Top Banner
NSA and VPN
15

Nsa and vpn

Jul 25, 2015

Download

Technology

antitree
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Nsa and vpn

NSA and VPN

Page 2: Nsa and vpn

NSA and VPNs

A recent article on [Der Spiegel] show lots of new attacks

SSL/TLS

PPTP

IPSEC

SSH

http://www.spiegel.de/international/world/nsa-documents-attacks-on-vpn-ssl-tls-ssh-tor-a-1010525.html

Page 3: Nsa and vpn

The Program

Falls under the "Office of Target Pursuit" (OTP)

Named OTP VPN Exploitation Team

Now called OTTERCREAK

TOYGRIPPE: repository of VPN metadata of systems of interest

• includes machine fingerprint and the VPN service connected to (e.g. PIA)

BLEAKINQUIRY: repository of potentially exploitable VPNs

• unclear if this means list of VPNs on the internet, or common configurations

XKEYSCORE: common source of VPNs to exploit but includes random people like you and I

• don't use it as a primary attack source unless necessary due to legal hoops they have to go through

Page 4: Nsa and vpn

The Workflow

Analyst targets someone (e.g. me) and find that it's using a VPN

Analyst must come up with a way to collect inbound and outbound traffic of the target

Calls up OTP VPN Exploit Team

They look at the metadata (traffic fingerprinting), define the attacks, and search through collection sources

• TOYGRIPPE: has a list of all the VPN metadata• PINWALE: long term collection of “SIGINT”• XKEYSCORE: raw packet captures from everyone• VULCANDEATHGRIP: raw packet captures for VPNs• FOURSCORE: repo for PPTP• CORALREEF: database of PSKs for VPNs

Decrypt traffic and return the results (passive or active)

Page 5: Nsa and vpn

TOYGRIPPE

Lets an analyst search through tons of metadata from a variety of collection sources

• MUSCULAR• UKJ-260D??

Focused on IPSec, PPTP, and ViPNet (Vodaphone)

Page 6: Nsa and vpn

Example of using TOYGRIPPE to find VPN metadata

IR = IRAN

S = source port 1037

Sites where the data was collected

Page 7: Nsa and vpn

IPSEC Review

IPSEC VPNs are the most common in enterprise environments

Uses a Pre Shared Key (PSK) or a Public Key cert (PK)

ISAKMP/IKE packets perform a handshake for a temporary key for your session

ESP packets are the actual encrypted data

Page 8: Nsa and vpn

Example IPSEC: FTM 1

“Follow the Money” FTM target 1

Implanted keyloggers and other hardware but it didn’t work

Called up TAO who owned them and recovered the configuration files of the VPN including PSKs

• Can now “passively exploit” which should mean decrypt VPN traffic

Page 9: Nsa and vpn

Example IPSEC: FTM 2

TAO owns the router

Network Security Products “implant” allows passive exploitation

• This implies that it’s a way of collecting the temporary keys (IKE/ISAKMP) values• Maybe making them predictable or fucking up their handshake

Results in ESP packets being decrypted raw

Page 10: Nsa and vpn

PPTP Review

Microsoft Point To Point Tunneling Protocol

Owned years ago by Moxie and others

Outdated but still used

Control channel operates on 1723

Data channel is sometimes port 47 (GRE-Next Protol)

Page 11: Nsa and vpn

Example PPTP: Airlines, Telcos, Governments

The slides just list all of these sites that have been owned, implying that they have a protocol level exploit

Iran Air

Royal Jordanian Air

Transaero Airlines

Mexican Embassy

Pakistani General Intelligence

Turkish Embassy

Afghanistan Government (apparently the whole thing)

Page 12: Nsa and vpn

More Example PPTP

Zaad Financial bank

Kabul lBank

BNI Banking Indonesia

And so on…

Page 13: Nsa and vpn

TL;DL

These files are from at around 4-2011 and some of them are older

Most of the exploitations are not VPN destroying, just concerning

The team seems mainly to implement attacks using other people’s exploits

• Decrypt TLS when TAO collects the private keys• Decrypt IPSEC when the PSK is discovered• Decrypt SSH when the private keys are found

They (probably) can’t…

• Own all VPNs with a single click• Own your personal VPN• Own SSH and TLS automatically

Page 14: Nsa and vpn

TL;DL: They Can…probably

See that you are on a VPN, which VPN, and if that VPN has an exploit

Own you completely via PPTP

Capture your VPN traffic and try to decrypt it later

Call up TAO or NSP to implant something on your network that would make your VPN owned

Decrypt SSH tunnels with the help of TAO or NSP

Decrypt SSL/TLS tunnels with the help of TAO or NSP

Lookup your router and see if there is an exploit for it

Pay attention to large VPN providers to exploit them including your traffic

Page 15: Nsa and vpn

Defense

1. Run your own private VPN on VPS

• Good for increasing the effort to exploit you• Bad because it’s cloud• Bad because all your traffic is directly attributed to you

2. Use a VPN service like PIA

• Good because it’s cheap and difficult (>0) to tell which is your traffic and which is someone else’s• Good because it doesn’t allow your ISP to see your traffic• Bad because the bigger the target the more likely you will “tasked”

3. Tor

• Good because anonymity• Bad because un-realistically slow