User: Password:
|
|
Subscribe / Log in / New account

Security

Session cookies for web applications

By Jake Edge
May 21, 2008

Two weeks ago on this page, we reported on some Wordpress vulnerabilities that were caused by incorrectly generating authentication cookies. The article was a bit light on details about such cookies, so this follow-up hopes to remedy that. In addition, Steven Murdoch, who discovered both of the holes, recently presented a paper on a new cookie technique that provides some additional safeguards over other schemes.

HTTP is a stateless protocol which means that any application that wishes to track multiple requests as a single session must provide its own way to link those requests. This is typically done through cookies, which are opaque blobs of data that are stored by browsers. Cookies are sent to the browser as part of an HTTP response, usually after some kind of authentication is successful. The browser associates the cookie with the URL of the site so that it can send the cookie value back to the server on each subsequent request.

Servers can then use the value as a key into some kind of persistent storage so that all requests that contain that cookie value are treated as belonging to a particular session. In particular, it represents that the user associated with that session has correctly authenticated. The cookie lasts until it expires or is deleted by the user. When that happens, the user must re-authenticate to get a new cookie which also starts a new session. Users find this annoying if it happens too frequently, so expirations are often quite long.

If the user explicitly logs out of the application, any server-side resources that are being used to store state information can be freed, but that is often not the case. Users will generally just close their browser (or tab) while still being logged in. It is also convenient for users to be allowed multiple concurrent sessions, generally from multiple computers, which will cause the number of sessions stored to be larger, perhaps much larger, than the number of users.

Applications could restrict the number of sessions allowed by a user, or ratchet the expiration value way down, but they typically do not for user convenience. This allows for a potential denial of service when an attacker creates so many sessions that the server runs out of persistent storage. For this reason, stateless session cookies [PDF] were created.

Stateless session cookies store all of the state information in the cookie itself, so that the server need not keep anything in the database, filesystem, or memory. The data in the cookie must be encoded in such a way that they cannot be forged, otherwise attackers could create cookies that allow them access they should not have. This is essentially where Wordpress went wrong. By not implementing stateless session cookies correctly, a valid cookie for one user could be modified into a valid cookie for a different user.

A stateless session cookie has the state data and expiration "in the clear" followed by a secure hash (SHA-256 for example) of those same values along with a key known only by the server. When the server receives the cookie value, it can calculate the hash and if it matches, proceed to use the state information. Because the secret is not known, an attacker cannot create their own cookies with values of their choosing.

The other side of that coin is that an attacker can create spoofed cookies if they know the secret. Murdoch wanted to extend the concept such that even getting access to the secret, through a SQL injection or other web application flaw, would not feasibly allow an attacker to create a spoofed cookie. The result is hardened stateless session cookies [PDF].

The basic idea behind the scheme is to add an additional field to stateless session cookies that corresponds to an authenticator generated when an account is first set up. This authenticator is generated from the password at account creation by iteratively calculating the cryptographic hash of the password and a long salt value.

Salt is a random string—usually just a few characters long—that is added to a password before it gets hashed, then stored with the password in the clear. It is used to eliminate the use of rainbow tables to crack passwords. Hardened stateless session cookies use a 128-bit salt value, then repeatedly calculate HASH(prev|salt), where prev is the password the first time through and the hash value from the previous calculation on each subsequent iteration.

The number of iterations is large, 256 for example, but not a secret. Once that value is calculated, it is hashed one last time, without the salt, and then stored in the user table as the authenticator. When the cookie value is created after a successful authentication, only the output of the iterative hash itself is placed in the cookie, not the authenticator that is stored in the database. Cookie verification then must do the standard stateless session cookie hash verification, to ensure that the values have not been manipulated, then hash the value in the cookie to verify against authenticator in the database.

If it sounds complicated, it is; the performance of doing 256 hashes is also an issue, but it does protect against the secret key being lost. Because an attacker cannot calculate a valid authenticator value to put in the cookie (doing so would require breaking SHA-256), they cannot create their own spoofed cookies.

While it is not clear that the overhead of all of these hash calculations is warranted, it is an interesting extension to the stateless session cookie scheme. In his paper, Murdoch mentions some variations that could be used to further increase the security of the technique.

Comments (3 posted)

Brief items

Impact of the Debian OpenSSL vulnerability

CentOS looks at the impact of the Debian SSL vulnerability for CentOS users. "This vulnerability can affect CentOS machines through the use of keys that were generated with the OpenSSL package from Debian. For instance, if a user uses OpenSSH public key authentication to log on to a CentOS server, and this user generated the key pair with a vulnerable OpenSSL library, the server is at heavy risk because the key can be reproduced easily."

Full Story (comments: 26)

PayPal XSS Vulnerability Undermines EV SSL Security (Netcraft)

Netcraft is reporting a cross-site scripting (XSS) vulnerability at PayPal. Because PayPal uses the Extended Validation SSL certificate, the abuse potential is somewhat higher as we described in an article in March. "Harry Sintonen discovered the vulnerability and announced it to other web application security specialists in an Internet Relay Chat (IRC) channel today. Sintonen told Netcraft that the issue was critical, adding that, 'you could easily steal credentials,' and, 'PayPal says you can trust the URL if it begins with https://www.paypal.com,' which is not true in this case."

Comments (6 posted)

New vulnerabilities

Django: cross-site scripting

Package(s):Django CVE #(s):CVE-2008-2302
Created:May 21, 2008 Updated:May 21, 2008
Description: The Django administration application suffers from a cross-site scripting and JavaScript-injection vulnerability.
Alerts:
Fedora FEDORA-2008-4267 Django 2008-05-21
Fedora FEDORA-2008-4248 Django 2008-05-21
Fedora FEDORA-2008-4191 Django 2008-05-21

Comments (none posted)

gnutls: several vulnerabilities

Package(s):gnutls CVE #(s):CVE-2008-1948 CVE-2008-1949 CVE-2008-1950
Created:May 20, 2008 Updated:September 17, 2008
Description: From the Red Hat advisory: Flaws were found in the way GnuTLS handles malicious client connections. A malicious remote client could send a specially crafted request to a service using GnuTLS that could cause the service to crash.
Alerts:
SuSE SUSE-SA:2008:046 gnutls 2008-09-17
Slackware SSA:2008-180-01 gnutls 2008-06-30
Mandriva MDVSA-2008:106 gnutls 2007-05-23
rPath rPSA-2008-0174-1 gnutls 2008-05-22
Gentoo 200805-20 gnutls 2008-05-21
CentOS CESA-2008:0492 gnutls 2008-05-22
Ubuntu USN-613-1 gnutls12, gnutls13 2008-05-21
CentOS CESA-2008:0489 gnutls 2008-05-21
Fedora FEDORA-2008-4259 gnutls 2008-05-21
Fedora FEDORA-2008-4183 gnutls 2008-05-21
Fedora FEDORA-2008-4274 gnutls 2008-05-21
Debian DSA-1581-1 gnutls13 2008-05-20
Red Hat RHSA-2008:0492-01 gnutls 2008-05-20
Red Hat RHSA-2008:0489-01 gnutls 2008-05-20

Comments (none posted)

kernel: multiple vulnerabilities

Package(s):kernel CVE #(s):CVE-2008-2136 CVE-2008-2148
Created:May 15, 2008 Updated:January 8, 2009
Description: The kernel has several denial of service vulnerabilities. From the secunia report:

1) An error exists in the implementation of the "sys_utimensat()" system call. This can be exploited to update the access or modification time of arbitrary files via specially crafted arguments passed to the affected system call.

2) A memory leak exists in the "ipip6_rcv()" function included in the IPv6 over IPv4 (SIP) tunneling driver. This can be exploited to potentially exhaust all available memory via specially crafted network packets.

Alerts:
Red Hat RHSA-2008:0787-01 kernel 2009-01-05
CentOS CESA-2008:0973 kernel 2008-12-17
Red Hat RHSA-2008:0973-03 kernel 2008-12-16
Red Hat RHSA-2009:0001-01 kernel 2009-01-08
Red Hat RHSA-2008:0585-01 kernel 2008-08-26
Mandriva MDVSA-2008:167 kernel 2008-08-12
CentOS CESA-2008:0612 kernel 2008-08-06
Mandriva MDVSA-2008:174 kernel 2008-08-19
Red Hat RHSA-2008:0612-01 kernel 2008-08-04
Red Hat RHSA-2008:0607-01 kernel 2008-07-23
SuSE SUSE-SA:2008:032 kernel 2008-07-07
CentOS CESA-2008:0607 kernel 2008-07-24
Ubuntu USN-625-1 linux 2008-07-15
SuSE SUSE-SA:2008:030 kernel 2008-06-20
Debian DSA-1588-2 linux-2.6 2008-05-30
Debian DSA-1588-1 linux-2.6 2008-05-27
rPath rPSA-2008-0169-1 kernel 2008-05-14

Comments (none posted)

kernel: denial of service

Package(s):kernel CVE #(s):CVE-2007-6282 CVE-2007-6712
Created:May 20, 2008 Updated:August 27, 2008
Description: From the Red Hat advisory: The possibility of a kernel crash was found in the Linux kernel IPsec protocol implementation, due to improper handling of fragmented ESP packets. When an attacker controlling an intermediate router fragmented these packets into very small pieces, it would cause a kernel crash on the receiving node during packet reassembly. (CVE-2007-6282) Also, on 64-bit architectures, the possibility of a timer-expiration value overflow was found in the Linux kernel high-resolution timers functionality, hrtimer. This could allow a local unprivileged user to setup a large interval value, forcing the timer expiry value to become negative, causing a denial of service (kernel hang). (CVE-2007-6712)
Alerts:
Red Hat RHSA-2008:0585-01 kernel 2008-08-26
Debian DSA-1630-1 linux-2.6 2008-08-21
Ubuntu USN-625-1 linux 2008-07-15
SuSE SUSE-SA:2008:032 kernel 2008-07-07
SuSE SUSE-SA:2008:031 kernel 2008-07-02
SuSE SUSE-SA:2008:030 kernel 2008-06-20
Debian DSA-1588-2 linux-2.6 2008-05-30
Debian DSA-1588-1 linux-2.6 2008-05-27
CentOS CESA-2008:0275 kernel 2008-05-21
Red Hat RHSA-2008:0275-01 kernel 2008-05-20

Comments (none posted)

libxslt: code execution

Package(s):libxslt CVE #(s):CVE-2008-1767
Created:May 21, 2008 Updated:August 1, 2008
Description: From the Red Hat advisory: Anthony de Almeida Lopes reported the libxslt library did not properly process long "transformation match" conditions in the XSL stylesheet files. An attacker could create a malicious XSL file that would cause a crash, or, possibly, execute and arbitrary code with the privileges of the application using libxslt library to perform XSL transformations.
Alerts:
Ubuntu USN-633-1 libxslt 2008-08-01
Mandriva MDVSA-2008:151 libxslt 2007-07-21
Slackware SSA:2008-210-03 libxslt 2008-07-29
SuSE SUSE-SR:2008:013 thunderbird, xulrunner, tkimg, cups, qemu, gstreamer010-plugins-good, pan, libxslt 2008-06-13
Gentoo 200806-02 libxslt 2008-06-03
CentOS CESA-2008:0287 libxslt 2008-05-21
Red Hat RHSA-2008:0287-01 libxslt 2008-05-21

Comments (none posted)

peercast: buffer overflow

Package(s):peercast CVE #(s):CVE-2008-2040
Created:May 21, 2008 Updated:July 22, 2008
Description: The peercast streaming server suffers from a buffer overflow which can be exploited by a remote attacker.
Alerts:
Gentoo 200807-11 peercast 2008-07-21
Debian DSA-1583-1 gnome-peercast 2008-05-20
Debian DSA-1582-1 peercast 2008-05-20

Comments (none posted)

phpGedView: privilege escalation

Package(s):phpgedview CVE #(s):CVE-2008-2064
Created:May 20, 2008 Updated:May 21, 2008
Description: From the Debian advisory: It was discovered that phpGedView, an application to provide online access to genealogical data, allowed remote attackers to gain administrator privileges due to a programming error.
Alerts:
Debian DSA-1580-1 phpgedview 2008-05-20

Comments (none posted)

setroubleshoot: symlink and HTML injection vulnerabilities

Package(s):setroubleshoot CVE #(s):CVE-2007-5495 CVE-2007-5496
Created:May 21, 2008 Updated:May 21, 2008
Description: The setroubleshoot utility, used by system administrators to diagnose SELinux-related problems, suffers from symbolic link (file overwrite) and HTML injection vulnerabilities.
Alerts:
Red Hat RHSA-2008:0061-02 setroubleshoot 2008-05-21

Comments (none posted)

vsftpd: denial of service

Package(s):vsftpd CVE #(s):CVE-2007-5962
Created:May 21, 2008 Updated:June 6, 2008
Description: The vsftpd daemon suffers from a memory leak, leading to a denial of service vulnerability.
Alerts:
rPath rPSA-2008-0185-1 vsftpd 2008-06-05
Fedora FEDORA-2008-4373 vsftpd 2008-05-22
Fedora FEDORA-2008-4362 vsftpd 2008-05-22
Fedora FEDORA-2008-4347 vsftpd 2008-05-22
Red Hat RHSA-2008:0295-01 vsftpd 2008-05-21

Comments (none posted)

Page editor: Jake Edge
Next page: Kernel development>>


Copyright © 2008, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds