Making Service Meshes Work for People – Idit Levine – ASW #267
Full Audio
View Show IndexSegments
1. Making Service Meshes Work for People – Idit Levine – ASW #267
Service meshes create the opportunity to make security a team sport. They can improve observability and service identity. Turning monoliths into micro services sounds appealing, but maybe not every monolith needs to be broken up. We'll also talk about the maturity and design choices that go into service meshes and when a monolith should just remain a monolith.
Segment Resources:
Announcements
Security Weekly listeners: Cyber threats are evolving — is your organization keeping up? The 2023 Cybersecurity Year in Review is Here! Uncover the latest challenges and strategic responses in CRA's 2023 Cybersecurity Year in Review – sponsored by RSA Conference. From the impact of generative AI to the risks of ransomware to navigating new SEC rulings, get ahead for 2024 with your free copy. Download the report at securityweekly.com/yearinreview2023
Guest
Idit Levine is the founder and CEO of Solo.io. She founded Solo.io with the idea to create tools that help organizations meaningfully adopt cloud-native technologies alongside their existing IT investments. Idit has a long history in cloud, infrastructure and open source in both startup and large enterprise companies. Prior to Solo.io she was CTO of the EMC Cloud Management Division, a member of the global CTO office, and held technical leadership roles at Dynamic Ops, VMware, CloudSwitch, and Verizon.
Hosts
2. Nagios and Abandoned Projects, Hacking Trains (to Fix Them), OAuth Threats, 5Ghoul – ASW #267
Nagios gets a review from NCC Group, hackers hack some anti-fixing code to fix trains in Poland, abusing OAuth post-compromise, 5Ghoul flaws in 5G networks, MITRE teases a new threat model for embedded systems, a conversation on vuln scoring systems, and more!
Hosts
- 1. Technical Advisory – Multiple Vulnerabilities in Nagios XI | NCC Group Research Blog
I don't dismiss programming languages out of hand (except for Perl), but I do make distinctions between design patterns in legacy code and how a language encourages modern design principles.
I also hadn't heard about Nagios in a while, so this article caught my attention for a few reasons. Probably the biggest one was seeing NCC Group share an example username that leads to command execution:
research name: "{{ lookup("pipe", "tar -czf - $HOME/.ssh/ 2>/dev/null | base64 -w0 ") }}"
. A vuln like that looks straight out of the early 2000s. Codebases should evolve over time in ways that make such ancient exploit techniques go extinct.And, reminiscent of an article we covered last week that included a reference to the abandoned TinyXML project, here's another choice quote from NCC Group's report about the web shell used in Nagios, which is, “...a large and complex application written in ... C [that] …has not been updated in 4 years, and a release has not been made since 2016.”
Sigh...
- 2. Polish Hackers Repaired Trains the Manufacturer Artificially Bricked. Now The Train Company Is Threatening Them
DRM, right to repair, and copyright all in one. This is the kind of appsec I love to read about in terms of hackers fighting for the owners of hardware -- it just so happens to be rather large hardware.
This also means we've finally covered planes, trains, and automobiles this year.
- 3. Threat actors misuse OAuth applications to automate financially driven attacks | Microsoft Security Blog
There's a mix of abuses here, many of which could disappear (or at least be significantly reduced) by strong MFA. (I'd love to see passkey adoption as well!)
We've talked a lot about OAuth this year. I wanted to highlight this article to reinforce that goal of adoption OAuth plus MFA, while also keeping in mind how the attack surface and threat model shifts slightly when doing so. With OAuth it's important to be able to invalidate sessions, audit connected apps, and determine when it's appropriate to just change a password vs. change a password and reset OAuth connections.
The end of the article gets into more marketing, but at least the mitigations note that most of the recommended controls are available to all users. Some of the features require paid subscriptions. I don't know specifics of which ones, but it makes me hope we aren't see the rise of a different sort of sso.tax.
- 4. ASSET Research Group: 5Ghoul
I love anything that's security plus protocols. It's a longer read and cool tech, so listen to the episode to find out how much I was able to read and explain between writing this blurb and the time we record.
- 5. Finding unreachable functions with deadcode – The Go Programming Language
I'd love to see appsec as an explicit discipline disappear, to be replaced by secure designs in frameworks, secure defaults for new installations, and development tools that provide security feedback.
Deleting code is one of the best secure coding techniques -- it reduces attack surface, it can reduce complexity in an elegant refactor, it can avoid legacy vulns in areas developers are less familiar with.
But it can also be hard to have certainty that a code path is in fact unreachable, so see first-class support for such analysis is encouraging.
- 6. New Initiative Seeks to Bring Collaboration to AI Security | Decipher
We just did a "six months later" segment in episode 265 and now I have a new article to check back in on six months from now.
We'll track what the Cloud Security Alliance is doing on the AI security front and how it might influence orgs building or integrating it.
- 7. MITRE, Red Balloon Security, and Narf Announce EMB3D – A Threat Model for Critical Infrastructure Embedded Devices
This is the second article this week that will have to go into another "six months later" category. MITRE won't have a draft until early 2024. They're also getting a little too cute with the constant l33tspeak project names, but our podcast is literally just "Application Security Weekly" so we don't have much of a leg to stand on.
- 8. Vulnerability Impact Scoring System version 1.0.0
Do we need another scoring system? How much granularity do we need for severity or impact? What's wrong with current scoring systems that this is trying to accomplish? Under what circumstances or use cases are scoring systems even useful?
I have questions. Let's see how many answers we come up with on this episode.
- 9. CFP: BSidesSF 2024 Call For Participation
BSidesSF is the local BSides event for me. Their CFP deadline is coming soon -- January 8th.
Check out securitybsides.com to find your local BSides chapter.
- 1. Software behind crypto hardware wallet hit by supply chain attack
Some miscreants managed to phish a former (?) employee of Ledger, maker of USB hardware crypto wallets. Once they had access, they then managed to upload a modified version of their npm library, which when used would "drain" an end user's wallet.
- 2. XSS and RCS in pfsense
pfsense, an open source firewall powering several popular commercial firewalls, was discovered to have some XSS and a command injection flaw in it's PHP code by Sonar.
From the post...it doesn't sound like much was done besides pointing Sonar's static scanner at the source, so I'm curious why this wasn't found sooner...
- 3. [TOOL] Cling 1.0 released
Not so much security-focused, but Cling is a interactive interpreter for C++. There has to be some use for this thing...