青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

posts - 94, comments - 250, trackbacks - 0, articles - 0
  C++博客 :: 首頁 :: 新隨筆 :: 聯系 :: 聚合  :: 管理

[Ph4nt0m] [zz]The Emergence Of A Theme

Posted on 2008-08-29 10:17 Condor 閱讀(7793) 評論(2)  編輯 收藏 引用

 

I'm not sure what it is, but there continues to be some sort of "competition" for "who can find the biggest bug" -- as if attackers had to choose, and more importantly, as if any bug was so big that it could not be made even better by combined use with its "competition".  Before my DNS talk, my old friend FX from Recurity Labs was comparing DNS issues to the Debian Non-Random Number Generator issue that caused all sorts of SSL certificates to offer no security value, and the SNMPv3 flaws that allowed infrastructure devices to be remotely administered by people who happened not to know the password.

Of course, after the talk, it became clear that the DNS hack and the Debian NRNG combined rather destructively -- DNS allowed you to finally play MITM with all the SSL private keys you could trivially compute, and as Ben Laurie found, this included the keys for Sun's OpenID authentication provider.  And, since the DNS hack turns Java back into a universal UDP and TCP gateway, we end up being able to log into SNMPv3 devices that would otherwise be protected behind firewalls.

So there's no sense making a competition out of it.  There's just an ever growing toolchest, growing from a single emerging theme:

Weaknesses in authentication and encryption, some which have been known to at least some degree for quite some time and many of which are sourced in the core design of the system, continue to pose a threat to the Internet infrastructure at large, both by corrupting routing, and making those corrupted routes problematic.

Back in July, the genuinely brilliant Halvar Flake posted the following regarding the entire DNS issue:

"I fail to understand the seriousness with which this bug is handled though. Anybody who uses the Internet has to assume that his gateway is owned."

And thus, why 75% of my Black Hat talk was on the real-world effectiveness of Man-In-The-Middle attacks: Most people aren't as smart as Halvar.  I'm certainly not :)  Almost nobody assumes that their gateway is owned -- and even those that do, and try to engineer around it, deploy ineffective protections that are only "secure unless there's an attacker".

I say this is a theme, because it is the unifying element between some of the year's most high profile flaws.  There are two subclasses -- some involve weak authentication migrating traffic from one location to another, while others involve weak authentication allowing an attacker to read or modify traffic migrated to him -- but you'd have to have some pretty serious blinders to not see the unifying theme of weak authentication leads to pwnage.

Consider:

Luciano Bello's Debian NRNG: This involves a core design requiring the generation of random numbers, but the random number generator required a random seed, but alas, the seed was made insufficiently random.  It's an implementation flaw, but barely -- and the effect was catastrophic failure against members of the X.509 PKI authentication system that had used the Debian NRNG, and thus by extension SSL's encryption logic and OpenID (for Sun's) authentication gateway.

Wes Hardakar's SNMPv3 Bug: Here, we have an authentication protocol that allows an attacker to declare how many bytes he wants to have to correctly provide.  Now, the attacker can claim "just 1 please" -- and he gets into any router suffering this bug within seconds.  That, by extension, allows control over all traffic traversing that router.

Mike Zusman's Insecure SSL-VPN's: SSL is supposed to protect us, but there's no sense creating a secure session to someone if you don't actually know who they are.  Don't worry though, by design anything that isn't a web browser is terrifyingly likely to only to skip authentication entirely and just create an encrypted link to whoever's responding.  One would think that SSL-VPN's, whose sole purpose is to prevent attackers from accessing network traffic, would be immune.  But with 42% of certificates on the Internet being self-signed, and a lot of them being for SSL-VPN's, one would be wrong.  By extension this auth failure exposes all traffic routed over these SSL-VPN's.

Mike Perry's Insecure Cookies: This gets interesting.  Here we have two different authentication protocols in place -- one, from server to client, based on X.509.  The other, from client to server, based on a plaintext password (delivered, at least, over an encrypted session authenticated by the server-to-client cert).  But to prevent the user from needing to repeatedly type in their plaintext password, a password-equivalent token (or cookie) is handed to the user's browser, which will be attached to every request within the securely encrypted channel.  Unfortunately, it'll also be attached to every request which does not traverse the securely encrypted channel, because the cookies aren't marked for secure-only.  Once the cookie leaks, of course, it'll authenticate a bad guy who creates an encrypted session to that server.  So by extension bad guys get to play in any number of interesting sites.

My DNS flaw: Here we have a protocol that directly controls routing decisions, ultimately designed to authenticate its messages via a random number between 0 and 65535.  Guess the number, and change routing.  This was supposed to be OK, because you could only guess a certain number of times per day.  There was even an RFC entirely based around this time limit.  It turns out there's a good dozen ways around that limit, allowing anonymous and even almost 100% packet spoofed compromise of routing decisions.  This, by extension, allowed exploitation of all traffic that was weakly authenticating.

It's the same story, again and again.  And now, everyone talking about BGP.  So lets do the same sort of analysis on BGP:

Kapela and Pilosov's BGP flaw: In BGP, only the nearest neighbor is authenticated.  The concept is that all "members of the club" authenticate all other members, while the actual data they provide and distribute is trusted.  If it's not actually trusted, anyone can hijack traffic from anyone else's routes.

Pilosov's done some cool work here.  It's not the sort of devastating surprise some people seem to want it to be.  Indeed, that's what makes it so interesting.  BGP was actually supposed to be broken, in this precise manner. Literally, in every day use, any BGP administrator has always had the ability to hijack anyone else's traffic.  Pilosov has a new, even beautiful MITM attack, but as mine was not the first DNS attack, his is not the first BGP MITM.  Tales of using BGP to force traffic through a compromised router (possibly compromised through SNMPv3) are legion, and Javascript and the browser DOM blur things pretty fiercely in terms of the relevance of being able to pass through to the legitimate endpoint anyway.

That's not to take away from the work.  It's an interesting trick.  But we need to level set here:

First, if you're not part of the BGP club, you're just not running this attack.  Pakistan took out YouTube with BGP -- but some random kid with the ability to spoof IP packets couldn't.  In other words, we're just not going to see a Metasploit module anyone can run to complete these sorts of attacks.  Now, there are some entertaining combinatorics that could be played -- DNS to enable Java's SNMPv3 access to internal routers at an ISP, and then from that internal router running the sort of BGP tricks Pilosov's talking about.  This goes back to the utter folly of trying to rank these bugs independently from one another.  But these sort of combinatorics are at a fundamentally different level than the fire-and-forget antics that DNS allowed, and on a fundamental level, the number of potential attackers (and the number of involved defenders) on BGP is a lot lower.

Second, we have far better logging -- and thus accountability -- in the BGP realm than we do perhaps for any other protocol on the Internet.  Consider the archives at APNIC -- yes, that's route history going back to 1999 -- and Renesys has even more.  That sort of forensic data is unimaginable for anything else, least of all DNS.  BGP may have its fair share of bad actors -- consider spammers who advertise temporary ranges in unused space for mail delivery purposes, thus getting around blackholes -- but any of the really nasty stuff leaves a paper trail unmatched by any other attack.

Third, BGP is something of a sledgehammer.  Yes, you're grabbing traffic -- but your control over exactly what traffic you grab is fairly limited.  Contrast that with DNS, which allows astonishingly fine grained targeting over exactly what you grab -- indeed, you don't even need to know in advance what traffic you want.  The victim network will simply offer you interesting names, and you get to choose on the fly which ones you'll take.  These names may even be internal names, offering the impossible-with-BGP attack of hijacking traffic between two hosts on the exact same network segment.

Finally, BGP suffers some limitations in visibility.  Simply grabbing traffic is nice, but bidirectional flows are better than unidirectional flows, and when you pull something off via DNS, you're pretty much guaranteed to grab all the traffic from that TCP session even if you stop any further poisoning attempts.  Contrast that with BGP, which operates at Layer 3 and thus may cause the IP packets to reroute at any point when the TCP socket is still active.

So, does that mean its always better to attack DNS than BGP?  Oh, you competitive people would like things to be so simple, wouldn't you :)Pilosov and I talked for about a half hour at Defcon, and I've got nothing but respect for his work.  Lets look at the other side of things for a moment.   First, BGP controls how you route to your name server -- if not your recursive server, which may be inside your organization and thus immune to ext


只有注冊用戶登錄后才能發表評論。
網站導航: 博客園   IT新聞   BlogJava   博問   Chat2DB   管理


青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            亚洲视频在线免费观看| 欧美极品影院| 亚洲国产精品999| 亚洲成色777777在线观看影院| 亚洲精品一区中文| 欧美影视一区| 久久九九精品| 亚洲国产精品久久久久婷婷老年 | 国产精品视频一区二区三区| 久久成人精品无人区| 久久夜色精品国产| 在线亚洲成人| 欧美一二三区在线观看| 亚洲国产精品传媒在线观看 | 亚洲无线视频| 欧美一区视频在线| 亚洲日本欧美| 亚洲一区二区久久| 在线电影一区| 亚洲美女少妇无套啪啪呻吟| 国产日韩成人精品| 欧美激情一区| 国产精品色婷婷| 欧美xxxx在线观看| 欧美日韩视频在线第一区| 久久精品卡一| 欧美精品自拍| 久久久精品动漫| 欧美精品在线网站| 久久午夜羞羞影院免费观看| 欧美精品色综合| 久久久久久亚洲精品中文字幕| 欧美激情第1页| 久久精品国产亚洲高清剧情介绍 | 欧美日韩成人在线视频| 久久精品网址| 欧美日韩性生活视频| 久久在线免费视频| 欧美理论电影在线播放| 久久久久久久综合色一本| 欧美日韩国产999| 久久亚洲欧美| 国产精品高潮视频| 欧美激情性爽国产精品17p| 国产精品一区二区在线观看不卡| 亚洲国产精品久久91精品| 国产欧美日韩综合| 日韩手机在线导航| 亚洲第一色在线| 午夜电影亚洲| 亚洲特级片在线| 美国成人毛片| 免费成人你懂的| 一区二区三区四区五区精品| 久久天堂成人| 久久精品日产第一区二区| 欧美巨乳波霸| 欧美不卡三区| 国产亚洲一区二区精品| 一区电影在线观看| 亚洲美女在线国产| 久久嫩草精品久久久久| 午夜精品视频在线观看| 欧美日本国产视频| 欧美成人有码| 韩国v欧美v日本v亚洲v| 亚洲一区二区三区在线观看视频| 亚洲精品午夜精品| 久久国产精品一区二区| 香蕉尹人综合在线观看| 欧美日韩一区二区三区高清| 亚洲国产精品va在看黑人| 一区二区三区在线免费播放| 午夜精品美女自拍福到在线 | 日韩视频在线观看国产| 久久一区欧美| 麻豆freexxxx性91精品| 国产日韩精品一区| 亚洲一区激情| 亚洲你懂的在线视频| 欧美日韩精品久久| 亚洲全部视频| 亚洲美洲欧洲综合国产一区| 裸体一区二区三区| 欧美插天视频在线播放| 激情久久中文字幕| 久久精品91| 久久久噜噜噜久久| 国产综合一区二区| 欧美亚洲在线视频| 久久精品视频免费播放| 国产欧美精品一区二区色综合 | 亚洲欧洲av一区二区| 欧美深夜影院| 一级日韩一区在线观看| 亚洲午夜黄色| 国产精品成av人在线视午夜片| 一区二区免费看| 亚洲综合欧美| 国产精品久久久久久模特| 亚洲精品一区二区三区不| 99精品国产在热久久婷婷| 欧美福利影院| 亚洲国产一区二区三区高清| 亚洲理论在线| 欧美日韩小视频| 亚洲色无码播放| 亚洲永久免费观看| 国产精品毛片a∨一区二区三区| 亚洲一区免费观看| 久久精品视频免费| 久久久久久尹人网香蕉| 激情丁香综合| 欧美成人三级在线| 亚洲美女精品久久| 亚洲影院免费| 国产免费观看久久| 欧美一区在线视频| 免费在线成人av| 亚洲三级网站| 欧美三区在线| 亚洲欧美日韩一区| 久久综合久久久| 亚洲日本欧美日韩高观看| 欧美日韩免费高清| 亚洲无限乱码一二三四麻| 久久国产福利| 亚洲电影观看| 欧美日韩成人一区二区| 亚洲视频一区二区在线观看| 亚洲欧洲av一区二区三区久久| 国产婷婷成人久久av免费高清 | 国产精品永久免费在线| 久久成年人视频| 亚洲成色www久久网站| 亚洲一区二区免费| 国产一区二区三区久久悠悠色av| 久久网站免费| 日韩一区二区福利| 欧美中文在线观看国产| 在线免费一区三区| 欧美精选在线| 亚洲一区二区三区三| 美女网站在线免费欧美精品| 99精品国产高清一区二区| 国产精品无码永久免费888| 久久久久**毛片大全| 亚洲久久一区二区| 久久精品盗摄| 日韩午夜电影| 国产一区二区精品久久91| 免费欧美日韩国产三级电影| 在线视频一区观看| 猫咪成人在线观看| 亚洲无人区一区| 在线观看日韩| 欧美日韩综合久久| 久久精品国语| 99视频一区二区三区| 久久亚洲欧美| 亚洲一区免费网站| 在线观看国产成人av片| 欧美日韩亚洲综合| 久久黄色影院| 亚洲片在线资源| 久久激情综合网| 一本到高清视频免费精品| 国产亚洲精品aa午夜观看| 欧美日本不卡高清| 久久精品国产一区二区电影| 99精品国产在热久久| 免费看av成人| 欧美一级黄色录像| 日韩一区二区精品葵司在线| 国产一区二区三区高清在线观看| 开元免费观看欧美电视剧网站| 国产午夜精品一区二区三区欧美 | 欧美777四色影视在线| 亚洲免费在线精品一区| 揄拍成人国产精品视频| 国产精品久久久久久久久久久久久 | 亚洲女同同性videoxma| 亚洲第一二三四五区| 久久成人免费电影| 亚洲视频网在线直播| 亚洲国产清纯| 国产亚洲福利社区一区| 国产精品国产三级国产专区53 | 毛片基地黄久久久久久天堂| 亚洲欧美日韩国产中文| 日韩视频在线观看| 亚洲高清视频的网址| 国产精品久久久久免费a∨| 欧美阿v一级看视频| 久久九九国产精品| 欧美亚洲三区| 亚洲专区在线| 日韩图片一区| 亚洲激情影院| 亚洲成人在线网|