the impact of heartbleed
play

THE IMPACT OF HEARTBLEED Performed regular vulnerability scans - PowerPoint PPT Presentation

- 682: :B UGS T HE M ATTER OF H EARTBLEED U NDERSTANDING THE R EPRODUCIBILITY


  1. Πανεπιστήμιο Κύπρου - Τμήμα Πληροφορικής ΕΠΛ 682: Προχωρημένα Θέματα Ασυάλειας ΘΕΜΑ :B UGS Αδάμος Κουμή

  2. T HE M ATTER OF H EARTBLEED U NDERSTANDING THE R EPRODUCIBILITY OF C ROWD - REPORTED S ECURITY V ULNERABILITIES

  3. M EMORY E RROR V ULNERABILITY  Security vulnerability allows attackers to manipulate in-memory content to crash a program, or obtain unauthorized access to a system.  Memory error vulnerabilities such as ―Stack Overflows‖, ―Heap Overflows‖, and ―Use After Free‖ have been ranked among the most dangerous software errors. 3

  4. T HE M ATTER OF H EARTBLEED *Z. Durumeric 1 , J. Kasten 1 ,D. Adrian 1 , J. A. Halderman 1 ,M. Bailey 1,2 ,*F. Li 3 , N. Weaver 3,4 , J. Amann 4 , J. Beekman 3 , M. Payer 3,5 , V. Paxson 3,4 1 University of Michigan , 2 University of Illinois, Urbana Champaign 3 EECS, University of California, Berkeley, 4 International Computer Science Institute, 5 Purdue University

  5. T HE M ATTER OF H EARTBLEED  On April 7 2014, OpenSSL project publicly disclosed the Heartbleed vulnerability.  Β ug στην υλοποίηση του TLS Heartbeat Extension.  Vulnerability επέτρεπε στους επιτιθεμένους να διαβάσουν προστατευόμενη μνήμη από τους εξυπηρετητές( servers) αλλά και τους πελάτες( clients). 5

  6. B ACKGROUND  OpenSSL: open-source cryptographic library that implements the SSL and TLS protocols  The Heartbeat Extension:  Either end-point of a TLS connection detects whether its peer is still present.  Motivated by the need for session management in Datagram TLS (DTLS).  Not require for Standard implementations of TLS(use tcp for session management ) 6

  7. H EARTBEAT E XTENSION  Peers indicate support for the extension during the initial TLS handshake.  Following negotiation, either end-point can send a HeartbeatRequest message to verify connectivity. 7

  8. N ORMAL H EARTBEAT Heartbeat Request 01 2 hi e7f0n2...... Type Length Payload Random padding Heartbeat Response 02 2 hi dc0n2...... Type Length Payload Random padding 8

  9. H EARTBLEED V ULNERABILITY  OpenSSL Heartbeat Extension Vulnerability, allowed either end-point to read data following the payload message in its peer’s memory .  How?  Specifying a payload length larger than the amount of data in the message.  Bug : The peer trusts the attacker-specified length of an attacker-controlled message. 9

  10. H EARTBLEED V ULNERABILITY Heartbeat Request 01 64kb hi e7f0n2...... Type Length Payload Random padding Attacker Heartbeat Response 02 64kb hi,username, private dc0n2...... cryptographic Keys…………….. Type Length Payload Random padding 10

  11. H EARTBLEED T IMELINE  21 /03 Neel Mehta of Google discovers Heartbleed  21/03 Google patches OpenSSL on their servers  01/04 Google notifies the OpenSSL core team  02/04 Codenomicon independently discovers Heartbleed  03 /04 Codenomicon informs NCSC-FI National Cyber Security Centre Finland  06/04 OpenSSL notifies several Linux distributions  07/04 NCSC-FI notifies OpenSSL core team  07/04 OpenSSL releases version 1.0.1g and a security advisory 11  08/04 Al-Bassam scans the Alexa Top 10,000  09/04 University of Michigan begins scanning

  12. S OLUTIONS  Patch: Discards the HeartbeatRequest, if the payload length field exceeds the length of the payload.  Recompile OpenSSL, with the handshake removed from the code by using compile time option -DOPENSSL_NO_HEARTBEATS. 12

  13. THE IMPACT OF HEARTBLEED  Performed regular vulnerability scans against:  Alexa Top 1 Million domains 1% samples of the public, non-reserved IPv4 address space.   Every 8 hours. Between April 9 - June 4  Scanning Methodology  Modifying Zmap to send Heartbeat requests  with no payload  no padding,  zero length  TLS, DTLS these requests should be rejected.  Vulnerable versions of OpenSSL send a response containing only 13 padding.

  14. S CANNING M ETHODOLOGY Heartbeat Request 01 0 Type Length (no (No padding) data) Heartbeat Response 02 0 dc0n2...... Type Length (no data) Random padding 14

  15. A LEXA T OP 100 All of the Alexa Top 100 websites were patched within 48 • hours of disclosure. At least 44 of the Alexa Top 100 websites were vulnerable. • Combining press releases, Mashable’s report, and Al- Bassam’s scan  15

  16. E STIMATING I NITIAL I MPACT  Upper bound 60% of HTTPS sites support the Heartbeat at most about extension 55% of the HTTPS sites in the Alexa Top 1 Million were 91% of these were initially vulnerable powered by known vulnerable web servers 16

  17. E STIMATING I NITIAL I MPACT  Lower bound TLS 1.1 and 1.2 — features introduced in OpenSSL 1.0.1 with the Heartbeat Extension. At least about 24% of the HTTPS sites in the Alexa 32.6% sites supported TLS 1.1 or 1.2. Top 1 Million were initially vulnerable 72.7% used known vulnerable web servers 17  Estimate -> 24 – 55% of HTTPS servers in the Alexa Top 1 Million were initially vulnerable

  18. V ULNERABLE D EVICES AND P RODUCTS  Heartbleed affected embedded systems.  Communication Servers : Zimbra collaboration iPECS VoIP systems, and Polycom and Cisco video conference products.  Software Control Panels : Puppet Enterprise Dashboard, IBM System X Integrated Management Modules control panel, VMWare servers, Parallels control panels for Plesk .  Network Attached Storage : QNAP, D-Link, ReadyNAS, LaCie, Synology, and Western Digital NAS devices.  Firewall and VPN Devices : Cisco, SonicWALL, WatchGuard, OpenVPN  Printers : Dell, Lexmark, Brother, HP printers.  Miscellaneous : Hikvision and SWANN security cameras , AcquiSuite 18 power monitors , SpeedLine Solutions ( Pizza POS System‖)

  19. O THER I MPACTS  Mail Servers: Can use TLS for transport security via usage of a  StartTLS directive within a plaintext session.  Scanned a random 1% sample of IPv4 address space for vulnerable SMTP servers.  45% providing SMTP+TLS supported the Heartbeat Extension. 19  7.5% were vulnerable to Heartbleed.

  20. O THER I MPACTS  Tor relays and bridges use OpenSSL to provide TLS- enabled inter-relay communication.  April 10 scan (3 days after announcement of the vulnerability)  Found that 97% of relays supported Heartbeat.  48% of the relays remained vulnerable at that time.  The vulnerability allowed an attacker to  extract both short-term onion and long-term identity keys.  intercept traffic and impersonate a relay.  Tor client Vulnerability allowing entry guards to read sensitive  information from a client’s memory , such as recently visited 20 websites.

  21. O THER I MPACTS  Bitcoin Clients/ Exchanges  Bitcoin software from May 2012 to April 2014, used a vulnerable OpenSSL version.  After Heartbleed’s disclosure, a new Bitcoin version was released linking to the newly patched OpenSSL version.  Heartbleed allowed attackers to:  compromise wallets  retrieve private keys  12 customers had a total of 28 BTC ( ⇡ $6,500) stolen from 21 BTCJam after account credentials were compromised.

  22. O THER I MPACTS  Android  Heartbleed only affected Android version 4.1.1.  Google estimated that 33.5% of all Android devices currently running Android 4.1.  A vulnerable device would have been susceptible to having memory read by a malicious server. 22

  23. O THER I MPACTS  Wireless Networks  Extended Authentication Protocol  framework for wireless network Authentication use TLS  Heartbleed allowed attackers to retrieve network keys and user credentials from wireless clients and access points. 23

  24. P ATCHING BEHAVIOR Alexa Top 1 Million sites patched within the first week , 24 the patch rate quickly dropped after two weeks.

  25. C ERTIFICATE R EPLACEMENT  Heartbleed allowed attackers to extract private cryptographic keys.  Security community recommended that:  Administrators should generate new cryptographic keys  Revoke compromised certificates  To track which sites replaced certificates and cryptographic keys they combined data from  Heartbleed scans,  Michigan’s daily scans of the HTTPS ecosystem , 25  ICSI’s Certificate Notary service

  26. C ERTIFICATE R EPLACEMENT  Less than 40% of Alexa Top 1 Million sites replaced certificates in the week following disclosure.  Only 10% of the sites that were vulnerable, 48 hours after disclosure replaced their certificates within the next month.  Of those that did, 14% re-used the same private key , gaining no actual protection by the replacement.  Only 19% of the vulnerable sites that did replace their certificates, revoked the original certificate in 26 the same time frame.

  27. A TTACK SCENE  They analyzed who was scanning for the Heartbleed vulnerability by examining network traffic collected from passive taps at  Lawrence Berkeley National Laboratory (LBNL),  International Computer Science Institute (ICSI)  National Energy Research Scientific Computing Center (NERSC),  honeypot operated on Amazon EC2.  To detect Heartbleed scanning, they extended the Bro’s SSL/TLS analyzer to recognize Heartbeat messages 27

Recommend


More recommend