SCO OpenDeskTop v1.0/Secureware HACK!

Rob Healey rhealey at digibd.com
Thu Nov 29 08:09:47 AEST 1990


In article <sewJs2w163w at mudos.ann-arbor.mi.us> mju at mudos.ann-arbor.mi.us (Marc Unangst) writes:
>Okay, folks, I've had it up to *here* with SCO's broken "security"
>system.  I think we all know that it's poorly integrated with the OS,
>that it's an absolute pain in the ass, and that the first thing SCO
>should do in 3.2v3 is make the stupid thing totally, completely
>removable.
>
	Amen to that. NO good reason to force this security on those of
	us who don't want it. Make it an optional package to purchase.

>To add insult to injury, /tcb/bin/integrity says "Not authorized to
>run /tcb/bin/integrity" when I'm logged in as root.  Thing get
>curiouser and curiouser.../tcb/bin/authck -av lists problems with
>several users, including "coot" and my own login, "mju".  It claims to
>fix them.  However, the next time I run authck, it uncovers the same
>problems, and again offers to fix them.
>
	You MIGHT have to manually tweek /tcb/files/x/xxx files
	to fix the problems. See below for pointers to docs. WARNING:
	if you don't understand what you're modifying, don't touch it!
	The SCO Security Boogie Man, SCO SBM, will 'git ya... B^(.

>This all seems to have started when I tried to add a new group by
>editing /etc/group directly, instead of going through sysadmsh.
>Does anybody have any idea about what's *really* happening, and
>possibly how to fix it?
>
	THIS shouldn't matter, I've added new groups to /etc/group,
	removed the group map file, logged in and it all worked fine.

	First, throw 3.2.0 out the window and get 3.2v2.0. Don't waste
	any more time on 3.2.0, it's not worth your time...

	Try booting to single user and try fixing the problems as root. If
	that doesn't work, try sysadmsh as root and add all possible
	kernel and subsystem permissions to root. If that doesn't work,
	edit /tcb/files/auth/r/root file and add the needed permissions
	to root. If you don't know which ones to add, snoop around the ../a/auth
	file. Again, be careful what you modify or the SCO SBM will 'git ya.
	After you modify the file you'll probably have to reboot to get the
	changes to work. Again, try to fix the problems in single user
	mode.
	
	Another random tip, remember that all processes need LUID for alot of
	system calls, if you kill off servers they HAVE to be restarted by
	init or their LUID won't be correct. I've messed myself up by restarting
	cron and network daemons manually and thus giving them a LUID when they
	shouldn't have one.

	All this is assuming you installed with relaxed security. Also,
	try changing /etc/auth/system/default so that the security level
	is "d" rather than "c2". I don't know if that'll help but it couldn't
	hurt. Also remember to use sysadmsh to add users and give them
	"god" status; i.e. normal UNIX permissions.

	By the way, "relaxed" security means that /etc/auth/system/default
	file adds most security permissions for everyone. Nothing
	is REALLY "turned off" it's just that the defaults are "liberal"...
	u_secclass=d might let everyone operate under d security rather
	than c2.

	I have setup SCO UNIX 3.2v2.0 systems that allow all to su to
	root, root without a password, and all the usual UNIX freedoms.
	The important part is to READ, cover to cover, the 3.2v2.0
	System Administrator's Guide and to use sysadmsh to do what
	you used to do manually by editing N+1 files. You CAN set up
	3.2v2.0 so that USERS won't have any problems getting their
	work done. You WILL have to change how you administrate a system,
	you'll have to do that in the near future anyways with 5.4.
	
	You CAN set up a usable system if you take the time to learn
	the sysadmsh system and what's in the SA guide. If you don't have the
	time to do this then SCO UNIX isn't the way to go...

>How about how to contact Secureware, to maybe get some docs?  SCO says
>that they're "proprietary"; they can't even tell me the format of a
>/tcb/files/auth/x/xxx file.  Security by obscurity, folks, isn't
>security at all.
>
	
	THAT is PURE BS on SCO's part. Check out the *.h files in
	/usr/include and the programmer's man pages on the auth
	system or tcb, it's been a while so I don't remember exactly.
	ALL the fields in the /tcb/files/auth/x/xxx files are fully
	defined and explainations of their use are given. These should
	be mentioned in the security section of the SA guide if you ask me...

			-Rob

Speaking for self, NOT company.



More information about the Comp.unix.sysv386 mailing list