lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <47138F45.9020005@gmail.com>
Date: Mon, 15 Oct 2007 17:03:17 +0100
From: "James (njan) Eaton-Lee" <james.mailing@...il.com>
To: gjgowey@....blackberry.net
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com,
	"pdp \(architect\)" <pdp.gnucitizen@...glemail.com>
Subject: Re: Remote Desktop Command Fixation Attacks

You can take defence in depth too far (or misinterpret it and implement 
something that's just overcomplex)... actually, I think this e-mail 
demonstrates how not to do defence in depth. Here's my take on this 
approach:

gjgowey@....blackberry.net wrote:
> If you want my take on how to secure a wireless network I'd approach it like this:
> 
> 1) wpa2 (of course)
> 2) mac restrictions (yes, keeping a list of legitimate mac's will be required, but if you don't have an automated inventory system in this day and age then how are you ensuring nothing goes missing to begin with?).
> 3) ipsec VPN connections from all systems that connect via the wireless (this is in addition to the wpa2) using a unique cert per system (not the typical shared password setup that I am still amazed passes for secure in some peoples minds).
> 4) all traffic must go through a proxy server that sits right behind the VPN concentrator)
> 
> If you're running an MS based setup:
> 5) necessary GP modifications to enforce all this and more (if you study all the options available to be forced, xp, w2k, and w2k3 really can get quite secure at the protocol level).
> 6) force kerberos authentication everywhere possible with absolutely no client side caching of the credentials allowed.  Reason: even if someone gets all the way through to the proxy server level ISA can still stop someone cold if their machine doesn't have a machine account on the domain (good luck spoofing that).
> 
> 
> Basically you're looking at layers of authentication and encryption with no way around any of them (even if you do plug in a NIC on one of the systems that's on the wireless) and this really doesn't take a lot of hardware or software to pull off.  Example setup: in front would be your WAP behind that would be a Cisco pix fw with a Cisco VPN concentrator behind it and a MS w2k3 box running ISA behind that.  4 devices basically providing a very solid wireless infrastructure.

=> Broadly...

This set of steps is redundant in many places, and it's also enormously 
expensive, since you're using no less than three different expensive 
bits of networking hardware (AP, PIX, VPN Concentrator), in addition to 
a bunch of x86 server hardware, windows server licenses, and at least 
one ISA license.

When you consider that anyone with a serious need for such a "secure" 
infrastructure also probably has very high requirements in terms of 
reliability and redundancy, you're going to have to double that cost to 
cover cisco/windows licenses and the cost of provisioning physically 
redundant kit and inter-site supporting connectivity.

=> Specifically...

VPNs-over-wireless is very 2001, and is worth avoiding, unless you have 
very good reasons for it, and WPA2-Radius and EAP-TLS should strongly be 
considered as an alternative. Here are some specific disadvantages of 
the approach you've outlined, and of VPNs employed thusly in general:

i) Your computers necessarily don't have full access to your network 
infrastructure when they aren't logged on, so GPOs, software updates, 
etc can't be applied at the times you want them to be applied (when the 
PCs aren't in use). Either:
  * You accept you won't have any, and push updates / update GPOs after
    users authenticate (obvious disadvantages for management/performance)
  * You decide you want wireless clients to update GPOs, carry out
    software updates, etc. when no-one's logged on, when the VPN drops
    etc. In this case, you have to provision a mezzanine network
    infrastructure just for this - which requires protection (and exposes
    an attack surface). Since your laptops are probably domain clients
    you're necessarily going to have a route back to the network behind
    the VPN required to make this approach work via infrastructure
    exposed to the wifi network pre-VPN, and even if you fast forward to
    12 months time and use a Read-Only w2k8 DC or similar, the attack
    surface and complexity involved really questions why you're 
bothering
    with the VPN anyway.

ii) Users can't roam between Access Points (the VPN connection falls over)
iii) The logon process becomes complicated and unfriendly, and is 
different from working non-wirelessly, as you're going to need to 
configure machines with VPN Connectoids that enable the "logon using 
dialup connection" option in the login screen. You'll probably have to 
roll some custom code / script to poll the up-ness of the VPN frequently 
and force it to be re-established when it goes down. (see (ii))
iv) If any one of your pieces of infrastructure fall over (Wireless APs, 
VPN Servers, Proxy Servers, and probably CAs, LDAP Servers, or 
Webservers used to check the CRL, since you're using x.509 certs for 
authentication) you lose the entire infrastructure, and your users can't 
logon or do any work. That's a long string of dependencies.
v) Significant performance hit due to the use of VPNs tunneling traffic 
over wireless.
vi) Your users aren't going to be able to do *anything* that won't go 
over a proxy server, since you've said "all traffic must go through a 
proxy server". This means one of the following things:
   * Only Web/FTP Traffic is allowed
   * You're going to allow HTTP CONNECT tunneling on all ports, 
obviating  the proxy server entirely and making life for your users 
hellish as you try and force a whole load of traffic to go over a web proxy
   * You're going to use SOCKS (similar to the previous)
   * You're going to use the ISA Firewall Client, which does in effect 
allow you to authenticate all traffic going via your ISA Servers, but 
renders the VPN pointless, and is very difficult to firewall.
   * Only selected traffic is *actually* going to traverse the proxy 
server when you realise it isn't a panacea (again, obviating the need 
for it). Since you've specifically highlighted authentication as the 
main reason for the "proxy server" here, and you've mentioned kerberos 
as a protocol that is traversing your wlan, you can't simply mean 
"application-layer firewall", and I must only assume you want to use the 
firewall client (or don't understand what ISA does).
vii) Probably other stuff I didn't think about in the 10 minutes it took 
me to write this e-mail.

Many elements of the policy are pretty pointless given the number of 
other restrictions you have in place, such as:

MAC Filtering - when you consider what a tiny hurdle MAC spoofing is 
compared to your VPN infrastructure, proxy infrastructure, kerberos, etc 
and the overhead associated with this, it really seems quite pointless.

The Cisco PIX - Why? To filter the one or two ports hitting the VPN 
Concentrator? Even if you had this after the concentrator and not 
before, sitting a PIX (which is a firewall) in front of an ISA Server 
(which is a firewall) and behind a VPN Concentrator (which probably does 
basic firewalling itself) is pretty redundant, especially given the 
bandwidth your LAN clients likely use and the cost of Cisco Firewalls. 
If you're going down the Firewall Client route, firewalling the traffic 
between ISA and the VPN Concentrator is almost entirely pointless anyway.

Turning on, enabling, and implementing every possible security setting 
and device you think of is not defence in depth, and will probably only 
have two effects - your users won't use your wireless network, and 
you'll burn so much cash you won't have any left to spend on *useful* 
security measures.

=> Alternatively...

You can do some extremely nice things with WPA2-Radius, it can be 
authenticated in a very similar way to VPNs, using 802.1x and EAP-TLS 
with certificates, and you can even dump users into different VLANs over 
wifi depending upon who they authenticate as. It can be implemented for 
the price of a $300 entry-level enterprise-grade AP such as those from 
HP and Cisco, using existing licensed Radius software on your Windows 
DCs, and an existing licensed Enterprise CA with autoenrolment.

If that's not good enough, and you simply must have encryption and 
authentication over the top of your encrypted, authenticated wifi lan, 
why not use IPSec? This provides a performance benefit over a VPN (no 
tunneling), is far more granularly configurable (across your whole AD 
estate via GPOs), and won't automatically break when users roam across 
Access Points. It also provides security for *all* users, not just VPN 
users, and generally hardens the soft underbelly of your internal 
network infrastructure rather than relying on an overcomplex outer shell 
which, once breached, exposes your (probably under-hardened) internal 
network.

This approach makes it substantially easier to provision new wireless 
access points too (since they no longer have connectivity requirements 
tied to your proxy/VPN infrastructure or carry the requirement to 
provision additional VPN Servers / PIXes / ISA Servers / etc). At worst 
you may have a few trunked vlans.

There is obviously a performance and management hit associated with this 
approach (IPSec), but I think it's a more balanced one based on the 
nature of the threat, and it provides a greater return than just wifi 
security.

> If you're looking to step it up further you can go with MS SMS server and shavlik netchk to manage and audit the laptops.  

If you were going to take this a step further, I'd suggest using one of 
the many NAP-like platforms currently out there, doing some sensible 
application-layer firewalling, or waiting until w2k8 came out and using 
NAP itself. You've already got NAQC, since in your hypothetical scenario 
you've already bought some ISA Licenses - you may as well actually use them.

  - James.

> -----Original Message-----
> From: "pdp (architect)" <pdp.gnucitizen@...glemail.com>
> 
> Date: Sun, 14 Oct 2007 21:59:19 
> To:"C Q" <kyle.c.quest@...il.com>
> Cc:full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
> Subject: Re: [Full-disclosure] Remote Desktop Command Fixation Attacks
> 
> 
> CQ,
> 
> maybe I am making a huge mistake for responding to your message, but
> let see. this is what I think about security in depth in a bit more
> detail.
> 
> let say that we have a wireless network which is guarded by  "security
> in depth" network administrators. the first thing they will do is to
> secure the actual network by some massive segmentation exercises...
> then the connection with enhanced privacy/encryption schemes (WPA2).
> They will put more layers on the top of that. For example, the users
> need to authenticate with client-side certificates. Now the network
> and the connection is secure (sort of), they enforce group policy for
> all laptops so that these laptops cannot connect to any other network
> (sending probe requests, rogue access points). Right! But now they
> also kill the ethernet since a laptop cannot be connected to the
> wireless and the wired network since it is also a risk (stepping stone
> attacks). Each client has a firewall on the top of that. The firewall
> blocks everything that comes in and lets only the browser to go out
> through a proxy which requires authentication (NTLM, Basic Auth, etc).
> The user of the laptop runs with the least possible privileges and
> they cannot install software. They cannot use the CD (Sonny Rootkits),
> they cannot use the USB (endpoint security). The laptop has a boot
> password as well so in case it is stolen the attackers cannot crack
> open the disk.
> 
> My question is the following: does this sound sane to you? Do you
> really believe that someone will let you do all that, without causing
> chaos? Laptops are good because they are mobile. You are allowed to
> take them out and work from home. At home you have your own network
> which you would like to connect to. Even if you use a different
> account on that same laptop to connect to that network, the risk is
> still there. A system is as secure as the weakest link.
> 
> Companies don't like to hear how you are going to solve all problems
> once and for all with some killer security in depth solution because
> it is not possible. in order to make things work you have to leave
> various doors open. At GNUCITIZEN we have one maxima.. "Be
> legitimate!" If the attacker try to be a legitimate user as much as
> possible they will stay unnoticed and they will get in.
> 
> Now how do we handle security in 21st century the way I see it (btw, I
> am not interest in selling any services, in fact, GNUCITIZEN is not
> that type of organization)? First of all, careful planning - the
> system has to be as secure as flexible and usable even if this means
> that you need to have a shared key for all of your wireless networks.
> Second, you need a crisis management plan. Natwest got hacked by a MP3
> player.. how many of you have heard of it and for how long this story
> was on the news? Third, you need to calculate the risk. Example?
> Credit card fraud! We know that cards are getting stolen but the
> calculated risk is %2 out of the whole, which can be easily
> compensated. Etc, etc, etc!
> 
> As you can see it is not just technical when it comes to the real
> world. In the real world the management gives you instructions and you
> have to implement them in the best possible way. Projects stack up.
> People leave, new people join in and work on the networks that have
> been given. Chaos is the norm! How many of you have seen a network
> that is done right? Yeh, there are a few of you, but you are probably
> talking about your home network which does not exceed more then 20
> machines. How come I have never seen a security in depth in practice.
> You guys are more experienced then me, that's for sure... but I've
> done quite a few tests in the past 4 years and I know what I've seen.
> It is bad, but it is OK, because then we can sit together and walk
> through the entire process.
> 
> I expect more flames for which I am not planning to respond. If you
> think that security in depth works for you... do it! personally, I
> will offer something additional to my clients. something, that gives
> them that extra safe net, which has nothing to do with security in
> depth.
> 
> cheers,
> pdp
> 
> On 10/14/07, C Q <kyle.c.quest@...il.com> wrote:
>> I guess there's some logic in spreading FUD about security in depth
>> not working. It might be a nice way to scare potential customers
>> who don't know much about security into whatever services
>> Gnucitizen team sells. However, these kind of tricks
>> simply won't work with any seasoned  security professional.
>> It'll actually backfire if you are not careful... because you
>> won't be taken seriously in the industry. I'm pretty sure
>> Pdp's rating in the books of many security professionals
>> went down quite a few notches :-) It's a small world...
>> and most likely it'll affect your and your company's
>> future... because you'll need to do business with
>> people like Thor (who gave a great and very logical
>> description with proper supporting examples of what
>> security in depth is and what's mean to do).
>> The chances are that they'll simply choose to work
>> with someone else... who betters understands the big
>> picture in security :-)
>>
>> CQ
>>
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter:
>> http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>>
> 
> 
> --
> pdp (architect) | petko d. petkov
> http://www.gnucitizen.org
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 

-- 
   James (njan) Eaton-Lee | UIN: 10807960 | http://www.jeremiad.org

    "All at sea again / And now my hurricanes
    Have brought down this ocean rain / To bathe me again"

  https://www.bsrf.org.uk | ca: https://www.cacert.org/index.php?id=3
-- 

Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (3521 bytes)

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ