Тёмный

new SSH exploit is absolutely wild 

Low Level Learning
Подписаться 607 тыс.
Просмотров 266 тыс.
50% 1

OpenSSH has been rocked by a new RCE vulnerability. But, it may not be as scary as people are making it out to be. Find out why in this video.
blog.qualys.com/vulnerabiliti...
www.qualys.com/2024/07/01/cve...
🏫 COURSES 🏫 Learn to code in C at lowlevel.academy
🛒 GREAT BOOKS FOR THE LOWEST LEVEL🛒
Blue Fox: Arm Assembly Internals and Reverse Engineering: amzn.to/4394t87
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation : amzn.to/3C1z4sk
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software : amzn.to/3C1daFy
The Ghidra Book: The Definitive Guide: amzn.to/3WC2Vkg
🔥 SOCIALS 🔥
Come hang out at lowlevel.tv

Наука

Опубликовано:

 

2 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 657   
@LowLevelLearning
@LowLevelLearning 3 дня назад
haha wouldn't it be cool if you learned C and assembly haha lowlevel.academy
@AWIRE_onpc
@AWIRE_onpc 3 дня назад
no it wouldnt
@PrinceKumar-yo9lr
@PrinceKumar-yo9lr 3 дня назад
Bro can you please tell me how much time it takes to learn assembly language from which you can write your own script exploits and malwares and ransomwares. And which are the best high level languages which are used to write a malware or ransomwares
@linuxnoodle8682
@linuxnoodle8682 3 дня назад
no it wouldnt
@cerulity32k
@cerulity32k 3 дня назад
​@@PrinceKumar-yo9lr It really depends on what you're exploiting. If it's a local vulnerability (one through the operating system) then you'll need to have full control over the arguments you pass to the operating system's APIs. This is best done with a low level language such as C, C++, Zig, or even Rust. If you need *really* fine control, you can use Assembly, but it's not common. However, must vulnerabilities are rooted in networking. These can be made in any language that has networking capabilities. Rust is my pick, just because of how easy it is to throw some bytes through a socket. POSIX's C sockets take a bit more work to set up than a higher-level TCP stream, but it's way better than Winsock from what I've seen. However, this all assumes you have a vulnerability to exploit. Vulnerabilities are often patched as soon as they pop up. Something way cooler than just malicious stuff is "fun" malware, which was away more prevalent back then. It didn't usually do anything super serious, but it would take control of the system and show you something really cool looking. There are some Windows 10 programs that do this with WinGDI (see MEMZ and Chloroform). You could learn to do the same, since it looks really cool. You don't need to exploit anything to make something really cool, just look at Furnace.
@HowDoYouUseSpaceBar
@HowDoYouUseSpaceBar 3 дня назад
@@PrinceKumar-yo9lr 2 minutes and 34 seconds 👍
@enterusername7746
@enterusername7746 3 дня назад
Temple OS is once again not affected? Coincidence?
@lukeumhoefer
@lukeumhoefer 3 дня назад
Too holy to get hacked 🙏
@starling000
@starling000 3 дня назад
Not a coincidence.
@dashdashdash_
@dashdashdash_ 3 дня назад
kowinkydink?
@theghost9362
@theghost9362 3 дня назад
it's GOD'S work my dude
@rishil6491
@rishil6491 3 дня назад
Thats why god uses it
@TheReferrer72
@TheReferrer72 3 дня назад
That's why we call it "OpenSSH".
@JoelTutka
@JoelTutka 3 дня назад
no cap
@AkivaB
@AkivaB 3 дня назад
I still don't get why people open the SSH port when they can use wireguard since if the device is compromised all bets are off anyway
@glitchy_weasel
@glitchy_weasel 3 дня назад
​@@AkivaB Guess it's difficult to maintain the wireguard configuration for all your devices, especially for multiple users - personally I like to use an open source mesh VPN like Tailscale or ZeroTier.
@GorgioFernen
@GorgioFernen 3 дня назад
the door is wide open
@Drudge.Miller
@Drudge.Miller 3 дня назад
😂
@JoachimFosse
@JoachimFosse 3 дня назад
The creativity of threat hunters will NEVER cease to amaze me
@brainites
@brainites 3 дня назад
Breakers are one or several steps ahead of builders.
@Kane0123
@Kane0123 2 дня назад
Agreed. People doing this kind of work are fascinating and awesome
@mcpr5971
@mcpr5971 2 дня назад
There has to be an invisible hand from the intelligence community to plant some of these. I'm not saying that programmers never make mistakes that allow sploits, but those are probably the exception, not the rule.
@HesderOleh
@HesderOleh День назад
@@brainites by definition, or they wouldn't be breakers. Sometimes builders can be ahead, as is the case with attempts at quantum computer proof crypto that is being worked on before quantum supremacy is reached.
@axelfoley133
@axelfoley133 3 дня назад
LLL: "It's from 20 years ago, 2006." Me: "It's not THAT long -- Oh shit..."
@mephistovonfaust
@mephistovonfaust 3 дня назад
Yeah, my mind jumped to the 90s as well
@eypandabear7483
@eypandabear7483 3 дня назад
@@mephistovonfaust20 years ago is, and forever shall be, the 80s.
@prototypeinheritance515
@prototypeinheritance515 3 дня назад
you're old
@axelfoley133
@axelfoley133 2 дня назад
@@prototypeinheritance515 respect your elders, boyo. ;)
@friedmule5403
@friedmule5403 2 дня назад
LOL exactly! :-) For me is 10-15 years ago in the 1980s and last year is about 2001. :-)
@lborate3543
@lborate3543 3 дня назад
Can I just say this? Thank you Low Level Learning for dark mode. So many yt chanels flash bang me.
@Kane0123
@Kane0123 3 дня назад
Nothing worse than when a RU-vidr bangs you, that’s for sure
@SB-qm5wg
@SB-qm5wg 2 дня назад
Agreed 👏
@_Salaar_khan
@_Salaar_khan 2 дня назад
I wish a RU-vidr bangs me too someday
@benja1378
@benja1378 День назад
@@_Salaar_khan 😂😂😂
@Tock46
@Tock46 3 дня назад
"Everyone can do it" - Yeah for now nobody was able to do it on a 64 bit system only on 32 bit systems lol.
@ssamout
@ssamout 3 дня назад
just was about to comment that "everyone"-line. I doubt my mom could time the attack right.. she always forgets to compensate for latency...
@wombatdk
@wombatdk 3 дня назад
Nor if there's a connection limit via firewall. Even with the biggest botnet it would take forever.
@IrtyGo560
@IrtyGo560 3 дня назад
oh that is why an openssh update was avaliable.
@johndank2209
@johndank2209 2 дня назад
They patched it already?
@privacyvalued4134
@privacyvalued4134 2 дня назад
@@johndank2209 It was probably patched before the paper and the CVE were announced. Package maintainers get early access to security fixes so they have ample time to prepare their backports. A backport is a fixed version with security patches applied retroactively. It's how most distros work. Since many packages are binaries, they can even advance patch most systems before the actual source code changes becomes available from the OG repository. It depends on the severity of the vulnerability, but package-managed systems can actually be fully patched up to a week before the CVE drops.
@dzaqwanamir
@dzaqwanamir 2 дня назад
@@johndank2209 it was revealed as the patch is out
@Kyle-Jade
@Kyle-Jade 2 дня назад
Yeah Ubuntu already patched it up on July 1st openssh 1:9.6p1-3ubuntu13.3 CVE-2024-6387 Edit: From the bug report itself 2024-05-19: We contacted OpenSSH's developers. Successive iterations of patches and patch reviews followed. 2024-06-20: We contacted the distros@openwall. 2024-07-01: Coordinated Release Date.
@stevegredell1123
@stevegredell1123 2 дня назад
@@johndank2209 it was an accidental regression, should be super easy to patch. Just revert the code that was never supposed to be there anyway
@kwazar6725
@kwazar6725 3 дня назад
I use sssh. Safer ssh
@ACium.
@ACium. 3 дня назад
there is no such thing as "safe"
@coolman36kmaway34
@coolman36kmaway34 3 дня назад
ssssssshhhhhh
@asdprogram
@asdprogram 3 дня назад
@@ACium. sshhhh, its "safer", not "safe"
@cringemaki
@cringemaki 3 дня назад
Hahaha I see what you did here!
@JoachimFosse
@JoachimFosse 3 дня назад
Don't google sssh 🤣Straight to PH
@99temporal
@99temporal 3 дня назад
I think at this point we can update the saying to "the three hardest problems in computer science are cache invalidation, naming things, asynchronous programs and 'Off By 1' errors"
@BillAnt
@BillAnt День назад
Throw in interrupts like SigAlarm and you got a nightmare.
@mattman1864
@mattman1864 День назад
@99temporal I see what you did there
@prophetzarquon1922
@prophetzarquon1922 День назад
2B OR ≠2B
@ToyKeeper
@ToyKeeper 3 дня назад
Bugs like this are part of why I use a pretty aggressive fail2ban. The attacker doesn't get 10,000 tries... instead they get 3 tries or sometimes even less. The bans eventually expire, but instead of hours to get in, it would take decades. Plenty of time to install a fixed version.
@danmerillat
@danmerillat 2 дня назад
You can get nailed on the first try if you're unlucky, or the timing might never work for an attacker. Even 64 bit systems could get catastrophically unlucky. At least it's an easy fix this time.
@parad0xheart
@parad0xheart 2 дня назад
fail2ban is certainly a useful tool, but I can think of way to potentially dodge it, depending on how it's coded. Like most software, let's assume that it's been written with the assumptions of the IPv4 address space in mind. That is to say, a user is likely to have access to a handful of IP addresses, and can't easily get hold of more unless they are a large company or state actor. However, that's not true for IPv6, where essentially everyone gets access to a 64-bit block as normal practise. So if fail2ban isn't coded to take this into account, and is only banning singular IP addresses, then it's trivial to bypass with IPv6...you just change IP address on every operation. To counter this, fail2ban needs to be IPv6 aware, and ban the whole 64-bit block if just one address in it trips its alarms.
@ToyKeeper
@ToyKeeper 2 дня назад
@@parad0xheart There are ways to make it detect and block IP ranges, in both ipv4 and ipv6. It just depends on whether the admin actually bothered.
@Daniel15au
@Daniel15au 2 дня назад
​@@parad0xheartI'm not sure about fail2ban specifically, but it's standard to block the whole /64 range for IPv6. Each customer / network is supposed to get its own /64, so it makes sense to block the entire range.
@mbabuskov
@mbabuskov 2 дня назад
@@parad0xheart or you just disable IPv6 for SSH, by setting the protocol to "inet" in ssh config.
@test40323
@test40323 3 дня назад
very well explained. i love that the vulnerability is put under real word context and report is not just a scary click bait. if one has a cloud server e.g. amazon, they should limit their client IP address for that ssh port.
@leokappler2282
@leokappler2282 5 часов назад
Is that the recommended method? I also always thought It would be risky to use an ssh server outside my home network. But don't know what to do instead. What if there is a coffee shop with the same provider and open wifi nearby. Wouldn't they also have the same IP? Of course it would still be a lot harder to hack the server than.
@test40323
@test40323 3 часа назад
@@leokappler2282 , your ISP typically assigns an unique but non-permanent address for each location. so your server would see different ip address at your coffee shop vs your home address unless you tunnel through your home address.
@IngwiePhoenix
@IngwiePhoenix 3 дня назад
This has all my windows people at work scream LINUX VIRUS and im so exhausted of telling them it would take literal hours and using fail2ban is a dead simple mitigation any public server should have anyway. Ugh... That said, this explanation was really good! Reminds me of the late Tetris level shenanigans where VBlank interrupts cause almost the same situation - albeit of a different nature.
@mnarath8376
@mnarath8376 3 дня назад
the regression has been fixed anyway already even my old ubuntu lts jammy pi home server already got a patch for it
@marcelocardoso1979
@marcelocardoso1979 3 дня назад
Like OpenSSH is not present on Windows also...
@somebodystealsmyname
@somebodystealsmyname 3 дня назад
Be sure to update your fail2ban sshd filter after installing openssh 9.8 ;)
@KevinVeroneau
@KevinVeroneau 3 дня назад
This is also more exploitable as the paper mentioned on 32-bit CPUs... which in 2024, who is seriously even using 32-bit for anything, let alone a server on the Internet for anything productive? So, this is essentially a very minor issue in my eyes and shouldn't affect that many people or servers.
@nikolaikalashnikov4253
@nikolaikalashnikov4253 3 дня назад
...i have heard whispers & jokes of "Linux" & "packet sniffing": But they're so busy laughing that I cannot understand what they're saying... Can you comment on this at all ?
@Slainte_Mhath
@Slainte_Mhath 3 дня назад
Great job explaining this vulnerability. But I think you got the LoginGraceTime part wrong. According to sshd_config's man page: "The server disconnects after this time if the user has not successfully logged in. If the value is 0, there is no time limit." - Which could result in a DoS if the maximum unauthorized connections are exhausted.
@bertjanbakker9497
@bertjanbakker9497 9 часов назад
That's exactly what the paper points out. (10:58)
@buhfur4694
@buhfur4694 7 часов назад
Just wanna say I love your vids man , high prod quality and clear description of the issue.
@JoJoDramo-ih7qk
@JoJoDramo-ih7qk 3 дня назад
Oh boy, the rewrite in rust gang is coming!
@RingingResonance
@RingingResonance 3 дня назад
OH LAWD! HE COMIN!
@gavabundo_0072
@gavabundo_0072 2 дня назад
Is Rust also Thread Safe?!
@aria2398
@aria2398 2 дня назад
@@gavabundo_0072that’s like half the whole point
@deanjohnson8233
@deanjohnson8233 2 дня назад
@@gavabundo_0072 This vulnerability is about signal safety - that is a whole other level of safety that Rust does not provide. When the signal handler is invoked in this exploit, the heap is corrupt. If you do anything with the heap at that point, you are bound to have something exploitable and a signal handler is Rust CAN interact with the heap.
@PhantomPhobos
@PhantomPhobos 2 дня назад
we gonna be ruSHing
@BxOxSxS
@BxOxSxS 3 дня назад
10:51 It does not close it immediately but rather does not close it at all. That's why as researchers mention it make you vulnerable to dos attacks as attacker does not have time limit for spawning too many waiting logins
@jakx2ob
@jakx2ob 2 дня назад
Which could easily be a bigger problem than a vulnerability with no known exploit.
@user-ot54ht
@user-ot54ht 3 дня назад
That's it, you're going into the Rust rewriter
@Infinitiverse
@Infinitiverse 2 дня назад
Interesting video & well explained. I'll be coming back to this channel for more content like this, good stuff! 👍
@RichardLucas
@RichardLucas 3 дня назад
The fact that it was a known bug _reintroduced_ into glibc makes it scary to me.
@cherubin7th
@cherubin7th 2 дня назад
welcome to the world of C and C++
@RichardLucas
@RichardLucas 2 дня назад
@@cherubin7th Been there since 2002, but thanks.
@Mario1vsSonic1
@Mario1vsSonic1 2 дня назад
It is not by mistake. GNU is compromised and so is glibc. Keep in mind it is called "exploit" or "bug" when you cannot prove malicious intent. When intent is proven it is suddenly a backdoor. But how easy do you think it is to prove intent when code obfuscation is done and the project is bloated? GNU ls is over 2000 LoC, while FreeBSD ls is around 1200, and openBSD ls is around 600 LoC. Where would an obfuscated backdoor be easier to hide?
@RichardLucas
@RichardLucas 2 дня назад
@@Mario1vsSonic1 It's not a hard sell, frankly. I doubt anyone seriously doubts the will that exists to have control over... _everything._
@ForcefighterX2
@ForcefighterX2 3 дня назад
Please add sections to your video! 🙂 Especially for experts, it is nice to skip stuff like explanations what SSH is.
@harrygreen9543
@harrygreen9543 2 дня назад
@@ForcefighterX2 +10000000
@bigsluggy
@bigsluggy 2 дня назад
What an excellent explanation, you are a great teacher. Subscribed!
@mylairhasnoip
@mylairhasnoip День назад
Your explaination for laypersons is very very good. I'm not a programmer or security expert by any means, but found it was easy to comprehend thanks to your summary
@jawwad4020
@jawwad4020 3 дня назад
@0:27 "...not that scary" Title: ABSOLUTELY WILD !!!! 😂😂
@RobTheQuant
@RobTheQuant 2 дня назад
great point! 🤣
@szelest88
@szelest88 2 дня назад
Think of a giraffe. Wild? Wild. Scary? Not so much.
@jiribrabec2100
@jiribrabec2100 2 дня назад
This is how we all live now
@arthurmoore9488
@arthurmoore9488 2 дня назад
@@szelest88 Yeah, what they pulled off is insane and I now have much more respect for that company. I may actually attend their next webcast.
@jawwad4020
@jawwad4020 2 дня назад
@@szelest88 *a wild exploit has appeared* 😆
@MatthewSherborne
@MatthewSherborne 3 дня назад
This is a really high quality and useful video for me. It makes me look smart to my bosses. Thank you :)
@nickazg
@nickazg 3 дня назад
So if i understand correctly, the exploiter injects the required function pointers for shell root onto to the compromised heap via the certificates being sent?
@theirs7351
@theirs7351 3 дня назад
the last time I was this early the queen was still alive
@MenaceInc
@MenaceInc 3 дня назад
The Queen is still alive though? 🤔 I'll be embarrassed if I check the news and see that Camilla has died...
@mochafennec
@mochafennec 2 дня назад
@@MenaceInc The Queen that actually mattered, not the current one
@MenaceInc
@MenaceInc 2 дня назад
@@mochafennec Victoria? Zenobia? Cleopatra? Freddie Mercury?
@ahmedabdelwadod5823
@ahmedabdelwadod5823 3 дня назад
I swear every time I get a notification from low level learning it's some scary vulnerability that may affect one of my systems
@jonmichaelgalindo
@jonmichaelgalindo 2 дня назад
Finally! I don't have to worry about forgetting my password anymore.
@NigelVH
@NigelVH 3 дня назад
I wanted to touch on something you noted late in the video, regarding recommending not exposing SSH on the internet, which invites the question of what do you suggest instead? You can do a lot to try and isolate management networks/etc, but ultimately you need a legitimate way in. Your argument that 'code can have bugs' applies to pretty much anything, we've seen various firewall vendor and VPN bugs in the past, so they're not different. How would you handle remote access?
@LowLevelLearning
@LowLevelLearning 3 дня назад
unfortunately imo the only other way is IP address whitelisting. it's not pretty but it significantly reduces the attack surface
@NigelVH
@NigelVH 3 дня назад
@@LowLevelLearning I can agree with you on that. Sometimes that presents a practicality problem, but it does significantly improve the posture when possible. And then in the case of this particular bug, something like fail2ban would probably go a long way in mitigation (though not closing off the bug entirely), given the large number of tries required. Thanks as always for the great content!
@ToyKeeper
@ToyKeeper 3 дня назад
@@NigelVH One low-tech way to reduce risk is to require a port knock or similar. It's primitive, but still sufficient to stop most attacks.
@smc4229
@smc4229 3 дня назад
Run SSH on a non-standard port, use fail2ban, or limit what IP blocks you allow to access (if you're in the US, do you need to allow access from other continents?). For big organizations that have their own IPv4 blocks they got from a RIR it's super easy, you just only allow from your own IP blocks and reject everything else
@futuza
@futuza 3 дня назад
I think he was referring to don't connect it to the internet while using the vulnerable version, not don't use SSH for its intended purpose ever. If that's what he did mean, then there's a couple of things you can do like whitelisting only specific IPs, or port knocking, but these only reduce the attack surface not make it safe. IMO its worth the risk if you take proper cautions like, IP address whitelisting, but not using a tool just because there's a possibility it could be vulnerable is dumb.
@kras_mazov
@kras_mazov 2 дня назад
Noob question, is LibC needed for system runtime, or is it an optional component used for compiling and so on?
@Eagledelta3
@Eagledelta3 3 дня назад
@LowLevelLearning Have they completed the 64bit PoC yet? Last I saw they still only had only successfully exploit in 32-bit. However, they were working on a 64-bit version
@glitchy_weasel
@glitchy_weasel 3 дня назад
Great video and breakdown!
@adrian_sp6def
@adrian_sp6def 2 дня назад
So simplest way to protect is set LoginGraceTime = 0 and all even old versions sould be "safe". Is this exploit only for x86 arch? does arm32 also affected? Thinking about rasberry pi platform connected to web.
@MichaelMaurakis
@MichaelMaurakis 3 дня назад
Great coverage on the subject when everyone else is screaming everything could be on fire. Seriously though big points to reviewing the mitigations and explaining the exploit in a easy to consume video!
@slendi9623
@slendi9623 3 дня назад
Great video and explanation
@defnlife1683
@defnlife1683 3 дня назад
Reminds me of one of the exploits in the chain for Eternal Blue.
@BGraves
@BGraves 3 дня назад
Can you imagine any legacy devices common on local networks that use the vulnerable ssh? Perhaps even those not owned by the user
@jeffcauhape6880
@jeffcauhape6880 День назад
Setting LoginGraceTime to zero does not log you out after 1 failed attempt. It appears to remove a login time limit completely. While it's good to always be using the latest releases, if you are set up to disconnect after three failed attempts, is this problem moot, since timing is not involved?
@kevinwydler7305
@kevinwydler7305 3 дня назад
Crazy exploit! Thanks for making me aware to this
@callumbirks
@callumbirks 2 дня назад
A phrase to parallel JerryRigEverything: “Code is code, and code breaks”
@spok_real
@spok_real 2 дня назад
@@callumbirks I have written unbreakable code observe int main() { return 0; }
@sscovil
@sscovil День назад
Would you be able to do a video explaining ASLR? I understand the basic concept, but don't understand how it doesn't cause code to break.
@user-ww1vj8ib5t
@user-ww1vj8ib5t 3 дня назад
How well can that 4-6 hours be parallelized? If an attacker can work on thousands+ of targets simultaneously then it still seems pretty bad
@somebodystealsmyname
@somebodystealsmyname 3 дня назад
You need a pretty stable connection for race conditions. So, working on thousands of targets would be extremely expensive.
@namm0x326
@namm0x326 2 дня назад
@@somebodystealsmyname Establishing SSH connections costs very little bandwidth. Depending on the exact timing, AWS may not be enough. But a small host with good connectivity to your target ranges, which can be established with a BGP looking glass, and many of these have very limited to no KYC -- those are great for these attacks
@danmerillat
@danmerillat 2 дня назад
already covered in the video. OpenSSH throttles new connections to... 100 in a second? which is why it takes 3-4 hours based on how quickly it allows connections to come in.
@zpvuvcfdpn
@zpvuvcfdpn 2 дня назад
Great content! Thank you!
@Mmouse_
@Mmouse_ 3 дня назад
That seems like an art piece or concept work... A meandering of what's possible, might not be practical but possible and clever none the less.
@oskar1504
@oskar1504 2 дня назад
How would i setup my server if i wont expose ssh and still want to access it. Use vpn to connect to network? Only allow certain ips?
@serenity1378
@serenity1378 2 дня назад
afaik it was only hours on 32bit software? I wasn't super paying attention so maybe you covered that bit, but the other sources I was looking into this with said on 64bit systems it would take days or longer. I'm curious, if you have a fully up to date gateway, or an OpenSSH server behind another protocol like a VPN, are older systems that can't be updated for some reason no longer vulnerable? Because they're not accessible from the internet someone would need to break into the patched system first, right? (I never trust myself even when I think I know something)
@chazzer5968
@chazzer5968 День назад
I sent a similar video to someone at my office. He's like: updating the libraries now. We then talked about the importance of testing known weak points in code (since it was a regression). Gotta keep an eye on known previous points of failure.
@Dionysor
@Dionysor 3 дня назад
so.. rustdesk x wireguard is more secure? didnt once see the point of remote control that is command line only
@microcybs
@microcybs 3 дня назад
kind of video you wanna see right after starting openSSH
@Karstadtdetektiv
@Karstadtdetektiv 3 дня назад
frfr just setup my vps yesterday for a minecraft ds-lite nat proxy tunnel and well haha sudo apt update sudo reboot
@Brahvim
@Brahvim 2 дня назад
Same! I learnt more about `ssh` and `tmux` JUST YESTERDAY and now I get to watch this! ... Thank you, Ed. At least I know how to keep my `ssh` connections more secure _nauw!..._
@slowdownex
@slowdownex 3 дня назад
I mean yeah you're right, this isn't the kind of exploit to some random individual is going to use to hack into a bunch of servers. But for extremely sophisticated, targeted attacks, stuff like this can be and is exploited.
@Turalcar
@Turalcar 3 дня назад
I rarely had to do signal handlers but the first thing I do is making sure no mallocs are reachable.
@kennethstauffer9220
@kennethstauffer9220 День назад
thanks for the great explanation.
@luftstolle
@luftstolle 17 часов назад
But if this really boils down to signal + malloc, isn't a lot of software besides OpenSSH affected? And does this mean that signals are useless for everything except maybe doing some cleanup and logging before shutting the process down? I really hope I misunderstood something.
@TomorrowTom1337
@TomorrowTom1337 День назад
Why can you even "send" code to the openssh process? It should first check the credentials? Am i missing something?
@SmilerRyanYT
@SmilerRyanYT 2 дня назад
Not worried about it myself but after hearing you need multiple connections would fail2ban not also fix the issue?
@forevergold108
@forevergold108 2 дня назад
Kind of. It does jail, but only short term from what I’ve seen. And even then it needs to be tuned since it can miss things. It’s possible for someone to attack all day up to the 60’s and not get stopped. I’m sure someone has better info on the subject but that’s what I’ve seen.
@sittingstill3578
@sittingstill3578 3 дня назад
This sounds like an early implementation of a TAS speed run with a wrong warp. It sounds impossible to execute but determined people can make these issues exploitable at a moment’s notice.
@lborate3543
@lborate3543 3 дня назад
Yuffie mentioned.
@bangdollarsign
@bangdollarsign День назад
oh yeah, be sure to be up to date for all the security fixes
@markuscwatson
@markuscwatson 2 дня назад
Was waiting for this vid
@noanyobiseniss7462
@noanyobiseniss7462 3 дня назад
"Accidentally"
@RavenMobile
@RavenMobile 2 дня назад
I think one of the best things you can do to secure your own Internet-connected server is to set up a system where you touch a specific port in a specific way to open up another port forward for the actual service. Without the initial poke at the ports, the server is never exposed to the Internet directly.
@zoomosis
@zoomosis День назад
I believe this is known as "port knocking".
@forbiddenera
@forbiddenera 11 часов назад
This is just security through obscurity.
@bernardcrnkovic3769
@bernardcrnkovic3769 3 дня назад
timing here is interesting. would an attack perhaps be exploitable faster with less network latency deviation (e.g. intra-datacenter exploits) i would presume attack could be performed much faster if you knew additional information about where in the cloud your victim is hosted and network link speeds are much more predictable.
@somebodystealsmyname
@somebodystealsmyname 3 дня назад
The 10000 tries the researchers got were under lab conditions. So it will mostlikely be longer in real world conditions.
@LevaniaMeyano
@LevaniaMeyano 2 дня назад
Think the research group the lowest latency they were attempting at was 10ms or something crazy low like that.
@Kuh5Kohle
@Kuh5Kohle День назад
Would this affect ARM too?
@DudeSoWin
@DudeSoWin 2 дня назад
This is literally the meaning of "grace" and since it was implement it has always been known to be a potential vulnerability.
@byugoi
@byugoi 3 дня назад
Have you ever made a video on the Intel Management Engine? My professor in my OS class mentioned that every Intel chip has its own OS that is based on Minix3. I've read people call it "ring -3", and so Intel basically has a root kit on every Intel PC. I would be interested to hear your thoughts on this
@Daniel15au
@Daniel15au 2 дня назад
Wouldn't it be trivial to protect against this by using a system that blocks IPs after several invalid login attempts (like Crowdsec, fail2ban, denyhosts, etc)?
@acerexdeus5232
@acerexdeus5232 День назад
yo, i'm no code guy but enjoy stuff like this from u, primeagen, dave's garage n the likes, i appreciate the logic n informative value u guys bring
@Ridcally
@Ridcally 3 дня назад
Good thing I had to power off my server due to no electricity
@RakibHasan-hs1me
@RakibHasan-hs1me День назад
I have disabled ssh service & uninstalled openssh in linux distro. Am I safe?
@gaborm4767
@gaborm4767 2 дня назад
how can this code run as root if ssh privilege separation is enabled by default?
@WoolleyWoolf
@WoolleyWoolf День назад
What a champ and good explainer.
@Veptis
@Veptis 3 дня назад
Is this why Xbox login (like for Minecraft) was down for 6 hours yesterday? I usually encounter a ssh proxy. And that second level rate limits you.
@khhnator
@khhnator 2 дня назад
that sounds a lot like the kind of attacks that first kinds of hacks found on consoles to bypass protection
@collinslagat3458
@collinslagat3458 3 дня назад
How do you login to a remote live server if ssh is not exposed?
@Karstadtdetektiv
@Karstadtdetektiv 3 дня назад
You're connected via VPN and only from that internal virtual IP adress you can access the ssh (because you share the same vlan). So you can close ssh on the servers firewall. And only allow certs no passwords.
@solii01
@solii01 3 дня назад
I do not know much about this topic, but I always wondered what even the advantage of code and data sharing the same memory is? Wouldn't this kind of exploit be impossible if the PC could never point to a block of data?
@p.w.little4729
@p.w.little4729 23 часа назад
Basically while the OpenSSH "regreSSHion" vulnerability sounds concerning, it's not a major threat. Exploitation is complex and requires hours of attempts under specific conditions, making widespread attacks unlikely. Many systems already have mitigations like brute-force detection in place, and the scope is limited to certain OpenSSH versions. Patch your systems ...no need to panic.
@spoonikle
@spoonikle 3 дня назад
all my ssh endpoints are only accessible on the assigned wireguard interface.
@keenoogodlike
@keenoogodlike День назад
Next major version, rewritten OpenSSH with Rust.
@nomore6167
@nomore6167 День назад
For critical projects like this (at the very least), there should be a process built into the commit procedure that checks for various types of vulnerabilities, and especially for specific vulnerabilities that were previously found and patched.
@marymissmary
@marymissmary 3 дня назад
Love your content.
@Crux161
@Crux161 3 дня назад
5:05 maybe I’m just out of it but has anyone else had the thought “Malloc Baldwin” randomly before? Internet, please say I’m not alone in this 😅
@MoleNihil
@MoleNihil 2 дня назад
“Secure” Shell
@nicebhaalu961
@nicebhaalu961 День назад
Noob here. What does it mean "Step 1: Get your SSH off the internet" How then am I supposed to connect to a remote server? Or was that meant generally to keep the SSH port closed if you are not using it?
@DeveloperChris
@DeveloperChris 2 дня назад
if you take SSH off the internet how do you manage your server?
@tau4333
@tau4333 9 часов назад
@@DeveloperChris well is a vpn technically the internet? 😂
@pif5023
@pif5023 2 дня назад
Not me typing in my shell ssh -V asap
@_chris_6786
@_chris_6786 3 дня назад
Thanks.
@robbelouwet8019
@robbelouwet8019 Час назад
Finally! I found someone that also pronounces it as 'daymon' instead of 'deamon'! A.k.a. the correct way!!!!!
@Karlemilstorm
@Karlemilstorm 2 дня назад
Wouldnt the server shut down your connection when you spam commands at it for 6-8 hours? Seems a little unrealistic to me that it would allow that
@PrNizar
@PrNizar 2 дня назад
Would this work on ARM32 architecture? All those routers with no updates. Millions of IOT devices too. Defeating ASLR with ret2plt in non PIE binaries is something that can be done I believe. Is this a left backdoor? 🙄
@cybermaus
@cybermaus 3 дня назад
How about dropbear?
@Nemesis-db8fl
@Nemesis-db8fl 3 дня назад
I remember when i first started logging into my servers i just used to close the terminal to close the connection to the ssh server now i exit through exit command
@juliandeal93
@juliandeal93 3 дня назад
The authors of the paper quoted song lyrics by a band called The Interrupters in each chapter.
@user-ow2zz9ki2n
@user-ow2zz9ki2n 3 дня назад
Great vid!
@wrathofainz
@wrathofainz 3 дня назад
"Would rust have fixed this bug?"
@llamatronian101
@llamatronian101 3 дня назад
Yes. You can screw up with signals in Rust, but you kind of have to try.
@deanjohnson8233
@deanjohnson8233 2 дня назад
I don’t think so. A signal handler in Rust can interact with the heap which will expose you to similar issues. At the time the signal handler is invoked, the heap is in a corrupt state. There is surely a way to exploit that, even if it isn’t exactly the same bug.
@llamatronian101
@llamatronian101 2 дня назад
@@deanjohnson8233 signals would typically be handed by Tokio or some other crate like signal_hook. These would avoid mistakes like interacting with the heap inside a signal handler. Rolling your signal handling in Rust would count as trying to be insecure to me.
@SanguinariusUmbra
@SanguinariusUmbra 2 дня назад
​​@@deanjohnson8233Hol' up. The paper mentions "if any one of these 24 free() calls is interrupted..." and "hence free(), which is not async-signal-safe". Generally in rust, whether you're in async or sync code, the compiler makes sure all the memory is deallocated once an item goes out of scope. This stands true even if the thread panics. On top of that, you also have the type system that prevents you from using and sending non async-safe types (including functions) across multiple threads. I'm pretty sure there are still ways to screw up, but rust would make it very hard to do in the first place.
@ChrisWijtmans
@ChrisWijtmans 2 дня назад
@@SanguinariusUmbra yeah but the lower levels arent made in rust. So rust is dead in the water.
@ntrgc89
@ntrgc89 3 дня назад
I'm missing something... the attacker tries to log in and waits for the grace period to expire, and they need it to expire right when malloc is being called so that heap memory is corrupted. But how exactly is the attacker injecting code? How do they send the malicious code to the machine running ssh, and then how do they exploit the heap corruption to shove their code into a place where it can be executed? They're not providing a custom sigalarm handler are they? That seems like it would be too easy.
@deanjohnson8233
@deanjohnson8233 2 дня назад
I believe the code is present in their certificate or some other part of the SSH connection request. They time sending some portion of their request so that it is present in the heap with the signal handler is invoked. The signal handler then ends up executing what they had inserted in to the heap. The signal handler is one written by OpenSSH to deal with connection timeouts. The signal handler ends up interacting with the heap though, which is attacker controlled and leads to the exploit.
@Burgo361
@Burgo361 2 дня назад
I still remember the first time I had a server open to the internet the only reason I didn't get hacked is because the logs from their attack filled my 40gb drive and crashed the system. Something like this would have been very bad.
@dots5641
@dots5641 3 дня назад
and this is exactly why i never expose ssh to the internet, but rather behind a preconfigured wireguard intranet.
@TheVincentKyle
@TheVincentKyle 3 дня назад
Everything else aside, I'm really happy the paper starts by quoting The Interrupters.
@Karstadtdetektiv
@Karstadtdetektiv 3 дня назад
I have a live trail of my fail2ban audit log on a monitor of my little 1$ VPS and boy I think I have witnessed attemps to use this since the log is exploding from 1 sec to another only from connects and disconects (no jails since they dont try logging in).
@IcECreAm-sv2qv
@IcECreAm-sv2qv 3 дня назад
Isn’t OpenSSH preinstalled on all windows 10+ devices?
Далее
I Spent 18 Months Using Rust And Regret It
38:36
Просмотров 162 тыс.
Yeni Özbək Mahnisi Yoxsa Vefali Reqsi? 😍
00:36
Просмотров 1,2 млн
Кто понял тот понял
00:24
Просмотров 442 тыс.
100+ Linux Things you Need to Know
12:23
Просмотров 146 тыс.
Why Western Designs Fail in Developing Countries
27:36
Просмотров 283 тыс.
The Problem with Wind Energy
16:47
Просмотров 1,5 млн
Insane Vulnerability In OpenSSH Discovered
1:06:56
Просмотров 152 тыс.
Russia is Running Out of People
17:47
Просмотров 122 тыс.
The moment we stopped understanding AI [AlexNet]
17:38
Просмотров 238 тыс.
Why This New CD Could Change Storage
14:42
Просмотров 877 тыс.
OZON РАЗБИЛИ 3 КОМПЬЮТЕРА
0:57
Просмотров 202 тыс.