Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Sirotan
Oct 17, 2006

Sirotan is a seal.


I guess I am finally going to be switching over to Keepass XC.

:synpa:

Also RIP to a great master password, gonna take me a while to undo that muscle memory.

Adbot
ADBOT LOVES YOU

Ynglaur
Oct 9, 2013

The Malta Conference, anyone?

SlowBloke posted:

I'm not big on the dev response to "this CVE means the master password does gently caress all" being "I'll release an update if i have enough stuff to justify writing a changelog". I understand it's free software and i have zero authority on this work schedule, it's just weird IMHO.

You're still supposed to give the developer time to actually fix or not fix the vulnerability. 90 days is the default for good reason.

SlowBloke
Aug 14, 2017

Ynglaur posted:

You're still supposed to give the developer time to actually fix or not fix the vulnerability. 90 days is the default for good reason.

The dev has a viable patch in that thread. I'm perplexed at not releasing an out of band update on the spot, maybe mentioning "issue is critical, I'm prioritizing delivery times instead of testing" and then proceeding with the usual delivery schedule.

Klyith
Aug 3, 2007

GBS Pledge Week

SlowBloke posted:

Thank god i use keepassXC or Keepassium. I think the infosec expert made the PoC public after this message https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/#37b9 where the dev casually says "Eh, I'll add it to the pile".

Uh, did you read the thread you linked, because the dev immediately recognized it as important and worked to fix it.

The previous keepass maybe-exploit of "use the password dump feature in the program by turning it on in the .ini config" was the one where the dev was like eh I'll add something eventually. Because that thing was dumb. If an attack isn't worse than a keylogger it's not worth special attention.

This CVE is worse than a keylogger and is going to be fixed fairly promptly.

Sirotan posted:

Also RIP to a great master password, gonna take me a while to undo that muscle memory.

Unless you have reason to suspect your machine is compromised, why would you do that?

SlowBloke
Aug 14, 2017

Klyith posted:

Uh, did you read the thread you linked, because the dev immediately recognized it as important and worked to fix it.

The previous keepass maybe-exploit of "use the password dump feature in the program by turning it on in the .ini config" was the one where the dev was like eh I'll add something eventually. Because that thing was dumb. If an attack isn't worse than a keylogger it's not worth special attention.

This CVE is worse than a keylogger and is going to be fixed fairly promptly.

It didn't release a compiled build on the homepage/delivery channels, which i feel is the cause of the PoC becoming public. I'm not going to request the dev to be flayed on the city square, just perplexed at the logic behind not compiling/publishing an emergency build on sourceforge/winget.

SlowBloke fucked around with this message at 15:05 on May 17, 2023

Sirotan
Oct 17, 2006

Sirotan is a seal.


Klyith posted:

Unless you have reason to suspect your machine is compromised, why would you do that?

Because I am probably due to rotate it anyway and also I am just generally paranoid. :shrug:

Klyith
Aug 3, 2007

GBS Pledge Week

SlowBloke posted:

It didn't release a compiled build, which i feel is the cause of the PoC becoming public. I'm not going to request the dev to be flayed on the city square, just perplexed at the logic behind not compiling/publishing an emergency build on sourceforge/winget.

It's not that awful of a CVE.

You need to be locally compromised, or to have your pc stolen by an attacker who is either very sophisticated (can dump ram from the chip) or gets lucky (password recoverable from page / hibernation file, which is not guaranteed, and also means you weren't using drive encryption*).


*if you aren't using drive encryption on a PC that might be stolen, you have very little grounds to complain about other people's security failings



edit: also lmao there was no delay, the guy posted it publicly after the dev said "did you turn off password obscuring", which is an entirely reasonable first response to that post. No 90 days, no private communication. The guy who found it hosed up, not the dev.

Klyith fucked around with this message at 15:17 on May 17, 2023

Subjunctive
Sep 12, 2006

✨sparkle and shine✨

Sirotan posted:

Because I am probably due to rotate it anyway and also I am just generally paranoid. :shrug:

What purpose does rotation of master passwords serve? Someone brute-forced expensively it against your database and is just sitting on it to unlock a future version with a few more saved passwords in it? I have decades-old master passwords and good loving luck to me if I change them.

Sirotan
Oct 17, 2006

Sirotan is a seal.


Subjunctive posted:

What purpose does rotation of master passwords serve? Someone brute-forced expensively it against your database and is just sitting on it to unlock a future version with a few more saved passwords in it? I have decades-old master passwords and good loving luck to me if I change them.

I'm fully aware and will admit it's mostly an irrational decision. To be honest the password is a bit too personal no it isn't the name of my pet and I've known I should probably have changed it for a while now so I am finally using this as my excuse. It's really not a big deal and I was mostly being hyperbolic ok!!

SlowBloke
Aug 14, 2017

Sirotan posted:

I'm fully aware and will admit it's mostly an irrational decision. To be honest the password is a bit too personal no it isn't the name of my pet and I've known I should probably have changed it for a while now so I am finally using this as my excuse. It's really not a big deal and I was mostly being hyperbolic ok!!

Since you seem to plan to move to XC, you can bind yubikeys using HMAC-SHA1 to unlock the db. It has partial compatibility with the various mobile clients since keepass don't have an official implementation.

Sickening
Jul 16, 2007

Black summer was the best summer.
Anyone done the CISSP lately? Is there a training + voucher bundle anyone would recommend? I have team members wanting to partake and haven't taken the exam in a while.

I am lazy and the 1500 bundle from ISC is the only thing I have looked up.

rafikki
Mar 8, 2008

I see what you did there. (It's pretty easy, since ducks have a field of vision spanning 340 degrees.)

~SMcD


Is anyone here using the encrypted visibility engine in either stealthwatch or FTD? It sounds potentially really cool, but I’m curious what the reality of it is.

BaseballPCHiker
Jan 16, 2006

Sickening posted:

Anyone done the CISSP lately? Is there a training + voucher bundle anyone would recommend? I have team members wanting to partake and haven't taken the exam in a while.

I am lazy and the 1500 bundle from ISC is the only thing I have looked up.

I took mine about 3-4 years ago now.

Based on my experience and that a few others I work with, I would recommend just going out and buying the 11th Hour Guide, one of the big recommended books like Shon Harris's, and a smattering of YouTube videos. The test is way overhyped and in my experience really not that difficult. Especially for people with a few years of IT experience.

Diva Cupcake
Aug 15, 2005

Draft OWASP Top 10 list for LLMs just dropped.

https://owasp.org/www-project-top-10-for-large-language-model-applications/descriptions/

CommieGIR
Aug 22, 2006

The blue glow is a feature, not a bug


Pillbug

This'll help a ton.

Famethrowa
Oct 5, 2012


great timing, thanks for sharing. we're having big conversations right now about LLM products.

also looks like a working group is forming which seems like an interesting way to get on ground floor.

https://owasp.org/www-project-top-10-for-large-language-model-applications/

Famethrowa fucked around with this message at 17:14 on May 26, 2023

Mantle
May 15, 2004

Famethrowa posted:

great timing, thanks for sharing. we're having big conversations right now about LLM products.

also looks like a working group is forming which seems like an interesting way to get on ground floor.

https://owasp.org/www-project-top-10-for-large-language-model-applications/

Serious question here, why is LLM06:2023 - Overreliance on LLM-generated Content classified as a vulnerability? Shouldn't a user's use of the output be outside of the responsibility of the application if the output is produced according to the rules of the system?

Jabor
Jul 16, 2010

#1 Loser at SpaceChem

Mantle posted:

Serious question here, why is LLM06:2023 - Overreliance on LLM-generated Content classified as a vulnerability? Shouldn't a user's use of the output be outside of the responsibility of the application if the output is produced according to the rules of the system?

Considering how users will use the application in practice is an integral part of designing an application to be secure, and it's definitely something you want to take into account when evaluating the risks that come alongside bringing that application into your environment.

Famethrowa
Oct 5, 2012

Mantle posted:

Serious question here, why is LLM06:2023 - Overreliance on LLM-generated Content classified as a vulnerability? Shouldn't a user's use of the output be outside of the responsibility of the application if the output is produced according to the rules of the system?

I thought the same thing but came around to it. It feels borderline but LLM really seems like it'd grease the skids when it comes to bad decisions since it is even more thoughtless then combing StackExchange. not much different then requiring security training or phishing tests imo.

some kinda jackal
Feb 25, 2003

 
 
Is there a go-to solution anyone can recommend for certificate hygiene/lifecycle which doesn’t depend on itself acting as a CA? Bonus points if it can consume HashiCorp Vault as a secrets store.

I have a number of applications which depend on certificates signed by pre-existing internal CAs, as well as certificates signed by external public CAs. HC Vault is at my disposal, but unless it acts as its own CA the PKI engine doesn’t seem to be what I need.

I doubt any tool will offer me end-to-end certificate lifecycle given the external interop required, but frankly right now I just want to put some additional rigour around the workflow to generate keys and CSRs.

Short a tool, I think I’m going to just whip up some quick commands to OpenSSL generate a CSR and write the ephemeral stdout to a Vault KV2 store. I’m in full shower mode thought this morning after vacation so I’ve given this exactly two minutes of critical thought and fully expect this to be riddled with holes; But at the same time I’m also hoping to get from a per-project key request/management process to something where I can at least be sure there’s one source of truth for private keys and CSRs using the secrets store we’ve dumped money into. Don’t want perfect to be the enemy of the good here.

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano
If you end up scripting it, I found cfssl useful for this kind of thing

some kinda jackal
Feb 25, 2003

 
 
I always forget cfssl exists. It makes generating x509 with key usage flags so much easier than trying to remember how to do it with OpenSSL since I can never find my notes when I need them.

DkHelmet
Jul 10, 2001

I pity the foal...


some kinda jackal posted:

I have a number of applications which depend on certificates signed by pre-existing internal CAs, as well as certificates signed by external public CAs. HC Vault is at my disposal, but unless it acts as its own CA the PKI engine doesn’t seem to be what I need.

I think I'm missing something. The PKI module in Vault can definitely generate and sign certs of any type, with any data your heart desires. You'll need some kind of authority to sign- whether that is a CA (bad idea) or an online intermediate signing cert (better idea). It's not a true CA or machine identity solution since it can't do CRLs and the other niceties of a real CA system, and instead relies on the setup of the Vault backend issuing very short certificates that expire quickly. I've used it in a lights-out system that tossed certs into a k8s secret storage. It should be just fine.

some kinda jackal
Feb 25, 2003

 
 
Yeah I think I did a terrible job of explaining the actual problem. I suppose I'd call what I'm trying to build a service oriented certificate management .. process,, but not a CA specifically.

Right now various technology owners generate private keys and CSRs based only on policy documents to guide them; private key storage/backup is also only bound by policies and not process, etc. I want to standardize certificate request/renewal activities such that they're handled by a specific team, but I also want to give them a tool to make both generation and secure storage of these artifacts easier.

The simplest, least short term effort solution is just to provide the organization a JIRA workflow to request a certificate with specific attributes and a defined set of folks will use [some tool] to generate the key material and send it to either a public CA for signing (for external sites) or for our internal CA (long standing, no intent to move to Vault) for signing, then store the PEM bundle in Vault since that's where we store other secret material. Technology owners can then retrieve the key material based on Vault policies, but I'm not terribly worried that Infra Dude X happened to be SSH'd into dev.mycompany.com to generate a privkey and CSR for prod.myservice.com and I've got prod key material lingering on some unexpected server, etc.

Vault in this case is just a glorified keepass. It could just be that I don't understand what Vault can do well enough, but in my understanding there is no real process that I can invoke that will generate an RSA key and a CSR for that key, present it to an external CA (external to Vault, I mean, so /third party/ may be a better term). So in my case Vault is a nice to have simply because I already have it and I store secret material there.

I may have continued to describe the situation terribley apologies if that's the case :( -- I'm also pretty adamant about not making perfect the enemy of the good. There's still areas where I can't control what Infra Dude X does with key material once he gets it from Vault unless I have end-to-end Vault integration with the target technology, which is probably not even feasible if Vault isn't being used as a CA, etc. There's lots of places this breaks, but there are some low hanging fruit I can probably propose a solution to.

Ultimately I'm just trying to be pragmatic. I can write some bash scripts to do all the above, and it's probably fairly simple since I can pipe things in and out of vault cli and openssl, but if I write it I have to support it, and I've got this gut feeling that there has to be some tool that already does this.

some kinda jackal fucked around with this message at 23:26 on May 29, 2023

Wizard of the Deep
Sep 25, 2005

Another productive workday
If you have budget, it sounds like you need something like AppViewX Cert+ or Venafi TLS Protect

Essentially they're a go-between for your certificate-consuming applications and your certificate-issuing sources. You can configure them to generate CSRs and to handle key escrow/backup. They can also do discovery (finding certificates that are already out there), reporting (tracking what's been issued, when it expires, et cetera) and verification (is an HTTPS server issuing the latest version of the certificate).

Something like this isn't a CA by itself.

It's not for the technically faint of heart, but it sounds like it solves the issue you're describing.

some kinda jackal
Feb 25, 2003

 
 
Thanks, that gives me a good jumping off point to investigate the solution landscape. Appreciate it!

drunk mutt
Jul 5, 2011

I just think they're neat
Is this not something that cert-manager (https://cert-manager.io) could handle?

The Fool
Oct 16, 2003


we use venafi for this stuff, it works well enough but I don't have experience with any other products in the space

Takes No Damage
Nov 20, 2004

The most merciful thing in the world, I think, is the inability of the human mind to correlate all its contents. We live on a placid island of ignorance in the midst of black seas of infinity, and it was not meant that we should voyage far.


Grimey Drawer
If nothing else you can rest assured that your HBO Max account is safe, not even SkyNet could hack this poo poo :stare:

Bertha the Toaster posted:

Why on earth would you subject people to this bullshit? Do they not want you to use their site?
https://twitter.com/wondermeg_/status/1662454909353033730

Kazinsal
Dec 13, 2011

Takes No Damage posted:

If nothing else you can rest assured that your HBO Max account is safe, not even SkyNet could hack this poo poo :stare:

BRB setting up a streaming service where you have to beat the Ocarina of Time water temple every time your IP changes

Famethrowa
Oct 5, 2012

Kazinsal posted:

BRB setting up a streaming service where you have to beat the Ocarina of Time water temple every time your IP changes

tbh would probably be easier troubleshooting when my moms router goes out.

cr0y
Mar 24, 2005



Google authenticator did the cloud thing huh

navyjack
Jul 15, 2006



Hey has anybody seen or understood a Zelle scam where the scammer actually sent some money? I’m working a case at work and it came in after the East Coast Fraud nerds went home.

Overall gist, a client got a 30$ Zelle transfer from someone he doesn’t know with a message about a stranded kid and can you forward this money on to them. Client contacted their banker who contacted us. At first I was like “Standard Zelle scam, block and delete” but then she asked “what do we do with the 30 bux?”

Normally the Zelle scammers don’t send their marks money, or if they do, they reverse it within the window, so I’m curious if anyone has any insight.

I realize this isn’t really an Infosec issue, and maybe I should bump the common cons and scams thread, but I figured I’d ask.

Edit: crap I unbookmarked the scam thread, I’ll have to hunt it down

wargames
Mar 16, 2008

official yospos cat censor

navyjack posted:

Hey has anybody seen or understood a Zelle scam where the scammer actually sent some money? I’m working a case at work and it came in after the East Coast Fraud nerds went home.

Overall gist, a client got a 30$ Zelle transfer from someone he doesn’t know with a message about a stranded kid and can you forward this money on to them. Client contacted their banker who contacted us. At first I was like “Standard Zelle scam, block and delete” but then she asked “what do we do with the 30 bux?”

Normally the Zelle scammers don’t send their marks money, or if they do, they reverse it within the window, so I’m curious if anyone has any insight.

I realize this isn’t really an Infosec issue, and maybe I should bump the common cons and scams thread, but I figured I’d ask.

Edit: crap I unbookmarked the scam thread, I’ll have to hunt it down

that is a very very very common zelle scam.

Defenestrategy
Oct 24, 2010

navyjack posted:

Hey has anybody seen or understood a Zelle scam where the scammer actually sent some money? I’m working a case at work and it came in after the East Coast Fraud nerds went home.


If I remember right the gist of this goes,

You get sent money, so you being an upright citizen decide to refund the money promptly, then the scammers dispute the transaction/reverse it so you've now sent 30 bucks, and they've retrieved their 30 bucks. They then close the account out so you cant do the same to them and run with the money.

navyjack
Jul 15, 2006



Defenestrategy posted:

If I remember right the gist of this goes,

You get sent money, so you being an upright citizen decide to refund the money promptly, then the scammers dispute the transaction/reverse it so you've now sent 30 bucks, and they've retrieved their 30 bucks. They then close the account out so you cant do the same to them and run with the money.

Bingo! I knew there was a way they got their money out, but for the life of me I couldn’t figure it out. Thanks!

Sirotan
Oct 17, 2006

Sirotan is a seal.


Anybody here have to use Tenable(.io)? They finally got rid of the Vulnerabilities and Assets 'workbenches' and jesus gently caress WHY. You can no longer do things like, at a glance see the total number of unique vulns in your environment. You get ">1000". Want more detail than that? gently caress you. Wanna see how many devices are currently vulnerable to one specific exploit? They'll tell you, if it's under 500 devices. If it's over 500, you only get to see ">500". Wanna export some data? You can select 5 items, or you can select all items. Nothing in between. Can't generate a report from the data because there are too many lines(???). Want to just export all the raw data with no filters applied so you can deal with it in Excel instead like a sane person? Lol, you can't, the export just silently fails.

We just had a vendor demo this week for a replacement tool and it looked great and I am excited. I'm sure they are going to come back with pricing that we cannot afford and it is going to break my heart.

GreenBuckanneer
Sep 15, 2007

We're still using tenable.sc 😔

klosterdev
Oct 10, 2006

Na na na na na na na na Batman!
Gigabyte built a firmware-level backdoor into their motherboards https://arstechnica.com/security/2023/06/millions-of-pc-motherboards-were-sold-with-a-firmware-backdoor/amp/

Adbot
ADBOT LOVES YOU

Takes No Damage
Nov 20, 2004

The most merciful thing in the world, I think, is the inability of the human mind to correlate all its contents. We live on a placid island of ignorance in the midst of black seas of infinity, and it was not meant that we should voyage far.


Grimey Drawer

Aw man mine is on the list :( At least it sounds fairly straightforward to disable:
https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/

quote:

Inspect and disable the “APP Center Download & Install” feature in UEFI/BIOS Setup on Gigabyte systems and set a BIOS password to deter malicious changes.

Administrators can also block the following URLs:
http://mb.download.gigabyte.com/FileList/Swhttp/LiveUpdate4
https://mb.download.gigabyte.com/FileList/Swhttp/LiveUpdate4
https://software-nas/Swhttp/LiveUpdate4

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply