[15249] in bugtraq

home help back first fref pref prev next nref lref last post

Potential DoS Attack on RSA's ACE/Server

daemon@ATHENA.MIT.EDU (JJ Gray)
Thu Jun 8 13:44:02 2000

Mime-Version: 1.0
Content-Type: multipart/alternative;
              boundary="----=_NextPart_000_0111_01BFD154.8906B740"
Message-Id:  <011a01bfd14c$3c206960$050010ac@xtranet.co.uk>
Date:         Thu, 8 Jun 2000 14:19:19 +0100
Reply-To: JJ Gray <nexus@PATROL.I-WAY.CO.UK>
From: JJ Gray <nexus@PATROL.I-WAY.CO.UK>
X-To:         NTBUGTRAQ@LISTSERV.NTBUGTRAQ.COM
To: BUGTRAQ@SECURITYFOCUS.COM

This is a multi-part message in MIME format.

------=_NextPart_000_0111_01BFD154.8906B740
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi folks,
    RSA Security http://www.rsasecurity.com/ produce a 2 factor secure =
authentication solution called ACE/Server.   This uses SecurID tokens to =
enforce authentication and runs on NT/2000 and Solaris.
It is possible for a nonprivileged user on the same network as the =
ACE/Server to trivially produce a DoS attack that kills the aceserver =
process thus denying all authentication requests.

Test Lab : ACE/Server version 3.1 and 4.1 on Solaris 2.6, Sparc Ultra5
( For one reason and another I don't have the time to test this on NT, =
if someone could attempt to replicate this attack, it would be =
appreciated ;-) )

Attack : A simple UDP portflooding at LAN speeds (250 packets/second) =
with randomly sized UDP packets at the port used for authentication =
requests, default is 5500,UDP.   Process dies in 15-20 seconds.

Result : The aceserver process dies and can no longer process any =
SecurID authentication requests, denying all access to any SecurID =
protected resources.   The aceserver process has to be stopped/started =
to restore functionality.

Vendor Status : Contacted, response :
"With regards to your DoS query we don't see this as a problem due to =
the fact that the ACE/Server should be in a 'secure' area where people =
cannot send a large number of packets to it. The more likely problem is =
to do with a DoS attack on a client (which is not in a secure area). If =
it is ok with you I shall close the case."

Solution : It is mentioned in the ACE/Server documentation that it =
should be secured, however the only effective way to protect against =
this attack would be to put the ACE/Server on a DMZ or equivalent and =
restrict traffic to the ACE/Server ports from specific ACE/Clients only, =
however this is not mentioned in their security requirements.   I know =
of a number of ACE/Server installations that have no protection for =
their ACE/Server, nor are they hardened in any way.

RSA Security do not consider this attack to be a problem.   I disagree =
as the end result could be that a nonprivelidged user can deny all =
legitimate authentication requests to all SecurID protected resources.   =
I take the view that Administrators should be able to decide for =
themselves whether or not this is a threat, hence this post.
( This has been posted to BugTraq and NTBugtraq (as there is an NT =
version), feel free to distribute anywhere but please keep the post =
intact, cheers. )

Regards,
        JJ

JJ Gray, Security Analyst

Sed quis custodiet ipsos custodes ?

PGP Key available.

------=_NextPart_000_0111_01BFD154.8906B740
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META content=3D"text/html; charset=3Diso-8859-1" =
http-equiv=3DContent-Type>
<META content=3D"MSHTML 5.00.3013.2600" name=3DGENERATOR>
<STYLE></STYLE>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT size=3D2>Hi folks,</FONT></DIV>
<DIV><FONT size=3D2>&nbsp;&nbsp;&nbsp; RSA Security <A=20
href=3D"http://www.rsasecurity.com/">http://www.rsasecurity.com/</A>&nbsp=
;produce=20
a 2 factor secure authentication solution called ACE/Server.&nbsp;&nbsp; =
This=20
uses SecurID tokens to enforce authentication and runs on =
NT/2000&nbsp;and=20
Solaris.</FONT></DIV>
<DIV><FONT size=3D2>It is possible for a nonprivileged user on the same =
network as=20
the ACE/Server to trivially produce a DoS attack that kills the =
aceserver=20
process thus denying all authentication requests.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>Test Lab : ACE/Server version 3.1 and 4.1 on Solaris =
2.6,=20
Sparc Ultra5</FONT></DIV>
<DIV><FONT size=3D2>( For one reason and another I don't have the time =
to test=20
this on NT, if someone could attempt to replicate this attack, it would =
be=20
appreciated ;-) )</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>Attack : A simple UDP portflooding at LAN speeds =
(250=20
packets/second) with randomly sized UDP packets at the port used for=20
authentication requests, default is 5500,UDP.&nbsp;&nbsp; Process dies =
in 15-20=20
seconds.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>Result : The aceserver process dies and can no =
longer process=20
any SecurID authentication requests, denying all access to any SecurID =
protected=20
resources.&nbsp;&nbsp; The aceserver process has to be stopped/started =
to=20
restore functionality.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>Vendor Status : Contacted, response :</FONT></DIV>
<DIV><FONT size=3D2>"<FONT size=3D2>With regards to your DoS query we =
don't see this=20
as a problem due to the fact that the ACE/Server should be in a 'secure' =
area=20
where people cannot send a large number of packets to it. The more =
likely=20
problem is to do with a DoS attack on a client (which is not in a secure =
area).=20
If it is ok with you I shall close the case."</FONT></FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>Solution : It is mentioned in the ACE/Server =
documentation=20
that it should be secured, however the only effective way to protect =
against=20
this attack would be to put the ACE/Server on a DMZ or equivalent and =
restrict=20
traffic to the ACE/Server ports from specific ACE/Clients only, however =
this is=20
not mentioned in their security requirements.&nbsp;&nbsp; I know of a =
number of=20
ACE/Server installations that have no protection for their ACE/Server,=20
nor&nbsp;are they hardened in any way.</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>RSA Security do not consider this attack to be a=20
problem.&nbsp;&nbsp; I disagree as the end result could be that a =
nonprivelidged=20
user can deny all legitimate authentication requests to all SecurID =
protected=20
resources.&nbsp;&nbsp; I take the view that Administrators should be =
able to=20
decide for themselves whether or not this is a threat, hence this=20
post.</FONT></DIV>
<DIV><FONT size=3D2>( This has been posted to BugTraq and NTBugtraq (as =
there is=20
an NT version), feel free to distribute anywhere but please keep the =
post=20
intact, cheers. )</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>Regards,</FONT></DIV>
<DIV><FONT size=3D2>&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; =
JJ</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>JJ Gray, Security Analyst</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>Sed quis custodiet ipsos custodes ?</FONT></DIV>
<DIV>&nbsp;</DIV>
<DIV><FONT size=3D2>PGP Key available.</FONT></DIV></BODY></HTML>

------=_NextPart_000_0111_01BFD154.8906B740--

home help back first fref pref prev next nref lref last post