[This post is in replacement for the post submitted inadvertantly earlier today.]
Greetings Folks: I read this thread with keen interest because of the unique experience I had in the last year of my six years in support of and then on the team with the system developers of the Terrorist Screening Development Center. [SEE useful info AT THE END OF MY DIATRIBE:-)ElLucero]
In 2009 I watched in growing alarm as the Mac Pro I had managed successfully for the two previous years as the only Mac/Unix system on that volatile classified (i.e., "closed") network came under the control of some anonymous third party that, given the nature of the TSC mission, I would guess were/are terrorists of the suited engineering type.
I've owned/worked on dozens of Macs since '84, and used OS X professionally and privately since it came out. Since I had cut my technical publishing teeth at CACI (1988-93) finding the most efficient ways to document the simulation and modeling products developed there on Sun, SGI, and HP Unix workstations — using the Macs/PCs of the era — I was well aware of the power/danger of superuser (root), the panoply of daemons, permissions, processes etc., and the various Unix commands for navigating, changing permissions, listing processes, editing files and so on.
The TSDC Mac Pro did not have an Airport (wireless) card by rule, and every door to the space had a large "Turn Off All Wireless and Bluetooth Devices" sign above the access code-input keypad.
That Mac Pro was the only machine on that classified network that was explicitly not supported or understood by the TSDC (D=Development) IT staff. They thought that, with no wireless network card and with Bluetooth turned off (via System Prefs) that the machine was secure in that closed environment.
If IT had known the following facts, they would not have cleared that Mac for TSDC use without first removing the Bluetooth hardware:
- Bluetooth DUN (BDUN; dial-up networking) cannot be turned off. As Apple doesn't document anywhere, the Bluetooth "on/off" checkbox (System Prefs: Bluetooth) doesn't turn off the BDUN service. Short of paying through the nose to have an Apple "Genius" remove the hardware, the only way to silence BDUN involves complex maneuvers by root or sudo (given the sudoers file is properly configured)..
- The purpose of BDUN is to enable the "tethering" feature that uses another non-removable component, the Bluetooth-PDA-Sync virtual serial port, to turn a nearby Bluetooth enabled smart phone (iPhone, Droid, etc) into a wireless router (upon pairing, of course).
Why am I including these allegations in the context of your thread? Because it was Apple's failure to document these and other security holes related to its "convenience-ware" that led to my failure to convince the TSDC IT staff and security officer of the reality of the smoking gun I had found after months of research and Apple support calls: a fully configured MobileMe, clandestinely installed and operating under my logon. You cannot (that is, could not) accidentally configure a MobileMe account. It required a valid credit card with the owner's name on it, even for the trial version — and that name was displayed in the configured MobileMe system preference panel. (I found the MobileMe when I accidentally clicked on an iDisk icon in the Finder sidebar pane and, instead of being presented with the unconfigured MobileMe preference pane, I was presented with a sync prompt (Allow Once, Always Allow, Deny …). I launched System Preferences: MobileMe and found the clandestine MM configuration. I failed to educate the TSDC IT and mgmt. staff regarding the nature of the incursion because:
- I didn't know that BDUN is not controlled, as are the other Bluetooth services, using the on/off check box in the System Prefs: Bluetooth panel.
- I did not know that Single User Mode gives complete superuser control to anyone who had physical access to the machine and knew the key combination to press at startup.
It took me months (after being whistle-blown out of the TSDC) to find an Apple tech who admitted that BDUN cannot be shut off, and a year more to identify the mechanism on the TSDC Mac Pro to connect it to the MobileMe Appleshare server in the sky: the scripted use of the tty.Bluetooth-Modem and tty.Bluetooth-PDA-Sync files located in the /dev directory.Here is the useful info I promised above. This info should be made available to all Apple customers:
- Download: Mac OS X Security Configuration For Mac OS X Version 10.6 Snow Leopard.(SnowLeopard_Security_Config_v10.6.pdf).
- Read the entire manual before taking any action because understanding the technologies, terms, and techniques helps you choose which measures are appropriate for your situation and the overall structure of the manual provides guidance regarding the appropriate order you should use to implement the measures you choose. The following suggestions I found most important are not necessarily ordered as the manual orders them:
- Use its directions, first, to make sure your Mac's sudoers file does not include uncommented lines specifying users or user groups you do not recognize or do not wish to have root capabilities, Replace group references (like %admin) with specific user names.
- Configure Snow Leopard's IP Firewall (IPFW) to protect yourself against assaults not caught by the System Prefs: Security: [Application Firewall] even in its most secure setting.
- Disable Bonjour and any other convenience-ware facility you don't use.
The manual is a gold mine and is every bit as applicable to non-server users as it is to server users.
Good luck,
ElLucero