<< Index | Page 1 | Next >>
Macintosh Security Basics - Presentation Notes

A little bit of history.

MacOS < OS X has no command line.

“ Where’s the DOS?” There isn’t one.

Control vs. simplicity 3
MacOS versions prior to OS X have no command line. The “GUI” you see IS the actual OS, not just a user interface on top of an underlying OS structure. This may seem obvious, but people have asked me “Where’s the DOS?” There isn’t one.

So, WYSIWYG for real. Depending on your point of view, this can be extremely comforting, or extremely frustrating. Or both.



There can be only one.

Historically, single-user systems Multi-user addons: AtEase, Multiple Users

But, no over-the-network console login

Timbuktu
Macs were historically always single-user systems. Things like AtEase (and more recently, Multiple Users, which comes with the OS) allow for different users with different levels of access privileges (kinda like the Win98 login). But there is no over-the-network console login. You can’t remotely connect to your Mac as though you’re sitting at the actual keyboard. (Well, there is Timbuktu...we’ll talk about that later.)


Macs can serve

Some built-in server functionality

• File Sharing
• Printer Sharing
• Personal Web Sharing With 3rd party apps, FTP/Gopher server, etc. Remote administration -- Timbuktu.
Some built-in server functionality exists, but with limited over-the-network user control.

In other words, “out of the box” Macs can share files (File Sharing), act as print servers for printing over the network (Printer Sharing), and serve web pages (Personal Web Sharing). With the shareware program NetPresenz, a Mac can be an FTP/web/gopher server.

But remote administration of a (non-OS X) Mac is tricky. Perhaps the most powerful tool for this is Timbuktu.


Ok, so what’s Timbuktu?

Server component on one Mac

Client on another Mac

Client can control the server

iMac = LoJack!
Like PCAnywhere. Load the server component on one Mac, load the client on another Mac, and the client can control the server. You can even move the cursor, open/close apps, etc. on the remote machine. Nice for teaching and presentations.

Also nice for turning a stolen iMac into a LoJack. :) See handout # 2 or URL below.

http://macscripter.net/unscripted/unscripted.php?id=P12_0_1_0_C

Not really important to our class, but OH so cool.


General Security implications

Single-user-ness -- inconvenient, but aids security.

• Typically, not a lot of services listening on ports

• No remote login Basic services - relatively easy to do safely

Without physical access, not much a bad guy can do
The Mac’s single-user-ness, while sometimes inconvenient, helps contribute to its security. You generally do not have a bunch of services listening on ports and you cannot log in remotely. Even if you do set up file and web sharing, it’s pretty easy to do it safely. Without physical access to the machine, there is not much a bad guy can do to a stock Mac.


Unique is Good

(Apple users have learned how to find the silver lining in a mushroom cloud.)

Macs are a small population -- security advantage

Example: Viruses.

• Creators want large-scale effects, so, go after the big target -- Windows.
• Why bother with Macs? Too small of a target.
Mac users, by virtue of being part of a relatively small population, have some significant security advantages.

Take viruses. People who create viruses and worms tend to want their little creations to have large-scale effects. This is part of the reason why there are so many Windows viruses -- big target. Who’s going to bother to spend all the time and effort making a piece of Mac-specific malware that affects maybe ten percent of all computer users?


Unique, but still pretty versatile

Security tools available for Macs that you might not have known about:

• PGP, email with SSL support, SSH, SFTP, personal firewalls, antivirus software, VPN clients, traceroute, ping, sniffers, file encryption tools, etc.

Lots are free, or cheap shareware. Many available on Dartmouth’s PUBLIC file server.
PGP: MacPGP (for older systems -- free), Network Associates PGPFreeware (free for academics), GPG for OS X (GPL, free)

SSL email: Eudora, Outlook/Entourage, Communicator? All free, all available for OS X or Classic

SSH: MacSSH (free), F-secure SSH for Mac (payware, big academic discount, but MacSSH is better anyway). SSH is built in to OS X.

SFTP: MacSFTP Carbon, MacSFTP Classic, shareware (cheap)

Personal firewalls: Norton for Mac, commercial, academic discount. OS X has built-in fw, Brickhouse front end is shareware.

Antivirus: Various. Norton is good, academic discount.

VPN -- CheckPoint VPN-1 for MacOS 8 and up. Commercial, academic price unknown.

Traceroute -- WhatRoute. Free. Get from PUBLIC. Not needed on OS X.

Ping -- MacPing. Free, PUBLIC. Not needed on OS X.

Sniffers -- Etherpeek, NetWatchman, others…most seem to be payware, but you can use demos for free.

File encryption -- PGP (see above), Apple File Encryption tool, Stuffit Lite (stuff and require password -- not really encryption, but does help hide the data in a pinch). Available for OS X or Classic, free.


Versatile in not so nice ways

Macs were not completely overlooked by the black hat community…

• Several groups develop Mac hacking software
• Online sources of Mac hacks, e.g. Freaky’s, alt.hackintosh, HotLine servers, etc.
• There were/are a variety of blackhat tools and exploits for Mac
In spite of the uniqueness factor, Macs were not completely overlooked by the black hat community. A handful of small but dedicated underground hacker groups do develop Mac hacking software, and websites devoted to Mac hacks, e.g. Freaky’s Macintosh hacks archive, alt.hackintosh, HotLine servers, and more.

There were/are a variety of blackhat tools and exploits for Mac.

AtEase and File Sharing hacks, SubSeven trojan, portscanners, keystroke loggers, BackOrifice client (for Mac users who want to 0\/\/N BO’d Windows victims), anonymous emailers, DOS attacks (early version of Open Transport had a bug, it was used in a DDOS attack here at Dartmouth and it brought our network to its knees)... etc.


What to do

Now:
OS X, the Unix-based next generation of Mac OS. We’re not so unique anymore.

Our focus:
How to secure your Mac using mainly the tools that came with it, and how you can use the network/Internet more securely.

Mac OS 9.x and Mac OS X. Not OS X Server.
And now, we have...OS X, the Unix-based next generation of MacOS, and EVERYTHING has changed. We’re not so unique anymore.

We’re going to focus on how you can secure your Mac using mainly the tools that came with it, and how you can use the network/Internet more securely. Starting with old MacOS (still in use on a lot of old and not so old machines, and as a second boot choice under OS X), and then moving on to OS X (now preinstalled on new Macs).

We won’t be getting into Mac OS X Server, but the same principles that apply to normal OS X also apply to Server.


Physical Security

Crucial. Generally, if someone has physical access to your Mac, they can own it.

• Boot from external devices
• Single-user mode (OS X)
• Mess with OF
• OS X can dual-boot into OS 9, rendering Unix file permissions moot

Options:
Security cage, disable single-user mode, password-protect OF, password protect HD
Crucial. Generally, if someone has physical access to your Mac, they can own it. They can boot from CD-ROM, Zip, netboot, external USB/FireWire drive; in OS X, they can boot single-user mode (root shell with no password), or boot old MacOS and OS X’s permissions become moot (similar to dual-boot Windows machines)

Options:

Security cage. Block access to CD-ROM etc. and rear ports. Annoying if it’s the machine you use every day.

In OS X, disable single-user mode in Open Firmware, then password-protect OF. But that can cut both ways -- SUM is sometimes the last resort for rescuing data. (The Miller handout mentions a utility to password-protect single-user mode -- I have not tried it, but that might be a good thing to add.)

For MacOS, there is third party software for password-protecting the hard disk such that it can’t be mounted even if you boot of other media. Don’t forget the password though...



Physical Security Solutions

Realistically: Be sensible.

• In a server environment, lock and key
• In a dorm, hide the power cord or the mouse, or pull the hard drive power connector and then lock the case with a padlock. :) No tools needed.
Realistically, the best option is to be sensible.

In a server environment, important machines should be under supervision and/or lock and key anyway.

In a place like a dorm, you can discourage the casual nosiness of your roommate’s friends when you’re not there, by doing something like hide the power cord or the mouse, or, for the slightly geekier approach, pull the hard drive power connector and then lock the case with a padlock (the case has a built-in loop for this purpose).


File Sharing

Client use:

• Prep

• AppleTalk “on” (see Chooser)

• Appletalk set to proper network interface (AppleTalk Control Panel -> Ethernet)

• Connecting to shares

• Old and new way (same end result, new way is a bit easier and more flexible).
First, client use. Quick howto:

Make sure AppleTalk is “on” (see Chooser) and that it is pointed at the right network interface (AppleTalk Control Panel, choose Ethernet.)

Connecting to shares the “old school” way:

Apple Menu -> Chooser -> AppleShare -> pick a zone -> pick a server from the list of servers in that zone -> connect using a logon and password, or select “Guest” if available/applicable.

The newfangled way:

Launch Network Browser (from Apple Menu, probably) -> pick a domain (or just go for AppleTalk) -> look for servers, connect as above.


Password Encryption

Starting with MacOS 9, File Sharing passwords are encrypted BUT…

ONLY if both the client and server are running OS 9.x or better. Backwards compatibility.

Newer client will default to a clear text password in order to accommodate the older Mac.

Login window will indicate the level of security of the password transfer.
Starting with MacOS 9, File Sharing passwords are encrypted (I don’t know the scheme), but ONLY if both the client and server are running OS 9.x or better. In other words, to maintain backwards compatibility, if a MacOS 9 user tries to connect to a MacOS 8 server (or another old server, like Linux with netatalk), then the OS 9 client will default to a clear text password in order to accommodate the older Mac. You will be able to tell when you go to login -- the login window will indicate the level of security of the password transfer. If it says “clear text” then watch out.


OS 9 on both ends

MacOS 9 to MacOS 9

 


OS 9 to old server

MacOS 9 to Linux Netatalk
 



OS 9 to OS X

MacOS 9 to OS X (Diffie-Hellman Exchange)

 


What if it IS clear text?

Sensitive data?

Only copy?

• If so, use encryption, or another medium Access privileges?
• Impostors logging in as you, what could they do?

Server admin contact?

Duplicate password?
Is the data on the other end extremely sensitive or is it the only copy? Perhaps you should encrypt it or compress and password-protect the file(s) first, or use another more secure medium to transfer them.

What access privileges does your account have on that server? (In other words, if someone did sniff your password, and that person later logs in as you, can he damage the system? It would look like YOU did it.)

Can you contact the server admin and ask him to change your password to something else? (You can usually change it yourself, but of course if the whole communication is unencrypted, then the new password will also be visible to a sniffer.)

Are you using the same password that you use for other things (like BlitzMail, KClient, your web account, etc.)? A bad guy will probably try applying that password to these other services.


Done with client, now: Server FS

Lots of (better) alternatives…

• Dartfiles
• Blitz
• Dartmouth ftp
• Floppy, Zip, CD-R or CDRW
• USB/FireWire HD
IDon’t do it unless you have to. Alternatives:

Put copies of your most-used and/or current working files in your 10MB folder on Locker, Strongbox, or Vault.

Blitz them to yourself.

If you have a homepage at Dartmouth, make a directory on the ftp server where your webpages live, and use that to move files around (you have 5MB of storage for web files, more than most would ever need for webpages).

Carry a floppy or Zip disk. If you have a CD burner, carry a CDR or CDRW with copies of your stuff on it. Media is cheap.

External hot-swappable drives (how about your iPod? ;) are getting cheaper.


The point of diversification

Eggs in one basket and all that. Lose a copy at worst, your Mac doesn’t go down with it.

You might want File Sharing anyway:

• Collaboration on group projects
• Fun stuff (sharing games, pictures, or mp3s How to do it safely.
If someone hacks into your Strongbox folder, or Webster, or you lose the Zip disk, then you’ve lost only a copy of your stuff. Beats the heck out of someone breaking into your Mac and deleting the originals or nuking your System Folder.

But, File Sharing is nice and lots of people use it not only for retrieving things remotely, but also for collaborating on group projects (you and your project partners could upload and download each other’s work from a shared folder, for example) and for fun stuff (sharing games, pictures, or mp3s -- of course, only the legal ones). So let’s go into how to do it right.
<< Index | Page 1 | Next >>