Breakpoint 2015 Call For Presentations

2015-05-17 Thread cfp
Breakpoint 2015 Call For Papers
Melbourne, Australia, October 22th-23th
Intercontinental Rialto
http://www.ruxconbreakpoint.com


.[x]. Introduction .[x].

 We are pleased to announce Call For Presentations for Breakpoint 2015.

 Breakpoint showcases the work of expert security researchers from around the
 world on a wide range of topics. This conference is organised by the Ruxcon 
 team and offers a specialised security conference to complement and lead into 
 the larger and more casual Ruxcon weekend conference. Breakpoint caters 
 towards security researchers and industry professionals alike, with a focus on 
 cutting edge security research.

 Breakpoint presents a great opportunity for our selected speakers to receive a
 complimentary trip to Australia and experience both the Breakpoint and Ruxcon 
 conferences, not to mention the great weather, parties, and friendly people. 


.[x]. Important Dates .[x].

 May 15 - Call For Presentations Open
 August  30 - Call For Presentations Close
 October 19-21  - Breakpoint Training
 October 22-23  - Breakpoint Conference
 October 24-25  - Ruxcon Conference


.[x]. Topic Scope .[x].

Topics of interest include, but are not limited to:

 o Mobile Device Security
 o Exploitation Techniques
 o Reverse Engineering
 o Vulnerability Discovery
 o Rootkit Development
 o Malware Analysis
 o Code Analysis
 o Virtualisation, Hypervisor Security
 o Cloud Security
 o Embedded Device Security
 o Hardware Security
 o Telecommunications Security
 o Wireless Network Security
 o Web Application Security
 o Law Enforcement Activities
 o Forensics
 o Threat Intelligence
 o Incident Response


.[x]. Submission Guidelines .[x].

 In order for us to process your submission we will require the following 
 information:

 1. Presentation title
 2. Detailed summary of your presentation material
 3. Name/Nickname
 4. Mobile phone number
 5. Brief personal biography
 6. Description of any demonstrations involved in presentation
 7. Information on where the presentation material has or will be presented 
before Breakpoint

 * Preference will be given to presentations that contain original research 
   that will be first presented at Breakpoint. 
 * As a general guideline, Breakpoint presentations are between 
   45 and 60 minutes, including question time. 

 If you have any questions about submissions, or would like to make a 
 submission, please send an email to b...@ruxconbreakpoint.com


.[x]. Speaker Benefits .[x].

 Speakers at Breakpoint will be entitled to the following benefits: 
   

 - A return economy airfare to Melbourne (total cost limit applies)
 - Three nights accommodation at the Intercontinental Rialto
 - Complimentary registration for Breakpoint and Ruxcon conferences
 - Invitation to all Breakpoint and Ruxcon parties
 - Unlock 'Presented on world's smallest continent' achievement

 * All speaker benefits apply to a single speaker per submission. 


.[x]. Contact .[x]. 

 If you have any questions or inqueries, contact us at:

 * Email:   b...@ruxconbreakpoint.com
 * Twitter: ruxconbpx

___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Mark Felder


On Sat, May 16, 2015, at 01:38, Dan Lukes wrote:
> Mark Felder wrote:
> >> Base OpenSSL in still supported releases is too old version and doesn't
> >> support TLS 1.2 as well.
> >>
> >> Either TLS 1.0 is so insecure and should not be used, or is secure
> >> enough for FreeBSD.
> 
> > When the FreeBSD 8.0 (2009) and 9.0 (2012) releases were cut we didn't
> > have these vulnerabilities or problems.
> 
> All security patches are released because of something discovered after
> release. So it is nothing new nor special.
> 
> But it's not the matter of my comment.
> 
> As far as I know, there has been no discussion on FreeBSD Security
> related to fact that FreeBSD 9 will not receive security patches for
> particular known security issue. Nor even announcement, if it has been
> considered no topic for discussion here.
> 
> So I'm confused (as claimed in previous comment). Other the issue is not
> so severe, then I don't understand why TLS 1.0 needs to be disabled on
> forums. Or it is so severe so I don't understand why there is still no
> Security Advisory dedicated to it. Well, there may be no solution known
> - but even in such case the issue should be announced.
> 
> 

You're not understanding the situation: the vulnerability isn't in
OpenSSL; it's a design flaw / weakness in the protocol. This is why
everyone is running like mad from SSL 3.0 and TLS 1.0.

If you want a fix for your entire OS, upgrade to FreeBSD 10 which has a
newer version of OpenSSL in base that includes TLS 1.1 and 1.2. It's not
ABI compatible with older versions. You can't just wedge it into FreeBSD
8 or 9. Sorry.
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Mel Pilgrim

On 2015-05-16 07:20, Kimmo Paasiala wrote:

On Fri, May 15, 2015 at 9:34 PM, Roger Marquis  wrote:

Mark Felder wrote:


Another option is a second openssl port, one that overwrites base and
guarantees compatibility with RELEASE.  Then we could at least have all
versions of openssl in vuln.xml (not that that's been a reliable
indicator of security of late).


This will never work. You can't guarantee compatibility with RELEASE and
upgrade it too.


How do you figure?  RedHat does exactly that with every backport, and
they do it for the life of a release.


Redhat makes no promise of binary compatibility for locally compiled
software. They can update OpenSSL as they wish from version 1.0.1 to
1.0.2, recompile all affected packages (all of Redhat "userland" is
covered by .rpm packages) and push them to the users and advise users
of locally compiled software to recompile what they have. This is
unacceptable in FreeBSD that makes a hard promise that the ABI will
remain compatible troughout the whole lifetime of the same major
version line.


I'm really glad that FreeBSD makes that promise. It means I have a 
long-lived and well-defined scope of compatibility for a given system. 
It makes freebsd-update and pkg possible in production.  I no longer 
have to deal with localized system images.


That's paired with support for linking to openssl from ports and 
FreeBSD's recent direction of decoupling network services from the base. 
 I have systems where all of the user-facing services link to openssl 
1.0.2 even though the base OS doesn't.  That means the time it will take 
to reimplement and test on what will eventually become 11.0 won't 
interact chronologically with the security needs of my existing 
deployments on 10.x.  It means "following -current in preprod" is no 
longer part of my dayjob.  That's a huge deal.

___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Roger Marquis

You're not understanding the situation: the vulnerability isn't in
OpenSSL; it's a design flaw / weakness in the protocol. This is why
everyone is running like mad from SSL 3.0 and TLS 1.0.


Right, there are two issues being discussed that should be separated.
The thread was originally about SSL version weaknesses and the rational
for that (keeping v1.0 around for the near term) was described quite
well.

The second issue was regarding base and ports versions of openssl and how
to coordinate between them.  I recommended an openssl_base port so that
security vulnerabilities (not necessarily protocol weaknesses) could be
more easily remediated (than installworld) and so 'pkg audit' could
report on those.  It was asserted and reasserted that this would be
infeasible, however, no example or reason was given.  Considering the
time to write and test patches is the same in either case it is still an
open question.

The problem of multiple versions of the same libraries and binaries,
however, remains a weakness in the FreeBSD security model.  This may be
one of the reasons why the EU recently recommended more widespread
adoption of OpenBSD (vs FreeBSD).  Either way, it is a design flaw that
can and should be solved in the most robust way possible.

Roger
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Mark Felder


On Sun, May 17, 2015, at 15:50, Roger Marquis wrote:
> > You're not understanding the situation: the vulnerability isn't in
> > OpenSSL; it's a design flaw / weakness in the protocol. This is why
> > everyone is running like mad from SSL 3.0 and TLS 1.0.
> 
> Right, there are two issues being discussed that should be separated.
> The thread was originally about SSL version weaknesses and the rational
> for that (keeping v1.0 around for the near term) was described quite
> well.
> 
> The second issue was regarding base and ports versions of openssl and how
> to coordinate between them.  I recommended an openssl_base port so that
> security vulnerabilities (not necessarily protocol weaknesses) could be
> more easily remediated (than installworld) and so 'pkg audit' could
> report on those.  It was asserted and reasserted that this would be
> infeasible, however, no example or reason was given.  Considering the
> time to write and test patches is the same in either case it is still an
> open question.
> 

Again, this is not possible. You can't just "replace" the base OpenSSL.
That port or package would also have to replace every binary and library
in the base system linked to an OpenSSL library such as libcrypt with a
version that was built against the updated OpenSSL. You might as well
fork FreeBSD at this point.


> The problem of multiple versions of the same libraries and binaries,
> however, remains a weakness in the FreeBSD security model.  This may be
> one of the reasons why the EU recently recommended more widespread
> adoption of OpenBSD (vs FreeBSD).  Either way, it is a design flaw that
> can and should be solved in the most robust way possible.
> 
> Roger

OpenBSD can do this because they roll a new release every 6 months. They
don't support an OS release train for 5 years.
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


pkg audit / vuln.xml failures

2015-05-17 Thread Roger Marquis

Does anyone know what's going on with vuln.xml updates?  Over the last
few weeks and months CVEs and application mailing lists have announced
vulnerabilities for several ports that in some cases only showed up in
vuln.xml after several days and in other cases are still not listed
(despite email to the security team).

Is there a URL outlining the policies and procedures of vuln.xml
maintenance?

Roger Marquis
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Roger Marquis

Mark Felder wrote:

Considering the time to write and test patches is the same in either case
it is still an open question.



Again, this is not possible. You can't just "replace" the base OpenSSL.
That port or package would also have to replace every binary and library
in the base system linked to an OpenSSL library such as libcrypt with a
version that was built against the updated OpenSSL.


Sure, when you must change the ABI you also have to rebuild linked libs
and bins, but how many openssl 0.9 updates have required ABI changes?

Roger
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Leif Pedersen
On Sun, May 17, 2015 at 3:50 PM, Roger Marquis  wrote:

> I recommended an openssl_base port so that
> security vulnerabilities (not necessarily protocol weaknesses) could be
> more easily remediated (than installworld) and so 'pkg audit' could
> report on those.
>

Exactly how would that differ from using freebsd-update?


-- 

As implied by email protocols, the information in this message is
not confidential.  Any middle-man or recipient may inspect, modify,
copy, forward, reply to, delete, or filter email for any purpose unless
said parties are otherwise obligated.  As the sender, I acknowledge that
I have a lower expectation of the control and privacy of this message
than I would a post-card.  Further, nothing in this message is
legally binding without cryptographic evidence of its integrity.

http://bilbo.hobbiton.org/wiki/Eat_My_Sig
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Mark Felder


On Sun, May 17, 2015, at 16:08, Roger Marquis wrote:
> Mark Felder wrote:
> >> Considering the time to write and test patches is the same in either case
> >> it is still an open question.
> 
> > Again, this is not possible. You can't just "replace" the base OpenSSL.
> > That port or package would also have to replace every binary and library
> > in the base system linked to an OpenSSL library such as libcrypt with a
> > version that was built against the updated OpenSSL.
> 
> Sure, when you must change the ABI you also have to rebuild linked libs
> and bins, but how many openssl 0.9 updates have required ABI changes?
> 
> Roger

This entire discussion has been about doing MAJOR updates to OpenSSL in
base. Updates that obviously require ABI changes. 

Please tell me about a feature change between FreeBSD 9.3's OpenSSL
0.9.8za and the latest compatible 0.9.8ze that validates a port for
OpenSSL that replaces base. I cannot find any that justify the effort.
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Dan Lukes

On 05/17/15 22:20, Mark Felder:

You're not understanding the situation: the vulnerability isn't in
OpenSSL; it's a design flaw / weakness in the protocol.


Sorry, my English seems to be so poor so you don't understand my very 
simple question. You are still answering other questions I didn't asked.


Last attempt. I will try ti make question as simple as possible. If it 
will not help I will become silent.


TLS 1.0 *protocol* is buggy, new protocol has been implemented in new 
version of OpenSSL, but such version will not be imported into FreeBSD 9 
because of ABI incompatibility. Instead old version of OpenSSL and 
vulnerable protocol is still used by base system libraries and 
utilities. So base system IS affected by known vulnerability.


Thus I'm asking.

If TLS 1.0 is considered severe security issue AND system utilities are 
using it, why there is no Security Advisory describing this system 
vulnerability ?



Dan

___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Roger Marquis

Mark Felder wrote:

Sure, when you must change the ABI you also have to rebuild linked libs
and bins, but how many openssl 0.9 updates have required ABI changes?


This entire discussion has been about doing MAJOR updates to OpenSSL in
base.


I agree that this discussion has been about updates to OpenSSL but we're
obviously not on the same page with regards to your definition of major.

Leif Pedersen wrote:

... more easily remediated (than installworld) and so 'pkg audit' could

report on those.

Exactly how would that differ from using freebsd-update?


You mean aside from being locally compiled?  Does freebsd-update only
update the specific libs, apps, files that need to be updated?

Roger
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Mark Felder


On Sun, May 17, 2015, at 16:28, Dan Lukes wrote:
> On 05/17/15 22:20, Mark Felder:
> > You're not understanding the situation: the vulnerability isn't in
> > OpenSSL; it's a design flaw / weakness in the protocol.
> 
> Sorry, my English seems to be so poor so you don't understand my very 
> simple question. You are still answering other questions I didn't asked.
> 
> Last attempt. I will try ti make question as simple as possible. If it 
> will not help I will become silent.
> 
> TLS 1.0 *protocol* is buggy, new protocol has been implemented in new 
> version of OpenSSL, but such version will not be imported into FreeBSD 9 
> because of ABI incompatibility. Instead old version of OpenSSL and 
> vulnerable protocol is still used by base system libraries and 
> utilities. So base system IS affected by known vulnerability.
> 
> Thus I'm asking.
> 
> If TLS 1.0 is considered severe security issue AND system utilities are 
> using it, why there is no Security Advisory describing this system 
> vulnerability ?
> 

It's not a vulnerability in software, it's weakness in the protocol
design. By your logic we should have SAs for all of the following in the
base system:

hashes:
MD5
SHA1

default passwd hash in FreeBSD 8:
md5crypt (though phk did request a CVE to help usher its death)

any openssl cipher using the following:
MD5
SHA1
DES
3DES
IDEA

I'm sure there are even more examples.

None of these problems fit the definition required to issue an SA.
They're just a violation of widely-accepted Best Current Practices.
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Dan Lukes

On 05/18/15 00:00, Mark Felder:

If TLS 1.0 is considered severe security issue AND system utilities are
using it, why there is no Security Advisory describing this system
vulnerability ?



It's not a vulnerability in software, it's weakness in the protocol
design.


Like protocol protocol downgrade triggered by MITM attack flaw or 
protocol design flaw in session renegotiation support. The first one 
addressed in FreeBSD-SA-14:23.openssl, the second one in 
FreeBSD-SA-09:15.ssl


So the "is it protocol flaw or implementation bug" seems not to be true 
major criteria.


OK, I wish I got best answer to my question possible. I'm not going to 
discuss SA issuing policy in this thread.


Thank you.

Dan


___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"


Re: Forums.FreeBSD.org - SSL Issue?

2015-05-17 Thread Leif Pedersen
On May 17, 2015 4:49 PM, "Roger Marquis"  wrote:
> Leif Pedersen wrote:
>>>
>>> ... more easily remediated (than installworld) and so 'pkg audit' could
>>
>> report on those.
>>
>> Exactly how would that differ from using freebsd-update?
>
>
> You mean aside from being locally compiled?  Does freebsd-update only
> update the specific libs, apps, files that need to be updated?
>
> Roger

Maybe it would be a good idea to learn what freebsd-update does before
continuing to give the developers who bring such a great OS to you a hard
time. You have some good thoughts, but you may find that the need isn't as
great as you think.
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"