Monday, July 26
Apple Stores are good to me
My wife, however, was a different story. You may remember from a previous post of mine that my wife dropped her iPhone4 while getting my daughter out of the car. Whoops. Cracked the back glass to shreds.
She was fairly upset, since she had it about a week. Anyway, she went in, explained what she did to the Apple Genius dudes, and guess what?
They gave her a brand new phone.
/That's/ why I like Apple Stores.
Thanks to the Christiana Mall Apple Store Geniuses. You rule.
Monday, January 11
iPhone compatability
So here's what it will look like now when you navigate to the site on an iPhone:
You notice the drop down at the top right of the screen? This allows you to view the site via RSS, sort by category, even Email me directly from the blog.
If you don't like how the page looks on the iPhone, you can turn this feature off by scrolling down to the bottom of the page and flicking the switch, as seen below:
This is all made possible by the WPtouch theme. Thanks Wordpress.
Reviewing ModSecurity 2.5, the book
Consequently, I am playing with ModSecurity a bit, and I will try very hard to NOT break things on the blog.
So far it's a good book and it's been quite awhile since I've used ModSecurity (back in the 1.x days) and the configuration has completely changed. So I'm on a quick learning curve as well.
Wednesday, May 28
Apple also released Security Update 2008-003
- AFP Server
Issue: Files that are not designated for sharing may be accessed
remotely
Solution: Deny access to files and folders that are not inside a
folder
designated for sharing
Credit: Alex deVries and Robert Rich
- Apache
Issue: Multiple vulnerabilities in Apache 2.0.55, including cross-site
scripting.
Solution: Apache is updated to version 2.0.63 to address several
vulnerabilities
Note: This is for Mac OS X Server 10.4.x systems, since Leopard ships
with Apache 2.2.x.
- AppKit
Issue: Maliciously crafted file, unexpected application termination,
arbitrary code execution
Solution: Improved validation of document files.
Credit: Rosyna of Unsanity
- Apple Pixlet Video
Issue: Vulnerability to unexpected application termination, arbitrary
code execution
Solution: Improved bounds checking.
- ATS
Solution: Additional validation of embedded fonts.
Credit: Melissa O'Neill of Harvey Mudd College
- CFNetwork
Issue: Vulnerability leading to disclosure of sensitive information
Solution: User prompts
- CoreFoundation
Issue: Vulnerability leading to unexpected application termination or
arbitrary code execution
Solution: Additional validation of length parameters.
- CoreGraphics
termination or arbitrary code execution
Solution: Proper initialization of pointers
- CoreTypes
Issue: Lack of prompting against opening "certain potentially unsafe
content types" in Automator, Help, Safari, and Terminal
Solution: Enhancements to Download Validation in Mac OS X v10.4, and
Quarantine in Mac OS X v10.5
Credit: Brian Mastenbrook
- CUPS
Solution: Validation of environment variables
- Flash Player Plug-in
Issue: Arbitrary code execution
Solution: Updating to version 9.0.124.0
- Help Viewer
Issue: Vulnerability to application termination or arbitrary code
execution
Solution: Improved bounds checking
Credit: to Paul Haddad of PTH Consulting
- iCal
Issue: Vulnerability to unexpected application termination or
arbitrary
code execution
Solution: "Improving reference counting in the affected code"
Note: This issue only affects pre-Mac OS X 10.5 systems.
Credit: Rodrigo Carvalho of Core Security Technologies
- International Components for Unicode
Issue: Disclosure of sensitive information
Solution: "...replacing invalid character sequences with a fallback
character."
- Image Capture
Issue: Path traversal vulnerability
Solution: Improved URL handling
Issue: Privilege elevation
Solution: Improved handling of temporary files
- ImageIO
Issue: Out-of-bounds memory read leading to information
disclosure
Solution: Additional validation of BMP and GIF images
Credit: Gynvael Coldwind of Hispasec
Issue: Multiple vulnerabilities in libpng version 1.2.18
Solution: Updating to version 1.2.24
Issue: Vulnerability to unexpected application termination or
arbitrary code execution
Solution: Additional validation of JPEG2000 images.
- Kernel
Issue: Remote vulnerability to unexpected system shutdown due
to undetected failure condition
Solution: Proper detection of the failure condition.
Issue: Local user vulnerability to unexpected system shutdown
due to mishandling of code signatures
Solution: Perform additional validation of code signatures
- LoginWindow
Issue: Race condition preventing MCX preferences being applied
Solution: Eliminate the race condition
Issue: IPv6 vulnerability leading to unexpected application
termination, information disclosure, or arbitrary code execution
Solution: Properly initializing variable.
Credit: Derek Morr of The Pennsylvania State University
- ruby
Issue: Remote vulnerability
Solution: Mongrel updated to version 1.1.4
- Single Sign-On
Issue: Password disclosure in sso_util
Solution: Make password parameter optional, force sso_util to promp
Credit: Geoff Franks of Hauptman Woodward Institute
- Wiki Server
Issue: Remote vulnerability to information disclosure
Solution: Improved handling of error messages
Credit: Don Rainwater of the University of Cincinnati
Apple also released Security Update 2008-003
- AFP Server
Issue: Files that are not designated for sharing may be accessed
remotely
Solution: Deny access to files and folders that are not inside a
folder
designated for sharing
Credit: Alex deVries and Robert Rich
- Apache
Issue: Multiple vulnerabilities in Apache 2.0.55, including cross-site
scripting.
Solution: Apache is updated to version 2.0.63 to address several
vulnerabilities
Note: This is for Mac OS X Server 10.4.x systems, since Leopard ships
with Apache 2.2.x.
- AppKit
Issue: Maliciously crafted file, unexpected application termination,
arbitrary code execution
Solution: Improved validation of document files.
Credit: Rosyna of Unsanity
- Apple Pixlet Video
Issue: Vulnerability to unexpected application termination, arbitrary
code execution
Solution: Improved bounds checking.
- ATS
Solution: Additional validation of embedded fonts.
Credit: Melissa O'Neill of Harvey Mudd College
- CFNetwork
Issue: Vulnerability leading to disclosure of sensitive information
Solution: User prompts
- CoreFoundation
Issue: Vulnerability leading to unexpected application termination or
arbitrary code execution
Solution: Additional validation of length parameters.
- CoreGraphics
termination or arbitrary code execution
Solution: Proper initialization of pointers
- CoreTypes
Issue: Lack of prompting against opening "certain potentially unsafe
content types" in Automator, Help, Safari, and Terminal
Solution: Enhancements to Download Validation in Mac OS X v10.4, and
Quarantine in Mac OS X v10.5
Credit: Brian Mastenbrook
- CUPS
Solution: Validation of environment variables
- Flash Player Plug-in
Issue: Arbitrary code execution
Solution: Updating to version 9.0.124.0
- Help Viewer
Issue: Vulnerability to application termination or arbitrary code
execution
Solution: Improved bounds checking
Credit: to Paul Haddad of PTH Consulting
- iCal
Issue: Vulnerability to unexpected application termination or
arbitrary
code execution
Solution: "Improving reference counting in the affected code"
Note: This issue only affects pre-Mac OS X 10.5 systems.
Credit: Rodrigo Carvalho of Core Security Technologies
- International Components for Unicode
Issue: Disclosure of sensitive information
Solution: "...replacing invalid character sequences with a fallback
character."
- Image Capture
Issue: Path traversal vulnerability
Solution: Improved URL handling
Issue: Privilege elevation
Solution: Improved handling of temporary files
- ImageIO
Issue: Out-of-bounds memory read leading to information
disclosure
Solution: Additional validation of BMP and GIF images
Credit: Gynvael Coldwind of Hispasec
Issue: Multiple vulnerabilities in libpng version 1.2.18
Solution: Updating to version 1.2.24
Issue: Vulnerability to unexpected application termination or
arbitrary code execution
Solution: Additional validation of JPEG2000 images.
- Kernel
Issue: Remote vulnerability to unexpected system shutdown due
to undetected failure condition
Solution: Proper detection of the failure condition.
Issue: Local user vulnerability to unexpected system shutdown
due to mishandling of code signatures
Solution: Perform additional validation of code signatures
- LoginWindow
Issue: Race condition preventing MCX preferences being applied
Solution: Eliminate the race condition
Issue: IPv6 vulnerability leading to unexpected application
termination, information disclosure, or arbitrary code execution
Solution: Properly initializing variable.
Credit: Derek Morr of The Pennsylvania State University
- ruby
Issue: Remote vulnerability
Solution: Mongrel updated to version 1.1.4
- Single Sign-On
Issue: Password disclosure in sso_util
Solution: Make password parameter optional, force sso_util to promp
Credit: Geoff Franks of Hauptman Woodward Institute
- Wiki Server
Issue: Remote vulnerability to information disclosure
Solution: Improved handling of error messages
Credit: Don Rainwater of the University of Cincinnati
Wednesday, March 12
Internet Zoning Initiative, and why it's stupid
Now, this, to me, is like asking a kid to click on, "Are you above the age of 18? Yes, or No". If a teenager (or adult for that matter) wants to go and look at whatever they want to look at, what are they going to click? Saturday, March 8
Subscribers Part 2
Monday, January 21
RSS Feeds, all in one place
RSS Feeds, all in one place
Wednesday, December 26
OSX, Windows, and security
You are correct that third-party applications are weak points. This applies equally if not moreso to Mac OS X. I think there is use of more third-party apps under Mac OS X than typically by Windows XP/Vista users.
I'm not talking about 3rd party apps. I am talking about Open source apps that are integrated into the OS. Apache, Mysql, tcpdump, bind..etc.. Neither OS supports the updating of a 3rd party app through their Software Update package. They SHOULD. I talked about this back here.
Windows is, in fact, much more open than Mac OS X. Mac OS X upon release looked nothing like FreeBSD 4, which it was based on. Note that FreeBSD 5 was almost done at the time Mac OS X was released and FreeBSD is now on version 7.
Windows is more open than OSX? OSX contains Open Source code, and Windows total code is closed. So right there, by default, you are wrong. OSX was BASED on Freebsd. No one says it is anymore. Far from it. Technically it could be argued that OSX is based on NEXTSTep.
Microsoft provides symbol tables and wonderful debugging tools for its applications. Apple provides nothing in this area of comfort.
Apparently you have never looked at Xcode and all the debugging apps that are OSX based?
When Microsoft releases a specification, especially one based around security - thousands of intelligent code reviewers with the right kind of security backgrounds get to review it. Microsoft offers Blue Hat and other forums where the best and brightest in the security world get to give input into their process of building a secure operating system along with secure applications.
Yes, when Microsoft releases a SPECIFICATION, it is reviewed. Not CODE. Neither does Apple. Btw -- how did that OpenDoc xml specification do? Oh that's right, got rejected. Microsoft does offer Blue Hat and the such, but the attendance is thin, is under NDA, and is secretive.
Apple throws rotten apples at vulnerability researchers.
Apple's product security team gives credit where credit is due. What do you want the product security team to do? Pay vulnerability researchers? MSFT doesn't do that either. That comment just makes no sense. Anyone that has actually worked with Apple Product Security team (and yes, I have) know they take the time to respond to an issue. Don't believe everything you read in the press.
Microsoft launched the Trustworthy Computing Initiative in 2002. Apple has never spent a dime or taken any "breaks" to check their code for security. Microsoft has been doing this for almost 6 years now and have applied it to all of their software. Security is baked into Microsoft applications.
WRONG. Apple does spend dimes on security, lots of them. Except they don't need a separate department, (oh wait... they have one it's called the Product Security team), to manage all the vulnerabilites.
For Apple, it's iced on as "features". You can just look at Matasano or anyone's assessment of the security features in Mac OS X LeoTard. It's abominable to think that Apple is doing a good job with regards to security.
I agree. Apple could do more. A lot more. I know they are taking steps to improve security especially in Quicktime. I can't talk anymore about that though.
I am anxious to see the mantra "replace Mom and Dad's computer with a Mac this Christmas" backfire this year.
That's what they said last year too.
Do you remember why people write viruses?
Lack of a home life? Or to make money?
They write viruses to teach stupid people lessons.
Yeah? Or they are doing it for fun and profit. I'll stick with my thoughts.
You are that stupid person. Apple fanboys will eat their words when something bad happens this year.
That's what they said last year, and the year before. I'm not stupid. I know it's a reality. Our time is coming. I take a few extra steps to secure my computer.
And Apple doesn't care. They will wash their hands of liability while their customers suffer. They aren't "doing anything to stop the problem".
Wrong. See above. I can't talk about it any further.
They aren't "solving the QuickTime vulnerability problem". This would mean implementing a software assurance program. This would mean implementing something such as the Microsoft Security Development Lifecycle. Apple has not done this.
It doesn't mean that, it just means that the Quicktime team needs to re-look at all their code and secure it. You don't need a program or another acronym to solve the problem. Apple just needs to fix their code, they are, again, see above. Can't talk about it any further.
Apple does not "test test test test and test". That's what Microsoft does. Apple does not test at all... they think that testing and debugging are the same thing! A "quality test program" means integrating Quality Risk Management.
Riiiight. So Apple never seeds developer releases to test stuff?
It is held strongly by the Enterprise and research community that Sourcefire is the worst security company in the history of security companies.
Really? Is that why Snort is the IDS to which all other IDS's are measured? Is that why we have products that other companies can't even fathom? Please, show me this "strongly" held opinion.
Why haven't they been bought yet?
Tried that once, remember the whole CHKP thing?
Why are they going out of business?
What? Who said we are going out of business? Last time I checked we IPO'ed? We're making money?
I would never start a company based on an open-source product that is doomed to fail because of its architecture. Network intrusion detection was dead on arrival, but you think the 1998 Ptacek/Newsham paper would have killed it for sure. What is wrong with Sourcefire to think that they could continue this on for 10 years?
You would never make any money either apparently. Also, Um, what code do we have that counters the Ptacek/Newsham paper? Target based fragmentation? We've even take it a step further and countered Target based stream reassembly?
Windows vulnerabilities cause less damage.
$ lost by Blaster < $ lost by Quicktime. Yeah, um, no? Let's check our facts here.
Most are under a risk management plan, where an Enterprise business or government agency has compensating controls. They also have backups. Mac OS X users never have backups. I have never met a single one that does backups.
Time Machine was invented to solve this problem. Works for me.
Most Mac OS X users are complete newbies, that's why they are using Apple in the first place. If they already knew Windows well - they would stay with it.
Yeah, all people want that bloatware and Vista that doesn't work with their hardware. However, I will agree that most OSX users are newbies. Welcome. I will also disagree and say that most security people I know use OSX.
In the event of an emergency, Mac OS X users cannot help themselves. They rely on Apple to fix their problems. They can just take their laptop or iPod back to the Apple store and a Genius can order their replacement.
I know, isn't that a novel idea?
Even if it's a simple matter such as a battery or hard drive - expect to wait 4 to 8 weeks while your new equipment arrives.
Or, um... they have a shitton of them in the store. I've went to an Apple store for a battery problem. Walked out with a brand new battery. I've never walked into a Microsoft Store and done that... oh yeah, that's because....
This is what is known to me as "a lot more damage". It's no wonder that Enterprises and government agencies don't use Apple computers!
Hm.. Didn't read the news this week did you? I know LtC Wallington, and I applaud his efforts.
Most Apple users don't care; they are used to crappy service and long wait times. They waited in line for their iPhone for 26 hours -- waiting for their replacement iPhone that doesn't have a faulty antenna or battery (or whatever) "isn't that big of a deal" -- even if it takes 6 weeks!
I only waited 4 hours. On release day. They people that waited 26 were just trying to make the news. They succeeded.
Most Apple products are purchased by Dad or on credit anyways -- so it's not like it's real money!
Where do you get this utterly pointless statistic?
Where did this conversation go anyway? You were wrong "ANONYMOUS".
Wednesday, December 19
Mac versus Windows vulnerability stats for 2007
UPDATE: From the comments: iamnowonmai says "I would like to see a list of all the vulnerabilities in Xthe third-party software that people commonly use on XP. Since Acrobat is not a part of the OS, it doesn't count? Or Word? Outlook? And at least the third-party software gets updated on a Mac. How many fools are out there still using Acrobat version 4?"
Brings up a good point. Windows doesn't have to patch all the "other" software that is on it's system. Apple does. Apple includes alot of software to make their user experience better and more seamless. Windows relies on 3rd party developers for this. Say what you will, but these are things you need to take into thought when you read this article.
Thursday, November 29
Now, that's a nice User-Agent
Sunday, November 25
joelesler.net
Saturday, November 24
joelesler.net
Friday, November 23
Thank you for watching
Monday, November 12
800 posts, and mod_security blocking
"!^(((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-
9][0-9]?)|)|unknown)$" at HEADER("X-FORWARDED-FOR")
800 posts, and mod_security blocking
"!^(((25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.(25[0-5]|2[0-4][0-9]|[01]?[0-
9][0-9]?)|)|unknown)$" at HEADER("X-FORWARDED-FOR")
Monday, December 18
Christmas, and the holiday spirit, and Internet security
I review my weblogs (I review all my logs) on a weekly basis. Because really, what's the point in having logs if you're not going to look at them? A log that isn't looked at is a pointless log. You might as well shut off syslog if you aren't going to look at the logs. But I digress.
I review my weblogs. I have mod_security installed on my apache webserver here, so through my custom mod_security rules, I am provided with audit_log in my logging directory.
I usually get about 200 to 300 entries a week in that file. All denied.
Last week that number jumped to almost 9000. As of this morning (my logs roll over on Sunday), I had over 3000.
As I am on my blackberry I don't have a copy of the logs, so I'll post a sample entry later.
But the string I see a lot is "x-aaaaaaaaaaa" in the header.
Anyone else seeing these?
Friday, August 25
Traffic
So, let me put this out there.
My web server is protected by at least 6 different methods (3rd party programs). If I don't like what you are doing on my site, (like trying to wget -r it or something), or hell, if I don't like your User-Agent, you will be denied.
mod_security + Inline Snort + Firewalls and some other tidbits of niceness, are handy.
Monday, June 19
mod_security and other fun tools
You're only minutes away from protecting your web sites from all manner of attack and spam. To do this, you need to download one piece of software, mod_security, install it on your web server and then configure it. Its not difficult or time consuming at all, and if you follow these instructions you should be ready to go in minutes!
Got Root : Setup of mod_security
No, I didn't follow this setup, but I ripped this of the "Got Root?" Website for an easy setup of mod_Security. I started playing with it awhile ago to see if I could use it to block all these wonderful attacks that I get constantly pointed at my site.
So... I installed it, with it's default ruleset, it started dropping all the virus and Rbot crap that is all around my network here at knology.net.
I run Snort-inline too with a bunch of stuff set to drop, so it was kinda cool to be able to control all this stuff coming at my webserver...
I jumped on Google and searched for "mod_security rules".. It brought me here..
Click hereI took these rules, (apparently they are updated often), and put them in my mod_security rules as well.
Talking to a friend of mine shortly after tho, he suggested that I put the rules in a seperate file and source them from the mod_security.conf file. I thought that was an excellent idea, so that's what I did.
kinda like: "include conf/mod_sec/modsecurity-general.conf" <-- this was his example...
This worked even better, and now, I'll probably script some kind of update to it so it updates daily and protects my apache install from lots of stuff...
So, back to playing with iptables, Snort-inline, and mod_security.
technorati tags:mod_security, iptables, Snort, Snort-inline, security
-
Without going off the deep-end here and discussing every single Snort rule keyword, I just wanted to touch on a few modifiers that people so...
-
Let me start off by saying I'm not bashing the writer of this article, and I'm trying not to be super critical. I don't want to...
-
In my constant state of trying to make things a bit more efficient for myself. (I'm a big believer in automation, ask anyone that has e...