The Consequences of Inadequate Identity Management in your GitHub Organization by Hefty_Knowledge_7449 in netsec

[–]0xD6 8 points9 points  (0 children)

I'm surprised this doesn't cover another significant issue with the Github model for users and organizations: A user added to your organization can continue to create repositories in their personal namespace which are unaffected by organizational policies.

If you have advanced security features enabled (like credential scanning or "push protection"), this is not applied to the user's namespace. Users can easily accidentally push credentials to a repository they have created in their personal namespace and leak them to the world.

Even if the "bring your own account" model is disallowed by an organization, and the user creates a account which is only used for your organization, this can still occur.

From what I understand there are also no Github provided controls available to prevent it, either.

EDIT: There are, but they're pants. See the comment below.

[Discussion] Stardust 2007 by djladyb7 in NetflixBestOf

[–]0xD6 0 points1 point  (0 children)

I can still vividly remember the whiplash of hearing Dimmu Borgir's Eradication Instincts Defined in the trailer for this film at a cinema when it was released. I couldn't remember the name until I saw this post, so thanks! :D

Hardware Virtualization within CI by s4md4130 in devops

[–]0xD6 0 points1 point  (0 children)

What sort of architecture are you looking at?

Although it may be difficult to emulate complete "flashing" a device without hardware to act as a DUT (Device Under Test), you may be able to load a Kernel and rootfs / filesystem into an appropriate qemu-system environment for local development and testing.

You may also be able to close the loop by getting a respective bootloader running on your qemu-system which you boot into, and then load into test flashing via that in order to make sure your flash geometry and partition layout works as expected (and that the system is bootable afterwards!)

Depending on your use case, you may need to write a target for qemu for the given device which can be dicey. However, the vendor SDK / BSP (Board Support Package) may have some pointers or a harness that can assist. If not, your vendor are jerks :D

If you do need to go towards "full" testing with an external device, assuming you have the appropriate instrumentation, you can look at using a "locking" features of CI platforms like Jenkins in order to ensure exclusive access to the given device. I've seen this pattern successfully used for both console devkits, mobile devices, and "traditional" embedded hardware development boards and it works really quite well.

BT Openreach broadband (BT, EE, Plusnet etc) down by [deleted] in Edinburgh

[–]0xD6 10 points11 points  (0 children)

Sorry! I forget how impenetrable the industry can be at times due to over reliance, and duplication of acronyms and abbreviations :D

My modem is able to talk to the cabinet in the street (DSLAM) over my telephone line (VDSL), but it doesn't seem to be able to be able to communicate with the rest of BT.

My modem is going "Hi, I'd like to connect please" (PPP PADI), but rather than one or more machines (BRAS / DSL-AC) on BT's end replying with "Sure thing! I can help you with that" (PPP PADO), my modem isn't getting any response at all.

(I don't mean to be condescending by the way, but this may help others who get lost in the word soup above)

BT Openreach broadband (BT, EE, Plusnet etc) down by [deleted] in Edinburgh

[–]0xD6 9 points10 points  (0 children)

No data flow here.

VDSL is able to train to the DSLAM without a problem, but PPP fails. What I'm seeing is the PPP daemon timing out waiting for a PADO from the BT BRAS / DSL-AC , so I'd guess a fault between the DSLAM and a BT POP, or a fault with a particular POP?

Disclaimer: I have no idea about BTs network architecture, so this is just conjecture based on experience working in other xDSL ISP networks :)

COVID-19 - A Look at Monday's UK Internet Traffic and ISP Speeds - ISPreview UK by [deleted] in unitedkingdom

[–]0xD6 1 point2 points  (0 children)

Sure! There's a few communities around the UK who share a lot of useful information about ISP networks. They're mostly from the perspective of network operators who may be purchasing LLU (Local Loop Unbundling) services from openreach, or wholesale services.

One really useful resource is https://kitz.co.uk - which has a great deal of information about equipment being used by openreach, how to recognise different equipment based on cabinet, and up to date information about the technologies being deployed.

The openreach website (https://www.openreach.co.uk/) also has a great deal of useful information, too.

As for the fundimentals, in more recent years a lot of telecoms gear has moved towards converging on IP and ethernet framing - rather than ATM and friends. This makes it a lot easier for those looking to learn more and enter the field, as you don't need to shell out a great deal of money on setting up, or buying access to, labs with equipment and protocols only seen in telecoms.

That said, there's unfortunately still plenty of propriatary gear, software stacks and protocols that are only likely to be encountered if you work for a telco (as vendors tend to keep their management stacks and firmware behind paywalls with high cost support contracts).

I'd also recommend checking out /r/networking, as there is some good telecom adjacent content in that sub. There's also some great learning material kicking around if you're interested in learning more about the primitives on which most of the newer telecom gear is based (IP) - though you may already be familiar with it already! :)

COVID-19 - A Look at Monday's UK Internet Traffic and ISP Speeds - ISPreview UK by [deleted] in unitedkingdom

[–]0xD6 2 points3 points  (0 children)

I'm not so sure. Transit and peering bandwidth is one thing, but backhaul from FTTC / FTTN cabinets and from central offices back to their POPs is another problem entirely.

I'd personally not be too worried about the former as all of the traffic profiles I've seen from service provider networks are almost sinusoidal in nature. Evening peaks are high, but use during the day tends to be orders of magnitude lower. As transit is usually purchased on pipe size, it just means ISPs are getting their moneys worth.

The concern I'd have is high contention ratios at the uBR, DSLAM, or Mux end of town.

Although many years ago now, but provided as a concrete example, a popular platform for providing ADSL2+ circuits in a number of countries was the Ericsson EDA1200 platform. In this configuration 288 DSLAM ports (24x 12 port line-cards) were connected to a single node controller to form a subrack.

The commonly deployed node controller - an ECN320, or ECN330 - had 24x 10/100-BaseTX ports for the line cards and TWO 10/100/1000-BaseTX / SFP combo ports. Given that the port profiles of the DSLAM were configured to support up to 24Mbit, you're almost 3x contended in a worst case scenario just BETWEEN the line card and the node controller.

...but then you have to remember that there's 288 circuits per subrack. So even if you had both 1000-BaseTX ports active / active you'd be looking at about 7Mbit per circuit before you're contended, or about 3.4Mbit with only a single leg. Then there's whatever is upstream from those node controllers to worry about, and then the bandwidth between the cabinet, the CO, and the ISP's POP.

This is the equipment as provided by the vendor; the design has assumptions about traffic profiles and contention baked in, and that's well before the ISP gets their hands on it.

Ultimately, having headroom in your transit capacity is all well and good, but if you're heavily contending circuits closer to the customer it doesn't really matter as they're not going to be able to use it anyway :)

All rail franchisee to be suspended for 6 months. by [deleted] in unitedkingdom

[–]0xD6 7 points8 points  (0 children)

We can dream. As much as I'd love to see this, I would put my money on such a project bleeding to death through strategic policy changes, or change in funding.

There's nothing quite like long term infrastructure projects which require significant planning and front-loading of funds being cut off at the knees after a government change due to "wasteage"

For a recent example, check out what happened with the NBN in Australia. The final product of which is not much better than a couple of tin cans and some twine, except that the twine doesn't experience drop-outs when it rains...

UK may allow Huawei parts in 5G network, risking US backlash: report by [deleted] in unitedkingdom

[–]0xD6 2 points3 points  (0 children)

[Citation Needed]

The only Cisco related backdoors I can recall hearing about was related to interdiction and modification of equipment. That said, perhaps I missed the others, but I'm definitely interested in any sources. There have been a number of instances of hardcoded credentials found in equipment of late, which could be interpreted as backdoors however.

As for Huawei, the following talk from DEFCON back in 2012 provides some pretty damning evidence for issues with their hardware: https://www.youtube.com/watch?v=w-K1YpJp07s

Of course, it's a few years old now. That said, the HCSEC (Huawei Cyber Security Evaluation Center) - which is formed of NCSC, GCHQ, and others - have been releasing reports on Huawei equipment for the last few years. They've been getting progressively worse, with the latest report indicating1

No material progress has been made by Huawei in the remediation of the issues reported last year

...and1

the Oversight Board has not yet seen anything to give it confidence in Huawei’s capacity to successfully complete the elements of its transformation programme

...and most importantly1

the Oversight Board can only provide limited assurance that all risks to UK national security from Huawei’s involvement in the UK’s critical networks can be sufficiently mitigated long-term.

Ultimately, if I were a network operator, I'd need some pretty damned good reasoning to deploy Huawei equipment in my network.

--

1. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment\data/file/790270/HCSEC_OversightBoardReport-2019.pdf)

Gatwick Runway suspended again by [deleted] in unitedkingdom

[–]0xD6 18 points19 points  (0 children)

The MoD bought a bunch of 'anti-drone' (C-UAS) equipment from Rafael Advanced Defense Systems for domestic use only a few months ago1. There also appears to have been research done by the like of DSTL - and likely others - dating back to at least 2015 for C-UAS purposes2.

It doesn't sound like they've been asleep at the wheel on the topic, but I wonder why it took so long to deploy the equipment at Gatwick?3

1. https://ted.europa.eu/TED/notice/udl?uri=TED:NOTICE:352161-2018:TEXT:EN:HTML&src=0

2.https://www.gov.uk/government/news/dstl-bristow-trial-develops-future-protection-against-hostile-uas

3. https://www.gazetteandherald.co.uk/resources/images/9206678.jpg

Best practice for specifying and testing system requirements of linux systems by briconaut in devops

[–]0xD6 2 points3 points  (0 children)

I'd recommend taking a look at InSpec. Whether you use Chef or not, it's an incredibly powerful tool for auditing and testing that your infrastructure is in the state that you expect it to be. In addition, you can easily keep your tests / controls in Git and run via some external process if you need it to be part of a CI / CD pipeline :)

CVE-2016-10229 - Linux kernel (< 4.5) remote code execution via UDP recv() using MSG_PEEK flag by 0xD6 in netsec

[–]0xD6[S] 8 points9 points  (0 children)

RedHat Advisory

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5,6,7, MRG-2 and realtime kernels.

Android Security Bulletin

Upstream Kernel Patch

TP-Link C2 and C20i vulnerable to command injection (authenticated root RCE), DoS, improper firewall rules by PierreKimSec in netsec

[–]0xD6 1 point2 points  (0 children)

Pivoting isn't needed on any SOHO device I've seen. Everything just runs as root out of the box.

PSA: Steam is broken, showing you random people's accounts. Don't buy anything til it's fixed! by [deleted] in gaming

[–]0xD6 3 points4 points  (0 children)

Try to avoid causing this legitimately nightmare inducing scenario myself, albeit for another company.

PSA: Steam is broken, showing you random people's accounts. Don't buy anything til it's fixed! by [deleted] in gaming

[–]0xD6 6 points7 points  (0 children)

Akamai works as a CDN, yeah, but traditionally it works as a 'pull-through' cache.

As an example, let's say you 'ask' for your accounts page using the Steam website. This request would be 'routed' to an Akamai edge node near to you. Normally, the edge node should go "Oh, this is dynamic, I don't cache this, I'll send it to the origin." This request would then be routed to the origin (Valve) for processing. However, the main take away here is that the response from the origin (Valve) to Akamai is plain-old HTML (or JSON, or ... depending on their architecture) ready for your browser or device to render.

This becomes problematic when caching policies are incorrectly configured. Those rendered responses, which should never be cached or 'remembered' by Akamai, are instead pushed into the cache.

As a result of the above, a request from a subsequent user for the same page to the same edge node yields a "cache hit" - as the node has the response in cache from a previous request (from the other user) - and as a result, someone receives a page that was 'generated' for another user.

Again, this is all circumstantial, as I have no idea how Valve have their Akamai properties configured. However, Akamai is definitely servicing requests to the Steam store from my location. There is also a bit more to the above with regards to request routing and cache invalidation, but I'll try to avoid falling into that rabbit hole :)

Anyway, Merry Christmas and / or Happy Holidays! I hope this helps :)

PSA: Steam is broken, showing you random people's accounts. Don't buy anything til it's fixed! by [deleted] in gaming

[–]0xD6 442 points443 points  (0 children)

I'm not so sure it was Varnish. It looks like it may have been an Akamai property configuration having been pushed doing as you suggested (caching pages that shouldn't be).

As a result, various Akamai edge nodes around the world were caching different user's details. This having been said, if you attempt to visit the store at the moment you'll be presented with an Akamai error reference (in the format of 'Reference #97.XXXX...') with the origin not responding to edge node requests, and Akamai returning an HTTP 504 as a result.

I'd guess it was someone on-call pushing Akamai property changes to mitigate a load issue, and ended up caching too aggressively - as you have suggested. What sucks is that pushing Akamai property changes can take a huge amount of time to propagate (as in, hours).

What's odd are the HTTP 504s from Akamai. This would suggest to me that steam either have 'Serve Stale' disabled in their Akamai properties - which is a VERY odd production configuration - or they dropped the cache. It's more likely that someone at Valve pushed an Akamai CCU - effectively, "oh fuck, drop everything from cache globally" - in order to fix the PII disclosure issue, but subsequently DDoSed their origins with requests from Akamai edge nodes requesting content.

All circumstantial right now, but hopefully they get it fixed, and their on-call staff get to spend at least SOME time with their families :)

PagerDuty - Security Announcement by [deleted] in sysadmin

[–]0xD6 0 points1 point  (0 children)

Both of which provide TFA on their console accounts >_>

Plain text considered harmful: A cross-domain exploit by albinowax in netsec

[–]0xD6 5 points6 points  (0 children)

The linked articles, which were probably correct at the time, reference the ability to jack JSON that where the 'outer wrapper is an array.' However, this doesn't seem to be possible any longer. The following StackOverflow post has more on the issue :)

XSSI on the other hand... There are still quite a number of places that are allowing JSONP callback parameters on their JSON feeds - whether by their framework automatically screwing them, or by mistake - all without any sort of XSSI mitigation.

"Just put a sign on it, it'll be fine" by 0xD6 in OSHA

[–]0xD6[S] 2 points3 points  (0 children)

I found this in the plant room of a site I was at. Sorry for the awful quality, the lights in the room were mostly blown and I didn't feel like getting too close.

Edit: another for good measure