pam_ldap + nss_ldap, su(1), group wheel and pam_group

2011-05-31 Thread Lev Serebryakov
, but I affraid, that this inconsistency could bite somewhere else, and in any case, I want su(1) to work :) Is here any reasons why pam_group(8) is inconsistent with id(1) in way to determine ti which groups user belongs? -- // Black Lion AKA Lev Serebryakov __

How to add new audit class?

2011-06-26 Thread Lev Serebryakov
I edit audit_event(5) file, as it seems, that one event could belong only to one class, and I don't want to remove these events from their natural classes. -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list h

OpenBSM: does somebody work on it?

2011-06-29 Thread Lev Serebryakov
ut does somebdy but me need it? Does somebody use audit on FreeBSD on production systems? -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send

Re: OpenBSM: does somebody work on it?

2011-06-29 Thread Lev Serebryakov
m ftpd doesn't use setaudit() :( -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

More questions about audit

2011-06-29 Thread Lev Serebryakov
all users, and, yes, auditreduce -r USER /dev/auditpipe0 | praudit shows activity after login... What do I do wrong? P.S. Maybe, here is more adequate list for BSM Audit questions? -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.

Re: PAM modules

2011-09-17 Thread Lev Serebryakov
ry. Minimal ldap client, nss/pam_ldap and SSH keys in LDAP out-of-box is great! But it is disagree with trend to stirp-down base system :( -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd

Re: PAM modules

2011-09-17 Thread Lev Serebryakov
ese ldap-related modules are strange in their desire to have config files like "ldap.conf" :) -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To uns

Re: PAM modules

2011-09-20 Thread Lev Serebryakov
based on asn.1 to C compiler from Lev Walkin (http://lionet.info/asn1c/blog/)? ;-) Client-only part doesn't look very hard to implement, when all boilerplate code (packing/unpacking/network processing, etc) is auto-generated from RFCs. -- // Black Li

Re: PAM modules

2011-09-20 Thread Lev Serebryakov
point, that if we want our own LDAP client library, we don't need to write tons of non-obvious, error-prone and security-sensitive code by hands. -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.free

pam_ldap and nss_ldap : checken and egg problem with "wheel" group and "su" utility

2011-09-22 Thread Lev Serebryakov
only "root" member (as all other members are in LDAP), system never takes "wheel" members from LDAP (because /etc/group has priority) and "su" doesn't work! What is proper way to resolve this problem? -- // Black Lion AKA Lev Serebryakov ___

Re: pam_ldap and nss_ldap : checken and egg problem with "wheel" group and "su" utility

2011-09-23 Thread Lev Serebryakov
Hello, Dag-Erling. You wrote 22 сентября 2011 г., 19:21:27: > Lev Serebryakov writes: >> But when "wheel" is in /etc/group with only "root" member (as all >> other members are in LDAP), system never takes "wheel" members from >> LDAP (because /e

Re: pam_ldap and nss_ldap : checken and egg problem with "wheel" group and "su" utility

2011-09-26 Thread Lev Serebryakov
Hello, Rene. You wrote 26 сентября 2011 г., 15:07:09: > Why not have /etc/group be authoritive for wheel (an thus have a list > of local superusers). Idea is to have no local users (but root) at all :) -- // Black Lion AKA Lev Sereb

Re: HSM in Freebsd

2012-05-14 Thread Lev Serebryakov
hor), it is ass in pain have 3rd party modules/drivers in system. -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "

Re: Default password hash

2012-06-11 Thread Lev Serebryakov
.ietf.org/html/rfc2898 [2] http://static.usenix.org/events/usenix99/provos/provos_html/node1.html [3] http://www.tarsnap.com/scrypt.html -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailm

Re: FreeBSD needs Git to ensure repo integrity [was: 2012 incident]

2012-11-18 Thread Lev Serebryakov
is repo aren't signed by developers../ -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: OpenSSH, PAM and kerberos

2013-09-03 Thread Lev Serebryakov
ld be called by sshd, not some "authorization daemon", if I understand situation right. Or don't I? -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security

Re: OpenSSH, PAM and kerberos

2013-09-03 Thread Lev Serebryakov
ot;authorization SO> daemon" can't be set environment in other process. des@ suggests to have ability to pass env variables from authorization daemon, but anyway, pam_setcred() should be called by shell process (or its parent), and not any process in system, am I right? -- /

Re: OpenSSH, PAM and kerberos

2013-09-03 Thread Lev Serebryakov
verything pam_setcred() does can be done in a separate process, and the DES> result returned to the application using sendmsg(). Why do we need separate daemon for it? Why it could not be built-in to sshd itself? One more daemon -- one more point of failure... -- // Black

Re: OpenSSH, PAM and kerberos

2013-09-03 Thread Lev Serebryakov
s. -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Re: OpenSSH, PAM and kerberos

2013-09-03 Thread Lev Serebryakov
this by farming PAM out to a child DES> process. And, IMHO, proper way to fix this bug is to fix it here, as "most of things" is already done. -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lis

Re: OpenSSH, PAM and kerberos

2013-09-03 Thread Lev Serebryakov
need this functionality too? ftpd(8)? Is it affected? But I'm not sure, that ftpd(8) needs something like this at all, as I could not imagine any kerberized / single login application run with ftpd as parent. Maybe, my imagination is poor. And, yes, what do you mean by "fundamentally br

Re: OpenSSH, PAM and kerberos

2013-09-03 Thread Lev Serebryakov
d gain here looks to be little, especially for things like sshd, where all user input is received via well-defined protocol with packet lengths, MACs and user input is almost sanitized by this level -- only thing which could be invalid is zero bytes in text data. Do you have any examples, how th

Re: OpenSSH, PAM and kerberos

2013-09-04 Thread Lev Serebryakov
Hello, Dag-Erling. You wrote 4 сентября 2013 г., 11:53:14: DES> Lev Serebryakov writes: >> Accept input from hostile user is huge security issue per se? Ouch. In >> modern world there are only hostile users. Yes, all our software has >> huge security issue, I know that :

Re: OpenSSH, PAM and kerberos

2013-09-04 Thread Lev Serebryakov
ich doesn't know about this new API (ouch, I don't like this part). (10) Many backends should be re-implemented from NSS or PAM API (and I don't like this one too). Generic wrappers for NSS and/or PAM modules looks complicated and, ag

Re: OpenSSH, PAM and kerberos

2013-09-04 Thread Lev Serebryakov
S> Malta in a couple of weeks, which will focus less on the problem and DES> more on the solution. Thank you! I'm regretting, I will not be at Malta :( But tickets from Russia are really expensive :( -- // Black Lion AKA Lev Serebryakov

Re: FreeBSD Transient Memory problem?

2013-09-12 Thread Lev Serebryakov
o, yet, it is their level of competence, but you could not pass around them, if you want official PCI/DSS certification, for example. Did you seen this epic thread on stackoverflow (or its devops/sysops counterpart) about "log file with every login of each user with password in clea

Re: FreeBSD Transient Memory problem?

2013-09-14 Thread Lev Serebryakov
ter could avoid certificate, for example (I don't say, that it is so for EVERY certification, but formal, bank- or government-recognized security ones typically are SUCH strict). -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebs

Re: OpenSSL static analysis, was: De Raadt + FBSD + OpenSSH + hole?

2014-05-01 Thread Lev Serebryakov
have any real memory-model described, so it is very hard to reason about this C code, if it i C. -- // Black Lion AKA Lev Serebryakov ___ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Encrypted user home dirs with NFS/SMB/local (ssh and true local) access without additional passwords — is it possible?

2015-04-03 Thread Lev Serebryakov
er FreeBSD system via NFS. So, overlay FS with per-file encryption is not a solution, as SMB-only users could not call "mount" and enter password. full-disk encryption is not a solution too, as "root" could read all files in such case, as here is no encryption at all. Is it

FreeBSD + Yubikey NEO in OATH-HOTP mode?

2015-07-09 Thread Lev Serebryakov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Does somebody succeed to setup FreeBSD for usage with Yubikey NEO token without Yubico authentication service, with OATH-HOTP? - -- // Lev Serebryakov -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.22 (MingW32) iQJ8BAEBCgBmBQJVnp4

Re: FreeBSD + Yubikey NEO in OATH-HOTP mode?

2015-07-09 Thread Lev Serebryakov
do the offline auth, but this > seems to be documented well in ykpamcfg(1) ykpamcfg(1) documents challenge-response which is for local usage, as it needs two-way communication with token. I'm trying to install security/oathtoolkit but I don't understand which parameters in use

Where 3rd-party PAM modules should be placed?

2015-07-09 Thread Lev Serebryakov
ult on 10-STABLE, modules from `${LOCALBASE}/lib/security' can not be loaded by name (without full path) in PAM configuration file. Which place is correct? I like `${LOCALBASE}/lib/security', but using full pathnames looks ugly! - -- // Lev Serebryakov -BEGIN P

Re: Where 3rd-party PAM modules should be placed?

2015-07-09 Thread Lev Serebryakov
ield specifies the name or full path of the module to call. If only the name is specified, the PAM library will search for it in the following locations: 1. /usr/lib 2. /usr/local/lib - -- // Lev Serebryakov -BEGIN PGP SIGNATURE- Ver

Does audit_control's "expire-after" by size works?

2016-01-09 Thread Lev Serebryakov
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 I have this: expire-after:356d AND 5G and now my /var/audit contains 1 year of files, but it takes 105 gigabytes (!). It is FreeBSD 10.2-STABLE r286784 - -- // Lev Serebryakov AKA Black Lion -BEGIN PGP SIGNATURE- Version: GnuPG

Re: Does audit_control's "expire-after" by size works?

2016-01-09 Thread Lev Serebryakov
Hello Terje, Saturday, January 9, 2016, 11:55:42 PM, you wrote: >> expire-after:356d AND 5G >> >> and now my /var/audit contains 1 year of files, but it takes 105 >> gigabytes (!). >> >> It is FreeBSD 10.2-STABLE r286784 > I don't recall how that limit is implemented, but it could be related t

Size of audit trace files: something changed between

2016-01-09 Thread Lev Serebryakov
Hello Freebsd-security, I have /etc/security/audit_control configured to have 200M trace files and "audit -n" is scheduled to run twice a day, at 00:00 and 12:00. Old trace files looks Ok (it is November 2015): -r--r- 1 rootaudit 209715488 Nov 16 19:05 2015111609.2015111616

Re: Does audit_control's "expire-after" by size works?

2016-01-09 Thread Lev Serebryakov
Hello Terje, Saturday, January 9, 2016, 11:55:42 PM, you wrote: > I don't recall how that limit is implemented, but it could be related to this: Looks like I could not understand man page right :) Expiration with AND is by time, and size is additional condition. So, "365 AND 5G" could leave an

WPA2 vulnerabilities — is FreeBSD-as-AP affected?

2017-10-16 Thread Lev Serebryakov
/ wpa_supplicant) affected? -- // Lev Serebryakov signature.asc Description: OpenPGP digital signature

Re: Intel hardware bug

2018-01-03 Thread Lev Serebryakov
Hello Joey, Wednesday, January 3, 2018, 4:56:50 AM, you wrote: > No way around it. It's hardware FAIL, and ignoring it isn't an option since > it's apparently a huge hole. Looks like there IS way around it and it was "silently" committed to Linux http://pythonsweetness.tumblr.com/post/169166980

clang way to patch for Spectre?

2018-01-04 Thread Lev Serebryakov
Hello Freebsd-security, https://reviews.llvm.org/D41723 -- Best regards, Lev mailto:l...@freebsd.org ___ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, s

Re: clang way to patch for Spectre?

2018-01-04 Thread Lev Serebryakov
Hello Julian, Thursday, January 4, 2018, 8:49:50 PM, you wrote: >> https://reviews.llvm.org/D41723 >> >> > not really.. > What's to stop an unprivileged used bringing his own compiler? or a > precompiled binary? As far as I understand, Spectre can not cross boundaries, so precompiled binary will

Are somebody developing support for ChaCha20-Poly1305 support in IPsec (RFC7634)?

2018-10-15 Thread Lev Serebryakov
Now, when FreeBSD 12 have ChaCha20 and Poly1305 support in kernel, are here any plans to add support of RFC7634 to IPsec? -- // Lev Serebryakov ___ freebsd-security@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-security

cryptodev / softcrypto — are here any plans to cleanup it?

2018-10-16 Thread Lev Serebryakov
h algorithms, but it is mostly unused. There is no way to re-key encryption without re-allocating context ("key" or "schedule", even naming is not consistent). Ouch. As I could see by commits, there was some simplifications , but, maybe, here is project to cleanup this s

Re: Spoiler Alert

2019-03-06 Thread Lev Serebryakov
On 05.03.2019 22:55, Shawn Webb wrote: >> This came over my phone's news feed. Another example that Colin Percival was >> right when he wrote his paper on exploiting cache for fun and profit many >> years ago. > > Weird machines are weird. Not-weird machines