macOS High Sierra: Anyone can login as “root” with empty password
3001 points by vladikoff 7 years ago | 1056 comments- abritishguy 7 years agoJust in case it is relevant for anyone here this is what our security team have established thus far:
- Can be mitigated by enabling the root user with a strong password
- Can be detected with `osquery` using `SELECT * FROM plist WHERE path = "/private/var/db/dslocal/nodes/Default/users/root.plist" AND key = "passwd" AND length(value) > 1;";`
- You can see what time the root account was enabled using `SELECT * FROM plist WHERE path = "/private/var/db/dslocal/nodes/Default/users/root.plist" WHERE key = "accountPolicyData";` then base 64 decoding that into a file and then running `plutil -convert xml1` and looking at the `passwordLastSetTime` field.
Note: osquery needs to be running with `sudo` but if you have it deployed across a fleet of macs as a daemon then it will be running with `sudo` anyway.
- RJIb8RBYxzAMX9u 7 years agoosquery is not a built-in tool. You can get the same info with plutil(1):
If I understand OP correctly, if passwd is a lone asterisk, then you haven't been exploited.$ sudo plutil -p /private/var/db/dslocal/nodes/Default/users/root.plist
Edit: trying a little harder to dump accountPolicyData:
$ sudo defaults read /private/var/db/dslocal/nodes/Default/users/root.plist accountPolicyData | grep -oE '[[:xdigit:]]+' | xxd -r -p
- simias 7 years ago>if passwd is a lone asterisk, then you haven't been exploited.
At the risk of sounding a bit pedantic you can't really assume that, it's possible that somebody used this vulnerability, installed some sort of backdoor and then disabled the account to hide their tracks.
- abritishguy 7 years agoThat's correct.
- princekolt 7 years agoBad news: I tried the exploit in my macOS Sierra installation and it didn't seem to work. However, the passwd entry on the output of your first command IS A LONE ASTERISK.
However I still can't login as root. This leads me to believe this behavior has always been there, and maybe the login methods just didn't allow an empty password.
- ybloviator 7 years agoThis is very normal in 'nix' systems. '' indicates a locked account. (I've given up figuring out how to escape an asterisk)
ex:
If the OS is letting you in with a '*'in the encrypted password field, something is very very wrong.daemon:*:1:1::0:0:Owner of many system processes:/root:/usr/sbin/nologin operator:*:2:5::0:0:System &:/:/usr/sbin/nologin bin:*:3:7::0:0:Binaries Commands and Source:/:/usr/sbin/nologin tty:*:4:65533::0:0:Tty Sandbox:/:/usr/sbin/nologin
- dep_b 7 years agoOnly High Sierra is affected.
- ybloviator 7 years ago
- timsutton 7 years ago`sudo dscl . -read Users/root accountPolicyData`
- edjw 7 years agoWhen you do this you'll get the creationTime and passwordLastSetTime as seconds since the 'epoch' – January 1, 1970, 00:00:00 (UTC). These are numbers like 1474441704.265237 which aren't very easy for a human to read :-)
To convert this into a human-readable date and time, open a terminal and do this:
You'll get something like 'Wed, 21 Sep 2016 07:08:24'python >>> import time >>> time.strftime("%a, %d %b %Y %H:%M:%S", time.localtime(1474441704.265237))
(I'm sure you can do this in other languages than python...)
- mhandley 7 years agoOne of my Macs is showing a root password change date of Nov 10th 2017. I can't explain that, so I'm reinstalling now. It did have sshd enabled and remotely accessible, though I thought root login was prohibited.
If I understood correctly, this particular bug was only exploitable from the GUI and this machine hasn't been away from home, so it's likely this isn't related, but posting here, in case it's part of a bigger picture.
- edjw 7 years ago
- simias 7 years ago
- nothrabannosir 7 years agoWait, isn't the point of having root you can erase your traces? Are these logs immutable, even to root? That sounds pretty next level.. and how do I trust the tools?
As far as I know, possibility of root = root = pwn, game over, time to format.
- labcomputer 7 years agoSystem Integrity Protection (SIP)[1] does prevent even the root user from modifying some system files[2]. It seems possible, at least in principle, to protect system logs from modification by user root. In practice, I think most system logs are stored in /var, and that part of the directory tree does not appear to be protected by SIP (but I hope I'm wrong!)
[1] https://support.apple.com/en-us/HT204899
[2] Unless/until you reboot to a diagnostic monitor on a special partition (which requires pressing command-R from a local keyboard during the POST), then run a command to disable SIP, and then reboot again. Continuity Activation Tool requires users to perform this step as part of the install process to allow installation of Bluetooth drivers not originally signed by Apple.
- marctrem 7 years agoA motivated and knowledgeable adversary could most likely load a custom kext to bypass the integrity measures. Am I right?
- marctrem 7 years ago
- labcomputer 7 years ago
- divbzero 7 years ago> Can be mitigated by enabling the root user with a strong password
Instructions from Apple: https://support.apple.com/en-us/HT204012
- stupidcar 7 years agoAnd if you're thinking that manually disabling root might also fix this, it won't. You have to leave root enabled.
- divbzero 7 years agoSecurity update now available: https://support.apple.com/en-us/HT208315
- stupidcar 7 years ago
- spoondan 7 years agoYou can also get the password last set time with:
sudo dscl . -readpl "/Users/dan.koepke" accountPolicyData passwordLastSetTime
- kr3wn 7 years agook dan...
- kr3wn 7 years ago
- submeta 7 years agoExcellent! Thanks for sharing
- krock 7 years agoapple have a security update out now: https://support.apple.com/en-au/HT208315
- RJIb8RBYxzAMX9u 7 years ago
- teddyh 7 years agoI see a lot of comments here wondering why Apple seems to not care about software quality anymore. I don’t know if that’s true, but there’s a perfectly obvious answer: They don’t have to.
Software quality in macOS was important back when they were trying to get people to switch from Windows-based PCs to Macs. Nowadays, most people who were going to switch have already switched, so Apple has no incentive to keep up the same level of software quality anymore. They just have to keep people locked into their ecosystem (with iPhone etc.) enough that the barrier to switch out again is high enough.
There is no reason for Apple to improve macOS, since doing so won’t make anyone switch to Macs who hasn’t already switched, and not improving macOS won’t make anyone upset enough to switch back. Ergo, Apple leaves macOS to stagnate, and they will keep macOS at this bad-but-not-horrible-enough-to-switch level for the foreseeable future.
That’s my theory, anyway.
- angrygoat 7 years agoThese days, where is the lock-in?
The core applications that I use (Firefox, Docker, VSCode, vim, ...) all work just as well on Linux, MacOS and Windows.
I have a Mac, because it's (at least previously) been pretty secure by default, doesn't require me to invest a lot of time sysadmining my own box, and lets me dip into a healthy ecosystem of commercial software useful to my hobbies (like photography.)
The software has definitely declined in quality, but not enough to massively annoy me.
If there is lock-in, it's on the hardware side. I've got an early 2013 MBP, still going strong, a bit dented but it's been around the world with me a few times, so that's understandable.
My workplace uses Dell XPS hardware, and that's good, but it still doesn't feel as solid to me. It's good, but it's not as good.
I think the hardware is the laurel Apple has really been resting on.
I could meet my main use cases on Linux quite happily, and dual-boot Windows for the rest. Right now the premium on Mac hardware, which only happily runs an increasingly decrepit operating system, isn't looking worth it. Previously, it was.
- baldfat 7 years agoIt's a mental lock in now a days.
Most people don't realize but the vast majority of Video Editing was Windows based till about 2010 when Final Cut was considered best in class (I can't stand Final Cut myself but to each their own...) The vast majority of video editing is now Premier due to Apple's handling of Final Cut Pro and the lack of support for the Mac Pro (They usually sit in back rooms as expensive file servers) Also most people mentally think that somehow Apple is better for design but the software runs just as well on Windows.
The iPhone and the money spent on software is what is keeping people these days. But whenever I talk with my friends they are certainly not thrilled and zealots of Macs anymore. The vast majority of my video editing friends are getting really frustrated with what they call the ceiling. Do you really want to be editing full time on a lap top? The Mac Pro isn't a real solution for full time editors.
- pault 7 years agoIt's also display quality. If you're doing design work you can use a MacBook pro and be pretty sure that the color is accurate with no calibration. If you switch platforms you have to sort out the enterprise and gaming displays, which have totally different selling points (price and responsiveness, respectively). Getting a good display and accurate color on a Windows machine requires a lot more knowledge and effort. This is definitely less true since Apple abandoned their display line (one more bit of evidence that Apple doesn't care about the professionals that established their brand anymore).
- DCKing 7 years agoI'm not sure I agree with this. Or at least it goes too far to say that it's a mental lock in.
Yeah Apple is making some very bad mistakes in their software quality, but there are two things that are very essential to the Mac experience that still make it the most straightforward choice.
One key advantage Macs have over Windows is that they run Unix. You can open a terminal and be involved with most of the Linux/Unix monoculture that exists and have access to much the same tools. No VMs and all the hassle they bring to take into account, mostly at least.
One key advantage Macs have over Linuxes is the availability of good quality graphical software. If you like a GUI for Git, the best are available on Mac. It has OmniGraffle, which many regard as amongst the best diagramming software out there. It runs a very decent version of Microsoft Office. Many would argue that - especially for developers - the software ecosystem for Macs is even superior to Windows. And add on top of that is that this also runs on a still mostly flawless out-of-the-box experience.
Sure, I bet most people could switch to Linux or Windows if they wanted to go through some effort. But it's more than a mental lock-in, you give too little credit to the Mac ecosystem. It might not be the obvious best place to be anymore, but it's still great value. As was pointed out before, this seems to be something that Apple is okay with.
I really hope Apple feels this security incident steps up their game - they deserve all the hate they get for this. But the Mac value proposition will barely change for most people, as sad as that may be.
Please note as disclaimer that although I do use Macs sometimes, I spend most of my time on Windows and Linux systems.
- mattl 7 years ago> Also most people mentally think that somehow Apple is better for design but the software runs just as well on Windows.
Back in the PowerPC days, a large part of every keynote was getting Phil on to press the spacebar so we could all see how much slower Photoshop was at making the poster for Inspector Gadget. Can't help but feel like this was where a lot of people cut their teeth on this opinion. While Mac OS 9 and its users (niners) are a tiny minority now, I suspect a lot of those shops moved to Mac OS X.
- pault 7 years ago
- scjr 7 years agoWhile you don't believe you are locked in, I don't believe that you as a programmer "power user" are the majority that Apple cares about.
I believe not only that for the majority of users there is a level of software lock-in, but further there is a high level of psychological lock-in, where users get used to and comfortable with Apple's design strength, which is Apple's main offering.
As people get more comfortable and more older it is easy to say that people get more resistant to change.
- 27182818284 7 years ago>These days, where is the lock-in?
Photos, apps purchased, and iMessage are overwhelmingly the reasons I don't see people switch. All their kids photos, etc, are stored away and they'd have to figure out how to nicely export them. iMessage is seemless for them across devices while an alternative like Hangouts doesn't have the market penetration—it isn't ubiquitously used even among just Android users. Apps purchased I added to the list because often people don't think about it, but if you mention "re-buying all your apps" you see the frown appear on their face.
- aduitsis 7 years agoWithout directly disagreeing with your post, I think there is a slight OS lock-in, in the fact that the MS alternative is a horrible piece of burning wreckage. Anybody that had to put up with the autoupdate experience in Windows 10 (oh, you were doing something important? Never mind, I'll just hog your network in random intervals for like an hour without you having a way to stop me and then I'll take 2 hours to apply the patches before the reboot), can understand that Apple was playing without serious competition for some years now.
- xtrimsky1234 7 years agoThere are many lock-ins, first there is iMessage, second there are some apps that still work only on Mac OS X I don't remember the name of the software but I once was sent a design file and was only able to open it on a Mac OS X software (there was a windows alternative but it didn't allow me to edit the file as needed). Another example is XCode, you need a Mac to properly create iPhone apps. For programming, there are also issues with symbolic links on Windows.
I personally prefer Windows, but as a software developer I had to buy a Mac, I grew tired of having to always power-on a Mac OS X virtual machine. My job is so much easier now then it was on windows.
- qudat 7 years agoiMessages is the lock-in. It is the primary reason why I switched to the iPhone.
I have the macbook pro, iphone, watch, airpods, and they all work pretty great together. It's a cohesive experience that is going to be really hard for me to break out of it.
- delfinom 7 years agoiMessage is a huge lock-in for non-technical users. They are just obsessed with it on iOS. You can find tons of forum posts with people throwing fits that XYZ Android phone doesn't have iMessage.
- thedarkproject 7 years agoThis might me valid for the US. Anecdotally, where I live (Switzerland/central Europe) almost nobody uses iMessage, and WhatsApp is the big dominator.
- macandcheese 7 years agoI'm not sure the correlation is technical proficiency by itself, I think it's based upon a critical mass of your social circles using iMessage or not using iMessage. If you choose to, you can probably make a correlation between "technical savviness" and a user's choice between Android and Apple, but I don't think that is a deciding factor in who uses iMessage.
The reason people throw fits is because the experience between a group messaging together on iMessage is exceptional - this experience breaks down when even one of your friends in the chat doesn't have an Apple product. They aren't able to send or receive the majority of the "chat add ons" iMessage provides. I'm sure making the bubbles green vs. blue only helps to stoke the "us vs. them" fire.
I consider myself to be a reasonably technical user and still prefer to message with iMessage since I know the experience will be the same for everyone I'm chatting with. Yes, we _could_ all start using WhatsApp et al, but if 8/9 of our group message is on iMessage, why would we?
- thedarkproject 7 years ago
- djhworld 7 years agoThere are a few "quality of life" tools on OSX that I use, like Alfred that I haven't seen a Linux equivalent.
But you're right, I could probably switch to Linux and be fairly happy.
- dnzm 7 years agoAs for Alfred replacement... How about [Albert](https://github.com/albertlauncher/albert)?
- dnzm 7 years ago
- mcgarnagle 7 years agoMac is also easier to use for non technical users. I bought my mom a Mac and she can plays with the "system preferences." Good luck showing her Control Panel on windows.
- criddell 7 years agoThe Apple Store is a huge deal for non-technical users as well.
Apple's sales per square foot in their stores is really high. Having some place to take your computer to when you need help is extremely valuable for a lot of people. Why don't Samsung, Dell, Lenovo, and HP all have their own stores in every neighborhood that has an Apple store? Is the Apple store only successful because of the iPhone?
- criddell 7 years ago
- criddell 7 years agoThe lock-in is Messages, at least for a lot of people.
- untog 7 years agoI'd wager the number of people using Messages on macOS is really not that high. Most people are content to message using their phone.
iMessage absolutely is a lock-in for iOS, though.
- untog 7 years ago
- acidburnNSA 7 years agoFor photography on Linux you gotta check out Darktable. It's actually very very good as a Lightroom replacement for RAW workflow.
- schuke 7 years agoI second this. The only feature that I can immediately think of that locks me in the mac eco-system is the convenience of airdropping files with my wife. Apart from this, with most of my stuff on the cloud, there won't even be a migration process if I decide to switch to Windows.
- hellofunk 7 years agoI have a lot of software I bought on the App Stores for Mac and iOS, hundreds, maybe even over a thousand dollars' worth. If I switch platforms, I can't use that software any more.
- zelos 7 years agoThe lock in is definitely less, but for me:
- Large iPhoto library - Easy syncing with multiple iPhones (notes, photos etc) - Xcode for iOS development
- baldfat 7 years ago
- skygazer 7 years agoWhile your theory is interesting, if deeply cynical, the thing I find most interesting is that it's the top comment on an 800+ comment discussion when it was less than a minute old. Do new comments start at the top? I've never noticed that before.
Edit: By the way, regarding the vulnerability, ANY password you use when you first attempt to login as root BECOMES root's new password. (Blank is a red herring.)
So if you're going to test this, maybe use something non-obvious. In a terminal, setting a strong password for root with "sudo passwd" is the quickest mitigation.
Ill-advised, but in a pinch, you can apparently 'secure' a machine you don't otherwise have access to by attempting to log in as root with a long random password you fail to remember. An admin on that machine can later change root's password with a "sudo passwd".
Also, it appears the "dseneableroot -d" command suggested elsewhere here fails in preventing root login.
- manmal 7 years agoThe higher the poster's karma, the higher her comment will be upon posting. This user has almost 6k karma, so it can rise high. Once the comment is at the top for a minute or so, it can stay there if enough people keep upvoting it.
Try it and post a top level comment now. I'm pretty sure it won't be at the top initially because you don't have enough karma for that.
- Dangeranger 7 years agoI have also seen new comments spring to the top of the conversation, but always assumed they were selected randomly, as some of them were from posters who were fairly new or had a low karma count.
- dep_b 7 years agoAh thanks, now it makes sense. I always wondered why sometimes my comments went straight to the top. I've lost too much productivity here, clearly! ;)
- Dangeranger 7 years ago
- JonCox 7 years agoI think new comments do get a slight boost initially. But I also think people are venting their frustrations at the very noticeable decline in software quality from Apple over the last 3 years.
- thinkloop 7 years agoYes new comments get a bit of time near the top. The amount of time varies based on the amount and quality of other comments.
- manmal 7 years ago
- zelos 7 years agoI really hope that's not true and this is just some extended blip.
That said, between this, the disk encryption bug, not being able to type "I" on an iphone you have to wonder what is going on. I recently upgrade my MacBook Pro to High Sierra and it's been plagued with problems (Weird red flash when displaying menus, hangs/crashes with external monitors etc.)
Then I look at switching away, and I lose all the OSX software I own, all the easy iOS integration, all those Pages documents etc.
Maybe I just need to build a cheap but upgradable Linux box and start trying to switch.
- rcarmo 7 years agoI've been actively investigating that for over a year:
https://taoofmac.com/space/blog/2016/10/29/2240
I have to use Windows for work, though (I'm at a Microsoft subsidiary, and all we get are Windows machines), and I can live OK inside WSL.
- rcarmo 7 years ago
- yoz-y 7 years agoMaybe. But this particular bug happened precisely because Apple has changed _something_ in macOS. Also this something was probably quite profound since it has impacted a part of software that, at least from the outside, haven't changed much since a long time.
A lot of macOS users would actually prefer Apple to do less with it than what they are currently doing.
- hellofunk 7 years ago> this particular bug happened precisely because Apple has changed _something_ in macOS
I don't know much about this bug but I have seen several reports that the bug has actually existed quite some time and is not new, only the publicity surrounding it is now shining a bright light on it.
- yoz-y 7 years agoI thought it was confirmed that it is new to High Sierra, it was indeed lingering on forums as a "administrator hint" though.
- yoz-y 7 years ago
- hellofunk 7 years ago
- nathanvanfleet 7 years agoI kind of love how you frame it as "everyone who has switched has switched" as if the job is done. As if there would be no market to capture. Which isn't true. And doesn't even consider the reality that there are young computer buyers who they need to capture because existing users don't buy new machines or won't last in the long run (people die).
- teddyh 7 years agoThere is always more market to capture, but the cost of capturing those few additional users might not be worth it (to Apple, currently). And new users don’t look to the quality of the OS to pick their platforms, they look to existing user bases. And Apple now has a sizable existing user base, especially if you also count iPhones.
- Humdeee 7 years agoI was going to comment the same thing. Most people are always open to switching if the evidence is there to support a better workflow or experience. The realm of endless marketing to all the demographics will never stop.
- teddyh 7 years ago
- klmr 7 years ago> not improving macOS won’t make anyone upset enough to switch back
I’m not so sure about this — although it may be due more to the hardware side of their business: after the recent, disappointing iteration of their MacBook Pros I’ve heard a lot of people considering to switch (and actually switching).
Taken together with software quality issues, I wouldn’t be surprised if at least a subgroup of users are leaving Apple gradually. That subgroup being professional users, of course: Apple is still unassailed as a status symbol, and casual (+ mobile) users seem more than happy.
- teddyh 7 years agoNobody cares about what developers like in their computers, developers will go wherever the users are. And Apple now has a sizable chunk of computer users and an even larger chunk of smartphone users.
- m_fayer 7 years agoThere's a big difference between a developer grudgingly keeping a cheap headless mini-computer under a stack of papers somewhere that gets used only as needed, and a developer using your system as their "home base" and buying into your entire ecosystem.
- bipson 7 years agoThis only holds true if you consider lock-in IMO, e.g. you need a mac to develop iOS or mac apps, or you need a windows machine to develop windows apps.
Otherwise I don't care which browser you are using to look at my pages, or which Desktop to run my qt app.
There was a massive influx of developers switchting to mac laptops before it was popular with a majority of users (around 2008).
- m_fayer 7 years ago
- teddyh 7 years ago
- cmrdporcupine 7 years agoI think it's more that desktop machines make them a fraction of the money that their iOS devices do. Development goes towards the profit centre.
Remember that back when Apple made only computers, right before the iPod, they were on the verge of bankruptcy and barely profitable.
Since then their laptops have taken off, of course, and I have no idea how much money they make off them. But compared to the huge torrent of cash Apple makes off iPhones I can't imagine the beancounters see a huge amount of value in investing heavily in the parts of OS X that aren't shared with iOS.
- elysian_eunoia 7 years agoWhether or not most potential apple users have already switched, security is surely vital to keeping their customers with them.
Much like the importance of feeling safe in our own house, if the computer that houses our information suddenly makes us feel unsafe or exposed, we'll naturally seek other options unless the issue is, shall I say, swiftly fixed or easily fixable.
- reubenswartz 7 years agoNot to excuse the bug, but I think it has more to do with the annual upgrade cycle for the iPhone. Everything else Apple does has to tie into this, which is a pretty tight cycle for an OS with new "regular" OS features, plus the integrations with iOS.
They can't afford to wait 2 years (or whatever) to update the phones, and Mac OS gets pulled along for the ride.
- toadkicker 7 years agoTheir QA department has been in a downward spiral since 2014. I would love to name some people who were doing a fantastic job running the place until then, but I'll spare the embarrassment. This really isn't about some mega company not caring as much as one of their cornerstone departments being unable to function effectively.
- martijn_himself 7 years agoI really don't think that to be the case. Quality on OS X was a priority in its own right and fundamental to everything at Apple, not just a by-product of a strategy to get people to move from Windows.
Of course all that changed when its only priority became to shift more iPhones, and everything became secondary to that.
- ryanmclovin 7 years agoSurely they havent used up the pool of people that might/want switch to macOS. How can anyone make even such statement?
- teddyh 7 years agoSome years ago, I was hearing about people switching from PCs to Macs all the time. Later, not so much, but macOS was still getting praise. Maybe Apple looked at the conversion numbers at that time and decided that the cost of keeping up the quality of macOS wasn’t worth the few PC converts they were still getting, and they figured that not enough people would switch back to PCs since the iOS system lock-in effects, etc. would present enough of a barrier.
So it’s not that there aren’t still people who could conceivably switch to Macs, it’s that Apple decided they didn’t need more converts quite as badly anymore.
Still, only my theory of course.
- kakarot 7 years agoThis goes against basically every corporate strategy ever, which is to always increase growth.
At this state in the company's life there is a disconnect between those who make the software and those who make the business decisions.
I don't think it's likely that Apple's board just decided to give up attracting new customers, and any apparent decline in quality is likely attributed to bad management; ineptitude, rather than purpose.
Occam's Razor supports this hypothesis.
- kakarot 7 years ago
- teddyh 7 years ago
- teekert 7 years agoI do see people switching to Linux for this reason, Apple the new MS, Ubuntu the new Apple?
- e_proxus 7 years agoWhile I think there's a chance you might be right, I don't think it's logical in the long run. I think changes in perception like this are accumulated over time and will in the end hurt the product.
For some examples, look at the impression of Microsoft and Windows when it comes to quality. It is only now starting to improve, with gigantic efforts from Microsofts side. Another example is Linux and usability, which have constantly gotten better (maybe still not good enough, but that's better left for another thread) but still many see Linux as "advanced" and only for power users. These are not perfect examples, of course.
What I mean is that I think it's bad strategy on Apple's part (if they're doing this deliberately), especially considering the resources they have at their hands. I wouldn't be surprised if Apple could increase it's desktop market share further by positioning themselves as high quality. However, it's a reputation they are losing fast.
- wlesieutre 7 years ago>It is only now starting to improve, with gigantic efforts from Microsofts side.
Is it? They axed their internal QA and definitely aren't catching all the bugs with the "Insiders Program."
After the Fall Creator's Update I've had to log in twice (after the first one I just get sent back to the login screen).
The workaround is disabling a setting: "Use my sign-in info to automatically finish setting up my device after an update or restart."
I'm also getting repeated alerts that a restart is required to complete installing an audio driver, but restarting doesn't finish it. I probably need to track down the responsible driver, uninstall it, and reinstall manually or hope Windows does it.
Obviously that's not as serious an issue as unauthenticated root access, but in day-to-day use of my Windows computer I don't have a very positive impression of their software quality.
- e_proxus 7 years agoMaybe not quality wise in all areas (I agree with you there) but at least in giving a professional and modern impression compared to let's say Windows XP/7. Maybe operating systems are declining in quality in general, even though organizations sometimes try to improve them. I guess legacy plays a big role here.
- e_proxus 7 years ago
- wlesieutre 7 years ago
- _sdegutis 7 years agoBut customer retention is still important.
I've heard of a lot of people switching away from Macs to Linux and Windows, especially with Windows building up their own official Linux subsystem now.
PC hardware is cheaper than Apple's, and hardware (even the "good stuff") becomes obsolete after 5 years anyway. Besides, most software is cross platform these days.
The only real good retention plan Apple has is that we can't release iOS apps without owning Apple hardware; there's a few Mac-specific software titles that certain professionals rely on; and a little bit of "it's overall higher quality than PCs" mindshare that some people still have either from the 80s and early 2000s, but that can't last long if Apple keeps this up.
- SZJX 7 years agoNah. At this rate people will simply abandon the ship sooner or later. There's definitely some deterioration going on instead of only a cynical strategy shift.
The new MBP isn't attractive anymore. The software stagnates. The only reason I keep using Mac for usual use cases is just its wonderful collection of dictionaries (I like to constantly learn new languages). I wonder why no publisher ever bothered coming up with a decent dictionary software on Windows/Linux yet instead of making do with crappy online versions. If they did I'd happily just use a Windows + Linux dual boot machine.
- juanmirocks 7 years agoSurely they should care about the security of their _own_ developers, who surely program in macOS. I believe we are being too harsh on Apple unnecessarily.
- hellofunk 7 years ago> There is no reason for Apple to improve macOS, since doing so won’t make anyone switch to Macs who hasn’t already switched, and not improving macOS won’t make anyone upset enough to switch back.
I wouldn't be so sure about that. There are a lot of "about to switch" people out there, in both directions, who are just waiting for either the extra nudge or the extra reason to not switch.
- frik 7 years agoIt reminds me of the Windows 95/98 login.
At the logon screen, just pressing ESC got you to the desktop.
- recursive 7 years agoIt's kind of similar, but that was intentional. There was even a "Cancel" button in the GUI that did the same thing.
- recursive 7 years ago
- jsight 7 years agoSaying that you only care about existing users via lockin and don't expect switchers is a sure path to doom in the long run. Surely that cannot really be it.
Incompetence seems to be a more likely fit here than that.
- fergie 7 years agoThere are probably a lot of people like me on HN who _need_ a unix box to do their work, and the various Macs are still far and away the best general purpose unix boxes available (best chassis, best peripheral compatibility, best (o|O)ffice software compatibility).
Now that Google Docs and Office 365 are "good enough" for most things, I would probably be happy to go back to Linux if there was a Linux machine that had comparable build quality yet was a bit cheaper than a Mac.
- acidburnNSA 7 years agoDell XPS 15 on Linux is pretty glorious you guys. My 2011 version is still kicking amazingly well with a 1TB SSD, and the newer models are way sleek. I also have a 2013 Sony vaio with dual boot linix/windows. Haven't booted to windows for anything but updating it for years.
- paprikka 7 years agoCan't agree more. The main thing that keeps me using OSX is Adobe Creative Cloud.
I'd mention aesthetics, but the current Linux distros look quite good, plus they're customisable.
- acidburnNSA 7 years ago
- draw_down 7 years agoWhat? Of course they have to care.
- pwdisswordfish2 7 years agoUnder your theory, given a comparison between "not modern" and "modern", software and hardware that is not modern may be higher quality.
Should users always choose "modern" over "mot modern"?
Or does this choice require actually knowing all the changes from one version to the next?
Do macOS users diff the Darwin source trees against each other to follow changes?
Would that have revealed a "bug" like this one?
Would having macOS fully open source enable users to spot "bugs" like this one?
Should users that care about things like UNIX "security" switch to a fully open source UNIX-like OS instead of a corporate-controlled one?
- angrygoat 7 years ago
- dtf 7 years agoAmazingly, this was disclosed offhand on the Apple developer forums, two weeks ago (see final comment by chethan177):
https://forums.developer.apple.com/thread/79235
(spotted by https://twitter.com/fristle/status/935670476214378496)
- chmars 7 years ago… as a _workaround_ for an administrator account-related bug.
I should have known that updating to a new MacOS versions before 6 to 9 months have passed is a mistake. High Sierra is in my experience the buggiest MacOS release so far, not only security-wise. The system is not very stable and APFS reduced drive performance … :(
- harryf 7 years agoFrom one bad upgrade that cost me a bunch of productivity - believe it was Lion - as well as observing the struggles of colleagues, these days always wait 6 months at least before upgrading OSX
- dep_b 7 years agoI basically only update when (a beta of) Xcode tells me it won't run on my current version. Usually that's the point when either all bugs have been fixed or they will not be fixed before the new version.
- dep_b 7 years ago
- harryf 7 years ago
- galobtter 7 years ago"If you're able to log in (hurray, you're the admin now)" Personally not very hurray
- dvhh 7 years agoSo not so much a 0day vulnerability anymore (+ 13 days ) ?
- pls2halp 7 years agoThat’s absolutely terrible. Does Apple not monitor those forums at all?
- neotek 7 years agoApple's support forums aren't a place where Apple provides their users with support, they're where Apple users seek support from other Apple users, mostly unhelpful and often inaccurate support.
In fact, 99% of the time the only advice you'll get is "restore your iPhone", "restore your MacBook Pro", "restore your Apple TV" and so on into bitter infinity.
- refulgentis 7 years agoThose are the support forums, GP is asking about developer forums.
Yes, Apple monitors them, but apparently not closely enough :/
- lloeki 7 years agoYou forgot about "repair permissions" and "do a SMC+NVRAM reset"
- 7 years ago
- _pmf_ 7 years ago> mostly unhelpful and often inaccurate support
Sorry that the free support for your expensive device does not match the quality of the non-existing support from your device vendor.
- refulgentis 7 years ago
- speleding 7 years agoI ran into a bug with High Sierra, posted in the user forums and was contacted by a friendly Apple Engineer a day later. So they do read them, but apparently not close enough.
I could see how someone would dismiss a posting like that with an "this cannot possibly be true" shrug.
- neotek 7 years ago
- chmars 7 years ago
- raydev 7 years agoI've been a developer for a long time. I understand bugs happen, even bugs with terrible consequences. A lot of bugs seem understandable, like I can see the chain of ifs/thens required to end up at some hilarious broken state.
But I'm breaking my brain trying to figure out how in the hell a login attempt for "root" will enable it if it's disabled. Why is this is a possibility, to just enable root, no questions asked?
- OkGoDoIt 7 years agoSeems to be something related to a backwards-compatibility code path for upgraded systems. According to multiple posts on this thread it only affects systems upgraded to High Sierra, not fresh installs. See https://news.ycombinator.com/item?id=15802622 for example. Adding extra layers for compatibility complicates testing and debugging. With this many eyes on it hopefully someone will be able to deduce exactly what's going on.
- nathancahill 7 years agoMy High Sierra is a fresh install, and it's affected.
- princekolt 7 years agoYup. Can confirm. I installed it fresh on a VM from the downloaded installer and it is affected.
- princekolt 7 years ago
- xer0x 7 years agoMy upgraded high sierra doesn't have this problem. The theory could be backwards. Anyways, this is stunning.
- FabHK 7 years agoNote that I had to try twice for this to "work" - maybe try again. Incredible.
EDIT: apparently, the first login attempt with root enables root login with whatever password is provided. Then, when you try again, login will work.
If that's true, we have a combined diagnostic and workaround:
Try logging in with root and a good password. It should not work (if it does, root with that password had been enabled before).
Now, try logging in again with root and that same password.
If it works, your system was vulnerable to that bug, but you've now fixed the problem, as you've enabled root and set a good password (so nobody else can log in unless they find that password).
If it doesn't work, it looks like root has been set up before with some other password (maybe empty), and it's conceivable that someone has exploited that bug on your machine before.
Is that understanding correct?
- scotty79 7 years agoTry guest account.
I could do it on guest account, by first pressing enter after entering "root". And after a fail, clicking the unlock button.
- orf 7 years agoMine is an upgrade and does.
- FabHK 7 years ago
- rtpg 7 years agoBut at one point a root account is created with an empty password right?
There's a specific line somewhere that's doing this, in theory.
Maybe they should have opted for "create `root` with unguessable password"
- akvadrako 7 years agoNo, that's a hack. And it opens new attacks, like on the hashing algorithm and poor randomness or predictability in the generation logic.
- akvadrako 7 years ago
- nathancahill 7 years ago
- zach43 7 years agoMaybe something like this was added to make debugging/testing of the OS easier? maybe they just forgot to remove it before shipping the new macOS
- fattire 7 years agoApparently it is not just enabling root, but setting the password the first time you do it (in other words, the blank value has nothing to do with it). Then the subsequent times it'll use the pw you set the first time.
- princekolt 7 years agoThat seems the only probable cause I've come across so far. It doesn't seem to be a backdoor because it would be more of a back-spillway-gate.
- mk89 7 years agoThat could be the case - I can't find any other possible logical explanation, because it doesn't make any sense.
- fattire 7 years ago
- dec0dedab0de 7 years agoI'm having a hard time understanding how this could happen too.
It would have to be that looking up the root account enabled it, maybe users go dormant or something, and this was a way to readd them? then once it was enabled it defaulted to a blank password, but you would think that it needs sudo to enable root in the first place.
- skygazer 7 years agoBlank password is not necessary. Any password provided on initial attempt WILL BECOME the root password. Blank is being circulated simply because that's what was discovered first.
Edit: Which also means it's possible to "secure" a vulnerable (unexploited) machine simply by attempting to log in as root with a long random password.
- cherimoya 7 years agoSo by my logic - if you tried this exploit and it failed the first time, then worked the second time: No one else has tried it before you. Otherwise it would either have worked the first time (if you guessed the same pass) or not worked at all (if the first time it was tried a different pass was used).
Or is this not a permanent password set?
- cherimoya 7 years ago
- pishpash 7 years agoNot only enabled it but actually set an empty-string password. Usually the stored hash for a disabled account is not in the hash space, so it was either overwritten, or root account password was actually empty string out of the factory. That and the enabling of the account both point to debug code accidentally left in (or intentional backdoor by the disgruntled).
- inetknght 7 years agoLogin screen is probably already running as root in the first place, so it already had permission to enable shell/GUI access
- skygazer 7 years ago
- kobayashi 7 years agoThis seems to be why: https://objective-see.com/blog/blog_0x24.html
- cmiles74 7 years agoTo some up, when you try to log in with a disabled account, MacOS "promotes" the account but uses the _password provided by the user trying to log in_ instead of the password on file (in this case, an asterisk indicating the account is disabled). Once that is done, you can log in with that account.
IMHO these are two separate bugs: promoting disabled accounts and using the password the user typed in instead of the value in the password list.
- irishsultan 7 years agoI assume that it can't use the password in the password list as that should be hashed already.
- irishsultan 7 years ago
- cmiles74 7 years ago
- e12e 7 years agoI'm reminded of: "Solaris Telnet 0-day vulnerability", 2007: https://m.slashdot.org/story/80056
But this does indeed seem to be an extra level of user-friendly stupid.
- martin-adams 7 years agoLike an illusionist hiding the truth, this bug too will have a logical explanation that will leave us in wonder for as long as we aren't told how it happened.
- emmelaich 7 years agoIdentity management is complex and boring.
Apples user management is even more complex than most Unixes.
- x0x0 7 years agoOSX user management is weird. At least on prev versions, they don't show a root account in the Users & Groups ui.
A guess: there's a code path in the UI that is only tested on "mac" accounts, not the root account that the system requires to exist. Something about the non-macness of the root account interacts badly with the UI that expects to be run on a mac users account.
- tylerhou 7 years agoAnother user suggested it may have to do with Apple’s new file system: https://news.ycombinator.com/item?id=15801643
- LeoPanthera 7 years agoYou misunderstood. He's talking about a password hash storage system, not a filesystem.
- LeoPanthera 7 years ago
- migueh 7 years agoExactly, how can this happens and no one asks.
- wangweij 7 years agoI hope a judge will order Apple to make all source code of macOS to be readable by everyone. This does not necessarily mean open source: you will not be allowed to modify and re-release it.
- coldtea 7 years agoAnd that will help because Open Source security is so great?
Or because people care to inspect the codebases they otherwise use?
- jimktrains2 7 years agoI don't think you understand the difference between open source and free software. Allowing everyone to read it makes it open source.
https://www.gnu.org/philosophy/open-source-misses-the-point....
- coldtea 7 years ago
- OkGoDoIt 7 years ago
- jcoby 7 years agoBe careful testing this! It appears that you're creating a "root" superuser with no password. Be sure to clean up that user afterwords.
- rwc 7 years agoIt's worse than that. You're enabling the root user EVERY time you use this vulnerability. Even if you disable the root user in Directory Utility, logging in with root and no password will re-enable the root user.
- LeoPanthera 7 years agoYou can simply set a root password with "sudo passwd" to close the hole.
- thomastjeffery 7 years agoThen you better remember the password you set, or be sure that you will always have sudo access.
- tekacs 7 years agoAnd you might want to disable the root account again with `dsenableroot -d` as well, so that the root account stays disabled after the vulnerability is patched.
Unlike doing this through the GUI, this seems to retain the root password and prevent this vuln from re-occuring.
- thomastjeffery 7 years ago
- DavideNL 7 years ago...unless you set a password, right?
- mcintyre1994 7 years agoI haven't upgraded to High Sierra yet and this doesn't happen on my install atm. Does adding a password to the root user stop this vulnerability? If it does then that seems way better than disabling the account until this is fixed.
- LeoPanthera 7 years ago
- psychometry 7 years agoYou're not creating it, but rather enabling it. When the bug is triggered, the root user is enabled (per Directory Utility).
- fattire 7 years agoBut you are creating the password for it.
- fattire 7 years ago
- martinp 7 years agoThis support article explains how to disable the root user: https://support.apple.com/en-us/HT204012
- jameskilton 7 years agoDo note that this doesn't fix the problem. The system (at least High Sierra) will happily re-enable the user for every attempt at logging in.
- LolWolf 7 years agoJust change the root password once the account is enabled; this fixes the hole.
sudo passwd -u root
It's sad we have to do this, though.
- tekacs 7 years agoIf you disable the root user using `dsenableroot -d` from the Terminal, this seems to disable the account in a way that leaves its password intact.
- LolWolf 7 years ago
- jameskilton 7 years ago
- thought_alarm 7 years agoUntil this is fixed it's probably better to use Directory Utility to enable root with a strong password.
/System/Library/CoreServices/Applications/Directory Utility.app
Edit > Change Root Password
- mschuster91 7 years agoThe "root" superuser is always there, I'm not sure if it's possible to actually delete it.
- tempay 7 years agoIt is disabled by default[1] (meaning you can't login as it), this vulnerability appears to enable the root user without setting a password. If the root user has already been enabled it doesn't work.
Anyone who does this should probably set a password for now and then disable the root user account once it has been patched.
- srathi 7 years agoThis is the best workaround for now. Enable the root user with a strong password till the bug is fixed by Apple.
- srathi 7 years ago
- tempay 7 years ago
- ringaroundthetx 7 years agooh my god
- rwc 7 years ago
- _gjrn 7 years agoApple uses the slogan for High Sierra: "Your Mac. Elevated."
Kind of ironic that you can easily get elevated privileges with it.
- notanai 7 years agoCan this be used remotely? Edit: Yes, after turning on Remote Management on my second mac I was able to log into it using Remote Desktop, account root and no pw. It only works after getting physical access once.
- swozey 7 years agoYes, I just had a coworker test it after I enabled remote management and they used screensharing.app. I didn't even get notified a user remoted in.. never used screen share, that seems awful. Had to look over and ask if he was in.
edit: I should say, I did test this locally first so I don't know if a fresh machine that hasn't done it will do the same thing and let a remote account enable root.. Would like to hear if anyone tested it remotely WITHOUT doing it locally first.
- CGamesPlay 7 years agoYou can get undetectble remote access on most machines given "physical access once", so I don't think this qualifies as "remotely exploitable".
- thomastjeffery 7 years agoIf root was ever enabled without setting a password, the machine is then in a state that it can be remotely exploitable.
While it's unlikely, there are probably plenty of users who have done this for some reason or another.
Don't underestimate a user's ability to blindly do things like this by following arcane instructions in attempts to fix an unrelated problem.
- fattire 7 years agoNot according to this video:
https://www.youtube.com/watch?v=FpOH0lxEGBE
They seem to be remotely accessing the machine to both set and then use the root account.
- inflector 7 years agoThe system needs to have some sort of remote access, like screen sharing, turned on first, then you can remotely use the root account.
- inflector 7 years ago
- thomastjeffery 7 years ago
- pilif 7 years agoIt only works after getting physical access once to enable the root user by gibing any password UI the root user with no password (which will enable the local root account, which is also why it fails the first time around)
- djrogers 7 years agoI tested this by logging in as root at a preference pane then attempting to connect via ssh and screen sharing (both enabled) using root with no password. It did not work.
Not sure if you'd get different results after logging in as root at the login screen...
- rcruzeiro 7 years agoBeen wondering that myself since it seems that this also happens with the login screen.
- 7 years ago
- swozey 7 years ago
- runesoerensen 7 years ago"Perhaps nobody noticed two weeks ago when the root login vulnerability in macOS High Sierra was shared as a helpful tip on Apple’s own Developer forums. https://forums.developer.apple.com/thread/79235"
- tomduncalf 7 years agoI wonder what is going on with software quality and testing at Apple. It feels like recently there have been quite a few issues like this (the FileVault password bug, numerous issues with iOS 11, the issue that totally broke iOS Safari a couple of years ago) which should have been fairly easily caught, especially given the limited range of devices their software runs on.
I know testing is hard, but a company with Apple’s resources shouldn’t be making slip ups like this. It suggests some real issues such as lack of unit/automated tests and/or sufficient release testing, which pretty urgently need addressing.
Anyone got any inside scoop?
- bangonkeyboard 7 years agomacOS and iOS updates at Apple are now inextricably tied to new iPhone releases. There is a strict yearly deadline that the teams sprint toward, a timeline imposed by marketing rather than readiness. This affects prioritization of which features are pursued, where they lie in the stack, and how polished they get.
Insufficient testing at today's Apple is not limited to software. They bragged about their extensive input testing lab [0] when the new line of Magic accessories was released, but the Magic Keyboard with Numeric Keypad launched last summer had all of its inventory pulled from the channel last month because users discovered that the model was so thin that its midsection bowed over time.
[0]: https://medium.com/backchannel/what-i-saw-inside-apple-s-top...
- warent 7 years agoEverything ends in tears when managers mix up targets/estimates with commitments
- nikofeyn 7 years agoit is also that they pursue features just for the sake of it. things get moved arund in the iPad from release to release for no good reason, often going backwards in usability. every release i have to relearn simple things like how to manage the screen brightness. i really wonder what they are thinking internally other than “we need to shake things up to make it appear we’re doing something with stale products”.
- maxxxxx 7 years agoIt seems phones and tablets have reached the stage where laptops were maybe 15 years ago. All the major features are done and innovation is pretty much over. So they have to make a lot of cosmetic changes that look like activity.
- maxxxxx 7 years ago
- komali2 7 years agoHaven't deadlines at Apple always been driven by marketing? I'm looking for a source but I remember a story where the product director for iPod was told by steve jobs "make it simple, fast, beautiful, and have it done by Christmas."
- oneeyedpigeon 7 years agoThat's sure to send shivers down the spine of anyone reading it here but, to be fair to jobs, he managed to get exactly what he wanted on that occasion.
- oneeyedpigeon 7 years ago
- kifleswing 7 years agoWhere did you hear that the keyboard was pulled from the channel? It just seems to be out of stock for me.
- warent 7 years ago
- mikestew 7 years agoTake this for the anecdata that it is. I interviewed at Apple, referred by old Microsoft friends that worked there. As I was trying to get a feel for things before the interview, I asked about the software testing. I was told, "don't expect what you're used to at Microsoft". The reference there is from when Microsoft often had more testers on a team than devs (ah, the good ol' days). The summary of what I was told by friends, and the questions I asked during the interview, is that testers at Apple aren't the testers that Microsoft used to have. Microsoft had testers working in MS Research, researching ways to better test software. Apple, from the impressions I got, is doing good to have testers than can write "hello, world". This was from the app side of things, not OS; I don't know if it's any different on the OS side.
But since I don't work there, I have no good inside info. But just from gut feel, I don't think my anecdata is too far off the mark. Based just on the bugs made public, I just don't get the impression that there are testers at Apple whose sole reason for being there is to tear into a piece of software and break it. There was a bug a few weeks ago posted to HN that I commented on. I don't have a link without digging through my comments, but it was something along the lines of "how could a tester not find this in five minutes of exploratory testing?" This bug is similar. It would take more than five minutes, but were this my area to test I'd pick at it once in a while when I had a few minutes. As I pick at it, I wouldn't expect to find anything, but I've got a minute between builds, so instead of randomly clicking Facebook I'll randomly click this dialog. What did the dev forget? What weird state was not accounted for? Some kind of state overflow if I click the button enough times? Shove some Unicode in there, that didn't find anything; meh, maybe I ought to move o...hey, wait a minute. Did that thing just log me in as root?
But my gut says that Apple doesn't employ a lot of testers like that.
- jenoer 7 years agoAs a Tester myself, I cannot understand why this is not covered by either unit tests or behavioral tests. Clicking dialog buttons in rapid succession is what we (should) do once in a while. Especially in core functionalities such as the login screen. It's one of the first screens you see as a tester. And you have default usernames, be it enabled or not.
For example, I do not own an iPhone, but at work, I made a bet with my colleague (jokingly) that I could break _something_ on his phone in a few minutes.
I did not have his finger print or pin-code, so I was very limited, I even joked "I don't need that, give it here!"
Finding out I only had a hand full of options, I focused on the emergency dialer. As any good tester would be curious about, I wanted to check the max field length, so I entered digits, copy/paste it a few times, copy/paste that string, ("wait, no limit? Not even at 1000? why?") and so on, until I noticed the interface became laggy, so of course, I kept going.
Boom, suddenly back at the login screen, tried to open the emergency dialer, but got a full blank white screen, in the meantime the phone started heating up substantially. Since it was a new Phone (iPhone 7 with iOS 10.x I believe) and the dev getting nervous, we decided to reboot it. That fixed the issue. (Curious if this is still an issue in iOS 11.x)
TL;DR: As a tester this simple curiosity should be in your blood, and especially covered in behavioral tests when your software has been around for 5+ years.
- MrMid 7 years agoI got my friends Apple Watch stuck last week just by looking at it's features. IIRC it got stuck while using the "flashlight". It suddenly froze, and it took me a while to reboot it (it got stuck once more while rebooting).
All in all, it took me about a minute to break it, and around 5 minutes to get it working again. I was getting a bit nervous.
- Cthulhu_ 7 years agoThis bug isn't caused by rapid succession or whatever, it's more of a generic end to end test. In this case someone would have had to write an exact scenario that opens a settings page, unlocks it, types in 'root', no password, presses login and it should not work.
- MrMid 7 years ago
- yodsanklai 7 years ago> But since I don't work there, I have no good inside info
Actually, I've been wondering why I hear less about people working at Apple than at other big tech companies. It seems everyone and their mother work at Google or Facebook, but no so much at Apple. Do they have less software engineers, or their employees are required to be more discrete?
- mikestew 7 years agoDo they have less software engineers, or their employees are required to be more discrete?
I know but a few that work at Apple, and of those few they strike me as less forthcoming than the multitudes I've worked with and know at Microsoft. I've wondered if part of that is because Microsoft previews/pre-announces just about everything, whereas Apple (mostly, and not so much anymore) announces it when the shipping trucks show up at the local Apple store.
So the outcome from the Microsoftie is, "it'll do this that and the other, but that's all I can say right now." From a recent conversation with an Apple employee: "they make me go in a special room to use the hardware, and I can't work from home. That's all I can say."
Probably more so, last I looked, Apple has considerably fewer software employees than the other big companies.
- OJFord 7 years ago> or their employees are required to be more discrete?
Yes, I believe so. I've heard there are strict requirements on even internal discussion. (Who you can talk to; about what; where.)
- wil421 7 years agoCould it be the level of secrecy around Apple? I see responses for Google and Facebook devs on HN a lot but never Apple.
The only people I know locally that work for Apple are remote customer support folks.
- skc 7 years agoApple probably doesn't take too kindly to their employees talking about their work. I'd imagine it's a fire-able offense.
- 7 years ago
- 7 years ago
- mikestew 7 years ago
- 7 years ago
- jenoer 7 years ago
- zaidf 7 years agoUnrelated to Mac OS but I used to wonder all the time why iTunes connect was so shoddy. I got my answer when I learned Apple had outsourced a ton of backend work including iTunes Connect, App Store backend to Infosys in India.
They’re now retreating from that strategy: https://factordaily.com/apple-to-pull-back-development-work-...
- 2trill2spill 7 years agoIt seems apple's software has been trending down in quality since Snow Leopard.
- thanatropism 7 years agoI'll agree that Snow Leopard is the high water-mark.
- IBM 7 years agoIt's common among a small group of Mac users to hold Snow Leopard up as the peak of software quality, but only because of rose-colored glasses [1].
[1] https://www.computerworld.com/article/2528936/mac-os-x/snow-...
- sanityUnbounded 7 years agoI have been in the apple ecosystem for about 10 years. For a company that has been priding itself on end user security, the bugs that have been creeping their way into the OS are just... disappointing. What is the point of paying a premium for a well polished hardware/software bundle if the OS is malfunctioning in a non trivial manner. Design? Right now when I use my calculator app on my iPhone and do 2+2+2 I get 24. That's a pretty awful design. Actually, it's a lie.
- e5an 7 years agoIt can't be a coincidence that this was the last major release before Steve Jobs died.
- mikeokner 7 years ago3rded. I wish time stopped at 10.6.8.
- IBM 7 years ago
- thanatropism 7 years ago
- wonderous 7 years agoApple has always had QA issues, the difference now is that they’re increasingly tested by the users, hackers, etc.
- ben_w 7 years agoDifference? MacOS userbase hasn’t changed much since 2011, I thought?
- eric_h 7 years agoI've no information on how good this site's data is, but https://www.statista.com/statistics/218089/global-market-sha... seems to show that from 2013-2017 global macOS market share has increased from 7.95% to 11.3%.
- eric_h 7 years ago
- ben_w 7 years ago
- spamizbad 7 years agoThe loss of people like Avie Tevanian and Bertrand Serlet took its toll.
Are there any "(tech) household name" engineers doing system-level work on iOS/macOS these days? It seems like Google and Facebook have a slew of them.
- danieldk 7 years agoDominic Giampaolo of BeOS/BeFS fame. He now works on APFS at Apple. Their work is really - impressive APFS was announced in June 2016 and rolled out on iOS devices in March 2017. Given that the APFS roll-out was relatively uneventful and how they tested it [1], it seems that they can still do low-level engineering and proper testing.
Of course, until recently they had Chris Lattner as well.
[1] For some iOS releases, they converted HFS to APFS in-place, report the results back to Apple, but did not write the APFS 'superblock' to keep the filesystem HFS+. It's quite a smart idea, because they got reports from millions of devices without actually switching them to APFS.
- 72deluxe 7 years agoWhilst APFS is an improvement and I fondly remember using BeOS back in the day, I am not sure APFS is that impressive feature-wise compared to NTFS. It's still miles behind NTFS, which is now ancient.
- 72deluxe 7 years ago
- LeoNatan25 7 years agoIn the case of Facebook, all the “household named” developers do nothing to improve the quality of their output, be it their user-facing software or developer-facing open source.
- danieldk 7 years ago
- adamio 7 years agoRepressive collusion to fix salaries and restrict industry movement, doesn't really inspire your employees to try their best
- mholt 7 years ago> Anyone got any inside scoop?
I have a feeling that anyone who does would get fired for commenting here about it.
- ianmcgowan 7 years agoYou have to think that whoever was responsible for testing this is going to get fired. This is egregiously bad...
- fmihaila 7 years agoThis is a management issue. It shouldn't be possible for such a mistake to slip into production code. It has happened more than once in recent times.
- fmihaila 7 years ago
- ianmcgowan 7 years ago
- cm2187 7 years agoiTunes had QA problems for more than 10 years, only the early versions were really solid. I am not sure that it is a recent problem.
- tomc1985 7 years agoSubjectively it feels like Apple bugs have become larger and more prevalent, over the last few years. That and IMO clean OSX/iOS installs don't quite feel as polished as they used to. (I stopped using Apple products, except for a MBP, for a few years and recently started using them again, and the MBP still runs 10.10 for precisely this reason) The last solid OSX release was Snow Leopard
- Cthulhu_ 7 years agoThey've added features over the years without removing or polishing them; there's Launchpad which was added in a period where OSX seemed to lean towards becoming touch-friendly, but it didn't replace any existing feature (iirc) and just feels off. Might just be me though. Notification center? Don't use it.
- Cthulhu_ 7 years ago
- tomc1985 7 years ago
- socalnate1 7 years agoA [?] don't know what you are talking about.
- rogaha 7 years agoI've experienced lots of issues wiht IOS and High Sierra as well. Apple definitely reduced their software quality since IOS 11.
- k3a 7 years agoAnd seeing this I am wondering why people still trust closed-source software. My long term dream is using 100% free software on a HW with minimum binary blobs.
- pasta 7 years agoThis also can happen in open software. So I don't think your comment is valid.
Open software enables people to take a look inside to what is going on. It isn't a cure for bug free development.
- fstephany 7 years agoIt reminds me the KMail bug: https://www.ctrl.blog/entry/kmail-cve-2017-9604-openpgp
Some security bugs exist in the Linux/BSDs kernels for a loooong time before someone notice and fix it (e.g., https://media.defcon.org/DEF%20CON%2025/DEF%20CON%2025%20pre...)
- fstephany 7 years ago
- pasta 7 years ago
- princetontiger 7 years agoI'm going back to Windows after a 10 year hiatus. Mac has definitely declined.
- draw_down 7 years agoNo clues from me, but the problem is undeniable. Their stuff just does not work well anymore, and it has been so for a while now.
- umanwizard 7 years agoAnecdotal but I started noticing a decline in quality after Steve Jobs died.
- bsaul 7 years agoi'm still wondering if that impression ( which i share) is real or not.
At the minimum, i'd say i feel apple release less innovating os versions while producing at least the same number of bugs.
- bsaul 7 years ago
- bangonkeyboard 7 years ago
- thesephist 7 years agoEncouraging users to "try it" is dangerous here. Recreating the bug enables root user across the system, and most users won't know how to disable it.
TechCrunch, if you're reading this... please discourage people from reproducing the bug.
- hw 7 years agoThere’s no need to do this yourself to verify it. Doing so creates a “root” account that others may be able to take advantage of if you don’t disable it.
That should be much higher up in the article.
- geoelectric 7 years agoI really wish it had been. I had no idea it was something that A) left droppings, and B) actually enables direct login from boot with root/no pw once you've done it.
Apple's going to have to nuke everyone's root account on an update. I don't see any other solution that won't leave a shitload of machines with open root accounts from trying the fun tweet and then never setting a pw.
- FabHK 7 years agoWouldn't it make sense to propose this combined diagnostic and workaround:
1. Try logging in with root and a good password. It should not work (if it does, root with that password had been enabled before).
2. Now, try logging in again with root and that same password.
2a. If it works, your system was vulnerable to that bug, but you've now fixed the problem, as you've enabled root and set a good password (so nobody else can log in unless they find that password).
2b. If it doesn't work, it looks like root had been set up before with some other password (maybe empty), and it's conceivable that someone has exploited that bug on your machine before.
Is that understanding correct?
- geoelectric 7 years ago
- CrendKing 7 years agoThis bug exists regardless of user reproducing it or not. If there is anything good, reproducing it actually brings awareness to the user (make them change the password maybe). Hacker will "enable" the root user anyway.
What should be done is that Apple releases fix to this problem.
- Jedd 7 years agoNot the case.
Once you enable root access - by 'testing' this - others can remotely & silently access the system as root.
GP is right - don't encourage people to test this, as there's nothing to gain from it. If you're on a shared machine you need to mitigate. If you're on your own dedicated machine you need to not share it until this is fixed.
- thomastjeffery 7 years ago> others can remotely & silently access the system as root.
They already can:
https://gfycat.com/gifs/detail/sentimentalnaiveantelopegroun...
- tekacs 7 years agoEven if you're on a dedicated machine, this vulnerability enables a local user to bypass the authentication prompt on things like System Preferences or other auth checks.
I'm advising folks (incl. non-tech) to set a root password and then re-disable the account (specifically via shell), which prevents this from re-occuring:
- biktor_gj 7 years agoNo, root is root and has always been there. It's the super user account and cannot be removed, I think, from any modern unix like os (well, you can rename it to whatever you want in linux but UID 0 will always be there). The difference might be that if you do log in for the first time you will have lots of stuff on /private/var/root (talking from memory but it was something like that in OSX) and lots of preferences will be set, maybe even a /Users/root folder I hope that the SSH server, which is disabled by default, will also handle root login in a sensible way, but given the size of the f* up, I'm not so sure.
Really bad stuff
- djrogers 7 years ago> Once you enable root access - by 'testing' this - others can remotely & silently access the system as root.
That's not accurate. The user appears to be there either way, but attempting to log in to a machine remotely using 'root' and no password does not work - even after doing the preference pane thing...
- thomastjeffery 7 years ago
- devindotcom 7 years agoYeah that was my thought initially too but there may be invisible ways to leverage an existing root user that we're not aware of. After all, this bug exists...
- stingraycharles 7 years agoThe issue is that the bug leaves a password-less root account available through other means as well. Once you try to reproduce the bug, an attacker could potentially do a remote root login without password.
As such, it's very dangerous for people to try to verify and should be strongly discouraged.
- stingraycharles 7 years ago
- arghwhat 7 years agoThis vulnerability lets users activate the root user without using their password.
Once done, you have opened for root without password globally. That's bad.
What they should do, as responsible disclosure dictates, is report it in secret to apple, and at most publicize a workaround (activate root user, set password) without reporting the details of the vulnerability.
EDIT: It does not appear to be limited to admin users. It appears to be related to disabled root accounts of older origin, such as through upgrades. I cannot reproduce on a fresh High Sierra install, but I reproduced on an upgraded install.
- throwaway2048 7 years ago"responsible disclosure" isn't some morally unassailable high ground, but companies like apple sure want you to believe it is.
- jmuguy 7 years agoI run as a standard user and was able to reproduce the bug.
- sounds 7 years agoI agree that we need more responsible disclosure. But as https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-w... explains, blame the DMCA.
Somebody in Turkey has no expectation that they will be treated with respect. It's much more likely they will be attacked as in "shoot the messenger." (So, please don't attack the person who brought this to our attention.)
I think they made a reasonable decision, due to the critical nature of this bug, and tweeted about it.
- throwaway2048 7 years ago
- Jedd 7 years ago
- thomastjeffery 7 years agoIt can already be activated remotely:
https://gfycat.com/gifs/detail/sentimentalnaiveantelopegroun...
- devindotcom 7 years agoI was wondering about that. I'm going to change this.
- 7 years ago
- eganist 7 years agoThanks :)
- 7 years ago
- sephicr 7 years agoYes, but the most secure thing to do at this point _is_ to recreate the bug and then set a password for the root user.
Otherwise the hole is still there for others to exploit.
- pilsetnieks 7 years agoIf you set a root password, this bug still works, it seems to reset the root password.
Edit: I was partly wrong. The bug still works if you disable root afterwards, then it reenables and resets it.
- ukblewis 7 years agoYeah, you’re safe if you keep the foot account alive and you set a password for root. At least as far as I can tell...
- ukblewis 7 years ago
- pilsetnieks 7 years ago
- kreeWall 7 years agoCan you talk about how to correctly disable the root account if someone did try it?
- martin-adams 7 years agoIf you're wondering how to disable it, the menu option can be found here: https://support.apple.com/en-gb/HT204012
- mediocrejoker 7 years agoAccording to another comment thread here https://news.ycombinator.com/item?id=15802113 disabling from the GUI re-enabled the bug.
On my laptop I was able to exploit the bug from the local GUI and then disable it from happening (as far as I can tell) by changing the root password from the shell with sudo passwd root and then disabling the root user altogether with dsenableroot -d
- mediocrejoker 7 years ago
- martin-adams 7 years ago
- AdamJacobMuller 7 years agoEnables root access in what way?
- 7 years ago
- selectodude 7 years agoMac OS X doesn't have a real root account, it uses sudo exclusively. This enables a true root user shell.
- AdamJacobMuller 7 years agoThe root account always exists.
Playing around with disable/enable and the exploit: Root always has a /bin/sh shell "Disable root user" removes the ShadowHashData from the directory services entry for root The bug sets ShadowHashData to the hash of an empty string.
Now, ShadowHashData is a complex DS entry. I've never seen passwords represented this way in other OSX versions. I think this password storage format is new.
I strongly suspect the bug here is one related to OSX attempting to upgrade the password to the new storage format and when it does that, it inadvertently stores the password with a hash of null.
This should be very trivial for Apple to fix that (and thus "disable" the root user) by just removing any ShadowHashData that is solvable by an empty string.
- AdamJacobMuller 7 years ago
- 7 years ago
- hw 7 years ago
- TonnyGaric 7 years agoApple released the following statement regarding this bug:
"We are working on a software update to address this issue. In the meantime, setting a root password prevents unauthorized access to your Mac. To enable the Root User and set a password, please follow the instructions here: https://support.apple.com/en-us/HT204012. If a Root User is already enabled, to ensure a blank password is not set, please follow the instructions from the ‘Change the root password’ section."
- sanbor 7 years agoThank you! I was looking for a workaround to avoid leaving my system vulnerable until the patch lands in App Store.
- SyneRyder 7 years agoThat might not be enough. There's a tweet claiming it isn't limited to the root account, and applies to other similar Apple-default accounts on the system, such as the _applepay user account:
https://twitter.com/unsynchronized/status/935656609140711426
That seems to match the technical explanation of the bug here:
https://objective-see.com/blog/blog_0x24.html
The tweet claims they've got Apple Remote Desktop access & screen sharing working via the _applepay user account. Why/how that's possible, I have no idea - I don't have High Sierra to confirm this, and I'm not sure I'd want to mess with the _applepay user account even if I did.
- SyneRyder 7 years ago
- sanbor 7 years ago
- _jomo 7 years agoCurrent workaround / fix:
1) open Directory Utility app (via Spotlight or other) 2) Click lock to make changes, log in with admin account 2) Click Edit -> Enable Root User 3) Click Edit -> Change Root Password… 4) Set a password 5) Do NOT disable root user!
If you disable the root user, the admin prompt will create it again with an empty password.
- 7 years ago
- saagarjha 7 years agoOnce the fix for this issue is out, you should disable the root user.
- 7 years ago
- Shank 7 years agoWith user switching enabled as a username + password combo, I was able to login to the root account from the login screen with no password on 10.13.1. It's not just a UI bug, it's a full on authentication bypass.
- coreymayo 7 years agoI'm able to do this as well, login as root with no password from the login screen.
- coreymayo 7 years ago
- quicklime 7 years agoAnyone else think it was a bad idea to disclose this so publicly over Twitter? I thought that the usual practice was to let the development team know first.
- SAI_Peregrinus 7 years agoLetting the development team know first is nice to the development team, but not so nice to the users (especially not-nice if there's a workaround, which there is in this case.)
My personal policy: If there's a workaround or mitigation, then full disclosure is more responsible. If there isn't then report to developers and CERT or similar. Never report only to developers, always have a deadline for full disclosure, and always have a third-party (CERT, Project Zero, etc) to disclose if you come under legal fire.
- 5ilv3r 7 years agoTime and time again we have been shown that the way to a company's heart is through it's PR department. This is a dev complaining to Apple like a lunchgoer would complain to Mc D's about a bad burger. Expect more of it.
- kiliankoe 7 years agoSeems to go for almost all issues regarding Apple. I've been reporting that calculator bug since iOS 9, with updates for several betas that it's still there. Two years later someone with a significant following on Twitter writes about it, gets enough retweets and Apple finally fixes something so miniscule.
- kiliankoe 7 years ago
- Quarrelsome 7 years agoits such a braindead problem that its plausible that the person who disclosed it over twitter didn't know what responsible disclosure is. Usually exploits are hard to exploit meaning that those who find them likely know of responsible disclosure. In this case though anyone who has ever installed Linux is capable of stumbling upon this.
- vortico 7 years agoIf the vulnerability required scripting or special tools to be written, yes, it should be disclosed in private. But anyone can happen upon this, and I imagine the reaction for most is "Huh! That's funny! My friends and followers would get a kick out of this!" He was just being social about a problem he found with his new computer, which is something most people would do upon finding a something you can laugh about.
- fastball 7 years agoNah, Apple really needs to realize that they need to step up their game. This might hurt some users, but it sets a much needed fire under Apple's ass.
- hobonumber1 7 years agoHe just wants attention.
- 7 years ago
- SAI_Peregrinus 7 years ago
- ianmcgowan 7 years agoConfirming this works, both from preferences, as well as from the main login screen
It seems like root has no password by default. Setting one is enough to close the hole. This is unbelievable!
Curious to see what's in /var/db/dslocal/nodes/Default/users/root.plist before trying this.
- shoghicp 7 years agoThese are the contents of the file, after converting them from binary plist to plain xml: https://gist.github.com/shoghicp/2b529b54b9d70daf192b68e3564...
- ianmcgowan 7 years agoAh, there's no ShadowHashData or KerberosKeys nodes. Presumably the code creating that plist is not aware that later on it's going to be accessed thru layers of other software and end up as a usable login. To quote Shrek: "Software is like an onion".
- ianmcgowan 7 years ago
- shoghicp 7 years ago
- jonny_eh 7 years agoLooks like changing root’s password blocks the exploit but if you disable the root user, it re-enables the exploit.
Protect yourself by changing root’s password: ⌘ (Command) + Space, Directory Utility, click the lock and enter your password, Edit -> Change Root Password…, then do NOT disable Root User.
Or open a terminal and do:
sudo passwd
- AdamJacobMuller 7 years ago> click the lock and enter your password
or just enter root with no password
- jonny_eh 7 years agoHa, ya. That way you know it's still needed!
- jonny_eh 7 years ago
- davidkclark 7 years agoDisabling the root user again with
does not re-enable the exploitdsenableroot -d
- thomastjeffery 7 years ago
Does that change the password for the current user without authentication, or does it change the password for root without authentication?sudo passwd
I think it would be best to recommend an unambiguous
sudo passwd root
- LeoPanthera 7 years ago"sudo foo" with no other arguments runs "foo" as root. "passwd" with no other arguments changes the password of the user it is running as.
"sudo passwd" unambiguously changes the password of root.
- LeoPanthera 7 years ago
- AdamJacobMuller 7 years ago
- sizzzzlerz 7 years agoFortunately, I'm OK. The latest OS upgrade failed to install and bricked my computer so that no one could log in, let alone root. I was able to restore it using Time Machine but I don't think I'll go through that exercise again for a while yet.
- Piskvorrr 7 years agoThat probably takes some major doublethink: convincing yourself that a bricked machine is less broken than a vulnerable one.
- anon1253 7 years agoyou might be able to fix that. I had that too, had to manually update the preboot. Details are somewhere in here https://forums.developer.apple.com/thread/80174
- Piskvorrr 7 years ago
- dailyvijeos 7 years agoApple along with a decline in product utility, reliability and quality, their software has been getting buggier every year post-Jobs. The QA people should be fired and replaced with a team whom insists on perfection. Otherwise, these embarrassing incidents will repeat, errode their brand and encourage customers to seek other platforms.
- 2trill2spill 7 years agoApple has a serious software quality problem. Last night I was helping a friend with their computer. Safari couldn't even render apples website correctly. Nor could Safari connect to any site with HTTPS. Installed FireFox and HTTPS sites worked and apples's site renders. But the submit button on their developer site is broken[1]. Mail on my Mom's fully updated laptop crashes every time it's opened. Once I reported a bug in ptrace like 4 years ago and no response yet. Also the archive utility fails often to extract tar files that the tar command has no problem extracting at all. Quicktime can't play most videos, etc, etc. And now shipping an operating system with a root account with no password by default.
Come on Apple you have a quarter trillion dollars in the bank why don't you spend some on improving your software.
- eridius 7 years ago> Safari couldn't even render apples website correctly. Nor could Safari connect to any site with HTTPS.
Sounds like something's wrong with your friend's computer, because neither of those issues are reasonable to expect no matter what your opinion of Apple's software is.
> But the submit button on their developer site is broken
Given the number of people who've successfully gone through that form, I'm willing to bet it's a content blocker extension that's blocking some dependency the form needs.
> And now shipping an operating system with a root account with no password by default.
The OS actually ships with root disabled. The bug isn't that there's no password (after all, a factory-set password isn't any more secure), the bug is that the login form is somehow re-enabling the root user when it's not supposed to be able to do so.
- 2trill2spill 7 years ago> Sounds like something's wrong with your friend's computer, because neither of those issues are reasonable to expect no matter what your opinion of Apple's software is.
Doubtful Firefox and Chrome work just fine.
> Given the number of people who've successfully gone through that form, I'm willing to bet it's a content blocker extension that's blocking some dependency the form needs.
Brand new install of Mac OS on a new SSD. So Safari was clean no extensions, no custom configuration.
> The OS actually ships with root disabled. The bug isn't that there's no password (after all, a factory-set password isn't any more secure), the bug is that the login form is somehow re-enabling the root user when it's not supposed to be able to do so.
Mere semantics, It doesn't matter if root is being "reenabled" or not. From an attackers point of view High Sierra effectively ships with root with no password.
- eridius 7 years ago> Doubtful Firefox and Chrome work just fine.
That doesn't mean anything. It just means that whatever is messed up affects Safari. It's not like the computer recognizes "oh those 3 apps are all web browsers, therefore if I'm going to screw one of them up, I have to screw them all up". Your claim would carry more weight if you were listing multiple browsers that all use the same system-provided WebKit.framework, but Firefox and Chrome are completely separate browsing engines.
Regarding the HTTPS issue, I believe Firefox and Chrome maintain their own list of root certs, so one possible way the computer could be screwed up is having the system-managed root cert list be damaged (you didn't specify what actually happens when trying to connect to HTTPS sites so I don't know if this is actually a plausible cause in this particular case).
> Brand new install of Mac OS on a new SSD. So Safari was clean no extensions, no custom configuration.
Well I don't know what to tell you, except to point out that there's, what, hundreds of thousands of registered Apple developers now? who've all had to go through that form, and there's only a handful of people on that thread, so it's far more likely to be a local issue.
- eridius 7 years ago
- mostlyskeptical 7 years ago>neither of those issues are reasonable to expect no matter what your opinion of Apple's software is.
Neither is your password showing up in a password hint field (or anywhere for that matter... why is it even stored unhashed?).
Neither is logging in with a blank password enabling a disabled root user.
- eridius 7 years ago> Neither is your password showing up in a password hint field (or anywhere for that matter... why is it even stored unhashed?).
It's not stored unhashed. And the password hint field never showed the password, it always showed the password hint.
The bug was Disk Utility's UI was accidentally using the password field instead of the password hint field when passing the data to the underlying API.
> Neither is logging in with a blank password enabling a disabled root user.
Stupid and awful bug, sure, but I actually can understand it. Something that's worked fine for years breaks because of some change to some underlying system, and there weren't any existing tests to see what happens if you try and log in as root (root has been disabled by default for something like 15 years, so it doesn't surprise me that people don't test trying to log in with it).
But apple.com not rendering right in Safari? That doesn't make sense, you know damn well apple.com is basically designed to be viewed in Safari and everybody that works on it is going to be using Safari with it.
And Safari not being able to load HTTPS sites makes even less sense. That literally breaks most of the web. This has to be an issue with the local computer.
- eridius 7 years ago
- 2trill2spill 7 years ago
- markdog12 7 years agoPaid $3,000 for an iMac. Can't even watch any video or have the kids FaceTime their grandparents because video freezes constantly. Rebooting fixes it...for 2 minutes.
- minusSeven 7 years agoIts not just Apple though. Microsoft had the similar problems in the past. Edge did not support silverlight causing people to move to other browser. It was strange to see Microsoft's own software not supported by Microsoft.
- 2trill2spill 7 years ago> Its not just Apple though. Microsoft had the similar problems in the past. Edge did not support silverlight causing people to move to other browser. It was strange to see Microsoft's own software not supported by Microsoft.
In my personal experience Windows has been much better than MacOS for me. I've been using Windows 7 for the last year at work and I'm having significantly less problems with Windows then MacOS. But Windows and MacOS both give me more problems then a FreeBSD or Linux box ever has.
- anko 7 years ago> I'm having significantly less problems with Windows then MacOS.
I'm interested.. What kind of problems?
> But Windows and MacOS both give me more problems then a FreeBSD or Linux box ever has.
I switched from linux on the desktop to MacOs precisely because of the problems linux had - driver support, even LTS updates breaking functionality, and overall clunkiness. I run linux on all my servers.
- snowpalmer 7 years agoWindows 7 has been on the market since 2009 while High Sierra has been out since June of this year. I feel like we're not comparing apples to apples here.. I'm sure both companies are releasing security fixes consistently and Win7 has clearly had more of them in 8 years.
- anko 7 years ago
- strictnein 7 years agoSilverlight was EOL'd five years ago.
- reaperducer 7 years agoTell that to Dish Network.
- reaperducer 7 years ago
- oefrha 7 years agoEdgeHTML sure has advanced a lot from Trident, and I appreciate their openness with Platform status, but Edge as a browser is still a joke IMO.
The other day I had to use vanilla Windows 10, and wanted to save a text file from Edge. Nope, there's no such functionality. The closest thing to save is print to PDF.
- will_hughes 7 years agoIt was partly a marketing thing, but Edge is not IE, and Edge has never supported any plugins (which Silverlight is).
- Piskvorrr 7 years agoCorrection: Edge is Not-IE(-Not-At-All-Nooosir)
- Piskvorrr 7 years ago
- heedlessly2 7 years agonewsflash: every big tech company is plagued with software issues
Google's Playstore is plagued with malware and other scam apps. iTunes occasionally has scam apps too but PlayStore is much worse.
- asejfwe8823 7 years agoMS announced they were abandoning Silverlight ~5 years ago now. Any platforms using it should be avoided like the plague.
- 2trill2spill 7 years ago
- eridius 7 years ago
- martell 7 years agoSeems as though this tweet is not the first time it came up in public. Nov 13, 2017 12:48 PM
https://forums.developer.apple.com/thread/79235
Screenshot. http://oi67.tinypic.com/2h6embp.jpg
- mygo 7 years agoMy computer automatically downloaded high sierra without me wanting it to. Whether I was tricked into clicking something I don’t know. And then I heard about the disk utility password bug and decided I should wait a while before installing this OS— it seems as though Apple wants me to do their QA for them. And now I hear about this. And I see that dumb ugly notch on the iPhone X (seriously who approved that design decision?). And the 2015 MacBook Pro is more pro than the 2016 model? Apple is officially a tribute band, riding on the fame of its previous self. And I say this as someone who owns a MacBook Pro, MacBook Air, iPad Pro, iPhone, and Apple Watch. This comes from a place of love. You’re trendy now, but don’t you forget that trendy people will leave you for the next shiny thing in an instant. Please fire everyone who is just there to milk the profits, actually put some focus back into QA, and remember who your base was.
- milesokeefe 7 years agoHave you used an iPhone X? The notch actually makes a lot of sense once you've used the gestures associated with it, same with how it integrates into apps. I'll agree that they've made a lot of mistakes in their product lines recently but the iPhone X was not one of them.
Well, sparing software. I've had intermittent phantom screen input using the latest betas on the X, making it infuriatingly unusable at times.
- mygo 7 years agoI get that you can swipe down from the left or the right. But obscuring a chunk of the screen is not something to aspire to. The notch is clearly a compromise to make room for hardware. They should have found a way to fit the hardware such that it doesn’t cutaway the screen.
- fastball 7 years agoNothing wrong with incremental upgrades.
- fastball 7 years ago
- mygo 7 years ago
- milesokeefe 7 years ago
- nathancahill 7 years agoFix this by setting a password for root (or disable).
Instructions here: https://support.apple.com/en-us/HT204012
- buryat 7 years agoAWS ReInvent 2017 is going right now in Las Vegas, the number of attendees is about 40000, and I'm wondering how many laptops can be attacked using this technique. The `root` user stays in the system, so one just need to create it and open SSH quickly, and later they can do whatever they please.
- joshuaturner 7 years agoThis reminds me of the jailbreaking scene a few years back. I was at an event centered around jailbreaking, and you were able to ssh into 80% of users iOS devices by using the default root password, alpine.
- Washuu 7 years agoUnlikely any AWS imaged employee MacBooks at least. AWS IT back in the beginning of October forbade employees to not upgrade to High Sierra.
- the_duke 7 years agoI really hope there's an extra zero in your 40000.
- buryat 7 years agoMaybe closer to 35000, but yeah, that's the scale of ReInvent, last year AWS reported 24000 attendees. I was there last year, that's a lot of people
https://aws.amazon.com/blogs/apn/why-sponsor-aws-reinvent-20...
- buryat 7 years ago
- joshuaturner 7 years ago
- mikeash 7 years agoFor those who can't make it happen, it requires that the root account is disabled, which is the default. If you already enabled the root account for some other reason (which apparently I had on one of my Macs, although I don't know why) then that prevents it from working.
It seems like the best mitigation for the moment might be to enable the root user and set a password for it.
- swat535 7 years agoThis is comical at this point. I have no idea how such vulnerable software makes it to production.
It is really ironic that a company, making billions of dollars and branding itself as the leaders of quality, stability and so on, to have this kind of vulnerability.
I have truly lost faith in Apple.
- gluestic 7 years agoAgreed.
iOS 11 was the tipping point for me (can't delete photos using trash icon, wrong orientation when unlocking phone, random lag/freezes etc).
Apple just doesn't care any more.
- piyush_soni 7 years agoUnless you buy Apple Care, of course.
(Sorry, couldn't resist writing :) )
- gluestic 7 years agoI chuckled.
- gluestic 7 years ago
- piyush_soni 7 years ago
- rimliu 7 years ago
The days of Mac vs. PC guy are long over. Apple usualy compares their products only to their other products now (best iPhone ever, not best smartphone ever, etc.) Alas if you look around such vulnerable software makes it to production now and again, there is nothing new. Hindsight is 20/20.> and branding itself as the leaders of quality, stability > and so on
- kayoone 7 years agoi am not saying something like this will always happen, but it can happen. No matter what kind of testing and QA you employ (and i bet it's gigantic in Apples case), not having critical bugs in something as complex as an OS every few years is kind of impossible.
Should it happen ? Obviously not. But even popular open source software used by millions and developed by hundreds is not free of issues like this, like Heartbleed showed.
- ag_47 7 years agoFWIW, as a mostly Android user, the latest Oreo update was pretty terrible as well. Its all about adding new "features" just for new features sake isnt it.
- gluestic 7 years ago
- myth_buster 7 years agoIs social media the goto for reporting security vulnerabilities in 2017?
If I remember correctly, one is supposed to make it public once patched or in event of no response, no?
Edit: What is "Responsible Disclosure"[0]?
- ams6110 7 years agoSomeone notices that they can log in as root with no password. In 2017, reflexively tweeting about it seems pretty unsurprising.
- fredsted 7 years agoSeems like the guy just discovered this by accident. It's not like you'd have to be a security engineer to stumble upon this.
- fredsted 7 years ago
- donatj 7 years agoI think the difference is if the problem is discovered by Joe Schmoe or a security researcher.
- FireBeyond 7 years agoWhere is Joe Random's obligation to responsibly disclose?
To whom does he owe that obligation? Apple? The public? Both? Why?
- TallGuyShort 7 years agoIn my opinion they don't "owe" anyone that obligation, unless it's a contractual obligation associated with using a Mac. But just because it's not owed to anyone, doesn't mean there isn't a nicer way to handle it just to be nice.
That said, I don't immediately see evidence that this gentleman is in the security field, and perhaps isn't aware of responsible disclosure. Full disclosure isn't the worst thing in the world.
- TallGuyShort 7 years ago
- cotillion 7 years agoThis is one of those cases where responsible disclosure just means you're doing the job one of apples automated tests should be doing.
- testvox 7 years agoFull disclosure is also a form of responsible disclosure.
- DonHopkins 7 years agoTwitter's also the goto for banning trans people from military service, attacking freedom of the press, threatening to declare nuclear war, and all kinds of other things too.
- ams6110 7 years ago
- thrusong 7 years agoThere have been some really horrible bugs at Apple lately. I'm still waiting on them to patch the camera bug in iOS 11 where if you try to use the camera in a web app pinned to the home screen, it shows the camera UI on a black screen. This dates back to June. How can it be that hard to patch such a glaring and embarrassing problem?
- milesokeefe 7 years agoHow many people are using the camera in pinned web apps? What's the app you use? I'd imagine most camera-related functions are already best served by native apps.
- thrusong 7 years agoDoes that make it OK? I mean, something as important to the web as getUserMedia is broken on websites only if you pin it to the home screen. Forcing people into Apple's walled garden doesn't seem like an acceptable excuse.
- milesokeefe 7 years agoIt's certainly not acceptable, I just think it hasn't been a priority for Apple since it's a relatively niche usecase.
It could also be a security/privacy decision to leave it broken but safe until they can implement camera access through WebViews securely.
The closest to any official reason I could find is a dev letting us know that mum's the word:
>I asked about this internally and the answer is that, right now, WebRTC is only supported in Safari. No WKWebView, not even SFSafariViewController.
- milesokeefe 7 years ago
- thrusong 7 years ago
- milesokeefe 7 years ago
- zaro 7 years agoWow. This is fun. I remember my Windows98 had the same feature. You just use Administrator with empty password and you're in. Apple is finally catching up.
- ksk 7 years agoAFAIK, its not really a security bug. Windows 98 didn't really have any concept of user security. With the default install you could always cancel out of the login dialog and use the guest account. Every account was an 'administrator'. The user name / pwd was mainly to store the OS customization settings like UI colors and such.
- anon1253 7 years agoI believe hitting "cancel" was enough. https://www.youtube.com/watch?v=DE5PRW-AR7Q
Also reminds me of https://youtu.be/BVL8_ne4WZo?t=19s
- dabernathy89 7 years agofrom the only top-level comment on that video:
> That isn't a login screen for Windows 98, it's a login for Microsoft Networking (which the box shows). If you had any shared mapped drives, network privileges, etc they wouldn't work if you cancelled. If you had multiple profiles set up, you wouldn't get those either. Win98 wasn't intended to have password security.
- anon1253 7 years agoGood point. Been a while. Windows 7 also has/had an interesting one https://www.youtube.com/watch?v=zwO4YqSc4XE but it's much more involved.
- anon1253 7 years ago
- dabernathy89 7 years ago
- pkaye 7 years agoDid Windows98 even have administrator role? I mean FAT file systems don't even have file ownership right?
- lerpa 7 years agoIt did. But didn't have security tied to the fs.
- lerpa 7 years ago
- romanovcode 7 years agoExactly my thoughts. I remember this, I think even early versions of WinXP had this feature.
- Grollicus 7 years agoExactly early versions of Windows XP had this: They removed the Administrator user from their graphical login splash but when booted in rescue mode ("Safe mode") you could just type in "Administrator" with no password and were in. On Win98, you could just cancel the login.
- Grollicus 7 years ago
- yread 7 years agoit was a feature not a bug. something related to not DoSing yourself by forgetting your password /s
- ksk 7 years ago
- thought_alarm 7 years agoThis will be a fun fix.
They'll not only have to patch the vulnerability but they'll also have to disable all of the root accounts that were inadvertently enabled. What a mess.
- perfectstorm 7 years agoWhat's going on with Apple's QA team ? Here's another serious bug that I came across:
I've two factor authentication on my Apple account and now every time I use a new browser (or after clearing the Cache) and try to log into one of the Apple developer sites it sends me the authentication code to the same machine that I'm using. How is that two factor ?
I've an iPhone which is connected to the same account but it's not my primary phone so it's most likely not ON when I do this. I guess Apple tries to send the code to my phone and when it fails sends to the next online device which happens to be the same machine I'm using to log in. So all I have to do is click Allow and enter the 6 digit code which is displayed in a different app.
- rgrove 7 years ago> I've two factor authentication on my Apple account and now every time I use a new browser (or after clearing the Cache) and try to log into one of the Apple developer sites it sends me the authentication code to the same machine that I'm using. How is that two factor?
Your password is something you know. Your computer (which is associated with your Apple ID) is something you have.
If someone tries to log in using your password from another computer, your account is safe. If someone steals your computer but doesn't know your password, your account is safe. You're only in trouble if someone steals your computer _and_ knows your password.
- rgrove 7 years ago
- dyavuz 7 years agoIn the meantime, if you'd like to protect your mac, you can set a password for root by going to:
System Preferences > Users & Groups > Login Options > Join > Open Directory Utility > Edit > Change Root Password
- cyberferret 7 years agoStandalone iMac here - the 'Join' button is disabled. So is this vulnerability only for Macs on a network?
EDIT: My bad - editing was locked on that screen. Got it now...
EDIT2: Root user is disabled on mine. Is that enough, given that this bug seems to create a new root user each time? Should I enable root user and set a password rather than leave it disabled?
- fredsted 7 years agoAlternatively, there's `sudo passwd`.
- cyberferret 7 years ago
- mcintyre1994 7 years agoI'm sure many of us can often see how some kinds of bugs managed to slip through testing/QA, but this is crazy to me given it works on the login screen if it's happening for everyone on whatever version: is "user cannot log in as root when root account is disabled" not a test case? That seems.. insane?
- Xeoncross 7 years agoThere are thousands of ways you could test this. Like most tests, having them isn't the same as having good ones.
- Xeoncross 7 years ago
- abritishguy 7 years agoIf you have `osquery` deployed to your fleet you can detect compromise with this query:
SELECT * FROM plist WHERE path = "/private/var/db/dslocal/nodes/Default/users/root.plist" AND key = "passwd" AND length(value) > 1;
- sounds 7 years agoThat only detects enabled root users, which is a start but may include innocent people who have set a root password to protect their machines.
- sounds 7 years ago
- codeisawesome 7 years agoWhat does this say about the state of iOS security? I don’t know how to hope that my phone isn’t 0wned already. I’m not saying this from my high horse - more as a disappointed user who invested a lot of money in my Apple phone.
- qualitytime 7 years agoTop 10 software blunders of all time:
1) (Apple) 1 + 2 + 3 = 24 https://news.ycombinator.com/item?id=15538666
2) (Apple) Blank root password https://news.ycombinator.com/item?id=15800676
3) ...
- manmal 7 years ago0) Therac 25: https://hackaday.com/2015/10/26/killed-by-a-machine-the-ther...
There ARE areas more safety critical than desktop computing, you know.
- isoprophlex 7 years agoSort of related:
- it is almost 2018 and copy pasting on an ipad/iphone is still a horrible, non-deterministic nightmare
- INTPenis 7 years agoWell I remember when the Ubuntu installer left your root password in a clear text file that was world readable on your FS.[1]
I would really like to see a top 10 list of software blunders, I think everyone on HN would.
- lultimouomo 7 years agoIn that case the bug was fixed in less than a day. Let's see how Apple fares.
- lultimouomo 7 years ago
- 0xnotsohex 7 years ago0)(Apple) If macOS High Sierra shows your password instead of the password hint https://news.ycombinator.com/item?id=15410953
- erikbye 7 years ago
- manmal 7 years ago
- josho 7 years agoConfirmed that root with no password unlocks the preferences pane. But, changing the require password after screen saver setting doesn't take effect. So, it seems to be a bug in the UI not an actual vulnerability.
edit: I stand corrected. The 'require password' setting under Security Preferences didn't change, but other settings do. Yikes
- vladikoff 7 years agoI have "Guest User" disabled normally. This allowed me to switch Guest User on, log out, login as `root` into OS X. lol
- jameskilton 7 years agoOh this is a real vulnerability. It's possible to switch your user to System Administrator using "root" and no password.
- nsnick 7 years ago10.13.1 can't make it happen
- vladikoff 7 years ago
- 7 years ago
- submeta 7 years agoWent to the next Apple store. Tried it out. It works. Can't believe it. Thousands of Macs are vulnerable. I'm wondering how fast all of these devices will be patched. Even if there is an update next week: How many devices won't get updated for quite some time. Unbelievable.
- cmurf 7 years agoI can't reproduce this on a clean 10.13.1 (17B48) system, either at the login window or an authentication dialog.
Update: And even after attempting it, checking Directory Utility the root user is still disabled. So I wonder if something 3rd party has enabled the root user and left it passwordless.
- tim333 7 years agoTemporary workaround (pasted from http://www.bbc.com/news/technology-42161823)
While Apple works on its fix, it offered a workaround for users concerned about the bug.
“Setting a root password prevents unauthorized access to your Mac,” the company explained.
"To enable the Root User and set a password, please follow the instructions here: https://support.apple.com/en-us/HT204012.
---
Edit - for me those Apple instructions didn't work. This seemed to:
Search for 'Directory Utility' in Spotlight and click it.
Click the lock to make changes
Select 'Enable root user' from 'Edit' on the main menu and set a password.
- senko 7 years agoAm I missing something or does this require the attacker to have access to an unlocked computer? In which case all bets are off anyways.
- jzwinck 7 years agoIt requires the attacker to be able to type a few characters into a logged in session. If the session is not an administrative one, it's not fair to say all bets were off.
If I give you a Mac logged in with an unprivileged account and you can use only the keyboard and mouse to gain root access, the security has failed.
I think you've conflated this with the attacker having (full) physical access to the machine, which conventionally means access to its ports and perhaps a screwdriver. This is not that.
- senko 7 years agoFair point, if that works with a guest account.
I was thinking along the lines of, if I have write access to your .bashrc (or a multitude of other config files that you as an unprivileged user have write access to, and can be used to trick you later into running code of my choosing), all bets are off.
- senko 7 years ago
- valine 7 years agoIt works remotely if remote login is enable.
edit: Screen sharing is is vulnerable not ssh. Either way its bad.
- djrogers 7 years agoNo it does not. I tested this rather carefully, and both ssh and screen sharing do not allow the user root with no password.
- ehntoo 7 years agoI have not been able to trigger this with ssh, but certainly have been able to with Screen Sharing, even after explicitly re-disabling the root account.
- ehntoo 7 years ago
- djrogers 7 years ago
- devindotcom 7 years agonope. you can log in at the login screen, it creates a new root admin user
- senko 7 years agoMissed that part in the text, thanks.
Yikes!
- senko 7 years ago
- woodrowbarlow 7 years agoan unlocked computer, or:
* a computer with remote login enabled
* a computer with the main login screen set to "username and password" mode
* a computer with a guest account
- code_duck 7 years agoThe 'attacker' could be someone like your 12 year old son or an employee, who already has access to the computer but not necessarily everything on it at all times.
This would have been a pain for me when i was using parental restrictions to lock a 12 year old out of 18 hour a day Minecraft.
- EpicEng 7 years ago>In which case all bets are off anyways
How are all bets off if they don't have access to a root user? This isn't Windows we're talking about.
- senko 7 years agoIf they have access to the account that is being used normally, they can modify the (user-accessible) settings to trick the user into running malicious code and giving them access (or causing trouble even without access to the root account).
- mholt 7 years agoIf you lose physical control over the machine, all bets are off because an attacker can modify the hardware to do nefarious things.
- senko 7 years ago
- jonny_eh 7 years agoWhat if it's a stolen laptop with an encrypted hard drive?
- jzwinck 7 years ago
- pilif 7 years agoA quick mitigation workaround: If you follow the steps here https://support.apple.com/en-us/HT204012 to disable the root account until the point where you open and authenticate the Directory Utility, in the Edit menu there's a "Change Root Password" option.
Set a good password there and disable the root account again.
Now people making use of this vulnerability will still be able to re-enable the root account (that's why it fail the first time - root is default off, but this bug enables it), but now there will at least be a useful password set.
- Asmod4n 7 years agoif you disable the root account you can log in again without a password, even when you set one.
- Asmod4n 7 years ago
- valine 7 years agoThis is deeply troubling. How does this even happen?
- andrewstuart2 7 years agoAll too easily. There's so much to keep track of in modern systems engineering. We should all have a healthy dose of awareness that we could be/create that weakest link even on our best days.
- kowdermeister 7 years agoErrr... umm... unit tests? Tests?
- andrewstuart2 7 years agoYou can have 100% coverage and never check a single edge case. Much less remember every edge case.
- andrewstuart2 7 years ago
- kowdermeister 7 years ago
- andrewstuart2 7 years ago
- manwe150 7 years agoI'm on Sierra and haven't been able to reproduce. But does anyone know if it respects pam.d "nullok" and I could just delete that option?
/etc/pam.d$ grep -RI nullok /etc/pam.d /etc/pam.d/authorization:auth required pam_opendirectory.so use_first_pass nullok /etc/pam.d/checkpw:auth required pam_opendirectory.so use_first_pass nullok /etc/pam.d/screensaver:auth required pam_opendirectory.so use_first_pass nullok
- Asmod4n 7 years agoTested it in the terminal with "su - root". Doesn't help. Or does one need to reboot after it? UPDATE: No effect after rebooting.
- Asmod4n 7 years ago
- mrkd 7 years agoTitle should be changed to 'macOS'
I initially saw this thinking it didn't affect Sierra or High Sierra.
- davidkuhta 7 years agoNow you have me confused, is it just High Sierra or Sierra as well?
- perryh2 7 years agoIt does not work for me using Sierra.
- davidkuhta 7 years agoAwesome, thanks.
- davidkuhta 7 years ago
- perryh2 7 years ago
- davidkuhta 7 years ago
- arghwhat 7 years agoIt seems to activate the root user with an empty password if you try, as an admin user, to use "root"/"" as credentials in a System Preferences authentication prompt.
It does not work if you are not admin. It does not work if your root user is enabled and has a password set. If you tried the vuln, you should set a password for the root user ("sudo passwd root").
- romanovcode 7 years agoWho needs security when we have animoji!
- brucepucci 7 years agoTo fix this with a workaround open Terminal.app and run the command "sudo passwd" to set a password. Can't believe this is happening.
- 2trill2spill 7 years agoBesides for APFS what user visible killer features has Apple made to Mac OS since 10.6.8? I'm sure they have made internal non user visible improvements to their kernel and userland. But it seems most of the "changes" to Mac OS is just churning code, or at least it seems that way from the outside.
To me personally 10.6.8 + Security Updates + APFS is extremely close to the ideal operating system.
- waz0wski 7 years agoThere's the new poop emoji!! (unicode 10 emojis via 10.13.1 update)
Real answer, APFS (which changes the Filevault encryption model to no longer be full-disk-encryption...) and Metal2 graphics (which has brought a variety of new gfx bugs into play, even for 1st party applications) are the big technical draws
For a full list of changes, review the marketing page or the developer release docs
- https://www.apple.com/macos/high-sierra/
- https://developer.apple.com/library/content/releasenotes/Mac...
(yes Apple can't be bothered to update their dev docs with the point releases. Documentation quality has fallen off dramatically since the 10.6 days)
Given the stream of bug reports on various apple sites, I have not upgraded any of my personal machines, and my employer has stated they will not be upgrading our machines in the near term.
- saagarjha 7 years agoAPFS is not an example of something I would consider "user visible"–for the average user there's no difference between HFS+ and APFS.
- waz0wski 7 years ago
- theoutlander 7 years agoKudos for reporting this publicly! We need this kind of stuff exposed publicly so that companies fix the issue and force an update. At the same time, consumers should be made aware of what security holes look like and what the risks are. Apple has been getting away with this stuff for a while now.
Do you think a hacker with ill-intent would have reported this issue at all?
- philliphaydon 7 years agoNo one else has mentioned it seems, digging through the twitter comments I found a tweet which states this was already known by Apple, and posted on the forums in the form of a solution...
- LeoNatan25 7 years agoMentioned many times actually. And the forum is users self help. It is not monitored by Apple.
- philliphaydon 7 years agoAhh the links weren’t on the first page of the HN comments when I posted. They are now. I didn’t click more. :)
- philliphaydon 7 years ago
- LeoNatan25 7 years ago
- tbarbugli 7 years agoSo far the best mitigation I could find out is to enable the root account and set a strong password for it. Hopefully we'll get a security update quickly so that I disable root access again. While checking on this I also realized I was running 10.13 instead of 10.13.1 which fixes another major security flaw (key chain saves in plain text)
- butterisgood 7 years agoDoesn't work for me on a freshly installed MacOS High Sierra, but does work on an upgraded laptop to High Sierra.
Interesting...
Also the UX is different. Typing root on the fresh installed one fails, then resets the user text box to my name, and if I type root again it doesn't let me it.
On the upgraded laptop, if I type root, it sticks and clicking unlock twice gets me in.
- nkrisc 7 years agoI don't know much about OS development but isn't this just the sort of thing you'd automate testing for?
- mikestew 7 years agoIn order to create the test case that you would automate, you first must create the repro scenario. IOW, automation has nothing to do with this until the bug is found in the first place. Arguably, one could create a test model that might have found this but raise your hand if you even know what I'm talking about when I say "test model".
The only mitigation that automation would bring is if the bug was found in earlier versions, and test case was subsequently written. IOW, and very much a generalization, automation is to find regressions. But if the bug is new...
(To be clear, this bug still should have been found. But automation is unlikely to have found it.)
- couchand 7 years agoRespectfully disagree. "User cannot log in as root if root user is disabled" is absolutely a test case that should be written regardless of previously seeing the bug.
- mikestew 7 years agoMeh, you're probably right. If nothing else, I'd want to verify the result of trying to use a disabled account (text in the dialog is localized, et. al.) Run through the scenario before I formally write the case and...WTF? Yeah, I could see that.
- mikestew 7 years ago
- couchand 7 years ago
- nixpulvis 7 years agoIf they are even a little smart, they'll now have a test for this ;)
- olalonde 7 years agoI guess not. I recall reading somewhere that the Linux kernel doesn't even have automated tests. (edit: found the link: https://stackoverflow.com/a/3177643/96855)
- dandr01d 7 years agoHave you seen iOS11? Apple doesn't seem to value testing too much
- mikestew 7 years ago
- runesoerensen 7 years agoApple suggests the workaround also discussed in this thread until the issue is fixed:
"We are working on a software update to address this issue. In the meantime, setting a root password prevents unauthorized access to your Mac. To enable the Root User and set a password, please follow the instructions here: https://support.apple.com/en-us/HT204012. If a Root User is already enabled, to ensure a blank password is not set, please follow the instructions from the ‘Change the root password’ section."
https://techcrunch.com/2017/11/28/astonishing-os-x-bug-lets-...
- sccxy 7 years agoI wouldn't have thought that NSA backdoors are so simple
- DonHopkins 7 years agoI wonder if you can also defeat Face ID by wearing a white face mask?
https://images-na.ssl-images-amazon.com/images/I/51I4nsyt9AL...
- tolien 7 years agoFix has been released: https://www.macrumors.com/2017/11/29/apple-fixes-root-passwo...
- k4ch0w 7 years agoI just have no words, it seems intentional. They may want to review their build pipeline to check someone didn't manipulate the source code before it was signed. I haven't seen an easy root priv-esc like this in a long while.
- alpb 7 years ago[meta] I think this thread is currently being downvoted, or dragged down by the mods somehow. It should be in the #1 right now. I suspect people are flagging/downvoting because there is no responsible disclosure in this case.
- 3131s 7 years agoNot the first time I've noticed this with threads that are bad PR for Apple.
- dang 7 years agoBe careful about noticing a few data points and then connecting the dots. You can get an image that way but it's usually just a reflection of your own bias, and people with opposite views will see opposite patterns in the same data.
In this case the story hit a software penalty for a while, which we noticed and corrected as we usually do eventually. This software works well most of the time but unfortunately not always. Either way, it has nothing to do with our opinions about Apple, which is fortunate because we don't particularly have any.
- 3131s 7 years agoI didn't mean to imply that it was manipulation on the part of HN. I am wary that Apple, like any large company, might try to bury stories like this.
I know it's been asked before (by me, for one), but can you tell us anything about the protections HN has in place against astroturfing?
- 3131s 7 years ago
- dang 7 years ago
- 3131s 7 years ago
- mratzloff 7 years agoWow. As if I needed another reason to never "upgrade" to High Sierra...
- MentallyRetired 7 years agoApparently El Capitan is vulnerable too.
- LeoPanthera 7 years agoCan't reproduce on El Cap.
- LeoPanthera 7 years ago
- MentallyRetired 7 years ago
- 7 years ago
- itsthejb 7 years agoApple software quality has got very sloppy (again). I recall it was particularly bad around 2014, but then seemed to have improved. Seems the sloppiness is back again. It would seem Apple is no unique in the regard that its success has made it fat and lazy. My particular favourite one at the moment is that in iOS 11.1.2 navigation transition animations eventually break if the device is running long enough (a few days). Restarting the device fixes this. The fun part is trying to work out why on earth this would be? Transition animations are cached?
- 7 years ago
- steeleduncan 7 years agoTo workaround this before Apple have had a chance to patch it(thanks @lemiorhan), it seems you can:
- Open Directory Utility (/System/Library/CoreServices/Applications/Directory Utility.app)
- Authenticate with the lock icon
- From the Edit menu you can enable the root user and set a proper password (it would already be enabled if you had tried out the exploit)
Having that root user enabled isn't great overall, so it would be best to set a reminder to disable it using the same Directory Utility app once the security hole is patched.
- dwighttk 7 years agoI mean, I only tried 15 times, I don't know if that counts as "several" but this doesn't work for me.
It looks to me like my root user is disabled.
When I type "root" into the username field and click unlock (in System Preferences > Users & Groups) "root" is replaced with my username and the dialog shakes... I have to type root in each time, but it never unlocks. 10.13.1
Edit: trying it after logging out keeps "root" in the username field, but never logs me in... tried 20+ times
- the_economist 7 years agoI was just able to reproduce it in 10.13.1. I had to click submit twice.
- the_economist 7 years ago
- rderewianko 7 years agoMyself and others blogged about solutions: https://www.rderewianko.com/10-13-root-password-oh-my/https://derflounder.wordpress.com/2017/11/28/blocking-logins...
- 7 years ago
- fredsted 7 years agoThis is very, very bad.
- donatj 7 years agoI can't seem to reproduce it locally. 10.13.1… Anyone else having issues?
I've upgraded a through a couple versions of OS X on this machine - maybe that makes a difference?
- drunken-serval 7 years agoIt took 3 tries for me and then it worked.
- yxhuvud 7 years agoPerhaps you have a root password set?
- hrrsn 7 years agoWorked fine for me on 10.13.1.
- drunken-serval 7 years ago
- equivocates 7 years agoSo — if you log out and log in as root without a password (EEK!), you can set your own password as root. Once you do, Mac os will no longer bypass the password.
- corecoder 7 years agoHow come nobody has picked a name for this vulnerability?
- mackey 7 years ago
- anon1253 7 years agowat. confirmed on 10.13.1 (17B48). I was even able to add another super user.
Edit: changing the login method to "Name and password" under login options, then logout and login with "root" with empty password also works.
Fortunately, it doesn't work on cold boot with FileVault enabled, at least it doesn't appear so. `sudo su root` also doesn't work with an empty password.
- cortesoft 7 years agowell, `sudo su root` would be using the user password for the logged in user, not for root. Does `su root` work, with no password at the prompt?
- anon1253 7 years agoGood point. Force of habit. Unfortunately I can no longer try since I set the root password under the Directory Utility, which probably changed the state of the system.
Apparently someone verified that it /does/ also work with `su - root`.
- anon1253 7 years ago
- cortesoft 7 years ago
- abdullahi1 7 years agoThis is hilarious. I wonder why it took so long for this bug to be discovered, I mean, wasn't High Sierra released back in September?
- api 7 years agoWho types root in as a login name on a Mac?
- api 7 years ago
- Asmod4n 7 years agoWorks with "su - root" too in a Terminal.
- mcintyre1994 7 years agoI guess Apple aren't the kind of company that would do it, but I'd love to read a frank post mortem about how this happened.
- 7 years ago
- joe_hills 7 years agoI just tested this on a Sierra (10.12.6) machine, and verified this bug isn't present in that earlier OSX version.
- Cshelton 7 years agoSame, I'm on 10.12.6, could not reproduce anywhere.
I think I'll hold off on that 10.13.1 "security update" it keeps bugging me about. Seems to let anyone use my computer...
Edit: After looking a little further, it seems staying on Sierra will always be a 10.12.* version, and High Sierra is 10.13.*?
- m11r 7 years agoYes, that's correct. Recent macOS (nee OS X) versions:
- Mavericks (10.9.x)
- Yosemite (10.10.x)
- El Capitan (10.11.x)
- Sierra (10.12.x)
- High Sierra (10.13.x)
- m11r 7 years ago
- Cshelton 7 years ago
- DonHopkins 7 years agoThey could have at least used "rms" instead of a blank password.
https://www.reddit.com/r/linux/comments/7hj6v/i_use_my_login...
- 7 years ago
- aosmith 7 years agoDoes this work from single user mode?
- fastball 7 years agoYeah, everyone seems to be forgetting that until very recent versions of MacOS you could just boot into SUM and make your own admin account to get access to a mac.
- fastball 7 years ago
- bennyg 7 years agoReminds me of an exploit back in 10.7 where you could create a new admin privileged user from a non-admin account using some bash commands. Used that to add Xcode to my work computer at college so I could fool around with learning how to code when I was at work.
- oh-kumudo 7 years agoLOL. Can we call this...front door?
- mirekrusin 7 years agoMaybe NSA asked for an easy access. Apple is generally good at making things simple for users.
- j-pb 7 years agoOh god, seriously what happened to apple? They are the richest company in the world and the quality of their software has kept declining every year. Right now there is no computer system that I can wholeheartedly recommend to non technical people... :(
- willyt 7 years agoSecurity update just came out. Installed it and can no longer reproduce. Can anyone confirm?
- jmuguy 7 years agoTime to install Afterdark on all the computers in the Apple store. Confirmed here, 10.13.1.
- jrowley 7 years agoAnd I just googled afterdark at work... haha thanks!
- jrowley 7 years ago
- zargath 7 years agoI guess we finally figured out what the "insanely" great products was all about.
- taurath 7 years agoThis is near Windows-95 levels of bad - at the very least you need to already be logged in
- 7 years ago
- symlinkk 7 years agoHow can one of the most wealthy companies on the planet, that every single software engineer would kill to work for, manage to have a bug like this?
Maybe they need to re-think their hiring process, because clearly something is not working as it should.
- mrmondo 7 years ago1. Ensure you always have FileVault enabled (you should regardless) and shutdown after work until the bug is fixed.
2. Add a complex root passphrase and clean this up after the fix is released.
3. Reflect on how irresponsibly this serious security bug was ‘reported’, he didn’t just potentially miss out on $200,000, he put an enormous number of people at risk of local intrusions when instead if it was properly reported there’s a good chance Apple would have released a bug fix for this quicker thus reducing the potential impact and spread of misinformation.
https://en.m.wikipedia.org/wiki/Responsible_disclosure
https://support.apple.com/en-au/HT201220 (See ‘Security and privacy researchers’)
- thomastjeffery 7 years agoIt's not irresponsible to make a bug public.
He did not put people at risk, he showed people they are already at risk, so they would know to set a root password, and thereby not be at risk.
Security by obscurity does not work!
- mrmondo 7 years agoIt’s not an example of security by obscurity, it’s a straight out security flaw and bug.
If it’s not publicly known and is a security risk it is far more effective to directly contact the developers / companies security team so they can immediately work on actually protecting people by developing a patch. If they don’t respond quickly (subjective, I’d call it within 12 hours) or fail to issue a fix in a timely manor (subjective, I’d say 24 hours) then yes - go public, start by logging a bug report and link to that bug report or if you can’t - the bug number / reference.
- thomastjeffery 7 years agoThe fact is that the devs certainly do know about it by now, yet users do not have a fix yet. Users do, however, have a workaround, and knowledge that the security flaw exists in the first place.
Waiting for a fix before disclosing a security flaw is security by obscurity, even if it is to be replaced soon.
It is best for users to know that their system is vulnerable, and how to fix that without waiting for a system update.
- trumpownsyou420 7 years agokys loser.
- thomastjeffery 7 years ago
- sdmadf2834 7 years agoThis is the most idiotic thing I've heard in a long time. Yes, they were already at risk, but with the way he disclosed the information, the risk increased exponentially. This guy's actions were either stupid or malicious.
- thomastjeffery 7 years agoObviously this isn't the best way to disclose a security flaw.
That does not make it malicious.
Sure, there are more malicious people aware of this security flaw, but there are also more users aware of this security flaw, and the simple steps they can take to mitigate it.
- thomastjeffery 7 years ago
- mrmondo 7 years ago
- thomastjeffery 7 years ago
- cm2187 7 years agoIt really feels like the only thing that made Apple to be less prone to hacking and malware (and therefore more secure) than other OS is the lack of scrutiny by hackers and malware authors. This is a front door open kind of problem.
- mk89 7 years agoApple proves they still care about UX: finally, I found a way to login without typing.
- 7 years ago
- w0m 7 years agoThe TC GIF is hilarious.
https://tctechcrunch2011.files.wordpress.com/2017/11/ooooooh...
- stmw 7 years agoImagine what Steve Jobs would've said in a meeting today at Apple HQ to discuss this incident.
"Can someone here explain to me what is the login dialog supposed to do? ... Ok. Then why the !@#% doesn't it do that???"
- mthoodlum 7 years agoPress "command" and the "space" keys at the same time.
In the Spotlight Search type "Terminal" and press enter.
At the terminal type "passwd" and press enter.
The terminal will prompt you to change the password for "root".
- notanai 7 years agoYou can just type root in the login window to get System administrator access.
- uean 7 years agoI haven't seen anyone mention this critical part of the flaw - if you disable the root account, then log out and log back in, the root account is active again.
Password change is the only protection until it is patched.
- setgree 7 years agoIt seems as though buying a new apple product or upgrading one to new software implicitly signs you up to be a beta tester. It's pretty surprising from the world's most valuable company, no?
- quotha 7 years agoI tried it anyway and it does not work! I'm running version 10.13.1
- anachronicnomad 7 years agoI was able to successfully fix this by using the
``` dsenableroot ```
utility; by first enabling the root user with a strong password, then disabling it with the
``` dsenableroot -d ```
option. It's heavily recommended to not leave the root user enabled.
- alexwebb2 7 years agoI asked this in the other thread, but... does anyone know how big of a bounty the guy missed by not disclosing this responsibly?
I'm guessing it probably would've been a fairly big chunk of change.
- silencio 7 years agoApparently there is no macOS bug bounty: https://twitter.com/i0n1c/status/935608248027303936
- silencio 7 years ago
- estevaovix 7 years agoThe solution for now is to set a passwd for root... this is ridiculous
- pmoriarty 7 years agoHas no one been running password crackers against OSX this whole time?
- fixermark 7 years ago<sarcasm>"OSX the more secure OS because nobody tries to hack it, CONFIRMED."</sarcasm> ;)
- fixermark 7 years ago
- nerflad 7 years agoI didn't think the BSD's allowed a blank root password.
- zeveb 7 years agoWell, if they don't then this is a clear indication of the improvements possible with closed-source software.
At least if it'd been open, maybe someone could have diffed it …
- zeveb 7 years ago
- migueh 7 years agoIf I could just use Mavericks and develop apps for last iOS release, that will be great. But I should update to High Sierra. I hate this.
High Sierra seems to be focused in Emojis. Urghh
- adambull 7 years agoConfirmed on 10.13.1. As a workaround, once you login as "root", you can change the password to something else, and the empty password will stop working.
- temporary57657 7 years agoThe only current solution is to leave root enabled and change the password to something strong until this is patched by Apple.
Disabling root re-enables the blank password to root.
- lolc 7 years agoReminds me of the time Mac OS X would trust any NIS server in the local net to authenticate local root. Can't find the story though. Did that even happen?
- myrandomcomment 7 years agohttps://support.apple.com/en-us/HT204012
How to set root password.
- danra 7 years agoThese bugs are getting ridiculous. With Apple's budget, finding such bugs in a security architecture review or just in QA should be as easy as 1+2+3.
- symlinkk 7 years ago
- symlinkk 7 years ago
- eevilspock 7 years ago
- aezell 7 years agoShould I leave my Mac unattended until this is resolved?
- oneeyedpigeon 7 years agoEnable the root account and set a (obviously, strong) password for it. Keep calm and carry on.
- fulafel 7 years agoYou can keep using it.
- oneeyedpigeon 7 years ago
- afiler 7 years agoEven on El Capitan, I was able to unlock with "root" on my first try. From there, I could add a new admin user. This seems... not good.
- joshvm 7 years agoI wasn't able to do it on 10.12.6 (Sierra) though, so perhaps there's something else odd here?
- uuuuuuuuuuuu 7 years agoDoesn't work for me either on 10.12.6.
- uuuuuuuuuuuu 7 years ago
- cthalupa 7 years agoI cannot reproduce this on Sierra or El Cap
- eridius 7 years agoThe bug does not exist on El Capitan. Your description tells me you already had the root user enabled with no password (which is something you can do with Directory Utility.app)
- JustSomeNobody 7 years agoEspecially not good is Apple likely won't fix it in El Cap. They'll tell all of us to upgrade. I don't want that buggy HS mess.
- jobu 7 years agoWhen I tried to make a new user after unlocking as "root" it ended up making a group instead. (High Sierra 10.13.1)
- joshvm 7 years ago
- Exuma 7 years agoI wonder when/what Apple's response will be
- knodi 7 years agoHigh Sierra has been one of the worst OSX upgrade.
- thanatropism 7 years agoAnyone in a position to short AAPL? It's apparently 6bps up in after hours trading but that's very low liquidity.
https://finance.yahoo.com/quote/AAPL?p=AAPL
A higher risk, higher leverage bet: buy some put options the milisecond markets open:
- tribune 7 years agoI would say I'm surprised such a serious bug made it out, but after the A � thing who knows what's going on at Apple
- gkanai 7 years agoThis is indeed a bad black mark on Apple. With all the money they have, it's terrible that they let this one slip by.
I'm still on 10.12 Sierra. Long ago I stopped major updating when those releases were new. I learned to wait months or many months for bugs to be dealt with and for older software to be updated to be compatible with the new release. High Sierra provides nothing critical that Sierra does not provide, and thus, I am happy in my position as late adopter.
- rubatuga 7 years agoWhile this true, please keep in mind that rebooting your Mac into single user mode also allows anybody to login as root
- mikeash 7 years agoNot if I use FileVault, surely?
- 2trill2spill 7 years agoYou can set a firmware password to prevent this.
- mikeash 7 years ago
- 7 years ago
- kylehotchkiss 7 years agoDoes this bypass filesystem encryption?
- ams6110 7 years agoIt might, if you added "root" as a user able to unlock the disk. But you'd probably have needed to set a password for the root account to do that.
- Someone1234 7 years agoYou have a valid user as far as the OS is concerned, so you'd be able to access encrypted files and copy them off of the machine.
- tempay 7 years agoOnly if the laptop is locked (as the encryption key is already in memory).
- kylehotchkiss 7 years agoAny chance that self clears after an interval?
Might be a bad day to leave the laptop at the table at the coffeeshop when ordering.
- tempay 7 years agoBy default no as most people expect things to keep running when they lock their laptop.
There is a setting to immediately destroy the key when the laptop sleeps. It might be outdated but [1] should give you a starting point for setting it up.
[1] http://mattwashchuk.com/articles/2016/01/08/maximizing-filev...
- tempay 7 years ago
- kylehotchkiss 7 years ago
- satysin 7 years agoIf it does then it means Apple's encryption implementation is fucked.
- ams6110 7 years ago
- tempodox 7 years agoOn my system, the trick doesn't work. But then, I did explicitly set a non-empty root password.
- Stephen-E 7 years agoWhile reading this, my mac just prompted me to Upgrade to High Sierra. I think I'll hold off...
- srathi 7 years agoConfirmed on 10.13. I was even able to add a user as an administrator after unlocking with root.
- sallyfour 7 years agoI'm unsurprised, loginwindow is a piece of shit nobody wants to work on. Poor dude.
- lostgame 7 years ago#whyidontupgrade
Until Apple forces me to with a required xCode update for the newest iOS SDK...>.>
- 7 years ago
- MagerValp 7 years agoTo block this, set a random password for root:
sudo dscl . -passwd /Users/root $(uuidgen)
- lanius 7 years agoGood thing I haven't updated yet. I wonder how many machines are vulnerable?
- cortesoft 7 years agoDoes this effect people who already have a root user with a password set up?
- senthilnayagam 7 years agopatch has been released in record time, I have update my mac
- martins_irbe 7 years agoThis clearly is a feature!
- jaequery 7 years agoif someone has discovered a way to wipe anyones paypal account, should he disclose it privately or let it trend on social media? and lets say the fix will take about a day at the earliest.
- overcast 7 years agoExcuse my language, but this was a dick move to post this publicly, especially on Twitter. Go through private bug channels properly for something as serious as this. Of course doing it that way doesn't give you your 15 minutes of interweb fame.
- fixermark 7 years agoWhen I put it into my personal malice / ignorance balance, it weighs out to the likelihood that the discloser isn't plugged in enough to the infosec scene to be aware that there are already best practices for this kind of disclosure.
It's a big world out there, especially nowadays. And nothing I've seen in recent history suggests to me the average user knows or cares about infosec concerns beyond basic hindsight understandings.
- testvox 7 years agoIsn't the best practice full disclosure? It seems like it was followed well.
- overcast 7 years agoSure, now look at his Twitter account. He looks pretty plugged into the software community.
Agile Software Craftsman, iyzicoder @ http://www.iyzico.com , Founder of Software Craftsmanship Turkey @scturkey, The community guy http://bit.ly/lemiorhan
- fixermark 7 years agoYes. And from his personal site [http://www.lemiorhanergin.com/]:
He's a manager. CSM, PSM1, PSD1, Scrum Master, Kanban Practitioner. Code retreat facilitator. Translated Agile Manifesto into Turkish. The only thing that immediately makes me think he even touches code is "git trainer and lover." Notably lacking from his résumé: references to specific open source projects he's worked on or code he's written (though personally, I'd be concerned because his résumé does list "Restful Services" and I'd expect that to have given him a taste of infosec basics, but maybe it's a bit of résumé padding... shouldn't it be spelled "RESTful services?" ;) ).
It feels weird to say for those of us deeply immersed in the internet / telecoms / web app side of software development, but depending on your focus, you can do an awful lot of software development without ever brushing up against the sharp edge of infosec.
- fixermark 7 years ago
- testvox 7 years ago
- mikeash 7 years agoMaybe he didn't know about the proper procedures to handle a security vulnerability. You wouldn't have to be a security researcher to discover this bug, and I don't see any indication that he is one.
- always_good 7 years agoAlso, it's reasonable for someone to think that making a public stink about it is in the best interest of all the people then that can immediately patch it themselves instead of having to wait for Apple to push a patch and then for everyone to download that patch.
I'm not convinced private disclosure is without its downsides nor a panacea.
- Jedd 7 years agoMaybe. Look at his twitter page though: https://twitter.com/lemiorhan
Not impossible to believe he's unaware of the right way of handling this kind of issue, but that banner photo (Enthralling My F-ing Audience) [1] and stats there suggest he should be aware that there probably are sensible and polite procedures for this, even if he didn't immediately know what they were.
[1] http://jesuschristsiliconvalley-blog.tumblr.com/post/4653787...
- mikeash 7 years agoHow do the banner or stats suggest he should have known about this?
- mikeash 7 years ago
- overcast 7 years agoI would say it's pretty basic common sense, not to publicly announce ANYTHING that could immediately affect millions of people. Unless he's just a sociopath.
From his Twitter account, he's not just some layman stumbling across it.
Agile Software Craftsman, iyzicoder @ http://www.iyzico.com , Founder of Software Craftsmanship Turkey @scturkey, The community guy http://bit.ly/lemiorhan
- mikeash 7 years agoIf that were true, then the security community wouldn't have spent years fighting about whether responsible disclosure was the right approach. That's for people who actually understand this stuff. It's unreasonable to expect an outsider to derive it all on their own from first principles.
- mikeash 7 years ago
- always_good 7 years ago
- giarc 7 years agoProbably could still get 15 minutes of fame if you disclosed privately then blogged about the back and forth and a picture of the $10,000 cheque from Apple.
- CameronBanga 7 years agoApple doesn't pay bounties for this sort of report, even if direct to their team. They have a private bounty program, for a select few.
- bredren 7 years agoThat this would be the prevailing understanding is exactly why a bug like this would live in the wild at all. There are plenty of other orgs out there who would have paid big money for this.
- 3pt14159 7 years agoSource? I've heard of iPhone vulnerabilities getting high six figures from Apple (for root access via sms). Why wouldn't Apple pay for something like this?
- bredren 7 years ago
- CameronBanga 7 years ago
- zerostar07 7 years agothis is too serious to hide. better to tell users how to fix it than wait until apple releases something
- glhaynes 7 years agoThat's not how responsible disclosure works.
- testvox 7 years agoBut it's how full disclosure works which is more responsible then coordinated disclosure.
- testvox 7 years ago
- overcast 7 years agoYeh, except for the millions of MacOS users out there, like my parents who don't read Twitter, or HN or any of the other sites people think that everyone stays up on. They are the targets.
- fixermark 7 years agoNot technically. Exploitation still requires physical access to the machine or remote access to have been enabled, right? Did your parents who don't read Twitter or HN enable a feature that generally only power users want or need?
- pkaye 7 years agoI think it is only a local exploit. The bigger risk are the Macs in schools and libraries.
- fixermark 7 years ago
- glhaynes 7 years ago
- fixermark 7 years ago
- spsful 7 years agoworkaround: ENABLE ROOT USER AS FAST AS POSSIBLE
- saagarjha 7 years agoAs I had said above, this, in the long run, is actually less secure than not having a root account at all. If you do this, make sure to revert it once the issue is patched.
- saagarjha 7 years ago
- VeejayRampay 7 years agoDoesn't matter, Apple gets an automatic pass.
- AdamJacobMuller 7 years agoWow, setting a root password seems to fix this...
- 7 years ago
- mfrw 7 years agoI may not be an apple fanboy, but I admit, I really miss Jobs, and his commitment to quality. Apple has just been minting money and forgot all about its core values.
- ghaydarov 7 years agoWow. Can't believe it. It's true.
- fiatpandas 7 years agoWorked for me on the second try (10.13.1)
- LeoPanthera 7 years agoroot is disabled by default. The first try, somehow, enables it with no password. The second try will let you in.
- LeoPanthera 7 years ago
- TrueSelfDao 7 years agoSerious 0-day on Twitter. How exciting!
- dawnerd 7 years agoThere's no way this wasn't being used prior to being publicized on twitter. I'm sure the FBI/etc was on this day one.
- callesgg 7 years agoIn what version did the issue appear?
- devindotcom 7 years agowe've seen it only in 10.13.1 (17B48) so far
- mithr 7 years agoIt also works on 10.13 (17A365)
- shavingspiders 7 years agoI can confirm that, too. Took 2 attempts.
- shavingspiders 7 years ago
- mithr 7 years ago
- devindotcom 7 years ago
- jason_slack 7 years agoThere is also now a patch available.
- qubex 7 years agoThis is why I use disk encryption.
- ddmma 7 years agoApple is the new Internet Explorer
- 7 years ago
- 7 years ago
- therealmarv 7 years agoIs this also in 10.13.2 beta?
- cm2187 7 years agoDoes it affect MacOS Server?
- Unknoob 7 years agoConfirmed here on 10.13
- sugavaneshb 7 years ago*macOS High Sierra
- 7 years ago
- mrkstu 7 years agoverified on latest build of 10.13.1 (17B48).
- api 7 years agoBut there are new emojis, and emoji karaoke works!
- TonnyGaric 7 years agoNot cool to disclose this kind of bug on Twitter.
- 7 years ago
- 7 years ago
- fastball 7 years agoI miss Snow Leopard.
:/
- jamesma 7 years ago1
- DonHopkins 7 years agoPyramid's OSx version of Unix (a dual-universe Unix supporting both 4.xBSD and System V) [1] had a bug in the "passwd" program, such that if somebody edited /etc/passwd with a text editor and introduced a blank line (say at the end of the file, or anywhere), the next person who changed their password with the setuid root passwd program would cause the blank line to be replaced by "::0:0:::" (empty user name, empty password, uid 0, gid 0), which then let you get a root shell with 'su ""', and log in as root by pressing the return key to the Login: prompt. (Well it wasn't quite that simple. The email explains.)
https://en.wikipedia.org/wiki/Pyramid_Technology
Here's the email in which I reported it to the staff mailing list.
P.P.S.: The origin story of Pete's "Gymble Roulette" nick-name is here: http://art.net/~hopkins/Don/text/gymble-roulette.html The postscript comment was an oblique reference to the fact that I'd previously gotten in trouble for forwarding Pete's hilarious "Gymble Roulette" email to a mailing list and somehow it found its was back to Pyramid. In my defense, he did say "Tell your friends and loved ones.")Date: Tue, 30 Sep 86 03:53:12 EDT From: Don Hopkins <don@brillig.umd.edu> Message-Id: <8609300753.AA22574@brillig.umd.edu> To: chris@mimsy.umd.edu, staff@mimsy.umd.edu, Pete "Gymble Roulette" Cottrell <pete@mimsy.umd.edu> In-Reply-To: Chris Torek's message of Mon, 29 Sep 86 22:57:57 EDT Subject: stranger and stranger and stranger and stranger and stranger Date: Mon, 29 Sep 86 22:57:57 EDT From: Chris Torek <chris@mimsy.umd.edu> Gymble has been `upgraded'. Pyramid's new login program requires that every account have a password. The remote login system works by having special, password-less accounts. Fun. Pyramid's has obviously put a WHOLE lot of thought into their nifty security measures in the new release. Is it only half installed, or what? I can't find much in the way of sources. /usr/src (on the ucb side of the universe at lease) is quite sparse. On gymble, if there is a stray newline at the end of /etc/passwd, the next time passwd is run, a nasty little "::0:0:::" entry gets added on that line! [Ye Olde Standard Unix "passwd" Bug That MUST Have Been Put There On Purpose.] So I tacked a newline onto the end with vipw to see how much fun I could have with this.... One effect is that I got a root shell by typing: % su "" But that's not nearly as bad as the effect of typing: % rlogin gymble -l "" All I typed after that was <cr>: you don't hasword: New passhoose one new word: <cr> se a lonNew passger password. word: <cr> se a lonNew password:ger password. <cr> Please use a longer password. Password: <cr> Retype new password: <cr> Connection closed Yes, it was quite garbled for me, too: you're not seeing things, or on ttyh4. I tried it several times, and it was still garbled. But I'm not EVEN going to complain about it being garbled, though, for three reasons: 1) It's the effect of a brand new Pyramid "feature", and being used to their software releases, it seems only trivial cosmetic, comparitivly. 2) I want to be able to get to sleep tonight, so I'm just going to pretend it didn't happen. 3) There are PLEANTY of things to complain about that are much much much worse. [My guess, though, would be that something is writing to /dev/tty one way, and something else isn't.] Except for this sentence, I will also completely ignore the fact that it closed the connection after setting the password, in a generous fit of compassion for overworked programmers with ridiculous deadlines. So then there was an entry in /etc/passwd where the ::0:0::: had been: :7h37OHz9Ww/oY:0:0::: i.e., it let me insist upon a password it thought was too short by repeating it. (A somewhat undocumented feature of the passwd program.) ("That's not a bug, it's a feature!") Then instead of recognizing an empty string as meaning no password, and clearing out the field like it should, it encrypted the null string and stuck it there. PRETTY CHEEZY, PYRAMID!!!! That means grepping for entries in /etc/passwd that have null strings in the password field will NOT necessarily find all accounts with no password. So just because I was enjoying myself so much, I once again did: % rlogin gymble -l "" Password: <cr> [ message of the day et all ] # Wham, bam, thank you man! Instead of letting me in without prompting for a password [like it should, according to everyone but pyramid], or not allowing a null password and insisting I change it [like it shouldn't, according to everyone but pyramid], it asked for a password. I hit return, and sure enough the encrypted null string matched what was in the passwd entry. It was quite difficult to resist the temptation of deleting everyone's files and trashing the root partition. -Don P.S.: First one to forward this to Pyramid is a turd.
- patcheudor 7 years agoApple makes it pretty easy to report vulnerabilities to:
product-security@apple.com
They also respond to security@apple.com but prefer the product-security address.
Further, there are any number of legit bug bounty programs out there like ZDI that would pay for a bug like this then immediately disclose to Apple for it to be fixed.
Disclosing an 0Day root authentication bypass vulnerability on Twitter isn't cool, even if it is local: think of the impact to shared iMacs on university campuses.
- kristofferR 7 years agoI really disagree - this needs to be reported as much as possible publicly to create a huge thunderstorm of negative publicity for Apple.
This isn't the first extremely serious and dumb High Sierra password bug this year [1] [2], and unless Apple is severely hurt by it, so they're forced to change, it won't be the last. High Sierra is full of bugs and seemingly not just annoying bugs, but also security bugs.
Let's hope Apple gets sued for the damage they'll cause by including this bug in High Sierra so they make sure that next release of macOS won't be another bug filled mess.
[1] https://arstechnica.com/information-technology/2017/09/passw...
[2] https://www.macrumors.com/2017/10/05/macos-high-sierra-disk-...
- bradrydzewski 7 years agoResponsible disclosure does not prevent negative publicity. It provides the vendor with a grace period during which they can fix the vulnerability. There can be plenty of negative publicity once the vulnerability is patched and publicly disclosed.
Encouraging irresponsible disclosure because one wants to see Apple hurt is a reckless and selfish attitude because it puts millions of Apple customers at risk in the process.
- kristofferR 7 years agoClosed disclosure does, to a large degree, prevent negative publicity. I don't think it is in dispute that this bug would receive vastly less media coverage if it were only revealed as a bug in outdated/patched versions of the OS.
I don't want to see Apple hurt (I'm an Apple-guy myself, using Macs, iPhone, iPad and Apple Watch), I want to see them improve. I doubt they start will start caring about QA unless they're forced to.
One absurdly serious and stupid password bug like this can be a honest mistake, but three (that we know of, that were full disclosures) in a few months is negligence that should be criminal if it isn't.
- joe_the_user 7 years agoA bug like 'can log in with password "root"/""' just isn't going to get you a grace period no matter what security researchers might want.
I mean, this bugs has been reported already - by every cheesy hacking movie ever, by every beginners book on social engineering and so-forth. Heck, it was "reported" by Richard Feynman talking about cracking safes during the Manhattan.
- sydney6 7 years agoNot the attitude of the people reporting the issue have put "millions of apple customers" at risk, but the company which allowed to let issues like this one slip through their Q&A process.
IMO, this behaviour is part of the problem, the reason why tech companies take security only on a superfiscial level seriously.
Don't kill the Messenger.
- camus2 7 years agoAnd Full disclosure is about protecting users of a software, not letting the vendor off the hook. Here, the hack and the fix are so trivial the responsible thing to do is to publicly call out Apple for its lack of QA and warn users directly. It affects everybody who runs High Sierra.
> it puts millions of Apple customers at risk in the process.
Nah, it's Apple which put millions of customers at risk, not the person who disclosed the vulnerability. let's not shift away the blame from the guilty here.
Apple one of the richest company in the world is obviously just cutting corners in QA here. This is unacceptable.
it's seems some people here are more concerned about negative publicity than user security. This is a pattern that have been seen countless times in big tech corporations(such as Yahoo), not disclosing hacks that put their users and their data at risk. This is unacceptable for a company that claims to be all about their users.
- Animats 7 years agoThis is such a lame vulnerability that it's probably already known to competent attackers.
It's not a bug; it's a bad design decision. How to initialize the root password on a new machine is a hard problem in a consumer environment. Some people will set it, lose it, and then want support to fix it. One would expect some clever Apple solution, such as initializing the password to random letters and providing the buyer with that info on a scratch-off card. That way, the buyer can be sure no one has seen the password before they use the scratch-off card.
Setting it to null? That means nobody thought about the problem.
- 7 years ago
- AlexandrB 7 years ago> Encouraging irresponsible disclosure because one wants to see Apple hurt is a reckless and selfish attitude because it puts millions of Apple customers at risk in the process.
Apple put millions of their customers at risk by skimping on QA. As an Apple user I'm OK with this getting out if it motivates Apple to improve their approach in the future.
- beedogs 7 years agoThere is nothing irresponsible about disclosing huge vulnerabilities in software by any means necessary.
Edit: as usual, downvotes but no response. I miss when this place was decent.
- kristofferR 7 years ago
- aquova 7 years agoI think there's a middle ground to this. Submit your report to Apple security, allow them time to develop a patch, and then in a week go ahead and tweet at the big media outlets about it.
I'm a die-hard Apple user myself, but I agree that the long list of severe bugs in High Sierra is absurd, and a big public backlash might be enough to kick them into gear. On the other hand, I, a university student with next to no understanding of computer security, can simply walk onto campus, sit down at a Mac, and within seconds have complete access to the computer. It's ridiculous, it's horrendous that it shipped like this, but it's not something that needed to get out, especially something so easy to utilize.
- kristofferR 7 years agoThe fact that you as the ordinary student can become root and create a lot of damage so easily is the only reason the public will care.
Us geeks have been complaining about the horrible QA in macOS for years, yet nothing has been done. The fact that this is so simple to do will probably/hopefully get ordinary people to start talking about it too ("Hey, have you heard that you can hack Macs without a password? Very insecure"), which would force Apple to improve.
- brianpgordon 7 years agoMaybe it's crazy that we give people physical access to machines and expect them not to be able to obtain root.
I don't have any experience with enterprise-grade IT, but it seems like shared computers should be thin clients or at least use UEFI to securely boot an image over the network and not keep anything sensitive locally.
If you give someone physical access to a box, they will be able to own it.
- ekianjo 7 years ago> On the other hand, I, a university student with next to no understanding of computer security, can simply walk onto campus, sit down at a Mac, and within seconds have complete access to the computer.
its educational for the end user. You cannot trust Apple. Good reminder there are other OS available out there.
- kristofferR 7 years ago
- jackhack 7 years agoI'm more concerned that the "exploit" works "after a few tries" and not the first-time-every-time, or not at all.
One would think that something as simple as a login would be deterministic.
- michaelbuckbee 7 years agoMy understanding is that the first attempt is creating/enabling the root account with a blank password and that the subsequent login is actually utilizing it (which is kind of bizarre and probably why this was missed in testing).
- michaelbuckbee 7 years ago
- CGamesPlay 7 years agoDon't forget the Disk Utility password disclosure! https://www.macrumors.com/2017/10/05/macos-high-sierra-disk-...
- kristofferR 7 years agoThanks, added!
- kristofferR 7 years ago
- hw 7 years agoWhy does it need to create a lot of negative publicity for Apple? Is there something you don't like about them? Responsible disclosure needs to be valued given the number of macs out there in the wild that could potentially be susceptible to issues like this, and the impact it could have on people (including you) not just directly but indirectly.
How would you feel if someone discovered a 0day at a company that exposes credit card and identity info, published the 0day, then hackers steal all that info (including yours)? I'm sure 'creating a thunderstorm of negative publicity' would be the last thing you would want.
- bambax 7 years ago> Is there something you don't like about them?
You mean, in addition to bad QA and complete disregard for their users' security? And being the richest and most profitable company ever, cutting corners and evading taxes?
Their response on Twitter was amazing: "PM us so we can discuss this privately", not "thank you, we're looking into it NOW".
- soneil 7 years agoI don’t see it as either/or. You can disclose responsibly, and go for publicity once the fix is in circulation. Responsible disclosure is nothing to do with protecting Apple, it’s about protecting the users.
- 5ilv3r 7 years agoThe problem is that this is not a zero day in new technology. They made a jr sysadmin mistake. As a company who wants a reputation for good security, that is not acceptable.
- flywheel 7 years agoFar too many people think of Apple as infallible. I often think even Apple thinks of themselves as infallible. The more people that are aware of the inherent risk involved with using computers - any computer - the better.
- bambax 7 years ago
- madeofpalk 7 years agoDo "responsbile disclosure" rules apply differently to Apple?
If so, why? How do you identify companies like Apple that get one set of rules to other companies?
- BinaryIdiot 7 years agoThis is extremely naive.
Yes Apple shouldn't be having this issue but disclosing a 0-day issue can possibly hurt users far worse than hurting Apple. Apple may lose a tiny bit of money but users could lose far, far more especially if someone develops a good way to remotely deploy / take advantage of this defect.
Ignoring responsible disclosure also limits the ability to sue them for any damage resulting from it (or so I'm told by one of my lawyer friends who thinks this disclosure may make it almost impossible to successfully sue them over it unless it simply takes them too long to fix).
- openasocket 7 years agoYou could let them know about the vulnerability and wait until it's been patched before commenting, with some timeout where if they don't patch in a reasonable amount of time you announce it anyway.
- bubblethink 7 years ago>Let's hope Apple gets sued for the damage
How can that happen in any case ? Isn't pretty much the first line in every license waiving of liability ? Unless you have some special contract with Apple that overrides other standard boxes that you ticked, how would anyone sue ?
- mozumder 7 years agoZero-day disclosures aren't about negative publicity in order to prevent problems further down the road some time in the distant future.
It's about protecting systems RIGHT NOW from immediately causing harm to people's lives.
- sounds 7 years agoI agree.
https://www.eff.org/deeplinks/2017/10/drms-dead-canary-how-w...
Blame the DMCA. This guy is in Turkey - does GP really think he can expect fair treatment and equal compensation as a "western world" security researcher?
- vatueil 7 years agoThere's no reason why the person who discovered the bug would be safer publishing the vulnerability on Twitter than disclosing it to Apple directly. If nothing else, they could always post it on Twitter later. The link to the DMCA is a digression.
- gnulinux 7 years agoHow does him being from Turkey matter in this case?
- vatueil 7 years ago
- bradrydzewski 7 years ago
- sillysaurus3 7 years agoIt's the neighborly thing to do, but people are under no obligation to report vulns privately. The blame lies squarely on Apple, not on the messenger.
The fact that we know about it means we can take steps to mitigate the damage.
- e40 7 years agoThe blame lies squarely on Apple, not on the messenger.
There is blame on both.
If you leave your key in your front door lock and I blast out on twitter your address and tell people about it, I think I have some responsibility.
- interfixus 7 years agoIf you leave keys in other people's doors all over the neighbourhood, I damn well have a rigtht, and possibly an obligation, to make it publicly known that such a thing is taking place. So that everyone may take their own precautions.
- asejfwe8823 7 years agoA better analogy would be "if the lending bank left the door to your new house open..."
Other than buy an Apple product, the users did nothing intentional to undermine security.
Since this is a subjective argument, based more on historical instances of "responsible disclosure" and not law, I'm gonna lean in this case of it being Apple that failed
They built the entire "walled garden" without getting outside help. They want the control, they have billions of dollars, can hire whatever talent...
Failed to spot a password-less root login issue.
People need to know today to be even more cautious about using Apple gear in public places or around plain ol' tech jerks that like to fuck with people for a gag.
Society has no legal or moral obligation to make sure Apple stays in business.
- pcwalton 7 years agoThe problem with that analogy is that the probability that the "bad guys" already know about this vulnerability is vastly higher than the probability that thieves know about how well some random house in the neighborhood is secured.
- ZenoArrow 7 years agoYou may say so, but really the level of incompetence of not setting a password for a root account is pretty high. The fact that someone reported it in a way you don't agree with shouldn't distract you from the fact that this highlights a serious oversight.
The main question that should be asked is, how did this get overlooked? How is it that your average website has better password security than the OS of one of the richest tech companies in the world?
To be fair to Apple, Microsoft had similar issues back in the 1990s. Perhaps it takes a string of security blunders for some tech companies to take security seriously.
- bambax 7 years agoIf you sell locks and those locks can be opened by pulling on them twice, the reasonnable course of action is to make that fact known to every buyer ASAP, not tell you privately and wait for you to maybe issue a recall.
- mholt 7 years agoWrong. This is Apple -- not the homeowners -- leaving everyone's key in everyone's door without them knowing.
- ridgeguy 7 years agoThis situation seems more like a lock manufacturer selling millions of locks that can be opened with a toothpick.
I'd lay responsibility at the lockmaker's door, not the guy who told everybody they were at the mercy of anyone with a toothpick.
- bubblethink 7 years ago>If you leave your key in your front door lock and I blast out on twitter your address and tell people about it, I think I have some responsibility.
That's not a faithful analogy. Apple isn't your neighbour. They are the landlord. The scenario is more like that the landlord uses bogus locks in your complex, and you post it on twitter. You could complain to them privately too, but given your past experiences perhaps, you thought that twitter would be a more effective medium.
- nerfhammer 7 years agoThis is different though: the bug is so bad that random, inexpert users can discover it by accident. People that are not going to even be familiar with the term "responsible disclosure" at all. This may have been the case for the guy who tweeted this.
There is no realistic way to keep a lid on something like that and so in this case the blame is entirely on Apple.
- teamhappy 7 years agoYour analogy makes no sense. He's just as vulnerable as you are.
- 7 years ago
- thanatropism 7 years agoThis very excellent comment lies "dead", so I'll repost it:
asejfwe8823 24 minutes ago [dead] [-]
A better analogy would be "if the lending bank left the door to your new house open..." Other than buy an Apple product, the users did nothing intentional to undermine security. Since this is a subjective argument, based more on historical instances of "responsible disclosure" and not law, I'm gonna lean in this case of it being Apple that failed They built the entire "walled garden" without getting outside help. They want the control, they have billions of dollars, can hire whatever talent... Failed to spot a password-less root login issue. People need to know today to be even more cautious about using Apple gear in public places or around plain ol' tech jerks that like to fuck with people for a gag. Society has no legal or moral obligation to make sure Apple stays in business.
- interfixus 7 years ago
- collinmanderson 7 years agoMostly, they're just missing out on an up to $200,000 bug bounty.
https://www.theregister.co.uk/2016/08/05/apple_joins_the_bug...
- arghwhat 7 years ago... And means that others can utilize this to cause damage.
The idea of responsible disclosure is to minimize harm for you, the user. Not to minimize bad publicity.
- dolson 7 years agoIn a case like this, I think it would be best to maximize the bad publicity. Bad publicity is the minimum Apple deserves for a bug like this. In my idea world they'd get a lot of bad publicity, and a significant financial penalty.
- dolson 7 years ago
- patcheudor 7 years agoI get it, I really do, but it's not like he was complaining about a bad Uber driver. Disclosure in this way has real-world impacts up to and including harming people and we shouldn't ever consider it as something which is remotely acceptable. Is it acceptable to publicly disclose that an airport has a self-destruct switch which can be accessed near the NW mens bathroom? No. You contact someone who can fix the problem, then publicly disclose.
- sillysaurus3 7 years agoIt's as remotely acceptable as "root" with no password, apparently.
The question is large and complicated, and people can agree to disagree. There's nothing wrong with tweeting vulns: The company is at fault, we can defend ourselves now that we know about the vuln, and it's a big PR disaster for Apple.
A past conversation: https://news.ycombinator.com/item?id=14009937
No, no it's not strictly more ethical. It's not even strictly safer, which should be an even easier question to answer. The baked-in assumption in your logic is that users have no options other than waiting to patch. But, obviously, they do, and keeping vulnerabilities secret deprives them of those options.
- testvox 7 years agoBut everyone can fix this problem by setting a root password. So telling everyone is the right call. Otherwise people would be sitting vulnerable while Apple comes up with a patch.
- sillysaurus3 7 years ago
- peteretep 7 years ago
Legal obligation, no, you're right. Moral obligation? Why not?> people are under no obligation to > report vulns privately
- e40 7 years ago
- fixermark 7 years agoIs it likely it's just an error due to the discoverer not being immersed in the Infosec space? "Don't disclose a 0-day publicly" is good 'common' sense, but only among the 'common' of people who are steeped in security issues and the ramifications of publicizing them.
- mikeash 7 years agoIndeed, discovering this bug wouldn't take any security skill (I imagine it could be harmful since you might skip really dumb stuff like this) and could easily happen by accident. Responsible disclosure is standard for security researchers but I don't think this person was one, and it's not very fair to blame him for not doing it right.
- lawnchair_larry 7 years agoThat is not the case among infosec professionals either. Many respected professionals believe that the right thing to do in many cases is full public disclosure. Google Project Zero are a notable example.
- mwfunk 7 years agoGoogle Project Zero does not support full public disclosure immediately- quite the opposite. They support full public disclosure after giving the vendor an opportunity to ship a fix to their customers in a reasonable period of time. Nobody's debating whether or not security flaws should be publicly disclosed- of course they should. The only debate is, what is the most responsible way to handle such a security issue such that it harms the fewest users.
Project Zero (and infosec professionals, at least all of the ones I've ever worked with) would tell you that this was the most irresponsible way to handle the issue, short of not saying anything and selling knowledge of the exploit to someone other than the vendor who could fix it. Publicizing something like this in this way is something people do because they want publicity for themselves. It is not something someone does if their biggest concern is for the users who might be affected by it. It is something someone would do if they didn't care about the users, and just wanted public credit for pointing it out.
- Veen 7 years agoProject Zero does full disclosure 90 days after informing the relevant organization. Full disclosure comes after there has been a chance to fix the problem. Otherwise everyone is put at risk until a fix is available.
- albertTJames 7 years agoWhich respected professionals ? This is completely false.
- mwfunk 7 years ago
- mikeash 7 years ago
- bangonkeyboard 7 years agoIf you urgently want Apple to fix something, you do not file quiet bug reports. Apple only responds reliably to PR storms.
This vulnerability is ridiculous, unacceptable, and braindead to execute.
- patcheudor 7 years ago> Apple only responds reliably to PR storms
They've been quick (within 45 days) to patch every major bug I've reported to them and where the bugs were cross platform, impacting Windows, Android, etc., they've consistently been amongst the quickest to issue a patch so I'm not sure how you qualify that statement.
- bangonkeyboard 7 years agoI qualified it with "reliably". Major bugs reported by you, a security researcher, may be bucketed differently than those deemed less serious or filed by others. As a recent example, a minor bug like the iOS 11 calculator ignoring keypresses had reports filed since Beta 1, but only after it made headlines and caused Apple public embarrassment will it be addressed in the upcoming 11.2, six months later.
- tytso 7 years agoSorry. 45 days is not quick.
- bangonkeyboard 7 years ago
- saagarjha 7 years agoYou can go about it both ways: file a bug report, put a reasonable date that you want them to fix it by. Then you can disclose it.
- patcheudor 7 years agoThis happens quite often. Report a bug to Apple through CERT as an example and they run with a well known 45 day disclosure timeline. For researchers who don't want to get into vendor conflicts this is a good path because CERT ultimately holds the decision.
- patcheudor 7 years ago
- Scoundreller 7 years agoWe need to come up with a witty name to get it fixed faster.
- maephisto 7 years agoiRoot. uRoot. Everybody Root.
- plttn 7 years agoMy current favorite is I am Root.
- bhhaskin 7 years agoAppleGate
- 7 years ago
- neverartful 7 years agoi0wned
- maephisto 7 years ago
- patcheudor 7 years ago
- ig1 7 years agoResponsible disclosure is pretty much a security industry concept, it's not something that most developers know about, complaining on Twitter is probably what an average person would do.
Although for what it's worth last time I reported a security vuln to Apple using their official process they took around 2 years to fix it (admittedly low priority security vuln, passwords being sent over http).
- ben_w 7 years ago> admittedly low priority security vuln, passwords being sent over http
Wait, what?
- ig1 7 years agoUnfortunately it's still more common than you think.
The other day I actually ran across some AWS docs which suggest you send your AWS root key id in the url of http requests:
http://docs.aws.amazon.com/AlexaWebInfoService/latest/index....
- ig1 7 years ago
- COMMENT___ 7 years ago> complaining on Twitter is probably what an average person would do.
His twitter account tells that he is an agile software craftsman, turkey founder and a community guy. And he tweets about devops, open source and other stuff.
An average person disguised as a software developer?
- ben_w 7 years ago
- mirekrusin 7 years agoThere must be some kind of scale 1-10 of how serious the issue is. This one goes up to 11 as hilarious, not sure if proper reporting ethics apply here anymore.
- bugbountyhunter 7 years ago> there are any number of legit bug bounty programs
The thing about bug bounty programs are that they are not a negotiation. They decide how much your information is worth--take it or leave it.
If you thought this bug was worth $25,000 and you feared that Apple might offer a $100 discount coupon plus a lovely "I Love My Mac" coffee mug, is there any way to start a negotiation without being accused of extortion (if you imply that you might disclose it publicly)?
This is a serious question: Is there any way to negotiate for security bugs, before or after disclosing all the details, without running a legal risk?
- azernik 7 years agoNot really; the issue is that you don't have a way to disclose how much the bug is worth without giving away the bug itself. You can kind of ask how much an exploit that gets a local user root access is worth, but that can give away enough to let them focus their own search.
In general, you have to rely on this being a repeated game - you and the pentester community at large submit lots of bugs to this company, and you rely on them to make it worth your time and talent. If they don't, you go test someone else's software. Reputation is everything.
- azernik 7 years ago
- zerostar07 7 years agoPeople are already fixing their machines because he tweeted. this is too much of a huge blunder to wait for the official channels.
- azernik 7 years agoA very small percentage of particularly tech-savvy users. The benefits to this subset do not justify the harm to everyone else.
- jrochkind1 7 years agothey are? Where's the fix?
- Veen 7 years agoCreate a root password.
- Veen 7 years ago
- azernik 7 years ago
- zeveb 7 years ago> Disclosing an 0Day root authentication bypass vulnerability on Twitter isn't cool, even if it is local: think of the impact to shared iMacs on university campuses.
It gets the word out quickly.
Releasing proprietary software with such a hilariously insecure authentication system isn't cool. This isn't free software, produced by people & corporations out of the goodness of their hearts; rather, it's something for which people pay a good deal of money and which they have a right to expect is at least somewhat secure.
Getting the word out, fast that a) there's a huge insecurity and b) it's in Apple software provides benefits to those running macOS (so they can fix their systems) and to those considering running macOS (so they can evaluate whether an alternative is more appropriate).
- dustinmoris 7 years agoThere is no "responsible disclosure". You will never get 7 billion humans to do things exactly the way you want it, so if there is a possibility of at least 1 person disclosing a zero day publicly, then you have to be prepared for it just as much as if it was everyone.
Instead of trying to control behaviour of every single human being in this world and demanding of them to do things in a certain way - which is, was and will always be impossible it is much more favourable to establish the expectation that a zero day vulnerability might be dropped every week and have businesses (vendors and clients) be prepared for it so it can be handled adequately.
- oneeyedpigeon 7 years agoLet's wait until Apple release their patch so we know just how long they left everyone's machines vulnerable for. That will be a factor in determining whether this disclosure was irresponsible or not. It's been two and a half hours so far.
- heartbreak 7 years agoIf Apple released a patch in less than 24 hours I’d be seriously concerned about the QA that had gone into the patch.
- oneeyedpigeon 7 years agoI guess you’re seriously concerned now ;)
- oneeyedpigeon 7 years ago
- heartbreak 7 years ago
- romwell 7 years agoBecause clearly, the random Apple user that stumbled upon it should both be aware of and follow the protocols of security researchers.
- yumraj 7 years agoI agree in general, but calling it uncool and laying any blame on the person reporting is not fair.
You may know the protocol, security researchers and people in the tech industry may know that, but why is an ordinary Joe expected to know, or research, that email address and/or the protocol regarding 0-day vulnerabilities.
- joemi 7 years agoI'd argue that even to the ordinary Joe it should be quite logical that disclosing something publicly before the company has had a chance to fix it means that nefarious people could learn about the exploit and use it against victims.
It's the same logical line of thought that leads people into turning wallets into the lost and found (or an authority) instead of just pointing at it on the ground shouting "hey look, a wallet!" then walking away.
- joemi 7 years ago
- alexwebb2 7 years agoDoes anybody have any info on how much Apple would've been likely to pay for a responsible disclosure in this case, given the scope and severity of the issue?
I'm just curious how much of a payday this guy missed out on by not disclosing responsibly.
- ken 7 years agoAFAICT, Apple's security bounty program is officially only for their preselected group of security researchers.
In the course of developing my current application, I've discovered a couple security bugs in macOS, which I reported to Apple product security in PGP-encrypted emails. The only thing offered to me was to have my name/company listed in the release notes (which they are, for the latest 10.13 update, along with a CVE#).
- pault 7 years agoThat was my first thought. Based on some bounty reports I've seen recently I would assume at least high five figures.
- alexwebb2 7 years agoOuch. This guy's going to kick himself pretty hard. The 15 minutes of infamy seems like a pretty bad tradeoff.
- lawnchair_larry 7 years agoFor a local root with physical access? Not a chance. Maybe low 4 figures.
- alexwebb2 7 years ago
- ken 7 years ago
- dsp1234 7 years agothink of the impact to shared iMacs on university campuses.
I'm sure Apple will in the future.
- saas_co_de 7 years ago> Disclosing an 0Day root authentication bypass vulnerability on Twitter isn't cool
no one is under any obligation to sweep company's security problems under the rug for them.
If companies create incentives for people to share vulnerabilities with them first, great, but no one is under any obligation to participate in those programs.
Don't ship broken software if you don't want pie in your face.
- azernik 7 years agoForget the company. This harms users, who are not responsible for causing these issues; for all except the most technical 1% of Apple users, keeping the problem secret while Apple works on a quick patch is much more secure than telling the whole world immediately.
- flukus 7 years agoIf it harms the company then they will take it more seriously and it will protect users more in future. If it doesn't harm the company then they have no incentive to change.
- flukus 7 years ago
- rched 7 years agoThis isn’t about what’s best for Apple it’s about what is best for users. The way this was disclosed was bad for users.
- saas_co_de 7 years agoIn almost all cases immediate disclosure is better for end users who actually care about their security because they can take appropriate mitigation measures.
Just because the vulnerability is not disclosed does not mean it is not being actively exploited. It probably is.
Users who don't care about their security do not deserve to be "protected" at the expense of compromising the security of those who do care who benefit from immediate disclosure.
- saas_co_de 7 years ago
- azernik 7 years ago
- teamhappy 7 years agoYou can't expect everybody who uses a computer to be aware of that.
- williamscales 7 years agoThis situation is much more akin to a fire rapidly spreading through a village at night. I would go outside and start hollering in the hopes of saving anyone.
- saagarjha 7 years agoA better analogy is that there's a fire somewhere in your village, but it's mostly contained (it's not spreading, because other people don't know about it yet). By hollering about it, you've made it possible for anyone to go to the fire, light a torch with it, and burn down the village. Instead, you could call up the fire department and they could put it out–and then you could tell everyone about it.
- thomastjeffery 7 years ago> you've made it possible for anyone to go to the fire, light a torch with it
And at the same time provided everyone with a simple, free, and perfect way to fireproof his/her house.
You could wait for the fire department, which may take hours to get there, and hope that no malicious party down the street saw the fire, or you can do this. It turns out that both are quite reasonable reactions in this scenario, and that the latter is much more obvious to the layman.
There is no good reason to get angry at the layman for taking a course you don't prefer.
- 5ilv3r 7 years agoYou are comparing an arsonist to a fire department.
- thomastjeffery 7 years ago
- saagarjha 7 years ago
- LeoPanthera 7 years agoIt's not local if you have Remote Desktop enabled. Works over that too. From there you can enable ssh and all bets are off.
- notanai 7 years ago"It only works after getting physical access once" - quote form somewhere else in the thread
- thomastjeffery 7 years ago...or if you enabled root for some reason, but didn't set a password.
- thomastjeffery 7 years ago
- macNchz 7 years agoThe 'sign in as root with no password' method cannot be used to trigger the vulnerability initially via remote desktop. I tested it via SSH, File Sharing, Screen Sharing and Remote Management. None of these will enable the root user if it has not already been done locally.
Once the root user has been enabled locally, the only sharing settings I found to permit anyone remote access with the root/null combo is Remote Management.
- hunter2_ 7 years agoI don't think they meant using this vulnerability to enable a root remote connection, but using an existing non-root remote connection (think TeamViewer, VNC, whatever) and escalating.
- hunter2_ 7 years ago
- notanai 7 years ago
- jodrellblank 7 years agoDisclosing an 0Day root authentication bypass vulnerability on Twitter isn't cool, even if it is local: think of the impact to shared iMacs on university campuses.
How dare you publicly shame him and risk his future employability like this? It's only responsible of you to contact him quietly and directly so he can correct his mistake and cover it up so nobody needs to know.
It's like there's one rule for the negligent global corporation which happens to work in the corporation's favor and shames the public for speaking to each other about their salary, I mean flaws in their software, and another rule for ordinary people giving a heads up to people who are fair game to pile on.
- dhimes 7 years agoIs this address easily discoverable without needing too much insight into tech company workings? Like, do they have a help menu that tells people where to report stuff? I'm not an apple user.
- hunter2_ 7 years agohttps://www.google.com/search?q=apple+report+security+bug does bring https://support.apple.com/en-us/HT201220 right up, but that page documents "how security researchers, developers, law enforcement personnel, and journalists can contact Apple to report or ask about a security issue" -- notably absent from that set is "your average Joe who stumbled upon something entirely by accident" for some reason.
- hunter2_ 7 years ago
- qiqitori 7 years agoSince it isn't exactly easy to send emails securely, I think this piece of advice may need some more work.
The PGP key is available here: https://support.apple.com/en-us/HT201214
I wonder what percentage of emails to security@... (apple.com or otherwise) are sent encrypted...
- djsumdog 7 years agoSecurity experts and hobbiests know this, but not your average user. This doesn't look like an in-depth bug hunt. Maybe more average users should be educated about responsible disclosures when finding security problems. This tweeter might not realize they gave up some money.
- 0care 7 years agoI disagree. Being unaware of the flaw doesn't make you more secure.
- azernik 7 years agoAttackers being unaware of the flaw does.
- azernik 7 years ago
- chj 7 years agoIn this particular case, I am grateful for the early disclosure that I can fix it right now instead of waiting. For a huge bomb like this, I think you really can't blame the messenger.
- 7 years ago
- na85 7 years agoThis is one of the sillier things I've read today. The only way something like this slips through is a culture of complacency, or incompetence.
And the only way Apple gets motivated to fix either of those two things is massive Pr damage.
- azernik 7 years agoHow long have you been working in software? Bugs like this get past competent developers in reasonable organizations all the time.
Human fallibility, yo.
- ridgeguy 7 years agoYeah, but...
It seems to me (somebody who has no chops in this domain) that this is such a basic bug. Like something a child would have found just messing around.
And it came from a corporation that has around $200B of cash and cash equivalents. Apple has the resources to test and find bugs like this.
That Apple didn't find it is down to leadership and priorities more than some inherent limits of producing reliable code. One spends on what one thinks important.
But who knows, I've got no domain expertise here. Maybe a fifth of a trillion dollars C&CE really isn't enough to fund production of more robust code. But really?
- flukus 7 years agoAfter the developers there is a line of QA as well, but part of the problem is having the organisational structures for developers to discover issues like this. Regular audits, security as a priority and non-recrimination policies would be a good start. In many companies if you bring up problems like this then your "not a team player", in others you could point out issues like this all day long but they will never be acted upon because the budget isn't there for various reasons.
- ridgeguy 7 years ago
- azernik 7 years ago
- thedarkproject 7 years agoSecurity by Obscurity never works.
Source: Information Security 101
- khana 7 years agothe only thing not-cool is this egregious short-coming from Apl
- pwdisswordfish2 7 years ago"Disclosing a 0Day... isn't cool,..."
But it is not nearly as uncool as releasing software to millions of paying customers containing a 0Day. Who knows how many people already knew about this and other 0Days and have said nothing?
The carelessness in releasing software with 0Days is especially unforgivable when the company has more cash on hand to pay employees than any company in history. What is their excuse?
Apple can afford the very best. Their customers pay the most. But the software they release, no matter what their user may want to imagine, is most certainly not the very best.
It is not even as good as open source BSD from which OSX is derived, maintained by unpaid volunteers, which does not allow remote logins as root without a password.
- 7 years ago
- albertTJames 7 years agoYeah, the guy is an attention whore, he just wants to buzz.
There is no justification for releasing a 0day publicly.
- thomastjeffery 7 years agoThere is a simple workaround. Publicity means security here.
It's trivial to find. He can't presume he is the only one who found it. Telling any individual that doesn't have malicious intent is a good thing, therefore telling everyone is a good thing.
- thomastjeffery 7 years ago
- kristofferR 7 years ago
- rilex1 7 years agokk
- lgxz 7 years agothe MOST STUPID OS bug FOREVER?
- llamataboot 7 years agoThat twitter thread and lots of the comments are missing the point. MANY people don't know about what the ethics of reporting vulnerabilities are, they just want to say something and get it fixed. yes, it probably would have been better if this person had gone through proper channels, but there's no evidence they did it for the lulz/fame.
In this case the bug is so bad and egregious, that publicizing it with the fix might have been the best thing to do -- no telling how many people have already discovered this or how long it would take Apple to fix.
Yes, let's educate each other about what responsible disclosure WITH A DEADLINE TO FIX looks like, but don't assume this person just wanted internet points. And now that the report and a workaround are out there, at least it can be mitigated personally.
Though I imagine there will be some SERIOUS hijinks that result from this until Apple fixes it because it is so easy to do. :(
- ryanmarsh 7 years agoI’m not a security researcher and I don’t work for Apple. If I casually came across this I would totally tweet it out. Anyone asserting I should follow some sort of procedure has a misplaced sense of reality.
- dingo_bat 7 years agoYeah this is not like you have to craft special wireless packets to compromise the Broadcom network stack and then gain access. It's not that kind of vulnerability. This is really dumb and anybody can stumble across it. Hell, I work on network devices and non-production ones have root and blank as the password. I have tried the same in my laptop many times out of habit.
Responsible disclosure works when you are fairly certain you have found something nobody else knows about. Logging in with root must be known to many people.
- hateduser2 7 years agoYou would do that.. but you don’t consider what you should do.. surely responsible disclosure is the smarter strategy?
- ryanmarsh 7 years agoResponsible vs irresponsible... how would I know? You’re assuming way too much.
- ryanmarsh 7 years ago
- dingo_bat 7 years ago
- ryanmarsh 7 years ago
- jeffisabelle 7 years agoI still can't believe more people complain about this being publicly disclosed than this being possible in the first place. No one is obligated to know the procedures on InfoSec 0-days and follow those steps.
- zokier 7 years agoMost likely another from of bikeshedding; people don't have real input on the main matter, so they comment on circumstantial matters just so they can throw in their 2c
- hateduser2 7 years agoOr they have real circumstantial comments to make.. it doesn’t have to be that they just want to talk
- hateduser2 7 years ago
- legohead 7 years agoI wouldn't bash the guy. Someone already let him know about his technical faux pas in a professional manner on his twitter.
My guess is he found this vulnerability on accident, freaked out, and tweeted about it. Probably has limited infosec experience.
- 5ilv3r 7 years agoOr he cares more about doing the right thing than about following best practices designed to protect the guilty under the guise of helping users.
- hateduser2 7 years agoIdk why u say “designed to protect the guilty under the guise of protecting the innocent”.. it clearly does both. It does protect the innocent. That is a fact! It also does protect the guilty! Both are true. It makes it harder to have a strong view when you must acknowledge both facts I suppose
- hateduser2 7 years ago
- mbesto 7 years agoI don't know, he's tweeted more about the topic: https://twitter.com/lemiorhan/status/935619881143324673
So he's either not reading his replies or he's being deliberately irresponsible. My guess, based on his profile and online behavior, is that he's trying to ride the coattails of getting some exposure online.
- mcbridematt 7 years agoDefinitely. How many people outside the infosec industry know that responsible disclosure channels exist?
- 5ilv3r 7 years ago
- zeveb 7 years ago> I still can't believe more people complain about this being publicly disclosed than this being possible in the first place.
I think the problem is due to the fact that they are fans. In this case, it's Apple, but there's no reason it couldn't be Linux or Go or whatever. Regardless, any bad news about their hero is irresponsible to disseminate. We see this same phenomenon in politics, in sports and elsewhere — I daresay it's regrettable human nature.
- eric_h 7 years agoI've not commented either way on the subject in this thread, but personally I would much rather have read this as a writeup 2 or 3 months from now after the discoverer had responsibly disclosed the vulnerability and Apple had a chance to patch it.
On the other hand, I'm glad that I have this information so I know not to install High Sierra on my work iMac (sitting on a desk in a WeWork behind a door whose lock would be very easy to force open) until this is fixed.
[Edit: I now see that there's a simple workaround (change the root password and keep root enabled), so I'm all for "irresponsible disclosure" in this case]
- eric_h 7 years agoAs an addendum apple released a fix for this less than 48 hours after it was reported (I think I've got the timeframe right), so there's something to be said for irresponsibly disclosing to light a fire under the ass of whomever is responsible for fixing a vulnerability.
- eric_h 7 years ago
- saagarjha 7 years ago> I think the problem is due to the fact that they are fans.
I think this is an unfair characterization. Sure, it's hard to hear that their "hero is irresponsible", but the real reason is that this kind of behavior puts everyone at risk while Apple tries to fix it.
- 5ilv3r 7 years agoThat may be true for cisco and juniper where upgrades must be carefully rolled out across globally distributed critical infrastructure, but this is APPLE. They need no such help. They can push to everyone, now, and it will be fine. Forcing their hand is safer than trying to hide a flaw a 3 year old could find on accident.
- recursive 7 years agoThey were already at risk. Now they can mitigate.
- 5ilv3r 7 years ago
- eric_h 7 years ago
- 7 years ago
- mbesto 7 years agoExcept when people politely explain to the original poster not to do what he did. His tweet and a follow-up tweet still exist on the topic. He could easily delete them.
If you read through the comments, you'll see people are arguing that Apple is to blame here. It doesn't require much discourse to recognize that's the case and hence why you don't see more people complaining about this being possible in the first place.
- zokier 7 years ago
- michaelmcmillan 7 years agoAre we really ready for self-driving cars? https://www.youtube.com/watch?v=4G1Boh-URIM
- ky738 7 years agoI will take malicious improper analogy for 100
- michaelmcmillan 7 years agoPlease point out the discrepancy.
A Tesla has ~ 100.000.000 [1] lines of code. Considering this post, do you think we are sufficiently educated in software security to produce secure self-driving cars?
Elon Musk: "I think one of the biggest risks for autonomous vehicles is somebody achieving a fleet wide hack" [2].
- abestic9 7 years agoThese companies have completely different operating systems, network ACLs, software update policies and subsystems that affect certain mechanical features.
By your logic, we should not fly any modern commercial or military aircraft or spacecraft, live within a certain radius of any power or hazardous chemical plant, place any dependency on any first world country's health care network, including life support, or invest in any company or stock.
Like most things in life it comes down to a security/convenience risk/benefit compromise.
- 7 years ago
- mikeash 7 years agoHow much of that code is safety critical? I occasionally see misbehavior from my Tesla's center screen, like the network connection failing, or audio glitches, or even the occasional spontaneous reboot. This can be mildly annoying but it doesn't worry me because I know that the center screen is separate from the stuff where bugs can actually get me killed.
- jessriedel 7 years agoThis is a much more interesting comment than your initial quip. Next time, consider leading with this rather than unnecessarily antagonizing people.
- abestic9 7 years ago
- 7 years ago
- michaelmcmillan 7 years ago
- MentallyRetired 7 years agoAs a programmer, the thought terrifies me.
- glhaynes 7 years agoAs someone who tries to do risk analysis, the prospect of sticking with human drivers because of fear of software bugs (which inevitably will kill, just in much smaller numbers) terrifies me.
- jtbayly 7 years agoThe fear is not of bugs killing people. The fear is of bugs allowing people to kill people.
If ISIS was able to hack a major fleet through one such bug, do you think for a single moment they wouldn't make use of it to kill many people?
- jtbayly 7 years ago
- qrbLPHiKpiux 7 years agoCould a programmer be held liable for any bad outcomes?
- glhaynes 7 years ago
- zerostar07 7 years agotechnically, after they are hacked they are no longer self-driving.
- crispinb 7 years agoPossibly not, but the death & maiming stats everywhere show we're absolutely not ready for human-driven ones.
- carapace 7 years agoThank you
I imagine a Twilight Zone episode... Go back in time to before cars were invented and imagine some Mephistopheles offering the bargain: "You'll fly like the wind over hills and mountains, making a journey of days in mere hours!" What the catch? "For each mile traveled a certain number of people chosen at random must be put to death or maimed."
He would go on about how the chances of someone you love being chosen for sacrifice were infinitesimal, and the benefits to all were so great and so obvious...
("Also, it will poison the air and water, and force you to become dependent on fuel sources that destroy life and engender wars.")
- crispinb 7 years agoWell to be fair there are more positives to cars than just cutting journey times. But I agree the negatives are massing hugely as the world's driving population pullulates.
As for human readiness to safely control a tonne of speeding metal, my position as a full-time motorcyclist makes me extremely confident that the average alleged 'driver' (actually: daydreamer, snot-picker, instagrammer) isn't even approaching the edge of the competence ballpark.
- crispinb 7 years ago
- carapace 7 years ago
- naasking 7 years ago> Are we really ready for self-driving cars?
Firstly, car automation is machine learning, not programming. Completely incomparable.
Finally, we've known how to prove the absence of bugs for decades. It's not a matter of not knowing how, it's about incentives to do it right.
- michaelmcmillan 7 years agoIs the authentication subsystem in a Tesla machine learning as well?
- michaelmcmillan 7 years ago
- 7 years ago
- ovao 7 years agoI think the question you're fundamentally asking is "are we ready for imperfect systems with potential vulnerabilities?", and the answer to that question has been the same since the advent of software.
- Oxitendwe 7 years agoNo. I am also skeptical of more modern cars with complex computers. The thought of being in one scares me.
- therealdrag0 7 years agoThey don't need to be perfect. Just better than humans.
- 7 years ago
- ky738 7 years ago
- dasil003 7 years agoWhy is this so far down the front page? Are people flagging it for some reason?
- mholt 7 years agoThe HN title is wrong. This reportedly affects High Sierra, not Sierra.
- bsaul 7 years agoI wonder who they're going to ask to write a public letter of apology this time.
This isn't just a snarky comment. They have just released the most awfull iOS upgrade for a long time, and now this. Something's messed up, and they better fix it soon.
I've think i've read somewhere they merged the iOS and macOS teams, i suppose the wrong people were promoted during the operation.
- rimliu 7 years ago
I keep seeing this written after each major iOS release sinc at least iOS 7.> They have just released the most awfull iOS upgrade for a > long time, and now this. Something's messed up, and they > better fix it soon.
- bsaul 7 years agoFor me, the most painful is that this time they managed to screw up the damn keyboard while bringing absolutely nothing new. I can't even use hangout or chat on my iPad Air , i have to wait 3 seconds for my words to appear.
That's just wrong. There's no excuse for that. We're not talking about fancy animation or new features that we think aren't a great idea. Just a basic regression on one of the most fundamental things you can do with this device (the other being displaying things).
Another thing is that they usually fix slowdowns and stability with the following release soon after. Not this time, so my guess is that it'll be a "change your device" kind of upgrade.
- saagarjha 7 years ago> I can't even use hangout or chat on my iPad Air , i have to wait 3 seconds for my words to appear.
Obviously, something's wrong with your keyboard, but how do you know it's iOS's fault instead of your app's?
- saagarjha 7 years ago
- bsaul 7 years ago
- davidkuhta 7 years agoCue "incorrect elevation of privileges" joke.
edit: spellingsudo laugh
- nolok 7 years agoNah you don't need sudo for that anymore, now you're root
- intelliot 7 years agoCue
- davidkuhta 7 years agodoh, thanks. Can you tell what abstract data type I've been working with lately?
- davidkuhta 7 years ago
- nolok 7 years ago
- romanovcode 7 years agoThey will use some clever words to make it sound like a trivial issue like they did when password was appearing instead of password hint couple of months ago.
- rimliu 7 years ago
- tzakrajs 7 years agoCan't reproduce on multiple High Sierra machines.
- mikestew 7 years agoCan't repro on a 2012 retina MBP running 10.13.1, attempting the original repro and others suggested here. Until the wife walks away from hers, it's the only machine I have available. I'm curious as to the difference, given the high number of repros.
- mikestew 7 years ago
- sillysaurus3 7 years agoThis is the first time I've felt happy I rarely upgrade.
- pwdisswordfish2 7 years agoIf someone has physical access to the Apple computer in order to "log in", then even if the owner has set a strong root password, what stops anyone from rebooting, holding down Command+S and booting into single user mode?
In single user mode, as all macOS users know, there will be no access limits. Anything can be changed.
How are users preventing from rebooting into single user mode?
- nkkollaw 7 years agoThe new Apple is the old Microsoft, and the new Microsoft is the old Apple.
After 8 months of living hell using their overpriced MacBook Pro, I'm moving to Surface Pro (running Xubuntu, though).
- 7 years ago
- danjoc 7 years agoThe person who found this is at greatest risk. Public disclosure keeps him safe.
"Oh, good boy. Thanks for the responsible disclosure. You're sure you haven't told ANYONE else about this? Great! Keep it that way and we'll send you a big check real soon. Promise!"
Coordinates acquired.
Boom.
Keep in mind, Apple was caught working directly with NSA in Snowden disclosures. The US government will drone strike people outside the US without trial or charges. Apple illegally SWATed a Gizmodo reporter over a leaked iPhone prototype.
I don't blame this Turkish national, not one bit.
- realworldstuff 7 years agoPeople going on about responsible disclosure when this is such a gross violation of CUSSE: https://web.archive.org/web/20170712120031/http://www.cusse....
- Welytech 7 years agoDope
- Welytech 7 years agoToo bad apple should care about the software quality.
- beedogs 7 years agoWhen you're too busy as a company making sure the corners of your products are sufficiently rounded, you get things like this.
- unlmtd 7 years agoPeople still use this thing !?
- gaius 7 years agoBut someone at Apple got their bonus for shipping the animated poop icon in time for this release.
- LeoPanthera 7 years agoIf you think the team that makes animojis is the same team in charge of security or QA, I have news for you.
- LeoPanthera 7 years ago
- mofino 7 years agoNot a remote vuln, who gives a shit. Physical security >
- zaro 7 years agoClassical click and bait title. First promises that you'll become a hacker, and then when you actually click the tweet is deleted.
- Murrawhip 7 years agoIsn't deleted for me.
- Murrawhip 7 years ago
- singularity2001 7 years agoIs http://hckrnews.com/ buckling from the tremendous traffic this issue generates?
- hartator 7 years agoI guess they were more focused in introducing bugs and less performant filesystem than security in High Sierra.
- Twirrim 7 years agoThose teams are extremely unlikely to be the same ones.
- Twirrim 7 years ago
- FiveSquared 7 years agoOh my goodness. I have a High Sierra MBP. I am scared right now BADLY
- LeoPanthera 7 years agoIt can't be exploited remotely. Only by someone sitting at your computer.
- FiveSquared 7 years agoI know. But I don’t want my roomies to access it while I’m in the toilet, for example.
- FiveSquared 7 years ago
- LeoPanthera 7 years ago
- tekacs 7 years agoNow that this is public, it's likely worth passing this message on to non-technical folks too (e.g. share this or write a similar post - this is my only public post):
- jtokoph 7 years agoImportant error in your instructions. They should set a very strong password and keep the root account enabled. Disabling the root account opens up the vulnerability again.
- tekacs 7 years agoEdit: Okay so it seems that my shell based suggestion of `dsenableroot -d` prevents the bug from re-occurring, but not the GUI version. :facepalm:
I updated the post to include the word 'strong', although I would expect most users to simply set their own password, which should provide identical security to what they currently (should) have.
Disabling the root account does not open up the vulnerability again.
This vulnerability doesn't reset the root password, it only enables the root account and checks the password against that. The default root password out of the box on OSX is blank which is what allows this to work as-is.
By setting a root password, the next time you attempt this (and I tried it), the attempt fails since the 'root' account now has a password set.
Disabling simply puts the root account back in a dormant state, where it should be for most users, for after this vulnerability is fixed and it can't be enabled maliciously.
- tekacs 7 years ago
- 7 years ago
- jtokoph 7 years ago
- KyeRussell 7 years agoThis post reminded me of why Twitter is a pretty awful place.
The replies to this tweets are all everyones snarky comments to the @AppleSupport account or their edgy 'hot takes' on the issue. @AppleSupport responded promptly - albeit obviously out of their depth, and a bunch of people couldn't help but make fun of this fact. It's almost like tweeting to Apple's customer support account is not the best way to report a vulnerability?
Responsible disclosure has a proven history of working. When the vulnerability is appropriately patched and disclosed to the public, there is still a lot of backlash. You only need to look at the recent responsibly disclosed vulnerabilities for proof of this. Instead, we have a bunch of armchair analysts—who don't at all seem to be driven by past occurrences / existing data in any way—claiming that it didn't work.
- tombrossman 7 years agoFellow Linux users, please keep the snark in this thread to a minimum. Here's just one recent example why, there are more: http://www.omgubuntu.co.uk/2017/05/ubuntu-guest-sessions-log...
- igetspam 7 years agoLinux != Ubuntu
Linux didn't have that problem, a single vendor did. You could say the same for Apple except they are the single vendor. That stupid security trick in Ubuntu only impacts subset of a subset of Linux _desktop_ users which is a pretty small subset of computer users as a whole. When Apple does something like this, it impacts a much larger share of the world population.
So how about we keep the snark to an appropriate level based on the impact to the world population? ;)
- arghwhat 7 years agoAs Linux user who does kernel-mode development for a living, root escalation bugs come a dime a dozen. And, well, Linux runs everything but the average persons laptop, so the impact, while different, is much greater.
So lets keep the snark to an appropriate level, shall we?
- igetspam 7 years agoAre you arguing that privilege escalation is the equivalent to passwordless root login? I mean, I guess you squint just right you could say that a logged out user having zero privileges being able to login as a user with all privileges is an "escalation" but that's one hell of a stretch. We haven't even gotten to snark yet though.
We can point to avenues for remote root all day but I don't recall any that are/were as simple as "just hit [enter] to get root" that impacts the shared attack surface that impacts all Linux systems.
NOTE: I did not go and search NVD before writing this reply but I did stay at a Holiday Inn Express once.
- igetspam 7 years ago
- arghwhat 7 years ago
- dsp1234 7 years agoNumber of mentions of "Linux" outside of your thread comment chain: 0
- zeveb 7 years agoI'm a Linux desktop (and laptop!) user, and I agree (I haven't even used macOS in almost twenty years). Anyone remember the Debian OSPRNG issue?
These sorts of bugs can happen anywhere. We all need to bear that in mind.
One notable difference, though, is that macOS is proprietary software. Apple have sold their users a product and haven't respected their users' right to use, modify & distribute that product; their users have never had the ability to inspect the macOS source for this kind of problem. Thus, responsibility for this disaster rests solely on Apple's shoulders.
- MentallyRetired 7 years agoHypocrisy is a reason to keep snark at a minimum?
- trumpRektYou 7 years agospotted the applefag.
- igetspam 7 years ago