Category Archives: Security

PCI Scope Errors

One of my favorite cartoons of all time is from Calvin and Hobbes. Calvin rolls balls to make a snowman. Hobbes stands nearby. Calvin says “I’ve finally figured out the quickest path to success”. Hobbes asks “oh, what is that”. Calvin rolls one ball, then two and stacks the second on top of the first…then he stands back “lower your expectations! I think we’re done here”. Or something like that.

The cartoon comes to mind when I read a new PCI scoping article.

I personally prefer Spider from Cornell as I think it finds the fewest false positives of the three free utilities. However, none of these utilities can scan a database and find cardholder data stored in a database. And just so we are clear, all of these utilities are no absolute guarantee that an organization has truly found all cardholder data they may have stored on systems. But, it is better than have done nothing.

Hi, I’m a QSA and I disagree. Heard that before?

Anyone who tries to use Spider on large data systems knows that it takes forever, often crashes and produces clumsy and unverified (no Luhn algorithm check) output. It definitely is not suited for enterprise work and generates a lot of false positives. But other tools exist, as mentioned in the article, so the limitations of Spider are not my biggest concern. Regulated entities are free to choose whatever tool they prefer that can get the job done. They can even go roll their own and play with regex like this add in to Nessus or this validation sequence:

(5[1-5]\ d{ 14} )|(4\ d{ 12} (\ d{ 3} )?)|(3[47]\ d{ 13} )|(6011\ d{ 14} )|((30[0-5]|36\ d|38\ d)\ d{ 11} )

The biggest concern is that the article implies that a sufficient measure of effort is to have done more than nothing. That is very dangerous advice. Imagine if the requirement said “do more than nothing”. How easy would that be to achieve compliance?

A higher standard is obviously required by the Security Standards Council (SSC). Regardless of whether a tool is in use or not a regulated entity has to perform an exhaustive search. This means review of architecture, business processes, policies as well as systems, applications, logs and databases. A tool might find a system clean today, for example, but it won’t tell you that tomorrow is the end of month batch process that dumps track data on the system you just scanned. Scoping is about more than just what is present now, it also is about process and procedure.

Here’s another interesting part of the article:

At this year’s PCI Community Meeting, the question of MPLS networks being private was brought up and discussed. What the PCI SSC and the card brands told QSAs is that it is up to the QSAs to confirm that the networks are in fact private. That means that QSAs are going to have to examine the configuration of the endpoint routers to ensure that the MPLS network is in fact private.

I can tell you that this will put QSAs in a battle with a number of carriers who treat their MPLS networks and their configuration as intellectual property. I can tell you from personal experience that these battles to get carriers to reveal their configurations can become very contentious and downright ugly.

Ah, yes, I have faced MPLS providers since 1998, the days of assessing the security of Electronic Data Interchange (EDI). I’m obviously dating myself but I still have a CD with the details of flaws found. Providers were a real pain to work with back in those days. There was no prescriptive regulation like PCI DSS so it was literally you versus them, no standards council or regulatory authority to back you up. You want to talk about ugly? I remember when we audited up hill both ways, in the snow, without tools….

The MPLS debate was more than ten years old already when I sat through QSA certification exams in 2006 but by that time it was different. If I remember correctly the counter-argument from telecom giants was that they did not want to disagree with the regulators. They just wanted to say that if someone started saying MPLS had to be assessed everywhere then the whole Internet would come crashing down on everyone’s head from the weight of the cost of auditors sticking their smelly noses into every endpoint and link. Thus we were left with the watered-down approach — MPLS could be trusted but probably should be verified. Not what we were hoping for but compliance can obviously be a very political process and even a small step in the right direction is better than nothing. Heh.

But seriously, MPLS arguments today seem downright civil because providers have to answer to a very real threat that is in the news practically every day and breach laws force disclosure; we can draw from stuff like CVE-2011-3274 and TA05-026A:

The IOS implementation of Multi Protocol Label Switching (MPLS) contains a vulnerability that allows malformed MPLS packets to cause an affected device to reload

The fact is no technology is perfect, not even the biggest and most common virtual private networks. All are marred by simple and common errors like bugs, misconfiguration, weak endpoints and potential taps. More to the (end)point, technology falls into scope when it is relevant to the security of the cardholder data. The official line is to put something in scope that processes, stores or transmits but I find it even more helpful to walk regulated entities through a simple and honest attack tree and a risk assessment. Anything an attacker can breach in order to gain unauthorized access to cardholder data environment will be in scope.

Updated to add tool references:

Free

Commercial

Flow: Chapter 78, Tao Te Ching

Here is my attempt to translate of one of the teachings of Laozi, from Chapter 78 of the Tao Te Ching:

天下莫 (Nothing in this world) 柔弱 (is as gentle and weak) 于水 (as water).
而 (But to) 攻坚 (defeat) 强者 (the strong)
莫 (nothing) 之能胜 (can succeed)
以其无 (if it does not) 以易之 (change).
弱之 (The weak) 胜 (overcome) 强 (strong),
柔 (as gentle) 之 (can) 胜 (overcome) 刚 (hard).

Still working on the last lines, which seem to say the above is an impractical and confusing paradox. Can’t figure out yet if they are meant to be sarcastic in tone.

天下莫不知莫能行
是以圣人云,
受国之垢是谓社稷主
受国不祥是为天下王
正言若反

Deep Thoughts on Convergence

A security expert asked me last night what I thought of Moxie Marlinspike’s Convergence, which aims to remove the need to rely on a Certificate Authority. It uses the phrase “choose who you trust”, for example, in its marketing.

I admit I was a bit facetious in my retort but I had to ask “why should I trust Moxie, is he claiming to be some kind of authority?” Get it?

Indeed, I recommend to everyone that they wait until their peers adopt it because they should choose who to trust with caution. I certainly wouldn’t trust an authority on not trusting authority, would I?

I also noted this phrase in their marketing.

The ability to easily choose who you trust, & revise that decision at any time.

…because trust is all about being able to quickly reverse your decisions about trust. Trust me on this one. No don’t. Yes, trust me. No don’t…

Crouching Pterodactyl, Mandiant Dragon

Mandiant has an entertaining and on-going series of presentations called “State of the Hack”. In the latest episode they offered a series of slides on the threat of intellectual property and brand theft, naturally starting with the U.S. Air Force.

Corporate espionage is a serious problem globally. The Mandiant program is far more focused, however. They ignore all theft perpetrated by everyone other than China from America. I won’t try to guess why they fixate, but I also can’t help but point out that in their zeal to demonstrate the connection they mistakenly label the following image as a “China Dragon”:

Kudos to them for putting a link to the original source in their slide. I always try to do that myself and really appreciate seeing attribution. So I went to the link in their slide and right away noticed, prominently displayed at the top of the photo, the following phrase:

This is what the pterodactyl looks like

Oops. That’s no Dragon.

I guess they also don’t want you to know the photo is by Sharon.

Then I did the side-by-side comparison that they recommended, with images of the Predator B, and I noticed many clear differences.

Also not a Dragon

Maybe I see differences instead of similarities because I’m too far into the trees/details of things and missing the big-picture forest from Mandiant’s view.

I suspect if you pull back far enough not only does the word “pterodactyl” look a lot like “dragon” but eventually everything looks like it comes from China. Bada bing. I’ll be here all week.

The presentation as a whole is still worth a watch. A celebrity defense argument that comes later that is far more interesting to me. Or maybe I can digest it more easily because it doesn’t go into claims of the motives of the attacker. I find that I agree with their assessment of defensive measures, not least of all because I presented on this issue at the RSA SF Conference in 2010 and earlier at CSAS — social networking exposure parallels the lessons from celebrity exposure.

So I can guess that on most security theory I would likely agree with the presenters. But when they head down their path of focused attribution it leaves me cold, which only makes an obvious error even more difficult to ignore.