Home Blog Page 9280

Kernel Traffic #127

Author: JT Smith

Zack Brown posts the latest summary of traffic and discussions taking place on the linux-kernel mailing list. The top three topics for this edition include “Generalizing swapfile support in 2.5,” “Cache info for Durons,” and “Kernel documentation efforts.”

Category:

  • Linux

Linux Jagged Alliance2 review

Author: JT Smith

Avatar writes “Evil3D has posted a new review today which covers the port of the realtime strategy game Jagged Alliance2. (Ported by Tribsoft.) The review touches on installation, getting started, and some of the strategies involved with JA2. As usual, a few screenshots are thrown in as well.

The mainpage for the review can be found here: http://www.evil3d.net/reviews/software/ja2/

Dr. Dobb’s Tcl-URL

Author: JT Smith

In this week’s edition of news and links of interest to the Tcl development community there’s a security alert against Tcl’s default runtime library search path, ActiveState announces ActiveTcl 8.3.3.2, and Paul Welton tells the world about multimedia creation tool TSIPP Workbench. Read all about it at Linux Weekly News.

Linux kernel-level trojan – Kernel Intrusion System

Author: JT Smith

In an e-mail message, Timothy Lawless documents the Kernel Intrusion System (KIS) trojan, unveiled about a week ago at the DefCon Conference in Las Vegas. The trojan affects Linux systems running the 2.2 or 2.4 kernels. Read on for the complete message:

                  This document describes the Kernel Intrusion System (KIS) trojan that
                  affects Linux 2.2 and 2.4 systems. The specific version of the KIS
                  trojan analyzed is labeled 0.9.


                  1. Introduction

                  At the Defcon Conference in Las Vegas, NV at 10:00am PST on July 14th
                  2001, the KIS trojan was published by an individual who is identified
                   as Optyx. The trojan is designed to automate the loading of a kernel
                   module. Once loaded the kernel module will attempt to conceal its
                   presence, and listen to the network for instructions.

                  2. Description

                  The KIS trojan is a hybrid between zombie daemons which came to light
                   as a result of DDOS attacks on major sites at the beginning of 2000
                   and kernel level rootkits that are used by hostile entities to
                   conceal their presence on a system after a successful compromise.

                  In its remote control client, the KIS trojan delivers a similar look
                   and feel as is associated with Back Orifice or SubSeven.

                  By issuing commands from a remote KIS client, an individual is
                   capable of executing processes on a victim host while hiding
                   arbitrary files, child processes and network connections.

                  The KIS trojan is introduced into a system in the form of a regular
                  executable binary that contains the KIS kernel module and the trojan.

                  3. Operation


                  The KIS trojan is inserted on a victim host by executing a binary
                   that installs the trojan, and loads the KIS trojan kernel module.

                  The trojan is installed into the system by replacing the /sbin/init
                   binary with the trojan. Upon bootup, the trojaned /sbin/init will
                   load the KIS kernel module and subsequently call the original "init"
                   binary that has been moved to a hidden directory. This ensures that
                   the KIS trojan is the first kernel module loaded on the system.

                  In the testing of the KIS system, it appears it was designed only to
                   load from init. Multiple runs of the trojan binary, such as what
                   would occur if it were to replace /bin/sh or another binary that
                   runs often, can cause the system to hang, generate "Out of Memory"
                   messages or become unstable.

                  During loading, the KIS kernel module performs several tasks:

                     -- Conceals the Modules Presence by Removing the Module
                        from the modules_list structure.

                     -- Replaces key system calls.

                     -- Replaces portions of the vfs structures for the net/tcp,
                        net/udp, and net/raw files in the procfs.

                     -- Spawns a kernel_thread to process incoming commands from
                        the network.

                     -- Replaces the ip_packet_type structure with a new
                        structure to allow KIS to monitor all ip based
                        network traffic and add observed commands to queue.

                  Commands are sent to the KIS trojaned system from a KIS client
                   console. The commands are sent via directed IP packets with a
                   specific length to match a modulus and remainder defined in the KIS
                   module upon compile.

                  If the packet matches the length requirements and decrypts into a
                   valid command packet, then the command is added to a queue for
                   processing.

                  The queue manager takes a queued command off of the queue and
                   performs the directed command.

                     Valid commands include:

                      -- Execution of A Process
                      -- Hiding a running process
                      -- Revealing a hidden process
                      -- Hiding a file
                      -- Revealing a file
                      -- Hiding a connection
                      -- Revealing a connection
                      -- Ping
                      -- Shutdown and Removal of the Trojan

                  The queue manager is always running, monitoring the incoming queue of
                  commands. As a result, the load on a victim system will never fall
                   below a load of 0.80.

                  Additionally, as a result of the replaced systemcalls and the
                   requirements to manage hidden files and processes, filesystem
                   operations such as listing or even compiling a kernel consume up to
                   30% more system time then the victim system would consume in a
                   non-trojaned state.

                  4. Risk

                  The KIS system permits a remote execution of processes on a victim
                   system. Combined with its ability to conceal such executions, files,
                   and network activity from normal processes, the KIS system provides
                   a prime platform from which attacks against the integrity and
                   availability of other compromised systems may be launched.

                  Despite the need to compile a KIS trojan for each kernel, a
                   pre-compiled KIS trojan could be packaged and distributed to victim
                   hosts that are running stock kernels.

                  If such a pre-compiled binaries were to be included into a RPM or DEB
                  package, a KIS trojan could be introduced to victim systems by
                  administrators installing a new or updated package.

                  5. Detection

                  The KIS system can be detected on initial load by the StMichael 0.05
                   Linux Kernel Module. The StMichael Linux kernel module is a
                   integrity monitor for the 2.2 and 2.4 Linux kernels.

                  On systems not running StMichael, or that are suspected of being
                   infected by the KIS trojan, the following observations can be made
                   to determine if the system is actually infected:

                  During normal operations (ie, runlevel 3 or 5)

                     -- "ps -auwx | grep init" will reveal two "init" processes.

                     -- The system load will be high, not falling below 0.8 even
                        when all observable processes are idle or sleeping.

                     -- Repeated runs of "init", such as switching between runlevels
                        or rebooting will cause the system to hang, generate error
                        messages or crash.

                     -- Portscans on the system reveal open and listening ports that
                        are not reflected in a netstat.

                  Alternatively, if the system can be safely brought down and booted
                   off of a clean or rescue media, search the filesystem for a file
                   called "ht" with mode 000. This is the hidden file table used by KIS
                   to list hidden files.

                     find / -name ht -mode 000 -print

                  Also, the trojaned init process is copied to a file in the same
                  directory as the original init binary, but named "init."

                    find / -name init. -print

                  Additionally, to determine if files are hidden by KIS or any other
                   trojan the following method may be applied:

                     1. Boot the system normally. Generate a file list via:

                        find / -type f -print > listing.1

                     2. Boot the system into single user mode using 'clean'
                        media such as a rescue disk. Mount all the filesystems
                        (ie, on /mnt)

                        find /mnt -type f -print | sed -e "//mnt//g" > listing.2

                     3. Diff the two listings to determine the hidden files

                        diff -u listing.1 listing.2


                  6. Cleaning

                  To remove KIS, the trojaned init binary needs to be replaced with a
                   clean init binary or the original init binary.

                  The original init binary is stored in the same directory that the ht
                   file is stored in. There are two files that are named simularly:
                   "init." and "init" .

                  "init" is the original init binary.
                  "init." is a copy of the trojan.

                  Copy the "init" file over the trojaned init file:

                     cp init /sbin/init

                  The "ht" file will contain files and directories that are hidden.
                   These files may contain information about the attack and what the
                   trojaned system was used for.

                  If the source for KIS is recovered, the server.h file will contain
                   the keys, modulus, and remainder needed to communicate with the KIS
                   server. Using this information it may be possible to sniff the
                   network, identifying packets that are sent in attempts to contact
                   the KIS server. In some circumstances, such as with the PING
                   command, the origin IP address will likely not be spoofed.


                  Tim Lawless
                  lawless@netdoor.com

Category:

  • Linux

White House dodges Internet bullet

Author: JT Smith

Australian IT weighs in with its report on that nasty Code Red IIS worm that didn’t actually manage to bring whitehouse.gov to its knees. White House admins appear to have simply shifted their site to a different set of IP addresses to avoid the attack. Also interesting is what Netcraft is now reporting as the operating system now fueling whitehouse.gov, though it’s entirely possible they’re merely seeing a caching or proxy server sitting in front of the actual Web server.

Category:

  • Linux

rp-pppoe 3.2 released

Author: JT Smith

“rp-pppoe is a user-mode (and kernel mode, on Linux 2.4) client and
server for the Point-to-Point Protocol over Ethernet, a protocol used
by many ADSL service providers. It runs on standard Linux kernels
NetBSD and Solaris.” Read on for the full announcement:

Version 3.2 of rp-pppoe has been released.  It is the successor to 3.1.
      
rp-pppoe is a user-mode (and kernel mode, on Linux 2.4) client and
server for the Point-to-Point Protocol over Ethernet, a protocol used
by many ADSL service providers.  It runs on standard Linux kernels
NetBSD and Solaris.  rp-pppoe is released under the GNU General Public
License, and can be obtained from:
     
        http://www.roaringpenguin.com/pppoe/
     
Changed from Version 3.1 to 3.2:
     
o Client used to incorrectly accept PADT's from any MAC address (and
if the Ethernet interface is in promiscuous mode, to any MAC address.)
This has been corrected.
     
o Minor fixes to "install" target for Turbolinux.

Category:

  • Linux

Sklyarov’s DefCon presentation is online; supporter’s reputation a ‘bonfire’

Author: JT Smith

by Tina Gasperson

Mike Crawford gave up the possibility of a good job at Adobe because he believes getting the word out about Dmitry Sklyarov is more important. Crawford says he had just applied for a job as a Photoshop software engineering manager when Sklyarov was arrested by the FBI. “Times have been hard for me and my little family for quite some time,
and that would be a good job for me for which I feel I am quite qualified, but I know it would be wrong to fail to speak out on this abuse of Dmitry’s
constitutional rights, and the rights of software engineers everywhere,” Crawford writes in an open letter to friends.

He published the letter on his Free Dmitry Web site. There he has also posted a link to download the Power Point version of Sklyarov’s recent presentation at DefCon, and another link to Elcomsoft’s free trial version of the Advanced eBook Processor — actions which are sure to be displeasing to a potential employer who wasn’t afraid to sic the FBI on anyone daring to point out security flaws in its product.

“Before I wrote in to [Adobe] to say that I didn’t want the position anymore, I had got a response. I felt I was a very strong candidate for the job, given my past experience in imaging as well as cross-platform work. So I am very disappointed,” Crawford told NewsForge. He says he hasn’t heard anything more from Adobe since he published the Free Dmitry Web site, which also advocates boycotts against Adobe.

Crawford is simply staying true to his life’s creed, according to a statement at the site. He calls the speech by John J. Chapman, given to the graduating class of Hobart College in 1900, and reprinted in the ClueTrain Manifesto, “words of wisdom I have striven to live by, even since I was a little child.” The speech, entitled “Make a Bonfire of Your Reputations,” says in part:

"As a practical matter, a mere failure to speak out upon occasions where no statement is asked or
expect from you, and when the utterance of an uncalled for suspicion is odious, will often hold you to a
concurrence in palpable iniquity. Try to raise a voice that will be heard from here to Albany and watch
what comes forward to shut off the sound. It is not a German sergeant, nor a Russian officer of the
precinct. It is a note from a friend of your father's, offering you a place at his office. This is your warning
from the secret police. Why, if you any of young gentleman have a mind to make himself heard a mile off,
you must make a bonfire of your reputations, and a close enemy of most men who would wish you well."

Crawford adds his own thoughts to Chapman’s philosophy:

“It has not always been to my advantage to speak out — far from it, many times I have suffered as a result.

“And there have been many times when I have chosen silence when I knew the right course would be to speak.

“There have been difficult times in my life when I saw injustice and was unable to express myself eloquently so that
those who happened to hear me did not take me seriously. But rather than learn to stay quiet, I have done my best to
speak better, so that my words should have more weight to them.

“I urge you to do the same.”

Category:

  • Migration

Study: Net doesn’t increase depression, after all

Author: JT Smith

Saying “Either the Internet has changed, or people have learned to use it more constructively,” Carnegie Mellon psychologist Robert Kraut released the results of a survey that concluded that using the Internet at home doesn’t make people more depressed and lonely after all. The new, longer follow-up study contradicts the results of an earlier study, also conducted by Kraut. More at USA Today.

IBM shows its age

Author: JT Smith

Commentary from The Industry Standard: “IBM has been looking like a hero. The
granddaddy of technology companies,
once dismissed as too senile to “get” the
Net, has survived to fight another day,
reporting gains in its earnings that Net
companies see only in their dreams. But on
closer examination, some investors wonder
if IBM is doing the dreaming… It’s not Gerstner’s retirement that’s
worrying some on Wall Street – it’s IBM’s
use of proceeds from the retirement program
for its thousands of current and former
employees. Critics say IBM is using
pension funds to artificially prop up
earnings.”

Palm to announce steps to ARM transition

Author: JT Smith

Tomorrow, handheld maker Palm, Inc. is expected to announce its first steps on the road to converting its operating system for use on ARM-based processors. The company will make public an agreement with chipmakers Intel, Motorola, Texas Instruments, and ARM Holdings to assist with the transistion. Current Palm-based handhelds use Motorola’s Dragonball processors; Palm announced last winter that its future product line would center around ARM technology. Shareholders don’t appear to be shivering with anticipation, shares of PALM were down 19 cents to 5.19 at the time this NewsVac brief was filed.