security vulnerabilities for grown ups
play

Security vulnerabilities for grown-ups Vitaly Osipov Atlassian - PowerPoint PPT Presentation

Security vulnerabilities for grown-ups Vitaly Osipov Atlassian Tuesday, 22 May 1 Or: 7 product security lessons I learned @Atlassian Tuesday, 22 May 2 Disclaimer All good parts of this talk Are learned from my colleagues Any errors Are


  1. Security vulnerabilities for grown-ups Vitaly Osipov Atlassian Tuesday, 22 May 1

  2. Or: 7 product security lessons I learned @Atlassian Tuesday, 22 May 2

  3. Disclaimer All good parts of this talk Are learned from my colleagues Any errors Are all mine Tuesday, 22 May 3

  4. Lesson 1 Sea of vulnerabilities Tuesday, 22 May 4

  5. Security vulnerability? Not a security feature - e.g. login Security of other features Bug in your code that can lead to unauthorised view / change of information downtime Tuesday, 22 May 5

  6. Typical product Web(-ish) applications >100 kloc Dozen third party libraries A couple of Web frameworks Enterprise customers Tuesday, 22 May 6

  7. Learned: If you’re a mid-size software vendor You will learn your code has vulnerabilities This year... More than once… Remember, only 50% products can be “above average” The current industry average is far from good Tuesday, 22 May 7

  8. Levels of “oops” You find the vulnerability yourself Customer reports their findings “Security researcher” contacts you You are compromised Customer is compromised Tuesday, 22 May 8

  9. Clouds and silver lining Someone gives a damn, hurray! A culture shift - “loss of innocence” Growing up Stages of grief Tuesday, 22 May 9

  10. 5 stages of grief Denial: “This cannot be happening” Anger: “Why me? It is not fair!” Bargaining: “Perhaps it is not as bad as it seems?” Depression: “Man, nobody will ever buy from us again!” Acceptance: “We can fix this!” Tuesday, 22 May 10

  11. Lesson 2 Small bugs, big incidents Tuesday, 22 May 11

  12. Debian OpenSSL Tuesday, 22 May 12

  13. Apache / JIRA 2010 “ ive got this error while browsing some projects in jira http://tinyurl.com/XXXXXXXXX ” Change attachment path Install JSP shell and password interceptor... https://blogs.apache.org/infra/entry/ apache_org_04_09_2010 Tuesday, 22 May 13

  14. Learned: Often one vulnerability is all it takes Several “non-critcial” issues combine into one big trouble Tuesday, 22 May 14

  15. Lesson 3 But this is not my code! Tuesday, 22 May 15

  16. Is this sufficient? Tuesday, 22 May 16

  17. XML Bomb Known since 2002, yet you probably have this 10^9 lols Tuesday, 22 May 17

  18. XXE Local Entities Tuesday, 22 May 18

  19. XXE Other recent examples: https://issues.jboss.org/browse/RESTEASY-637 Tuesday, 22 May 19

  20. Aside: where to start with XXE in Java DocumentBuilderFactory SAXParserFactory XMLInputFactory nu.xom.Builder SAXBuilder Tuesday, 22 May 20

  21. OGNL - Struts See Struts advisories Tuesday, 22 May 21

  22. More OGNL Tuesday, 22 May 22

  23. Ruby /triggerpath?search[instance_eval]= %60 touch %20%2f tmp %2f command_exec %60 touch /tmp/command_exec “Ruby on Rails from a code auditor's perspective”, Hackito Ergo Sum 2011 by @joernchen Tuesday, 22 May 23

  24. ...On Rails Mass assignment is a feature http://edgeguides.rubyonrails.org/security.html Tuesday, 22 May 24

  25. Learned Past decisions will bite you ...and decisions of other people will bite you too When you least expect it Tuesday, 22 May 25

  26. Lesson 4 Why all this matters Tuesday, 22 May 26

  27. Here to stay Tuesday, 22 May 27

  28. Do you like… Coding features? Fixing bugs? ...bugs that are not triggered by normal use? ...rare bugs reported by people who are intentionally using your software not to the specs? Also known as security vulnerabilities Tuesday, 22 May 28

  29. Security is difficult “Everyone knows that debugging is twice as hard as writing a program in the first place. So if you're as clever as you can be when you write it, how will you ever debug it?” Brian Kernigan Tuesday, 22 May 29

  30. Normal dev reaction “Please make it go away and let me create exciting new features for my customers!” (not an actual quote) Tuesday, 22 May 30

  31. Learned: Security is counterintuitive Most companies do not think security (or, say, architecture) until a while into the project “Fixing” security becomes much harder as the product grows Tuesday, 22 May 31

  32. Lesson 5 What can we do ? Tuesday, 22 May 32

  33. Three things 1.Product security response 2.Priority fixing 3.“Prevention” Tuesday, 22 May 33

  34. Lesson 6 Response and Validation Tuesday, 22 May 34

  35. 1. Response a.k.a. PSIRT Small effort that goes a long way Sanity in a crisis security@ yourdomain.com Tuesday, 22 May 35

  36. Learned: Research is exciting for developers Fixing is less so Especially when patches are involved And you do not do patches as a rule Tuesday, 22 May 36

  37. Learned: Advisory / security alert? External dependencies Products Services Infrastructure Checking, double-checking, triple-checking Tuesday, 22 May 37

  38. Lesson 7 Fixing Tuesday, 22 May 38

  39. 2. Fixing Tuesday, 22 May 39

  40. Learned: Find vuln reports proactively Fix fast and keep the reporter in the loop Even if the issue does not look serious “Where else does this appear?” Be very nice “Responsible disclosure” debate Tuesday, 22 May 40

  41. 3. “Preventing” Difficult and endless battle Especially in Agile shops Microsoft has some papers about Agile SDL Ask me next year Tuesday, 22 May 41

  42. Ideas Use framework features if you can (auto-encoding for XSS) Stripped-down Java Security Manager (code execution, file reads) Reduce complexity of inputs (no OGNL!) Tuesday, 22 May 42

  43. Ideas Train QA in security Training a security pro in QA is harder Developers will learn from them Depends on how QA/Dev is set up “Blind spots” - missing classes of vulnerabilities Tuesday, 22 May 43

  44. Ideas Testing tools Burp Suite Only a help, not a magic scanner Many false positives and false negatives from all automated scanners - source code or web Tuesday, 22 May 44

  45. Watch out “Each of these endeavours resulted in a significant and brief improvement, which was quickly overcome by the entropy of unstructured coding.” Somewhere in PragProg mag Tuesday, 22 May 45

  46. Do I have to? Response and fixing are the basics Bad PR and stolen data are worse than any short term savings Emergency fixing is very expensive “Past results do not guarantee future success” Tuesday, 22 May 46

  47. But it cannot happen to me! Tuesday, 22 May 47

  48. TODO Make someone accountable for response Set up and monitor security@ Train QA in security Prioritise fixing security issues Think about prevention / risk management... Tuesday, 22 May 48

  49. http://www.atlassian.com/security @agelastic security@atlassian.com Tuesday, 22 May 49

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend