Can you add to that regexp:

  *   Retrieving an object or calling an API via wget/curl to any private subnet
  *   calling an API via wget/curl on any private subnet
  *   Retrieving an object or calling an API via wget/curl to any unregistered 
domain (i.e. a local hostname, one that is resolved by a local DNS only, or 
through a hosts file)

Solve those and you will be on your way to avoiding this being an onerous 
overhead.

But I still think an external malicious address (IP, subnet, domain name) 
checking resource would be more effective. The more one creates blanket rules 
such as the above, the more attack surface is hidden. So this regexp approach 
in the end creates a cover for attack. The alternative sadly is to require 
dozens (at least) of regexp rules. This is not an overhead projects (IMO) are 
ready to take on.

Thanks,
Bryan Sullivan | AT&T

From: Luke Hinds [mailto:lhi...@redhat.com]
Sent: Friday, March 09, 2018 1:52 AM
To: SULLIVAN, BRYAN L (BRYAN L) <bryan.sulli...@research.att.com>
Cc: Aric Gardner <agard...@linuxfoundation.org>; Fatih Degirmenci 
<fatih.degirme...@ericsson.com>; opnfv-tech-discuss 
<opnfv-tech-discuss@lists.opnfv.org>
Subject: Re: [opnfv-tech-discuss] [releng][security][infra] Anteater 
Improvements

Sorry for spamming you folks, but the last one was broken:

https://regexr.com/3lv46<https://urldefense.proofpoint.com/v2/url?u=https-3A__regexr.com_3lv46&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=ML-JPRZQOfToJjMwlJLPlcWimAEwMA5DZGNIrk-cgy0&m=5KnnpogOSM_I2AxFww9_8Mgc-UOQW4-M1iwJkBTYF40&s=6tCZIqr3sisqZzb7RdDQJi6vJ5DjdXXMPkjUgalyb8Y&e=>

On Fri, Mar 9, 2018 at 9:36 AM, Luke Hinds 
<lhi...@redhat.com<mailto:lhi...@redhat.com>> wrote:
Another example with domain based urls:

https://regexr.com/3lv1o<https://urldefense.proofpoint.com/v2/url?u=https-3A__regexr.com_3lv1o&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=ML-JPRZQOfToJjMwlJLPlcWimAEwMA5DZGNIrk-cgy0&m=5KnnpogOSM_I2AxFww9_8Mgc-UOQW4-M1iwJkBTYF40&s=GmA-ipZszs01o584M3k4cvi-LtK1NwnOB74rs84Nak4&e=>
All we need do then is make an entry in anteater as follows

    curl_http:
      regex: 
"wget.*|curl.*https?:\/\/(www\.)?[-a-zA-Z0-9@:%._\+~#=]{2,256}\.[a-z]{2,6}\b([-a-zA-Z0-9@:%_\+.~#?&//=]*)"
      desc: "Object retrieval from non authorised site."
And then domains would be white listed with a simple entry in the ignore list:

file_audits:
  file_contents:
    - ^#
    - \.onap\.org\/
The above would allow all file downloads, but if we wanted to be more specific, 
we could:

file_audits:
  file_contents:
    - ^#
    - \.onap\.org\/files\/.*\/*\.iso|img|yaml|tar
Hopefully its possible to see how flexible the tool is now.


On Fri, Mar 9, 2018 at 9:24 AM, Luke Hinds 
<lhi...@redhat.com<mailto:lhi...@redhat.com>> wrote:
A simple way to solve this is using regex. You can really build up multiple 
conditions, for example the following link will match anyone using curl /wget 
against an IP address, but things such as 'yum install curl' will not get 
picked up.

https://regexr.com/3lv1o<https://urldefense.proofpoint.com/v2/url?u=https-3A__regexr.com_3lv1o&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=ML-JPRZQOfToJjMwlJLPlcWimAEwMA5DZGNIrk-cgy0&m=5KnnpogOSM_I2AxFww9_8Mgc-UOQW4-M1iwJkBTYF40&s=GmA-ipZszs01o584M3k4cvi-LtK1NwnOB74rs84Nak4&e=>
 # Play around with the text section
When used in this way, the tool really becomes quite powerful. I use it myself 
for non security context stuff such as blocking depreciated functions, release 
names etc.


On Thu, Mar 8, 2018 at 3:31 PM, SULLIVAN, BRYAN L (BRYAN L) 
<bryan.sulli...@research.att.com<mailto:bryan.sulli...@research.att.com>> wrote:
Aric,

To clarify my intent - it was that the blocking of wget/curl/etc tool use 
except as allowed by regex rules, is the onerous part since there are many 
different uses and it will be difficult to create/maintain the regexp rules.

I actually would *prefer* use of an external service such as VirusTotal that 
could flag risky content sources however they do it (FQDN, IP, etc though they 
are not a perfect solution either), since at least any private-subnet targets 
for wget/curl would pass that test.

Of course, one could argue that if a DNS is hacked then even curl for Keystone 
APIs can result in a vulnerability... but we have limits in what we can 
achieve. And such hacks would threaten use of the same resources even via 
python libraries e.g. for OpenStack clients, so it's not just curl/wget that 
would be at risk.

Thanks,
Bryan Sullivan | AT&T

-----Original Message-----
From: 
opnfv-tech-discuss-boun...@lists.opnfv.org<mailto:opnfv-tech-discuss-boun...@lists.opnfv.org>
 
[mailto:opnfv-tech-discuss-boun...@lists.opnfv.org<mailto:opnfv-tech-discuss-boun...@lists.opnfv.org>]
 On Behalf Of Aric Gardner
Sent: Thursday, March 08, 2018 7:21 AM
To: Fatih Degirmenci 
<fatih.degirme...@ericsson.com<mailto:fatih.degirme...@ericsson.com>>
Cc: opnfv-tech-discuss 
<opnfv-tech-discuss@lists.opnfv.org<mailto:opnfv-tech-discuss@lists.opnfv.org>>
Subject: Re: [opnfv-tech-discuss] [releng][security][infra] Anteater 
Improvements

Hi Faith,

Regarding your comments on reproducibility and traceability.

If we are not blocking ips, which I agree with Bryan is heavy handed
from a practical perspective. Perhaps ant eater could create a report
of external sources per repository, and then exit 0.

The developers could then be alerted to our concerns.

Gerrit Comment or email to ptl:

"Hi $project developer" Here are external ips connected to your build.
{list goes here}
If any of these sources should go offline, your builds will no longer
be reproducible or traceable.
Please consider this carefully. If you need a file hosted, contact
helpdesk and they will be happy to put in on 
artifacts.opnfv.org<https://urldefense.proofpoint.com/v2/url?u=http-3A__artifacts.opnfv.org&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=ML-JPRZQOfToJjMwlJLPlcWimAEwMA5DZGNIrk-cgy0&m=5KnnpogOSM_I2AxFww9_8Mgc-UOQW4-M1iwJkBTYF40&s=cyIsnSq4XMyipP2XXfyAEz0kfNkwZZYb4dlBiRWnOXQ&e=>

Or something like that..


-Aric


On Thu, Mar 8, 2018 at 9:11 AM, Fatih Degirmenci
<fatih.degirme...@ericsson.com<mailto:fatih.degirme...@ericsson.com>> wrote:
> Hi Luke,
>
>
>
> I have few comments and followup questions regarding this:
>
> “This in turn means we won't raise alarms over curl, git clone and wget and
> will instead check the IP addresses or URLS that those commands query. This
> should make anteater a lot less chatty at gate.”
>
>
>
> You might remember that one of the reasons we have checks for curl/wget is
> to find out if projects pull artifacts from unknown IPs during
> build/deployment/testing.
>
> These are not malicious but we have seen that few of the IPs where the
> projects fetch the artifacts belong to non-production/personal devices that
> tend to disappear over time.
>
> As you know, this is an important issue from reproducibility and
> traceability perspectives.
>
>
>
> Now the questions are;
>
> Assuming the IPs are not explicitly added to exception list for the
> corresponding project, do you mean that we will stop flagging changes/files
> that contain wget/curl against unknown IPs if they are not marked as
> malicious on VirusTotal?
>
> We also had plans to make anteater checks voting/blocking. Will we discard
> this plan since wget/curl against IPs are not even planned to be flagged?
>
>
>
> /Fatih
>
> From: 
> <opnfv-tech-discuss-boun...@lists.opnfv.org<mailto:opnfv-tech-discuss-boun...@lists.opnfv.org>>
>  on behalf of Luke Hinds
> <lhi...@redhat.com<mailto:lhi...@redhat.com>>
> Date: Thursday, 8 March 2018 at 14:02
> To: 
> "opnfv-tech-discuss@lists.opnfv.org<mailto:opnfv-tech-discuss@lists.opnfv.org>"
> <opnfv-tech-discuss@lists.opnfv.org<mailto:opnfv-tech-discuss@lists.opnfv.org>>
> Subject: [opnfv-tech-discuss] [releng][security][infra] Anteater
> Improvements
>
>
>
> Hello,
>
> I have some changes to improve the reporting ability and hopefully tone down
> the false positives.
>
> Aneater will now interface with the VirusTotal public API:
>
> 1. If anteater finds a public IP address, the DNS history will be quiered to
> see if the IP has past or present associations with malicious domains.
>
>
>
> 2. If a URL is found, it is checked against the VirusTotal API to see if its
> marked as malicous.
>
> 3. Binaries will be sent to VirusTotal for a scan by the aggregation of
> scanners hosted there.
>
> For anyone wanting a demo, please see the following:
>
> https://urldefense.proofpoint.com/v2/url?u=https-3A__asciinema.org_a_JfzUPWpBGm0wDKPCN3KlK2DK0&d=DwIGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=ML-JPRZQOfToJjMwlJLPlcWimAEwMA5DZGNIrk-cgy0&m=6EsJ-DUgsI7-DkbjEXxGjzptgs4TvKq5mEEloPNPaPs&s=dzAbMw0YSraSqGU7H20vdxbFs2N_XOGvATnqWbreIac&e=
>
> I will work with various people to get this rigged into CI.
>
> This in turn means we won't raise alarms over curl, git clone and wget and
> will instead check the IP addresses or URLS that those commands query. This
> should make anteater a lot less chatty at gate.
>
> Cheers,
>
> Luke
>
>
> _______________________________________________
> opnfv-tech-discuss mailing list
> opnfv-tech-discuss@lists.opnfv.org<mailto:opnfv-tech-discuss@lists.opnfv.org>
> https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.opnfv.org_mailman_listinfo_opnfv-2Dtech-2Ddiscuss&d=DwIGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=ML-JPRZQOfToJjMwlJLPlcWimAEwMA5DZGNIrk-cgy0&m=6EsJ-DUgsI7-DkbjEXxGjzptgs4TvKq5mEEloPNPaPs&s=zWwal0xhvRoCmujpuFuhA22LpAlUXFhdLXKI42yJojc&e=
>
_______________________________________________
opnfv-tech-discuss mailing list
opnfv-tech-discuss@lists.opnfv.org<mailto:opnfv-tech-discuss@lists.opnfv.org>
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.opnfv.org_mailman_listinfo_opnfv-2Dtech-2Ddiscuss&d=DwIGaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=ML-JPRZQOfToJjMwlJLPlcWimAEwMA5DZGNIrk-cgy0&m=6EsJ-DUgsI7-DkbjEXxGjzptgs4TvKq5mEEloPNPaPs&s=zWwal0xhvRoCmujpuFuhA22LpAlUXFhdLXKI42yJojc&e=
_______________________________________________
opnfv-tech-discuss mailing list
opnfv-tech-discuss@lists.opnfv.org<mailto:opnfv-tech-discuss@lists.opnfv.org>
https://lists.opnfv.org/mailman/listinfo/opnfv-tech-discuss<https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.opnfv.org_mailman_listinfo_opnfv-2Dtech-2Ddiscuss&d=DwMFaQ&c=LFYZ-o9_HUMeMTSQicvjIg&r=ML-JPRZQOfToJjMwlJLPlcWimAEwMA5DZGNIrk-cgy0&m=5KnnpogOSM_I2AxFww9_8Mgc-UOQW4-M1iwJkBTYF40&s=hYDCDLzyy16-F78dLoBk_VgwDxhdSm03cCUTpmugPsA&e=>


--
Luke Hinds | NFV Partner Engineering | CTO Office | Red Hat
e: lhi...@redhat.com<mailto:lhi...@redhat.com> | irc: lhinds @freenode | t: +44 
12 52 36 2483



--
Luke Hinds | NFV Partner Engineering | CTO Office | Red Hat
e: lhi...@redhat.com<mailto:lhi...@redhat.com> | irc: lhinds @freenode | t: +44 
12 52 36 2483



--
Luke Hinds | NFV Partner Engineering | CTO Office | Red Hat
e: lhi...@redhat.com<mailto:lhi...@redhat.com> | irc: lhinds @freenode | t: +44 
12 52 36 2483
_______________________________________________
opnfv-tech-discuss mailing list
opnfv-tech-discuss@lists.opnfv.org
https://lists.opnfv.org/mailman/listinfo/opnfv-tech-discuss

Reply via email to