青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

posts - 94, comments - 250, trackbacks - 0, articles - 0
  C++博客 :: 首頁 :: 新隨筆 :: 聯(lián)系 :: 聚合  :: 管理

[Ph4nt0m] [zz]The Emergence Of A Theme

Posted on 2008-08-29 10:17 Condor 閱讀(7557) 評論(2)  編輯 收藏 引用

 

I'm not sure what it is, but there continues to be some sort of "competition" for "who can find the biggest bug" -- as if attackers had to choose, and more importantly, as if any bug was so big that it could not be made even better by combined use with its "competition".  Before my DNS talk, my old friend FX from Recurity Labs was comparing DNS issues to the Debian Non-Random Number Generator issue that caused all sorts of SSL certificates to offer no security value, and the SNMPv3 flaws that allowed infrastructure devices to be remotely administered by people who happened not to know the password.

Of course, after the talk, it became clear that the DNS hack and the Debian NRNG combined rather destructively -- DNS allowed you to finally play MITM with all the SSL private keys you could trivially compute, and as Ben Laurie found, this included the keys for Sun's OpenID authentication provider.  And, since the DNS hack turns Java back into a universal UDP and TCP gateway, we end up being able to log into SNMPv3 devices that would otherwise be protected behind firewalls.

So there's no sense making a competition out of it.  There's just an ever growing toolchest, growing from a single emerging theme:

Weaknesses in authentication and encryption, some which have been known to at least some degree for quite some time and many of which are sourced in the core design of the system, continue to pose a threat to the Internet infrastructure at large, both by corrupting routing, and making those corrupted routes problematic.

Back in July, the genuinely brilliant Halvar Flake posted the following regarding the entire DNS issue:

"I fail to understand the seriousness with which this bug is handled though. Anybody who uses the Internet has to assume that his gateway is owned."

And thus, why 75% of my Black Hat talk was on the real-world effectiveness of Man-In-The-Middle attacks: Most people aren't as smart as Halvar.  I'm certainly not :)  Almost nobody assumes that their gateway is owned -- and even those that do, and try to engineer around it, deploy ineffective protections that are only "secure unless there's an attacker".

I say this is a theme, because it is the unifying element between some of the year's most high profile flaws.  There are two subclasses -- some involve weak authentication migrating traffic from one location to another, while others involve weak authentication allowing an attacker to read or modify traffic migrated to him -- but you'd have to have some pretty serious blinders to not see the unifying theme of weak authentication leads to pwnage.

Consider:

Luciano Bello's Debian NRNG: This involves a core design requiring the generation of random numbers, but the random number generator required a random seed, but alas, the seed was made insufficiently random.  It's an implementation flaw, but barely -- and the effect was catastrophic failure against members of the X.509 PKI authentication system that had used the Debian NRNG, and thus by extension SSL's encryption logic and OpenID (for Sun's) authentication gateway.

Wes Hardakar's SNMPv3 Bug: Here, we have an authentication protocol that allows an attacker to declare how many bytes he wants to have to correctly provide.  Now, the attacker can claim "just 1 please" -- and he gets into any router suffering this bug within seconds.  That, by extension, allows control over all traffic traversing that router.

Mike Zusman's Insecure SSL-VPN's: SSL is supposed to protect us, but there's no sense creating a secure session to someone if you don't actually know who they are.  Don't worry though, by design anything that isn't a web browser is terrifyingly likely to only to skip authentication entirely and just create an encrypted link to whoever's responding.  One would think that SSL-VPN's, whose sole purpose is to prevent attackers from accessing network traffic, would be immune.  But with 42% of certificates on the Internet being self-signed, and a lot of them being for SSL-VPN's, one would be wrong.  By extension this auth failure exposes all traffic routed over these SSL-VPN's.

Mike Perry's Insecure Cookies: This gets interesting.  Here we have two different authentication protocols in place -- one, from server to client, based on X.509.  The other, from client to server, based on a plaintext password (delivered, at least, over an encrypted session authenticated by the server-to-client cert).  But to prevent the user from needing to repeatedly type in their plaintext password, a password-equivalent token (or cookie) is handed to the user's browser, which will be attached to every request within the securely encrypted channel.  Unfortunately, it'll also be attached to every request which does not traverse the securely encrypted channel, because the cookies aren't marked for secure-only.  Once the cookie leaks, of course, it'll authenticate a bad guy who creates an encrypted session to that server.  So by extension bad guys get to play in any number of interesting sites.

My DNS flaw: Here we have a protocol that directly controls routing decisions, ultimately designed to authenticate its messages via a random number between 0 and 65535.  Guess the number, and change routing.  This was supposed to be OK, because you could only guess a certain number of times per day.  There was even an RFC entirely based around this time limit.  It turns out there's a good dozen ways around that limit, allowing anonymous and even almost 100% packet spoofed compromise of routing decisions.  This, by extension, allowed exploitation of all traffic that was weakly authenticating.

It's the same story, again and again.  And now, everyone talking about BGP.  So lets do the same sort of analysis on BGP:

Kapela and Pilosov's BGP flaw: In BGP, only the nearest neighbor is authenticated.  The concept is that all "members of the club" authenticate all other members, while the actual data they provide and distribute is trusted.  If it's not actually trusted, anyone can hijack traffic from anyone else's routes.

Pilosov's done some cool work here.  It's not the sort of devastating surprise some people seem to want it to be.  Indeed, that's what makes it so interesting.  BGP was actually supposed to be broken, in this precise manner. Literally, in every day use, any BGP administrator has always had the ability to hijack anyone else's traffic.  Pilosov has a new, even beautiful MITM attack, but as mine was not the first DNS attack, his is not the first BGP MITM.  Tales of using BGP to force traffic through a compromised router (possibly compromised through SNMPv3) are legion, and Javascript and the browser DOM blur things pretty fiercely in terms of the relevance of being able to pass through to the legitimate endpoint anyway.

That's not to take away from the work.  It's an interesting trick.  But we need to level set here:

First, if you're not part of the BGP club, you're just not running this attack.  Pakistan took out YouTube with BGP -- but some random kid with the ability to spoof IP packets couldn't.  In other words, we're just not going to see a Metasploit module anyone can run to complete these sorts of attacks.  Now, there are some entertaining combinatorics that could be played -- DNS to enable Java's SNMPv3 access to internal routers at an ISP, and then from that internal router running the sort of BGP tricks Pilosov's talking about.  This goes back to the utter folly of trying to rank these bugs independently from one another.  But these sort of combinatorics are at a fundamentally different level than the fire-and-forget antics that DNS allowed, and on a fundamental level, the number of potential attackers (and the number of involved defenders) on BGP is a lot lower.

Second, we have far better logging -- and thus accountability -- in the BGP realm than we do perhaps for any other protocol on the Internet.  Consider the archives at APNIC -- yes, that's route history going back to 1999 -- and Renesys has even more.  That sort of forensic data is unimaginable for anything else, least of all DNS.  BGP may have its fair share of bad actors -- consider spammers who advertise temporary ranges in unused space for mail delivery purposes, thus getting around blackholes -- but any of the really nasty stuff leaves a paper trail unmatched by any other attack.

Third, BGP is something of a sledgehammer.  Yes, you're grabbing traffic -- but your control over exactly what traffic you grab is fairly limited.  Contrast that with DNS, which allows astonishingly fine grained targeting over exactly what you grab -- indeed, you don't even need to know in advance what traffic you want.  The victim network will simply offer you interesting names, and you get to choose on the fly which ones you'll take.  These names may even be internal names, offering the impossible-with-BGP attack of hijacking traffic between two hosts on the exact same network segment.

Finally, BGP suffers some limitations in visibility.  Simply grabbing traffic is nice, but bidirectional flows are better than unidirectional flows, and when you pull something off via DNS, you're pretty much guaranteed to grab all the traffic from that TCP session even if you stop any further poisoning attempts.  Contrast that with BGP, which operates at Layer 3 and thus may cause the IP packets to reroute at any point when the TCP socket is still active.

So, does that mean its always better to attack DNS than BGP?  Oh, you competitive people would like things to be so simple, wouldn't you :)Pilosov and I talked for about a half hour at Defcon, and I've got nothing but respect for his work.  Lets look at the other side of things for a moment.   First, BGP controls how you route to your name server -- if not your recursive server, which may be inside your organization and thus immune to ext


只有注冊用戶登錄后才能發(fā)表評論。
網(wǎng)站導航: 博客園   IT新聞   BlogJava   博問   Chat2DB   管理


青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            激情成人中文字幕| 亚洲综合色视频| 精品成人在线观看| 国语自产精品视频在线看8查询8| 激情视频一区二区| 久久国产精品亚洲va麻豆| 欧美午夜精品久久久| 精品99一区二区三区| 久久久久久**毛片大全| 亚洲欧美日韩一区| 国产精品亚洲综合久久| 亚洲欧美在线看| 这里只有精品在线播放| 欧美日本一区| 一区二区精品在线| 性色av香蕉一区二区| 一区二区三区精品在线| 欧美激情按摩| 一本大道久久a久久精品综合| 欧美人与性禽动交情品| 久久综合网络一区二区| 亚洲视频网站在线观看| 免费看av成人| 亚洲国产精品久久久久| 一本色道久久综合精品竹菊| 欧美无砖砖区免费| 亚洲女优在线| 欧美一区二区国产| 合欧美一区二区三区| 99国产精品99久久久久久粉嫩| 美女免费视频一区| 国语自产在线不卡| 久久视频在线免费观看| 久久久人成影片一区二区三区| 在线成人欧美| 欧美激情久久久| 欧美日韩中文在线| 亚洲欧美日韩久久精品| 久久久亚洲高清| 欧美亚洲网站| 亚洲午夜电影网| 欧美在线视频导航| 一区二区三区四区精品| 久久成人在线| 欧美一区二区三区在线看| 亚洲国产成人tv| 欧美激情一区二区三区不卡| 亚洲精品少妇网址| 一个色综合导航| 激情五月婷婷综合| 99成人在线| 黄色成人av在线| 亚洲精品韩国| 亚洲欧美日韩国产一区| 精品不卡一区| 亚洲天堂网在线观看| 韩国一区电影| 日韩一级黄色av| 黑人巨大精品欧美一区二区小视频 | 影音先锋久久资源网| 亚洲日本乱码在线观看| 国产精品揄拍500视频| 欧美福利在线| 国产欧美日韩视频一区二区三区 | 亚洲视频网站在线观看| 欧美成人午夜免费视在线看片| 欧美日韩国产不卡| 欧美freesex交免费视频| 欧美午夜宅男影院| 亚洲大片一区二区三区| 国产精品毛片a∨一区二区三区|国| 免费精品视频| 国产亚洲综合精品| 亚洲欧美精品在线| 一区二区激情| 欧美激情网站在线观看| 嫩模写真一区二区三区三州| 国产视频久久久久| 亚洲免费中文字幕| 亚洲欧美日韩精品久久亚洲区| 欧美精品国产精品日韩精品| 美女国产精品| 亚洲高清视频中文字幕| 久久免费的精品国产v∧| 久久亚洲欧美| 尤物九九久久国产精品的特点 | 极品少妇一区二区三区| 亚洲欧美春色| 欧美区在线观看| 男同欧美伦乱| 国产精品尤物福利片在线观看| 亚洲精品视频在线播放| 亚洲国产精品久久久久婷婷884| 久久精视频免费在线久久完整在线看| 欧美一区二区三区四区高清| 欧美午夜精品久久久| 狂野欧美激情性xxxx欧美| 欧美一区二区性| 亚洲手机成人高清视频| 亚洲高清资源综合久久精品| 久久久久综合网| 久久九九热re6这里有精品| 欧美在线三级| 男女激情久久| 日韩午夜黄色| 国产亚洲欧美日韩一区二区| 日韩网站在线观看| 在线一区视频| 国产精品久在线观看| 午夜欧美大片免费观看| 久久久水蜜桃av免费网站| 亚洲国产精品黑人久久久| 久久一区视频| 亚洲精品欧美日韩| 欧美一区日本一区韩国一区| 国产一区久久久| 欧美肥婆在线| 亚洲午夜精品一区二区| 久久久天天操| 日韩一级黄色av| 国产精品青草久久久久福利99| 欧美一区二区在线播放| 男人插女人欧美| 亚洲欧美第一页| 激情久久久久久久久久久久久久久久| 毛片一区二区三区| 亚洲视频专区在线| 免费在线看一区| 一区二区三区日韩精品| 国产日韩综合一区二区性色av| 久久深夜福利免费观看| 日韩一级在线观看| 欧美在线国产精品| 亚洲国产欧美国产综合一区| 国产精品国产三级国产a| 久久亚洲高清| 亚洲欧美在线一区二区| 亚洲国产日韩在线一区模特| 欧美一级日韩一级| 国产精品99久久久久久www| 精品av久久久久电影| 国产精品美女久久久久av超清 | 欧美日韩人人澡狠狠躁视频| 久久精品国产99国产精品| 亚洲免费观看高清完整版在线观看熊| 久久久蜜臀国产一区二区| 亚洲永久精品国产| 亚洲综合第一| 午夜精品久久| 国产精品综合久久久| 欧美无砖砖区免费| 亚洲视频图片小说| 一区二区三区四区蜜桃| 欧美日韩国产成人高清视频| 在线观看视频免费一区二区三区| 香蕉成人伊视频在线观看| 亚洲欧美欧美一区二区三区| 亚洲精品久久7777| 欧美小视频在线观看| 麻豆精品一区二区av白丝在线| 亚洲私人影吧| 亚洲日本中文字幕| 欧美国产丝袜视频| 久久久午夜视频| 久久精品国产亚洲一区二区| 亚洲性xxxx| 一区二区三区视频在线看| 亚洲伦理在线观看| 91久久国产自产拍夜夜嗨| 狠狠久久综合婷婷不卡| 国产欧美一区二区精品忘忧草| 欧美日韩亚洲高清一区二区| 欧美老女人xx| 欧美日韩精品久久| 亚洲人成亚洲人成在线观看图片| 伊人久久久大香线蕉综合直播 | 亚洲天堂成人在线观看| 亚洲免费精彩视频| 亚洲美女黄网| 一区二区三区回区在观看免费视频| 亚洲精品一区二区三区99| 亚洲韩国一区二区三区| 亚洲欧洲日产国产综合网| 亚洲欧洲精品一区二区三区| 亚洲青涩在线| 亚洲天堂网在线观看| 亚洲免费在线视频| 久久精品国产在热久久| 噜噜噜91成人网| 亚洲高清三级视频| 99riav久久精品riav| 亚洲自拍偷拍麻豆| 久久久99久久精品女同性| 麻豆精品视频在线| 欧美日韩在线播放三区四区| 国产精品毛片a∨一区二区三区|国 | 亚洲精品日产精品乱码不卡| 国产日韩欧美一区| 亚洲欧美日韩国产精品| 午夜亚洲福利|