SlideShare a Scribd company logo
https://lepidum.co.jp/ Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.
From an Experience of
Reporting a Vulnerability
- Case of CCS Injection -
Tatsuya HAYASHI (@lef)
Kaoru Maeda (@mad-p)
Lepidum Co. Ltd.
"SSR 2015" (2015/12/15)
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Agenda
 CCS Injection Vulnerability
 How did we find it?
 Reporting a Vulnerability
 Disclosing a Vulnerability
 Lessons Learned
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Focus Area | Lepidum
 Applied Research and Development
 Personal Data, Digital Identity and Privacy
 Secure and Safety Software Technology
 Web and Internet Technology
 De-Facto and Forum Standardization
 Keywords:
 Personal Data, Trust Framework, Privacy, ID Federation,
Authentication/Authorization, Protocol Specification,
* of Things(IoT, WoT), Software Defined Network,
Autonomic Network, etc...
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
CCS INJECTION
VULNERABILITY
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
CCS Injection Vulnerability
CVE-2014-0224 (June 2014)
 CCS = Change Cipher Spec
 Early CCS Attack
 http://ccsinjection.lepidum.co.jp/
1. MITM crafts a CCS too early than expected
2. OpenSSL accepts it without necessary validation
3. Cipher Suites changed with uninitialized
parameters
4. MITM can decrypt all the traffic
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
How was it found?
Masashi Kikuchi (reporter) thought
 Wanted to create a formal verification for that
 Peeked into existing implementations
 Found a flaw in OpenSSL's validation
Most complex transitions in the
SSL/TLS statemachine:
handle ChangeCipherSpec
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Reporter's intial motivation
 Everyone competes to hunt bugs. I
want to do it efficiently
 Want to use Coq somewhere
 Select a suspicious module by
experience
 Want a clue to understand code that is
difficult
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Reporter's intial motivation
 Everyone competes to hunt bugs. I
want to do it efficiently
 Want to use Coq somewhere
 Select a suspicious module by
experience
 Want a clue to understand code that is
difficult
But,
he didn't need
even Coq
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
A VULNERABILITY:
REPORTING AND DISCLOSING IT
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
To whom should it be reported?
 In Japanese or in English?
 OpenSSL?CERT?
 Correct impact analysis done?
 Is our analysis correct, in the first place?
 PoC attack
 Information control intra company
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
After reported...
 Prepare against possible 0-day attacks
 We could not do anything than just wait for a
response
 We could not ask to/discuss with other
organizations
 Employees are instructed not to talk about it
 We could not believe that "our reporting
process is correct" without an response
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
After reported...
 Prepare against possible 0-day attacks
 We could not do anything than just wait for a
response
 We could not ask to/discuss with other
organizations
 Employees are instructed not to talk about it
 We could not believe that "our reporting
process is correct" without an response
Bitter days
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
What we have done: Blog it
 Take a new domain (against domain dropping)
 Do not place any ads (better trust)
 Prepare for high loaded access
 Selecting a CDN
 Cacheable blog pages
 Test that the pages and CDN work, without disclosing
 Review how to update the pages
 Collect and manage incoming updates
lessons
learned
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
What is the right way to disclose it?
 No one actually tell us the best practice
 Schedule an announcement
 Domain name gives a hint about the
vulnerability. DNS settings delayed
 ccsinjection.lepidum.co.jp
 No rules, no guidelines
 Commonsense ⇒ What's that?
lessons
learned
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
The day it announced
 Disclosure date is told, but not the time
 No one (incl. CERT) tells the reporter exactly when the CVE
appears
 Inqueries, interviews
 Media handling, English support, customers, SNS...
 The Guardian, New York Times, etc...
 "Proper" interviews and not
 Explain to customers what we have done
 Fortunately, we had blog pages!
 Updates
 Catch up with software updates, etc.
 Distinguish suggestions from experts and non-experts
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
The day it announced
 Disclosure date is told, but not the time
 No one (incl. CERT) tells the reporter exactly when the CVE
appears
 Inqueries, interviews
 Media handling, English support, customers, SNS...
 The Guardian, New York Times, etc...
 "Proper" interviews and not
 Explain to customers what we have done
 Fortunately, we had blog pages!
 Updates
 Catch up with software updates, etc.
 Distinguish suggestions from experts and non-experts
A whole company work!
Daily job suspended
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
FAQ, other things to consider
 Why a logo?
 "How much did you earned from this?"
 Engineers' stresses
 Business value
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Information control
 Avoid unnecessary sense of crisis
 Deliver precise information to where necessary
 Announce counter measures when they are
ready
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Vulnerability disclosure is not easy
 Cannot call for a help,
no help comes
 We, a geek company, could do it.
We could do it because we are an organization.
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Vulnerability disclosure is not easy
 Cannot call for a help,
no help comes
 We, a geek company, could do it.
We could do it because we are a organization.
But it was
worth doing it!
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
LESSONS LEARNED
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Vulnerability and Reporting
 It comes, even when not prepared
 Do it without how-to's nor guidelines
 Prepare blog pages
 But without disclosing much before the
announcement
 Be careful when setting up CDN and DNS
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Message: Implementation is the key
Write specifications after implementing it
That way, you should know where pitfalls are
"Handle a complex protocol like TLS with Coq, you might
need an experience of implementing it"
Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/
Please contact us
https://lepidum.co.jp/ @lepidum @lef @mad-p
mailto:{hayashi,maeda}@lepidum.co.jp

More Related Content

Similar to From an Experience of Vulnerability Reporting

For developers
For developersFor developers
For developers
YOYO Holdings Pte. Ltd.
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Security Weekly
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to Whatever
Rebecca Lieb
 
Digital, bear or just bull
Digital, bear or just bullDigital, bear or just bull
Digital, bear or just bullScott Rigby
 
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
TFT presentations Tomorrow's IT Service Future Today
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
Prathan Phongthiproek
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Evident.io
 
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
eFolder
 
Jim Noble SEASIM Keynote
Jim Noble SEASIM KeynoteJim Noble SEASIM Keynote
Jim Noble SEASIM Keynote
SeattleSIM
 
IT Due Diligence Overview
IT Due Diligence OverviewIT Due Diligence Overview
IT Due Diligence Overview
itduediligence
 
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Melanie Brandt
 
Cybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection serverCybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection server
Amit Serper
 
Webinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in IsraelWebinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in Israel
The Digital Insurer
 
FundPrivately | Token Launchpad & Incubator
FundPrivately | Token Launchpad & IncubatorFundPrivately | Token Launchpad & Incubator
FundPrivately | Token Launchpad & Incubator
SpSingh565050
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
Leonard Lee
 
Embracing covid 19 switch manual to digital hr
 Embracing covid 19 switch manual to digital hr Embracing covid 19 switch manual to digital hr
Embracing covid 19 switch manual to digital hr
Melly Ling
 
17th ict forum oracle presentation
17th ict forum oracle presentation17th ict forum oracle presentation
17th ict forum oracle presentation
Stefanos Dionysopoulos
 
Social Media Strategy Keynote presentation
Social Media Strategy Keynote presentationSocial Media Strategy Keynote presentation
Social Media Strategy Keynote presentation
Awareness Inc.
 
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stackLearn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stack
Alex Ortiz
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
Ray Bugg
 

Similar to From an Experience of Vulnerability Reporting (20)

For developers
For developersFor developers
For developers
 
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
Robots, Ninjas, Pirates and Building an Effective Vulnerability Management Pr...
 
Connected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to WhateverConnected Experiences: From Websites to Wearables to Whatever
Connected Experiences: From Websites to Wearables to Whatever
 
Digital, bear or just bull
Digital, bear or just bullDigital, bear or just bull
Digital, bear or just bull
 
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
Jan Oeberg, ITAMOrg: New IT Asset Management Organization launched (TFT14 Sum...
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
 
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
eFolder Expert Series Webinar — 2015 eFolder MSP Survey: Learn What Your Peer...
 
Jim Noble SEASIM Keynote
Jim Noble SEASIM KeynoteJim Noble SEASIM Keynote
Jim Noble SEASIM Keynote
 
IT Due Diligence Overview
IT Due Diligence OverviewIT Due Diligence Overview
IT Due Diligence Overview
 
Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...Accelerating breakthrough business technologies in atlanta, tag featured spea...
Accelerating breakthrough business technologies in atlanta, tag featured spea...
 
Cybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection serverCybereason - behind the HackingTeam infection server
Cybereason - behind the HackingTeam infection server
 
Webinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in IsraelWebinar for April 2020 - InsurTech Landscape in Israel
Webinar for April 2020 - InsurTech Landscape in Israel
 
FundPrivately | Token Launchpad & Incubator
FundPrivately | Token Launchpad & IncubatorFundPrivately | Token Launchpad & Incubator
FundPrivately | Token Launchpad & Incubator
 
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
neXt Curve reThink: What Meltdown & Spectre Mean for IoT Past, Present & Future?
 
Embracing covid 19 switch manual to digital hr
 Embracing covid 19 switch manual to digital hr Embracing covid 19 switch manual to digital hr
Embracing covid 19 switch manual to digital hr
 
17th ict forum oracle presentation
17th ict forum oracle presentation17th ict forum oracle presentation
17th ict forum oracle presentation
 
Social Media Strategy Keynote presentation
Social Media Strategy Keynote presentationSocial Media Strategy Keynote presentation
Social Media Strategy Keynote presentation
 
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stackLearn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stack
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 

More from Kaoru Maeda

Emacs TypeScript
Emacs TypeScriptEmacs TypeScript
Emacs TypeScript
Kaoru Maeda
 
IETF103の話題から (HTML5 Conf 2018)
IETF103の話題から (HTML5 Conf 2018)IETF103の話題から (HTML5 Conf 2018)
IETF103の話題から (HTML5 Conf 2018)
Kaoru Maeda
 
IETF102 Report Authorization
IETF102 Report AuthorizationIETF102 Report Authorization
IETF102 Report Authorization
Kaoru Maeda
 
IETF97 Update oauth tokbind
IETF97 Update oauth tokbindIETF97 Update oauth tokbind
IETF97 Update oauth tokbind
Kaoru Maeda
 
IETF96 Update oauth tokbind
IETF96 Update oauth tokbindIETF96 Update oauth tokbind
IETF96 Update oauth tokbind
Kaoru Maeda
 
Ietf95 http2
Ietf95 http2Ietf95 http2
Ietf95 http2
Kaoru Maeda
 
http2study 20160423 IETF95 Report
http2study 20160423 IETF95 Reporthttp2study 20160423 IETF95 Report
http2study 20160423 IETF95 Report
Kaoru Maeda
 
HTTP/2: ぼくたちのWebはどう変わるのか
HTTP/2: ぼくたちのWebはどう変わるのかHTTP/2: ぼくたちのWebはどう変わるのか
HTTP/2: ぼくたちのWebはどう変わるのか
Kaoru Maeda
 
IETF93 Prague報告Web関連+QUIC
IETF93 Prague報告Web関連+QUICIETF93 Prague報告Web関連+QUIC
IETF93 Prague報告Web関連+QUIC
Kaoru Maeda
 
IETF93プレ勉強会、ARTエリアの歩き方
IETF93プレ勉強会、ARTエリアの歩き方IETF93プレ勉強会、ARTエリアの歩き方
IETF93プレ勉強会、ARTエリアの歩き方
Kaoru Maeda
 
Tokbind-fido
Tokbind-fidoTokbind-fido
Tokbind-fido
Kaoru Maeda
 
IETF92報告IoT関連
IETF92報告IoT関連IETF92報告IoT関連
IETF92報告IoT関連
Kaoru Maeda
 
IETF91報告arcmedia-mcic
IETF91報告arcmedia-mcicIETF91報告arcmedia-mcic
IETF91報告arcmedia-mcic
Kaoru Maeda
 
Ietf91報告 httpbis-httpauth
Ietf91報告 httpbis-httpauthIetf91報告 httpbis-httpauth
Ietf91報告 httpbis-httpauth
Kaoru Maeda
 
IETF91 Honolulu httpbis WG Report
IETF91 Honolulu httpbis WG ReportIETF91 Honolulu httpbis WG Report
IETF91 Honolulu httpbis WG Report
Kaoru Maeda
 
HTTP/2 Local activities in Japan
HTTP/2 Local activities in JapanHTTP/2 Local activities in Japan
HTTP/2 Local activities in Japan
Kaoru Maeda
 
IETF90 Web関連WG報告 #isocjp
IETF90 Web関連WG報告 #isocjpIETF90 Web関連WG報告 #isocjp
IETF90 Web関連WG報告 #isocjp
Kaoru Maeda
 
IETF90 IoT関連WG報告 #isocjp
IETF90 IoT関連WG報告 #isocjpIETF90 IoT関連WG報告 #isocjp
IETF90 IoT関連WG報告 #isocjp
Kaoru Maeda
 
HTTP/2 draft 14 preview and IETF90 httpbis WG Report
HTTP/2 draft 14 preview and IETF90 httpbis WG ReportHTTP/2 draft 14 preview and IETF90 httpbis WG Report
HTTP/2 draft 14 preview and IETF90 httpbis WG Report
Kaoru Maeda
 
IETF89 HTTP関連WG報告 #isocjp
IETF89 HTTP関連WG報告 #isocjpIETF89 HTTP関連WG報告 #isocjp
IETF89 HTTP関連WG報告 #isocjp
Kaoru Maeda
 

More from Kaoru Maeda (20)

Emacs TypeScript
Emacs TypeScriptEmacs TypeScript
Emacs TypeScript
 
IETF103の話題から (HTML5 Conf 2018)
IETF103の話題から (HTML5 Conf 2018)IETF103の話題から (HTML5 Conf 2018)
IETF103の話題から (HTML5 Conf 2018)
 
IETF102 Report Authorization
IETF102 Report AuthorizationIETF102 Report Authorization
IETF102 Report Authorization
 
IETF97 Update oauth tokbind
IETF97 Update oauth tokbindIETF97 Update oauth tokbind
IETF97 Update oauth tokbind
 
IETF96 Update oauth tokbind
IETF96 Update oauth tokbindIETF96 Update oauth tokbind
IETF96 Update oauth tokbind
 
Ietf95 http2
Ietf95 http2Ietf95 http2
Ietf95 http2
 
http2study 20160423 IETF95 Report
http2study 20160423 IETF95 Reporthttp2study 20160423 IETF95 Report
http2study 20160423 IETF95 Report
 
HTTP/2: ぼくたちのWebはどう変わるのか
HTTP/2: ぼくたちのWebはどう変わるのかHTTP/2: ぼくたちのWebはどう変わるのか
HTTP/2: ぼくたちのWebはどう変わるのか
 
IETF93 Prague報告Web関連+QUIC
IETF93 Prague報告Web関連+QUICIETF93 Prague報告Web関連+QUIC
IETF93 Prague報告Web関連+QUIC
 
IETF93プレ勉強会、ARTエリアの歩き方
IETF93プレ勉強会、ARTエリアの歩き方IETF93プレ勉強会、ARTエリアの歩き方
IETF93プレ勉強会、ARTエリアの歩き方
 
Tokbind-fido
Tokbind-fidoTokbind-fido
Tokbind-fido
 
IETF92報告IoT関連
IETF92報告IoT関連IETF92報告IoT関連
IETF92報告IoT関連
 
IETF91報告arcmedia-mcic
IETF91報告arcmedia-mcicIETF91報告arcmedia-mcic
IETF91報告arcmedia-mcic
 
Ietf91報告 httpbis-httpauth
Ietf91報告 httpbis-httpauthIetf91報告 httpbis-httpauth
Ietf91報告 httpbis-httpauth
 
IETF91 Honolulu httpbis WG Report
IETF91 Honolulu httpbis WG ReportIETF91 Honolulu httpbis WG Report
IETF91 Honolulu httpbis WG Report
 
HTTP/2 Local activities in Japan
HTTP/2 Local activities in JapanHTTP/2 Local activities in Japan
HTTP/2 Local activities in Japan
 
IETF90 Web関連WG報告 #isocjp
IETF90 Web関連WG報告 #isocjpIETF90 Web関連WG報告 #isocjp
IETF90 Web関連WG報告 #isocjp
 
IETF90 IoT関連WG報告 #isocjp
IETF90 IoT関連WG報告 #isocjpIETF90 IoT関連WG報告 #isocjp
IETF90 IoT関連WG報告 #isocjp
 
HTTP/2 draft 14 preview and IETF90 httpbis WG Report
HTTP/2 draft 14 preview and IETF90 httpbis WG ReportHTTP/2 draft 14 preview and IETF90 httpbis WG Report
HTTP/2 draft 14 preview and IETF90 httpbis WG Report
 
IETF89 HTTP関連WG報告 #isocjp
IETF89 HTTP関連WG報告 #isocjpIETF89 HTTP関連WG報告 #isocjp
IETF89 HTTP関連WG報告 #isocjp
 

Recently uploaded

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 

Recently uploaded (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 

From an Experience of Vulnerability Reporting

  • 1. https://lepidum.co.jp/ Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved. From an Experience of Reporting a Vulnerability - Case of CCS Injection - Tatsuya HAYASHI (@lef) Kaoru Maeda (@mad-p) Lepidum Co. Ltd. "SSR 2015" (2015/12/15)
  • 2. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Agenda  CCS Injection Vulnerability  How did we find it?  Reporting a Vulnerability  Disclosing a Vulnerability  Lessons Learned
  • 3. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Focus Area | Lepidum  Applied Research and Development  Personal Data, Digital Identity and Privacy  Secure and Safety Software Technology  Web and Internet Technology  De-Facto and Forum Standardization  Keywords:  Personal Data, Trust Framework, Privacy, ID Federation, Authentication/Authorization, Protocol Specification, * of Things(IoT, WoT), Software Defined Network, Autonomic Network, etc...
  • 4. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ CCS INJECTION VULNERABILITY
  • 5. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ CCS Injection Vulnerability CVE-2014-0224 (June 2014)  CCS = Change Cipher Spec  Early CCS Attack  http://ccsinjection.lepidum.co.jp/ 1. MITM crafts a CCS too early than expected 2. OpenSSL accepts it without necessary validation 3. Cipher Suites changed with uninitialized parameters 4. MITM can decrypt all the traffic
  • 6. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ How was it found? Masashi Kikuchi (reporter) thought  Wanted to create a formal verification for that  Peeked into existing implementations  Found a flaw in OpenSSL's validation Most complex transitions in the SSL/TLS statemachine: handle ChangeCipherSpec
  • 7. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Reporter's intial motivation  Everyone competes to hunt bugs. I want to do it efficiently  Want to use Coq somewhere  Select a suspicious module by experience  Want a clue to understand code that is difficult
  • 8. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Reporter's intial motivation  Everyone competes to hunt bugs. I want to do it efficiently  Want to use Coq somewhere  Select a suspicious module by experience  Want a clue to understand code that is difficult But, he didn't need even Coq
  • 9. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ A VULNERABILITY: REPORTING AND DISCLOSING IT
  • 10. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ To whom should it be reported?  In Japanese or in English?  OpenSSL?CERT?  Correct impact analysis done?  Is our analysis correct, in the first place?  PoC attack  Information control intra company
  • 11. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ After reported...  Prepare against possible 0-day attacks  We could not do anything than just wait for a response  We could not ask to/discuss with other organizations  Employees are instructed not to talk about it  We could not believe that "our reporting process is correct" without an response
  • 12. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ After reported...  Prepare against possible 0-day attacks  We could not do anything than just wait for a response  We could not ask to/discuss with other organizations  Employees are instructed not to talk about it  We could not believe that "our reporting process is correct" without an response Bitter days
  • 13. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ What we have done: Blog it  Take a new domain (against domain dropping)  Do not place any ads (better trust)  Prepare for high loaded access  Selecting a CDN  Cacheable blog pages  Test that the pages and CDN work, without disclosing  Review how to update the pages  Collect and manage incoming updates lessons learned
  • 14. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ What is the right way to disclose it?  No one actually tell us the best practice  Schedule an announcement  Domain name gives a hint about the vulnerability. DNS settings delayed  ccsinjection.lepidum.co.jp  No rules, no guidelines  Commonsense ⇒ What's that? lessons learned
  • 15. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ The day it announced  Disclosure date is told, but not the time  No one (incl. CERT) tells the reporter exactly when the CVE appears  Inqueries, interviews  Media handling, English support, customers, SNS...  The Guardian, New York Times, etc...  "Proper" interviews and not  Explain to customers what we have done  Fortunately, we had blog pages!  Updates  Catch up with software updates, etc.  Distinguish suggestions from experts and non-experts
  • 16. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ The day it announced  Disclosure date is told, but not the time  No one (incl. CERT) tells the reporter exactly when the CVE appears  Inqueries, interviews  Media handling, English support, customers, SNS...  The Guardian, New York Times, etc...  "Proper" interviews and not  Explain to customers what we have done  Fortunately, we had blog pages!  Updates  Catch up with software updates, etc.  Distinguish suggestions from experts and non-experts A whole company work! Daily job suspended
  • 17. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ FAQ, other things to consider  Why a logo?  "How much did you earned from this?"  Engineers' stresses  Business value
  • 18. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Information control  Avoid unnecessary sense of crisis  Deliver precise information to where necessary  Announce counter measures when they are ready
  • 19. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Vulnerability disclosure is not easy  Cannot call for a help, no help comes  We, a geek company, could do it. We could do it because we are an organization.
  • 20. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Vulnerability disclosure is not easy  Cannot call for a help, no help comes  We, a geek company, could do it. We could do it because we are a organization. But it was worth doing it!
  • 21. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ LESSONS LEARNED
  • 22. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Vulnerability and Reporting  It comes, even when not prepared  Do it without how-to's nor guidelines  Prepare blog pages  But without disclosing much before the announcement  Be careful when setting up CDN and DNS
  • 23. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Message: Implementation is the key Write specifications after implementing it That way, you should know where pitfalls are "Handle a complex protocol like TLS with Coq, you might need an experience of implementing it"
  • 24. Copyright © 2004-2015 Lepidum Co. Ltd. All rights reserved.https://lepidum.co.jp/ Please contact us https://lepidum.co.jp/ @lepidum @lef @mad-p mailto:{hayashi,maeda}@lepidum.co.jp