How to Abuse and Fix Authenticated Encryption Without Key Commitment
https://eprint.iacr.org/2020/1456 [eprint.iacr.org]
2020-12-13 06:03
tags:
crypto
format
paper
security
Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for which it was not originally designed. Recent research tries to understand what happens when AE is not used as prescribed by its designers. A question given relatively little attention is whether an AE scheme guarantees “key commitment’’: ciphertext should decrypt to a valid plaintext only under the key that was used to generate the ciphertext. As key commitment is not part of AE’s design goal, AE schemes in general do not satisfy it. Nevertheless, one would not expect this seemingly obscure property to have much impact on the security of actual products. In reality, however, products do rely on key commitment. We discuss three recent applications where missing key commitment is exploitable in practice. We provide proof-of-concept attacks via a tool that constructs AES-GCM ciphertext which can be decrypted to two plaintexts valid under a wide variety of file formats, such as PDF, Windows executables, and DICOM. Finally we discuss two solutions to add key commitment to AE schemes which have not been analyzed in the literature: one is a generic approach that adds an explicit key commitment scheme to the AE scheme, and the other is a simple fix which works for AE schemes like AES-GCM and ChaCha20Poly1305, but requires separate analysis for each scheme.
source: white
JWT none
https://twitter.com/__agwa/status/1288953720668119045 [twitter.com]
2020-08-01 01:46
tags:
auth
security
tweet
web
Every time there is another JWS/JWT vulnerability involving “alg“:“none” (like today, lolsob), people focus on the “none” part. But the real problem is the “alg” part.
source: white
How to decode a data breach notice
https://techcrunch.com/2020/05/19/decoding-data-breach-notice/ [techcrunch.com]
2020-05-21 04:02
tags:
business
essay
language
security
But data breach notifications have become an all-too-regular exercise in crisis communications. These notices increasingly try to deflect blame, obfuscate important details and omit important facts. After all, it’s in a company’s best interest to keep the stock markets happy, investors satisfied and regulators off their backs. Why would it want to say anything to the contrary?
source: white
A Compendium of Container Escapes
https://www.youtube.com/watch?v=BQlqita2D2s [www.youtube.com]
2020-03-25 01:38
tags:
cloud
linux
security
video
virtualization
The goal of this talk is to broaden the awareness of the how and why container escapes work, starting from a brief intro to what makes a process a container, and then spanning the gamut of escape techniques, covering exposed orchestrators, access to the Docker socket, exposed mount points, /proc, all the way down to overwriting/exploiting the kernel structures to leave the confines of the container.
source: white
The Deep Sea
https://neal.fun/deep-sea/ [neal.fun]
2019-12-18 18:00
tags:
biology
visualization
Takes a lot of scrolling to get to the bottom.
source: white
On the Metal: Ron Minnich
https://oxide.computer/blog/on-the-metal-3-ron-minnich/ [oxide.computer]
2019-12-18 01:03
tags:
audio
development
links
systems
unix
On this episode of On the Metal, we interview Ron Minnich. Ron has had a fascinating career working on the interface between software and hardware. Join us as ~we install Gentoo and compile GCC~ to hear a mesmerizing conversation about Unix, Plan9, LinuxBIOS, Chromebooks, RISC-V, of course some Gentoo jokes, flip flop programming toys, and more!
Didn’t actually listen, but there’s a pile of links here anyway.
source: white
AddressSanitizer (ASan) for Windows with MSVC
https://devblogs.microsoft.com/cppblog/addresssanitizer-asan-for-windows-with-msvc/ [devblogs.microsoft.com]
2019-10-25 04:57
tags:
beta
c
compiler
cxx
development
update
windows
We are pleased to announce AddressSanitizer (ASan) support for the MSVC toolset. ASan is a fast memory error detector that can find runtime memory issues such as use-after-free and perform out of bounds checks. Support for sanitizers has been one of our more popular suggestions on Developer Community, and we can now say that we have an experience for ASan on Windows, in addition to our existing support for Linux projects.
MSVC support for ASan is available in our second Preview release of Visual Studio 2019 version 16.4.
source: white
Tethered jailbreaks are back
https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/ [blog.trailofbits.com]
2019-09-28 20:00
tags:
bios
cpu
exploit
iphone
malloc
security
checkm8 exploits the Boot ROM to allow anyone with physical control of a phone to run arbitrary code. The Boot ROM, also called the Secure ROM, is the first code that executes when an iPhone is powered on and cannot be changed, because it’s “burned in” to the iPhone’s hardware. The Boot ROM initializes the system and eventually passes control to the kernel. It’s the root of trust for the trusted boot chain of iOS and verifies the integrity of the next stage of the boot process before passing execution control.
Detailed writeup: https://habr.com/en/company/dsec/blog/472762/
source: white
Scraping A Public Website Doesn't Violate the CFAA, Ninth Circuit (Mostly) Holds
https://reason.com/2019/09/09/scraping-a-public-website-doesnt-violate-the-cfaa-ninth-circuit-mostly-holds/ [reason.com]
2019-09-10 18:59
tags:
auth
policy
web
This is a major case that will be of interest to a lot of people and a lot of companies. But it’s also pretty complicated and easy to misunderstand. This post will go through it carefully, trying to explain what it says and what it doesn’t say.
source: white
Cisco to pay $8.6 million fine for selling government hackable surveillance technology
https://www.washingtonpost.com/politics/2019/07/31/cisco-pay-million-fine-selling-government-hackable-surveillance-technology/ [www.washingtonpost.com]
2019-08-02 01:53
tags:
business
development
policy
security
Cisco has agreed to pay $8.6 million to settle a claim it sold video surveillance software it knew was vulnerable to hackers to hospitals, airports, schools, state governments and federal agencies. The tech giant continued to sell the software and didn’t fix the massive security weakness for about four years after a whistleblower first alerted the company about it in 2008, according to a settlement unsealed Wednesday with the Justice Department and 15 states as well as the District.
This is a new wrinkle in the disclosure debate. Refuse to patch, pay out later. But 10 years seems like a very long timeline.
source: white
History of VGA cables and DDC and more
https://threadreaderapp.com/thread/1156392702725902336.html [threadreaderapp.com]
2019-08-01 00:09
tags:
graphics
hardware
tech
tweet
Moxie Marlinspike on encryption bans
https://www.marketplace.org/shows/marketplace-tech/the-trump-administration-wants-access-to-encrypted-messages/ [www.marketplace.org]
2019-07-30 01:39
tags:
audio
interview
opsec
policy
security
Host Molly Wood spoke with Moxie Marlinspike, founder and CEO of the private chat app Signal Messenger, about what a ban on encryption — or giving law enforcement a back door to messages — might mean. The following is an edited transcript of their conversation.
source: white
DataSpii: The catastrophic data leak via browser extensions
https://securitywithsam.com/2019/07/dataspii-leak-via-browser-extensions/ [securitywithsam.com]
2019-07-19 00:44
tags:
browser
investigation
security
web
Our investigation uncovered an online service selling the collected browsing activity data to its subscription members in near real-time. In this report, we delineate the sensitive data source types relevant to the security of individuals and businesses across the globe. We observed two extensions employing dilatory tactics — an effective maneuver for eluding detection — to collect the data. We identified the collection of sensitive data from the internal network environments of Fortune 500 companies.
source: white
I Sell Onions on the Internet
https://www.deepsouthventures.com/i-sell-onions-on-the-internet/ [www.deepsouthventures.com]
2019-04-24 22:22
tags:
business
food
How did all this start? I’m a web guy. I’m not a farmer.
source: white
What is Amazon?
https://zackkanter.com/2019/03/13/what-is-amazon/ [zackkanter.com]
2019-03-19 01:01
tags:
business
valley
So, what is Amazon? It started as an unbound Walmart, an algorithm for running an unbound search for global optima in the world of physical products. It became a platform for adapting that algorithm to any opportunity for customer-centric value creation that it encountered. If it devises a way to keep its incentive structures intact as it exposes itself through its ever-expanding external interfaces, it – or its various split-off subsidiaries – will dominate the economy for a generation. And if not, it’ll be just another company that seemed unstoppable until it wasn’t.
source: white
WordPress 5.1 CSRF to Remote Code Execution
https://blog.ripstech.com/2019/wordpress-csrf-to-rce/ [blog.ripstech.com]
2019-03-14 05:45
tags:
exploit
html
php
security
web
An attacker can take over any WordPress site that has comments enabled by tricking an administrator of a target blog to visit a website set up by the attacker. As soon as the victim administrator visits the malicious website, a cross-site request forgery (CSRF) exploit is run against the target WordPress blog in the background, without the victim noticing. The CSRF exploit abuses multiple logic flaws and sanitization errors that when combined lead to Remote Code Execution and a full site takeover.
source: white
Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up
https://9to5mac.com/2019/01/28/facetime-bug-hear-audio/ [9to5mac.com]
2019-01-29 02:10
tags:
iphone
opsec
security
social
turtles
The bug lets you call anyone with FaceTime, and immediately hear the audio coming from their phone — before the person on the other end has accepted or rejected the incoming call. Apple says the issue will be addressed in a software update “later this week”.
I never understand how bugs like this happen. How does the microphone get opened before the user presses ok? Why does that codepath even exist?
source: white
Australian Assistance and Access Bill 2018
https://stateofit.com/interception/ [stateofit.com]
2018-12-06 19:26
tags:
crypto
policy
security
The recently released exposure draft of the Assistance and Access Bill 2018 [1] redefines the future of government interception of electronic communication. Left unchanged it will have far reaching consequences for the security and privacy of Australian’s. The legislation is both long and complicated; it raises a number of questions and concerns, which so far have not been adequately addressed.
Passed: https://www.zdnet.com/article/australia-now-has-encryption-busting-laws-as-labor-capitulates/
source: white