SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
https://lepidum.co.jp/ Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.
From an Experience of
Reporting a Vulnerability
- Case of CCS Injection -
Tatsuya HAYASHI (@lef)
Kaoru Maeda (@mad-p)
Lepidum Co. Ltd.
"SSR 2015" (2015/12/15)
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Agenda
 CCS Injection Vulnerability
 How did we find it?
 Reporting a Vulnerability
 Disclosing a Vulnerability
 Lessons Learned
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Focus Area | Lepidum
 Applied Research and Development
 Personal Data, Digital Identity and Privacy
 Secure and Safety Software Technology
 Web and Internet Technology
 De-Facto and Forum Standardization
 Keywords:
 Personal Data, Trust Framework, Privacy, ID Federation,
Authentication/Authorization, Protocol Specification,
* of Things(IoT, WoT), Software Defined Network,
Autonomic Network, etc...
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
CCS INJECTION
VULNERABILITY
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
CCS Injection Vulnerability
CVE-2014-0224 (June 2014)
 CCS = Change Cipher Spec
 Early CCS Attack
 http://ccsinjection.lepidum.co.jp/
1. MITM crafts a CCS too early than expected
2. OpenSSL accepts it without necessary validation
3. Cipher Suites changed with uninitialized
parameters
4. MITM can decrypt all the traffic
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
How was it found?
Masashi Kikuchi (reporter) thought
 Wanted to create a formal verification for that
 Peeked into existing implementations
 Found a flaw in OpenSSL's validation
Most complex transitions in the
SSL/TLS statemachine:
handle ChangeCipherSpec
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Reporter's intial motivation
 Everyone competes to hunt bugs. I
want to do it efficiently
 Want to use Coq somewhere
 Select a suspicious module by
experience
 Want a clue to understand code that is
difficult
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Reporter's intial motivation
 Everyone competes to hunt bugs. I
want to do it efficiently
 Want to use Coq somewhere
 Select a suspicious module by
experience
 Want a clue to understand code that is
difficult
But,
he didn't need
even Coq
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
A VULNERABILITY:
REPORTING AND DISCLOSING IT
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
To whom should it be reported?
 In Japanese or in English?
 OpenSSL?CERT?
 Correct impact analysis done?
 Is our analysis correct, in the first place?
 PoC attack
 Information control intra company
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
After reported...
 Prepare against possible 0-day attacks
 We could not do anything than just wait for a
response
 We could not ask to/discuss with other
organizations
 Employees are instructed not to talk about it
 We could not believe that "our reporting
process is correct" without an response
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
After reported...
 Prepare against possible 0-day attacks
 We could not do anything than just wait for a
response
 We could not ask to/discuss with other
organizations
 Employees are instructed not to talk about it
 We could not believe that "our reporting
process is correct" without an response
Bitter days
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
What we have done: Blog it
 Take a new domain (against domain dropping)
 Do not place any ads (better trust)
 Prepare for high loaded access
 Selecting a CDN
 Cacheable blog pages
 Test that the pages and CDN work, without disclosing
 Review how to update the pages
 Collect and manage incoming updates
lessons
learned
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
What is the right way to disclose it?
 No one actually tell us the best practice
 Schedule an announcement
 Domain name gives a hint about the
vulnerability. DNS settings delayed
 ccsinjection.lepidum.co.jp
 No rules, no guidelines
 Commonsense ⇒ What's that?
lessons
learned
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
The day it announced
 Disclosure date is told, but not the time
 No one (incl. CERT) tells the reporter exactly when the CVE
appears
 Inqueries, interviews
 Media handling, English support, customers, SNS...
 The Guardian, New York Times, etc...
 "Proper" interviews and not
 Explain to customers what we have done
 Fortunately, we had blog pages!
 Updates
 Catch up with software updates, etc.
 Distinguish suggestions from experts and non-experts
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
The day it announced
 Disclosure date is told, but not the time
 No one (incl. CERT) tells the reporter exactly when the CVE
appears
 Inqueries, interviews
 Media handling, English support, customers, SNS...
 The Guardian, New York Times, etc...
 "Proper" interviews and not
 Explain to customers what we have done
 Fortunately, we had blog pages!
 Updates
 Catch up with software updates, etc.
 Distinguish suggestions from experts and non-experts
A whole company work!
Daily job suspended
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
FAQ, other things to consider
 Why a logo?
 "How much did you earned from this?"
 Engineers' stresses
 Business value
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Information control
 Avoid unnecessary sense of crisis
 Deliver precise information to where necessary
 Announce counter measures when they are
ready
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Vulnerability disclosure is not easy
 Cannot call for a help,
no help comes
 We, a geek company, could do it.
We could do it because we are an organization.
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Vulnerability disclosure is not easy
 Cannot call for a help,
no help comes
 We, a geek company, could do it.
We could do it because we are a organization.
But it was
worth doing it!
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
LESSONS LEARNED
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Vulnerability and Reporting
 It comes, even when not prepared
 Do it without how-to's nor guidelines
 Prepare blog pages
 But without disclosing much before the
announcement
 Be careful when setting up CDN and DNS
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Message: Implementation is the key
Write specifications after implementing it
That way, you should know where pitfalls are
"Handle a complex protocol like TLS with Coq, you might
need an experience of implementing it"
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Please contact us
https://lepidum.co.jp/ @lepidum @lef @mad-p
mailto:{hayashi,maeda}@lepidum.co.jp

Mais conteúdo relacionado

Semelhante a From an Experience of Vulnerability Reporting

Digital, bear or just bull
Digital, bear or just bullDigital, bear or just bull
Digital, bear or just bull
Scott Rigby
 

Semelhante a From an Experience of Vulnerability Reporting (20)

For developers
For developersFor developers
For developers
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to Whatever
 
Digital, bear or just bull
Digital, bear or just bullDigital, bear or just bull
Digital, bear or just bull
 
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
 
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
 
Jim Noble SEASIM Keynote
Jim Noble SEASIM KeynoteJim Noble SEASIM Keynote
Jim Noble SEASIM Keynote
 
IT Due Diligence Overview
IT Due Diligence OverviewIT Due Diligence Overview
IT Due Diligence Overview
 
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
 
Cybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection serverCybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection server
 
Webinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in IsraelWebinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in Israel
 
FundPrivately | Token Launchpad & Incubator
FundPrivately | Token Launchpad & IncubatorFundPrivately | Token Launchpad & Incubator
FundPrivately | Token Launchpad & Incubator
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
 
Embracing covid 19 switch manual to digital hr
 Embracing covid 19 switch manual to digital hr Embracing covid 19 switch manual to digital hr
Embracing covid 19 switch manual to digital hr
 
17th ict forum oracle presentation
17th ict forum oracle presentation17th ict forum oracle presentation
17th ict forum oracle presentation
 
Social Media Strategy Keynote presentation
Social Media Strategy Keynote presentationSocial Media Strategy Keynote presentation
Social Media Strategy Keynote presentation
 
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stackLearn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stack
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 

Mais de Kaoru Maeda

Mais de Kaoru Maeda (20)

Emacs TypeScript
Emacs TypeScriptEmacs TypeScript
Emacs TypeScript
 
IETF103の話題から (HTML5 Conf 2018)
IETF103の話題から (HTML5 Conf 2018)IETF103の話題から (HTML5 Conf 2018)
IETF103の話題から (HTML5 Conf 2018)
 
IETF102 Report Authorization
IETF102 Report AuthorizationIETF102 Report Authorization
IETF102 Report Authorization
 
IETF97 Update oauth tokbind
IETF97 Update oauth tokbindIETF97 Update oauth tokbind
IETF97 Update oauth tokbind
 
IETF96 Update oauth tokbind
IETF96 Update oauth tokbindIETF96 Update oauth tokbind
IETF96 Update oauth tokbind
 
Ietf95 http2
Ietf95 http2Ietf95 http2
Ietf95 http2
 
http2study 20160423 IETF95 Report
http2study 20160423 IETF95 Reporthttp2study 20160423 IETF95 Report
http2study 20160423 IETF95 Report
 
HTTP/2: ぼくたちのWebはどう変わるのか
HTTP/2: ぼくたちのWebはどう変わるのかHTTP/2: ぼくたちのWebはどう変わるのか
HTTP/2: ぼくたちのWebはどう変わるのか
 
IETF93 Prague報告Web関連+QUIC
IETF93 Prague報告Web関連+QUICIETF93 Prague報告Web関連+QUIC
IETF93 Prague報告Web関連+QUIC
 
IETF93プレ勉強会、ARTエリアの歩き方
IETF93プレ勉強会、ARTエリアの歩き方IETF93プレ勉強会、ARTエリアの歩き方
IETF93プレ勉強会、ARTエリアの歩き方
 
Tokbind-fido
Tokbind-fidoTokbind-fido
Tokbind-fido
 
IETF92報告IoT関連
IETF92報告IoT関連IETF92報告IoT関連
IETF92報告IoT関連
 
IETF91報告arcmedia-mcic
IETF91報告arcmedia-mcicIETF91報告arcmedia-mcic
IETF91報告arcmedia-mcic
 
Ietf91報告 httpbis-httpauth
Ietf91報告 httpbis-httpauthIetf91報告 httpbis-httpauth
Ietf91報告 httpbis-httpauth
 
IETF91 Honolulu httpbis WG Report
IETF91 Honolulu httpbis WG ReportIETF91 Honolulu httpbis WG Report
IETF91 Honolulu httpbis WG Report
 
HTTP/2 Local activities in Japan
HTTP/2 Local activities in JapanHTTP/2 Local activities in Japan
HTTP/2 Local activities in Japan
 
IETF90 Web関連WG報告 #isocjp
IETF90 Web関連WG報告 #isocjpIETF90 Web関連WG報告 #isocjp
IETF90 Web関連WG報告 #isocjp
 
IETF90 IoT関連WG報告 #isocjp
IETF90 IoT関連WG報告 #isocjpIETF90 IoT関連WG報告 #isocjp
IETF90 IoT関連WG報告 #isocjp
 
HTTP/2 draft 14 preview and IETF90 httpbis WG Report
HTTP/2 draft 14 preview and IETF90 httpbis WG ReportHTTP/2 draft 14 preview and IETF90 httpbis WG Report
HTTP/2 draft 14 preview and IETF90 httpbis WG Report
 
IETF89 HTTP関連WG報告 #isocjp
IETF89 HTTP関連WG報告 #isocjpIETF89 HTTP関連WG報告 #isocjp
IETF89 HTTP関連WG報告 #isocjp
 

Último

VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 

Último (20)

Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 

From an Experience of Vulnerability Reporting

  • 1. https://lepidum.co.jp/ Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved. From an Experience of Reporting a Vulnerability - Case of CCS Injection - Tatsuya HAYASHI (@lef) Kaoru Maeda (@mad-p) Lepidum Co. Ltd. "SSR 2015" (2015/12/15)
  • 2. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Agenda  CCS Injection Vulnerability  How did we find it?  Reporting a Vulnerability  Disclosing a Vulnerability  Lessons Learned
  • 3. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Focus Area | Lepidum  Applied Research and Development  Personal Data, Digital Identity and Privacy  Secure and Safety Software Technology  Web and Internet Technology  De-Facto and Forum Standardization  Keywords:  Personal Data, Trust Framework, Privacy, ID Federation, Authentication/Authorization, Protocol Specification, * of Things(IoT, WoT), Software Defined Network, Autonomic Network, etc...
  • 4. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ CCS INJECTION VULNERABILITY
  • 5. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ CCS Injection Vulnerability CVE-2014-0224 (June 2014)  CCS = Change Cipher Spec  Early CCS Attack  http://ccsinjection.lepidum.co.jp/ 1. MITM crafts a CCS too early than expected 2. OpenSSL accepts it without necessary validation 3. Cipher Suites changed with uninitialized parameters 4. MITM can decrypt all the traffic
  • 6. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ How was it found? Masashi Kikuchi (reporter) thought  Wanted to create a formal verification for that  Peeked into existing implementations  Found a flaw in OpenSSL's validation Most complex transitions in the SSL/TLS statemachine: handle ChangeCipherSpec
  • 7. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Reporter's intial motivation  Everyone competes to hunt bugs. I want to do it efficiently  Want to use Coq somewhere  Select a suspicious module by experience  Want a clue to understand code that is difficult
  • 8. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Reporter's intial motivation  Everyone competes to hunt bugs. I want to do it efficiently  Want to use Coq somewhere  Select a suspicious module by experience  Want a clue to understand code that is difficult But, he didn't need even Coq
  • 9. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ A VULNERABILITY: REPORTING AND DISCLOSING IT
  • 10. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ To whom should it be reported?  In Japanese or in English?  OpenSSL?CERT?  Correct impact analysis done?  Is our analysis correct, in the first place?  PoC attack  Information control intra company
  • 11. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ After reported...  Prepare against possible 0-day attacks  We could not do anything than just wait for a response  We could not ask to/discuss with other organizations  Employees are instructed not to talk about it  We could not believe that "our reporting process is correct" without an response
  • 12. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ After reported...  Prepare against possible 0-day attacks  We could not do anything than just wait for a response  We could not ask to/discuss with other organizations  Employees are instructed not to talk about it  We could not believe that "our reporting process is correct" without an response Bitter days
  • 13. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ What we have done: Blog it  Take a new domain (against domain dropping)  Do not place any ads (better trust)  Prepare for high loaded access  Selecting a CDN  Cacheable blog pages  Test that the pages and CDN work, without disclosing  Review how to update the pages  Collect and manage incoming updates lessons learned
  • 14. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ What is the right way to disclose it?  No one actually tell us the best practice  Schedule an announcement  Domain name gives a hint about the vulnerability. DNS settings delayed  ccsinjection.lepidum.co.jp  No rules, no guidelines  Commonsense ⇒ What's that? lessons learned
  • 15. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ The day it announced  Disclosure date is told, but not the time  No one (incl. CERT) tells the reporter exactly when the CVE appears  Inqueries, interviews  Media handling, English support, customers, SNS...  The Guardian, New York Times, etc...  "Proper" interviews and not  Explain to customers what we have done  Fortunately, we had blog pages!  Updates  Catch up with software updates, etc.  Distinguish suggestions from experts and non-experts
  • 16. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ The day it announced  Disclosure date is told, but not the time  No one (incl. CERT) tells the reporter exactly when the CVE appears  Inqueries, interviews  Media handling, English support, customers, SNS...  The Guardian, New York Times, etc...  "Proper" interviews and not  Explain to customers what we have done  Fortunately, we had blog pages!  Updates  Catch up with software updates, etc.  Distinguish suggestions from experts and non-experts A whole company work! Daily job suspended
  • 17. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ FAQ, other things to consider  Why a logo?  "How much did you earned from this?"  Engineers' stresses  Business value
  • 18. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Information control  Avoid unnecessary sense of crisis  Deliver precise information to where necessary  Announce counter measures when they are ready
  • 19. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Vulnerability disclosure is not easy  Cannot call for a help, no help comes  We, a geek company, could do it. We could do it because we are an organization.
  • 20. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Vulnerability disclosure is not easy  Cannot call for a help, no help comes  We, a geek company, could do it. We could do it because we are a organization. But it was worth doing it!
  • 21. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ LESSONS LEARNED
  • 22. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Vulnerability and Reporting  It comes, even when not prepared  Do it without how-to's nor guidelines  Prepare blog pages  But without disclosing much before the announcement  Be careful when setting up CDN and DNS
  • 23. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Message: Implementation is the key Write specifications after implementing it That way, you should know where pitfalls are "Handle a complex protocol like TLS with Coq, you might need an experience of implementing it"
  • 24. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Please contact us https://lepidum.co.jp/ @lepidum @lef @mad-p mailto:{hayashi,maeda}@lepidum.co.jp