Security
Anonym.OS: providing internet anonymity
Internet anonymity has started to become a mainstream issue, even covered by the New York Times (registration required) and a newly released project is specifically geared towards providing users with a safer, more anonymous, internet experience. Anonym.OS is an OpenBSD-based live CD that attempts to provide the average user with the same levels of privacy that are available to more technically savvy users.Anonym.OS uses a variety of techniques to provide security and anonymity, starting with changing the TCP parameters to give the impression that it is running Windows XP in order to blend in. It provides very strong firewall protections, disallowing any inbound traffic and only allowing encrypted and/or anonymized traffic outbound.
Tor (aka The Onion Router) provides the underlying infrastructure for anonymity by routing TCP packets through random nodes in the Tor network, with separate encryption for each hop in the route. This routing makes it difficult to determine where a particular Tor client is connecting to (or from), though large adversaries who can monitor large sections of the net can still use statistical correlations of the packet timings to determine source and destination as described in the Tor FAQ.
Another component of Anonym.OS is Privoxy, which is a web proxy that provides a variety of privacy features such as cookie management, 'web bug' disabling, and bypassing various click-tracking scripts. Privoxy also provides DNS lookup anonymity to mask which domains a user is looking up.
After booting and configuring a root password, network parameters and the like, Anonym.OS presents a standard looking desktop with Firefox, Thunderbird and Gaim as icons. These applications will use Tor and have been configured to promote privacy, particularly in Firefox, by alerting about cookies and not saving passwords or form data.
The user experience is fairly slow, largely because of Tor, but loading programs from the CD also seems to take quite a while. Anonymity is not free nor particularly fast. Web pages take roughly 5-10 times as long to load and ssh sessions remind one of the glory days of 110 baud acoustic coupler modems. Tor is a work in progress and will likely get faster and find ways to make interactive (ssh) performance better but taking multiple hops through the network is always going to have a cost.
There are two Linux based projects with similar goals, and which also use Tor: Phantomix based on KNOPPIX, and ELE based on Damn Small Linux. Because of its vaunted "security by default", OpenBSD advocates would probably scoff at using Linux for a system of this sort, but the same software and techniques used by Anonym.OS are available for Linux.
Anonym.OS is clearly a boon for people with a strong need for anonymity on the internet and who either do not have the technical ability to set this up for themselves or who may use computers that are not under their control. Anonymous bloggers, folks who are worried that their government might get access to web logs from their favorite search engine, whistleblowers and others who might aggravate large, deep-pocketed organizations could certainly find a use for Anonym.OS. One does need a strong reason to do so, however, as using it can be very slow and painful.
New vulnerabilities
crawl: insecure program execution
Package(s): | crawl | CVE #(s): | |||||
Created: | January 23, 2006 | Updated: | January 25, 2006 | ||||
Description: | Steve Kemp from the Debian Security Audit project discovered a security related problem in crawl, another console based dungeon exploration game in the vein of nethack and rogue. The program executes commands insecurely when saving or loading games which can allow local attackers to gain group games privileges. | ||||||
Alerts: |
|
flyspray: missing input sanitizing
Package(s): | flyspray | CVE #(s): | CVE-2005-3334 | ||||
Created: | January 24, 2006 | Updated: | January 25, 2006 | ||||
Description: | Several cross-site scripting vulnerabilities have been discovered in flyspray, a lightweight bug tracking system, which allows attackers to insert arbitrary script code into the index page. | ||||||
Alerts: |
|
imagemagick: arbitrary command execution
Package(s): | imagemagick | CVE #(s): | CVE-2005-4601 CVE-2006-0082 | ||||||||||||||||||||||||||||||||||||
Created: | January 24, 2006 | Updated: | March 24, 2006 | ||||||||||||||||||||||||||||||||||||
Description: | Florian Weimer discovered that the delegate code did not correctly handle file names which embed shell commands (CVE-2005-4601). Daniel Kobras found a format string vulnerability in the SetImageInfo() function (CVE-2006-0082). By tricking a user into processing an image file with a specially crafted file name, these two vulnerabilities could be exploited to execute arbitrary commands with the user's privileges. These vulnerability become particularly critical if malicious images are sent as email attachments and the email client uses imagemagick to convert/display the images (e. g. Thunderbird and Gnus). | ||||||||||||||||||||||||||||||||||||||
Alerts: |
|
kdelibs: heap overflow
Package(s): | kdelibs | CVE #(s): | CVE-2006-0019 | ||||||||||||||||||||||||||||||||||||
Created: | January 19, 2006 | Updated: | March 17, 2006 | ||||||||||||||||||||||||||||||||||||
Description: | Konqueror's kjs JavaScript interpreter engine has a heap overflow vulnerability. Specially crafted JavaScript code could be placed on a web site, leading to arbitrary code execution. Other kde applications are also subject to this vulnerability. | ||||||||||||||||||||||||||||||||||||||
Alerts: |
|
kernel multiple vulnerabilities
Package(s): | kernel | CVE #(s): | CVE-2005-3527 CVE-2005-3783 CVE-2005-3784 CVE-2005-3805 CVE-2005-3806 CVE-2005-3808 | ||||||||||||||||||||||||||||||||||||||||||||||||
Created: | January 20, 2006 | Updated: | April 18, 2006 | ||||||||||||||||||||||||||||||||||||||||||||||||
Description: | Here's another set of vulnerabilities in the Linux kernel:
| ||||||||||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
OpenSSH: double shell expansion
Package(s): | openssh | CVE #(s): | CVE-2006-0225 | ||||||||||||||||||||||||||||||||||||||||
Created: | January 23, 2006 | Updated: | July 20, 2006 | ||||||||||||||||||||||||||||||||||||||||
Description: | OpenSSH has a double shell expansion vulnerability in local to local and remote to remote copy with scp. | ||||||||||||||||||||||||||||||||||||||||||
Alerts: |
|
tetex: integer overflows
Package(s): | tetex | CVE #(s): | CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 CVE-2005-3624 CVE-2005-3625 CVE-2005-3626 CVE-2005-3627 CVE-2005-3628 | ||||||||||||||||
Created: | January 19, 2006 | Updated: | May 23, 2006 | ||||||||||||||||
Description: | The teTeX PDF parsing library has an integer overflow vulnerability. A carefully crafted PDF file can be used by an attacker to crash teTeX and possibly execute arbitrary code. | ||||||||||||||||||
Alerts: |
|
trac: missing input sanitizing
Package(s): | trac | CVE #(s): | CVE-2005-4065 CVE-2005-4644 | ||||||||
Created: | January 23, 2006 | Updated: | January 30, 2006 | ||||||||
Description: | Several vulnerabilities have been discovered in trac, an enhanced wiki and issue tracking system for software development projects. Due to missing input sanitizing it is possible to inject arbitrary SQL code into the SQL statements (CVE-2005-4065). A cross-site scripting vulnerability has been discovered that allows remote attackers to inject arbitrary web script or HTML (CVE-2005-4644). | ||||||||||
Alerts: |
|
Resources
Getting Started with Multi-Category Security (MCS)
James Morris has put up a look at multi-category security from an administrator's point of view. "In a corporate environment, categories could be used to identify documents confidential to specific departments, or being covered under certain NDAs. So, when jose prepares a report on payroll statistics for the month, he can label it as 'Payroll', which will not be accessible by lara, who only has access to the 'Finance' category."
Privacy for People Who Don't Show Their Navels (NY Times)
The New York Times (registration required) has published an article about privacy technologies, with a special mention of Tor. "'I get the feeling it's going up,' said Roger Dingledine, Tor's project leader. 'But one of the features I've been adding recently,' he said, enhances anonymity protection by making it harder to count downloads of the software. Still, the number of servers forming layers in the Tor network has risen to 300 from 50 in the last year, Mr. Dingledine added."
Page editor: Jonathan Corbet
Next page:
Kernel development>>