Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
Wiggly Wayne DDS
Sep 11, 2010



DeaconBlues posted:

Nice thread topic!

I'd like an effective and relatively simple way of turning a short password into a hash type string to use as a passphrase for AES encryption please.

In the past I've used the MD5 of a simple string (such as a car license plate) and I know that people here will poo poo brix that I used something as insecure as MD5 but, hey, it's better than the original password!

I looked at PBKDF2, which seems ideal for stretching a simple password into an indecipherable string and then found out that there are better alternatives, such as bcrypt which has more expensive overheads if someone attempted to reverse the data.

The problem with bcrypt (and scrypt, I believe) is that they are geared toward storing passwords for web services and produce a more complicated output than I desire. I just wanna derive an encryption key from a simple string.

PBKDF2 looks the sort of thing I'm after but there doesn't seem to be a standardized implementation of it. I want to encrypt something with the knowledge that I can decrypt the file in maybe 5 years time, possibly using a different OS (it will still be Linux based, though) or platform. At least MD5 and SHA256 are both standardized algo's and produce the same result over all platforms.

What do you guys use to manually scramble your passwords?
Please don't suggest keepass2: I'm looking for simplicity. Thanks.
Write a passphrase, as in a long phrase not md5("password"), in a book if you can't remember it. Get an actual password manager rather than that amazingly convoluted and ineffective practice you're exercising already. If you're new to security then there's the regular thread to pick up the basics and ask questions. By the way op you'll get chatter with the industry in the yospos security thread.

Theris posted:

What's wrong with MD5? I mean, it turns my street's name (why are you using license plate numbers instead of something easy to remember when you're stretching it into a good password anyway? We're trying to keep things simple here!) into "0904572d42fdd0ef1cd93fb1047fe2d0." That's a great password! Look how long and random it is! And without involving super complicated hard to learn software like Keepass.

Don't make this more difficult than it has to be, just use md5.
Where the hell are you all learning this dogshit advice, nevermind being under the impression you can advocate its security impact

Adbot
ADBOT LOVES YOU

Wiggly Wayne DDS
Sep 11, 2010



DeaconBlues posted:

It wasn't a joke post. Yep, I do use a password manager (LastPass) but I knew there'd be people recommending Keepass so I mentioned I don't want to use it.

In my case I want to stretch a simple, easy to remember password into a long key. Whoever suggested that I am using multiple instances of this technique are wrong. 99% of my passwords are unique and are stored in LastPass (with 2FA via YubiKey, so don't get smart on me and keep mentioning Keepass).

The point is that I want to stretch an easy to remember brain password into a long key for use with AES encryption which I will only use on a couple of files that are important to me.
The problem is you're making an intentionally obtuse 'solution' to a problem and asking everyone why it doesn't work well. You want an actual passphrase, in other words a password: "That should be secure and not completely idiotic", "Doesn't involve key-stretching and brain passwords", "Or whatever other pseudosecurity bullshit I've picked up today".

Does that help?

Wiggly Wayne DDS
Sep 11, 2010



Antillie posted:

Well Sourceforge is the official place to get Veracrypt and Veracrypt isn't abandoned so I don't think there is anything wrong with getting it from them. Sourceforge was never the official place to get GIMP. Also the results of the code audit of TrueCrypt prove that it and by extension its open source derivatives in fact can be trusted. Stop spreading FUD.
Are you loving serious? Back up those claims.

Wiggly Wayne DDS
Sep 11, 2010



Antillie posted:

I was incorrect about VeraCrypt. It is in fact hosted at codeplex. However I did back up my claim about TrueCrypt with a link to a summary of the audit results.

So yes. I am loving serious.
You said:

quote:

Also the results of the code audit of TrueCrypt prove that it and by extension its open source derivatives in fact can be trusted. Stop spreading FUD.
The audit does not prove that, as OSI Bean Dip elaborated on.

Antillie posted:

Interesting. Still those are things that can be fixed. Serious flaws are found in software all the time. I don't see how finding OS level flaws in TrueCrypt makes it harder to trust than Firefox or Chrome. Even Bash has had serious issues over the years.
Well when the dev backs away from the project going "Don't touch this with a 10 foot pole" it changes the situation somewhat.

Wiggly Wayne DDS
Sep 11, 2010



Inspector_666 posted:

Right but why is 9521, 9533 the last pair in that guy's code?

(Is it something hilarious like him using a variable type that can't handle 5-digit numbers or something?)
It was a pool from primes <10000

Wiggly Wayne DDS
Sep 11, 2010



deep impact on vhs posted:

facebook refuses to pay out bug bounty based on arbitrary, unwritten rules: http://exfiltrated.com/research-Instagram-RCE.php
have you been near a bug bounty in your life? the man went well beyond scope and is lucky he isn't in jail

Wiggly Wayne DDS
Sep 11, 2010



deep impact on vhs posted:

considering he didn't touch any user data, only confirm he was able to pivot to a bucket containing user data, i'd say he was fairly safely within scope

now, if he had downloaded, altered, accessed or otherwise gotten at user data instead of just the bucket it was hosted on, then i'd agree with you, but it's pretty clear that he didn't

also, the timeline didn't load for me initially so i was unaware that he got paid, but i'd still say that what he found is deserving of a fair bit more than what he got
a bug bounty is a test of the perimeter, you are not allowed to go past that (or use materials you've gained from past compromises on third-party services i.e. AWS)

he kept a copy of undisclosed sensitive material for over a month after notifying them of the initial bug, then worked off of that to try and pull more payments

you'd be pushing the limits on a pentest by doing this, nevermind a bug bounty

Wiggly Wayne DDS
Sep 11, 2010



deep impact on vhs posted:

http://forums.juniper.net/t5/Security-Incident-Response/Important-Announcement-about-ScreenOS/ba-p/285554

also it turns out juniper hosed up and their netscreen vpn can potentially be MITM'd, at least that's what i'm gleaning from what i've seen so far
intentionally planted source code causing a security compromise for admin access and vpn decryption. you can also glean that their largest customer is SWIFT, and the attackers are very likely to be outside the scope of possible defenses given the resources this must have taken. i wouldn't call it them loving up, if anything good on them for finding a backdoor and disclosing that to their customers rather than talking around the issue

Wiggly Wayne DDS
Sep 11, 2010



Rakthar posted:

I seem to be able to understand that guy's question, and you seem to be struggling. Is there a reason for this?
You're not willing to try and understand a concept, so are taking shortcuts to avoid the tough questions?

Wiggly Wayne DDS
Sep 11, 2010



Rakthar posted:

So by being able to parse a fairly simple question, I am taking shortcuts to avoid asking tough questions? Uhh, what?
This is called a shortcut:

Rakthar posted:

You can substitute the word "targeted attack" for APT when you see the term if you want to:

(A) get the gist of what the person is saying
(B) not make a giant production over the stupid "WHAT IS AN APT REALLY?" argument
You're substituting a phrase for an entirely different one, while avoiding talking about what the original phrase means, or explaining why your substitution was appropriate and accurate.

Rakthar posted:

Like, if a guy comes into the infosec thread and asks a simple question about dns malware, such as whether using DNS callbacks for C2 communications is prevalent among commodity malware these days or whether it's generally the hallmark of targeted attacks, seems straightforward. Or can you guys not parse that simple of a question?

[edit]Really, my credentials on APT for a freaking acronym holy hell.
You opted into answering the question, don't be surprised if you get replies back. No one asked you for credentials, and you are entirely missing the point of the original question.

Wiggly Wayne DDS
Sep 11, 2010



Rakthar posted:

Are you familiar with the term 'paraphrase'


I don't know what the gently caress you're saying to me in this exchange, and I have a feeling you don't either. A guy asked a pretty simple question and got told to gently caress off by someone who was too dumb to understand what he was asking. I pointed out that the question was simple and straightforward, then paraphrased the question when pressed. That's about it. Hopefully we are now on the same page and can return to the exciting topic of infosec and malware discussion.

Would either of you august gentlemen care to weigh on whether you think DNS based C2 communications are typically used in more targeted attacks as opposed to say malware that uses HTTPS based callbacks? What about malware that uses google blogs and fake webpages for C2? Or are we still ignoring that guy's question as if it can't possibly be answered?
Their question was already answered:

wyoak posted:

It's a bad acronym, but I mean high level attacks that are aimed specifically at a certain target.

Actually just ignore that part completely, how common is communication over DNS these days?

cheese-cube posted:

Not very, assuming you're referring to "tunnelling" via udp/53 for the purpose of exfil/C&C. It's extremely easy to spot and there are far better methods available.

Wiggly Wayne DDS
Sep 11, 2010



Rakthar posted:

So doesn't that seem like a really useless definition of APT? "The proper, empirical definition of APT is that this one company made up a specific term for state actors but you can only use it in their original, intended way." It was coined in a specific way, but it gets used generally.

When people use the term APT colloquially, they mean "An attack where a guy or organization is targeting me." Does that mean a guy in a chinese military center doing dumps of your dc / exchange server or does it mean a russian crimeware guy trying to put POS malware on some system, it doesn't matter. It means that a guy is spending effort and assigning an operator to accomplish a task.

And yes, in general, I do feel there is a correlation between the evasion techniques being used and whether an attack is targeted or not. "Good enough" is the motto for obfuscation and, in general, obfuscation techniques are not used where they will add unnecessary complexity or where they threaten to burn a technique through common usage that is not worth coming up with countermeasures for.

You should not expect to see any DNS based C2 communication with things like cryptolocker. If you are seeing DNS based C2 communication, you probably aren't dealing with cryptolocker.

This answer:


So I think this answer is worth clarifying. Using UDP 53 for large data transfers is basically unheard of, yes. However, using DNS queries to both send and receive commands to compromised hosts is quite common and effective, simply because there's so many DNS queries to hide in and most DNS servers do not (did not) log queries due to performance and disk issues.

Here's a writeup on DNS based C2:
https://zeltser.com/c2-dns-tunneling/
If you're going to clarify something have the decency to tell someone you have no experience or knowledge on the subject. Your post is a mix of the obvious, the misguided, and the ignorant and attempting to give a point by point breakdown is a waste of everyone's time. As a starter though the evasion technique parts goes without saying, then you suddenly limited the class of malware using dns tunneling to ransomware, and finish it off by clarifying on how a port being used for large data transfers is "unheard of", then immediately contradict yourself.

Wiggly Wayne DDS fucked around with this message at 03:21 on Dec 18, 2015

Wiggly Wayne DDS
Sep 11, 2010



Lastpass has had too many dumb security issues. Use 1password or KeePass.

Wiggly Wayne DDS
Sep 11, 2010



Inspector_666 posted:

I also only know of one "breach" that Lastpass has had, and all it did was release stuff that's already encrypted up the wazoo.
Here's a rundown of an audit publicised last month: http://www.martinvigo.com/even-the-lastpass-will-be-stolen-deal-with-it/

Alereon posted:

KeePass requires your own db management solution and 1password requires you to purchase a separate license for every platform, both of which are dealbreakers for most normal people. If you are a nerd and a local db works for you then not trusting anyone else with your data is obviously safest.
Those are issues for people needing multi-platform solutions, I doubt that is the majority of the userbase and doesn't excuse using an insecure manager.

Wiggly Wayne DDS
Sep 11, 2010



Alereon posted:

Lastpass isn't insecure, it just makes intelligent default choices to balance security and convenience for its users. Most people want features like trusted devices and offline access to their vault., and if you don't no one makes you keep them enabled.
Did you read the audit at all?

Wiggly Wayne DDS
Sep 11, 2010



Inspector_666 posted:

Isn't the entire draw of cloud-based password managers multi-platform support?
We were talking about password managers in general, not specifically narrow cases where your software options are limited.

Wiggly Wayne DDS
Sep 11, 2010



Alereon posted:

Yes, it says that if credentials are saved locally to your machine, then an attacker with access to your machine may be able to gain access to your Lastpass vault data and account. This is not the threat model most people care about, and anyone that does can mitigate it by making changes to their account settings. Honestly dude you are making mountains out of molehills, Lastpass is compellingly better than the alternatives for everyone that isn't an autist and doesn't want to buy an app once for every platform they own.
If your password manager, by default, has an unencrypted key stored (dOTP) that can be used to authenticate, obtain the encrypted vault key, decrypt the vault key, bypass IP restrictions, bypass 2FA and relies on local storage being impenetrable then you've got a bit of a design flaw. We've seen the damage in the past when Lastpass had an XSS problem that let an attacker grab any plaintext passwords from a vault silently. You're not storing your vault on a single system by virtue of using Lastpass so that is not the only possible angle of attack, and based on prior issues I can't comfortably advise people to use it for secure password storage. Especially given their response to the issues presented.

Wiggly Wayne DDS
Sep 11, 2010



Alereon posted:

You are inventing fake concerns. The default configuration of Lastpass does not protect you from an attacker with access to your machine, because that is not a relevant threat for most users and changing the way the software works to protect against that would require usability compromises that are unacceptable to most users. Users for whom those compromises ARE acceptable can change their account settings, or hell just use KeePass if they care that much.
Lastpass is explicitly made to have your vault stored on more than one device, with them having a copy. There is more than a single machine at risk, and users are not the ones who should be trusted to set security policies. This is why secure defaults are increasingly becoming the norm as it turns out no one reads the manual or understands the risks involved. If you're going to say I'm "inventing fake concerns", then back up your "most users" statements over the last page as I think one of us has a stronger basis for reality than the other.

quote:

KeePass is worthless for average users because it requires you to roll your own db storage and synchronization solution. Saying "just use dropbox" is great for autists who want to live independently, but it's absolutely not a solution that Just Works in the way Lastpass does. You're a smart guy, you know all this, so I don't get why you won't accept that LastPass offers the best balance between security and usability for most people. Let's be real, features like offline access
"Just Works" isn't a security concept. You may like those features but that doesn't make them the main reason a user uses software - accessibility and prominence in the landscape are major considerations. Consider how often you've pushed LastPass without finding out if a user needs to have vault access on more than one machine. Is the user making an informed decision across these products, or is their decision making impacted by other peoples' biases?

Wiggly Wayne DDS
Sep 11, 2010



Alereon posted:

Your post describes some very vague and not-at-all-compelling reasons why people should be cautious about trusting their data to Lastpass. And yes, any security professional (or someone who plays one on the Internet) is perfectly capable of setting up their own cloud-based db synch solution, but those security professionals aren't asking for advice on how to manage their passwords. Someone who asks security professionals what password management solution to use should be directed to Lastpass.
They absolutely should not and security professionals do talk to each other about security products - they're users too.

quote:

Here's the problem. Convenience is so vastly more important than your theoretical security concerns that I am stunned we are still having this discussion. This fact has been a foundational principle of information security practices for quite some time. This is because users will work around inconvenient practices with MUCH less secure practices, such as how users respond to strong password requirements by reusing passwords. This is why the priority when creating a process for users MUST be that the process be so convenient users will never be tempted to work around it.
Well no poo poo, the problem is at no point have you backed up that the average user needs this particular feature set - or that leaving a file in a dropbox folder is requiring technical proficiency of an autist. For all my fake concerns, you aren't showing any of yours to be real.

Wiggly Wayne DDS
Sep 11, 2010



wyoak posted:

How many people who had a friend recommend KeePass/Dropbox are going to upgrade KeePass if a vuln is discovered?
If this is going into arguments over auto-updating then:

KeePass FAQ posted:

Why does KeePass try to connect to the Internet?

KeePass has an option to automatically check for updates on each program start. In order to check for updates, KeePass downloads a small version information file and compares the available version with the installed version. No personal information is sent to the KeePass web server.

Automatic update checks are performed unintrusively in the background. A notification is only displayed when an update is available. Updates are not downloaded or installed automatically.

The option is disabled by default. You can enable/disable it in 'Tools' -> 'Options' -> tab 'Advanced'.
Otherwise the arguments devolves into implementation differences and how similar vulnerabilities on each platform have different impacts.

Marinmo posted:

They won't, so in the end they'll end up less secure than Lastpass users since the latter are always running the latest version. Further, I'm not so sure he read the end of his gospel the very audit he posted [EDIT: sorry, that wasn't him, to be fair they kinda seem to agree though], the part where it says "To finish, we want to point out that the security team at LastPass responded very quickly to all our reports and lot of the issues were fixed in just a couple days. It was very easy to communicate and work with them.". That's professional - no system is 100 % secure and the response to the flaws discovered in it tells you a lot about how you can expect those and future issues to be addressed. Convenience and security will always be polar opposites, but too much of either will just tip the scale towards less security anyway. Lastpass generally strikes the perfect balance for everyone who doesn't fancy child pornography or work for the NSA.
Convenience and security are not polar opposites. There's a balancing act on the high-end of the spectrum, but you can design a system that is secure by default, and is convenient for the end-user. If they were polar opposites then browsers would be getting far more inconvenient as security's improved, when the opposite has happened. As far as the statement you quoted it's a standard blurb for showing that the company receiving the report didn't immediately bring out the lawyers, and that other researchers don't need to worry when coming forward. It doesn't answer the response where they ignored half the issues.

If you're looking for a password manager there are far better alternatives, but if you're that much of a fan of the product that you ignore security issues in a security thread then we're well past the point of discussion.

Wiggly Wayne DDS
Sep 11, 2010



Rufus Ping posted:

Same - I hadn't heard of Facebook before but after a quick poke around their home page they get my seal of approval

Wiggly Wayne DDS
Sep 11, 2010



ItBurns posted:

Noted.

Edit:

You also ignored my post, especially why you should funnel your communications, encrypted or not, through fb's servers, when they have at the very least the ability to log them and tie them with other information.

Fake second edit: Also try to post your replies here and not in yospos so I don't have to hunt for them.
He'll post where he pleases, and be glad you're getting such precise answers to your inane opinions

Wiggly Wayne DDS
Sep 11, 2010



co199 posted:

I would qualify this by saying "you shouldn't be running antivirus as a primary line of defense in 2016". There are some use cases for it, but it's better supplemented with additional tools (on endpoints at least).
The current use cases for AV are checking a box on audits and providing an entrypoint for everyone else.

co199 posted:

I can point to a real world example with a customer I just finished working with that had no security software on approximately 1000 endpoints in a healthcare environment, even though they had a standing contract with a major AV vendor. They didn't replace AV with anything, they just didn't have anything on their systems. When they got hit by a 7-year-old worm and came screaming to us, we pointed out that the exact hashes they had would have been picked up by their AV solution and they really had no excuse as to why it hadn't been deployed.
7 year old worm? So they weren't keeping systems up to date, don't expect any security software on those machines to have up to date definitions if they were deployed. What services were you offering the client in this case, and how was remediation handled?

co199 posted:

Traditional AV is on life support, but as a last line of defense (e.g. if AV detects something you're already hosed but maybe it might save you a little bit) it's worth having.
It's not worth having and we've been beating the drum on this for over a decade, the highlighted vulnerabilities lately are showing that the situation (as usual) is much worse than anyone considered. The joke is the security software wasn't getting seriously audited as no professional wants it near their machine.

co199 posted:

EDIT: I should note that there were a lot of internal politics that led to that decision (due to acquisitions and such) but people are literally taking the saying "AV is dead" at face value and running with nothing, in the real world, in 2016. The security industry needs to be careful about what they soapbox.
The soapbox you should be more concerned about is a one-stop protection suite for families and small companies around the world that convinces them to hand over money for reduced security. It's been said before but it's going to take at least a worm before anyone stops and takes note of the underlying issue.

Wiggly Wayne DDS
Sep 11, 2010



Paul MaudDib posted:

If they have professional experience, why don't they do more than ask me how antivirus works? I explained it to them, and they said "nah" and asked again. I read the thread they told me to read and their explanation was that the NSA was gonna blast right through consumer antivirus and I guess their edge filtering was gonna stop the NSA in their tracks or something.

lol OK
You might want to stop doubling down sometime soon, you showed your hand a while ago.

Wiggly Wayne DDS
Sep 11, 2010



Paul MaudDib posted:

e: Furthermore, security by infinitesimal user-base is not a viable defense mechanism. Seriously, this thread - "forget antivirus, just install gentoo on grandma's computer" :lol:
Do you have selective hearing, or are just wilfully dense at this point?

Subjunctive posted:

My company has > 10K end-user machines and we don't run AV.

But I'm curious: what would you do that would replace AV but be really expensive?

Wiggly Wayne DDS
Sep 11, 2010



Paul MaudDib posted:

For real though I appreciate that antivirus is a layer that can have its own vulnerabilities, but the number of critical vulnerabilities in a given antivirus package is much less than the number of vulnerabilities in software that is corralled within an AV perimeter. There's been like what, 2 escalation or escape attacks within a year? Versus how many exploits of software installed on client endpoints? It's probably less than a half-dozen total.

There's what, that one Xen escape, and like one Norton escape that got posted a while back, or something? How many peripheral Windows escalation/escape exploits and poo poo have been discovered within the same timeframe? And how many exploits of random applications?
ahahahahaha

Wiggly Wayne DDS
Sep 11, 2010



If you've not paid attention to AV vulns lately we're pointing at zero interaction pre-auth rces to system - not lpes. That or destroying any concept of cert validity. Worse than the disease.

Wiggly Wayne DDS
Sep 11, 2010



It's heuristics with marketing, and they refuse to give anyone access to analyse it without signing a NDA

Wiggly Wayne DDS
Sep 11, 2010



They're claiming it's an additional cache from the 2012 breach

Wiggly Wayne DDS
Sep 11, 2010



not apt enough

Wiggly Wayne DDS
Sep 11, 2010



Great so what does this have to do with infosec? Your privacy is a different subject entirely and you can go yell about it in D&D.

Wiggly Wayne DDS
Sep 11, 2010



Dylan16807 posted:

You can rowhammer from javascript, which is enough to keep it in mind as a threat.

Mostly I look at it as one more reason to hope it stops being such a pain to get ECC memory on desktops/laptops.
ECC doesn't solve the problem, just means you have to flip it in the correction memory. Manufacturers are looking into getting it fixed at the source, but so far their fixes have focused on making it harder than impossible. Custom bios with half the refresh rate for your RAM to shorten the window, but effect longevity and power consumption. Manufacturer fixes (if even complete) will require you to buy new hardware and good luck finding if your hardware is safe in advance.

ultramiraculous posted:

No but, for real, is there a reason every endpoint shouldn't be implementing in-memory heuristics to catch this kind of behavior? If it affects VMs, should we be worried about our Mac users running MS Office images?
There are patterns (specific intense adjacent read patterns w/ specific instructions) that sandbox/kernel devs try to neuter, and have been applied for the JS-example so far. It shouldn't be handled by endpoint-specific software really outside of your Kernel/VM/Sandbox dev.

This is working from my memory of the issue, and undoubtedly more has come to light since then. One thing to keep in mind is that the kernel/sandbox fixes aren't necessarily comprehensive - it's not difficult to break a PoC, but the underlying issue is another story.

BangersInMyKnickers posted:

They're really glossing over that they're doing this on non-ECC DIMMs. I don't think they've managed anything beyond crashing the hypervisor on ECC memory, even DDR3.
I'm also not aware of an ECC demo, just the researchers stating that ECC doesn't fix the issue and is still vulnerable.

Wiggly Wayne DDS
Sep 11, 2010



Wiggly Wayne DDS posted:

If your password manager, by default, has an unencrypted key stored (dOTP) that can be used to authenticate, obtain the encrypted vault key, decrypt the vault key, bypass IP restrictions, bypass 2FA and relies on local storage being impenetrable then you've got a bit of a design flaw. We've seen the damage in the past when Lastpass had an XSS problem that let an attacker grab any plaintext passwords from a vault silently. You're not storing your vault on a single system by virtue of using Lastpass so that is not the only possible angle of attack, and based on prior issues I can't comfortably advise people to use it for secure password storage. Especially given their response to the issues presented.

NFX posted:

Is LessPass and LastPass the same thing?
more or less

Wiggly Wayne DDS
Sep 11, 2010



well no. limited amount of 'unique' quotes/lyrics

if it's a random word list then each word is functionally a character when bruteforcing (given a public list)

Wiggly Wayne DDS
Sep 11, 2010



we just went over how 'higher entropy' ignores that you're changing the construction of your password inherently

Wiggly Wayne DDS
Sep 11, 2010



welcome to passphrases, for when you can't use a password manager

Wiggly Wayne DDS
Sep 11, 2010



CLAM DOWN posted:

Fair, but a software solution is far more flexible and powerful, because you can customize what you allow and what you don't on which system. However you're absolutely right, and only a physical block like glue would stop that.
a software solution is another point of failure in your security model, do it properly or not at all

Wiggly Wayne DDS
Sep 11, 2010



well no poo poo you tailor the solution based on the business needs, but don't say a software solution is more flexible and powerful when it's lax and vulnerable

Wiggly Wayne DDS
Sep 11, 2010



if you're at the stage where gluing the port is an option then you may want inflexibility in your security model, you're also locking the keyboard/mouse into the port with the machine in a sealed unit

Adbot
ADBOT LOVES YOU

Wiggly Wayne DDS
Sep 11, 2010



CLAM DOWN posted:

Ok fine, the term "powerful" needs more meaning than that, but 100% it's more flexible, gluing a port shut is about as inflexible as you can get...


e: actually gently caress that, a software solution absolutely can be "powerful", you're being wrong by immediately dismissing any software option as "lax and vulnerable", I'm curious what products you've actually tried and used in production
as a rule endpoint protection software is primarily designed for locating leaks and reporting unauthorised usb storage devices. they are not designed for dealing with attacks outside of these boundaries

here is sopho's device control: https://community.sophos.com/kb/en-us/64174

quote:

Device Exemptions

Each device type supports both device instance and model exceptions. This means that a USB key which belongs to a given individual can be exempted from the removable storage block policy. It also means that all (for example) Verizon USB modems could be exempted by model type from the modem block policy. Exceptions can be commented so it’s easy to record who requested the exception and when.

Exceptions are made easy to manage using the device control event viewer. This is a new reporting tool available within Enterprise Console. It enables you to quickly filter events generated by the device control policy. Events generated by devices being blocked can then be used to authorize those devices.

Note: Exempting individual devices is based on the device having a unique device instance ID. See article 110566 for more information.
the 'unique device ID' is manufacturer-set and any whitelisted usb can be cloned, nevermind the model whitelisting

then there's the other kind of 'endpoint protector', meet cososys' endpoint protector:

quote:

The extended use of portable devices has not only increased the efficiency and mobility of our daily work tasks but, at the same time has posed another significant threat to companies' data security. USB devices and other portable devices, although small and at a first glance harmless, are one of the top causes for security incidents with millions of dollars in losses for the business. The need for controlling the use of devices in corporate environments has become nowadays a must in order to keep up with latest security challenges.

The Device Control module allows monitoring, controlling or blocking USB storage devices and peripheral ports. It prevents data loss and data leaks, ensuring compliance, while also preventing the spread of USB malware and viruses. Being a cross-platform solution, it can be deployed into any type o network as a hardware appliance, virtual appliance or cloud-based solution, protecting Windows, Mac, and Linux endpoints.

While Device Control provides the first layer of security, the Content Aware Protection module is also available.
sounds great on paper right?

https://www.kb.cert.org/vuls/id/591667

quote:

CoSoSys Endpoint Protector 4 appliance contains a predictable password for root-equivalent account vulnerability
...
According to the CoSoSys's website the Endpoint Protector 4 appliance is a DLP product used to prevent users from taking unauthorized data outside the company or bringing potential harmful files on USB devices, files which can have a significant impact on your network’s health. The CoSoSys Endpoint Protector 4 appliance contains a predictable password for root-equivalent accounts. The activation script sets the password to the EPProot account to a password based on the sum of each number in the appliance's serial number. The script cuts the serial number (10 numeric characters) out of a file and then adds each character together to populate the $SUMS variable. Then "eroot!00($SUM)RO" where $SUM is a number presumably from 0-90 (9*10) is set as the password for the epproot account. There are only 90 unique combinations so it can be brute-forced.

https://www.sec-consult.com/fxdata/..._v10_wo_poc.txt

quote:

Vulnerability overview/description:
-----------------------------------
1) Unauthenticated access to statistics / information disclosure
Unauthenticated users can access server statistics. These statistics give
details about the webserver status (nginx_status) as well as system level
information (munin system monitoring).

2) Unauthenticated SQL injection
Unauthenticated users can execute arbitrary SQL statements via a vulnerability
in the device registration component. The statements will be executed with the
high-privileges of the MySQL user "root". This user has permissions to read and
write files from/to disk.

3) Backdoor accounts
Several undocumented operating system user accounts exist on the appliance.
They can be used to gain access to the appliance via the terminal but also
via SSH.
it's just like antivirus software, improving security by opening doors

Wiggly Wayne DDS fucked around with this message at 19:37 on Nov 22, 2016

  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply