-----BEGIN PGP SIGNED MESSAGE-----


                       Anonymous FTP Abuses

1. DESCRIPTION

  This document provides a general overview of problems associated with
  abuses of anonymous FTP (File Transfer Protocol) areas. It includes
  information that will help you respond to and recover from such activity.

  This document addresses two issues relating to anonymous FTP abuse (details
  are in Section 3):

       - Software piracy (the distribution of stolen software, copyrighted
         or proprietary materials, or similar information) (Sec. 3.1)

       - Misconfigured/compromised FTP server (Sec. 3.2)

  Anonymous archives may be provided in a number of ways, most commonly
  through anonymous FTP (although similar services can be provided via other
  protocols such as FSP and NFS). Some sites configure their anonymous
  FTP servers to allow writable areas (for example, to make available
  incoming or "drop-off" directories for files being sent to the site). If
  these files can be *read* by anonymous FTP users, then the potential for
  abuse exists.

  Abusers often gather and distribute lists describing the locations of
  vulnerable sites and the information these sites contain. The lists
  commonly include the names of writable directories and the locations of
  pirated software; they may also include password files and/or other
  sensitive information.

  Unfortunately, there have been many cases in which system administrators
  are unaware that this abuse is taking place on their archive. They may be
  unfamiliar with this type of abuse (and so haven't taken steps to prevent
  it), or they may think that they have configured the archive to prevent
  abuse when, in fact, they have not. System administrators at the sites
  being used to place/pick up items from the drop-off area may also not be
  aware that their users are participating in this activity.

  Finally, an anonymous archive server actually may be misconfigured or
  compromised. This misconfiguration/compromise could, in addition to the
  abuses mentioned above, provide someone with the ability to run processes
  under the UID of the FTP daemon.


2. TECHNICAL ISSUES

  2.1. A file can be placed in the writable area of the anonymous FTP server.
       If this area is also readable, anyone who can connect to the
       anonymous FTP server can obtain a copy of the file.

  2.2. Specifically, abusers do the following:

       - Store and retrieve information. This information is often placed in
         unusual or hidden files (e.g., files that start with a period or
         space and normally not shown by "ls") that may be placed in hidden
         directories, possibly nested within several layers and not readily
         apparent.

       - Gather information about the availability of sites where the
         anonymous FTP areas are abused, then compile a comprehensive listing
         (known as "warez" lists) of the locations. The lists typically
         include the names of writable directories and the locations of
         pirated software; they may also include entries for accounts and
         passwords.

         Please note that these lists may nor may not be out of date; there
         is no way to tell if the information is accurate without checking
         each site.

       - Disseminate information about the location of such materials via
         email, Internet Relay Chat (IRC), posting to newsgroups or
         bulletin-board services, or other means.

       - Use this information for personal, commercial or political gain, or
         carry out attacks against other individuals or organizations.

       - Abuse a vulnerable archive site for a short span of time and then
         move on to other sites.

       - Leverage this access and/or exploit system configuration weaknesses
         to gain other privileged access.

  2.3. Some sites have reported many hundreds of connections in a very short
       span of time that have been identified as "puts" and "gets", e.g., to
       store and retrieve pirated software, on their anonymous archive server.
       This may cause a denial of service, crash the system, or consume disk
       space on the system.

  2.4. FSP is an anonymous archiving service that is similar to FTP. It is a
       UDP-based service that often uses the privileged UDP port 21.
       However, we have seen cases where users or intruders have established
       their own FSP service on a non-privileged UDP port. Although FSP in
       itself is not a problem, it has the same potential for abuse as FTP.


3. WHAT YOU CAN DO

  3.1. Software piracy

       3.1.1. Detection

              3.1.1.1. Develop in-house tools to parse the logs generated
                       from accesses to your server for puts/gets (e.g.,
                       "STOR" and "RETR" sessions). Review this information
                       for unusual or unexpected activity.

              3.1.1.2. Regularly review the contents of your archive's
                       incoming or "drop-off" area to identify abuse, then
                       follow-up in accordance with relevant policies and
                       procedures in your organization.

              3.1.1.3. Check for hidden directories (directories with spaces,
                       special or control characters, etc.).

              3.1.1.4. If you do not intend to offer an FSP service,
                       examine your systems for UDP services available on
                       port 21.

                       NOTE: If a user offers an unauthorized FTP or FSP
                       service on an unprivileged port, it may be difficult
                       to detect the service without a port scan.

       3.1.2. Reaction

              3.1.2.1. If you believe that your anonymous archive is being
                       used for distributing pirated software, we encourage
                       you to review the directories/files created as a result
                       of this abuse in accordance with policies and
                       procedures that may be in place within your
                       organization.

              3.1.2.2. If you discover that your anonymous archive has been
                       misused and you find any lists containing references to
                       other sites, we encourage you to do the following;

                       - Determine where the unauthorized access(es)
                         originated (because these sites may themselves be
                         compromised).

                       - Review the contents of any files or directories (in
                         accordance with policies and procedures) for
                         references to other sites or account/password
                         combinations.

                       - Notify any sites you identified, alerting them to the
                         activity and asking them to check for potential
                         misuse or compromise.

                         To find site contact information, please refer to

                         ftp://info.cert.org/pub/whois_how_to

                         Feel free to include a copy of this document in
                         your message to the sites, especially those sites
                         that include a password file or host/account/password
                         combination. These sites will want to check for
                         further compromise.

      3.1.3. Prevention

              3.1.3.1. Review the CERT "tech tip" on anonymous FTP
                       to ensure your FTP server has been configured
                       correctly.

                       This tech tip provides suggestions for configuring an
                       anonymous FTP area.  The document is available from

                       ftp://info.cert.org/pub/tech_tips/anonymous_ftp_config

              3.1.3.2. Regularly review the contents of your anonymous archive
                       to identify abuses and follow up as outlined above.

              3.1.3.3. Use tools (such as Tripwire) to check file and
                       directory integrity. You can get Tripwire and other
                       tools from

                       ftp://info.cert.org/pub/tools/

  3.2. Compromised FTP server

       3.2.1. Detection

              3.2.1.1. Develop in-house tools to parse your FTP logins for
                       puts/gets (e.g., "STOR" and "RETR" sessions).  Review
                       this information for unusual or unexpected activity.

              3.2.1.2. Review the contents of your FTP directories on a
                       regular basis for inappropriate files. Check also for
                       hidden directories (directories with spaces or
                       special/control characters).

              3.2.1.3. Ensure there has been no unauthorized modification to
                       ANY existing files (or addition of new files) on
                       your archive (including the ftp daemon).

              3.2.1.4. Ensure there has been no addition of files with a
                       security impact (such as ~ftp/.rhosts).

                       We have had reports where abusers have replaced an
                       original file with a Trojan horse version of a file (or
                       daemon).

                       There are tools available (e.g., Tripwire) that can
                       help you check file integrity (see Sections 3.1.3.3 and
                       4.2).

       3.2.2. Reaction

              3.2.2.1. Follow any policies and procedures that you (or your
                       site or organization) may have in place.

              3.2.2.2. We encourage you to check for signs of compromise using
                       our "CERT Generic Security Information" available from

                       ftp://info.cert.org/pub/tech_tips/security_info

                       We encourage you to consult past CERT advisories, CERT
                       summaries, and vendor bulletins, and apply what is
                       relevant to your particular configuration. We also urge
                       you to obtain and install all applicable patches or
                       workarounds described in advisories and bulletins on
                       widely used services such as rdist, tftp, ftpd,
                       anonymous FTP, NFS, and sendmail.

                       Past CERT advisories, CERT summaries, and vendor
                       bulletins are available from

                       ftp://info.cert.org/pub/cert_advisories
                       ftp://info.cert.org/pub/cert_summaries
                       ftp://info.cert.org/pub/cert_bulletins


              3.2.2.2. Review the CERT "tech tip" on anonymous FTP. This tech
                       tip provides suggestions for configuring an anonymous
                       FTP area, and the information will help to minimize
                       undesirable activity on the FTP server. The file is
                       available from

                       ftp://info.cert.org/pub/tech_tips/anonymous_ftp_config

              3.2.2.3. If you discover that your FTP area has been misused
                       and you find lists containing references to other
                       sites, we encourage you to take these steps:

                       - Complete and return the CERT/CC Incident Reporting
                         Form, available from

                         ftp://info.cert.org/pub/incident_reporting_form

                         This completed form will help us better assist you.

                       - Determine where the unauthorized access(es)
                         originated.

                       - Review the contents of files or directories for
                         references to other sites or account/password
                         combinations.

                       - Notify any identified sites, alerting them to
                         the activity and asking them to check for potential
                         misuse.

                         To find site contact information, please refer to

                         ftp://info.cert.org/pub/whois_how_to

                         Feel free to include a copy of this document in
                         your message to the sites, especially those that
                         include a password files or host/account/password
                         combination. They will want to check for further
                         compromise.

       3.2.3. Prevention

              3.2.3.1. Ensure that your FTP area is correctly configured to
                       prevent misuse in this manner.

              3.2.3.2. Regularly review the configuration and contents of your
                       FTP area to identify abuses and follow-up as outlined
                       above.


4. ADDITIONAL SECURITY MEASURES THAT YOU CAN TAKE

  4.1. If you have questions concerning legal issues, we encourage you to work
       with your legal counsel.

       U.S. sites who are interested in an investigation of this activity can
       contact the FBI:

           FBI National Computer Crimes Squad
           Washington, DC
           +1 202 324-9164

       Non-U.S. sites may want to discuss the activity with their local law
       enforcement agency to determine the appropriate steps relating to
       pursuing an investigation.

  4.2. For general security information, please see

       ftp://info.cert.org/pub/

  4.3. To report an incident, please complete and return

       ftp://info.cert.org/pub/incident_reporting_form



- ------------------------------------------------------------------------------

Copyright 1996 Carnegie Mellon University. Conditions for use, disclaimers,
and sponsorship information can be found in
http://www.cert.org/legal_stuff.html and ftp://ftp.cert.org/pub/legal_stuff .
If you do not have FTP or web access, send mail to [email protected] with
"copyright" in the subject line.

CERT is registered in the U.S. Patent and Trademark Office.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNDjVmHVP+x0t4w7BAQHEWwQAowtcRbUmltZa9W8FqMvy2hvH8T6h0aHZ
7fzI+IxDQ1srJshF19qNvDVi/52V/ILQQ6LekMfMc2Stsux3ThBjpQxiajxUrBqY
0hsfHy8dA4lmLOD414JrCmG3s9NLPEn82HkiiJa5U98B+UwywYW6pxCeEo/tf8Vq
6ElGWKA/B4c=
=4Uk9
-----END PGP SIGNATURE-----