今日:82| 主题:47999
收藏本版 (1)

[其他] Is your router taking part in DDoS attacks right under your nose?

妳的借口真美 发表于 2016-10-15 06:45:10
26 4


您需要 登录 才可以下载或查看,没有帐号?立即注册


Is your router taking part in DDoS attacks right under your nose?-1 (especially,themselves,attention,effective,internet)

   As BWAINs go, SSHowDowN isn’t a terribly catchy name, but it’s worth knowing about, especially if you are a vendor ofIoT products that automatically set themselves up so they can be managed remotely over the internet.
   The name SSHowDowN comes from Akamai, a huge player in the world of content delivery, and it got Akamai’s attention when the company started looking into recent surges in time-wasting traffic – what are usually calledDDoSes, short for Distributed Denial of Service attacks.
  If you want to knock someone off the internet, or at least to cramp their online style, without having to hack into their servers and break them on purpose, then generating lots and lots of purposeless traffic is an effective way to do it.
  But just flooding them with network traffic from a few super-high-bandwidth locations, such as hacked servers on a modern multi-gigabit academic network, is not enough these days.
  100 servers each pumping out a gigabit every second are fairly easy to identify and block, and every time you block the traffic from just one of them, you cut the severity of the attack by a whole percentage point.
  What you really want are thousands, even hundreds of thousands, of modestly well-connected networks that don’t fit any obvious pattern, and that are hosted by hundreds or thousands of different ISPs in tens or hundreds of different countries.
   Indeed, we recently wrote about aDDoS case involving investigative journalistBrian Krebs, in which more than 600 gigabits per second of legitimate-looking but completely purposeless data was generated from tens or hundreds of thousands of home networks, thanks to insecure “Internet of Things” devices such as cameras, routers and even printers.
   The attack on Krebs was apparently driven by malicious software called Mirai that had deliberately been copied onto all those insecure devices.
  No infection required

   In contrast, Akamai’s SSHowDowN story doesn’t rely on infected routers: it needs only badly-configured ones.
   The name SSHowDowN comes from SSH, short for Secure Shell , a well-known tool that is used ubiquitously across the internet for secure remote access.
   But even though SSH is supposed to improve security, Akamai reported that SSH servers on a large number of SoHo routers – millions , it seems! – were the source of a vast quantity of DDoS traffic in Akamai’s network…
  …and yet the crooks never even needed to login to the SSHowDowNable routers.
  Simply put, the crooks figured out how to take traffic from one set of sources (this could, for example, be high-bandwidth servers on a hacked network), split it into lots of separate streams, and bounce each one off a different, innocent-looking router on an innocent-looking small network.
  You can think of this as the network equivalent of money laundering on a huge scale.
  By splitting your attack amongst thousands or millions of unexceptional and otherwise innocent networks around the world, you make it much harder for content delivery networks such as Akamai to block the malicious traffic cleanly and efficiently, because it’s mixed in so thoroughly with legitimate packets.
   That’s why it’s called a distributed denial of service.
  Improper lockdown

  The SSHowDowN problem is caused by IoT devices that allow SSH connections, but don’t lock them down properly.
  According to Akamai, many IoT systems have remote access via SSH enabled by default, but also have default “internal accounts” with known username/password pairs.
  To stop these default accounts being abused across the internet, some vendors simply configure the system so that if you try to login with a known default password, the system immediately kicks you off.
  Unfortunately, SSH isn’t only about secure shell logins, for all that it’s called “Secure Shell”.
   SSH can also do what’s called traffic forwarding , for example by acting as a web proxy that accepts traffic from browser X, and transparently redirects it to site Y.
   Done correctly, this sort of proxying can greatly increase security, because the traffic from X to the proxy, and from the proxy back to X is strongly encrypted, so that SSH acts as a sort of basic VPN ( virtual private network ).
  But if you can make unauthorised use of proxies on other people’s devices, you can effectively co-opt them as partners in cybercrime, without them even being aware of it.
  Unfortunately again, as Akamai points out, letting a crook authenticate first and then relying on them formally logging in immediately afterwards in order to detect they are up to no good is simply the wrong way to do security.
  That would be like deliberately letting someone onto your property, but not into your house, and assuming that you’d done enough to stop them using your garden for criminal purposes.
   And that’s exactly what crooks can do with a weakly-protected SSH server: there’s a well-documented way to authenticate, start up a proxy server for redirecting traffic, and then deliberately suppress the login part .
  In other words, you use the dodgy password to trick the insecure router into letting you steal its identity and bandwidth as a proxy, but avoid the login part that’s needed for the router to kick you out.
   The relevant SSH details, if you want to learn more about SSHowDown, are as follows. The command ssh connects, authenticates and immediately logs in; ssh -D connects, authenticates, starts a forwarding proxy, and then logs in; but ssh -N -D connects, authenticates, starts a forwarding proxy…and then just sits there without logging in. That’s by design, and not a bug. It’s at the authentication phase that you are supposed to verify that the user is allowed to use your resources, whether that’s logging in to a remote shell, starting a proxy, or anything else. Default passwords subvert the entire authentication process.
  What to do?

   Akamai presents various mitigations in its article, so we’ll send you there for the details.
   All we’re going to say here is this, and because it’s Cybersecurity Awareness Month we are going to say it VERY, VERY LOUDLY…

  If you don’t intend to let a crook into your house, then don’t make it easy for them to get into the garden in the first place.

上一篇:Multiload-ng 1.4.0, GNOME Twitch 0.3.0, Sublime Text 3 Build 3126 [PPA Updates P
下一篇:Program Your Brain, Hack Your Way to Productivity

梦里花落知多少 发表于 2016-10-15 07:31:51
回复 支持 反对

使用道具 举报

zhuo123 发表于 2016-10-15 08:04:47
回复 支持 反对

使用道具 举报

一切的一切 发表于 7 天前
回复 支持 反对

使用道具 举报

方娟 发表于 7 天前
回复 支持 反对

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册




扫码访问 @iTTTTT瑞翔 的微博
手机版/CoLaBug.com ( 粤ICP备05003221号 | 文网文[2010]257号 )|网站地图 酷辣虫

© 2001-2016 Comsenz Inc. Design: Dean. DiscuzFans.

返回顶部 返回列表