Lecture 12: 18th October 2019 Flashcards

Secure communications and application vulnerabilities part 2

1
Q

What is STARTTLS?

A

An extension to SMTP facilitates secure and encrypted communications between SMTP clients and servers. Tries to use TLS and falls back to SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is STARTTLS stripping?

A

This attack takes advantage of the fail-open design of STARTTLS, that is, the SMTP servers using cleartext if the STARTTLS handshake fails. Like many security mechanisms, STARTTLS is designed to “fail open” rather than “fail closed,” meaning that when certain errors happen, servers will simply send e-mail in unencrypted form rather than failing to send the message at all. Network actors can exploit this design by sending certain types of packets that trigger a fail-open error.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What was the POODLE vulnerabiltiy?

A

A MITM attack for SSL connections to browsers. The attacker forces the connection to use SSL 3.0 then exploits design flaw in SSL 3.0 that allows the padding of data at the end of a block cipher to be changed so that the encryption cipher becomes less secure each time it is passed. It eventually reveals the plaintext input after repeatedly padding messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is SMTP over TLS?

A

An extension to SMTP that allows an SMTP server and client to use transport-layer security to provide private, encrypted, and authenticated communication over the Internet using TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some vulnerabilities of SMTP over TLS??

A
  • ~30% of handshakes fail
  • weak cipher suites are used: DES, RC4, MD5
  • only ~ a quarter of servers support strong cipher suites, and cipher agreed can be derated to less secure ciphers (most secure common one) even in those that do
  • some email servers after derating to less secure cipher suites or even unencrypted emails entirely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can you do to email packets to attack them?

A
  1. interception - some organisations protect email up to the edge of the network, and some may copy all emails (legal or government companies) as email are evidence or legal documents
  2. monitoring - some organisations monitor email for business patterns or for information disclosure. Some companies state they have the right to access email at any time.
  3. anonymisation - some companies (Yahoo, Hotmail) offer free email addresses which can be treated as once use disposable emails.
  4. remailers - these are 3rd party mailers who forward email onto a designated recipient. The third party keeps detailed records to allow forwarding in both directions to recipient and sender. Essentially this is not anonymity but pseudonimity. However, a TOR like setup can allow a series of co-operating servers to hide sender details under asymmetric encryption.
  5. spoofing- the SMTP protocol does not check for legitimacy or accuracy. (See https://tools.ietf.org/html/rfc821 or rfc7435)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can firewalls ensure email privacy?

A

Can ensure that no outbound emails are unencrypted or use ciphers that are too weak. Can ensure no inbound emails are from blacklisted domains or addresses. Can filter spam?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What factors should be considered to ensure security with databases?

A
  1. Access Control: restriction levels of read, write (update). Delete must be at admin level.
  2. Authentication: Pre phase of authentication needed for access.
  3. Physical DB integrity: power failures, disc failure etc should not affect the data.
  4. Logical DB integrity: The structure of the DB is preserved after data modification (no loss of fields, keys etc).
  5. Auditability: for forensic or legal reasons as well as reconstruction.
  6. Two phase update: designed to prevent problems during update (long intent phase and then commit phase when commit flag is set)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are inference attacks?

A

Using public or non-sensitive information to deduce or infer private or sensitive information. This may use real-world causalities, statistics, reasoning, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do inference attacks work?

A

Either directly query public records in a way to gain few results to gain sensitive information on those subjects outright or perform stats to derive sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How were AIDS patients identified in an inference attack?

A

Who were AIDs patients was not public knowledge - is sensitive. Newspapers investigated deliveries of AZT drugs to treat it to different hospitals and regions to find where there were the most patients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is suppression?

A

Not providing data results at all when under the k-anonymity value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is concealment?

A

Slightly altering data results at all when under the k-anonymity value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is k-anonymity protection?

A

Stopping the release of data if it only applies to a certain number of subjects less than or equal to a minimum number, k. At or below k, inference attacks would otherwise become possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can multilevel security be implemented with databases?

A

Consider sensitive data in a database; is it the cell/element or the tuple/row?

  • Data could be partitioned - at a cost of redundancy, access efficiency, etc.
  • Data or tuples could be encrypted.
  • An integrity code could be applied to each cell (colour or level coded). Sometimes called an Integrity Lock.
  • A sensitivity lock could be applied - a different lock for each record which indicates the sensitivity level, e.g. an encryption-based on record number and sensitivity level so that an attacker can not infer much from two records with the same sensitivity level.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are integrity codes?

A

When you store checksums or other integrity checks along with data to detect errors in them

17
Q

What are sensitivity locks?

A

Stored security levels associated with data records. This could be used to ensure an attacker can not infer much from two records with the same sensitivity level if you used encryption based on the record (ID) and security level.

18
Q

What are SQL injection attacks?

A

Using web page inputs to insert SQL statements into a server to execute and perform some malicious actions

19
Q

How do SQL injection attacks work?

A

Many databases have a webapp or front end that allows SQL queries to be submitted directly to a database from a form (input).

20
Q

What are SQL command injections?

A

When an attacker modifies a user-defined URL to include shell escape or redirection characters to execute some SQL command

21
Q

How do SQL command injections work?

A

Alter the parameters in the URL of a request to activate certain scripts or statements.

22
Q

What is S/MIME?

A

Secure/Multipurpose Internet Mail Extensions is a protocol for sending digitally signed and encrypted MIME emails.

23
Q

What is PGP?

A

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications.

24
Q

How can emails be encrypted?

A

With S/MIME, PGP, STARTTLS, SMTP over TLS, etc.

25
Q

What is the difference between a direct and indirect inference attack?

A

A direct inference attack is when a user uses queries records to determine values of sensitive fields such that only a few records are returned. K-anonymity protection should prevent this.

An indirect attack is when only statistics are used to determine information.