Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Authentication

9/17/2019
12:00 PM
Joe Stanganelli
Joe Stanganelli
Joe Stanganelli
50%
50%

Analytics Startup Claims to Turn Golden Tickets Brass

The threat of escalation attacks and forged administration levels has plagued Kerberos authentication systems for years. Data-analytics startup Qomplx claims to do the math that solves the problem.

A devastating five-year old vulnerability in basic authentication systems may finally have a solution -- but it's really hard.

Typically, encryption and other IT security solutions rely on the fundamental presumption that the very first step of user authentication works and can be fully trusted. Kerberos -- a ubiquitous, decades-old authentication mechanism -- represents the core of how identity authentication works throughout the majority of enterprises worldwide. As such, it represents the roots of a tree of trust.

It is imperfect, however.

"They're all premised on this not being a lie," Jason Crabtree, CEO of data-analytics startup Qomplx (pronounced "complex"), told Security Now. "It's actually a terrible assumption to make... It doesn't mean that a single one of the authentication events is real."

Researchers at Black Hat 2014 revealed what is known as a "Golden Ticket" attack -- an exploit related to privilege-escalation attacks by forging not only tickets but also creating a forged key distribution center. For IT administrators of Windows and Linux environments that rely upon Kerberos, it is the curse that keeps on cursing.

Not much has been done about this vulnerability over the past few years -- largely because not much can be done about it. Like, to some extent, SPECTRE and MELTDOWN, the problem of Kerberos authentication has become something of a pink elephant in an otherwise well-appointed drawing room. It is very clearly there, but is impolite to talk about.

For some, the threat has been overblown. Not long after the Black Hat 2014 revelations, Roger Grimes of CSO Online argued that by applying mega-strict authentication policies bordering on draconian, just about everything can be accomplished on an enterprise network with task delegation and time limits on higher-level accounts.

"You want to make it hard for attackers to get domain admin status? Don't have any," wrote Grimes. "The most secure companies in the world have zero permanent members of their highly elevated groups [and] alert when anyone tries to add accounts to those groups."

Not everyone agrees that this is a complete solution, however. While Crabtree affirms that limiting credentials and maintaining a well-configured network are best practices, he claims that Qomplx has demonstrated a proof of concept involving ticket forgeries in the absence of permanently installed high-level users; from there, attackers were able to issue themselves these high levels of authority -- and then compromise cloud-based accounts.

Otherwise sophisticated UEBA solutions, Crabtree further explains, are likewise insufficient to counter the threat of Kerberos-authentication forgeries.

"It's like buying a seatbelt that works below 10 miles per hour and not above," said Crabtree. "It only works against adversaries that are unskilled enough that they don't bother to do the first thing a skilled adversary does -- which is [to] attribute the traffic to the wrong identification; [this] violates your ability to pinpoint any of this traffic in a behavioral basis."

Consequently, Qomplx -- which has historically been an analytics firm working with big data nonspecific to cybersecurity -- has taken the approach of going beyond metadata analysis.

The state of Kerberos authentication
The exodus from other modes of authentication to Kerberos began in the 1990s, for it solved an important problem: How do you keep authentication secure yet still properly agile -- so that the user doesn't have to manually authenticate themselves dozens or hundreds of times in a business day on the enterprise network. Unlike other authentication tools, Kerberos is a stateless protocol -- allowing one domain controller to issue a credential that can then be presented to and accepted by other domain controllers, while making ticket forgeries more difficult for attackers.

Attackers have solved this problem, however. In turn, Qomplx purports to have solved that problem in a complex (some might say "artless") way: by collecting, keeping a ledger of, and validating "every single Kerberos transaction" -- comparing known lists of valid tickets against every new authentication requests.

Describing the process as "stupid hard," Crabtree explained that Qomplx temporarily infuses statefulness into the otherwise stateless Kerberos protocol throughout the IT network. This is because the "handshake" that occurs when Kerberos issues an authentication must be actually observed to be independently verified (a nigh impossible task when Kerberos is stateless).

From there, said Crabtree, the maintenance of an external state mutes the "noisiness" across large enterprise networks, allowing Qomplx to independently identify true signatures and ensure that authentication has been properly issued.

"It's really arcane and it's really low level," said Crabtree. "Except if you do it, you are able to detect the most devastating [attacks].

Crabtree reports that Qomplx's solution has been in production for over a year and a half now -- leading to a rebranding of the company. Originally named Fractal Industries, the company focused on its offering of a big-data analytics streaming platform. Under this new banner of Qomplx, the company secured Series A funding in July.

"We didn't [originally] want to build the Kerberos solution as a business," said Crabtree. "[But] if you can't secure authentication, you can't secure the enterprise."

Related posts:

—Joe Stanganelli is managing director at research and consulting firm Blackwood King LC. In addition to being an attorney and consultant, he has spent several years analyzing and writing about business and technology trends. Follow him on Twitter at @JoeStanganelli.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12777
PUBLISHED: 2020-08-10
A function in Combodo iTop contains a vulnerability of Broken Access Control, which allows unauthorized attacker to inject command and disclose system information.
CVE-2020-12778
PUBLISHED: 2020-08-10
Combodo iTop does not validate inputted parameters, attackers can inject malicious commands and launch XSS attack.
CVE-2020-12779
PUBLISHED: 2020-08-10
Combodo iTop contains a stored Cross-site Scripting vulnerability, which can be attacked by uploading file with malicious script.
CVE-2020-12780
PUBLISHED: 2020-08-10
A security misconfiguration exists in Combodo iTop, which can expose sensitive information.
CVE-2020-12781
PUBLISHED: 2020-08-10
Combodo iTop contains a cross-site request forgery (CSRF) vulnerability, attackers can execute specific commands via malicious site request forgery.