[plug] ftpd query
David Campbell
campbell at gear.torque.net
Wed Jun 9 08:03:49 WST 1999
Date sent: Tue, 08 Jun 1999 13:35:22 +0800
To: plug at linux.org.au
From: Denis Brown <dsbrown at cyllene.uwa.edu.au>
Subject: [plug] ftpd query
Send reply to: plug at linux.org.au
> Dear PLUG members,
>
> Doubtless a simple query, but would like some confirmation that my thinking
> is correct. Am especially paranoid about security.
You are not paranoid enough...
> Scenario: I want to set up an ftp resource from which a small group of
> users can periodically download files, notably virus detector programme
> updated signature files. There's one Linux (Debian slink) box and some
> Wintel boxes. Ideally, when I find out how to batch run the Wintel side
> ftp client, I could implement automatic download of updated virus
> signatures on bootup, but that's another story.
>
> Looking through the man pages for ftpd on anonymous ftp leads me to believe
> that I could create security holes inadvertantly. This has made me think
> that a better way would be to assign a dummy user account on the Linux box
> and let every Wintel user know about that account name and its password.
> For want of a better name, call the Linux dummy user "virsigs".
This could create more holes since the anonymous ftp account runs in
a "chroot" (eg: limited view only the account directory). There is a
list of things that need to be done for setting up an anonymous ftp
account properly - more than I can remember.
Have you considered using SAMBA for this job?
Admittedly you would require a little configuration of smb.conf for
the proper security (read only access, guest account that has
/bin/false as a shell, shares are not browsable), but the end result
is that you can do the following on a Win95/WinNT machine:
copy \\linuxbox\virsigs\*.* c:\virsigs
Without explicitly mapping the drive (done this several times). I
only recommend this as it solves a pile of problems on the Win95 side.
> a) prevent my Wintel users from clobbering the signature file(s) - I
> suspect the answer is "yes"
correct
> b) enable my users to see a directory of the available file(s) - again I
> suspect "yes"
You can do one better than this with FTP, you can have a directory
they can't list but providing they know the file name they can grab
the file (I know this is cruel but we are talking about Win95 users).
> c) prevent my users from seeing and accessing files in other directories?
> - not sure about this one.
Anonymous ftp (running as chroot) should keep them out of other
directories. There should be an anonymous ftp server HOWTO lurking
around, it might even be on CERT / AusCERT.
> Alternatively, am I being too paranoid about the anonymous ftp account
> mechanism?
Paranoia is good for a secure environment but you must choose the
lesser of the two evils. Anonymous FTP should be more secure than
standard FTP since you use chroot to put the blinkers on, for most
secure systems this should only be the icing on the cake.
If you wish to follow the FTP route then:
a) Research various FTP daemons for suitability
b) Implement a secure non-login account (the /bin/false for a shell
is just the start - there is other things that need to be done).
c) Check directory permisions for the WHOLE disk, you may have other
weaknesses.
d) Subscribe to the auscert security mailing list.
I may of missed something there as it has been three years since I
last administered a UNIX box in "concrete bunker mode".
David Campbell
=======================================================
campbell at torque.net
"This is not an office, rather Hell with fluorescent lighting"
More information about the plug
mailing list