log4j
If only I could get a fifteen-minute answer on log4j.
Infosec takes many cues from the human immune system. The analogies and metaphors are useful and apt: viruses, vectors, evolving a defence where learning is part of the response... It's not unreasonable to suggest that immunology and cybersecurity could learn a lot if they talked more. Sometimes, though, the parallels are far …
Here's a three liner:
1. Identify systems in your environment - and prioritise Internet-facing ones - which are using Log4j.
2. Check traffic to and from those systems, and allow only communication to and from trusted IPs
3. Block outbound connectivity to LDAP and RMI-IIOP services (port if you have to, application-based of you have a new-fangled application-aware firewall).
4. (Spanish inquisition time...) Change Log4j config to mitigate the threat, or upgrade...
It's not difficult to find out what packages (or libraries) are installed on a Linux system. Debian and, I suppose, others have a mechanism for seeing what's installed. Debian has several options including synaptic which gives a sometimes useful commentary. It tells my that the Apache package isn't installed and that 2.17 is already available if I wanted to install it. It also tells me that I've got a Java successor, Logback, and a C++ API modelled after log4j which raises the question as to whether they might be bug-for-bug emulations of the original.
Even on Linux, not everything that is installed comes from a package from a repository. Especially for commercial applications that are not distributed in that way, but even for open source ones that doesn't use that mean of distribution.
Maybe they are downloaded directly from GitHub, maybe they download packages from other repositories when installed.... and some of them may have forked some library or just copied libraries to "avoid issues with breaking changes"....
And they you have your dependencies' dependencies - maybe you never used log4j, but there's something that was automatically added that does...
No, it won't. You may think that every Log4J jar is called that, but not only do you have the case problem, the version number problem, and the it-might-be-in-an-archive problem, but it can also be named something different if they wanted to do that. If you have a program that is already packaged in a jar file, it can contain dependencies inside of it and it's an archive file so find won't find it unless you also unzip everything first recursively. If you have a program that runs from source, the JVM might be running off a compiled version which has internal names. The files are there for you to find, but they won't be obvious unless you already know what their names are.
It's not difficult to find out what packages (or libraries) are installed on a Linux system.
Well, that's how it used to be. Now every snap, flatpak or appimage on the system comes with its own libraries which are only updated if an when the application maintainer thinks it's worthwhile. Because of course they all have time to follow every dependency of every dependency of every dependency of their work and rebuild the whole thing when one of them changes significantly.
Number of snaps on my system: 0
Number of flatpaks on my system: 0
Number of appimages on my system: 0
It's true that the virus pandemic and Log4J bugs are both serious problems, which require an emergency top level response. So I've decided to follow the same steps the government took, in order to reuse their experience in tackling an emergency, by following best practices.
Therefore my programmers have suspended all their current work, and have been ordered to spend all day this week on the urgent task of having parties and getting blootered on wine and coke instead, as this is apparently the expert way to act to solve a problem, and they're all "hard at work" when doing so.
Surely the correct response is to:
10 Deny the existence of log4j.
20 Admit the existence of log4j - but it's only for web servers and we don't have any.
30 What? We do have web servers?
40 Well, it's not that serious. Is it?
50 Ah, well, we may have a problem, but there's no need for alarm.
60 There's no need for a lockdown of your systems.
70 Lockdown your systems.
80 It's fixed. Carry on, nothing else to see here.
90 What do you mean a variant of log4j?
100 GOTO 10
@Howard Sway
"Therefore my programmers have suspended all their current work"
Shows how important 'your" programmers are. The world won't stop because of them will it?
The only thing that I.T. people are working hard on is finding a way, indeed anyway, to put the blame on someone else.
But to compare a deadly virus with a problem caused by I.T. is sick. I guess all the people who are suffering from the loss of a loved one are saying "if only it could have been Log4j instead of covid".
Moral? This is a tech page NOT a political pisstake page.
At least commercial developers have an incentive to improve things. Open sources ones don't. In fact it's worse than that, because in closed source support is a cost while in open source it is the only profit centre. Open source developers have a perverse incentive to do things badly.
"Because there has never been a security bug in closed source software."
That reply is avoiding the topic.
The point of the OP posting about the elephant in the room is that, yes, closed source has always had bugs. But for decades we've heard that the open source concept squashes bugs because of "many eyes on the code".
Yet some of the most serious bugs lately have been in open source projects. And the occasional response?
'But closed source!'
There should have been a "mea culpa" in regards to the blind belief that open-source human frailty would triumph over closed-source human frailty.
@John Robson
Of course there have been bugs in closed source software. The problem is that the "free software" people refuse to accept that there are bugs in free software.
I give you log4j as an example. I will probably be downvoted into Australia for saying this, but how old is this software and what happened to the many eyes thing?
At least with paid for software there is someone to sue...
P.S. I used to know a John Robson who lived in Keighley. Are you him?
"At least with paid for software there is someone to sue..."
Is there? License agreements usually state that the product is sold "as is" and explicitly disclaim all liability. I'm not aware of any (US) statute that would support a lawsuit of the type you mention.
Have you heard of any lawsuits against suppliers over software vulns? Were they successful?
"And what happened to "many eyes"?"
I'm more interested in what happened to the many eyes in so many IT companies that use Log4j in so many products.
I've been dealing with several Log4j affected products and many companies just provide the usual mitigations: define log4j2.formatMsgNoLookups=true and/or remove JndiLookup.class. If it's so easy - why have you included the poorly thought defaults and/or unneeded Java classes?
Practically all of the big companies use Log4j but it seems that not in single one did anyone evaluate the software from security perspective.
What irks me as well is how companies have jumped on that first perfect 10.0 CVE vuln, but they're not necessarily tracking the additional vulns that popped up afterwards. When they are publishing updated firmware packages and mitigation instructions, you can't be sure which CVE's are addressed.
To be honest, some of the flaws in closed source are just as bad.
The difference behind open and closed is that open probably get addressed sooner in a lot of case.
Downside is the number of forks etc that have the issue but are never maintained.
I suspect that you are more liekly to hear the flaws on OS sooner on average, and be able to react sooner
One odd thing I'm seeing in my server logs. Over half of the door-knocking probes for the Log4Shell problem seem to be coming from obvious white-hats, presumably looking for bug bounties/honoraria. I'm actually struck by how competitive that market seems to be.
Is anyone else seeing a similar trend?
So today it's log4j, last year it was openssl, and on it goes - and none if it ever really gets fixed
Today for example:
- None of the major anti-virus/malware protection/security warn you about things like apps containing ancient openssl and the like thus pressuring the offenders to update their apps
- A Microsoft subsiduary appearrs to be shipping obsolete OpenSSL code in a major MMO title according to the strings in it ("OpenSSL 1.1.0e 16 Feb 2017")
Even worse the file listing the third party packages used is a long list of obsolete things and is bundled in plaintext with the package
Nobody creating software is looking
Nobody scanning software is looking
Nobody installing software is looking
Nobody creating software is acting
Almost Nobody using free software is investing in it enough (ditto proprietary though)
because nobody creating software is going to get sued.
I worked in a large tech company. The small areas of the business that were subject to liability law (drones, medical, self driving) had rigorous and well managed compliance and analysis, code scanning, security policies and pre-release steps. The rest of the business had a totally inadequate (but still better than industry average) whackamole and attempted policy enforcement group.
We need laws placing liability on those who sell, rent or similar software and services just like we do with physical product. Only then will this mess get fixed
That's an interesting point, but be aware that the liable areas are so well covered because of their... liability, and that's because something going wrong in those has significant impact on people's lives or wellbeing.
And we have a much, much wider range of applications where the impact of a security incident is likely minimal to small annoyance to actually none. Making these services liable on the same scale as the others will likely put them out of business in short time.
Liability law is not the same as making people automatically liable. I agree entirely that making people automatically magically liabile for something is bad.
Liability law is about showing you acted with reasonable care. So for example if you ship a product built to good standards of desig and safety and someone manages to kill themselves on it you are not automatically liable. This is true in the aspects where liability law already intersects software. Shipping the latest current well regarded OpenSSL and a bug being found isn't going to get you successfully sued. Shipping a 2017 era OpenSSL that didn't get updated on the other hand you deserve a kick up the backside. Nothing else is going to change the behaviour of the IT giants.
Another problem is that it's going to become a national security issue. When Ukraine gets invaded or China finally eats Taiwan you can be sure that the resulting cold war is going to involve them exploiting every hole they can and every control of European/US software, and of course vice versa. There are reasons China doesn't use US chips in security roles, and the Russians have things like Elbrus.
The log4j-detector project on Github was invaluable for us, we found all our nested instances in Prod in a couple of hours last Monday and ultimately removed the JNDILoookup class after the initial mitigation proved to be a false dawn. Took the Dev Team 3 days to come up with the info, and even then they had missed a couple of instances.
> IT doesn't take itself as seriously as a responsible production engineering discipline
That is absolutely true.
Unfortunately, creating software that is actually as safe as a house takes something like 5x more time and money, compared to the "eh-good-enough" level of quality that we are accustomed to.
Good luck finding customers that will spring for that, unless you make it compulsory by law.
There are good studies that show the "it costs five times as much" claim is false. There is a significant initial investment but after that the cost of writing software properly is actually quite low because the bug rate is massively lower in the first place. Force it to happen at scale and it'll be cheaper still.
The law thing absolutely - right now we have what economists call a "lemon market" for software. The bad drives out the good due to pricing and the inability to tell crap from quality.
I wonder what the final cost is, of buying affordable unfinished software that will depend on patching and updating throughout it's life.
Windows and flash ought to have taught the lesson but it seems it is better to get the new shiny stuff out there and allow the users to fault find so that the product and users can be 'saved' by the caring seller, who undoubtedly takes the security/privacy/wellbeing/money of their users extremely seriously.
Salesforce CEO Marc Benioff has doubled down on his company's stance on working from home and flexible working, that great pandemic debate.
Following widespread WFH enforced by global COVID-19-related lockdowns, opinion is divided between those welcoming the new normal of work-where-you-like and those who see numbers coming through the office door as a proxy for productivity.
Those in the latter camp include Goldman Sachs CEO David Solomon – who has taken several opportunities to insist that his staff get back to the office full time – and UK Prime Minister Boris Johnson, who insisted the temptation of coffee and cheese presented a serious threat to the nation's post-Brexit economic success.
More than two years after England launched a COVID data store, keeping details of National Health Service (NHS) patients, the country's National Data Guardian (NDG) remains unsatisfied with who is accessing the data.
The COVID-19 data store was launched in March 2020, and would pull together medical and operational data about the spread of the virus across the country.
Poll As return-to-office attempts continue to fail for big tech businesses, another proposed change to the work world is gaining steam: The four-day week.
In the UK, a 70-company trial program the BBC described as "the world's biggest" began this week, with participants paying their employees a regular week's pay for 80 percent of the labor. That pilot may be the largest, but it's hardly the only one.
Some companies have opted to trial the four-day week on their own, like Dell, which recently switched to a shortened week in the Netherlands after previously trialing it in Argentina.
Enterprise security teams being overrun by the rising numbers of vulnerabilities uncovered each day could vastly reduce their patching workload by changing how they prioritize the flaws, according to recent research from vulnerability startup Rezilion.
Most enterprises look to the ratings given to flaws in the Common Vulnerability Scoring System (CVSS) framework, which range from 0 to 10 (with 10 being the highest) and are ranked as low and medium to high and critical, depending on the characteristics of the vulnerability.
Companies will start their remediation efforts with the vulnerabilities deemed "critical" and work their way down, said Yotam Perkal, director of vulnerability research with Rezilion.
The tech world's pandemic supply chain meltdown drove ServiceNow to place orders for a year worth of datacenter kit in January 2022, believing that doing so was necessary to get the hardware it needed to cope with growing customer workloads.
"Pre-COVID, I could generally get stuff in 45 days," CTO Pat Casey told The Register at ServiceNow's Knowledge 22 conference in Sydney, Australia, today.
Well-publicized coronavirus-related supply challenges caused ServiceNow's lead time for some networking kit to stretch to 160 days, while servers can take 120 days to arrive.
Black Hat Asia Software made unsafe by dependencies should be fixed without users needing to interact with the source of the problem, according to US National Cyber Director Chris Inglis, who serves in the Executive Office of the President.
Speaking to The Register at the Black Hat Asia conference in Singapore on Friday, Inglis said that when a faulty component in a car needs to be replaced, the manufacturer who chose that component takes responsibility for securing safe parts and arranging their installation. He contrasted that arrangement with the fix for the Log4j bug, which required users to seek assistance from both vendors that used the open-source logging code and source software from the Log4j project itself.
Inglis wants vendors to take responsibility for their choices so that addressing security issues is easier and users' systems – and the US – can achieve better resilience with less effort.
Amazon Web Services has updated its Log4j security patches after it was discovered the original fixes made customer deployments vulnerable to container escape and privilege escalation.
The vulnerabilities introduced by Amazon's Log4j hotpatch – CVE-2021-3100, CVE-2021-3101, CVE-2022-0070, CVE-2022-0071 – are all high-severity bugs rated 8.8 out of 10 on the CVSS. AWS customers using Java software in their off-prem environments should grab the latest patch set from Amazon and install.
"We recommend that customers who run Java applications in containers, and use either the hotpatch or Hotdog, update to the latest versions of the software immediately," the cloud giant said in a security bulletin on Tuesday.
VMware's Horizon virtualization platform has become an ongoing target of attackers exploiting the high-profile Log4j flaw to install backdoors and cryptomining malware.
In a report this week, cybersecurity firm Sophos wrote that VMware's virtual desktop and applications platform has been in the crosshairs since late December, with the largest wave of attacks beginning Jan. 19 and continuing well into March. Many of the attacks are designed to deploy cryptocurrency mining malware, Sophos researchers Gabor Szappanos and Sean Gallagher wrote.
Other motives were less clear, though some may be used by ransomware groups or initial access brokers, who gain access into targeted systems and then sell that access to threat actors to launch ransomware and other malware attacks.
In Brief Triton malware remains a threat to the global energy sector, according to an FBI warning.
Triton is the software nasty used in a 2017 cyber attack carried out by a Russian government-backed research institution against a Middle East petrochemical facility.
The new FBI warning [PDF] came a day after the US Department of Justice unsealed a pair of indictments that detail alleged Russian government efforts to use supply chain attacks and malware in an attempt to compromise and control critical infrastructure.
In Brief US federal agencies have warned of possible threats to American and international satellite communication (SATCOM) networks that could affect customers.
In a joint security alert, the US Cybersecurity and Infrastructure Security Agency (CISA) and FBI "strongly encourage" critical infrastructure operators, along with SATCOM network providers and customers, to put in place a series of mitigation steps to shore up their networks.
These include:
Biting the hand that feeds IT © 1998–2022