Interesting People mailing list archives
IP: DIMACS Workshop on Network Threats
From: Dave Farber <farber () cis upenn edu>
Date: Sat, 07 Dec 1996 13:46:54 -0500
From: Dave Millar <millar () pobox upenn edu>
To: farber () cis upenn edu (David Farber)
Date: Sat, 7 Dec 1996 12:40:56 -0500 (EST)
Here are my notes from the workshop.
Dave
DIMACS Workshop on Network Threats
December 4-6
DIMACS Center for Discrete Mathematics & Theoretical Computer Science
Piscataway, NJ
Peter G. Neumann
A Global Perspective on Network Risks
PGN: Problems include: systems are not designed with full set of
requirements in mind: e.g. mid-sixties East Coast power grid failure;
1980 arpanet outage (4 hours); 1988 Bell AT&T long lines failure. In
each case the common denominator was that a flaw at one node propagated
across the network. Need to develop a systems-oriented view to get
there: step one is education. Has the impression that universities are
not teaching a systems-level view. PhD in computer science didn't know
what software engineering was. There is no hope for technical panaceas a
la firewalls, IPV6, etc. They are just tools.
Simson Garfinkle: The only hope is strict liability for vendors and
credible threat of lawsuits for product liability.
Catherine Meadows
A Representation of Protocol Attacks for Risk Assessment
Problem is that it's difficult to prove quantitative measures of
security. Attempted to develop non-quantitative techniques to compare
vulnerabilities. Attacks are broken down into components, developed a
taxonomy of stages. Successive stages enable following stages resulting
in a "payoff". Stages are composed of "atomic actions". Created a
graphical shorthand to document attacks.
Yvo Desmedt
Network Security Threats in General
Theory of network reliability says that if u hosts are thought to be
dishonest, and network is 2u+1 vertex connected, receiver can trust the
message if he receives more than u+1 identical messages.
If hosts authenticate themselves to adjacent hosts with secret key
technology, the above would tell you that receiving u+1 messages would
suffice to authenticate the message. But if you allow for malicious
hosts that can spoof routes, u+1 identical messages do not suffice.
However, if hosts authenticate to adjacent hosts with public key, the u+1
result holds.
Sarvar Patel
Information Leakage in Encrypted Key Exchange
Encrypted Key Exchange was developed to protect against off-line
dictionary attacks. EKE includes random padding to protect against a
class of information leakage that allowed an attacker to eliminate
unlikely passwords and find the password with less than an exhaustive
brute-force attack. However, the padding method chosen does not make all
numbers equally probable under decryption, giving an attacker information
to eliminate unprofitable dictionary guesses.
Also proposed a method of transmitting encrypted primes without leakage.
Rather than encrypt the prime directly, choose j between the chosen prime
and the next larger prime. Encrypt and transmit j. Then the recipient
decrypts j and picks next smaller number which is prime.
Adam Shostack
Apparent Weaknesses in the Security Dynamics Client/Server Protocol
F2, SecureID's proprietary hash algorithm, has been reverse engineered
and is available on some sites.
Shostack found a weakness in SecureID protocol that allows an attacker to
authenticate as a SecureID cardholder. First: SecureID basics:
Secure ID card displays a new password every minute. User enters the
time-dependent password and a PIN to a host to authenticate to a host.
The host is running not a normal login, but a modified login that relies
on Security Dynamics' authentication server ("Ace Server") to
authenticate the user.
Shostack's attack has an intruder sniff a legitimate SecureID
authentication. Then, with that information, the intruder is able to
spoof an authorization to the host from the Ace Server. Intruder needs
to know the timestamp on the host and needs to be able to spoof the Ace
server's IP address for the attack to work. Security Dynamics has fixed
the problem.
Shostack also mentioned that Security Dynamics' X11 GUI interface for
managing the server may be weak, and sys admins may want to only
administer the system locally with the command line interface. Also
observed that SecureID does not protect against session hijacking
attacks, for which encryption is needed (and encryption only protects
against attacks between the endpoints - not against active attacks at the
origin or destination hosts).
RSA/Security Dynamics employee was present and noted that they were in
the process of re-engineering the protocol from the "ground up" and would
be publishing their protocols for public scrutiny.
Audience member noted that there's also a denial of service attack:
seven bad guesses and the account is suspended.
Shi-Kai Chin
Formal Methods Applied to Secure Network Engineering
Hopes that security may be the killer app that brings formal methods into
wide acceptance for software/systems engineering. Problem is that other
disciplines have better analytic techniques e.g. electrical engineers
model every circuit as a pole-zero diagram or as the ratio of two
polynomials. Software engineering needs a comparable discipline. He's
trying Higher Order Logic.
Applied Higher Order Logic theorem prover to RFC 1421 - Privacy Enhanced
Mail specification (specifically message integrity). Intent was not to
test for problems in the underlying encryption algorithms but to test
that the protocol really delivered on its promise of authentic and/or
private messages assuming that the underlying algorithms could be
trusted. Higher Order Logic "proved" that the intent of the message
integrity function was satisfied (assuming that the hash algorithm did
not permit collisions.)
Steve Bellovin asked if this approach would have uncovered a problem with
an early implementation of PEM (DES in CBC mode). Not at this level of
abstraction, but perhaps with a lower level.
Michael Merrit suggested running the theorem prover against the boneyard
of authentication protocols with known problems to see if a.) the known
problems could be found, and b.) if new, unknown problems could be turned up.
Jean-Jacques Quisquater
Overview and Security Analysis of RSA-type Cryptosystems Against Various
Attacks
Presented implications of five attacks against RSA and three other
RSA-type cryptosystems (LUC, KMOV, Demytko)
RSA with low exponents (e<= 33) is vulnerable if attacker can get 1327
messages (for 1024 bit key) (Hastad attack.) 1024-bit RSA with secret
key less than 2exp256 is vulnerable to Wiener attack.
"Garbage Man in the Middle" will crack RSA key with one message: Alice
encrypts message m to give ciphertext c & sends c to Bob. Mallory blocks
the message so Bob doesn't see it. Mallory intercepts the message and
transforms ciphertext c into c'. Then sends c' on its way to Bob, who
decrypts c' into gibberish message m'. Bob throws out message m' in his
garbage. Mallory retrieves m' from Bob's garbage and using ciphertext
derives Bob's key. (This doesn't have to be an active attack, does it?
As long as Mallory can trick Bob into decrypting gibberish and not
disposing of it properly, Bob's in trouble without any help from Alice,
right?)
Michael Merritt suggested that the results be summarized into concrete
recommendations for sizes of exponent, frequency of key change, key size,
etc.
Ed Felten
Spoofing Attacks on the Web
Not talking about DNS or IP spoofing - that's a well-known problem.
Talking about fooling users into making security-relevant decisions - by
fabricating for them a contrived, deceptive context. This is not a
protocol attack. It's more of a social engineering attack, but with a
technical spin.
Most trivial form of spoofing: Pop up a dialogue box asking for a
password/credit card number. Make it look like a real dialogue box.
More sophisticated attack: Pop up a dialogue box just when a user is
expecting it from a legitimate source. E.G. run a hidden javascript on
the user's machine waiting for him to go to a site to download software.
When he goes to the site, pop up a dialogue box asking him if he wants to
download something. If you choose the name right, chances are user might
choose to accept it.
Next level of attack is mirroring a site: make a copy of a sensitive
site on the attacker's web server. Maybe collect passwords, if the user
is accustomed to entering passwords into the site.
Next level up is "whole-web mirroring" Kind of a "twisted, evil twin" of
the web. Rely on the look and feel of the real web to make the user
believe s/he is seeing the real web.
This is a powerful attack: It handles forms, cgi scripts, can mirror
search engines, handles almost all types of content. Gets nasty with
bookmarks since problem will persist across sessions unless the user
looks in the bookmark file and notices the real address. SSL doesn't
help: attacker can still spoof a blue key. (Seems to me user could
check the certificate, no? but who checks certificates)
How to combat mirroring:
1. Have *servers* authenticate *clients*. Use SSL (assuming SSL key
exchange really prevents man-in-the middle attack).
2. Provide obvious unspoofable context - i.e. if virtually all web pages
were signed and displayed on the window border (this is probably a long
way off).
Once user is aware of this problem, its easy to trace, but attackers will
probably use throw-away hacked sites. Also - trouble is most people
aren't suspicious and may not notice for a while if ever.
Drew Dean
Web Security: High Level Overview
Digitally-signed applets help some, but:
-Signed code can still attack you & you don't know it.
-The fact that 100,000 people have used the signed code without incident
is not necessarily proof that the code is safe: it could be that the code
is targeted somehow (e.g. in time or in address-space).
-Still relies on a digital certificate infrastructure which still does
not exist.
In spite of this, digitally signed code may help organizations achieve a
measure of security in running internally developed code where there is
some good way of distributing the organization's certificate (along with
the browser, say) and where there is an additional basis for trust apart
from technical.
"Servlets" are coming: client uploads executable to the server. Database
searches and agents will use this approach very likely. Should raise
some interesting security problems.
Avi Rubin
Blocking Java Applets at the Firewall
Rubin's first remark: Should have been titled "Blocking Java Applets at
the Firewall - Not"
Why try to block applets? protect against malicious code, denial of
service, high-level spoofing (trojan horses, e-mail/smtp/sendmail abuse),
covert channels, undermining firewalls)
There are several strategies to block a java applet in an application
gateway: prevent all GETS on "*.class", prevent any gets on <applet>
tags, don't allow in anything starting with "cafe babe" (first few bytes
of every java applet?).
However - every strategy can be bypassed:
-Express <applet> as <%41pplet>
-Applet might come in as compressed MIME type. Firewall would be unable
to uncompress.
When contacted vendors who claimed that they blocked applets, every one
answered either:
-"It's proprietary" or
-"We use *.class, cafe babe and <applet>." When weaknesses were
described they said "Oh - that's interesting."
Considered giving up on firewall and giving users a custom browser which
will only run digitally-signed applets, but two problems: who will
distribute all the software, and how do you stop someone from installing
their own browser? (Answer - force all external web access through an
internal web proxy server) ((But someone in the audience thought the
anonymizer could get around any firewall attempts to implement this.)
Conclusion: even if firewalls could block applets, it seems like there
will likely be problems when you try to merge the two policies:
Firewall says trust insiders, control outsiders capabilities through the
firewall
Java says trust no one; control their actions on the platform.
Audience: why are you so worried about outsiders? Every study says your
biggest problem is insiders. Others in audience questioned the studies:
how current are those numbers, are organizations reporting outside
incidents at the same rate they report internal incidents, etc.?
Steve Bellovin
Java - Threat or Menace?
Problem is: we want absolute security. We want "do what I mean"
security. e.g. when I want to pay for a book over the web, grab my
credit card number out of a file without me having to remember it, but
don't let anyone get at it.
Problem: most functions that are needed are the very functions that can
be exploited with bad consequences: file I/O can be used to read
sensitive files, popup windows can be used to coax me to type passwords.
Browsers see bytecode - not java source. Bytecode verifier purports to
enforce rules over java source, but not true: Bytecode verifier permits
a "goto", e.g. which can not be coded in java. Bytecode verifier and
class loader are complicated (3500 LOC for BC verifier). This model is
too complex to be trusted.
There is nothing like a system call that permits one to know entry and
exit points. Everything is an "invoke"
Java relies on DNS for enforcement. DNS has problems. In fact DNS has
been used to compromise the model. DNS queries leak information by going
around the model.
Denial of service not even considered in security model.
Digitally-signed certificates are no worse than store-bought software in
theory. But: doesn't scale on the web. Also - if software distributors
are not careful about signatures and certificates (i.e. if they're
signing, creating certificates on their web server) there could be
trouble. Also - unlike store-bought software, the attacker knows the
buyer and can target an attack. Will people really look at certificates?
Next best thing: add local admin tools so that a site can control policy
site-wide (Netscape says they've got it already.) Eliminate reliance on
the bytecode verifier.
Dan Wallach explained some of Netscape's plans. Classes of permissions
are being created (e.g. typical game permissions). Game will then ask
for game permissions which might be more meaningful to users.
Drew Dean: bytecode is very hard to verify. Requires dataflow analysis.
Belovin: Java is probably here to stay. There are no economic forces to
alter the outcome.
Not many reports of malicious applets. Some present had heard of some
reports of problems that might have been caused by applets.
Steve Bellovin (standing in for Bill Cheswick)
Stupid Net Tricks
When sniffing incidents first got big 2-3 years ago, many ISPs were
sniffed for months because of insecure workstations on the backbone. Not
widely reported at the time.
Network 18 was down for several hours: someone broadcast that they
were that network on an ISP. If you were closer to that ISP's router
than to 18 you got the bogus route.
Millicent Watts
Network Security: Where does the real threat lie
Review of types of threats, need for vigilance. Reported on some
failures of voice recognition (failed safe). Surveillance technology -
Yvo Desmedt noted "Things that think" - technology where more and more
consumer goods/personal articles have chips in them. E.G. your
shoes trigger elevator doors and such, but can be
used for more nefarious purposes. (Anyone know if Italian shoemaker Bruno
Magli is using them yet?)
Cindy Cullen
Demonstration of Hacker Techniques
Demonstrated rootkit which replaces key unix binaries with ones which
hide intruder's presence. No longer chosen tool of the elite hackers -
available easily and being modified, sometimes carelessly.
Also demonsrated ttywatcher. Run on a host it will display connections
to any tty (in or out). Encrypted passwords/data are displayed (because
intrusion is at the endpoint), connection can be taken over by root user
with ttywatcher.
Alexis Rosen
Understanding and Defending Against SYN Attacks
Sorry to say I had to miss this one, though I understand the
recommendations were same as those shared on the security
lists: trim down the timeout parameter, etc.
Robert J. Hall
Channels: Avoiding unwanted electronic mail
Another one I hated to miss. The approach was to add a new sendmail
header which included some cryptographic authentication information.
Different headers, taken together with your email address allow you to
create different personas: one for private discussion with trusted
correspondents, one for "send only" to public mailing lists. For more
info, the paper is available at:
ftp://ftp.research.att.com/dist/hall/papers/agents/channels-long.ps
Many thanks to the presenters, organizers and to DIMACS (Rutgers,
Princeton, AT&T Bell Labs, BellCore, NFS) for an excellent workshop.
Current thread:
- IP: DIMACS Workshop on Network Threats Dave Farber (Dec 07)
