Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
Networking Security

Dutch DigiNotar Servers Were Fully Hacked 83

Posted by Soulskill
from the they-don't-fool-around dept.
ChristW writes "The final report that was handed to the Dutch government today indicates that all 8 certificate servers of the Dutch company DigiNotar were fully hacked. (Report PDF in English.) Because the access log files were stored on the same servers, they cannot be used to find any evidence for or against intrusion. In fact, blatant falsification has been found in those log files. A series of so-far unused certificates has also been found. It is unknown if and where these certificates have been used."
This discussion has been archived. No new comments can be posted.

Dutch DigiNotar Servers Were Fully Hacked

Comments Filter:
  • by Beardydog (716221) on Wednesday October 31, 2012 @03:44PM (#41834887)
    Color me impressed. Log_Modifier may not fill many gigaquads, but it sure ain't free.
    • Re:Falsified Logs! (Score:4, Interesting)

      by rwa2 (4391) * on Wednesday October 31, 2012 @04:51PM (#41835755) Homepage Journal

      In other news, it sounds like someone is going to be setting up an authlog blackhole in the near future...

      Did they check their .bash_history ? The silly script kiddie that got into my RH4 box back in the 90s forgot to clean his traces there. I mean, he bothered to run "history -c " , but it didn't actually stop his session from dumping everything there again after he logged out.

  • Were the Hex strings loaded with DEADBEEF or B00B135 or something?
    • by mfh (56)

      Binary art of someone being blatant, methinks...

  • by Anonymous Coward on Wednesday October 31, 2012 @03:46PM (#41834915)

    This hack never happened.

    - Signed: DigiNotar

  • by ntropia (939502)
    You know, for a server being violated is always a matter of probability, same story about hardware failures ("when", not "if"). Some of the variables in this equation is how "interesting" your server could. And a server releasing certificates is quite "interesting", if you ask me. So if you keep the logs of such an important server on the machine itself, there isn't much to say: the administrators of such a server are incompetent.
    • by fluor2 (242824)

      it's not fair to blame the administrators. you should blame the people who hired them.

      • by rahvin112 (446269)

        Yes, because those people are likely the ones that said "We are not buying another machine for log data" or said "we can't afford segregated network segments and secure communication to protect the signing servers". In my experience you can usually trace failures like this back to an unwilligness to spend money, not necessarily blatant incompetence.

        It's just as likely that the management prevented proper security as it is that the IT staff were morons.

        • by plover (150551)

          I think there's plenty of blame to go around on this one. From the top to the bottom, these guys were thoroughly incompetent. A good admin stepping into the job would have pressed for effective security policies, and balked if they weren't implemented. A competent CISO would have started with them. A competent CEO / CIO should have known they needed a CISO, being a security company after all.

      • No, blame the person writing the specs and requirements. Because the admin can't do JACK if his CISO is a dick.

        Blunders like this ain't an admin's fault. This isn't some config switch set improperly or a port in the firewall left unguarded. It's a fault in the security paradigm and the security strategy of the company. This is NOT an administrator's fault. In companies of a certain size (and I guess DigiNotar would be one) the average admin doesn't even have the information to make a decision like that. A w

        • by dkf (304284)

          Blunders like this ain't an admin's fault.

          Wrong. They are the admin's fault, along with the fault of others as well. Blame can be spread, but not absolved. The admin should not have let things get into a state where things could get hacked, whatever his line management said. What's worse, if things were in a management state where the admin had decided to do a private passive-aggressive work-to-rule (I've known a few admins like that; technically competent, but total dicks) then they're absolutely making things worse and are thoroughly to blame.

          Min

          • The question is whether an admin can actually make that decision. Considering how sensitive the whole subject is and how management usually thinks techs don't know about "responsibility", chances are that he could not. The admin could have been well aware that there is a problem, and if he is smart he wrote a mail (and printed it for his own records) to his superior, but it is very unlikely that he could make a decision like that without a blessing from above. What's worse, there most likely even existed an

  • Bloody n00bs... (Score:4, Insightful)

    by fuzzyfuzzyfungus (1223518) on Wednesday October 31, 2012 @03:48PM (#41834947) Journal

    You would think that a company playing at something mildly important(like, oh being a CA for the Dutch government...) could, at very least, do basic things like store logs on WORM tape... Yes, those are overpriced compared to the normal ones; but they aren't that expensive.

    • Re: (Score:3, Insightful)

      by Anonymous Coward

      WORMs cost money... so does all security... I'm sure the contract was awarded to the lowest bidder.

      • Re:Bloody n00bs... (Score:4, Insightful)

        by Opportunist (166417) on Wednesday October 31, 2012 @09:52PM (#41838087)

        *sigh* Most likely, yeah.

        Security is the stepchild of IT. They don't produce. Ok, so does a lot of IT, but at least with the rest of IT, management can somehow hope that eventually they can fire a couple of people. With ITSEC, no such luck. They don't streamline production (worse, they often bog it down), they don't make people redundant, in fact, they make more people necessary. Plus, those pesky, nosey security geeks keep peeking into every computer and might find out that the boss is surfing on pages containing gay llama porn.

        It's sad but true, if you see two people sitting on a huge table in the crowded cafeteria and nobody wants to join them, and they're not talking with each other either, you know where security and controlling are.

        But unlike controlling, it's pretty hard to make your boss understand the dangers of a security breach in IT.

        • by DarkOx (621550)

          Man you just described the scene in our cafeteria most days. I happen to be one those guys at the table. What always amazes me is production just does not get it. I really am their best friend. They are always freak out that "our security stuff" might mess up their PLC and someone could get hurt.

          Its like the possibility that a worm could get on their unpatched XP SP1 platforms from one of the endless parade of technician laptops that get plugged into that subnet and someone could get hurt is ent

          • Our product managers found out that I'm on their side by now. What I learned is that you have to "sell" it to them, my angle was that I write part of their specs and also verify that they are being kept by the suppliers, thus taking work off their shoulders. Actually, what happens is that I write the sec requirements (which is my job anyway), then adapt them to their project (which is technically their job but that way at least I get what I want instead of them guessing what my specs are actually about and

      • by buglista (1967502)
        Another syslog server costs peanuts, just has to be a bunch of disk with only port 514/udp listening. Shit, I use to run an internal CA which was more secure than these guys, because it was air-gapped. I know that doesn't scale, but we weren't charging people for certs, just doing it for internal use.
    • by tlhIngan (30335)

      You would think that a company playing at something mildly important(like, oh being a CA for the Dutch government...) could, at very least, do basic things like store logs on WORM tape... Yes, those are overpriced compared to the normal ones; but they aren't that expensive.

      Welcome to business. The same rules apply everywhere - try to cut as many corners as you can so the company can boast about huge profits and the CEO can pay for this space tourist ticket.

      The only things that change are how far you can tak

    • by Ryanrule (1657199)

      You need to insert liability. IE, signing agency is FULLY liable for any losses incurred due to their security failure. This will make signing very expensive. That is ok.

      • Sadly, it won't increase security. The money will not be used to hire better people and tighten security, it will go into reserves for when (not if) they get to pay for their blunders.

        • by DarkOx (621550)
          <serious>No it won't got to reserves. It will go to insurance premiums and to one of the big audit firms annually to NOT find problems and generate a great deal of glossy print outs to make the insurance firm feel good. </serious>

          <half kidding>
          The insurance firm will then sell stocks and bonds to a large brokerage, who will aggregate them into a fund or other financial product with more insurance companies suggesting that all risk has been eliminated. The original insurance companies wi
  • by ilsaloving (1534307) on Wednesday October 31, 2012 @03:50PM (#41834961)

    As opposed to, what, partially hacked?

    Isn't that like being almost pregnant?

    • Re:FULLY hacked? (Score:5, Informative)

      by fuzzyfuzzyfungus (1223518) on Wednesday October 31, 2012 @03:55PM (#41835021) Journal

      It's always a dangerous assumption to make; but architecturally the concept of 'partially hacked' isn't terribly nonsensical. Consider the enormous number of web server setups where OS-level credentials and web application authentication are entirely different things. It happens all the time that kiddies will crack the web component and scribble all over your php forum or CMS or whatnot; but without ever gaining access to the OS.

      You really don't want to work on the assumption that 'eh, I'm sure we were only partially hacked, no need to reinstall the OS'; but it may well often be true.

      • Agreed. Had the attacker not been able to leverage the access he obtained on the web servers to compromise the SQL Server he may very well have been stopped in his tracks in the DMZ.
    • Re:FULLY hacked? (Score:5, Informative)

      by dutchwhizzman (817898) on Wednesday October 31, 2012 @04:18PM (#41835345)
      4 out of 8 CA servers were proven to be tampered with and the hacker got Admin and/or SYSTEM privileges. The only thing he didn't get away with were the actual private keys, since those were stored in hardware that did the actual signing. If Diginotar would have scheduled the signing to a specific time of day and removed the smartcards from the readers for those CAs, he wouldn't even have been able to get his rogue certificates signed. The other 4 servers weren't interesting for the hacker and my interpretation is that he mainly used the CA server that could sign "web site certificates" for MITM purposes. I'd say that qualifies as "fully hacked" as opposed to for instance a single web server where a single web service was not completely secure, so he could manipulate it into signing requests. He got through 3 layers of (obviously lacking) security before he got to the CA servers themselves. Layer 1 was web servers, layer 2 was the office network and layer 3 were the CA servers themselves. He used stacked tunnels to get through firewalls between network segments and used public webservers he already owned as file drop. Out of over 250 investigated machines, he got access on all significant ones in the certificate, web hosting and logging processes, but the actual hardware containing the private keys. In summary, I'd say fully hacked is an accurate description.
    • As opposed to, what, partially hacked?

      Well, yes, it's partial differential equations and quantum mechanics . . .

      Isn't that like being almost pregnant?

      It's just like Schrödingers cat was pregnant and not prenant at the same time.

      In Abstract Hilbert Space.

  • Just look at what their web servers have been running for years! What a joke!! http://uptime.netcraft.com/up/graph?site=www.diginotar.nl [netcraft.com]
    • by Anonymous Coward

      As opposed to the OS and web server running on the kernel.org servers that were compromised by trojans? I wish I wish I could remember their names...

  • The attacker's Pastebin posts can be found here: http://pastebin.com/u/ComodoHacker [pastebin.com] . The authenticity seems likely to me; in one post he links to a calculator.exe that you can download which is signed by a Diginotar certificate. When you inspect the file properties in Windows, it will indeed state that the file is certified.
  • by Anonymous Coward

    First, very good hack - if the story is true. I would not be surprised to find out in ca 10 years that they had the inside help.

    BUT, somebody is trying hard to attribute this to Irangov. They are the bad, evildoers and certainly - war must be brought to their land. This smells like a masterpiece in a huge PSYOP orchestration to inflame public opinion in the West.

    Google for "8200" and check who builds the CP firewalls.

    • by mvdwege (243851)

      Since the attackers came in through an open port, the firewalls are irrelevant. Now, will someone please moderate this antisemitic bullshit down to -infinity?

1 Billion dollars of budget deficit = 1 Gramm-Rudman

Working...