Investigate brute-force attacks against all exozyme services #104

Closed
opened 2022-01-28 16:58:56 +00:00 by a · 2 comments
Owner

This is a generalized version of #61. Basically, we need to check all of our services for their resistance to brute-force attacks, and possibly implement more mitigations. (exoffice, exopages, and exovpn are excluded)

  • SSH: We now require SSH keys
  • pam: We use unmodified security settings so accounts are locked out after 3 attempts for 10 minutes. Disabling su might be a good idea too.
  • LDAP: Vulnerable
  • exodesk: Uses pam
  • exocloud: Uses LDAP and has built-in brute-force prevention
  • exochat: Uses LDAP
  • exogit: Uses LDAP
  • exomedia: Uses LDAP
  • exocial: Uses LDAP and 2FA via email
  • exotube: Uses LDAP and has built-in brute-force prevention
  • exohub: Uses pam
  • exoportal: Uses pam
  • exoci: Uses OAuth2 via exogit
This is a generalized version of #61. Basically, we need to check all of our services for their resistance to brute-force attacks, and possibly implement more mitigations. (exoffice, exopages, and exovpn are excluded) - [x] SSH: We now require SSH keys - [x] pam: We use unmodified security settings so accounts are locked out after 3 attempts for 10 minutes. Disabling `su` might be a good idea too. - [ ] LDAP: Vulnerable - [x] exodesk: Uses pam - [x] exocloud: Uses LDAP and has built-in brute-force prevention - [ ] exochat: Uses LDAP - [ ] exogit: Uses LDAP - [ ] exomedia: Uses LDAP - [x] exocial: Uses LDAP and 2FA via email - [x] exotube: Uses LDAP and has built-in brute-force prevention - [x] exohub: Uses pam - [x] exoportal: Uses pam - [x] exoci: Uses OAuth2 via exogit
a added the
security
help wanted
enhancement
bug
labels 2022-01-28 16:58:56 +00:00
a added this to the (deleted) project 2022-01-28 16:58:56 +00:00
Author
Owner

OpenLDAP seems very vulnerable to brute-force attacks. 👀

Attackers can brute-force about one password every 5 ms. OpenLDAP has a ppolicy module for configuring password policies, but it seems very difficult to use. (just like every other OpenLDAP feature)

OpenLDAP seems very vulnerable to brute-force attacks. 👀 Attackers can brute-force about one password every 5 ms. OpenLDAP has a `ppolicy` module for configuring password policies, but it seems very difficult to use. (just like every other OpenLDAP feature)
a started working 2022-01-28 22:14:01 +00:00
a self-assigned this 2022-01-28 22:14:22 +00:00
Author
Owner

OpenLDAP is too freaking complicated. Labelling as wontfix so we don't waste more time. Strong passwords should partially prevent brute-force attacks, and if someone is really trying thousands of passwords in a brute-force manner, it'll be pretty clear in the system logs.

OpenLDAP is too freaking complicated. Labelling as wontfix so we don't waste more time. Strong passwords should partially prevent brute-force attacks, and if someone is really trying thousands of passwords in a brute-force manner, it'll be pretty clear in the system logs.
a closed this issue 2022-01-28 22:45:38 +00:00
a stopped working 2022-01-28 22:45:38 +00:00
31min 37s
a added the
wontfix
label 2022-01-28 22:45:50 +00:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Total time spent: 31 minutes 37 seconds
a
31 minutes 37 seconds
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: exozyme/exozyme#104
No description provided.