BSDstats Project v2.0 ...
Paul Schmehl
pauls at utdallas.edu
Fri Aug 11 15:32:53 UTC 2006
Marc G. Fournier wrote:
> On Fri, 11 Aug 2006, Nikolas Britton wrote:
>
>> Ok... With my new script it took only 158 minutes to compute ALL
>> TCP/IP address hashes. I'll repeat that... I have an md5 hash for
>> every IP address in the world! All I need to do is grep your hash and
>> it will tell me your IP address. yippee! :-)
>
> Can someone please explain to me what exactly you are trying to secure
> against in this case?
>
If you know my IP, my hostname, what OS I'm running and *every* driver I
have enabled on my box, you're half way toward breaking in to my box.
What he's saying is that you've chosen the IP address as the index key
for the database. Even though you're hashing it with MD5, he has
written a script that generates, in less than an hour, the MD5 hash for
every single IP address in the world. *If* he can break in to your
database and extract its information, he can simply match his hashes
against yours and "decode" every IP address.
Once he's done that, he has a big fat list of juicy targets to go after.
This is the reason that the only hosts I've submitted on the two that
are on public IP addresses. You can get the same info by probing them
directly.
You won't be getting my other boxes until this problem is solved.
I think two suggestions have been made that are quite worthy of
consideration.
1) encrypt the data being fed to your systems by the script - this
should be relatively easy using keys and would ensure that a man in the
middle attack would fail. You can connect using ssh and a unique key
without having to reveal passwords to anyone.
2) use a unique hash, generated at the time of first conneciton, that
identifies the box regardless of its IP, hostname, MAC address or any of
the other myriad parameters that can all change over time. This would
actually make your data more reliable, since parameters change (IPs,
MACs, hostnames, peripherals, etc.), boxes do not.
I realize everyone is very enthusiastic about this project, but, if you
want a high adoption rate, you're going to have to consider the concerns
of the more security conscious among us.
--
Paul Schmehl (pauls at utdallas.edu)
Adjunct Information Security Officer
The University of Texas at Dallas
http://www.utdallas.edu/ir/security/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 5268 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.freebsd.org/pipermail/freebsd-questions/attachments/20060811/2316a0a5/smime.bin
More information about the freebsd-questions
mailing list