Skip to content
Snippets Groups Projects

Compare revisions

Changes are shown as if the source revision was being merged into the target revision. Learn more about comparing revisions.

Source

Select target project
No results found
Select Git revision

Target

Select target project
  • nimrod/blog
1 result
Select Git revision
Show changes
Commits on Source (2)
---
repos:
- repo: https://github.com/pre-commit/pre-commit-hooks
rev: v4.2.0
rev: v5.0.0
hooks:
- id: check-executables-have-shebangs
- id: check-merge-conflict
......@@ -10,25 +10,25 @@ repos:
- id: trailing-whitespace
- repo: https://github.com/Yelp/detect-secrets
rev: v1.2.0
rev: v1.5.0
hooks:
- id: detect-secrets
exclude: Pipfile\.lock|\.rst$
- repo: https://github.com/adrienverge/yamllint
rev: v1.26.3
rev: v1.35.1
hooks:
- id: yamllint
- repo: https://github.com/amperser/proselint/
rev: 0.10.2
rev: 0.14.0
hooks:
- id: proselint
types: [plain-text]
exclude: LICENSE
- repo: https://github.com/ambv/black
rev: 22.3.0
rev: 24.10.0
hooks:
- id: black
args:
......@@ -42,12 +42,12 @@ repos:
args: [--allow-raw]
- repo: https://github.com/myint/rstcheck.git
rev: v6.1.1
rev: v6.2.4
hooks:
- id: rstcheck
- repo: https://github.com/PyCQA/prospector
rev: v1.9.0
rev: v1.13.3
hooks:
- id: prospector
args:
......@@ -74,7 +74,7 @@ repos:
- pyroma
- repo: https://github.com/pycqa/flake8.git
rev: 3.9.2
rev: 7.1.1
hooks:
- id: flake8
args:
......@@ -84,11 +84,11 @@ repos:
- flake8-bugbear
- repo: https://github.com/executablebooks/mdformat.git
rev: 0.7.14
rev: 0.7.19
hooks:
- id: mdformat
- repo: https://github.com/codespell-project/codespell.git
rev: v2.1.0
rev: v2.3.0
hooks:
- id: codespell
My experience with security researchers
=======================================
:date: 2024-11-29
:summary: My experience with security researchers.
I've been sitting on this blog post for a long while. I have a history of
working with (so called) security researchers that I would describe as poor. I
don't want to besmirch the profession of security research. I enjoy reading
security research write ups, I follow a lot of the security best practices, I
subscribe to the security mailing lists of the OSes I use and overall have high
regard for the professionals in the field.
On the other hand, over my career I have many different interactions with
security companies and researchers working in those companies that have all
been bad. I worked at a cyber security company along side security researchers
from the IDF's 8200 unit. I received notices on security vulnerabilities on
sites I or the companies I work at run (especially after publishing a
``security.txt`` policy). But best of all is my experience with the Israeli
National Cyber Directorate. Let me get started.
Security audits and certifications
----------------------------------
A few of the companies I worked at went through security audits to get a
certification (SOC2 or HIPAA). As the person responsible for the
infrastructure and our CI/CD pipelines I was a part of the audit from beginning
to end and when the audit report was delivered, I addressed some of the
findings. From the few audits I took part in, I can say that the worst was a
company that ran a few automated scanners in the vein of `SSL Test
<https://www.ssllabs.com/ssltest/>`_ and the better ones ran something akin to
`Semgrep <https://github.com/semgrep/semgrep>`_ and maybe checking the OWASP
top 10.
All of the audits I've been part of had not produced any worthwhile results.
No actual vulnerabilities were ever found and most the time a few publicly
available security scanners were used (the screenshot from the SSL Test is
still vivid in my mind).
Working with security researchers
---------------------------------
I worked at a cyber security company with an actual cyber security product.
There we had a security research team with people from the IDF 8200 unit. From
my dealings with them, they have poor knowledge of things you would expect (on
the level of not knowing the difference between symmetrics and asymmetric
encryption) and their research can boiled down to running Nmap and Metasploit.
When one of them learned that I run my own mail server, he claimed to be able
to break in to my server. I said go for it, hoping to learn something new and
fix whatever vulnerability my server may have. Looking over his shoulder, I saw
that he was running Metasploit with a preset for mail servers. Having found
nothing (not because I'm that good, I just install security updates and have
sane settings) he turned quiet.
The Israeli National Cyber Directorate
--------------------------------------
I saved the best for last, the reason I felt the urge to write this post. Over
the last 3 or 4 years I was contacted 3 times by the INCD to let me know of
vulnerabilities they found in my personal sites and services.
The first time I was contacted by phone. I was a little surprised and took the
matter seriously. I was told that my mail server had an RCE. Asking for
details, I was told the CVE and the person on the other end explained to me
that I need to update my mail server. I quickly checked the CVE and I found
that Debian had backported the patch but the server version stayed the same (or
maybe some suffix was added, I don't remember). I tried to explain that I had a
patched server but it fell on deaf ears and they were adamant that the version
I was using vulnerable and I had to update ASAP. I thanked them for letting me
know and promised to look in to it.
The second time I was again contacted by phone. This time I was less surprised.
I was told that my GitLab instance was misconfigured, although it required
logging in, repositories were exposed through the `/explore
<https://git.shore.co.il/explore>`_ URL. I explained that it was deliberate,
that I develop opensource software and that is were I store it and make it
available for others (if you take a look, all of the repositories have an
opensource license and my blog even links to them). Again, it didn't convince
the person on the other side. I thanked them for letting me know and promised
to look in to it.
The third time I was again contacted by phone. This time I was not a bit
surprised. I was told that my SSH server is vulnerable and I have to update it.
I explained that I am running OpenSSH on an OpenBSD machine and that the
vulnerability in question only happens on Linux machines. The person on the
other end didn't know what OpenBSD is (I tried explaining that the developers
of OpenBSD also develop OpenSSH, they didn't seem to get it). Showing my age, I
complained that this is a waste of the taxes I pay. The person on the other end
didn't appreciate it and ended the call.
Closing thoughts
----------------
When I was growing up and the internet was becoming accessible to everyone a
new phenomenon named script kiddies started. People scanning ports, open
Windows shares and guessing SSH usernames and passwords. Then somebody got the
bright idea of making a career out of it by selling people some scary stories
and exaggerating their own capabilities and calling it security research. While
true that there are unpatched and vulnerable machines on the internet, this is
not security research and because I have sensible security practices I only
encountered false positives due to rudimentary scanners flagging my servers as
vulnerable without checking if they are indeed vulnerable.
I don't remember which company it was, but I remember one such company had an
realtime map of the internet showing realtime attacks. Looking closely, each
ping and each new connection to port 22 was an attack. The field is now filled
with charlatans that instead of trying to break in to your servers now try to
bill you for running Nmap or verifying your DMARC record. They've turned this
in a very successful industry and the Israeli government seems to have fallen
to this trap as well (as I'm pretty sure other goverments have as well).