Attacking XML Security.ppt
《Attacking XML Security.ppt》由会员分享,可在线阅读,更多相关《Attacking XML Security.ppt(121页珍藏版)》请在麦多课文档分享上搜索。
1、,Attacking XML Security,Brad Hill Principal Security Consultant ,1,Agenda,Introduction Who am I? Why care about XML Security?How do XML Digital Signatures work?How to build a cross-platform worm in XML!Can we use this technology safely?,2,Special Thanks to:,Alex Stamos & Scott Stender, iSEC Partners
2、 “Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps” http:/ Kaminsky of DoxPara & IOActiveDr. Laurence Bull of Monash University, AustraliaDr. Brian LaMacchia of Microsoft CorporationAndreas Junestam, Jesse Burns, Chris Clark and Chris Palmer of iSEC Partners,3,Introduction,W
3、ho am I?Principal Security Consultant for iSEC PartnersApplication security consultants and researchersBased in San Francisco and Seattle, USATo get the latest version of these slides: https:/ care about XML Security?,Web Services have gone mainstream: SOA & B2B integration Web Single Sign On And ev
4、erybody has XML applications. Its lurking more places than you might think: Mobile code manifests Printing DRM & software licensing P3P Digital identity systems,5,Two years ago,Alex Stamos & Scott Stender of iSEC present: “Attacking Web Services: The Next Generation of Vulnerable Enterprise Applicat
5、ions”Web Services can be scary: Valuable Visible Vulnerable,6,Web Service application-level attacks,The OWASP Top 10 still apply to Web ServicesOld flaws like SQL injectionAnd new flaws like XML and XPath injectionPlus complexity attacks and denial of services against XML parsers and applications,7,
6、Todays topic is protocol-level attacks,Alex & Scotts talk has been widely noted.One of the few things followers have added is (and which they deliberately didnt)WS-Security to save the day! (or not),8,Why XMLDSIG & XMLENC?,For meI didnt really set out to look at it, specifically.IANAC (I am not a Cr
7、yptographer)I thought: “Just a signature with angle brackets.”Lots of new applications and platforms being built on Web Services.Not a lot of security testing tools yet.,9,Building an attack proxy,I wanted a tool like WebScarab or Fiddler for attacking Web Services utilizing WS-Security.First order
8、of business was fixing up XML Signatures.Then I found this in the interop vectors while doing unit testing: ( Merlin Hughes, Baltimore Technologies, 2002),10,foobar60NvZvtdTB+7UnlLp/H24p7h4bs=60NvZvtdTB+7UnlLp/H24p7h4bs=self:text()zyjp8GJOX69990Kkqw8ioPXGExk=.,11,qg4HFwsN+/WX32uH85WlJU9l45k=ETlEI3y7
9、hvvAtMe9wQSz7LhbHEE=J/O0HhdaPXxx49fgGWMESL09GpA=J/O0HhdaPXxx49fgGWMESL09GpA=J/O0HhdaPXxx49fgGWMESL09GpA=MkL9CX8yeABBth1RChyPx58Ls8w=.,12,WvZUJAJ/3QNqzQvwne2vvy7U5Pck8ZZ5UTa6pIwR7GE+PoGi6A1kyw=ancestor-or-self:dsig:X509DataI am the text.SSBhbSB0aGUgdGV4dC4=60NvZvtdTB+7UnlLp/H24p7h4bs=qURlo3LSq4TWQtyg
10、BZJ0iXQ9E14=Notaries .,13,CN=Merlin Hughes,OU=X/Secure,O=Baltimore Technologies Ltd.,ST=Dublin,C=IECN=Transient CA,OU=X/Secure,O=Baltimore Technologies Ltd.,ST=Dublin,C=IE1017788370348MIIDUDCCAxCgAwIBAgIGAOz46g2sMAkGByqGSM44BAMwbjELMAkGA1UEBhMCSUUxDzANBgNVBAgTBkR1YmxpbjEkMCIGA1UEChMbQmFsdGltb3JlIFRl
11、Y2hub2xvZ2llcyBMdGQuMREwDwYDVQQLEwhYL1NlY3VyZTEVMBMGA1UEAxMMVHJhbnNpZW50IENBMB4XDTAyMDQwMjIyNTkzMFoXDTEyMDQwMjIxNTkyNVowbzELMAkGA1UEBhMCSUUxDzANBgNVBAgTBkR1YmxpbjEkMCIGA1UEChMbQmFsdGltb3JlIFRlY2hub2xvZ2llcyBMdGQuMREwDwYDVQQLEwhYL1NlY3VyZTEWMBQGA1UEAxMNTWVybGluIEh1Z2hlczCCAbcwggEsBgcqhkjOOAQBMIIBHwKB
12、gQDd454C+qcTIWlb65NKCt2PtguNpOSnId5woUigu7xBk2QZNAjVyIhMEfSWp8iR0IdKLx+JQLcNOrcn0Wwl5/hhW0MXsmlS8dM5Cq2rtmDHooLxbGTPqtALE6vsXQCk5iLz3MtGh7gyQMZ7q7HT5a3I5NChUgY1MMNQVetRA1susQIVAIQy3BStBjvx89Wq8Tjr7IDP1S8lAoGBAJ58e4W3VqMxm7ZxYJ2xZ6KX0Ze10WnKZDyURn+T9iFIFbKRFElKDeotXwwXwYON8yre3ZRGkC+2+fiU2bdzIWTT6LMb
13、IMVbk+07P4OZOxJ6XWL9GuYcOQcNvX42xh34DPHdq4XdlItMR25NA+OdZ4S8VVrpb4jkj4cyir1628kgA4GEAAKBgHH2KYoaQEHnqWzRUuDAG0EYXV6Q4ucC68MROYSL6GKqNS/AUFbvH2NUxQD7aGntYgYPxiCcj94i38rgSWg7ySSz99MAR/Yv7OSd+uej3r6TlXU34u+xYvRo+sv4m9lb/jmXyZJKeC+dPqeU1IT5kCybURLILZfrZyDsiU/vhvVozowODAOBgNVHQ8BAf8EBAMCB4AwEQYDVR0OBAoEC
14、IatY7SElXEOMBMGA1UdIwQMMAqACIOGPkB2MuKTMAkGByqGSM44BAMDLwAwLAIUSvT02iQjQ5da4Wpe0Bvs7GuCcVsCFCEcQpbjUfnxXFXNWiFyQ49ZrWqnMIIDSzCCAwugAwIBAgIGAOz46fwJMAkGByqGSM44BAMwbjELMAkGA1UEBhMCSUUxDzANBgNVBAgTBkR1YmxpbjEkMCIGA1UEChMbQmFsdGltb3JlIFRlY2hub2xvZ2llcyBMdGQuMREwDwYDVQQLEwhYL1NlY3VyZTEVMBMGA1UEAxMMVHJhb
15、nNpZW50IENBMB4XDTAyMDQwMjIyNTkyNVoXDTEyMDQwMjIxNTkyNVowbjELMAkGA1UEBhMCSUUxDzANBgNVBAgTBkR1YmxpbjEkMCIGA1UEChMbQmFsdGltb3JlIFRlY2hub2xvZ2llcyBMdGQuMREwDwYDVQQLEwhYL1NlY3VyZTEVMBMGA1UEAxMMVHJhbnNpZW50IENB.,14,Thats no Cryptographic Integrity Primitive,Its an application protocol!,15,Generality = Comp
16、lexity = Vulnerability -Tim Newsham, iSEC Partners,That signature definitely looked like there was fertile ground for misuse by developers and clients.Its complex enough to even present a fair bit of trouble for implementers intimately familiar with the specification.,16,But not a lot of public atte
17、ntion yet.,There have been excellent papers on several of the WS-* security standards in the academic world.Worth searching the ACM, Springer or IEEE libraries for.http:/ are even full formal proofs of some of these protocols.But they often start with sentences like: “Assume that the participating c
18、omputers and the users browser B are correct.”,17,A formally correct mechanism for putting burning logs right in the middle of your house, safely.,What the architect designed,18,Photo Credit: Jeff Leighton, Inspect-It 1st Property Inspection. Used with permission.,What the reviewer sometimes finds:,
19、19,Attack Surface Analysis,Typical for applications start with a threat model. Enumerate all the entry points, interfaces and operations. Which are anonymously accessible? Available to authenticated users? Authorized to all users, administrators, or an individual user? Locally or remotely accessible
20、? Complexity of inputs or operations, dependencies, assumptions.,20,HTTPS (a bit simplified),A,B,TLS,Message1,Per-session key exchangeOnly X.509 certificates supported as keysMultiple messages over single sessionNo preservation of evidence,Difficult to compose with reliable deliveryOpaque to interme
21、diariesMessages only protected in the channelForward secrecy with DH key exchange,Channel privacy & integrity with KSESSION,Symmetric KSESSION derived from X.509 certs & DH key exchange,Messagen,21,Encrypt KB,Sign KC,WS-Security (One of many possibilities.),A,B,C,M,Sign KA,Mp1 Mp2,Sign KA,D,Durable
22、securitySelective securityMixed key/token typesMixed key exchange,HTTP HTTPS JMS TCP,Intermediate actorsComposable assertionsTransport agnostic,KB,Kc,Mp3,Mp1 Mp2,22,23,HTTP,XML, SOAP, WSDL, Schema, WS-Addressing, etc.,XML Digital Signatures,XML Encryption,SAML,Kerberos,X.509,Security Token Profiles,
23、WS-Trust,WS-Federation,WS-SecureConversation,WS-Policy,WS-Security Policy,WS-Security,.Net TCP Channel, Fast InfoSet, etc.,WS-Actually Get Some Work Done,SSL,24,SSL,25,HTTP,XML, SOAP, WSDL, Schema, WS-Addressing, etc.,XML Digital Signatures,XML Encryption,SAML,Kerberos,X.509,Security Token Profiles,
24、WS-Trust,WS-Federation,WS-SecureConversation,WS-Policy,WS-Security Policy,WS-Security,.Net TCP Channel, Fast InfoSet, etc.,Goals of XMLDSIG in WS-Security,Sign arbitrary digital content.Sign the semantic intent of an XML document, (the “InfoSet”) not an octet stream. (binary XML encoding compatibili
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATTACKINGXMLSECURITYPPT
