how$itworks$ fundamental$flaws$ mi:gang$the$threat › us-13 › us-13-nixon... · allison nixon...

25
No Cloud Allowed Denying Service to DDOS Protection Services Presented by: Allison Nixon [email protected] Pentesting, Incident Response PaulDotCom host

Upload: others

Post on 25-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

No Cloud Allowed

Denying Service to DDOS Protection Services

Presented by: Allison Nixon [email protected] Pentesting, Incident Response PaulDotCom host

Page 2: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Cloud Based DDOS Protection

How  it  works  

Fundamental  flaws  

Many  ways  to  find  the  origin  IP  

Mi:ga:ng  the  threat  

Other  alterna:ves  

Slide  2  

Page 3: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

How it Works – Filtering Traffic in Theory

Inbound  Requests  (good  and  evil)  

Filtering  Service  

Server  (AKA  the  origin)  

Filtering  service  receives  all  requests  

Only  good  requests  are  passed  along.      

Server  processes  requests  and  sends  response  

Response  is  passed  back  through  the  filtering  service  to  the  client  

The  user  cannot  interact  

directly  with  the  origin  

Slide  3  

Page 4: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

How it Works – DNS Based Mitigation

Inbound  Requests  (using  DNS  normally)  

Filtering  Service  

Server  (AKA  the  origin)  

Poin:ng  your  DNS  to  the  filter  will  not  block  traffic  to  the  origin  

DNS  resolu:on  is  NOT  a  network  access  control  

The  origin  IP  can  be  kept  secret  but  this  is  security  by  obscurity  

All  filtering/DDoS  blocking  can  be  bypassed  if  the  origin  can  be  found  

Inbound  Requests  (manually  

resolving  DNS)  

No filtering haha oops!

Or  we  could  take  a  more  direct  route…  

Normal  opera:ons  

Slide  4  

Page 5: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Fundamental Flaws

Cloud  Based  DDoS  protec:on  bypass  

• Fundamental  flaws  -­‐  Mi:ga:ons  are  messy  and  difficult  • Mul:ple  providers  are  affected,  including  the  largest  ones  on  the  market  

Techniques  may  be  effec:ve  for  other  cloud-­‐based  filtering  services  like  WAF  and  e-­‐mail  filtering  

Slide  5  

Page 6: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Fundamental Flaws

Three  ways  to  route  traffic:  DNS,  BGP,  inline  

Using  DNS  to  reroute  traffic  

•  Clever  a]ackers  can  send  traffic  to  the  origin  •  There  is  low  awareness  of  just  how  easy  it  is  •  Every  provider  that  uses  DNS  based  mi:ga:on  is  affected  

Providers  that  use  BGP  based  mi:ga:on  or  inline  filtering  are  not  affected  •  BGP  is  prac:cally  inline  because  IP  traffic  cannot  choose  how  it  is  routed  

Slide  6  

Page 7: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Fundamental Flaws

A  server’s  public  facing  IP  was  not  intended  to  be  secret  informa:on  

Many  sources  of  informa:on  leakage  can  reveal  the  origin.  

Once  the  origin  IP  is  known,  all  protec:on  is  lost  

Unmasking  an  origin  is  very  easy  

Slide  7  

Page 8: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP

• Manually  resolve  DNS  and  view  the  origin’s  website  directly  

• If  firewall  rules  prevent  verifica:on,  DDoS  the  origin  • The  provider  will  show  a  cached  copy  of  the  site  if  the  origin  is  unreachable  

Verifying  the  origin  IP  is  straighdorward  

Slide  8  

Page 9: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP

Verifying  the  origin  IP  is  straighdorward  

Slide  9  

Page 10: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP

Slide  10  

Page 11: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP

Slide  11  

Page 12: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP

Verifying  the  origin  IP  is  straighdorward  

Slide  12  

Page 13: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP

Slide  13  

Page 14: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP - DNS

• www.vic:m.com  points  to  a  DDoS  protec:on  provider’s  range,  but  ip.vic:m.com  points  to  the  origin  

• www.vic:m2013event.com  may  point  to  the  origin.  Check  all  domains  owned  by  your  target  

Related  DNS  records  

•  If  the  origin  IP  was  not  changed  aier  protec:on  is  set  up,  historical  DNS  services  exist  that  could  have  recorded  the  origin  IP  

Historical  DNS  records  

Slide  14  

Page 15: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP - Connections

• DDoS  protec:on  services  act  as  HTTP  reverse  proxies,  but  they  do  not  proxy  outbound  connec:ons  

• Applica:on  specific  features  like  “avatar  upload”  on  forums  

Outbound  connec:ons  to  an  a]acker  controlled  server  

• “I  forgot  my  password”  • “I  wish  to  subscribe  to  your  newsle]er”  

Outbound  e-­‐mail  headers  

Slide  15  

Page 16: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP - Leaks

• HTTP  authoriza:on  some:mes  leak  origin  IP  

Server  specific  informa:on  leakage  

• Overly  helpful  error  messages  • Exposed  config  files  

Applica:on  specific  informa:on  leakage  

Slide  16  

Page 17: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP - Providers

•  Submit  bogus  DMCA  complaints  to  obtain  the  origin  IP  of  Cloudflare  customers*  

DMCA  complaints  

•  Depends  on  the  policies  of  the  DDoS  protec:on  provider  

Other  types  of  abuse  complaints  

•  DDoSing  with  a  large  enough  a]ack  can  apparently  drop  the  customer  into  bypass  mode,  especially  for  cheap/free  accounts**  

Exceeding  capacity  

*  h]p://blog.cloudflare.com/thoughts-­‐on-­‐abuse    **  link  to  a  google  cached  version  of  a  malicious  "Cloudflare  dropping"  service.  Not  personally  tested  by  me         Slide  17  

Page 18: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP - Other

• Not  much  serious  research  has  been  done  in  gepng  a  server  to  divulge  its  public  facing  IP,  because  this  is  generally  not  a  security  issue  

• If  more  research  is  done,  more  exploits  may  emerge  

As  of  yet  undiscovered  methods  to  discover  the  origin  IP  

• Informa:on  is  not  considered  sensi:ve  so  may  be  carelessly  lei  around,  can  be  found  manually  

Target  specific  informa:on  leakage  

Slide  18  

Page 19: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Many ways to find the origin IP - Scanner

NoCloudAllowed.com  • Scans  the  en:re  Internet  for  servers  that  look  like  the  protected  website  

• Same  method  as  manual  origin  verifica:on,  but  against  every  IP  in  an  arbitrary  range  

• Unmasks  the  origin  even  in  the  absence  of  informa:on  leakage  

• Obscurity  is  no  more  

L  

Slide  19  

Page 20: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Mitigating the Threat

Non-­‐standard  configura:ons  to  prevent  unmasking  • Block  traffic  from  outside  the  provider’s  range  

Mi:ga:on  techniques  may  harm  availability  • Blocking  outside  requests  can  backfire  if  the  provider  must  go  into  bypass  mode  or  the  provider  sends  traffic  from  new  ranges  

Security  non-­‐issues  become  security  issues  • The  public  facing  IP  of  a  server  is  generally  not  considered  sensi:ve  data,  apps  are  not  designed  to  conceal  this  

Slide  20  

Page 21: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Mitigating the Threat

Inspect  all  apps  for  outbound  connec:ons  

Outbound  mail  must  obscure  the  

source  

Check  error  messages  for  IP  

leakage  

Remove  all  DNS  records  poin:ng  to  

the  origin  

Security  by  obscurity  

Fix  IP  leakage  issues  specific  to  

your  setup  

A]ackers  bypass  your  protec:ons  every  :me  they  find  your  IP  

Change  your  IP  every  :me  it  is  

leaked  

Fix  problems  caused  by  

changing  your  server’s  IP  

Slide  21  

Page 22: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Other Alternatives

Ask  your  provider  if  they  use  DNS  or  BGP  for  rerou:ng  traffic  •  If  BGP,  they  will  require  that  you  own  a  /24  and  BGP  capable  router  and  a  few  other  things.  Direct  to  origin  a]acks  won’t  work  while  it’s  on  

•  If  DNS  only,  get  ready  for  some  hide  and  seek  

If  you  use  an  inline  appliance,  it  cannot  be  bypassed  using  these  tricks  

Slide  22  

Page 23: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Other Alternatives

So  you  want  to  use  DNS  based  mi:ga:on…  

• Play  hide  and  seek  • Solve  new  problems  

Inline  or  BGP  based  mi:ga:ons  

• At  least  you  don’t  need  to  play  hide  and  seek  with  your  IT  infrastructure  

Slide  23  

Page 24: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Vender’s responses

Slide  24  

“It’s  a  known  issue”  

Page 25: How$itworks$ Fundamental$flaws$ Mi:gang$the$threat › us-13 › US-13-Nixon... · Allison Nixon Allison.Nixon@integralis.com Pentesting, Incident Response PaulDotCom host

Thank you

NoCloudAllowed.com

Allison Nixon Integralis Inc.

[email protected]

Special thanks to Chris Camejo, Brandon Levene

Slide  25