Security Watch

Password Abuse Runs Rampant

One in five help desk calls related to passwords, says one study. Plus: Flaws in EMC NetWorker, GnuPG messaging.

SupportSoft, a maker of products that improve help desk efficiency, reports that the No. 1 help desk issue is password problems, which the company says represent 20 percent of all help desk calls.

I have long believed that longer and/or more complex passwords do little to reduce the risks they are believed to prevent. This opinion is held by many others, including Eugene Spafford over at CERIAS, who recently blogged about passwords.

Passwords are abused because they are:

1. Cracked. No combination of length, complexity and TTL is going to thwart a concerted, brute-force attempt and still be a viable corporate-wide policy. For example, against all possible alphanumeric Windows passwords in 2003, it took 13.6 seconds to determine a password. Yes, longer passwords would make it take longer -- but not long enough. Yes, introducing non-alphanumeric characters would also make it take longer -- but again, not long enough.

2. Replayed. MITM, sniffed on the wire and reused is an example. Password policy serves no purpose in thwarting such attacks. If an authentication attempt is being intercepted en route and the password component can be redirected, the criminal need not know the password to use it.

3. Captured. Keystroke loggers are a primary example and password policy serves no purpose in thwarting someone using this snooping method. The criminal will have the password, regardless how long or complex it is. The TTL will be the only limitation on the abuse of it. If the keystroke logger isn't detected and removed, even a very short TTL will serve no purpose in thwarting the criminal as they will simply get the new one when the old one is changed.

4. Eavesdropped. Whether it's over the shoulder or via a surveillance camera, password policy serves no purpose in thwarting this type of these kinds of such attacks. Provided the criminal can actually see the password being typed in, they have it, again, regardless how long or complex it is.

5. Guessed. Here, and only here, is where policy has an impact. This is also the least likely method of attack to be used, and the slowest approach.

A Flaw That Impersonates NetWorker
Due to a vulnerability in how EMC's NetWorker Management Console protects its database, a criminal could compromise the console, obtain the contents of the database and then impersonate the Management Console to gain access to managed storage devices. The vulnerability could also give a criminal complete access to the system the Management Console is installed on. Patches are available.

The Management Console and managed devices communicate over port 2638. This port should not be accessible by systems that are not part of this client/server realm. Only managed devices should be able to reach the Management Console, and vice versa. Provided that access is already limited, the vulnerability poses little threat. If this protection is not already in place, enable it as a first step prior to applying patches.

GnuPG Data Spoof
It is possible to combined unsigned text with a signed, or signed and encrypted message in such a way that when displayed, it would be impossible to determine precisely which part of the message was actually signed.

The project calls on those who write applications that use GnuPG to implement the mechanisms to appropriately display the distinction between signed and unsigned components. The GnuPG software itself will not display the signed component as valid if there is not a distinction, so some products may still fail to distinguish signed versus unsigned, but the validation will fail.

Want More Security?

This column was originally published in our weekly Security Watch newsletter. To subscribe, click here.

Stormy Weather for Malware Defenses
Commtouch has released a study pertaining to the "storm" malware released in January 2007. They believe the authors are attempting to overwhelm the resources of anti-virus companies in an effort to ensure that some of their malware reaches victims who cannot detect it as malware. Commtouch claims that there were more than 42,000 variants of "storm" released during the last half of January.

There is no doubt that a battle is being waged by criminals against anti-virus as a technology. The cost to criminals for releasing a variant is almost nil, so it's hardly much more to develop a process that creates thousands of variants of the same code and release them all at once. Even if only one victim is found for each variant, the criminal still profits.

So it should be obvious why the idea of attachment-blocking at the e-mail perimeter is so important. "Storm" did not attempt to exploit any vulnerability, except that of not blocking executable attachment types at the mail perimeter. This will likely continue to be the case for the vast majority of e-mail-borne malware. If you don't have default deny enabled, get it done soon.

About the Author

Russ Cooper is a senior information security analyst with Verizon Business, Inc. He's also founder and editor of NTBugtraq, www.ntbugtraq.com, one of the industry's most influential mailing lists dedicated to Microsoft security. One of the world's most-recognized security experts, he's often quoted by major media outlets on security issues.

comments powered by Disqus
Most   Popular

SharePoint Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.