From: SUGIOKA Takashi <taka@msr.mei.co.jp>
Real-Date: Wed, 11 Aug 93 21:14:35 +0900
Subject: [infotalk,00282] Re: how to screen out certain directories
Message-Id: <9308111214.AA11630@layla.msr.mei.co.jp>
こんにちは、杉岡@松下ソフトリサーチです。
> 慶應理工学部計算センターでサービスしている、
> gopher では学内向けの gopher サーバを立ち上げまして、
> 学内のみ向けのサービスは world readble なサーバから
> 学内専用サーバにリンクを張っています。
>
> bash.cc.keio.ac.jp:port 70 に入りますと学内向けの物はリンク先が
> bash.cc.keio.ac.jp:port 7996 になります。
>
> そして port 7996 の gopherd.conf 内で利用制限をしています。
なるほど、そういう設定になっていたのですね。
さらに質問なのですが、 gopherd.confの中での利用制限はマシン名で制限する以
外にsubnetとか、domain名とかでアクセスの制限を書くことはできないのでしょう
か?
ご存知でしたら教えて下さい。
> あれ、クライアントだったら ftp 経由のファイルか普通のファイルか
> なんか知る分け無いから杉岡さんのパッチはサーバの方に対するパッチ
> ですよね。(ファイル名からも明らかですが)
はい、そうです。
話をごっちゃにしてしまって、申し訳ありませんでした。
=============================================
杉岡 隆司 taka@msr.mei.co.jp
(株)松下ソフトリサーチ 第三開発部 第三開発室
From: Kimio Ishii <ishii@sfc.wide.ad.jp>
Real-Date: Wed, 11 Aug 1993 08:13:32 +0900
Subject: [infotalk,00281] ["Takashi Ichihara: CERT Advisory - UMN UNIX gopher and gopher+ Vulnerabilities]
Message-Id: <9308102313.AA03854@endo.sfc.wide.ad.jp>
いしい@SFCと申します。いままでリードオンリーでしたが、、、
このメールもらっている人もいるとは思いますが、一応フォワードしておきま
す。悪人がいないのを祈りつつ、、、:)
------- Forwarded Message
Received: from sh.wide.ad.jp by endo.sfc.wide.ad.jp (5.67+1.6W/2.7W)
id AA01062; Wed, 11 Aug 93 01:00:39 +0900
Received: from sh.nic.ad.jp by sh.wide.ad.jp (5.67+1.6W/2.8Wb-sh.wide/1.9)
id AA24318; Wed, 11 Aug 93 00:47:50 JST
Received: by sh.nic.ad.jp (5.67+1.6W/6.4JAIN-1.1)
id AA21240; Wed, 11 Aug 93 00:52:00 JST
Return-Path: <ip-connection-request@nic.ad.jp>
Date: Wed, 11 Aug 1993 00:51:50 JST
From: "Takashi Ichihara <ichihara@rikvax.riken.go.jp>"
<ichihara@rikvax.riken.go.jp>
To: ip-connection@nic.ad.jp
Message-Id: <00970D6A.29ECFA80.30721@rikvax.riken.go.jp>
Subject: CERT Advisory - UMN UNIX gopher and gopher+ Vulnerabilities
Errors-To: owner-ip-connection@nic.ad.jp
Sender: ip-connection-request@nic.ad.jp
===========================================================================
CA-93:11 CERT Advisory
August 9, 1993
UMN UNIX gopher and gopher+ Vulnerabilities
- ---------------------------------------------------------------------------
The CERT Coordination Center has received information concerning
vulnerabilities in versions of the UMN UNIX gopher and gopher+ server and
client available before August 6, 1993. Vulnerable versions were available on
boombox.micro.umn.edu:/pub/gopher/Unix/gopher1.12s.tar.Z,
boombox.micro.umn.edu:/pub/gopher/Unix/gopher2.03.tar.Z, and many other
anonymous FTP sites mirroring these software versions.
We strongly recommend that any site using versions of UMN UNIX gopher
and gopher+ dated prior to August 6, 1993 (including version 1.12, 1.12s,
2.0+, 2.03, and all earlier versions) immediately take corrective action.
If you have further questions regarding UMN UNIX gopher or gopher+ software,
send e-mail to: gopher@boombox.micro.umn.edu
- ---------------------------------------------------------------------------
I. Description
Several vulnerabilities have been identified in UMN UNIX gopher and
gopher+ when configured as a server or public access client.
Intruders are known to have exploited these vulnerabilities to obtain
password files. Other actions may also have been taken by intruders
exploiting these vulnerabilities. CERT has already contacted those
sites currently known to have been victims of these activities. However,
sites may want to check for weak passwords, or consider changing
passwords, after installing the new gopher software.
II. Impact
Anyone (remote or local) can potentially gain unrestricted access
to the account running the public access client, thereby permitting
them to read any files accessible to this account (possibly including
/etc/passwd or other sensitive files).
In certain configurations, anyone (remote or local) can potentially
gain access to any account, including root, on a host configured as a
server running gopherd.
III. Solution
Affected sites should consider disabling gopherd service and public gopher
logins until they have installed the new software.
New versions of the UMN UNIX gopher and gopher+ software have been
released that provide bug fixes and correct these security problems.
Sites can obtain these new versions via anonymous FTP from
boombox.micro.umn.edu (134.84.132.2). The files are located in:
Filename Size Checksum
-------- ------ -----------
Gopher:
/pub/gopher/Unix/gopher1.12S.tar.Z 306872 46311 300
Gopher+:
/pub/gopher/Unix/gopher2.04.tar.Z 294872 29411 288
- ---------------------------------------------------------------------------
The CERT Coordination Center wishes to thank Matt Schroth, Williams College,
and others for informing us of these vulnerabilities. We would also like to
thank Paul Lindner, University of Minnesota, for his quick response to these
problems.
- ---------------------------------------------------------------------------
If you believe that your system has been compromised, contact the CERT
Coordination Center or your representative in FIRST (Forum of Incident
Response and Security Teams).
Internet E-mail: cert@cert.org
Telephone: 412-268-7090 (24-hour hotline)
CERT personnel answer 8:30 a.m.-5:00 p.m. EST(GMT-5)/EDT(GMT-4),
and are on call for emergencies during other hours.
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh, PA 15213-3890
Past advisories, information about FIRST representatives, and other information
related to computer security are available for anonymous FTP from cert.org
(192.88.209.5).
------- End of Forwarded Message