by f311a on 10/20/23, 12:40 PM with 306 comments
by costco on 10/20/23, 4:49 PM
https://ddanchev.blogspot.com/2021/03/exposing-currently-act...
https://ddanchev.blogspot.com/2019/07/profiling-currently-ac...
https://blog.talosintelligence.com/picking-apart-remcos/
https://flashpoint.io/wp-content/uploads/Plea-Agreement-USA-...
Really interesting writeup though. I guess it's a practical example of why everyone should get a CT monitoring service!
by rodlette on 10/20/23, 4:34 PM
For high risk targets, consider layering an additional auth mechanism that doesn't rely on trusted CAs: Tor onion services, SSH, or Wireguard.
> All issued SSL/TLS certificates are subject to certificate transparency.
+1. crt.sh has RSS feeds for this.
> Limit validation methods and set exact account identifiers
Using CAA is a good idea in general, but would it help in this case? The attacker would just request the exact cert configuration that is permitted by CAA. Maybe this helps if you can strengthen one validation method?
> Monitor SSL/TLS certificate changes on all your services using external service
+1. High-risk targets should be aware of what certs are valid at any time, and be checking for those.
> Monitor MAC address of default gateway for changes
A more sophisticated attack could preserve the MAC address.
> "Channel binding" is a feature in XMPP which can detect a MiTM even if the interceptor present a valid certificate.
TIL.
by lima on 10/20/23, 5:21 PM
by LinuxBender on 10/20/23, 2:12 PM
Their theories are interesting and would explain how they obtained the certs if true. Perhaps the take-away here is to have multiple probes on multiple providers checking all of ones TLS fingerprints and alerting on unknown fingerprints and then checking the certificate transparency log or lack thereof.
openssl s_client -servername news.ycombinator.com -connect news.ycombinator.com:443 < /dev/null 2>/dev/null | openssl x509 -fingerprint -noout -in /dev/stdin
SHA1 Fingerprint=7E:49:BA:40:86:87:B3:39:66:93:94:9E:9C:45:71:85:3C:8D:95:16
[1] - https://archive.ph/C0jYJ [updated]by Libre___ on 10/20/23, 6:42 PM
https://www.google.com/search?q=%2290%253Ade%253A01%22+linod...
Googling for '"90:de:01" linode' and '"90:de:00" linode' indicates that addresses from these blocks have been assigned to other linode VMs recently. I sadly don't have a linode VM of my own to compare with right now but it would seem like the traffic has been routed to another VM on linode infrastructure
by throwaway77384 on 10/20/23, 2:45 PM
by upofadown on 10/20/23, 4:14 PM
The attacker would need to set up a separate MiTM for the particular E2EE scheme used. Some of the XMPP clients I have encountered will not let you use a particular cryptographic identity unless you have explicitly claimed to have verified it.
Still a good reminder. If you have not seen and dealt with a ridiculously long number (or equivalent) you have not achieved end to end.
by mkup on 10/21/23, 9:02 AM
by harrymit907 on 10/21/23, 3:00 PM
by Andrew_nenakhov on 10/20/23, 4:21 PM
by kristjank on 10/20/23, 3:43 PM
by hhsectech on 10/21/23, 11:58 AM
The same thing applies to VPN services. Why bother trying to develop tools etc that can decrypt traffic when you can just have people send their traffic to you?
by codedokode on 10/20/23, 10:48 PM
by whytevuhuni on 10/20/23, 11:16 PM
Or creates network/pid namespaces and puts you in them, while leaving the mitm server in the original one?
If so, the mitm could be on the same host, and wouldn't need the cooperation of the hosting provider.
I'm not sure how to check for either of these without restarting (which the admin does not seem to want to do, as it is a live service).
by zhovner on 10/20/23, 2:48 PM
Why is it even possible to issue more than 1 certificate on the same domain via Let’s Encrypt? Shouldn't the previous certificate be revoked when a new one is issued?
by beeboobaa on 10/20/23, 3:37 PM
by wutwutwat on 10/20/23, 4:45 PM
by chgo1 on 10/21/23, 8:01 AM
by mermaidsalad on 10/21/23, 8:15 AM
> All jabber.ru and xmpp.ru communications between these dates should be assumed compromised. Given the nature of the interception, the attacker have been able to execute any action as if it is executed from the authorized account, without knowing the account password. This means that the attacker could download account's roster, lifetime unencrypted server-side message history, send new messages or alter them in real time.
by vb-8448 on 10/20/23, 3:57 PM
> We tend to assume this is lawful interception Hetzner and Linode were forced to setup based on German police request.
> Another possible, although much more unlikely scenario is an intrusion on the internal networks of both Hetzner and Linode targeting specifically jabber.ru — much harder to believe but not entirely impossible.
And what if the attacker tricked somehow the letsencrypt challenges?
Or this is supposed to be impossible?
by olegarch on 10/21/23, 2:59 PM
I think, emerDNS can be used in such critical application: https://emercoin.com/en/documentation/blockchain-services/em...
by SergeAx on 10/20/23, 10:09 PM
by Traubenfuchs on 10/20/23, 10:21 PM
I really, really hate the idea of this kind of eavesdropping.
by withinboredom on 10/22/23, 8:01 PM
by psvz on 10/21/23, 2:58 PM
Interestingly, search "90:de:01" in this page: https://www.cyberciti.biz/faq/howto-linux-configuring-defaul...
^^ looks like another victim VM of the alleged mysterious interceptor :-)
by zxwrt on 10/20/23, 4:45 PM
by mrbonner on 10/21/23, 12:27 AM
by snvzz on 10/21/23, 5:27 AM
by mak234 on 10/20/23, 5:35 PM
by AtNightWeCode on 10/20/23, 6:50 PM
I assume the root cause is DNS tricks.
by wizzard0 on 10/20/23, 10:57 PM
so… not surprised. Still cool. What a time to be alive
by riku_iki on 10/20/23, 11:15 PM
by hnarn on 10/20/23, 8:05 PM
by gigatexal on 10/20/23, 10:27 PM
by dathinab on 10/20/23, 5:45 PM
This seems to be somewhat jumping the gun I think.
Given the certs and the target assuming it's an lawful interception seems reasonable.
But there is nothing there which requires Hetzner or Lindoe complying or knowing about this.
Given the nature of the attacks you can do the interception on the carrier level, and carriers being forced to comply with lawful wiretapping is pretty much anywhere in the world pretty much standard and many laws are based around that approach. Much less so around approaches involving data centers.
by 0xbadcafebee on 10/20/23, 6:47 PM