青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

posts - 94, comments - 250, trackbacks - 0, articles - 0
  C++博客 :: 首頁 :: 新隨筆 :: 聯系 :: 聚合  :: 管理

[Ph4nt0m] [zz]The Emergence Of A Theme

Posted on 2008-08-29 10:17 Condor 閱讀(7072) 評論(2)  編輯 收藏 引用

 

I'm not sure what it is, but there continues to be some sort of "competition" for "who can find the biggest bug" -- as if attackers had to choose, and more importantly, as if any bug was so big that it could not be made even better by combined use with its "competition".  Before my DNS talk, my old friend FX from Recurity Labs was comparing DNS issues to the Debian Non-Random Number Generator issue that caused all sorts of SSL certificates to offer no security value, and the SNMPv3 flaws that allowed infrastructure devices to be remotely administered by people who happened not to know the password.

Of course, after the talk, it became clear that the DNS hack and the Debian NRNG combined rather destructively -- DNS allowed you to finally play MITM with all the SSL private keys you could trivially compute, and as Ben Laurie found, this included the keys for Sun's OpenID authentication provider.  And, since the DNS hack turns Java back into a universal UDP and TCP gateway, we end up being able to log into SNMPv3 devices that would otherwise be protected behind firewalls.

So there's no sense making a competition out of it.  There's just an ever growing toolchest, growing from a single emerging theme:

Weaknesses in authentication and encryption, some which have been known to at least some degree for quite some time and many of which are sourced in the core design of the system, continue to pose a threat to the Internet infrastructure at large, both by corrupting routing, and making those corrupted routes problematic.

Back in July, the genuinely brilliant Halvar Flake posted the following regarding the entire DNS issue:

"I fail to understand the seriousness with which this bug is handled though. Anybody who uses the Internet has to assume that his gateway is owned."

And thus, why 75% of my Black Hat talk was on the real-world effectiveness of Man-In-The-Middle attacks: Most people aren't as smart as Halvar.  I'm certainly not :)  Almost nobody assumes that their gateway is owned -- and even those that do, and try to engineer around it, deploy ineffective protections that are only "secure unless there's an attacker".

I say this is a theme, because it is the unifying element between some of the year's most high profile flaws.  There are two subclasses -- some involve weak authentication migrating traffic from one location to another, while others involve weak authentication allowing an attacker to read or modify traffic migrated to him -- but you'd have to have some pretty serious blinders to not see the unifying theme of weak authentication leads to pwnage.

Consider:

Luciano Bello's Debian NRNG: This involves a core design requiring the generation of random numbers, but the random number generator required a random seed, but alas, the seed was made insufficiently random.  It's an implementation flaw, but barely -- and the effect was catastrophic failure against members of the X.509 PKI authentication system that had used the Debian NRNG, and thus by extension SSL's encryption logic and OpenID (for Sun's) authentication gateway.

Wes Hardakar's SNMPv3 Bug: Here, we have an authentication protocol that allows an attacker to declare how many bytes he wants to have to correctly provide.  Now, the attacker can claim "just 1 please" -- and he gets into any router suffering this bug within seconds.  That, by extension, allows control over all traffic traversing that router.

Mike Zusman's Insecure SSL-VPN's: SSL is supposed to protect us, but there's no sense creating a secure session to someone if you don't actually know who they are.  Don't worry though, by design anything that isn't a web browser is terrifyingly likely to only to skip authentication entirely and just create an encrypted link to whoever's responding.  One would think that SSL-VPN's, whose sole purpose is to prevent attackers from accessing network traffic, would be immune.  But with 42% of certificates on the Internet being self-signed, and a lot of them being for SSL-VPN's, one would be wrong.  By extension this auth failure exposes all traffic routed over these SSL-VPN's.

Mike Perry's Insecure Cookies: This gets interesting.  Here we have two different authentication protocols in place -- one, from server to client, based on X.509.  The other, from client to server, based on a plaintext password (delivered, at least, over an encrypted session authenticated by the server-to-client cert).  But to prevent the user from needing to repeatedly type in their plaintext password, a password-equivalent token (or cookie) is handed to the user's browser, which will be attached to every request within the securely encrypted channel.  Unfortunately, it'll also be attached to every request which does not traverse the securely encrypted channel, because the cookies aren't marked for secure-only.  Once the cookie leaks, of course, it'll authenticate a bad guy who creates an encrypted session to that server.  So by extension bad guys get to play in any number of interesting sites.

My DNS flaw: Here we have a protocol that directly controls routing decisions, ultimately designed to authenticate its messages via a random number between 0 and 65535.  Guess the number, and change routing.  This was supposed to be OK, because you could only guess a certain number of times per day.  There was even an RFC entirely based around this time limit.  It turns out there's a good dozen ways around that limit, allowing anonymous and even almost 100% packet spoofed compromise of routing decisions.  This, by extension, allowed exploitation of all traffic that was weakly authenticating.

It's the same story, again and again.  And now, everyone talking about BGP.  So lets do the same sort of analysis on BGP:

Kapela and Pilosov's BGP flaw: In BGP, only the nearest neighbor is authenticated.  The concept is that all "members of the club" authenticate all other members, while the actual data they provide and distribute is trusted.  If it's not actually trusted, anyone can hijack traffic from anyone else's routes.

Pilosov's done some cool work here.  It's not the sort of devastating surprise some people seem to want it to be.  Indeed, that's what makes it so interesting.  BGP was actually supposed to be broken, in this precise manner. Literally, in every day use, any BGP administrator has always had the ability to hijack anyone else's traffic.  Pilosov has a new, even beautiful MITM attack, but as mine was not the first DNS attack, his is not the first BGP MITM.  Tales of using BGP to force traffic through a compromised router (possibly compromised through SNMPv3) are legion, and Javascript and the browser DOM blur things pretty fiercely in terms of the relevance of being able to pass through to the legitimate endpoint anyway.

That's not to take away from the work.  It's an interesting trick.  But we need to level set here:

First, if you're not part of the BGP club, you're just not running this attack.  Pakistan took out YouTube with BGP -- but some random kid with the ability to spoof IP packets couldn't.  In other words, we're just not going to see a Metasploit module anyone can run to complete these sorts of attacks.  Now, there are some entertaining combinatorics that could be played -- DNS to enable Java's SNMPv3 access to internal routers at an ISP, and then from that internal router running the sort of BGP tricks Pilosov's talking about.  This goes back to the utter folly of trying to rank these bugs independently from one another.  But these sort of combinatorics are at a fundamentally different level than the fire-and-forget antics that DNS allowed, and on a fundamental level, the number of potential attackers (and the number of involved defenders) on BGP is a lot lower.

Second, we have far better logging -- and thus accountability -- in the BGP realm than we do perhaps for any other protocol on the Internet.  Consider the archives at APNIC -- yes, that's route history going back to 1999 -- and Renesys has even more.  That sort of forensic data is unimaginable for anything else, least of all DNS.  BGP may have its fair share of bad actors -- consider spammers who advertise temporary ranges in unused space for mail delivery purposes, thus getting around blackholes -- but any of the really nasty stuff leaves a paper trail unmatched by any other attack.

Third, BGP is something of a sledgehammer.  Yes, you're grabbing traffic -- but your control over exactly what traffic you grab is fairly limited.  Contrast that with DNS, which allows astonishingly fine grained targeting over exactly what you grab -- indeed, you don't even need to know in advance what traffic you want.  The victim network will simply offer you interesting names, and you get to choose on the fly which ones you'll take.  These names may even be internal names, offering the impossible-with-BGP attack of hijacking traffic between two hosts on the exact same network segment.

Finally, BGP suffers some limitations in visibility.  Simply grabbing traffic is nice, but bidirectional flows are better than unidirectional flows, and when you pull something off via DNS, you're pretty much guaranteed to grab all the traffic from that TCP session even if you stop any further poisoning attempts.  Contrast that with BGP, which operates at Layer 3 and thus may cause the IP packets to reroute at any point when the TCP socket is still active.

So, does that mean its always better to attack DNS than BGP?  Oh, you competitive people would like things to be so simple, wouldn't you :)Pilosov and I talked for about a half hour at Defcon, and I've got nothing but respect for his work.  Lets look at the other side of things for a moment.   First, BGP controls how you route to your name server -- if not your recursive server, which may be inside your organization and thus immune to ext

青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            亚洲欧洲另类| 一区二区日本视频| 欧美国内亚洲| 美女福利精品视频| 欧美日韩免费高清| 国产精品青草综合久久久久99 | 久久一区二区三区四区五区| 欧美一区免费视频| 久久精品国产精品亚洲| 久久综合伊人77777| 欧美激情第10页| 99在线|亚洲一区二区| 欧美一区二区三区四区夜夜大片| 久久精品国产精品| 欧美美女福利视频| 狠狠干综合网| 一区二区三区日韩精品| 久久精品成人一区二区三区蜜臀 | 亚洲九九九在线观看| 亚洲在线免费观看| 欧美~级网站不卡| 国产精品丝袜久久久久久app| 国内精品视频久久| 亚洲性夜色噜噜噜7777| 麻豆91精品| 亚洲综合色自拍一区| 男人的天堂亚洲在线| 国产精品亚洲成人| 日韩午夜电影av| 久久亚洲影音av资源网| 一本久久综合亚洲鲁鲁| 久久久人成影片一区二区三区| 欧美三区在线视频| 亚洲国产精品一区二区第一页| 亚洲欧美在线观看| 亚洲精品一区中文| 免费短视频成人日韩| 狠狠干综合网| 久久精品盗摄| 亚洲一区久久| 老巨人导航500精品| 欧美亚州在线观看| 亚洲成色精品| 久久精品国产亚洲aⅴ| 一区二区三区国产在线| 欧美—级在线免费片| 在线观看一区二区精品视频| 久久国产成人| 欧美亚洲尤物久久| 国产伦精品一区二区三区高清版| 亚洲视频电影图片偷拍一区| 欧美激情视频在线播放| 久久亚洲国产精品一区二区| 国产亚洲精品bv在线观看| 亚洲欧美春色| 亚洲一区二区三区中文字幕| 欧美午夜欧美| 亚洲嫩草精品久久| 亚洲一区免费在线观看| 欧美午夜免费电影| 亚洲欧美日韩国产中文在线| 在线性视频日韩欧美| 国产精品久久久久77777| 一区二区三区四区国产| 亚洲精品一区二区三区99| 欧美激情视频一区二区三区免费| 亚洲黄色尤物视频| 亚洲精品国产品国语在线app| 久久在线视频| 日韩一级欧洲| 日韩视频在线观看国产| 欧美午夜片在线观看| 午夜精品久久久久久久99黑人| 99视频在线观看一区三区| 欧美日韩性生活视频| 午夜在线一区二区| 亚洲欧美日韩一区二区| 国产综合网站| 亚洲国产1区| 欧美日韩亚洲综合一区| 亚洲免费一在线| 欧美亚洲综合网| 亚洲高清免费视频| 99视频热这里只有精品免费| 国产精品亚发布| 欧美高清不卡在线| 国产精品盗摄久久久| 久久精品最新地址| 牛人盗摄一区二区三区视频| 亚洲亚洲精品三区日韩精品在线视频 | 亚洲精品久久久久久下一站| 欧美视频免费在线| 久久久久亚洲综合| 欧美剧在线免费观看网站| 香蕉乱码成人久久天堂爱免费| 久久九九免费| 99精品免费视频| 久久av二区| 亚洲视频在线观看网站| 亚洲一二三区在线| 久久久久久精| 欧美日韩精品免费| 久久综合给合久久狠狠色 | 欧美一区二区三区播放老司机| 久久久久国产免费免费| 在线亚洲精品| 久久综合综合久久综合| 欧美一区二区三区视频在线观看| 蜜桃精品久久久久久久免费影院| 中文精品视频| 欧美国产日韩亚洲一区| 久久av二区| 国产精品porn| 欧美激情精品久久久久久黑人| 国产精品久久综合| 亚洲精品午夜| 亚洲伦理在线| 久久综合精品国产一区二区三区| 亚洲欧美怡红院| 欧美色视频日本高清在线观看| 欧美国产视频日韩| 在线观看精品| 久久国产精品亚洲va麻豆| 亚洲欧美精品| 国产精品v欧美精品∨日韩| 亚洲欧洲综合另类| 雨宫琴音一区二区在线| 久久国产精品久久久| 久久精品成人| 国产精品爽黄69| 亚洲性线免费观看视频成熟| 亚洲精品九九| 欧美精品久久天天躁 | 欧美伊久线香蕉线新在线| 亚洲视频二区| 欧美日韩在线高清| 夜色激情一区二区| 亚洲一区二区三区在线看| 欧美日韩中文字幕在线| 日韩网站在线看片你懂的| 一区二区欧美亚洲| 国产精品久久9| 午夜精品一区二区三区电影天堂| 性做久久久久久久免费看| 国产九色精品成人porny| 午夜电影亚洲| 久久婷婷国产麻豆91天堂| 在线看无码的免费网站| 牛牛国产精品| 99re66热这里只有精品3直播| avtt综合网| 国产精品乱码妇女bbbb| 亚洲男人影院| 蜜桃久久av一区| 亚洲精品影院在线观看| 欧美视频在线观看视频极品| 亚洲一区日韩在线| 久久久99久久精品女同性| 伊人久久大香线| 欧美日韩不卡视频| 亚洲欧美日韩电影| 欧美国产激情| 亚洲欧美视频一区| 久久激情视频久久| 免费成人黄色| 99精品久久久| 欧美日韩另类字幕中文| 亚洲精品在线免费观看视频| 9久草视频在线视频精品| 欧美午夜不卡视频| 亚欧成人精品| 免费人成精品欧美精品| 91久久综合| 欧美性一区二区| 久久riav二区三区| 亚洲欧洲精品一区| 欧美一区国产一区| 亚洲国产片色| 国产精品毛片高清在线完整版| 欧美一区二区三区四区在线观看地址 | 欧美色视频一区| 久久久久.com| 亚洲视频专区在线| 亚洲国产精品精华液2区45| 午夜精品影院| 99精品欧美一区二区蜜桃免费| 国产亚洲欧美日韩精品| 欧美日韩国产大片| 久久五月婷婷丁香社区| 亚洲影音先锋| 亚洲欧洲精品一区二区三区不卡 | 亚洲高清一区二| 国产欧美一区二区精品婷婷| 欧美黑人国产人伦爽爽爽| 欧美在线看片a免费观看| 夜夜精品视频| 亚洲国产欧美一区| 免费成人毛片| 欧美自拍偷拍午夜视频| 亚洲永久网站|