Security Basics mailing list archives
Re: RSA Compromise
From: "Ivan ." <ivanhec () gmail com>
Date: Sat, 2 Apr 2011 09:43:46 +1100
Navin see below cheers Ivan Making sense of RSA ACE server audit logs Following up on the earlier post by fellow ISC handler Rob on the RSA Breach, here's a couple practical things you can look for in the audit log of your RSA ACE (SecurID) server. In line with Rob's scenarios, an attacker who is in possession of the "seed" values of your SecurID tokens still has to guess the userid and PIN to get a successful login. With ample foresight :), the authors of the ACE/RSA software seem to have expected such a scenario, and have implemented an audit log that fits to the case: AUTH_FAILED_BAD_PIN_GOOD_TOKENCODE will show up in the audit log whenever someone has a good token (or the seed values) and either fumbles or tries to guess the associated PIN. You'll get quite a few of these in normal use, simply because authorized users sometimes forget or mistype their PIN. If you see a lot of these against one single userid, chances are it will lock after "n" failed attempts and no harm is done. But if you see 1-2 of these per user and enumerating several of your users .. then you should take a closer look for sure. AUTH_PRINCIPAL_RESOLUTION / AUTH_ALIASES_NOT_FOUND will appear in the log if the userid that tries to log in does not exist. Again, you can expect a couple of these per day in normal operation, it is just a fact of life that users can't type their own names ... But if you get a lot of these, and especially if the username format is completely different than the userids in use, someone might be trying to guess your users from a phonebook or LinkedIn accounts. Take a closer look! Irrespective of the recent RSA breach though, there is one audit log entry that you should keep a close eye on: NEW_STATIC_PCODE_AUTH_SUCCESS shows up in the log whenever someone logs in with a static passcode. This means that the user has lost his token, or never had one, and that someone with ACE Admin privileges has assigned a static password instead. Yes, this is possible, and it basically turns two factor authentication into two-password authentication, while still everyone can claim to the auditors that "login goes via the SecurID server". There are legitimate emergencies for this kind of login, but it certainly is a dangerous option to have - if someone can smooth-talk your Helpdesk, they can get in, without needing a token. Considering the latter, you probably shouldn't worry all that much about what was or wasn't stolen in the recent RSA heist. But if you're not doing so yet, you certainly should check your ACE server audit log. http://isc.sans.edu/diary.html?date=2011-03-29 and http://isc.sans.edu/diary.html?storyid=10609 On Sat, Apr 2, 2011 at 6:49 AM, <navin1406 () yahoo com> wrote:
Hi Guys, How serious does the RSA breach looks like and what proactive measures should we take to mitigate exposure if any? Thanks, Navin Sent on my BlackBerry® from Vodafone
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- RSA Compromise navin1406 (Apr 01)
- RE: RSA Compromise Valin, Christian (Apr 05)
- Re: RSA Compromise Ivan . (Apr 05)
- Re: RSA Compromise Spacerat (Apr 05)
- RE: RSA Compromise Chris Weber (Apr 05)
- Re: RSA Compromise navin1406 (Apr 05)
- Re: RSA Compromise techfrancis (Apr 05)
- RE: RSA Compromise faruk (Apr 05)
- Re: RSA Compromise Juan Morales (Apr 07)
- Re: RSA Compromise Benjamin Kenneally (Apr 07)
- Re: RSA Compromise amolarakh (Apr 07)