|
Full Disclosure
mailing list archives
Re: Sony: No firewall and no patches
From: "Dobbins, Roland" <rdobbins () arbor net>
Date: Tue, 10 May 2011 23:28:53 +0000
On May 11, 2011, at 4:01 AM, Thor (Hammer of God) wrote:
HTTP may be stateless, but the TCP connection isn't. The purpose for my firewall in front of my web server is that
if you get on the box, or can somehow try to initiate an external connection (e.g. SQL injection), you will not be
able to do so.
Again, if I'm an attacker and I've already pwn3d your box, this is a trivial issue.
But let's pretend it isn't. Since I've pwn3d your box, I can quite easily initiate an inbound connection to your box
from some other outside box which is outside and is under my control, which will conform to your inverted state-check,
and thus I have my connection, and can exfiltrate data.
How is a simple ACL allowing anything from 80 outbound secure?
Given the above, the question is, how is it insecure? Especially since it removes the DDoS state-table vector?
The old "there are 10 ways to do it anyway so why bother" argument just don't hold water for me.
It should in a scenario in which the cost/benefit ratio is so clearly weighted towards the cost side, with so little on
the benefit side.
My above response could easily obviate 5 of those ways, so there is value add.
Look, if you have stateless ACLs only allowing access to your box via destination ports TCP/80 and TCP/443 and denying
everything else, and stateless ACLs which only permit outbound traffic sourced from TCP/80 and TCP/443 to ephemeral
ports, then the only way someone is going to be able to access your box from the outside in the first place is via
those selfsame TCP/80 and TCP/443 ports. Which means that your stateful outbound checking is for nought, since the
attacker is going to be able to initiate a session which passes your firewall policy rules and the inverted state
check, anyways, or he isn't going to be able to access your box at all.
As far as a sidewise compromise or a compromise from 'inside' (assuming there is an 'inside'; public-facing servers
ought not to be conflated with workstation access LANs and the like at all), again, if you have appropriate functional
separation and network access policies in place, plus you're monitoring all of it using appropriate visibility
technologies, that isn't an issue, either.
So, all this stateful checking you're doing on outbound traffic from your Web server doesn't actually benefit you one
iota, and it makes it trivially easy to exhaust the state-tables in your firewall. If you don't believe me, take a
tool like Siege or Tsung and set it up to hammer your server through the stateful firewall with lots and lots of unique
connections.
Of course there are firewalls in front of some of these services, and if it is trivial for someone with a small bot
to take down the firewall, then someone is not doing their job.
It's because of the nature of stateful firewalls. Yes, S/RTBH or flowspec or IDMS can and are used to protect said
stateful firewalls and everything behind them from DDoS, but those stateful firewalls shouldn't be there in the first
place.
The fact that someone was able to navigate through firewalls speaks to the configuration, not the technology. Sony
actually said they didn't have firewalls, and only had ACLs, so you're point is lost there, I think.
<http://gamer.blorge.com/2011/05/01/sony-press-conference-compensation-details-and-psn-to-resume-this-week/>
-----------------------------------------------------------------------
Roland Dobbins <rdobbins () arbor net> // <http://www.arbornetworks.com>
The basis of optimism is sheer terror.
-- Oscar Wilde
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Re: Sony: No firewall and no patches, (continued)
Re: Sony: No firewall and no patches nix (May 10)
Re: Sony: No firewall and no patches Bruno Cesar Moreira de Souza (May 10)
(Thread continues...)
|