[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-relays] [tor-talk] Quantum Insert detection for everyone



I'm being a jerk and cross-posting to tor-relays, because I want to make
sure that relay operators are aware of the differences in the Snort vs
HoneyBadger approach.

Chris Dagdigian:
> 
> I run a US-based exit node and would be interested in a way to run
> this software without compromising the users exiting my node.
> Looking forward to your additional writeups - especially anything
> geared towards exit nodes and quantum insert detection.

I too look forward to David's writeup!

For what it's worth, I think HoneyBadger is likely to be safer for
exits, more comprehensive, more accurate, less noisy, and more high
performance than a Snort-based solution.

HoneyBadger is focused only on this particular attack and is written in
golang, whereas Snort has tons of rules for everything and is written in
C. This means that HoneyBadger will have a much smaller vulnerability
surface and should be much harder to directly exploit than Snort. Since
we're talking about detecting and capturing attacks from well funded
state/world-class adversaries here (wow, what a world), vulnerability
surface minimization and general memory safety are top priority.

Snort is also vulnerable to tailored attacks designed to flood its logs
and/or avoid detection. Snort is particularly susceptible to missing
stateful attacks designed to subvert its stateless rule-based approach to
detection. Several types of TCP injection attacks that rely on TCP
reassembly will likely fall into this category (type 4 in:
https://honeybadger.readthedocs.org/en/latest/#tcp-injection-attacks).

HoneyBadger also appears to have better logging options than the Snort
rules. David has been in contact with malware researchers who were quite
insistent that to properly analyze 0day, a single evilpacket is very
likely to be insufficient -- context is essential, especially if the
attacker wants to obfuscate the attack or otherwise avoid exploit
extraction.

Hence the need to provide optional full-take and rolling logging options
that make it easier to extract the full TCP stream of a tampered
connection, as well as related concurrent traffic (such as a stream from
a related HTTP redirect to an ephemeral URL). I've been talking with
David about ways to place these logs on a ramdisk or an ephemerally
encrypted partition, so that when detailed logs are needed, they can be
handled as safely as possible.

> >David Stainton <mailto:dstainton415@xxxxxxxxx>
> >April 22, 2015 at 2:41 PM
> >Greetings,
> >
> >Did you all see this Wired article about Quantum Insert detection?
> >
> >https://www.wired.com/2015/04/researchers-uncover-method-detect-nsa-quantum-insert-hacks
> >
> >These TCP injection attacks are used by various entities around the
> >world (not just NSA!) to target individuals for surveillance or
> >perhaps to add their computers to a botnet for other purposes.
> >
> >If you do not use a VPN or Tor you can run "Quantum Insert" detection
> >on your computer and detect when you receive an attack attempt.
> >However be advised that proper sandboxing is important here because
> >intrusion detection and protocol anylsis tools are notoriously
> >insecure and get pwned all the time.
> >
> >If you are a Tor exit relay operator you have the options of running
> >detection software; However you should not publish the results
> >publicly without mixing in some noise or your published data might
> >make it possible for some adversaries to deanonymize Tor users. If
> >your country has strict telecommunications laws then it might only be
> >legal for you to perform this type of detection if you do not perform
> >logging.
> >
> >For the past several months... in my free time I've been slowly
> >developing a very comprehensive TCP injection attack detection tool
> >called HoneyBadger:
> >
> >https://github.com/david415/HoneyBadger
> >
> >Quantum Insert is a NSA codeword for "TCP injection attack", however
> >either of these terms are too vague. During my research I was able to
> >classify 4 different types of TCP injection attack. When I say that
> >HoneytBadger is comprehensive what I mean is that Honeybadger can
> >detect ALL of these types of TCP injection attack types... I describe
> >them briefly here:
> >
> >https://honeybadger.readthedocs.org/en/latest/
> >
> >Here's the Fox-IT blog post about their Quantum Insert detection software:
> >http://blog.fox-it.com/2015/04/20/deep-dive-into-quantum-insert/
> >
> >I am going to work on writing a much more comprehensive blog post; it
> >will be filled with gory technical details AND it will include
> >information on how to use HoneyBadger. HoneyBadger has optional (off
> >by default) full-take logging which could enable you to capture a
> >zero-day payload from a TCP attack; you should then responsibly
> >disclose to the software vendor or contact a malware analyst to help
> >out!
> >
> >
> >Sincerely,
> >
> >David Stainton

-- 
Mike Perry

Attachment: signature.asc
Description: Digital signature

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays