| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty-One, File 9 of 13 |
|
|
| - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - |
|
|
| Security Shortcomings of AppleShare Networks |
|
|
| By Bobby Zero |
|
|
| November 28, 1992 |
|
|
| - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - = - |
|
|
| The purpose of this file is to inform all those underpaid Mac network |
| administrators or other interested parties of the problems with Macintosh |
| AppleShare and how to address those problems. AppleShare is quite respectable |
| in both its implementation and usage, blending seamlessly with the Macintosh OS |
| such that the casual user has no idea of the complexity behind the elegance. |
| For all its elegance, however, it does have some severe drawbacks in terms of |
| security-- nearly all of which are fixable, requiring a combination of common |
| sense and RTFM: Read The Fucking Manual. |
|
|
| This is in no way to be considered as a "How To" for persons of |
| questionable ethics and/or motives. That being said, however, I feel the |
| following is in order: |
|
|
| PROSECUTOR: [To WITNESS] ...And you are? |
|
|
| WITNESS: Miss America. |
|
|
| [Singing] |
|
|
| PROSECUTOR: Would you please tell the court why you feel Fielding Mellish is a |
| traitor to this country? |
|
|
| WITNESS: I feel that Fielding Mellish is a traitor to this country because his |
| views are different from the views of the President, and others of his kind. |
| Differences of views should be tolerated, but not when they are too different. |
| Then he becomes a subversive mother. |
|
|
| -- Woody Allen, "Bananas" |
|
|
|
|
| This file is divided into 5 sections: (1) the "AppleShare Prep" file, |
| (2) the "AShare File Srv" application, (3) Mixing VAXens & AppleShare, (4) |
| System 7 FileSharing, and (5) NCSA Telnet weaknesses. The fifth does not |
| particularly relate to AppleShare, but its security can be exploited via method |
| #4, so I thought to include it. |
| If there is sufficient interest, I will make a "Part II" [or three or |
| four or five..] detailing more problems. Send feedback to Phrack Loopback; |
| being a regular reader, I will respond accordingly. While writing this, I was |
| unsure of the approach -- either bland technical or "gh0d-these-people- |
| are-dumb" statements. I decided to just combine them, chao-like. Well, enough |
| of my rambling. On with the file! |
|
|
|
|
| - = - = - = - = - |
|
|
|
|
| THE "APPLESHARE PREP" FILE |
| ~~~ ~~~~~~~~~~ ~~~~ ~~~~ |
| (1) The "AppleShare Prep" file under both System 6 and 7 contains a BMLS |
| resource; this resource contains various information required to mount a volume |
| on startup. While this is an optional feature, many people choose it either by |
| accident or for convenience. |
|
|
| * The downside to this convenience is the fact that the user's name and |
| password for a server are stored in this file. Anyone with a copy of ResEdit |
| can open this file up, and view the BMLS resource. |
|
|
| * It's so easy to create a Trojan horse and slip it into a program or Hypercard |
| stack to copy the BMLS resource from the target's AppleShare Prep file and copy |
| it into a hidden file on the server drive where it can be retrieved at a later |
| date. If Mr. Ed is well-written, he would be nearly undetectable as it takes |
| but an eyeblink to copy the rez. Trojan horses aren't as sexy as viruses and |
| don't get much publicity, but it is exceedingly easy to fool a Macintosh user |
| [or any user, for that matter] into running something he or she shouldn't. |
|
|
| HOW TO SOLVE: Educate users of this flaw and urge them to log into the file |
| server manually. If computers in an open lab setting are used, configure them |
| to automatically log in as a guest, thereby circumventing the entire issue of |
| passwords entirely. Encryption of the BMLS resource is entirely up to Apple or |
| someone with enough knowledge of AppleShare to write a patch -- certainly not |
| me [yet...]. |
|
|
|
|
| THE "ASHARE FILE SRV" SERVER |
| ~~~ ~~~~~~ ~~~~ ~~~ ~~~~~~ |
| (2) On AppleShare File Servers running v2.0: |
|
|
| * The file "Users & Groups" within the Server/System Folder contains the data |
| required for maintaining folder privileges & ownership. It also contains |
| user's names and passwords, in an unencrypted format. While obtaining this |
| file would be somewhat difficult [one must physically be able to access the |
| server: shut it down, restart it with a floppy, copy the file, reboot the |
| machine], the "rewards" would be considerably worthwhile, as one would now have |
| a copy of every user name and password, including that of the Administrator. |
| Once physical access is secured, one could conceivably write a program to |
| install on the server that would periodically make a copy of the file and put |
| it on the "server" side of the disk, and give it an innocuous name... an INIT |
| which would perform on every startup, or install a Time Task to do it daily, or |
| even going so far as to patch the AppleShare Admin program to update this file |
| every time a user is added or modified. It is also common knowledge that users |
| use the same passwords on different machines; armed with a list of names & |
| passwords for one machine, one could then enter another computer with the same |
| user/pass combination. |
|
|
| * There is no automatic lockout for users who enter an incorrect password. With |
| a bit o' knowledge and a copy of "Inside AppleTalk," a program could be written |
| that could use a dictionary of common passwords in conjunction with a list of |
| user names to try to manually "hack out" a valid user/password combination. |
| The speed of this varies greatly on the speed of and load on the server, the |
| speed of and load on the network, and the speed of the "attacking" computer. A |
| typical "hack" can take anywhere from .5 to 5 seconds, but there is no need to |
| tie up the attacking computer for that period of time; the program can use both |
| asynchronous AFPCommand calls and exist under Multifinder to allow for complete |
| "background hacking." It should be noted, however, that Apple has incorporated |
| a lockout into the hideously overpriced AppleShare 3.0 -- its hardware |
| requirements, however, seem to leave it out of the budgets of most sane |
| individuals. |
|
|
| * A group of individuals armed with the above program could go into a computer |
| lab, fire up said program, and then launch a word processing application and |
| seem to be doing homework while in reality they would be hacking passwords. |
|
|
| * The "Copy Protect File" in AppleShare Admin disallows using the Finder to |
| copy a "Protected" program. That does not deter, however, a "normal" copy |
| program such as DiskTop from copying the file. [That is about as lame as the |
| ol' "Bozo Bit."] |
|
|
| HOW TO SOLVE: Insure that physical access to the fileserver is impossible for |
| all but trusted persons. Upgrade to AppleShare 3.0 [$$ gag $$], which allows |
| "locking" of accounts after a certain number of bad attempts, or obtain a |
| logging program to keep track of invalid attempts and origins, then track down |
| the offenders. There's no way to stop the violation of the "Copy Protection" |
| -- it deters only those easily dismayed. All I can suggest is you keep your |
| non-PD programs away from Guests or other "non-trusted" persons. |
|
|
|
|
| VAXSHARE, PCLINK, AND OTHER VAX/APPLESHARE SERVER APPS |
| ~~~~~~~~~ ~~~~~~~ ~~~ ~~~~~ ~~~ ~~~~~~~~~~ ~~~~~~ ~~~~ |
| (3) There are various forms of AppleShare that can be run from a VAX; many |
| versions of these programs have severe flaws which can also be exploited. |
|
|
| * The prime example is the existence of "default" accounts: while "Guest" |
| logins might be disallowed, logging in as DEFAULT, password USER has been known |
| to be effective in "getting in" -- even FIELD, SERVICE has worked. Pathetic, |
| isn't it, that these guys haven't picked up on these things? |
|
|
| * The existence of a VAXShare [or similar] account used for AppleShare access |
| can oft times be used to access the VAX. For instance, if one is aware that a |
| VAX is being used in an open lab as an AppleShare File Server, one can use |
| method #1 to extract a username/password combination from the Prep file and use |
| that password to gain entrance to the VAX. |
|
|
| HOW TO SOLVE: Disallow interactive logins on the VAX-side of the account and |
| disable or repassword all "default" accounts. If your version of |
| VAX/AppleShare requires an interactive login, have a "special" program be run |
| whenever the user logs in, recording the date, time, and origin of login before |
| disconnecting. |
|
|
|
|
| SYSTEM 7 FILE SHARING |
| ~~~~~~ ~ ~~~~ ~~~~~~~ |
| (4) With the advent of System 7.0 and "File Sharing," many users simply put |
| their machines "on the net" without taking proper measures to disallow |
| unauthorized access to their machine. Several people turn Sharing on while |
| their drive is selected, unwittingly allowing others to read, write, copy, |
| delete, or modify the information on the drive. Oddly enough, by default, the |
| "Trash" folder is locked out, while the System Folder is, by default, left wide |
| open. A major oversight on Apple's part... I suppose it was to discourage the |
| perceived threat of "digital dumpster diving" ...? Even I cannot fathom that |
| one. |
|
|
| * Many times the "System Folder" is left unprotected, meaning various system |
| resources can be copied or modified. One can leech the AppleTalk Remote Access |
| files, any Timbuk2 or Timbuk2/Remote programs, etc. and use them to further |
| penetration. |
|
|
| * The "Users & Groups" file can be copied, then modified "at home" by a user |
| running 7.0 [or by the attacking machine, if it is running 7.0] -- adding |
| another "owner" account, for instance, to act as a "back door" in the event |
| guest privileges are locked out by a wiser individual. |
|
|
| * The integrity of important files can be challenged; the System file can have |
| resources moved in and out of it by the attacking computer -- one of these |
| resources could be a virus, a Trojan horse, or a really stupid font [like New |
| York -- ugh!]. |
|
|
| * The disk is usually populated by copyrighted software; one could easily make |
| pirated copies of that software. |
|
|
| * The disk may be home to personal or otherwise "private" files -- files that |
| can be read, copied, deleted, or even modified. There was an instance in which |
| a file on a shared folder was found to contain user names and passwords to a |
| UNIX box on the campus network... incredibly foolish. Fortunately, the proper |
| persons were informed and the files were moved to a [presumably] safer |
| location. |
|
|
| * The attacker could have a malicious streak and choose to delete all that he |
| sees. |
|
|
| HOW TO SOLVE: Take a giant wooden plank and soundly whack all offending users. |
| Tell them of the intelligent way to use filesharing, and inform them that |
| *anyone* can go in and read their resume, love notes, financial info, erotic |
| poetry, etc.. that usually gets their attention. Tell them to, instead of |
| sharing the entire hard drive, create a folder and entitle it "Shares" or |
| something appropriately witty; then select the folder and go to "Sharing..." |
| To further security, disallow the <Any User> (Guest) logins. To better keep |
| track of who's using the Macintosh, keep the "File Sharing Monitor" open or get |
| a program like NokNok which notifies you when someone is using your Mac. |
|
|
|
|
| NCSA TELNET |
| ~~~~ ~~~~~~ |
| 5) The NCSA Telnet application allows a user to use his or her Mac as a telnet |
| client and wander around the Internet. NCSA Telnet also handles incoming FTP |
| requests. While this FTP function is easily disabled, many users keep it on |
| because they either use it regularly or don't even know it exists. |
|
|
| * Anyone with a valid username/password can log in to the Mac via FTP and then |
| change to the "root" directory and perform the normal FTP functions.. both send |
| and receive. This means that *every* file on the Mac can be accessed from |
| *anywhere* on the Internet. It should be noted that NCSA Telnet does not log |
| the "who & where" information, meaning there is no log of who used the machine, |
| meaning there is no way for an intruder to be "caught." |
|
|
| * The file "ftppass" contains the list of users allowed to use FTP on that |
| Macintosh. If, by using one of the methods mentioned above, someone is able to |
| access it, it is easily cracked as it has a rather pathetic encryption scheme: |
| the data fork contains the user's name, a colon, and then an encrypted |
| password. The password is easily decrypted; unless it is the entire 10 |
| characters, the last few characters are in order. That is, the next ASCII code |
| is 1 + the previous, etc. Observe this from my "ftppass" file: |
|
|
| sample:ucetcr&'() |
|
|
| The first part, "sample," is the user's name. The colon is the basic UNIX-like |
| delimiter, the rest is the password. The "real" part of the password is the |
| characters "ucetcr" ... the remaining "&'()" are just spaces... how do you |
| tell? It's in ASCII order. Look up "&" on an ASCII chart and "'" will follow, |
| then "(" then ")" .. you get the idea. |
|
|
| This password can be discovered by short program XORing the encrypted |
| characters with a number between 0 and 255. The program can either a) dump all |
| XOR results or b) if the password is not the maximum length, the program can |
| simply scan for a "space" [ASCII 032 decimal] in the password and print it. |
| The following "cracking" program is written in BASIC [hey, does anyone use that |
| any more?] and will allow you to decrypt the passwords. If you can tell that |
| the password has spaces at the end, you can go ahead and delete line 110. |
| Otherwise, leave that line in and use your brain [remember your brain?] to |
| determine if the encrypted goop is a "real" word or just goop. |
|
|
| 5 REM "ftppass" brute-force hacker |
| 10 INPUT "Encrypted password:";I$ |
| 20 FOR X=1 TO 255 |
| 30 FOR Y=1 TO LEN(I$) |
| 40 Y$=MID$(I$,Y,1) |
| 50 YA=ASC(Y$) |
| 60 N=X XOR YA |
| 70 IF N=32 THEN F=1 |
| 80 N$=N$+CHR$(N) |
| 90 NEXT Y |
| 100 IF F THEN ?"Possible password:"N$ |
| 110 ?I$" 'encrypts' to "N$: REM U can delete this line if len<10 |
| 120 N$="":F=0 |
| 130 NEXT X |
| 140 ?"Finished." |
|
|
| Sample run: [with line 110 deleted] |
|
|
| Encrypted password:ucetcr&'() [gotta type the whole thing] |
| Possible password:secret !./ [boy, that was tough!] |
| Possible password:rdbsdu! /. |
| Possible password:}km|kz./ ! [etc.. just smack ^C at this point.] |
|
|
| So the password is "secret" [clever, no?] |
|
|
| It should be noted that this program is rather inelegant as I haven't really |
| reversed the algorithm, just written a brute-force "hacker" for it. This is |
| due to laziness on my part. If I really wanted to do this properly, I would |
| FTP to the NCSA anonymous site and leech the 700k+ of source and "reverse" it |
| thataway. I don't feel like doing that. I am lazy. This program works just |
| dandy for me... [I suspect the encryption program uses the users' name to |
| encrypt it, but I don't care enough to find out.] |
|
|
| I should say that I don't wish to offend the makers of NCSA Telnet or call the |
| application crap. It is, indeed, an impressive piece of work; I simply feel |
| that there are some aspects of it which could use improvement... if not in |
| terms of security, then at least allowing the user to save selections to disk! |
|
|
| BTW- I know that NCSA Telnet is also available for the IBM. I haven't tested |
| these with an IBM, but if it's a "true" port, these flaws should exist under |
| the IBM version as well. |
|
|
| - = - = - = - = - |
|
|
| Well, that does it. If you're a network coordinator and you're *still* sitting |
| on your skinny ass after reading this, get the hell up and fix the problems. |
| Don't be surprised to find someone running anonymously through your net, |
| leeching files and generally contributing to moral laxity ... I've seen it |
| before -- it's not a pretty sight. |
|
|
| And of course, if you run a network of any sort, you must encourage users to |
| use different passwords on different machines and passwords that don't exist in |
| a dictionary [gh0ds are we sick of hearing that!].. it will work wonders for |
| security. Every hacker knows the number of people who use ONE password to all |
| of their different accounts is unbelievably high... and they make very good use |
| of this oversight. |
|
|
|
|