DaemonForums  

Go Back   DaemonForums > OpenBSD > OpenBSD General

OpenBSD General Other questions regarding OpenBSD which do not fit in any of the categories below.

Reply
 
Thread Tools Display Modes
  #1   (View Single Post)  
Old 24th August 2015
Peter_APIIT Peter_APIIT is offline
Shell Scout
 
Join Date: Jun 2008
Posts: 121
Default Uninstall sshd

How to uninstall the sshd or other base program (FTP, httpd)?

Thanks.
Reply With Quote
  #2   (View Single Post)  
Old 24th August 2015
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,984
Default

$ man rm
Reply With Quote
  #3   (View Single Post)  
Old 24th August 2015
Oko's Avatar
Oko Oko is offline
Rc.conf Instructor
 
Join Date: May 2008
Location: Kosovo, Serbia
Posts: 1,102
Default

Quote:
Originally Posted by jggimi View Post
$ man rm
Is it that simple? OP has actually asked an interesting question. How do you safely remove all tentacles of a SSH from the base of OpenBSD? I have no idea why would somebody want to do that but it is an interesting exercise.
Reply With Quote
  #4   (View Single Post)  
Old 24th August 2015
shep shep is offline
Real Name: Scott
Arp Constable
 
Join Date: May 2008
Location: Dry and Dusty
Posts: 1,507
Default

Quote:
Originally Posted by Peter_APIIT View Post
How to uninstall the sshd or other base program (FTP, httpd)?
One of the major attractions of OpenBSD is that the base programs receive a level of code audits, for both security and bugs, that is is unmatched by other OpenSource projects. These base programs receive security patches throughout the life of the release.

When all else fails - these are the "goto programs". You might be better served by learning how to turn them on/off rather than "uninstalling" them.

$ man rc.conf.local
Reply With Quote
  #5   (View Single Post)  
Old 24th August 2015
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,984
Default

I don't see this as interesting. I see it as a complete waste of time.

It reduces the functionality of a system for no obvious operational benefit. It will not prevent an intruder from intruding, if there is a way in. Once in... any tools needed can be installed from outside.

Any intruder who can access a shell, or who has the ability to issue exec(3) / fork(2), can install anything they want. Network tools, compilers, and utilities of all kinds. I doubt Peter has discovered noexec filesystems, but they would be needed after he deletes all the utilities he fears might be exploited by intruders.

But if the intruder has root access, then they can mount their own vnode(9), circumventing noexec. Or just remount, eliminating the option. Even securelevel=2, which Peter previously deployed, can't prevent this.

Last edited by jggimi; 24th August 2015 at 10:59 PM. Reason: typo
Reply With Quote
  #6   (View Single Post)  
Old 25th August 2015
bashrules's Avatar
bashrules bashrules is offline
Aspiring Unix Greybeard
 
Join Date: Mar 2010
Location: Here
Posts: 80
Default

Quote:
Originally Posted by jggimi View Post
It reduces the functionality of a system for no obvious operational benefit.
Perhaps he just wants to have on his system what he is actually using. That doesn't sound wrong, does it?
Reply With Quote
  #7   (View Single Post)  
Old 25th August 2015
jggimi's Avatar
jggimi jggimi is offline
More noise than signal
 
Join Date: May 2008
Location: USA
Posts: 7,984
Default

It's his system; he can do -- and he does -- whatever he wants. But with few exceptions (pppoe, Gnome), Peter's questions here have been focused on his perceived risks and his perceived threats.

This does little to eliminate real threats, should any exist. And he'll have to do it again, should he upgrade or reinstall.

Meanwhile, Peter is still running -release, and to the best of my knowledge, he has not applied any of the 14 published errata patches -- 9 of which address actual, confirmed security issues. If he has not done so, then this is where his attention should be focused, instead of on what I see as imaginative but otherwise useless risk mitigation strategies.

Last edited by jggimi; 25th August 2015 at 02:11 AM. Reason: typo, clarity
Reply With Quote
  #8   (View Single Post)  
Old 25th August 2015
Peter_APIIT Peter_APIIT is offline
Shell Scout
 
Join Date: Jun 2008
Posts: 121
Default

Quote:
Originally Posted by jggimi View Post
I don't see this as interesting. I see it as a complete waste of time.

It reduces the functionality of a system for no obvious operational benefit. It will not prevent an intruder from intruding, if there is a way in. Once in... any tools needed can be installed from outside.

Any intruder who can access a shell, or who has the ability to issue exec(3) / fork(2), can install anything they want. Network tools, compilers, and utilities of all kinds. I doubt Peter has discovered noexec filesystems, but they would be needed after he deletes all the utilities he fears might be exploited by intruders.

But if the intruder has root access, then they can mount their own vnode(9), circumventing noexec. Or just remount, eliminating the option. Even securelevel=2, which Peter previously deployed, can't prevent this.
This opinion is very valuable to me. You are absolutely right. I had just discovered my .serverauth profile was deleted and unable to startx xfce anymore. This is the evidence of being hacked. Perhaps i should start another thread to discuss this issue.

EDIT:

How to remove some command which are not used?

Last edited by Peter_APIIT; 27th August 2015 at 06:15 AM.
Reply With Quote
Reply


Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
4 py-*** packages wouldn't accept uninstall or repair daemonfowl OpenBSD Packages and Ports 8 4th June 2013 06:21 PM
Oracle gives 21 (new) reasons to uninstall Java J65nko News 0 18th February 2011 09:57 PM
uninstall xorg libraries for a server adrian_m FreeBSD Ports and Packages 1 26th January 2009 11:01 PM
Basic sshd hardening anomie Guides 12 12th September 2008 03:39 AM
sshd and timeout Sunsawe FreeBSD Security 6 29th May 2008 12:54 PM


All times are GMT. The time now is 08:32 PM.


Powered by vBulletin® Version 3.8.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Content copyright © 2007-2010, the authors
Daemon image copyright ©1988, Marshall Kirk McKusick