Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Authentication

9/17/2019
12:00 PM
Joe Stanganelli
Joe Stanganelli
Joe Stanganelli
50%
50%

Analytics Startup Claims to Turn Golden Tickets Brass

The threat of escalation attacks and forged administration levels has plagued Kerberos authentication systems for years. Data-analytics startup Qomplx claims to do the math that solves the problem.

A devastating five-year old vulnerability in basic authentication systems may finally have a solution -- but it's really hard.

Typically, encryption and other IT security solutions rely on the fundamental presumption that the very first step of user authentication works and can be fully trusted. Kerberos -- a ubiquitous, decades-old authentication mechanism -- represents the core of how identity authentication works throughout the majority of enterprises worldwide. As such, it represents the roots of a tree of trust.

It is imperfect, however.

"They're all premised on this not being a lie," Jason Crabtree, CEO of data-analytics startup Qomplx (pronounced "complex"), told Security Now. "It's actually a terrible assumption to make... It doesn't mean that a single one of the authentication events is real."

Researchers at Black Hat 2014 revealed what is known as a "Golden Ticket" attack -- an exploit related to privilege-escalation attacks by forging not only tickets but also creating a forged key distribution center. For IT administrators of Windows and Linux environments that rely upon Kerberos, it is the curse that keeps on cursing.

Not much has been done about this vulnerability over the past few years -- largely because not much can be done about it. Like, to some extent, SPECTRE and MELTDOWN, the problem of Kerberos authentication has become something of a pink elephant in an otherwise well-appointed drawing room. It is very clearly there, but is impolite to talk about.

For some, the threat has been overblown. Not long after the Black Hat 2014 revelations, Roger Grimes of CSO Online argued that by applying mega-strict authentication policies bordering on draconian, just about everything can be accomplished on an enterprise network with task delegation and time limits on higher-level accounts.

"You want to make it hard for attackers to get domain admin status? Don't have any," wrote Grimes. "The most secure companies in the world have zero permanent members of their highly elevated groups [and] alert when anyone tries to add accounts to those groups."

Not everyone agrees that this is a complete solution, however. While Crabtree affirms that limiting credentials and maintaining a well-configured network are best practices, he claims that Qomplx has demonstrated a proof of concept involving ticket forgeries in the absence of permanently installed high-level users; from there, attackers were able to issue themselves these high levels of authority -- and then compromise cloud-based accounts.

Otherwise sophisticated UEBA solutions, Crabtree further explains, are likewise insufficient to counter the threat of Kerberos-authentication forgeries.

"It's like buying a seatbelt that works below 10 miles per hour and not above," said Crabtree. "It only works against adversaries that are unskilled enough that they don't bother to do the first thing a skilled adversary does -- which is [to] attribute the traffic to the wrong identification; [this] violates your ability to pinpoint any of this traffic in a behavioral basis."

Consequently, Qomplx -- which has historically been an analytics firm working with big data nonspecific to cybersecurity -- has taken the approach of going beyond metadata analysis.

The state of Kerberos authentication
The exodus from other modes of authentication to Kerberos began in the 1990s, for it solved an important problem: How do you keep authentication secure yet still properly agile -- so that the user doesn't have to manually authenticate themselves dozens or hundreds of times in a business day on the enterprise network. Unlike other authentication tools, Kerberos is a stateless protocol -- allowing one domain controller to issue a credential that can then be presented to and accepted by other domain controllers, while making ticket forgeries more difficult for attackers.

Attackers have solved this problem, however. In turn, Qomplx purports to have solved that problem in a complex (some might say "artless") way: by collecting, keeping a ledger of, and validating "every single Kerberos transaction" -- comparing known lists of valid tickets against every new authentication requests.

Describing the process as "stupid hard," Crabtree explained that Qomplx temporarily infuses statefulness into the otherwise stateless Kerberos protocol throughout the IT network. This is because the "handshake" that occurs when Kerberos issues an authentication must be actually observed to be independently verified (a nigh impossible task when Kerberos is stateless).

From there, said Crabtree, the maintenance of an external state mutes the "noisiness" across large enterprise networks, allowing Qomplx to independently identify true signatures and ensure that authentication has been properly issued.

"It's really arcane and it's really low level," said Crabtree. "Except if you do it, you are able to detect the most devastating [attacks].

Crabtree reports that Qomplx's solution has been in production for over a year and a half now -- leading to a rebranding of the company. Originally named Fractal Industries, the company focused on its offering of a big-data analytics streaming platform. Under this new banner of Qomplx, the company secured Series A funding in July.

"We didn't [originally] want to build the Kerberos solution as a business," said Crabtree. "[But] if you can't secure authentication, you can't secure the enterprise."

Related posts:

—Joe Stanganelli is managing director at research and consulting firm Blackwood King LC. In addition to being an attorney and consultant, he has spent several years analyzing and writing about business and technology trends. Follow him on Twitter at @JoeStanganelli.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading,  7/29/2020
Average Cost of a Data Breach: $3.86 Million
Jai Vijayan, Contributing Writer,  7/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-18112
PUBLISHED: 2020-08-05
Affected versions of Atlassian Fisheye allow remote attackers to view the HTTP password of a repository via an Information Disclosure vulnerability in the logging feature. The affected versions are before version 4.8.3.
CVE-2020-15109
PUBLISHED: 2020-08-04
In solidus before versions 2.8.6, 2.9.6, and 2.10.2, there is an bility to change order address without triggering address validations. This vulnerability allows a malicious customer to craft request data with parameters that allow changing the address of the current order without changing the shipm...
CVE-2020-16847
PUBLISHED: 2020-08-04
Extreme Analytics in Extreme Management Center before 8.5.0.169 allows unauthenticated reflected XSS via a parameter in a GET request, aka CFD-4887.
CVE-2020-15135
PUBLISHED: 2020-08-04
save-server (npm package) before version 1.05 is affected by a CSRF vulnerability, as there is no CSRF mitigation (Tokens etc.). The fix introduced in version version 1.05 unintentionally breaks uploading so version v1.0.7 is the fixed version. This is patched by implementing Double submit. The CSRF...
CVE-2020-13522
PUBLISHED: 2020-08-04
An exploitable arbitrary file delete vulnerability exists in SoftPerfect RAM Disk 4.1 spvve.sys driver. A specially crafted I/O request packet (IRP) can allow an unprivileged user to delete any file on the filesystem. An attacker can send a malicious IRP to trigger this vulnerability.