Gentoo Archives: gentoo-security

From: Douglas Breault Jr <GenKreton@×××××××.net>
To: gentoo-security@l.g.o
Subject: Re: [gentoo-security] Running untrusted software
Date: Wed, 18 Jan 2006 15:41:29
Message-Id: 43CE5EEB.4040209@comcast.net
In Reply to: Re: [gentoo-security] Running untrusted software by Oliver Schad
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: RIPEMD160
3
4 I need to run this CSA in order to gain access to the network. I don't
5 trust the network much either, but I am always using OpenVPN, which I
6 trust completely. Currently I can access the network, and ergo my vpn
7 without this, but after the 26th that all changes.
8
9 I will definitely look into grsec but it seems complicated. Regardless I
10 require a viable solution and I will take the steps necessary,
11 regardless of complication.
12
13 Is there a way to try and trace what the binary wants to do? I'm aware i
14 could run strace on it and ethereal to capture what it transmits... But
15 is there more I can do?
16
17 Thanks,
18 Douglas Breault Jr.
19
20
21
22 Oliver Schad wrote:
23 > Am Mittwoch, 18. Januar 2006 15:58 schrieb mir Douglas Breault Jr:
24 >> I am being forced to run software on my computer that I do not
25 >> inherently trust. It is supposed to collect a few pieces of
26 >> information, mainly my mac addresses and use the network. It is a
27 >> one-time use CSA (client security agent). It uses a csh script to
28 >> unpack a "proprietary binary" that we cannot see the source. There is
29 >> no assurance it doesn't collect other information or change anything
30 >> on my computer.
31 >
32 > If you don't trust this software don't use it in trusted environment
33 > which includes trusted system and trusted network.
34 >
35 >> I was curious as to what is the best way to handle this and
36 >> situations like these. In this instance, I was assuming downloading,
37 >> and running on a LiveCD would seem like the best policy.
38 >
39 > Is your host in a trusted network?
40 >
41 >> What if it
42 >> uses methods to discover that and I need to run it on my real
43 >> installation? Is a chroot jail the next best thing?
44 >
45 >>From a chroot environment you can easily escape on a standard kernel.
46 > Grsec offers a real chroot jail.
47 >
48 >> As far as I know,
49 >> to make a chroot jail I merely copy programs and libraries inside a
50 >> folder with the proper / hierarchy and chroot into it. Is it more
51 >> complex than this and are there any guides?
52 >
53 > # esearch jail
54 >
55 > Best Regards
56 > Oli
57 >
58
59
60 - --
61 How do I know the past isn't fiction designed to account for the discrepancy
62 between my immediate physical sensations and my state of mind?
63
64 /~\ The ASCII Douglas Breault Jr. <GenKreton at comcast dot net>
65 \ / Ribbon Campaign GnuPG public key ID: C4E44A19 (pgp.mit.edu)
66 X Against HTML Key fingerprint:
67 / \ Email! 21C3 F37D A8F5 1955 05F2 9A69 92A0 C177 C4E4 4A19
68 -----BEGIN PGP SIGNATURE-----
69 Version: GnuPG v1.4.2 (GNU/Linux)
70
71 iD8DBQFDzl7okqDBd8TkShkRAyY9AKDfJlalc++hxQO7C2c05UWquNfZxACg1h56
72 Z3g7bxK1AowT9FL+B2mXq0c=
73 =rmk5
74 -----END PGP SIGNATURE-----
75 --
76 gentoo-security@g.o mailing list

Replies

Subject Author
Re: [gentoo-security] Running untrusted software Oliver Schad <o.schad@×××.de>
Re: [gentoo-security] Running untrusted software Brandon Edens <brandon@××××××.edu>