Manuel Brugnoli, Elisa Heymann UAB

Slides:



Advertisements
Similar presentations
Data Management Expert Panel - WP2. WP2 Overview.
Advertisements

Chapter 17: WEB COMPONENTS
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Michelle J. Gosselin, Jennifer Schommer Guanzhong Wang.
Chapter 21 Successfully Implementing The Information System
Vulnerability Analysis Borrowed from the CLICS group.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
1 Security Risks in Clouds and Grids Condor Week May 5, 2011 Barton P. Miller James A. Kupsch Computer Sciences Department University of Wisconsin
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
1 Update on the Vulnerability Assessment Effort Elisa Heymann Computer Architecture and Operating Systems Department Universitat Autònoma de Barcelona.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI The EGI Software Vulnerability Group and EMI Dr Linda Cornwall, STFC, Rutherford.
Session 11: Security with ASP.NET
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 Securing a Microsoft ASP.NET Web Application.
1 1 Vulnerability Assessment of Grid Software Jim Kupsch Associate Researcher, Dept. of Computer Sciences University of Wisconsin-Madison Condor Week 2006.
Ether: Malware Analysis via Hardware Virtualization Extensions Author: Artem Dinaburg, Paul Royal, Monirul Sharif, Wenke Lee Presenter: Yi Yang Presenter:
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
1 Vulnerability Assessment of Grid Software James A. Kupsch Computer Sciences Department University of Wisconsin Condor Week 2007 May 2, 2007.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Privilege separation in Condor Bruce Beckles University of Cambridge Computing Service.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
1 Vulnerability Assessment Elisa Heymann Computer Architecture and Operating Systems Department Universitat Autònoma de Barcelona
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
EGEE User Forum Data Management session Development of gLite Web Service Based Security Components for the ATLAS Metadata Interface Thomas Doherty GridPP.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
First Principles Vulnerability Assessment Computer Architecture & Operating Systems Department Universitat Autònoma de Barcelona Elisa Heymann Manuel Brugnoli.
1 Update on the Vulnerability Assessment Effort Elisa Heymann Computer Architecture and Operating Systems Department Universitat Autònoma de Barcelona.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
1 Example security systems n Kerberos n Secure shell.
Lecture 14 Page 1 CS 236 Online Secure Programming CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
 Abstract  Introduction  Literature Survey  Conclusion on Literature Survey  Threat model and system architecture  Proposed Work  Attack Scenarios.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
Token Kidnapping's Revenge Cesar Cerrudo Argeniss.
Database and Cloud Security
Jean-Philippe Baud, IT-GD, CERN November 2007
CompTIA Security+ Study Guide (SY0-401)
Securing Network Servers
Chapter 5 Electronic Commerce | Security Threats - Solution
Data Virtualization Tutorial… SSL with CIS Web Data Sources
SOFTWARE TESTING Date: 29-Dec-2016 By: Ram Karthick.
Virtual Private Network (VPN)
SFS-HTTP: Securing the Web with Self-Certifying URLs
Apache web server Quick overview.
Security Issues.
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Chapter 5 Electronic Commerce | Security Threats - Solution
A Security Review Process for Existing Software Applications
Introduction to SQL Server 2000 Security
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
THE STEPS TO MANAGE THE GRID
CompTIA Security+ Study Guide (SY0-401)
Chapter 27: System Security
Defense in Depth Web Server Custom HTTP Handler Input Validation
Privilege Separation in Condor
A Web-based Integrated Console for Controlling a Set of Networks
Goals Introduce the Windows Server 2003 family of operating systems
Mitigation Principles PROPOSAL OICA/CLEPA
AppExchange Security Certification
Chapter 29: Program Security
Shielding applications from an untrusted cloud with Haven
APACHE WEB SERVER.
Unit 8 Network Security.
Operating System Concepts
Electronic Payment Security Technologies
Fast-Track UiPath Developer Module 10: Sensitive Data Handling
SHELLSHOCK ATTACK.
Chapter 21 Successfully Implementing The Information System
Presentation transcript:

Manuel Brugnoli, Elisa Heymann UAB Vulnerability Assessment of Middleware Packages Supplied by EMI: VOMS Core Case Manuel Brugnoli, Elisa Heymann UAB

First Principles Vulnerability Assessment (FPVA) Contents Outline First Principles Vulnerability Assessment (FPVA) VOMS Core VOMS Core assessment using FPVA Conclusions

First Principles Vulnerability Assessment (FPVA) “Is a primarily analyst-centric (manual) approach to assessment, whose aim is to focus the analyst’s attention on the parts of the software system and its resources that are mostly likely to contain vulnerabilities that would provide access to high-value assets”* * James A. Kupsch, Barton P. Miller, Eduardo César, and Elisa Heymann, "First Principles Vulnerability Assessment" (extended version), MIST Project Technical Report, September 2009.

First Principles Vulnerability Assessment (FPVA) to identify the major structural components of the system, including modules, threads, processes, and hosts. Architecture to identify the key resources accessed by each component, and the operations supported on those resources. Resources identifies the trust assumptions about each component, answering such questions as how are they protected and who can access them? Privileges is to examine each component in depth. A key aspect is that this step is guided by information obtained in the first three steps, helping to prioritize the work so that highvalue targets are evaluated first. Components artifacts produced by this step are vulnerability reports, perhaps with suggested fixes, to be provided to the middleware developers. Dissemination

VOMS Core assessment using FPVA Virtual Organization Membership Service (VOMS) serves as a central repository for user authorization information, providing support for sorting users into a general group hierarchy, keeping track of their roles, etc. VOMS Core is the server that receives requests from a VOMS client and returns information about the user. We worked with VOMS Core 2.0.2.

Step 1: VOMS 2.0.2 Architecture Analysis User Host VOMS Server Host Command Line VOMS Client GSI Connection VOMS daemon Command Line Ancillary Utilities DB Web Web Browser HTTPS Command Line VOMS Admin Client VOMS Admin (Tomcat) SOAP over SSL OS privileges user daemon root DB privileges VO_Server

Step 1: VOMS Client-Server Interaction

Step 2: VOMS Core 2.0.2 Resource Analysis

Step 2: VOMS Core 2.0.2 Resource Analysis

Step 3: VOMS Core 2.0.2 Privilege Analysis

Step 4: VOMS Core 2.0.2 Component Analysis Resource permissions: Evaluated the permissions of files that have a high security value (certificate private keys, database and configuration files). The permissions of these files appeared to be correct.

Step 4: VOMS Core 2.0.2 Component Analysis User privileges: Client side: No privilege problems in the client commands. Server side: The voms daemon runs with root operating system privileges. Evaluated the source code looking for flaws that may compromise the server. No privilege problems were found.

Step 4: VOMS Core 2.0.2 Component Analysis Dangerous functions: Evaluated the use of functions that commonly result in security problems, such as system or exec family functions. No vulnerabilities related to dangerous functions were found.

Step 4: VOMS Core 2.0.2 Component Analysis Authentication Issues: Mutual authentication is performed between the client and server. VOMS design makes the system quite strong, and reduces many possible threats.

Step 4: VOMS Core 2.0.2 Component Analysis Network Layer Security: VOMS server creates a secure communication channel via Globus GSI with the VOMS Clients. The use of a encrypted channel provides strong end-to-end data encryption and integrity.

Step 4: VOMS Core 2.0.2 Component Analysis Injection Attacks: Evaluated the source code to ensure VOMS correctly parses and checks the arguments passed through the command line. Appropriate parsing is performed to protect against command injection vulnerabilities.

Step 4: VOMS Core 2.0.2 Component Analysis Buffer overflows: VOMS Core is written in C/C++ → Checked for potential buffer overflow problems. No dangerous behavior was detected.

Step 4: VOMS Core 2.0.2 Component Analysis Denial of Service Attacks: A DoS vulnerability was discovered and reported to the VOMS developers. This vulnerability is caused by lack of limits on the number of simultaneous connections. Full details about this were reported in the vulnerability report VOMS-CORE-2011-0001.

Conclusions Conclusions No serious security problems in VOMS Core 2.0.2 was found: The attack surface in VOMS Core is very small. VOMS Core correctly parses and checks the arguments sent from the client. The VOMS server uses a forking server model to handle all requests from VOMS clients. The recommended operational configuration of a VOMS server node is a highly secured host with limited local user access and other services. All communication between the VOMS server and VOMS clients is secure. A DoS vulnerability was found.

Thank you!!! ¿Questions?