SAMBA, just your average DoS utility

SAMBA, just your average DoS utility

Post by Chad Myer » Sun, 31 Dec 1899 09:00:00



I don't know if anyone caught the most recent NTBugTraq post about
smbtorture.

I'm no authority on this, but it appears that there is a "utility" in samba
which will crash a Windows box. It uses its elevated privleges (becuase
you usually set up samba as a server and a peer to another real NT box)
to flood the NT box with RPC connections and eventually causing the
SERVICES.EXE to give up.

Again proving that one of the few things linux is good for is hax0rin..

Even their applications that are supposed to bolster support and ease
Linux integration into Windows shops are cracker utilities.

<sigh>

Chad

 
 
 

SAMBA, just your average DoS utility

Post by Chad Mulliga » Sun, 31 Dec 1899 09:00:00



>I don't know if anyone caught the most recent NTBugTraq post about
>smbtorture.

>I'm no authority on this, but it appears that there is a "utility" in
samba
>which will crash a Windows box. It uses its elevated privleges (becuase
>you usually set up samba as a server and a peer to another real NT box)
>to flood the NT box with RPC connections and eventually causing the
>SERVICES.EXE to give up.

If I understand which DOS attack you're referring to, it has been fixed
for a couple of months.

http://www.microsoft.com/security/bulletins/ms99-021.asp

Quote:

>Again proving that one of the few things linux is good for is hax0rin..

>Even their applications that are supposed to bolster support and ease
>Linux integration into Windows shops are cracker utilities.

><sigh>

>Chad


 
 
 

SAMBA, just your average DoS utility

Post by Bori » Sun, 31 Dec 1899 09:00:00


There's LSASS vulnerability: LSASS crashes when a lot of garbage is written into IPC$
pipe. NT itself doesn't BSOD, but nobody can logon to the system.
It was fixed in SP5.

Boris

> No, the CRSS work thread vulnerability is a local DoS, not a remote one.

> This is something different having to do with RPC and/or LSA, I believe.

> Here is a link to the original CRSS posting of the problem and reprod.
> details:
> http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=
> ind9904&L=NTBUGTRAQ&D=0&F=P&P=2694

> note: wrapped for readability

> The newest post in regards to DoS Samba is here:
> It's recent as it was just posted to NTBugTraq today or yesterday.

> http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=
> ind9908&L=NTBUGTRAQ&P=R2823

> And the Samba people's reply:
> http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=
> ind9908&L=NTBUGTRAQ&P=R3252

> Note: both wrapped for readability

> Chad




> > >I don't know if anyone caught the most recent NTBugTraq post about
> > >smbtorture.

> > >I'm no authority on this, but it appears that there is a "utility" in
> > samba
> > >which will crash a Windows box. It uses its elevated privleges (becuase
> > >you usually set up samba as a server and a peer to another real NT box)
> > >to flood the NT box with RPC connections and eventually causing the
> > >SERVICES.EXE to give up.

> > If I understand which DOS attack you're referring to, it has been fixed
> > for a couple of months.

> > http://www.microsoft.com/security/bulletins/ms99-021.asp

> > >Again proving that one of the few things linux is good for is hax0rin..

> > >Even their applications that are supposed to bolster support and ease
> > >Linux integration into Windows shops are cracker utilities.

> > ><sigh>

> > >Chad

 
 
 

SAMBA, just your average DoS utility

Post by Chad » Sun, 31 Dec 1899 09:00:00


No, the CRSS work thread vulnerability is a local DoS, not a remote one.

This is something different having to do with RPC and/or LSA, I believe.

Here is a link to the original CRSS posting of the problem and reprod.
details:
http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=
ind9904&L=NTBUGTRAQ&D=0&F=P&P=2694

note: wrapped for readability

The newest post in regards to DoS Samba is here:
It's recent as it was just posted to NTBugTraq today or yesterday.

http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=
ind9908&L=NTBUGTRAQ&P=R2823

And the Samba people's reply:
http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=
ind9908&L=NTBUGTRAQ&P=R3252

Note: both wrapped for readability

Chad



> >I don't know if anyone caught the most recent NTBugTraq post about
> >smbtorture.

> >I'm no authority on this, but it appears that there is a "utility" in
> samba
> >which will crash a Windows box. It uses its elevated privleges (becuase
> >you usually set up samba as a server and a peer to another real NT box)
> >to flood the NT box with RPC connections and eventually causing the
> >SERVICES.EXE to give up.

> If I understand which DOS attack you're referring to, it has been fixed
> for a couple of months.

> http://www.microsoft.com/security/bulletins/ms99-021.asp

> >Again proving that one of the few things linux is good for is hax0rin..

> >Even their applications that are supposed to bolster support and ease
> >Linux integration into Windows shops are cracker utilities.

> ><sigh>

> >Chad

 
 
 

SAMBA, just your average DoS utility

Post by Steve Sheld » Sun, 31 Dec 1899 09:00:00



>The newest post in regards to DoS Samba is here:
>It's recent as it was just posted to NTBugTraq today or yesterday.
>http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=
>ind9908&L=NTBUGTRAQ&P=R2823
>And the Samba people's reply:
>http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=
>ind9908&L=NTBUGTRAQ&P=R3252
>Note: both wrapped for readability

 This is weird.  I subscribe to NTBUGTRAQ and don't recall seeing either of
these messages.

 I did get a number of emails today related to ODBC and IE 5.0 problems.

Hmm, will have to look, maybe I'm filtering based on some bad word or
something.
--

BSCS/MCSE                              url: http://www.sheldon.visi.com
"Yeah but..." - Al Iverson 8/17/1999 :)

 
 
 

SAMBA, just your average DoS utility

Post by Chris Costell » Sun, 31 Dec 1899 09:00:00



Quote:> There's LSASS vulnerability: LSASS crashes when a lot of garbage is written into IPC$
> pipe. NT itself doesn't BSOD, but nobody can logon to the system.
> It was fixed in SP5.

   Serious question time (in two rival advocacy groups!  uh oh!):

   How does it do that?  Does the garbage get in the login
service's hands and cause it to lock up, or ...?

Quote:> Boris

--
|Chris Costello
|Quality assurance: A way to ensure you never deliver shoddy goods accidentally.
`-------------------------------------------------------------------------------
 
 
 

SAMBA, just your average DoS utility

Post by Bori » Sun, 31 Dec 1899 09:00:00




> > There's LSASS vulnerability: LSASS crashes when a lot of garbage is written into IPC$
> > pipe. NT itself doesn't BSOD, but nobody can logon to the system.
> > It was fixed in SP5.

>    Serious question time (in two rival advocacy groups!  uh oh!):

>    How does it do that?  Does the garbage get in the login
> service's hands and cause it to lock up, or ...?

Probably, smthg like that.
When we ran *cop Scanner "LSASS denial of service" test LSASS was crashing. There was
post-SP3 hot fix for that, but it didn't make it into SP4 by mistake. SP5 has it.

Boris

 
 
 

SAMBA, just your average DoS utility

Post by Karri Kalpi » Sun, 31 Dec 1899 09:00:00



> I don't know if anyone caught the most recent NTBugTraq post about
> smbtorture.
...
> Even their applications that are supposed to bolster support and ease
> Linux integration into Windows shops are cracker utilities.

So... The unix (not just linux) Samba package also includes
a testing tool that can be used to find problems in the SMB
system. Is that what you're saying?

It seems obvious that Microsoft does not have such testing
tools...

--karri

--
You have moved your mouse, for these      : Karri Kalpio

down and restart your computer. Do you    : [+358] (9) 7017131  (home)
want to restart your computer now?        : [+358] (9) 43543665 (work)

 
 
 

SAMBA, just your average DoS utility

Post by Chad Mulliga » Sun, 31 Dec 1899 09:00:00






>> > There's LSASS vulnerability: LSASS crashes when a lot of garbage is
written into IPC$
>> > pipe. NT itself doesn't BSOD, but nobody can logon to the system.
>> > It was fixed in SP5.

>>    Serious question time (in two rival advocacy groups!  uh oh!):

>>    How does it do that?  Does the garbage get in the login
>> service's hands and cause it to lock up, or ...?
>Probably, smthg like that.
>When we ran *cop Scanner "LSASS denial of service" test LSASS was
crashing. There was
>post-SP3 hot fix for that, but it didn't make it into SP4 by mistake.
SP5 has it.

>Boris

I think Chad was referring to the CSRSS problem, both were very close
together.  As I understood it, the crsss service would wait for an ack
from it's response and would stop responding, they changed its
prioritization to prevent occurance.

 http://www.veryComputer.com/

Microsoft Security Bulletin (MS99-021)

Patch Available for "CSRSS Worker Thread Exhaustion" Vulnerability

Originally Posted: June 23, 1999

Summary
Microsoft has released a patch that eliminates a vulnerability in the
Microsoft? Windows NT? CSRSS process that could be used to create a
denial of service condition against a machine that allows interactive
logons.

Frequently asked questions regarding this vulnerability can be found at
http://www.veryComputer.com/

Issue
If all worker threads in CSRSS.EXE are occupied awaiting user input, no
other requests can be serviced, effectively causing the server to hang.
When user input is provided, processing returns to normal. The patch
eliminates the vulnerability by ensuring that the last CSRSS worker
thread services only requests that do not require user input.

The LSA problem was a different issue of the LSA service failing when a
malformed request was received, forceing a reboot.

http://www.veryComputer.com/

Microsoft Security Bulletin (MS99-020)

Patch Available for "Malformed LSA Request" Vulnerability

Originally Posted: June 23, 1999
Revised: Ju1y 20, 1999

Summary
Microsoft has released a patch that eliminates a vulnerability that
poses a denial of service threat to Microsoft? Windows NT? servers and
workstations. A malformed request to the Local Security Authority (LSA)
service will causes the service to stop responding, requiring the
computer to be restarted.

A fully supported patch is available to eliminate the vulnerability, and
Microsoft recommends that affected customers download and install it, if
appropriate.

But I think this is the one Chad was referring to.  It fits your
description better

 
 
 

SAMBA, just your average DoS utility

Post by Chad Myer » Sun, 31 Dec 1899 09:00:00


No, I WASN'T referring to the CSRSS problem, there are two unrelated issues.

CSRSS is a local thing, this is a remote thing.

If anything, it was the LSASS DoS. But I think it's even newer than that, as
it was
a new and recent posting to NTBugTraq.

Chad






> >> > There's LSASS vulnerability: LSASS crashes when a lot of garbage is
> written into IPC$
> >> > pipe. NT itself doesn't BSOD, but nobody can logon to the system.
> >> > It was fixed in SP5.

> >>    Serious question time (in two rival advocacy groups!  uh oh!):

> >>    How does it do that?  Does the garbage get in the login
> >> service's hands and cause it to lock up, or ...?
> >Probably, smthg like that.
> >When we ran *cop Scanner "LSASS denial of service" test LSASS was
> crashing. There was
> >post-SP3 hot fix for that, but it didn't make it into SP4 by mistake.
> SP5 has it.

> >Boris

> I think Chad was referring to the CSRSS problem, both were very close
> together.  As I understood it, the crsss service would wait for an ack
> from it's response and would stop responding, they changed its
> prioritization to prevent occurance.

>  http://www.veryComputer.com/

> Microsoft Security Bulletin (MS99-021)

> Patch Available for "CSRSS Worker Thread Exhaustion" Vulnerability

> Originally Posted: June 23, 1999

> Summary
> Microsoft has released a patch that eliminates a vulnerability in the
> Microsoft? Windows NT? CSRSS process that could be used to create a
> denial of service condition against a machine that allows interactive
> logons.

> Frequently asked questions regarding this vulnerability can be found at
> http://www.veryComputer.com/

> Issue
> If all worker threads in CSRSS.EXE are occupied awaiting user input, no
> other requests can be serviced, effectively causing the server to hang.
> When user input is provided, processing returns to normal. The patch
> eliminates the vulnerability by ensuring that the last CSRSS worker
> thread services only requests that do not require user input.

> The LSA problem was a different issue of the LSA service failing when a
> malformed request was received, forceing a reboot.

> http://www.veryComputer.com/

> Microsoft Security Bulletin (MS99-020)

> Patch Available for "Malformed LSA Request" Vulnerability

> Originally Posted: June 23, 1999
> Revised: Ju1y 20, 1999

> Summary
> Microsoft has released a patch that eliminates a vulnerability that
> poses a denial of service threat to Microsoft? Windows NT? servers and
> workstations. A malformed request to the Local Security Authority (LSA)
> service will causes the service to stop responding, requiring the
> computer to be restarted.

> A fully supported patch is available to eliminate the vulnerability, and
> Microsoft recommends that affected customers download and install it, if
> appropriate.

> But I think this is the one Chad was referring to.  It fits your
> description better

 
 
 

SAMBA, just your average DoS utility

Post by Jeremy Allis » Sun, 31 Dec 1899 09:00:00



>I don't know if anyone caught the most recent NTBugTraq post about
>smbtorture.
>I'm no authority on this, but it appears that there is a "utility" in samba
>which will crash a Windows box. It uses its elevated privleges (becuase
>you usually set up samba as a server and a peer to another real NT box)
>to flood the NT box with RPC connections and eventually causing the
>SERVICES.EXE to give up.
>Again proving that one of the few things linux is good for is hax0rin..
>Even their applications that are supposed to bolster support and ease
>Linux integration into Windows shops are cracker utilities.

smbtorture is an SMB server tester utility. It was
designed internally by the Samba Team to test Samba
complience to the SMB spec and to bug-proof our own code
against buffer overruns such as the ones now being
reported in NT.

It is not mentioned in the Samba documentation, not built
by default and the Samba Team have never offered any
information as to its use. We made information on it
available to all other CIFS vendors who attended the
last CIFS conference, and many of them now test their
servers using it.

When this utility was tested against Windows NT, by the
Samba Team, *OVER ONE YEAR AGO*, the resulting problems
were reported *DIRECTLY* to Microsoft and no public announcements
have *ever* been made by us. We extend to other CIFS
vendors the same courtesy we would wish to be extended
to us. The Samba Team has a policy of full disclosure
of security and DOS bugs (witness our latest CERT
announcement) but we understand that other vendors do
not due to their longer development cycle times, and
respect their decisions.

Unfortunately it now seems that someone has discovered
this utility and is making publicity about it. Again,
we cannot blame the people involved for doing this,
they must make their own decisions.

We are not in the business of embarressing Microsoft, we
have enough of our own bugs to fix and be embarrassed
about.

Microsoft have ported smbtorture to Windows NT and
use it internally as a tester against Windows NT and
Win2000 systems.

Regards,

        Jeremy Allison,
        Samba Team.

 
 
 

SAMBA, just your average DoS utility

Post by Chad Mulliga » Sun, 31 Dec 1899 09:00:00


Quote:>No, I WASN'T referring to the CSRSS problem, there are two unrelated
issues.

>CSRSS is a local thing, this is a remote thing.

Unless the user logs in via IIS, RPC, Null Pipes, Telnet, RConsole etc.
then they become interactive.  IIRC this thing came out of a TSE
analysis and all their users are interactive.

>If anything, it was the LSASS DoS. But I think it's even newer than
that, as
>it was
>a new and recent posting to NTBugTraq.

>Chad








>> >> > There's LSASS vulnerability: LSASS crashes when a lot of garbage
is
>> written into IPC$
>> >> > pipe. NT itself doesn't BSOD, but nobody can logon to the
system.
>> >> > It was fixed in SP5.

>> >>    Serious question time (in two rival advocacy groups!  uh oh!):

>> >>    How does it do that?  Does the garbage get in the login
>> >> service's hands and cause it to lock up, or ...?
>> >Probably, smthg like that.
>> >When we ran *cop Scanner "LSASS denial of service" test LSASS
was
>> crashing. There was
>> >post-SP3 hot fix for that, but it didn't make it into SP4 by
mistake.
>> SP5 has it.

>> >Boris

>> I think Chad was referring to the CSRSS problem, both were very close
>> together.  As I understood it, the crsss service would wait for an
ack
>> from it's response and would stop responding, they changed its
>> prioritization to prevent occurance.

>>  http://www.veryComputer.com/

>> Microsoft Security Bulletin (MS99-021)

>> Patch Available for "CSRSS Worker Thread Exhaustion" Vulnerability

>> Originally Posted: June 23, 1999

>> Summary
>> Microsoft has released a patch that eliminates a vulnerability in the
>> Microsoft? Windows NT? CSRSS process that could be used to create a
>> denial of service condition against a machine that allows interactive
>> logons.

>> Frequently asked questions regarding this vulnerability can be found
at
>> http://www.veryComputer.com/

>> Issue
>> If all worker threads in CSRSS.EXE are occupied awaiting user input,
no
>> other requests can be serviced, effectively causing the server to
hang.
>> When user input is provided, processing returns to normal. The patch
>> eliminates the vulnerability by ensuring that the last CSRSS worker
>> thread services only requests that do not require user input.

>> The LSA problem was a different issue of the LSA service failing when
a
>> malformed request was received, forceing a reboot.

>> http://www.veryComputer.com/

>> Microsoft Security Bulletin (MS99-020)

>> Patch Available for "Malformed LSA Request" Vulnerability

>> Originally Posted: June 23, 1999
>> Revised: Ju1y 20, 1999

>> Summary
>> Microsoft has released a patch that eliminates a vulnerability that
>> poses a denial of service threat to Microsoft? Windows NT? servers
and
>> workstations. A malformed request to the Local Security Authority
(LSA)
>> service will causes the service to stop responding, requiring the
>> computer to be restarted.

>> A fully supported patch is available to eliminate the vulnerability,
and
>> Microsoft recommends that affected customers download and install it,
if
>> appropriate.

>> But I think this is the one Chad was referring to.  It fits your
>> description better

 
 
 

SAMBA, just your average DoS utility

Post by Chad Myer » Sun, 31 Dec 1899 09:00:00


Well, there you go.

I stand corrected.

However, it would've been better tact to call it
smbtester or something that implies your true intentions in the matter.

And if I were you, I would tout that as a feature that NT admins, Samba
admins, and other CIFS-type app admins can use to test their systems.

For that alone I would consider installing linux on a box lying around to
test
my NT boxes.

If I were you, I'd rename it and use it as a marketing tool!!

Obviously others have seen the usefulness including MS itself!

Chad



> >I don't know if anyone caught the most recent NTBugTraq post about
> >smbtorture.

> >I'm no authority on this, but it appears that there is a "utility" in
samba
> >which will crash a Windows box. It uses its elevated privleges (becuase
> >you usually set up samba as a server and a peer to another real NT box)
> >to flood the NT box with RPC connections and eventually causing the
> >SERVICES.EXE to give up.

> >Again proving that one of the few things linux is good for is hax0rin..

> >Even their applications that are supposed to bolster support and ease
> >Linux integration into Windows shops are cracker utilities.

> smbtorture is an SMB server tester utility. It was
> designed internally by the Samba Team to test Samba
> complience to the SMB spec and to bug-proof our own code
> against buffer overruns such as the ones now being
> reported in NT.

> It is not mentioned in the Samba documentation, not built
> by default and the Samba Team have never offered any
> information as to its use. We made information on it
> available to all other CIFS vendors who attended the
> last CIFS conference, and many of them now test their
> servers using it.

> When this utility was tested against Windows NT, by the
> Samba Team, *OVER ONE YEAR AGO*, the resulting problems
> were reported *DIRECTLY* to Microsoft and no public announcements
> have *ever* been made by us. We extend to other CIFS
> vendors the same courtesy we would wish to be extended
> to us. The Samba Team has a policy of full disclosure
> of security and DOS bugs (witness our latest CERT
> announcement) but we understand that other vendors do
> not due to their longer development cycle times, and
> respect their decisions.

> Unfortunately it now seems that someone has discovered
> this utility and is making publicity about it. Again,
> we cannot blame the people involved for doing this,
> they must make their own decisions.

> We are not in the business of embarressing Microsoft, we
> have enough of our own bugs to fix and be embarrassed
> about.

> Microsoft have ported smbtorture to Windows NT and
> use it internally as a tester against Windows NT and
> Win2000 systems.

> Regards,

> Jeremy Allison,
> Samba Team.

 
 
 

SAMBA, just your average DoS utility

Post by Anthony O » Sun, 31 Dec 1899 09:00:00



>Well, there you go.

>I stand corrected.

>However, it would've been better tact to call it
>smbtester or something that implies your true intentions in the matter.

Yes, "torture" tends to get Amnesty International upset (they write in to
complain about some of Gary Larson's cartoons). What it should have been called
was "smb_soft_cushion_and_comfy_chair".

Quote:>And if I were you, I would tout that as a feature that NT admins, Samba
>admins, and other CIFS-type app admins can use to test their systems.

>For that alone I would consider installing linux on a box lying around to
>test
>my NT boxes.

The source is available. If the Samba Team have been as careful about
portability as they usually are, it shouldn't be hard to compile for NT. Just be
careful of people calling you a cracker.

Quote:>If I were you, I'd rename it and use it as a marketing tool!!

>Obviously others have seen the usefulness including MS itself!

>Chad

Regards

Anthony
<snip>
--
-----------------------------------------
| And when our worlds                   |
| They fall apart                       |
| When the walls come tumbling in       |
| Though we may deserve it              |
| It will be worth it  - Depeche Mode   |
-----------------------------------------

 
 
 

SAMBA, just your average DoS utility

Post by Volker Dittma » Sun, 31 Dec 1899 09:00:00



> I don't know if anyone caught the most recent NTBugTraq post about
> smbtorture.

> I'm no authority on this, but it appears that there is a "utility" in samba
> which will crash a Windows box. It uses its elevated privleges (becuase
> you usually set up samba as a server and a peer to another real NT box)
> to flood the NT box with RPC connections and eventually causing the
> SERVICES.EXE to give up.

> Again proving that one of the few things linux is good for is hax0rin..

You didn't know what smbtorture was for, did you?

That little utility is a test program to test the stability and conformance
of Samba. Nothing more. It isn't the fault of the Samba team when it
crashes NT, and it even wasn't made for this purpose. If NT crashes
when confronted with such a test tool, this is M$ fault (and M$ has
already corrected this misbehaviour of NT).

All that this program shows is: Samba is as stable as NT, and sometimes,
it is even more stable.

We already knew that the RPC for NT is full of problems, though these
get fixed (rather slowly). There are quite a few exploits out there for this
flaky implementation, though less and less of them work with every new
hotfix or Service Pack. Without these tools, maybe they wouldn't get fixed
until someone breaks into www.microsoft.com.

There are other tools of this kind to test TCP/IP stability. You could use
them for testing purpose to detect vulnerabilities before you activate a
server or to check if your firewall has been set up right. And well, like
a knife they could be used for good and bad actions.

No reason to whine about this.

Quote:> Even their applications that are supposed to bolster support and ease
> Linux integration into Windows shops are cracker utilities.

Well, and all knives are made *ONLY* for killing people. Bad knives,
we should complain about them a lot.

I'm responsible for network security, and sometimes, I use hacker tools
to verify that my machines can handle these sort of attacks. Guess what?
I'm glad they exist.

The are a few reasons why most of this tools exist for Linux are: it
has an open network model with sources, so this kind of low-level tools
are much easier to write. And these tools have a long history in UNIX, so
it is easy to port them.

With NT, it isn't impossible, but much harder to write programs like netcat.

Ciao,
Volker

 
 
 

1. average load average?

Hello,

I'm trying to monitor the usage of a machine.  I know about process
accounting, which (as far as I understand) gives feedback about
per-user and per-processname usage.  Can I get a feeling for "how
busy" the machine is from process accounting, or do I need to do this
some other way?

Naively, I would like to know things like the load average over time,
iowait statistics, and that sort of thing, but I am also looking for
suggestions on how to monitor this sort of thing on a longer
timescale.  Any suggestions on either of these (admittedly ill
thought-out) questions?

        Peter

2. pppd option not recognizable

3. System Load average: How much load average is good for?

4. >>> Bush vs Kerry, the winner is Sharon

5. Samba w/ DOS box - what does DOS need?

6. socket programming, listen on more than one port at a time

7. Dos/Win(vfat) file to Linux file (ext2) conversion utility

8. cachfs and autofs

9. Unix to Dos Conversion utility?

10. solaris 2.6 and "samba"-like utility

11. Looking for gzip DOS/Unix compression utility(s)?

12. Any GNU tar utility for DOS that can archive to floppy disk?

13. tar utility compatible between Dos/Win95 and SUN