青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

posts - 94, comments - 250, trackbacks - 0, articles - 0
  C++博客 :: 首頁 :: 新隨筆 :: 聯系 :: 聚合  :: 管理

[Ph4nt0m] [zz]The Emergence Of A Theme

Posted on 2008-08-29 10:17 Condor 閱讀(7749) 評論(2)  編輯 收藏 引用

 

I'm not sure what it is, but there continues to be some sort of "competition" for "who can find the biggest bug" -- as if attackers had to choose, and more importantly, as if any bug was so big that it could not be made even better by combined use with its "competition".  Before my DNS talk, my old friend FX from Recurity Labs was comparing DNS issues to the Debian Non-Random Number Generator issue that caused all sorts of SSL certificates to offer no security value, and the SNMPv3 flaws that allowed infrastructure devices to be remotely administered by people who happened not to know the password.

Of course, after the talk, it became clear that the DNS hack and the Debian NRNG combined rather destructively -- DNS allowed you to finally play MITM with all the SSL private keys you could trivially compute, and as Ben Laurie found, this included the keys for Sun's OpenID authentication provider.  And, since the DNS hack turns Java back into a universal UDP and TCP gateway, we end up being able to log into SNMPv3 devices that would otherwise be protected behind firewalls.

So there's no sense making a competition out of it.  There's just an ever growing toolchest, growing from a single emerging theme:

Weaknesses in authentication and encryption, some which have been known to at least some degree for quite some time and many of which are sourced in the core design of the system, continue to pose a threat to the Internet infrastructure at large, both by corrupting routing, and making those corrupted routes problematic.

Back in July, the genuinely brilliant Halvar Flake posted the following regarding the entire DNS issue:

"I fail to understand the seriousness with which this bug is handled though. Anybody who uses the Internet has to assume that his gateway is owned."

And thus, why 75% of my Black Hat talk was on the real-world effectiveness of Man-In-The-Middle attacks: Most people aren't as smart as Halvar.  I'm certainly not :)  Almost nobody assumes that their gateway is owned -- and even those that do, and try to engineer around it, deploy ineffective protections that are only "secure unless there's an attacker".

I say this is a theme, because it is the unifying element between some of the year's most high profile flaws.  There are two subclasses -- some involve weak authentication migrating traffic from one location to another, while others involve weak authentication allowing an attacker to read or modify traffic migrated to him -- but you'd have to have some pretty serious blinders to not see the unifying theme of weak authentication leads to pwnage.

Consider:

Luciano Bello's Debian NRNG: This involves a core design requiring the generation of random numbers, but the random number generator required a random seed, but alas, the seed was made insufficiently random.  It's an implementation flaw, but barely -- and the effect was catastrophic failure against members of the X.509 PKI authentication system that had used the Debian NRNG, and thus by extension SSL's encryption logic and OpenID (for Sun's) authentication gateway.

Wes Hardakar's SNMPv3 Bug: Here, we have an authentication protocol that allows an attacker to declare how many bytes he wants to have to correctly provide.  Now, the attacker can claim "just 1 please" -- and he gets into any router suffering this bug within seconds.  That, by extension, allows control over all traffic traversing that router.

Mike Zusman's Insecure SSL-VPN's: SSL is supposed to protect us, but there's no sense creating a secure session to someone if you don't actually know who they are.  Don't worry though, by design anything that isn't a web browser is terrifyingly likely to only to skip authentication entirely and just create an encrypted link to whoever's responding.  One would think that SSL-VPN's, whose sole purpose is to prevent attackers from accessing network traffic, would be immune.  But with 42% of certificates on the Internet being self-signed, and a lot of them being for SSL-VPN's, one would be wrong.  By extension this auth failure exposes all traffic routed over these SSL-VPN's.

Mike Perry's Insecure Cookies: This gets interesting.  Here we have two different authentication protocols in place -- one, from server to client, based on X.509.  The other, from client to server, based on a plaintext password (delivered, at least, over an encrypted session authenticated by the server-to-client cert).  But to prevent the user from needing to repeatedly type in their plaintext password, a password-equivalent token (or cookie) is handed to the user's browser, which will be attached to every request within the securely encrypted channel.  Unfortunately, it'll also be attached to every request which does not traverse the securely encrypted channel, because the cookies aren't marked for secure-only.  Once the cookie leaks, of course, it'll authenticate a bad guy who creates an encrypted session to that server.  So by extension bad guys get to play in any number of interesting sites.

My DNS flaw: Here we have a protocol that directly controls routing decisions, ultimately designed to authenticate its messages via a random number between 0 and 65535.  Guess the number, and change routing.  This was supposed to be OK, because you could only guess a certain number of times per day.  There was even an RFC entirely based around this time limit.  It turns out there's a good dozen ways around that limit, allowing anonymous and even almost 100% packet spoofed compromise of routing decisions.  This, by extension, allowed exploitation of all traffic that was weakly authenticating.

It's the same story, again and again.  And now, everyone talking about BGP.  So lets do the same sort of analysis on BGP:

Kapela and Pilosov's BGP flaw: In BGP, only the nearest neighbor is authenticated.  The concept is that all "members of the club" authenticate all other members, while the actual data they provide and distribute is trusted.  If it's not actually trusted, anyone can hijack traffic from anyone else's routes.

Pilosov's done some cool work here.  It's not the sort of devastating surprise some people seem to want it to be.  Indeed, that's what makes it so interesting.  BGP was actually supposed to be broken, in this precise manner. Literally, in every day use, any BGP administrator has always had the ability to hijack anyone else's traffic.  Pilosov has a new, even beautiful MITM attack, but as mine was not the first DNS attack, his is not the first BGP MITM.  Tales of using BGP to force traffic through a compromised router (possibly compromised through SNMPv3) are legion, and Javascript and the browser DOM blur things pretty fiercely in terms of the relevance of being able to pass through to the legitimate endpoint anyway.

That's not to take away from the work.  It's an interesting trick.  But we need to level set here:

First, if you're not part of the BGP club, you're just not running this attack.  Pakistan took out YouTube with BGP -- but some random kid with the ability to spoof IP packets couldn't.  In other words, we're just not going to see a Metasploit module anyone can run to complete these sorts of attacks.  Now, there are some entertaining combinatorics that could be played -- DNS to enable Java's SNMPv3 access to internal routers at an ISP, and then from that internal router running the sort of BGP tricks Pilosov's talking about.  This goes back to the utter folly of trying to rank these bugs independently from one another.  But these sort of combinatorics are at a fundamentally different level than the fire-and-forget antics that DNS allowed, and on a fundamental level, the number of potential attackers (and the number of involved defenders) on BGP is a lot lower.

Second, we have far better logging -- and thus accountability -- in the BGP realm than we do perhaps for any other protocol on the Internet.  Consider the archives at APNIC -- yes, that's route history going back to 1999 -- and Renesys has even more.  That sort of forensic data is unimaginable for anything else, least of all DNS.  BGP may have its fair share of bad actors -- consider spammers who advertise temporary ranges in unused space for mail delivery purposes, thus getting around blackholes -- but any of the really nasty stuff leaves a paper trail unmatched by any other attack.

Third, BGP is something of a sledgehammer.  Yes, you're grabbing traffic -- but your control over exactly what traffic you grab is fairly limited.  Contrast that with DNS, which allows astonishingly fine grained targeting over exactly what you grab -- indeed, you don't even need to know in advance what traffic you want.  The victim network will simply offer you interesting names, and you get to choose on the fly which ones you'll take.  These names may even be internal names, offering the impossible-with-BGP attack of hijacking traffic between two hosts on the exact same network segment.

Finally, BGP suffers some limitations in visibility.  Simply grabbing traffic is nice, but bidirectional flows are better than unidirectional flows, and when you pull something off via DNS, you're pretty much guaranteed to grab all the traffic from that TCP session even if you stop any further poisoning attempts.  Contrast that with BGP, which operates at Layer 3 and thus may cause the IP packets to reroute at any point when the TCP socket is still active.

So, does that mean its always better to attack DNS than BGP?  Oh, you competitive people would like things to be so simple, wouldn't you :)Pilosov and I talked for about a half hour at Defcon, and I've got nothing but respect for his work.  Lets look at the other side of things for a moment.   First, BGP controls how you route to your name server -- if not your recursive server, which may be inside your organization and thus immune to ext


只有注冊用戶登錄后才能發表評論。
網站導航: 博客園   IT新聞   BlogJava   博問   Chat2DB   管理


青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            久久国产欧美| 久久久久成人网| 亚洲黄色三级| 欧美成人精品h版在线观看| 影音先锋日韩资源| 欧美激情在线观看| 欧美激情一区二区三级高清视频| 亚洲国产精品久久久久婷婷老年| 欧美搞黄网站| 欧美日韩黄色大片| 亚洲视屏在线播放| 午夜天堂精品久久久久| 精品不卡在线| 亚洲精品一区二区三区蜜桃久| 欧美日韩在线一区二区| 欧美一区三区三区高中清蜜桃| 欧美资源在线观看| 亚洲精品孕妇| 午夜精品99久久免费| 亚洲电影免费观看高清完整版在线观看| 亚洲大胆人体视频| 国产精品免费一区豆花| 久久综合国产精品台湾中文娱乐网| 美女精品视频一区| 亚洲欧美日本另类| 老司机一区二区三区| 亚洲午夜精品久久| 久久久久九九九九| 亚洲在线视频免费观看| 久久久久久久久久久一区 | 欧美在线视频免费播放| 亚洲人成在线观看网站高清| 在线综合视频| 亚洲国产裸拍裸体视频在线观看乱了| 亚洲麻豆视频| 在线精品视频一区二区三四| 中文日韩在线视频| 亚洲国产一区二区a毛片| 亚洲自拍偷拍视频| 99精品国产热久久91蜜凸| 性欧美xxxx视频在线观看| 9l视频自拍蝌蚪9l视频成人| 久久久久.com| 欧美中文字幕在线观看| 欧美日韩蜜桃| 最近看过的日韩成人| 一区二区三区我不卡| 亚洲免费视频一区二区| 亚洲视频 欧洲视频| 欧美国产激情二区三区| 免费视频亚洲| 国内精品久久久久影院薰衣草| 亚洲特级片在线| 亚洲午夜电影网| 欧美日韩国产精品专区| 亚洲国产日韩综合一区| 亚洲高清在线观看| 久热精品视频| 免费在线欧美黄色| 激情文学一区| 久久免费观看视频| 美女脱光内衣内裤视频久久网站| 国产日韩欧美一区二区三区在线观看| 制服丝袜亚洲播放| 亚洲综合色激情五月| 欧美三级电影大全| 99这里有精品| 亚洲在线一区二区| 国产精品久久久久99| 一本综合久久| 午夜免费久久久久| 国产日韩欧美在线看| 欧美一区二区性| 久久综合激情| 在线精品国精品国产尤物884a| 久久精品午夜| 欧美高清视频一区二区三区在线观看| 在线精品视频一区二区三四| 久久综合久久综合九色| 亚洲欧洲另类| 亚洲一级二级在线| 国产精品影音先锋| 久久精品中文| 最近中文字幕日韩精品 | 日韩视频在线免费| 欧美日韩免费网站| 亚洲专区欧美专区| 久久另类ts人妖一区二区| 在线精品视频一区二区| 欧美精品免费视频| 亚洲综合成人婷婷小说| 久久夜色精品国产亚洲aⅴ| 亚洲国产一成人久久精品| 欧美伦理91i| 欧美亚洲专区| 亚洲国产精品传媒在线观看| 亚洲一区二区在| 黄色一区二区三区| 欧美精品首页| 欧美在线观看日本一区| 亚洲成人在线视频播放| 99热这里只有成人精品国产| 国产精品国内视频| 久久久97精品| 亚洲深夜福利| 欧美激情女人20p| 欧美一区二区视频97| 亚洲精品国产精品乱码不99| 国产精品一香蕉国产线看观看 | 亚洲欧洲精品成人久久奇米网 | 亚洲午夜免费视频| 精品成人一区二区| 国产精品ⅴa在线观看h| 久久免费视频在线观看| 亚洲天天影视| 亚洲精品国产精品久久清纯直播| 久久高清免费观看| 亚洲午夜久久久久久尤物| 在线日韩av永久免费观看| 国产精品热久久久久夜色精品三区| 久久裸体艺术| 欧美中文字幕| 亚洲一二三四区| 亚洲免费高清视频| 亚洲国产精品高清久久久| 久久久视频精品| 欧美在线一区二区| 亚洲永久在线| 亚洲网友自拍| 一区二区三区高清在线观看| 亚洲国产三级网| 在线观看亚洲专区| 国外成人免费视频| 国产一区99| 国产日韩精品久久| 国产精品专区第二| 国产精品免费一区豆花| 欧美日韩一本到| 欧美日韩理论| 欧美日韩综合不卡| 欧美日韩亚洲综合一区| 欧美精品麻豆| 欧美日韩一区二区三区在线视频| 免费在线欧美黄色| 欧美成人四级电影| 欧美福利在线| 欧美日韩国产黄| 欧美日韩妖精视频| 国产精品国码视频| 国产美女扒开尿口久久久| 国产精品入口夜色视频大尺度| 国产精品久久二区| 国产欧美一区二区精品性| 国产亚洲欧美一级| 韩日在线一区| 亚洲人成网站在线观看播放| 亚洲精品日本| 亚洲自拍电影| 久久国产99| 欧美黄色aaaa| 99热免费精品在线观看| 亚洲免费在线观看| 久久黄金**| 欧美精品1区| 国产精品日韩欧美一区二区三区| 国产精品一区免费视频| 一区二区三区在线视频播放 | 欧美日韩一区视频| 国产欧美一级| 亚洲精品国精品久久99热一| 亚洲视频欧美视频| 久久国产精品久久w女人spa| 欧美fxxxxxx另类| 99这里只有久久精品视频| 亚洲影视九九影院在线观看| 久久久777| 欧美视频四区| 一区在线影院| 99精品久久久| 久久久视频精品| 亚洲精品中文字| 久久9热精品视频| 欧美日韩国产不卡| 黄色精品一区| 亚洲主播在线播放| 欧美成人一区二区三区| 亚洲一区二区三区成人在线视频精品| 欧美专区亚洲专区| 国产精品xnxxcom| 亚洲国产成人久久| 香蕉成人啪国产精品视频综合网| 欧美成人精品不卡视频在线观看| 亚洲图片自拍偷拍| 欧美国产日韩在线| 韩日欧美一区| 欧美影院精品一区| 一本色道久久综合亚洲精品高清| 久久亚洲一区二区| 国产主播精品在线| 亚洲你懂的在线视频|