Wietse's tools and papers

This archive is located in the Netherlands at the Eindhoven University of Technology. Some files have a (separate) PGP signature to protect you against trojanized versions.

This is my PGP public key. You can reach me personally at wietse@wzv.win.tue.nl.


Table of Contents


Wietse's Tools

SATAN (satan-1.1.1.tar.Z) (README file) (PGP signature)

For more than one year the most famous piece of Internet vaporware, now materialized and available for all. SATAN closes much of the knowledge gap between intruders and system administrators, by proposing fixes instead of showing how to exploit problems.

This unusual program is the result of an even more unusual cooperation between Wietse Venema and Dan Farmer.

TCP Wrapper (tcp_wrappers_7.2.tar.gz) (BLURB file) (PGP signature)

Wietse Venema's network logger, also known as TCPD or LOG_TCP. These programs log the remote host name of incoming telnet, ftp, ,rsh, rlogin, finger etc. requests. Security options are: access control per host, domain and/or service; detection of host name spoofing or host address spoofing; booby traps to implement an early-warning system. The current version supports the System V.4 TLI network programming interface (Solaris, DG/UX) in addition to the traditional BSD sockets.

Chrootuid (chrootuid1.2.shar.Z) (BLURB file) (PGP signature)

Chrootuid makes it easy to run a network service at low privilege level and with restricted file system access. At Eindhoven University we use this program to run the gopher and www (world-wide web) network daemons in a minimal environment: the daemons have access only to their own directory tree, and run under a low-privileged userid. The arrangement greatly reduces the impact of possible loopholes in daemon software.

Portmap (portmap_3.shar.Z) (BLURB file) (PGP signature)

Replacement portmapper with access control. Makes it somewhat harder to attack your RPC daemons, for example to steal YP password maps or NFS file handles. Must be linked against a library produced with a recent tcp wrapper (log_tcp) release (see above). Tested with Ultrix [34], SunOS 4.1.x, HP-UX 8.0, AIX 3.1.5 (bsdcc compiler with -D_SUN). If you run SunOS 4, the securelib library (see above) is better because it can also cope with direct attacks on your RPC daemons (i.e. attacks without assistance from portmap). SunOS4 users should replace their NIS/portmap daemons with fixed ones from Sun that implement access control (patch 100482-xx).

Rpcbind (rpcbind_1.1.tar.Z) (README file) (PGP signature)

Replacement rpcbind program (the System V.4 portmapper) that prevents intruders from bypassing your NFS export restrictions. Derived from a legal copy of the SunOS 5.3 rpcbind source code.

Logdaemon (logdaemon-4.8.tar.gz) (README file) (PGP signature)

Unproto (unproto5.shar.Z)

A program that turns your traditional C compiler into one that understands a very large subset of ANSI C. Includes stdarg->varargs translation. The program is a wrapper around the C preprocessor that on the fly translates ANSI C to traditional C. It comes with a set of ANSI include files.

Yapasswd (yapasswd.tar.Z) (PGP signature)

Yet another password command for SunOS 4.x and 5.x. No shadow support, uses insecure NIS, but we depend on it anyway.

Agetty (agetty.shar.Z)

A flexible getty (portmon) replacement for System V Release 2, SunOS 4.x, and SunOS 5.x. Automagically adapts to parity settings, erase characters etcetera. This is another program that my sanity depends on when I hook up modems or terminals to my own machines.

surrogate-syslog.tar.Z (PGP signature)

For systems that have no syslog library (or one that does not work). This version logs directly to a file (default /usr/spool/mqueue/syslog). The fakesyslog that comes with nntp seems to be OK, too.

Wietse's Papers

admin-guide-to-cracking.101.Z (ascii)

Slightly updated version of an article that was posted to Usenet on December 2, 1993, titled: "Improving the security of your site by breaking into it." by Dan Farmer and Wietse Venema. The paper explains to the administrator what crackers have known for a long time.

The paper also announces a piece of security software called SATAN (Security Administrator Tool for Analyzing Networks). It took the authors more than a year to fulfill their promise.

satan_doc.tar.Z (README file) (PGP signature)

Updated version of the SATAN documentation release on March 15, 1995. This archive contains a sample database that illustrates a lot of the problems that SATAN can find for you.

ASCII version (wgkennis.txt)

Text (in Dutch) of a talk given at the "Wij geven kennis" congress on November 23, 1994, In Amsterdam. Explains to a less technical audience what kinds of risks one can expect when connecting the local network with networks of other organizations.

tcp_wrapper.ps.Z (postscript)
tcp_wrapper.txt.Z (ascii)

Presented at the 3rd UNIX Security Symposium (Baltimore, September 1992). Describes the development of the tcp wrapper tool (aka the log_tcp package) to trace a malicious Dutch computer cracker (see also: tcp_wrapper.dutch.ps.Z (postscript)
tcp_wrapper.dutch.txt.Z (ascii)

Text (in Dutch!) of a presentation given at the 23 april 1992 security meeting of the NLUUG (Dutch UNIX users group) and SURF (network provider for the Dutch universities).

COPS (cops_104.tar.Z)

Primary archive: ftp://ftp.cis.ohio-state.edu/pub/cops.

The UNIX security checker by Dan Farmer. Run this on your systems before someone else does.

Crack (crack4.1.tar.Z)

Primary archive: ftp://ftp.uu.net/usenet/comp.sources.misc.

Password cracker by Alec Muffett. Run this one on your password files before someone else does. Can be run in parallell on a bunch of workstations. A fine colection of word lists can be found on sable.ox.ac.uk:/pub/wordlists.

Cracklib (cracklib.tar.Z)

Primary archive: ftp://ftp.uu.net/usenet/comp.sources.misc.

Proactive password security library by Alec Muffett. The idea is simple: try to prevent users from choosing passwords that could be guessed by "Crack" by filtering them out, at source.

Securelib (securelib.tar.Z) (README file)

Primary archive: ftp://eecs.nwu.edu/pub.

Protect your RPC daemons against unauthorized access. Shared library for SunOS 4.1 and later with replacement routines for three kernel calls: accept, recvfrom, recvmsg. These replacements are compatible with the originals, with the additional functionality that they check the Internet address of the machine initiating the connection to make sure that it is "allowed" to connect. Written by William LeFebvre.

Tiger (tiger-2.2.3.tar.gz) (README file)

Primary archive: ftp://net.tamu.edu/pub/security/TAMU.

'tiger' is a set of scripts that scan a Un*x system looking for security problems, in the same fashion as Dan Farmer's COPS. 'tiger' was originally developed to provide a check of UNIX systems on the A&M campus that want to be accessed from off campus (clearance through the packet filter). As such, we needed something that *anyone* could run if they could figure out how to get it down to their machine.

Ipacl (ipacl.tar.Z)

Primary archive: ftp://eunet.co.at/pub/network/ipacl.

SYSV.4 streams module that implements packet filtering within the kernel. Fascinating stuff. Written by Gerhard Fuernkranz (fuer@siemens.co.at).

Loginlog (loginlog.c.Z)

A small program that watches the wtmp file and reports all logins to the syslogd. Written by Mark Mookie mark@blackplague.gmu.edu.

TCPR (tcpr-1.2.shar.Z)

Primary archive: ftp://ftp.alantec.com/pub/tcpr.

TCPR is a set of perl scripts that enable you to run ftp and telnet commands across a firewall. Forwarding takes place at the application level, so it's easy to control.

Netlog (netlog-1.2.tar.gz)

Primary archive: ftp://net.tamu.edu/pub/security/TAMU.

An advanced network sniffer system to monitor your networks. These programs are a part of the network security system used by Texas A&M University. It can be used for locating suspicious network traffic. The following programs are included:

All three programs require an ANSI C compiler. Tcplogger and udplogger use the SunOS 4.x Network Interface Tap (nit).

NIS_Paper.ps.Z

Primary archive: ftp://net.tamu.edu/pub/security/TAMU.

How easy it is to spoof NIS clients (Hess, Safford, Pooch). ACM Computer Communications Review 22 (5), 1992.

orange-book.Z (ASCII)

Source: ftp://ftp.cert.org/pub/info

The DOD orange book, defines various levels of security.

tamu-security-overview.ps.gz

Primary archive: ftp://net.tamu.edu/pub/security/TAMU.

How people at Texas A&M handled a severe case of intrusion.