domsch
Sr. Software Engineer
Dell Linux Solutions www.dell.com/linux
Linux on Dell mailing lists @ http://lists.us.dell.com
#1 US Linux Server provider for 2001! (IDC Mar 2002)

^ permalink raw reply	[flat|nested] 25+ messages in thread
* please kindly get back to me
@ 2002-06-03 15:46 JOSEPH  EDWARD.
  0 siblings, 0 replies; 25+ messages in thread
From: JOSEPH  EDWARD. @ 2002-06-03 15:46 UTC (permalink / raw)
  To: linux-kernel

ATTN:   
I STUMBLED IN TO YOUR CONTACT BY STROCK OF LUCK AFRTER 
A LONG SEARCH FOR AN HONEST AND TRUST WORTHY PERSON WHO
COULD HANDLE ISSUE WITH HIGH CONFIDENTIALITY.
I WAS SO DELIGHTED WHEN I GOT YOUR CONTACT AND I DECIDED 
TO CONTACT YOU AND SOLICITE FOR YOUR KIND ASSISTANCE.
I HOPE YOU WILL LET THIS ISSUE TO REMAIN CONFIDENTIAL EVEN
IF YOU ARE NOT INTERESTED BECAUSE OF MY STATUS.
I PRESUME THIS MAIL WILL NOT BE A SURPRISE TO YOU.
I AM AN ACCOUNTANT WITH THE MINISTRY OF MINERAL
RESOURCES AND ENERGY IN SOUTH AFRICA AND ALSO A MEMBER
OF CONTRACTS AWARDING COMMITTEE OF THIS MINISTRY UNDER
SOUTH AFRICA GOVERNMENT.

MANY YEARS AGO, SOUTH AFRICA GOVERNMENT ASKED THIS
COMMITTEE TO AWARDS CONTRACTS TO FOREIGN FIRMS, WHICH
I AND 2 OF MY PARTNERS ARE THE LEADER OF THIS
COMMITTEE, WITH OUR GOOD POSITION , THIS CONTRACRS
WAS OVER INVOICED TO THE TUNE OF US$25,600,000:00 AS A

DEAL TO BE BENEFIT BY THE THREE TOP MEMBER OF THIS
COMMITTEE.
NOW THE CONTRACTS VALUE HAS BEEN PAID OFF TO THE
ACTUAL CONTRACTORS THAT EXECUTED THIS JOBS, ALL WE
WANT NOW IS A TRUSTED FOREIGN PARTNER LIKE YOU THAT WE

SHALL FRONT WITH HIS BANKING ACCOUNT NUMBER TO CLAIM
THE OVER INFLATED SUM.
UPON OUR AGREEMEENT TO CARRY ON THIS TRANSACTION WITH
YOU, THE SAID FUND WILL BE SHARE AS FOLLOWS.
75% WILL BE FOR US IN SOUTH AFRICA.
20% FOR USING YOUR ACCOUNT AND OTHER CONTRIBUTION
THAT MIGHT REQIURED FROM YOU.
5% IS SET ASIDE FOR THE UP FRONT EXPENCES THAT
WILL BE ENCOUNTER BY BOTH PARTY TO GET ALL NECESSARY
DOCUMENTS AND FORMARLITIES THAT WILL JUSTIFY YOU AS
THE RIGHTFUL OWNER OF THIS FUND.
IF YOU ARE INTERESTED IN THIS TRANSACTION, KINDLY
REPLY THIS MASSEGE WITH ALL YOUR PHONE AND FAX
NUMBERS, TO ENABLE US FURNISH YOU WITH DETAILS AND
PROCEDURES OF THIS TRANSACTION.
GOD BLESS YOU
YOURS FAITHFULLY.

JOSEPH EDWARD.





^ permalink raw reply	[flat|nested] 25+ messages in thread
* please kindly get back to me
@ 2002-06-03 15:26 JOSEPH  EDWARD.
  0 siblings, 0 replies; 25+ messages in thread
From: JOSEPH  EDWARD. @ 2002-06-03 15:26 UTC (permalink / raw)
  To: linux-kernel

ATTN:   
I STUMBLED IN TO YOUR CONTACT BY STROCK OF LUCK AFRTER 
A LONG SEARCH FOR AN HONEST AND TRUST WORTHY PERSON WHO
COULD HANDLE ISSUE WITH HIGH CONFIDENTIALITY.
I WAS SO DELIGHTED WHEN I GOT YOUR CONTACT AND I DECIDED 
TO CONTACT YOU AND SOLICITE FOR YOUR KIND ASSISTANCE.
I HOPE YOU WILL LET THIS ISSUE TO REMAIN CONFIDENTIAL EVEN
IF YOU ARE NOT INTERESTED BECAUSE OF MY STATUS.
I PRESUME THIS MAIL WILL NOT BE A SURPRISE TO YOU.
I AM AN ACCOUNTANT WITH THE MINISTRY OF MINERAL
RESOURCES AND ENERGY IN SOUTH AFRICA AND ALSO A MEMBER
OF CONTRACTS AWARDING COMMITTEE OF THIS MINISTRY UNDER
SOUTH AFRICA GOVERNMENT.

MANY YEARS AGO, SOUTH AFRICA GOVERNMENT ASKED THIS
COMMITTEE TO AWARDS CONTRACTS TO FOREIGN FIRMS, WHICH
I AND 2 OF MY PARTNERS ARE THE LEADER OF THIS
COMMITTEE, WITH OUR GOOD POSITION , THIS CONTRACRS
WAS OVER INVOICED TO THE TUNE OF US$25,600,000:00 AS A

DEAL TO BE BENEFIT BY THE THREE TOP MEMBER OF THIS
COMMITTEE.
NOW THE CONTRACTS VALUE HAS BEEN PAID OFF TO THE
ACTUAL CONTRACTORS THAT EXECUTED THIS JOBS, ALL WE
WANT NOW IS A TRUSTED FOREIGN PARTNER LIKE YOU THAT WE

SHALL FRONT WITH HIS BANKING ACCOUNT NUMBER TO CLAIM
THE OVER INFLATED SUM.
UPON OUR AGREEMEENT TO CARRY ON THIS TRANSACTION WITH
YOU, THE SAID FUND WILL BE SHARE AS FOLLOWS.
75% WILL BE FOR US IN SOUTH AFRICA.
20% FOR USING YOUR ACCOUNT AND OTHER CONTRIBUTION
THAT MIGHT REQIURED FROM YOU.
5% IS SET ASIDE FOR THE UP FRONT EXPENCES THAT
WILL BE ENCOUNTER BY BOTH PARTY TO GET ALL NECESSARY
DOCUMENTS AND FORMARLITIES THAT WILL JUSTIFY YOU AS
THE RIGHTFUL OWNER OF THIS FUND.
IF YOU ARE INTERESTED IN THIS TRANSACTION, KINDLY
REPLY THIS MASSEGE WITH ALL YOUR PHONE AND FAX
NUMBERS, TO ENABLE US FURNISH YOU WITH DETAILS AND
PROCEDURES OF THIS TRANSACTION.
GOD BLESS YOU
YOURS FAITHFULLY.

JOSEPH EDWARD.





^ permalink raw reply	[flat|nested] 25+ messages in thread

end of thread, other threads:[~2002-06-04 21:50 UTC | newest]

Thread overview: 25+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-06-03 15:33 please kindly get back to me Holzrichter, Bruce
2002-06-03 19:00 ` Matti Aarnio
2002-06-03 19:06   ` Larry McVoy
2002-06-03 19:23     ` Matti Aarnio
2002-06-03 19:43       ` stoffel
2002-06-04  0:37       ` Alan Cox
2002-06-04  7:10       ` Rik van Riel
2002-06-04  8:11         ` J Sloan
2002-06-03 19:50     ` H. Peter Anvin
2002-06-03 20:16       ` Davide Libenzi
2002-06-03 20:03     ` M. Edward (Ed) Borasky
2002-06-03 20:08       ` Gerhard Mack
2002-06-03 23:11       ` J Sloan
2002-06-04  0:20         ` Austin Gonyou
2002-06-04 20:25         ` Michael H. Warfield
2002-06-03 20:54     ` Rik van Riel
2002-06-03 20:58     ` Herman Oosthuysen
2002-06-03 22:51     ` J Sloan
2002-06-04 14:25     ` Pavel Machek
  -- strict thread matches above, loose matches on Subject: below --
2002-06-04 21:49 Jesse Pollard
2002-06-04  4:26 Hank Leininger
2002-06-04  2:04 Matt_Domsch
2002-06-04  3:17 ` J Sloan
2002-06-03 15:46 JOSEPH  EDWARD.
2002-06-03 15:26 JOSEPH  EDWARD.

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox