{"id":254,"date":"2005-03-26T01:38:53","date_gmt":"2005-03-25T17:38:53","guid":{"rendered":"http:\/\/www.nargalzius.com\/blog2\/http:\/www.nargalzius.com\/blog2\/archives\/2005\/03\/2005_03_26_0138.php"},"modified":"2005-03-26T01:38:53","modified_gmt":"2005-03-25T17:38:53","slug":"checkmate","status":"publish","type":"post","link":"http:\/\/nargalzius.com\/blog\/archives\/2005\/03\/26\/checkmate","title":{"rendered":"Checkmate"},"content":{"rendered":"<p>The whole Symantec &#8220;fear-factor&#8221; article\/stunt has brought the Mac world up-in-arms. I find it sad that most of the negative feedback come from people who are merely over-confident, or complacent&#8230; and do not know the real danger that <em>may<\/em> happen. It&#8217;s one thing to be confident in your system &#8211; hell even I am confident in my systems (both Windows and Mac), but quite another to expect them to be bullet-proof.<\/p>\n<p>While again, the security architecture of the Unix framework is a formidable barrier for the most part, it still doesn&#8217;t mean that it <strong>cannot<\/strong> be cracked.<\/p>\n<p>A post I read on a messageboard should put things into perspective:<\/p>\n<blockquote>\n<p>Complacency will get you 0wn3d.. we should remember there are some fairly serious unpatched vulns still out there in the default install (e.g. iSync), and rootkits in development.<\/p>\n<p>(For an explanation of the vuln, see: <a href=\"http:\/\/secunia.com\/advisories\/13965\/\">http:\/\/secunia.com\/advisories\/13965\/<\/a>. For a fix, see:\n<a href=\"http:\/\/www.drunkenblog.com\/drunkenblog-archives\/000411.html\">http:\/\/www.drunkenblog.com\/drunkenblog-archives\/000411.html<\/a>)<\/p>\n<p>Are you <em>sure<\/em> that update\/game\/photoshop filter you just got from p2p is not a trojan that will rootkit your box and turn it into a spambot\/kiddiepornserver etc ?<\/p>\n<p>Do you know how to check ? Could you find out if it had happened ?<\/p>\n<\/blockquote>\n<p>Since it is a <strong>local<\/strong> vulnerability, this is the type of thing someone exploits to completely own your box once they&#8217;ve gotten onto your system another way. Meaning if they have direct access to your system (i.e. using the machine themselves, or <strong>you<\/strong> running something that allows them access)<\/p>\n<p>In the scenarios mentioned above, this is nothing different from running an infected program from a download, email, etc. The number of incidents involving these types of exploits may be rare, but they <em>are<\/em> out there. And Symantec&#8217;s argument would actually be valid if taken in such context.<\/p>\n<!--more-->\n<p>Of course that doesn&#8217;t mean that we all should lose faith in our OS(es), believe Symantec at face value, and pony-up some cash for their AV software. A good (not to mention free) first-line of defense, aside from good internet habits, would be applications such as <a href=\"http:\/\/brianhill.dyndns.org\/site\/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=5&amp;mode=thread&amp;order=0&amp;thold=0\" title=\"What is Checkmate?\">Checkmate<\/a>.<\/p>\n<p><a href=\"http:\/\/brianhill.dyndns.org\/site\/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=5&amp;mode=thread&amp;order=0&amp;thold=0\" title=\"What is Checkmate?\">Checkmate<\/a> basically &#8220;inoculates&#8221; your system by fingerprinting specific files (which you can add to) via matching their <a href=\"http:\/\/en.wikipedia.org\/wiki\/Md5\" title=\"What is MD5?\">MD5<\/a> checksums periodically. If that checksum changes, it mean&#8217;s the file has been changed and checkmate will alert you for your approval. I&#8217;ve set mine to check once a day.<\/p>\n<p>The trouble with the current version is while the concept is sound, the built in interface of the pref pane only allows you to add files which are visible, and that you can navigate to. Also, it will allow you to add cocoa Applications, but as they are bundles\/packages, it won&#8217;t caculate the hash &#8211; ergo cannot compare checksums.<\/p>\n<p>There is however a trick\/hack that can workaround this problem. Quoted and edited from one of the forums I frequent:<\/p>\n<blockquote>\n<p>First, download <a href=\"http:\/\/brianhill.dyndns.org\/site\/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=5&amp;mode=thread&amp;order=0&amp;thold=0\" title=\"What is Checkmate?\">Checkmate<\/a><\/p>\n<p>Download an updated plist from: <a href=\"http:\/\/members.lycos.co.uk\/hardapple\/txt\/com.brianhill.checkmate\">http:\/\/members.lycos.co.uk\/hardapple\/txt\/com.brianhill.checkmate<\/a><\/p>\n<p>Replace the exisiting <a href=\"http:\/\/brianhill.dyndns.org\/site\/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=5&amp;mode=thread&amp;order=0&amp;thold=0\" title=\"What is Checkmate?\">Checkmate<\/a> plist (<code>\/Library\/Preferences\/SystemConfiguration\/com.brianhill.checkmate<\/code>)<\/p>\n<p>If you know <code>vi<\/code>, or are comfortable editing plists, you can add more.. but there is an easier way. Here&#8217;s how to add Cocoa binaries via the Aqua gui:<\/p>\n<p>Navigate to the app you want to protect.<\/p>\n<p>Option-click (<code>ctrl-click<\/code>, or right mouse button) &#8220;show package contents&#8221;<\/p>\n<p>Option click on the <code>xxx.app\/contents\/<\/code> folder, and select &#8220;copy path to clipboard&#8221;<\/p>\n<p>Go to System Preferences, open the <a href=\"http:\/\/brianhill.dyndns.org\/site\/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=5&amp;mode=thread&amp;order=0&amp;thold=0\" title=\"What is Checkmate?\">Checkmate<\/a> pane.<\/p>\n<p>Click &#8220;Files&#8221;<\/p>\n<p>Click &#8220;Add..&#8221;<\/p>\n<p>Press <code>command-shift-g<\/code> (this allows you to enter a path name)<\/p>\n<p>Press <code>command-v<\/code> (paste)<\/p>\n<p>You will now be able to browse the package contents from within <a href=\"http:\/\/brianhill.dyndns.org\/site\/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=5&amp;mode=thread&amp;order=0&amp;thold=0\" title=\"What is Checkmate?\">Checkmate<\/a>.<\/p>\n<p>Select any Unix executables you wish to hash. For example, the full path to the Keychain access binary is: <code>\/Applications\/Utilities\/Keychain Access.app\/Contents\/MacOS\/Keychain Access<\/code><\/p>\n<p>To fingerprint files inside invisible directories (e.g. <code>\/usr\/sbin\/<\/code>) navigate there via the terminal, copy the path, and use the <code>command-shift-g<\/code> trick above.<\/p>\n<\/blockquote>\n<p>Another problem is that <a href=\"http:\/\/brianhill.dyndns.org\/site\/modules.php?op=modload&amp;name=News&amp;file=article&amp;sid=5&amp;mode=thread&amp;order=0&amp;thold=0\" title=\"What is Checkmate?\">Checkmate<\/a> doesn&#8217;t seem to be updated any longer, but still is pretty darn good at what it does. So I&#8217;m following the idea other people have: <strong>Please write to Brian Hill, thank him for his excellent work, and ask him to release the source code under the <a href=\"http:\/\/www.gnu.org\/copyleft\/gpl.html\" title=\"What is the GPL?\">GNU\/GPL license<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>The whole Symantec &#8220;fear-factor&#8221; article\/stunt has brought the Mac world up-in-arms. I find it sad that most of the negative feedback come from people who are merely over-confident, or complacent&#8230; and do not know the real danger that may happen. It&#8217;s one thing to be confident in your system &#8211; hell even I am confident &hellip; <p class=\"link-more\"><a href=\"http:\/\/nargalzius.com\/blog\/archives\/2005\/03\/26\/checkmate\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Checkmate&#8221;<\/span><\/a><\/p><\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[13],"tags":[238,1054],"class_list":["post-254","post","type-post","status-publish","format-standard","hentry","category-technology","tag-checkmate","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/posts\/254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":0,"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/posts\/254\/revisions"}],"wp:attachment":[{"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/media?parent=254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/categories?post=254"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/nargalzius.com\/blog\/wp-json\/wp\/v2\/tags?post=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}