oss-sec mailing list archives
Re: Re: Some fun with tcp_wrappers
From: Tomas Hoger <thoger () redhat com>
Date: Thu, 16 Apr 2009 13:36:58 +0200
Hi Steve! On Wed, 15 Apr 2009 20:44:49 -0400 (EDT) "Steven M. Christey" <coley () linus mitre org> wrote:
I'm not sure how to handle this from a CVE perspective
I'm not too surprised... This is not too usual case, that's why I tried to initiate this discussion here and make others aware.
- if the API functions perform as documented, as Wietse says, then separate CVEs would need to be assigned for applications that misuse the API. - If there is a separate bug that causes tcp_wrappers to allow hosts in ways that are contrary to specification, then that would be treated as a problem in tcp_wrappers (whether it's from Wietse or some downstream modification).
Wietse already confirmed current behavior is the expected one, which is what I mentioned before in both bug and the first mail in this thread. It can be argued whether it's also documented one, as man more reads to me as STRING_UNKNOWN is some special value, rather than a regular hostname "unknown". Wietse, I'm not trying to blame you for this or anything, I'm only facing a problem that needs to be resolved. The fact that the proposed change is already included in tcp_wrappers packages in Fedora for some time (so the "break compatibility" harm was done already) is part of the problem. Making sure all relevant applications are changed upstream to not use hosts_ctl and later reverting the change is one of the possible resolutions. The good_client (tcp_wrappers wrapping function in portmap / nfs-utils / ...) problem is rather interesting too, as it creates problems due to its attempt to avoid unneeded DNS lookups (workaround for hosts_ctl limitation?) and support host aliases (tcp_wrappers limitation). Any idea why hostname alias support was coded on the application level, rather than on the tcp_wrappers level? Those using good_client may argue, that using thinner wrapper over tcp_wrappers may break existing setups relying on hostname aliases and, again, blame tcp_wrappers for not doing what "it should". Steve, giving CVEs to applications wouldn't be much easier either, and is likely to result in some finger-pointing anyway (this only causes problem with hostname-bases rules, such rules should be more strongly discouraged in the documentation anyway, due to reliance on properly working DNS). No easy or obvious right way to word it at the moment, it seems. Apps using good_client are likely to need separate CVE(s) though. -- Tomas Hoger / Red Hat Security Response Team
Current thread:
- Some fun with tcp_wrappers Tomas Hoger (Apr 15)
- Re: Some fun with tcp_wrappers Wietse Venema (Apr 15)
- Re: Re: Some fun with tcp_wrappers Tomas Hoger (Apr 15)
- Re: Re: Some fun with tcp_wrappers Wietse Venema (Apr 15)
- Re: Re: Some fun with tcp_wrappers Tomas Hoger (Apr 15)
- Re: Re: Some fun with tcp_wrappers Wietse Venema (Apr 15)
- Re: Re: Some fun with tcp_wrappers Wietse Venema (Apr 15)
- Re: Re: Some fun with tcp_wrappers Steven M. Christey (Apr 15)
- Re: Re: Some fun with tcp_wrappers Tomas Hoger (Apr 16)
- Re: Re: Some fun with tcp_wrappers Wietse Venema (Apr 16)
- Re: Re: Some fun with tcp_wrappers Tomas Hoger (Apr 16)
- Re: Re: Some fun with tcp_wrappers Wietse Venema (Apr 16)
- Re: Re: Some fun with tcp_wrappers Steven M. Christey (Apr 24)
- Re: Re: Some fun with tcp_wrappers Tomas Hoger (Apr 28)
- Re: Re: Some fun with tcp_wrappers Tomas Hoger (Apr 15)
- Re: Some fun with tcp_wrappers Wietse Venema (Apr 15)
- Re: Re: Some fun with tcp_wrappers Tomas Hoger (Apr 16)
- Re: Re: Some fun with tcp_wrappers Wietse Venema (Apr 16)