RIPE 68 - Measurement, Analysis and Tools Working Group15 May 2014 Internet-Wide Scanning and its Measurement Applications Zakir Durumeric University of.

Slides:



Advertisements
Similar presentations
Deploying IPv6: The time is now Are you ready? SFTA 24 May 2012 John Curran President and CEO, ARIN.
Advertisements

Security Update Server Registration, Active scanning and Windows patching.
Network Security.
Why Eve & Mallory Love Android
Browser Security Modes Alex Crowell and James Kasten.
IPv4 to IPv6 transition ALS Capacity Building April 2014
ForceHTTPS: Protecting High-Security Web Sites from Network Attacks Collin Jackson and Adam Barth.
IPv4 to IPv6 Network Address Translation. Introduction 4 What is the current internet addressing scheme and what limitations does it face. 4 A new addressing.
Network Attack via DNS Fagpakke: IT Sikkerhed Modul: Introduktion til IT Sikkerhed Jesper Buus Nielsen.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
SESSION ID: Continuous Monitoring with the 20 Critical Security Controls SPO1-W02 Wolfgang Kandek CTO.
State of DNS Security Extensions Edward Lewis February 26, 2001 APRICOT 2001 Panel.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Use of Kerberos-Issued Certificates at Fermilab Kerberos  PKI Translation Matt Crawford & Dane Skow Fermilab.
INF 123 SW ARCH, DIST SYS & INTEROP LECTURE 17 Prof. Crista Lopes.
1 The Spread of the Sapphire/Slammer Worm D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver Presented by Stefan Birrer.
Certificates ID on the Internet. SSL In the early days of the internet content was simply sent unencrypted. It was mostly academic traffic, and no one.
Course 201 – Administration, Content Inspection and SSL VPN
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
Www. engineersportal.in. OUTLINES Network & Network Security Need of Network Security Methods of Network Security Firewall Firewall’s Works Firewall’s.
Nov 1, 2000Site report DESY1 DESY Site Report Wolfgang Friebel DESY Nov 1, 2000 HEPiX Fall
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
DYNAMIC VALIDITY PERIOD CALCULATION OF DIGITAL CERTIFICATES BASED ON AGGREGATED SECURITY ASSESSMENT By Alexander Beck Jens Graupmann Frank Ortmeier.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Zakir Durumeric, James Kasten,David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer,
Modeling Worms: Two papers at Infocom 2003 Worms Programs that self propagate across the internet by exploiting the security flaws in widely used services.
Linux Networking and Security
Ram Santhanam Application Level Attacks - Session Hijacking & Defences
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.
Attacks on PRNGs - By Nupura Neurgaonkar CS-265 (Prof. Mark Stamp)
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices N. Heninger, Z. Durumeric, E. Wustrow, and J. Halderman USENIX Sec’
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
What do you know about your network Or maybe you don’t know who’s really there.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
An Internet-Wide View of Internet-Wide Scanning.  Scanning  IPv4  Horizontal scanning – individual ports  Network telescope - darknet What is internet.
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Ensuring Sufficient Entropy in RSA Modulus Generation Wendy Mu Henry Corrigan-Gibbs Dan Boneh.
DNS Security Extension 1. Implication of Kaminsky Attack Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning –No.
Measures to prevent MITM attack and their effectiveness CSCI 5931 Web Security Submitted By Pradeep Rath Date : 23 rd March 2004.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
DNS Domain Name System By Alexandros Zampas B101 Coursework The Technology Context.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Zippier ZMap Internet-Wide Scanning at 10Gbps David Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman University of Michigan WOOT ’14 San Diego,
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Install, configure, and deploy a SOHO wireless/wired router using appropriate settings. Objective.
Security Benefits of Firewall Protection
Common System Exploits Tom Chothia Computer Security, Lecture 17.
4.3 Network Layer Logical Addressing
Presentation By :- Krishna Sai Mulpuri
HEARTBLEED: Technical Description and Fixes
Tutorial on Creating Certificates SSH Kerberos
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Originally from: N. Heninger, Z. Durumeric, E. Wustrow, J. A. Halderman USENIX.
Network hardening Chapter 14.
6. Application Software Security
Presentation transcript:

RIPE 68 - Measurement, Analysis and Tools Working Group15 May 2014 Internet-Wide Scanning and its Measurement Applications Zakir Durumeric University of Michigan

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Golden Age of Internet Scanning As of the last year, it is now possible to scan the entire IPv4 address space in minutes thanks to ZMap and Masscan Measurement Golden Age: full IPv4 scanning available and IPv6 not widely deployed --- most services still available on IPv4 What can we learn using this global perspective? What can we do to help network operators?

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric ZMap: The Internet Scanner an open-source tool that can port scan the entire IPv4 address space from just one machine in under 45 minutes with 98% coverage $ sudo apt-get install zmap $ zmap –p 443 –o results.csv 34,132,693 listening hosts (took 44m12s) 97% of gigabit Ethernet linespeed ZMap: Fast Internet-Wide Scanning and its Security Applications ( Zakir Durumeric, Eric Wustrow, and J. Alex Halderman | 22nd USENIX Security Symposium.

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Ethics of Active Scanning Considerations Impossible to request permission from all owners No IP-level equivalent to robots exclusion standard Administrators may believe that they are under attack Reducing Scan Impact Scan in random order to avoid overwhelming networks Signal benign nature over HTTP and w/ DNS hostnames Honor all requests to be excluded from future scans

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Measurement Case Studies 1.Widespread Weak Cryptographic Keys 1.Analysis of HTTPS Certificate Ecosystem 1.The Matter of Heartbleed What can we learn using Internet-wide Internet scanning?

RIPE 68 - Measurement, Analysis and Tools Working Group15 May 2014 Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman Proceedings of the 21st USENIX Security Symposium, August 2012

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Public Keys on the Internet We considered the cryptographic keys used by HTTPS and SSH There are many legitimate reason that hosts might share keys Hosting providers, large companies (e.g. Google) Uncovering weak cryptographic keys and poor entropy collection HTTPSSSH Live Hosts12,8 million10,2 million Distinct RSA Public Keys5,6 million3,8 million Distinct DSA Public Keys6.2412,8 million

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Shared Cryptographic Keys We find that 5.6% of TLS hosts and 9.6% of SSH hosts share keys in a vulnerable manner - Default certificates and keys - Apparent entropy problems What other, more serious, problems could be present if devices arent properly collecting entropy? Why are a large number of hosts sharing cryptographic keys?

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Factoring RSA Public Keys RSA Public Key: n = p q, p and q are two large random primes Most efficient known method of compromising an RSA key is to factor n back to p and q While n is difficult to factor, for N 1 = p q 1 and N 2 = p q 2 we can trivially compute p = GCD(N 1, N 2 ) What else could go wrong if devices arent collecting entropy?

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Broken Cryptographic Keys We find 2,134 distinct primes and compute the RSA private keys for 64,081 (0.50%) of TLS hosts Using a similar approach for DSA, we are able to compute the private keys for 105,728 (1.03%) of SSH hosts Compromised keys are generated by headless or embedded network devices Identified devices from > 40 manufacturers Why are a large number of hosts sharing cryptographic keys?

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Linux /dev/urandom Nearly everything uses /dev/urandom Input Pool Non-blocking Pool /dev/urandom Time of boot Keyboard /Mouse Disk Access Timing Only happens if Input Pool contains more than 192 bits… Time of boot Problem 1: Embedded devices may lack all these sources Problem 2: /dev/urandom can take a long time to warm up Why are embedded systems generating broken keys?

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Entropy first mixed into /dev/urandom OpenSSH seeds from /dev/urandom Boot-Time Entropy Hole /dev/urandom may be predictable for a period after boot. Typical Ubuntu Server Boot Why are embedded systems generating broken keys?

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Analysis of the HTTPS Certificate Ecosystem Zakir Durumeric, James Kasten, Michael Bailey, J. Alex Halderman Proceedings of the 13th Internet Measurement Conference

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Rampant Certificate Authorities Daily scans found 88 million total certificates, 9.4 million browser trusted certificates over the last two years Identified 1,800 CA certificates belonging to 683 organizations All major roots are selling intermediates to organizations without any constraints 26% of sites are signed by a single certificate!

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Ignoring Foundational Principles We classically teach concepts such as defense in depth and the principle of least privilege We have methods of constraining what CAs can sign for, yet all but 7 of the 1,800 CA certs we found can sign for anything Lack of constraints allowed a rogue CA certificate in 2012, but in another case prevented 1,400 invalid certificates Almost 5% of certificates include local domains, e.g. localhost, mail, exchange What are authorities doing that puts the ecosystem at risk?

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Cryptographic Reality What are authorities doing that puts the ecosystem at risk? 90% of certificates use a 2048 or 4096-bit RSA key 50% of certificates are rooted in a 1024-bit key More than 70% of these roots will expire after 2016

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Scans.IO Data Repository How do we share all this scan data?

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric The Matter of Heartbleed Zakir Durumeric, James Kasten, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Bernhard Amann, Jethro Beekman, Mathias Payer, Vern Paxson

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Preventing the Spread of Misinformation

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Patching Observations 11% of servers remained vulnerable after 48 hours Patching plateaued at 4% Only 10% of sites vulnerable in our first scan replaced their TLS certificates 15% of sites that replaced certificates used vulnerable cryptographic keys Heartbleed Vulnerable Hosts

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Vulnerability Notifications We notified remaining vulnerable organizations after 2 weeks Statistically significant impact on patching Out of 59 human responses: 51 positive, 3 neutral, 2 negative Impact of Notification

ZMap: Fast Internet-Wide Scanning and its Measurement ApplicationsZakir Durumeric Conclusion Living in a unique period IPv4 can be quickly, exhaustively scanned IPv6 has not yet been widely deployed ZMap lowers barriers of entry for Internet-wide surveys Now possible to scan the entire IPv4 address space from one host in under 45 minutes with 98% coverage Explored three applications of high-speed scanning Ultimately hope that ZMap enables future research

RIPE 68 - Measurement, Analysis and Tools Working Group15 May 2014 Zakir Durumeric, University of Michigan Internet-Wide Scanning and its Measurement Applications ZMap: Weak Keys: Public Data: Heartbleed: