Package: festival Version: 1.96~beta-6 Severity: grave Tags: security Most users of festival have no reason to use its server mode, so the server should not be started by default. Putting an annoying password prompt in place is not a good way to get secure systems for users who have festival installed so it can be used by something like kismet.
Problems with this approach as implemented include:
1. Festival's server doesn't take any countermeasures against dictionary
attacks, allowing 300 or more passwords to be tried per second on not very
fast hardware.
2. There's absolutely no incentive to provide a good password, since the
prompt for it doesn't scream in big letters that this password is all
that's standing between remote attackers and a shell on your system,
and since the typical user will never use the server and has no idea
why it needs a password, or that it runs, in the first place.
3. The password that I entered ("foo") was not actually written into
/etc/festival.scm at all (!) ; after upgrade to this version
I could still log in w/o password. I assume this is because you
set the password to "" in the config script; the config script can be
run twice during an upgrade so it prompts for a password the first
time, which is then thrown away, and it doesn't prompt a second time
since the question is still marked as seen. (Suggest remedial reading
of the debconf documentation...)
4. The postinst script puts the password into /etc/festival.scm before
the "extra safety check" that sets the permissions so that others
cannot read it, thus exposing the password to local users.
5. Of course, it's also exposed briefly by your use of sed to write it to
the file. (Never write shell script that exposes passwords in the arguments
of programs where they can be seen by ps(1).)
Since festival's server mode is inherently terribly insecure, there's
little reason to make it an option at all, not even a non-default
option. This was clear to me when I maintained the package, and I used
methods like the one implemented in the attached daemon when I needed
secure access to a festival daemon. (Of course, this was in the 90's,
when festival started up slowly, not on modern hardware.)
And as the original maintainer of this package, I have to say that I
found the recent security bug about this issue astounding. It's always
been clear to me that festival's server mode is an unsecure
research-project level proof-of-concept that was never intended to be
used in production.
IMHO it should not even have an init script in the package; the init
script should certianly not default to starting it by default, nor should
installing festival as a depdendency of something like kismet cause
a gratuitous prompt for a password that noone except for an attacker will
ever want to use.
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.24-1-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
Versions of packages festival depends on:
ii adduser 3.105 add and remove users and groups
ii libaudiofile0 0.2.6-7 Open-source version of SGI's audio
ii libc6 2.7-8 GNU C Library: Shared libraries
ii libesd0 0.2.36-3 Enlightened Sound Daemon - Shared
ii libestools1.2 1:1.2.96~beta-2 Edinburgh Speech Tools Library
ii libgcc1 1:4.3-20080202-1 GCC support library
ii libncurses5 5.6+20080203-1 Shared libraries for terminal hand
ii libstdc++6 4.3-20080202-1 The GNU Standard C++ Library v3
ii lsb-base 3.1-24 Linux Standard Base 3.1 init scrip
ii sgml-base 1.26 SGML infrastructure and SGML catal
ii sysv-rc 2.86.ds1-53 System-V-like runlevel change mech
Versions of packages festival recommends:
ii festvox-kallpc16k [festival-v 1.4.0-5 American English male speaker for
-- no debconf information
--
see shy jo
signature.asc
Description: Digital signature

