On 02/08/2008 18:23, David B Teague wrote:

Lisi Reisz wrote:
On Saturday 02 August 2008 17:49:40 David B Teague wrote:
This is a very brief summary from this web site

http://blogs.pcmag.com/securitywatch/2008/07/evilgrade_exploit_toolkit_atta
.php

The article says the EvilGrade Exploit tool kit is able to attack
systems using the "man in the middle",  attacking through the
installation mechanism.

It actually says "updates" not installation (my stars):
<quote>
infecting systems through the **update** mechanism, according to a ZDNet blog. The attackers claim, in the Readme for the kit, to have modules implemented to attack the following product **updates**
</quote>

The attacker specifically mentions OO.o in the kit "ReadMe".

No, it says:"OpenOffices"

This is not the correct name of this program (or site) and OOo does not have updates as such.

I doubt they have achieved what they claim, tho' that doesn't mean that we can all be complacent.


OK, they committed a spelling error, but if they HAVE compromised OpenOffice.org as I think they are suggesting, the spelling error in their "ReadMe" will not make any difference at all. We will have given them access to our systems through the installer.

I do not pretend to understand all this, but I do understand the idea of threat. At present, to update OO.o, I download a Windows installation file, and run it. I don't see any mechanism for signature or do I see easy access to checksums. I assure you in the future, I will be looking for checksums. I would prefer have digital signatures for installation files. If checksums will assure me no one has fiddled with the installer, I'll gladly go through the process of confirming check sums.


Now, would someone answer my questions?

Is Lisi is right, there is no danger because of the difference between "updates" and "installers"?

Is there any intent to introduce digital signatures?

Do checksums do the same thing as digital signatures?


David Teague



The attack described relies on a "live" update mechanism in which the current version of the software (OOo, iTunes, Adobe Acrobat, whatever) installed on your computer automatically goes to a server somewhere, decides there is a new version of itself and automatically (possibly with your permission) downloads and runs the appropriate file(s). Given such a mechanism, the attack works by diverting the software to the attacker's server and persuading it to download and run the file(s) from there. Note that Windows Update works like this and is therefore possibly vulnerable to the attack described. I *think* the same is true of many Linux package managers. Not at all sure about Macs but I wouldn't be surprised given how iTunes works in this regard.

There are two ways to protect against this. The simplest is to have the software check that the server it is actually connected to is the server to which it should be connected. Reverse DNS is at least a partial solution here although even that can be compromised, albeit with much greater difficulty.

The other way is via digital signature. The software would have the relevant public key securely available to it together with the mechanism to check the digital signature(s) of the file(s) it wants to download. MD5 wouldn't be useful here. Nor would any other hash algorithm.

The problem with digital signatures is that the software is not readily available in all the countries in which OOo is used and there would be quite serious legal problems providing it.

OOo, on Windows at least, has a "live" mechanism built in although I never use it. Instead I always go directly to the OOo web site, download the new version and run it by hand. In this case the attack described can't work because I'm getting the file from the right place. Also in this case MD5 is perfectly adequate providing the OOo web site hasn't been hacked. If an attacker can plant his file (and therefore his version of the checksum) on the OOo web site then no checksum algorithm is going to help. In this case the only way is via a digital signature providing that the place from where you get OOo's public key hasn't been compromised. If you were to get and believe the attacker's version of OOo's public key then all would be lost. This then raises the whole set of issues surrounding PKI (Public Key Infrastructure) schemes and that's just too OT to go into here.


--
Harold Fuchs
London, England
Please reply *only* to [email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to