Hírolvasó
Six stable kernel updates
Security updates for Wednesday
Kritikus Zoho RCE hibához érkezik javítás
Még ezen a héten proof-of-concept exploit kódot adnak ki egy kritikus sebezhetőségre, amely távoli kódfuttatást (RCE) tesz lehetővé hitelesítés nélkül több VMware termékben szerepel. A CVE-2022-47966 néven nyomon követett RCE biztonsági hiba egy elavult és sebezhető harmadik féltől származó függőség, az Apache Santuario használatának köszönhető.
The post Kritikus Zoho RCE hibához érkezik javítás first appeared on Nemzeti Kibervédelmi Intézet.
Matthew Garrett: PKCS#11. hardware keystores, and Apple frustrations
The problem with all of these hardware approaches is that they have entirely different communication mechanisms. The industry realised this wasn't ideal, and in 1994 RSA released version 1 of the PKCS#11 specification. This defines a C interface with a single entry point - C_GetFunctionList. Applications call this and are given a structure containing function pointers, with each entry corresponding to a PKCS#11 function. The application can then simply call the appropriate function pointer to trigger the desired functionality, such as "Tell me how many keys you have" and "Sign this, please". This is both an example of C not just being a programming language and also of you having to shove a bunch of vendor-supplied code into your security critical tooling, but what could possibly go wrong.
(Linux distros work around this problem by using p11-kit, which is a daemon that speaks d-bus and loads PKCS#11 modules for you. You can either speak to it directly over d-bus, or for apps that only speak PKCS#11 you can load a module that just transports the PKCS#11 commands over d-bus. This moves the weird vendor C code out of process, and also means you can deal with these modules without having to speak the C ABI, so everyone wins)
One of my work tasks at the moment is helping secure SSH keys, ensuring that they're only issued to appropriate machines and can't be stolen afterwards. For Windows and Linux machines we can stick them in the TPM, but Macs don't have a TPM as such. Instead, there's the Secure Enclave - part of the T2 security chip on x86 Macs, and directly integrated into the M-series SoCs. It doesn't have anywhere near as many features as a TPM, let alone an HSM, but it can generate NIST curve elliptic curve keys and sign things with them and that's good enough. Things are made more complicated by Apple only allowing keys to be used by the app that generated them, so it's hard for applications to generate keys on behalf of each other. This can be mitigated by using CryptoTokenKit, an interface that allows apps to present tokens to the systemwide keychain. Although this is intended for allowing a generic interface for access to such tokens (kind of like PKCS#11), an app can generate its own keys in the Secure Enclave and then expose them to other apps via the keychain through CryptoTokenKit.
Of course, applications then need to know how to communicate with the keychain. Browsers mostly do so, and Apple's version of SSH can to an extent. Unfortunately, that extent is "Retrieve passwords to unlock on-disk keys", which doesn't help in our case. PKCS#11 comes to the rescue here! Apple ship a module called ssh-keychain.dylib, a PKCS#11 module that's intended to allow SSH to use keys that are present in the system keychain. Unfortunately it's not super well maintained - it got broken when Big Sur moved all the system libraries into a cache, but got fixed up a few releases later. Unfortunately every time I tested it with our CryptoTokenKit provider (and also when I retried with SecureEnclaveToken to make sure it wasn't just our code being broken), ssh would tell me "provider /usr/lib/ssh-keychain.dylib returned no slots" which is not especially helpful. Finally I realised that it was actually generating more debug output, but it was being sent to the system debug logs rather than the ssh debug output. Well, when I say "more debug output", I mean "Certificate []: algorithm is not supported, ignoring it", which still doesn't tell me all that much. So I stuck it in Ghidra and searched for that string, and the line above it was
iVar2 = __auth_stubs::_objc_msgSend(uVar7,"isEqual:",*(undefined8*)__got::_kSecAttrKeyTypeRSA);
with it immediately failing if the key isn't RSA. Which it isn't, since the Secure Enclave doesn't support RSA. Apple's PKCS#11 module appears incapable of making use of keys generated on Apple's hardware.
There's a couple of ways of dealing with this. The first, which is taken by projects like Secretive, is to implement the SSH agent protocol and have SSH delegate key management to that agent, which can then speak to the keychain. But if you want this to work in all cases you need to implement all the functionality in the existing ssh-agent, and that seems like a bunch of work. The second is to implement a PKCS#11 module, which sounds like less work but probably more mental anguish. I'll figure that out tomorrow.
comments
Game of Trees 0.80 released.
Game of Trees 0.80 has been released (and the port updated).
[$] A survey of the Python packaging landscape
Git 2.39.1 (and more) released
Firefox 109 released
MV3 also ushers an exciting user interface change in the form of the new extensions button (already available on Firefox Nightly). This will give users direct control over which extensions can access specific web sites. Users are able to review, grant, or revoke MV3 extension access to any website.
Security updates for Tuesday
Fortinet sebezhetőség kihasználásával támadtak kormányzati szervezeteket
A Fortinet arra hívja fel a figyelmet, hogy a FortiOS SSL-VPN termékét érintő, nemrég befoltozott sérülékenységet (CVE-2022-42475) támadók célzottan kormányzati szervezetek elleni támadsok során használják ki.
The post Fortinet sebezhetőség kihasználásával támadtak kormányzati szervezeteket first appeared on Nemzeti Kibervédelmi Intézet.
Dave Airlie (blogspot): vulkan video decoding: av1 (yes av1) status update
Needless to say h264/5 weren't my real goals in life for video decoding. Lynne and myself decided to see what we could do to drive AV1 decode forward by creating our own extensions called VK_MESA_video_decode_av1. This is a radv only extension so far, and may expose some peculiarities of AMD hardware/firmware.
Lynne's blog entry[1] has all the gory details, so go read that first. (really read it first).
Now that you've read and understood all that, I'll just rant here a bit. Figuring out the DPB management and hw frame ref and curr_pic_idx fields was a bit of a nightmare. I spent a few days hacking up a lot of wrong things before landing on the thing we agreed was the least wrong which was having the ffmpeg code allocate a frame index in the same fashion as the vaapi radeon implementation did. I had another hacky solution that involved overloading the slotIndex value to mean something that wasn't DPB slot index, but it wasn't really any better. I think there may be something about the hw I don't understand so hopefully we can achieve clarity later.
Európai kiberbiztonsági startupok is jelentkezhetnek a Google üzleti gyorstalpalójára
A Google bejelentette, hogy a Google for Startups Growth Academy: Cybersecurity elnevezésű képzési programját az európai startupok számára is elérhetővé teszi.
The post Európai kiberbiztonsági startupok is jelentkezhetnek a Google üzleti gyorstalpalójára first appeared on Nemzeti Kibervédelmi Intézet.
[$] Fedora's tempest in a stack frame
Täht: Flaws and features in the Flent network testing tool
With flent - in the 110 tests in it - in a matter of minutes you can replicate any network stress test “out there” and compare networking results across an extraordinary number of variables, over time, across many tests. Before Toke Høiland-Jørgensen developed flent, it would take days to set up a single test and single plot. Now you can be deluged in data, graph it quickly, and can investigate network behaviors in minutes that take other support staff, engineers and SREs months, plot accurately, over each change you make, with comparable results in a standardized file format, and a zillion useful plot types.
Security updates for Monday
A jelszókezelők feltörésére figyelmeztet a NortonLifeLock
A Gen Digital (korábban Symantec Corporation és NortonLifeLock) arról értesíti ügyfeleit, hogy rosszindulatú szereplők hozzáférést szerezhettek egyes felhasználók Norton Password Manager fiókjaihoz. Az értesítő szerint a támadások nem a céget ért közvetlen támadásból, hanem egy harmadik fél által üzemeltetett platformon történt fiók-kompromittációból eredhetnek. A cég közleménye szerint szokatlanul nagy mennyiségű sikertelen bejelentkezési kísérletet észleltek 2022. […]
The post A jelszókezelők feltörésére figyelmeztet a NortonLifeLock first appeared on Nemzeti Kibervédelmi Intézet.
A cookie szabályok megsértése miatt kapott bírságot a TikTok
A borító kép forrása: The Hacker News A francia adatvédelmi hatóság 5 millió eurós pénzbírságot szabott ki a TikTok videómegosztó platformra, a cookie-k engedélyezésére vonatkozó szabályok megsértése miatt. A CNIL (Commission nationale de l’informatique et des des libertés) közleménye szerint a felhasználók nem tudták olyan egyszerűen elutasítani a sütik használatát, mint elfogadni azokat, ráadásul a […]
The post A cookie szabályok megsértése miatt kapott bírságot a TikTok first appeared on Nemzeti Kibervédelmi Intézet.
Kernel prepatch 6.2-rc4
So here's another -rc release, this time with pretty much everybody back from winter holidays, and so things should be back to normal. And you can see that in the size, this is pretty much bang in the middle of a regular rc size for this time in the merge window.
Matthew Garrett: Blogging and microblogging
For the past decade or so, as I moved away from just doing kernel development and focused more on security work instead, Twitter's filled a similar role for me. I've seen people just dumping their thought process as they work through a problem, helping me come up with effective models for solving similar problems. I've learned that the smartest people in the field will spend hours (if not days) working on an issue before realising that they misread something back at the beginning and that's helped me feel like I'm not unusually bad at any of this. It's helped me learn more about my peers, about my field, and about myself.
Twitter's now under new ownership that appears to think all the worst bits of Twitter were actually the good bits, so I've mostly bailed to the Fediverse instead. There's no intrinsic length limit on posts there - Mastodon defaults to 500 characters per post, but that's configurable per instance. But even at 500 characters, it means there's more room to provide thoughtful context than there is on Twitter, and what I've seen so far is more detailed conversation and higher levels of meaningful engagement. Which is great! Except it also seems to discourage some of the posting style that I found so valuable on Twitter - if your timeline is full of nuanced discourse, it feels kind of rude to just scream "THIS FUCKING PIECE OF SHIT IGNORES THE HIGH ADDRESS BIT ON EVERY OTHER WRITE" even though that's exactly the sort of content I'm there for.
And, yeah, not everything has to be for me. But I worry that as Twitter's relevance fades for the people I'm most interested in, we're replacing it with something that's not equivalent - something that doesn't encourage just dropping 50 characters or so of your current thought process into a space where it can be seen by thousands of people. And I think that's a shame.
comments