Mystery solved. Samba wants to protect smbpasswd with mode 600. User must
point Samba to password path. Sample smb.conf that loaded during last lenny
upgrade pointed to /etc., not /etc/samba/smbpasswd. Maybe I missed a prompt
during the upgrade to fully qualify the path. Maybe there wasn't any?

On Thu, Feb 12, 2009 at 8:50 PM, Stan Katz <stan.katz...@gmail.com> wrote:

> When I first experienced "promiscuous" escalation of etc mode from 755 to
> 600 (at least 8 to 10 years ago) I hunted down a reference by someone that
> this could happen if the lpd daemon was compromised. I stopped using lpd,
> and rebuilt my system. That system then worked fine until it was junked.
> When both of my current  systems experienced this deja vue, I was quite
> astounded. Why me? Anyway, I logged into my AMD64 in recovery mode, and
> began to exit out just about every service script in init.d I felt I could
> get away without. The mode changing stopped. I then painfully began
> reenabling scripts, and rebooting, until the mode on etc escalated. Unless
> this is a very clever exploit, it seems the problem is limited to samba. I
> haven't had a mode escalation problem, either from reboots, or just power on
> time since stopping samba on both machines.
>
> Either I'm doing something to cause gross misbehavior in samba, there is a
> bug in samba, or, taking the path of paranoia, someone along the samba
> source chain might be a sabateur. I'll start with the first proposition.  My
> first symptom was the "i have no name" prompts in my xterms when whoami
> failed. There is a lot of that going on out there on the net, but no one
> every mentions as a possible cause, an overescalated mode on etc. I'll be
> ripping my samba out, and replacing it with a surgical install via dpkg from
> the Debian main site. We'll see....
>
>
> On Thu, Feb 12, 2009 at 3:11 PM, The Well - Systems Administrator <
> sysad...@thewellpoway.org> wrote:
>
>> 600 on /etc is technically more secure than the default 755 with normal
>> POSIX systems, not less. If this is an exploit, it's one that locks things
>> down tighter than they should normally be. :) Giacomo is correct that these
>> incorrect perms can cause other issues, though not security related ones
>> that I can think of.
>>
>> Are there a different set of perms you had set on /etc manually? Any other
>> indication that you've been exploited, or just a hunch based on
>> circumstantial weirdness based on unexpected /etc privs and bastille?
>>
>> Best regards,
>> -Chris
>>
>> Boyd Stephen Smith Jr. wrote:
>>
>>> On Wednesday 11 February 2009 23:26:45 Stan Katz wrote:
>>>
>>>
>>>> I updated/upgraded both my AMD64 and AMD k6 "Etch" machines between Feb
>>>> 10-11, 2009 using "Lenny" test. Both picked up a symptom I haven't seen
>>>> since the lpd exploit of the 1990's. This symptom manifests itself as
>>>> either a random escalation of the etc directory mode up to 600, or a
>>>> consistent escalation to mode 600 upon reboot.
>>>>
>>>>
>>>
>>> My /etc is mode 755.  Why would that be a problem?  Some user/programs
>>> may need to read data out of the directory and root (the owner of my /etc)
>>> certainly needs write permissions.
>>>
>>>
>>>
>>>> I don't remember why the lpd
>>>> exploit did this. If this is an exploit, it shakes my confidence in
>>>> debian
>>>> online updating.
>>>>
>>>>
>>>
>>> I don't see how a 600 /etc can be exploited.  Do you have any other
>>> records that would indicate you are exploited, or is this just
>>> fear-mongering?
>>>
>>>
>>>
>>>> Also, the Bastille firewall on the
>>>> AMD64 began locking down port 80 after about 10min of operation. Adding
>>>> 80
>>>> to all interfaces didn't help. Only shutting down Bastille cleared the
>>>> block.
>>>>
>>>>
>>>
>>> Sounds like a bug in Bastille.  Can you reproduce reliably?  Have you
>>> checked your configuration?  If both, has you filed a bug yet?
>>>
>>>
>>>
>>>> I fear this is another indication of the exploit.
>>>>
>>>>
>>>
>>> How/Why would these be related?
>>>
>>>
>>>
>>>> Has anyone else experienced this misbehavior after an upgrade?
>>>>
>>>>
>>>
>>> Not here.  I've been running Lenny for a number of months.
>>>
>>>
>>>
>>>> Any
>>>> suggestions, other than a complete disk wipe on both machines? In any
>>>> case,
>>>> where would I go for a trusted rebuild, if there truly is a sabateur in
>>>> the
>>>> ranks of the Debian maintainers?
>>>>
>>>>
>>>
>>> I'm forwarding to debian-security; perhaps they will have suggestions.
>>>  This topic is more appropriate for that list than debian-user anyway.
>>>
>>>
>>
>

Reply via email to