Brad Baker CS526 May 7 th, 2008 5/7/2008 1. 1. Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.

Slides:



Advertisements
Similar presentations
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
System and Network Security Practices COEN 351 E-Commerce Security.
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Network and Server Attacks and Penetration Chapter 12.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
BUILDING A SECURE STANDARD LIBRARY Information Assurance Project I MN Tajuddin hj. Tappe Supervisor Mdm. Rasimah Che Mohd Yusoff ASP.NET TECHNOLOGY.
Department Of Computer Engineering
Presenter Deddie Tjahjono.  Introduction  Website Application Layer  Why Web Application Security  Web Apps Security Scanner  About  Feature  How.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
Securing Apache and PHP
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Honeypot and Intrusion Detection System
Web Application Firewall (WAF) RSA ® Conference 2013.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Security Testing Case Study 360logica Software Testing Services.
Intrusion Detection and Prevention. Objectives ● Purpose of IDS's ● Function of IDS's in a secure network design ● Install and use an IDS ● Customize.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Online Translation Service Capstone Design Eunyoung Ku Jason Roberts Jennifer Pitts Gregory Woodburn Kim Tran.
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
The Filer Proj-354 Apr 29 th, 2010 Group members Henry Au Wayne Choi Jaewon Yoo
Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM.
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
October 3, 2008IMI Security Symposium Application Security through a Hacker’s Eyes James Walden Northern Kentucky University
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Module 7: Advanced Application and Web Filtering.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Role Of Network IDS in Network Perimeter Defense.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
TMG Client Protection 6NPS – Session 7.
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Chapter 7: Identifying Advanced Attacks
Secure Software Confidentiality Integrity Data Security Authentication
Securing the Network Perimeter with ISA 2004
CheckPoint Accelerated CCSE NGX R65
Threat Management Gateway
Configuring TMG as a Firewall
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Speaker: Shane Jahnke CS 6910 – Advanced System Security & Design
CORE Security Technologies
Online Translation Service Capstone Design
Presentation transcript:

Brad Baker CS526 May 7 th, /7/2008 1

1. Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity Console 7. Conclusion 5/7/2008 2

 Research potential security configurations for LAPP or LAMP web servers including ModSecurity.  Implement a basic LAPP system and test security configuration 5/7/2008 3

 Web servers Ubuntu 7.10 Apache  Mod_security  Mod_unique_id  Mod_php Php Postgresql Curl, lua, libxml2  Web application Created a custom PHP application with Postgresql Built a custom login method  Maximum login attempts  Auto session timeout  Client machine Windows Vista Initiated basic malicious requests Acted as log console server 5/7/2008 4

 Dynamic web applications are subject to a wide variety of threats, including: Poorly implemented custom applications Use of popular software packages that may contain vulnerabilities and be exploit targets Unpatched or slowly patched server software Unknown exploits to server software SQL injection, cross-site scripting, application and software specific vulnerabilities. 5/7/2008 5

 Quality application development  Prompt patching and updating for server software  Layers of access control including firewalls and server hardening  These solutions are not always ideal: Secure development practices not always used. Software packages could be delivered with vulnerabilities. Patching takes time and risks server stability. Unknown exploits cannot be patched against. Machine hardening may not protect the application. 5/7/2008 6

 Additional methods to protect systems include: Intrusion detection systems (IDS) on the network  Proactive, not focused on web requests, bad with SSL Chroot jail for Apache server  Reactive, protects system but not Apache process Suhosin for PHP installation  Proactive, protects PHP from malicious requests and unknown flaws ModSecurity  Proactive, focused on web protocols, can analyze SSL traffic 5/7/2008 7

 Current Version: (April 24, 2008) ‏ Copyright © Breach Security, Inc. ( ‏  ModSecurity is a Web Application Firewall  Module works between the Apache server process and the client  Operation is controlled by robust rule processing including regular expression pattern matching  Analyzes request and response data, blocks transmission, logs transactions for analysis 5/7/2008 8

 Module provides: HTTP protection, Common Web Attacks Protection, Automation detection, Trojan Protection, Error Hiding  Protects from unknown vulnerabilities, allows time for patching application code and server software.  Standard core rules provide defense against potential attacks. Rules are optimized and cover a variety of attacks.  Negligible performance decrease. 5/7/2008 9

1. Example rule for PHP information leakage (response analysis) ‏ SecRule RESPONSE_BODY " Warning.{0,100}?:.{0,1000}?\bon line\b" "phase:4,t:none,ctl:auditLogParts=+E, deny, log,auditlog,status:500,msg:'PHP Information Leakage', id:'970009',tag:'LEAKAGE/ERRORS',severity:'4'" 2. Example rule for invalid ascii values SecRule REQUEST_FILENAME|REQUEST_HEADERS_NAMES| REQUEST_HEADERS| !REQUEST_HEADERS:Referer " \ "phase:2,deny,log,auditlog,status:400,msg:'Invalid character in request', id:'960018',tag:'PROTOCOL_VIOLATION/EVASION', severity:'4',t:none,t:urlDecodeUni" 3. Example rule to block requests with numeric host in header: SecRule REQUEST_HEADERS:Host "^[\d\.]+$" "phase:2,t:none,deny,log,auditlog,status:400,msg:'Host header is a numeric IP address', severity:'2', id:'960017',tag:'PROTOCOL_VIOLATION/IP_HOST'" 5/7/

 Rules can process against one of the following processing phases: 1. Request headers 2. Request body ‏ 3. Response headers ‏ 4. Response body 5. Logging  This approach allows protection against malicious requests and information leakage in response data 5/7/

5/7/

--a0c36e2a-A--[03/May/2008:09:13: ] 71TDcMCoAWQAABuUA9gAAAAD a0c36e2a-B--POST /main/modTrail2.php?trailid=7 HTTP/1.1 --a0c36e2a-C-- tname=1&tlocate=1+%27%3Binsert+into%0D%0A%0D%0A&tdesc=&trailid=7&a dduser=1&addtime= %3A30%3A a0c36e2a-H--Message: Access denied with code 501 (phase 2). Pattern match "(?:\b(?:(?:s(?:elect\b(?:.{1,100}?\b(?:(?:length|count|top)\b.{1, 100}?\bfrom|from\b.{1,100}?\bwhere)|.*?\b(?:d(?:ump\b.*\bfrom|ata_ type)|(?:to_(?:numbe|cha)|inst)r))|p_(?:(?:addextendedpro|sqlexe)c |(?:oacreat|prepar)e|execute(?:sql)?|makewebtask)|ql_(?..." at ARGS:tlocate. [file "/etc/apache2/conf/modsecurity/rulesAll/modsecurity_crs_40_generic _attacks.conf"] [line "66"] [id "950001"] [msg "SQL Injection Attack"] [data "insert into"] [severity "CRITICAL"] [tag "WEB_ATTACK/SQL_INJECTION"]Action: Intercepted (phase 2)Stopwatch: (490* )Producer: ModSecurity for Apache/2.5.3 ( core ruleset/1.6.1.Server: Apache/2.2.4 (Ubuntu) PHP/ ubuntu6.3 5/7/

 Current Version: (April 25, 2008) ‏ – Copyright © Breach Security, Inc. ( ‏  Uses mlogc log collector Separately installed and configured in ModSecurity  Apache with ModSecurity enabled publishes output files to console service  Console provides framework for log analysis, attack detection and alerts  Console can operate on external server 5/7/

5/7/

5/7/

 Modsecurity is an effective tool for securing web applications on apache.  Complicated regular expressions makes new rule development a challenge.  Log collection console appears to have DoS issue with large volume of rejected requests.  Ideal solution is software patching, application hardening and application specific rules in addition to core rule set. 5/7/

 ModSecurity:  Chroot  Suhosin  Misc /7/