perfsonar-user - [perfsonar-user] DEFCON Presentation on perfSONAR Vulnerabilities
Subject: perfSONAR User Q&A and Other Discussion
List archive
- From: Mark Feit <>
- To: "" <>, "" <>
- Subject: [perfsonar-user] DEFCON Presentation on perfSONAR Vulnerabilities
- Date: Wed, 10 Aug 2016 16:32:36 +0000
- Accept-language: en-US
- Authentication-results: internet2.edu; dkim=none (message not signed) header.d=none;internet2.edu; dmarc=none action=none header.from=internet2.edu;
- Ironport-phdr: 9a23:XLLbEBPklEn0OBzuZwsl6mtUPXoX/o7sNwtQ0KIMzox0KPv7rarrMEGX3/hxlliBBdydsK0UzbeN+Pm9EUU7or+/81k6OKRWUBEEjchE1ycBO+WiTXPBEfjxciYhF95DXlI2t1uyMExSBdqsLwaK+i76vnYuHUC1LQdvKP/yHIfIys2x0eev/ZbeSwROmDenZ75udlO7oRib/p0OjJFsMaE3wwGMq31OfPlQzm5AJFSPkgz669vqupNv7nIU87g5+tROSqL8dr59UKdVFhwnNXw4/svmqUOFQAeSrDNISmgMnAFPBQHfqQzhU43Zsy3mu/B71TXAe8D6UOZndy6l6vJOQQXrwAkKNiJxpGTZh81spKNdvB+7oRFjmcjZbJzDZ6k2Rb/UYd5PHTkJZc1WTSEUWo4=
- Spamdiagnosticoutput: 1:0
At the DEFCON conference in Las Vegas last week, Luke Young gave a presentation entitled
Attacking Network Infrastructure to Generate a 4 Tb/s DDOS for $5 which outlined a trio of vulnerabilities in perfSONAR. The development team has fielded questions about it, so for everyone’s benefit, here is a summary of the vulnerabilities and the
current status of each: Remote command execution (RCE) in a CGI script: This vulnerability was discovered earlier and eliminated when perfSONAR 3.5.1 was released in March. XML external entity (XXE) in OPPD: This vulnerability required that OPPD be running as the superuser, which is not its usual mode of operation. Launching an attack of the magnitude described in the presentation
would require that configuration on a large number of nodes. It was eliminated within hours of Mr. Young making us aware of its existence, and the updated software was announced the same day (July 7). Privilege escalation in the configuration daemon: This vulnerability required shell access to the system to exploit. It was eliminated within hours of Mr. Young making us aware of its existence, and
the updated software was announced the same day (July 7). All auto-updating perfSONAR systems were no longer subject to exploits of these vulnerabilities as of July 7. The development team will continue to be on the lookout for bugs in perfSONAR and will continue to promptly patch those we discover or are brought to our attention. We would like to thank Mr. Young for sharing
his discoveries with us. Links: July 7 patch announcement:
https://lists.internet2.edu/sympa/arc/perfsonar-announce/2016-07/msg00000.html Archive of perfSONAR vulnerabilities which have been discovered and patched: http://www.perfsonar.net/deploy/vulnerability-archive. Mr. Young’s presentation (on the DEFCON web site): https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Luke-Young-The-4TbS-Ddos-For-5-bucks.pdf |
- [perfsonar-user] DEFCON Presentation on perfSONAR Vulnerabilities, Mark Feit, 08/10/2016
- [perfsonar-user] Re: [perfsonar-announce] DEFCON Presentation on perfSONAR Vulnerabilities, Luke Young, 08/24/2016
Archive powered by MHonArc 2.6.19.