|
|
Subscribe / Log in / New account

Security

Trackerless torrents

May 25, 2005

This article was contributed by Joe 'Zonker' Brockmeier.

The BitTorrent file sharing system is in the news this week for a couple of reasons. The first of those is that BitTorrent has announced a beta with "Trackerless" publishing, which allows users to share files without maintaining a centralized tracker. The protocol is also in the news, predictably, due to the release of "Star Wars III: Revenge of the Sith." The Motion Picture Association of America (MPAA) has used the publicity around the movie to launch another attack on BitTorrent. Predictably, "Sith" did end up being available via BitTorrent, and 20th Century FOX is already issuing takedown notices to ISPs.

The trackerless technology is also getting attention as a tool to share illegal content, with no mention of the legitimate uses of BitTorrent. Given the coverage of "trackerless" BitTorrents so far, some might think that offering a "trackerless" BitTorrent would prevent detection by companies like BayTSP. However, "trackerless" is a far cry from anonymous. While a tracker site presents an obvious target for entertainment industry lawyers, there's nothing about so-called trackerless publishing that prevents detection.

As one might have surmised already, trackerless is actually a misnomer. In fact, as the BitTorrent press release acknowledges, it's actually a "lightweight tracker." To share a "trackerless" file, a user generates a .torrent file in much the same way that one would generate a normal .torrent tracker. This file still need to be published via a website and public Internet connection. As the BitTorrent page says, "Anyone with a website and an Internet connection can host a BitTorrent download!" Individuals who share files using trackerless BitTorrent may have a better chance of flying under the radar, and once a file has been shared by the original owner there's no need for that user to maintain their tracker, but it's not anonymity.

BitTorrent isn't the first to offer trackerless support. The Azureus project, for example, also offers an "embedded tracker" that allows users to share torrents directly. However, the two technologies seem to be incompatible at the moment.

The trackerless system is more convenient for users who are looking to share content legally. Once a user has seeded the network with a file, there's no need for that user to continue hosting their tracker, though this also makes the trackerless system less reliable than having a centralized tracker.

It should also be noted that users should think twice before sharing movies, music or other content illegally. The entertainment industry has traditionally gone after uploaders only, but BitTorrent users who share files are uploaders as well as downloaders.

While LWN would not encourage sharing copyrighted material illegally, there are alternatives for users who want to remain anonymous for other reasons. For example, the Electronic Frontier Foundation has sponsored development of an anonymous system called Tor, which can be used for browsing, publishing, SSH and BitTorrent. We'll be looking at Tor on this page within the next couple of weeks.

Comments (1 posted)

New vulnerabilities

cdrdao: local root vulnerability

Package(s):cdrdao CVE #(s):CAN-2002-0137 CAN-2002-0138
Created:May 19, 2005 Updated:May 25, 2005
Description: The cdrdao CD burning utility has two vulnerabilities. Local users can use the show-data command to read arbitrary files, and local users can overwrite arbitrary files via a symlink attack on the ~/.cdrdao config file. This can be exploited to gain root privileges.
Alerts:
Mandriva MDKSA-2005:089 cdrdao 2005-05-18

Comments (none posted)

cheetah: untrusted module search path

Package(s):cheetah CVE #(s):
Created:May 19, 2005 Updated:May 25, 2005
Description: Cheetah, a Python template engine and code generator, has a vulnerability in the module importing code that can be used by a local user to gain escalated privileges.
Alerts:
Gentoo 200505-14 cheetah 2005-05-19

Comments (none posted)

gdb: multiple vulnerabilities

Package(s):gdb CVE #(s):CAN-2005-1704 CAN-2005-1705
Created:May 20, 2005 Updated:August 11, 2006
Description: Tavis Ormandy of the Gentoo Linux Security Audit Team discovered an integer overflow in the BFD library, resulting in a heap overflow. A review also showed that by default, gdb insecurely sources initialization files from the working directory. Successful exploitation would result in the execution of arbitrary code on loading a specially crafted object file or the execution of arbitrary commands.
Alerts:
Red Hat RHSA-2006:0354-01 elfutils 2006-08-10
Red Hat RHSA-2006:0368-01 elfutils 2006-07-20
Mandriva MDKSA-2005:215 binutils 2005-11-23
Fedora FEDORA-2005-1033 gdb 2005-10-27
Fedora FEDORA-2005-1032 gdb 2005-10-27
Red Hat RHSA-2005:801-01 gdb 2005-10-18
Red Hat RHSA-2005:763-01 binutils 2005-10-11
Red Hat RHSA-2005:709-01 gdb 2005-10-05
Red Hat RHSA-2005:673-01 binutils 2005-10-05
Red Hat RHSA-2005:659-01 binutils 2005-09-28
Fedora FEDORA-2005-498 binutils 2005-06-29
Fedora FEDORA-2005-497 binutils 2005-06-29
Gentoo 200506-01 binutils 2005-06-01
Trustix TSLSA-2005-0025 binutils 2005-05-31
Mandriva MDKSA-2005:095 gdb 2005-05-30
Ubuntu USN-136-2 binutils 2005-05-27
Ubuntu USN-136-1 binutils 2005-05-27
Ubuntu USN-135-1 gdb 2005-05-27
Gentoo 200505-15 gdb 2005-05-20

Comments (5 posted)

libconvert-uulib-perl: arbitrary code execution

Package(s):libconvert-uulib-perl CVE #(s):CAN-2005-1349
Created:May 20, 2005 Updated:January 27, 2006
Description: Mark Martinec and Robert Lewis discovered a buffer overflow in Convert::UUlib (before 1.051), a Perl interface to the uulib library, which may result in the execution of arbitrary code.
Alerts:
Mandriva MDKSA-2006:022 perl-Convert-UUlib 2006-01-26
Debian DSA-727-1 libconvert-uulib-perl 2005-05-20

Comments (1 posted)

Net-SNMP: fixproc insecure temporary file creation

Package(s):net-snmp CVE #(s):CAN-2005-1740
Created:May 23, 2005 Updated:July 13, 2005
Description: The fixproc application of Net-SNMP creates temporary files with predictable filenames.
Alerts:
Fedora FEDORA-2005-561 net-snmp 2005-07-13
Fedora FEDORA-2005-562 net-snmp 2005-07-13
Gentoo 200505-18 net-snmp 2005-05-23

Comments (1 posted)

OpenSSL: information leak

Package(s):openssl CVE #(s):CAN-2005-0109
Created:May 23, 2005 Updated:October 11, 2005
Description: Hyper-Threading technology, as used in FreeBSD other operating systems and implemented on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses. See this LWN article for more information.
Alerts:
Trustix TSLSA-2005-0028 kerberos5, 2005-06-13
Mandriva MDKSA-2005:096 openssl 2005-06-06
Red Hat RHSA-2005:476-01 OpenSSL 2005-06-01
Fedora FEDORA-2005-390 openssl096b 2005-05-23
Fedora FEDORA-2005-389 openssl 2005-05-23

Comments (none posted)

pam: local vulnerability

Package(s):pam CVE #(s):CAN-2003-0388
Created:May 19, 2005 Updated:May 25, 2005
Description: The pam_wheel module has a vulnerability involving the proper manipulation of the /var/log/lastlog entry for users with high UID numbers. Local users can use this to spoof the getlogin() username and obtain root privileges.
Alerts:
Fedora-Legacy FLSA:152771 pam 2005-05-18

Comments (none posted)

ppxp: missing privilege release

Package(s):ppxp CVE #(s):CAN-2005-0392
Created:May 19, 2005 Updated:July 5, 2005
Description: The ppxp PPP program has a log file vulnerability that can allow the root privileges used by the software to remain active, enabling the opening of a root shell by a local user.
Alerts:
Debian DSA-725-2 ppxp 2005-07-04
Debian DSA-725-1 ppxp 2005-05-19

Comments (none posted)

Qpopper: multiple vulnerabilities

Package(s):qpopper CVE #(s):CAN-2005-1151 CAN-2005-1152
Created:May 23, 2005 Updated:May 26, 2005
Description: Jens Steube discovered that Qpopper doesn't drop privileges to process local files from normal users (CAN-2005-1151). The upstream developers discovered that Qpopper can be forced to create group or world writeable files (CAN-2005-1152).
Alerts:
Debian DSA-728-2 qpopper 2005-05-26
Debian DSA-728-1 qpopper 2005-05-25
Gentoo 200505-17 qpopper 2005-05-23

Comments (none posted)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2005, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds