SlideShare une entreprise Scribd logo
1  sur  26
Télécharger pour lire hors ligne
1
Vulnerability Reporting Program
on a Shoestring Budget
Insights from the creation and first year of APNIC’s VRP
MyNOG 9
19 Sept 2022
Jamie Gillespie, Internet Security Specialist, APNIC
About APNIC
• APNIC is the Regional Internet Registry (RIR) for the 56
economies that makes up the Asia Pacific region
– Distributes and manages IP address
– Not-for-profit, purposefully open and transparent
– Approx 120 staff, mostly in Brisbane Australia
– Multiple data centres in Australia and internationally
– IaaS hosting on AWS and GCP, multiple SaaS applications/vendors
– Not just web sites, but also VPN, SMTP, DNS, FTP, whois, RPKI
and even rsync
2
In the beginning…
• APNIC has an internal IT team
(actually two of them)
– Internal vulnerability scanning
– External penetration tests
• APNIC also has developers writing new applications
• APNIC CSIRT was created internally to formalise incident
response procedures, and overall information security work
3
Early vulnerability reports
• Without a proper security point of contact, security
researchers would email privacy@ or even hr@ addresses
• Occasional scam email would come in too
4
Conception of the VRP
• We should have a point of contact for security researchers
• But we’ll need to advertise it somehow
• We’ll also need to set some rules
• This sounds like a bug bounty program
• Hmmm… but we can’t pay out bounties like the big profit
driven companies can
• Would a bug bounty program without the bounties work?
5
Conception of the VRP
• The APNIC Vulnerability Reporting Program!
– aka Vulnerability Disclosure Program / VDP
• Reading many other program texts led to a draft VRP
• Circulated draft to IT teams for feedback and improvements
• Used an early template from disclose.io for Safe Harbor
– disclose.io now have entire VDP generators and templates
• Got the APNIC Legal Team involved to approve the wording
6
The VRP layout
• Background of APNIC
• Introduction of the VRP – “Bug Reporting”
• In Scope
• Out of Scope
• Report Details
• Safe Harbor
7
The VRP layout (1/5)
• Background of APNIC
– Who we are, what we do
• Introduction of the VRP – “Bug Reporting”
– “We value the hard work of the security research community, and
welcome responsible disclosure of any vulnerabilities in our products
and services.”
– Please use csirt [at] apnic.net
– “We aim to reply to all reports within 7 days, and to resolve reported
P1-P4 vulnerabilities within 90 days”
8
The VRP layout (2/5)
• In Scope
– *.apnic.net
– *.apnic.foundation
– *.isif.asia
– *.seedalliance.net
– *.apidt.org
9
The VRP layout (3/5)
• Out of Scope
– 3rd party sites such as Lets Encrypt, Okta, Cloudflare,
Zoom, or similar
• If you inadvertently find an issue with these sites while testing APNIC,
we’d like to hear about it. However, we cannot provide permission to
test these third parties.
– Destruction of data
– DoS/DDoS
– Social engineering
– Physical security controls
10
The VRP layout (4/5)
• Report Details
– Repeated the csirt email address
– “We would appreciate it if your report included the
following information”
• Your contact information, so we can follow up with questions
• A description of the issue and its nature
• Detailed steps that allow us to reproduce the issue
• A brief description of the security impact of the issue
– “As a not-for-profit, we can’t pay out major bounties, but we really
appreciate your help in safeguarding our systems.”
11
The VRP layout (5/5)
• Safe Harbor
– If you conduct vulnerability research that is in scope, and
– if you report your findings to us in a timely manner
– We will consider this authorised, and
– promise not to take legal action against you
12
Making the VRP accessible
• Generated and published a GPG key for encrypted email
• Creation of a security.txt file with the help of securitytxt.org
13
Who is on the receiving end of reports?
• The IT teams will receive reports in our ticketing system
– csirt@apnic.net already existed, but not publicly used
• The IT teams will manage upgrades of 3rd party software
• What about the code APNIC creates internally?
• THE DEVELOPERS!
– Oh hey, developers, we didn’t forget about you (honest)
– Can we inject security patching procedures into your development cycle?
– Can we impose time frames for confirming vulnerabilities, fixing
vulnerabilities, testing, and pushing into production?
14
A premature birth
• Just 5 days before the VRP web page is published, a
vulnerability report is sent to csirt@apnic.net
– Stored self-XSS (Cross Site Scripting) in a display name field
• Early test of our vulnerability report handling procedures
• Added a Thank You section to the VRP page, with our early
bird security researcher as the first entry.
15
Thanks Denny!
The (actual) birth of the APNIC VRP!
• VRP web page quietly went live on 28/07/2020
– https://www.apnic.net/community/security/apnic-vulnerability-reporting-program/
• APNIC Blog post on 03/08/2020
– https://blog.apnic.net/2020/08/03/apnic-launches-vulnerability-reporting-program/
16
A slow controlled start
17
Note: these numbers are based on first reports of unique validated security vulnerabilities
0
2
4
6
8
10
12
14
07/2020
08/2020
09/2020
10/2020
11/2020
12/2020
01/2021
02/2021
03/2021
04/2021
05/2021
06/2021
07/2021
08/2021
09/2021
10/2021
11/2021
12/2021
Number of Vulnerability Reports (monthly)
0
10
20
30
40
50
60
70
80
90
07/2020
08/2020
09/2020
10/2020
11/2020
12/2020
01/2021
02/2021
03/2021
04/2021
05/2021
06/2021
07/2021
08/2021
09/2021
10/2021
11/2021
12/2021
Number of Vulnerability Reports (monthly)
Number of Reports Cumulative Number of Reports
A slow controlled start
18
81
Types and severities of vulnerabilities
• 16 x Information Disclosure
• 10 x Reflected XSS
• 5 x Denial of Service
• 5 x Stored XSS
• 4 x Clickjacking
• 3 x P1 vulnerabilities
– SQL Injection
– Sensitive Information Disclosure
19
0
5
10
15
20
25
30
35
40
P1 P2 P3 P4 P5
Vulnerabilities by Severity
P1 Incident that went public
20
Types and severities of vulnerabilities
• 16 x Information Disclosure
• 10 x Reflected XSS
• 5 each of:
– Denial of Service
– Stored XSS
• 4 each of:
– Clickjacking
– CSRF
21
• 1 each of:
– Exposed admin panel
– Exposed Kibana instance
– Host header poisoning
– Insecure cookie setting
– Insecure Direct Object References
– Leaking info via referrer
– localhost DNS record can lead to XSS
– Missing HSTS
– Open redirect
– REST API exposed
– Subdomain takeover
– Unrestricted file upload
– Unsafe Cross-Origin Resource Sharing
– Weak password policy
• 3 each of:
– Bypass business logic
– Email flood - lack of rate limiting
– WP xmlrpc.php exposed
• 2 each of:
– Cached data access after logout
– Conject injection
– Cookie stealing
– Missing SPF
– No expire after pw change
– Sensitive information disclosure
– SQL injection
Who reported the vulnerabilities
• 45 security researchers sent in single reports
• 9 security researchers sent in two reports each
• 3 security researchers sent in three reports each
• 1 security researcher sent in four reports
• 1 security researcher sent in five reports
• Most multiple reports came in on the same day
– Half for the same service, half for different services
• We also received 33 duplicate reports
– Mostly relating to original reports received in the first 4 months
22
Note: these numbers are based on first reports of unique validated security vulnerabilities
Lessons learned
• VRPs / VDPs are useful to complement existing security tools
and practices
• Good communication with internal stakeholders is important
– Before, during, and after launch
• Standard operating procedures and response templates ensure
consistent handling of reports and reporters
• Bounties aren’t required to launch a VRP
• Management reporting gets harder with more reports and details
23
What’s happened since?
• At around the one year mark of operations, APNIC compared
the services of vulnerability coordination vendors
• HackerOne was selected to receive, validate, and triage
vulnerability reports for APNIC
– They also provide reporting and privately advertise to their researchers
• Triaged reports are sent to our IT team who then route the
report to the appropriate product development team
24
What’s happened since?
• The VRP web page has been updated to include the
HackerOne submission form, in preference to csirt@
• The Out of Scope list has been expanded
– “Working as intended” items such as FTP directory listing
– Rate limiting issues on non-authenticated endpoints
– Missing security flags on cookies that don’t relate to authentication
• The Thank You / Hall of Fame list has grown
• APNIC is more secure
25
Questions & Discussion
26

Contenu connexe

Similaire à MyNOG 9: Vulnerability Reporting Program on a Shoestring Budget

Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureDevOps.com
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application SecurityJim Kaplan CIA CFE
 
Spatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformitySpatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformityIlkka Rinne
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...Synopsys Software Integrity Group
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controlsEnclaveSecurity
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...SaraPia5
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemDenim Group
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksSynopsys Software Integrity Group
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldAgile Testing Alliance
 
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...NETWAYS
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayZivaro Inc
 

Similaire à MyNOG 9: Vulnerability Reporting Program on a Shoestring Budget (20)

Open Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure CultureOpen Source Security: How to Lay the Groundwork for a Secure Culture
Open Source Security: How to Lay the Groundwork for a Secure Culture
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
Spatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE ConformitySpatineo Webinar: Shedding Light on INSPIRE Conformity
Spatineo Webinar: Shedding Light on INSPIRE Conformity
 
Fortify technology
Fortify technologyFortify technology
Fortify technology
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
More practical insights on the 20 critical controls
More practical insights on the 20 critical controlsMore practical insights on the 20 critical controls
More practical insights on the 20 critical controls
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
TIC-TOC: Disrupt the Threat Management Conversation with Dominique Singer and...
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Managing Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix EcosystemManaging Your Application Security Program with the ThreadFix Ecosystem
Managing Your Application Security Program with the ThreadFix Ecosystem
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
ATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real WorldATAGTR2017 Security Testing / IoT Testing in Real World
ATAGTR2017 Security Testing / IoT Testing in Real World
 
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
Nagios Conference 2007 | Enterprise Application Monitoring with Nagios by Jam...
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
GTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech DayGTRI Splunk Case Studies - Splunk Tech Day
GTRI Splunk Case Studies - Splunk Tech Day
 

Plus de APNIC

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
 

Plus de APNIC (20)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry System
 

Dernier

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 

Dernier (10)

『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 

MyNOG 9: Vulnerability Reporting Program on a Shoestring Budget

  • 1. 1 Vulnerability Reporting Program on a Shoestring Budget Insights from the creation and first year of APNIC’s VRP MyNOG 9 19 Sept 2022 Jamie Gillespie, Internet Security Specialist, APNIC
  • 2. About APNIC • APNIC is the Regional Internet Registry (RIR) for the 56 economies that makes up the Asia Pacific region – Distributes and manages IP address – Not-for-profit, purposefully open and transparent – Approx 120 staff, mostly in Brisbane Australia – Multiple data centres in Australia and internationally – IaaS hosting on AWS and GCP, multiple SaaS applications/vendors – Not just web sites, but also VPN, SMTP, DNS, FTP, whois, RPKI and even rsync 2
  • 3. In the beginning… • APNIC has an internal IT team (actually two of them) – Internal vulnerability scanning – External penetration tests • APNIC also has developers writing new applications • APNIC CSIRT was created internally to formalise incident response procedures, and overall information security work 3
  • 4. Early vulnerability reports • Without a proper security point of contact, security researchers would email privacy@ or even hr@ addresses • Occasional scam email would come in too 4
  • 5. Conception of the VRP • We should have a point of contact for security researchers • But we’ll need to advertise it somehow • We’ll also need to set some rules • This sounds like a bug bounty program • Hmmm… but we can’t pay out bounties like the big profit driven companies can • Would a bug bounty program without the bounties work? 5
  • 6. Conception of the VRP • The APNIC Vulnerability Reporting Program! – aka Vulnerability Disclosure Program / VDP • Reading many other program texts led to a draft VRP • Circulated draft to IT teams for feedback and improvements • Used an early template from disclose.io for Safe Harbor – disclose.io now have entire VDP generators and templates • Got the APNIC Legal Team involved to approve the wording 6
  • 7. The VRP layout • Background of APNIC • Introduction of the VRP – “Bug Reporting” • In Scope • Out of Scope • Report Details • Safe Harbor 7
  • 8. The VRP layout (1/5) • Background of APNIC – Who we are, what we do • Introduction of the VRP – “Bug Reporting” – “We value the hard work of the security research community, and welcome responsible disclosure of any vulnerabilities in our products and services.” – Please use csirt [at] apnic.net – “We aim to reply to all reports within 7 days, and to resolve reported P1-P4 vulnerabilities within 90 days” 8
  • 9. The VRP layout (2/5) • In Scope – *.apnic.net – *.apnic.foundation – *.isif.asia – *.seedalliance.net – *.apidt.org 9
  • 10. The VRP layout (3/5) • Out of Scope – 3rd party sites such as Lets Encrypt, Okta, Cloudflare, Zoom, or similar • If you inadvertently find an issue with these sites while testing APNIC, we’d like to hear about it. However, we cannot provide permission to test these third parties. – Destruction of data – DoS/DDoS – Social engineering – Physical security controls 10
  • 11. The VRP layout (4/5) • Report Details – Repeated the csirt email address – “We would appreciate it if your report included the following information” • Your contact information, so we can follow up with questions • A description of the issue and its nature • Detailed steps that allow us to reproduce the issue • A brief description of the security impact of the issue – “As a not-for-profit, we can’t pay out major bounties, but we really appreciate your help in safeguarding our systems.” 11
  • 12. The VRP layout (5/5) • Safe Harbor – If you conduct vulnerability research that is in scope, and – if you report your findings to us in a timely manner – We will consider this authorised, and – promise not to take legal action against you 12
  • 13. Making the VRP accessible • Generated and published a GPG key for encrypted email • Creation of a security.txt file with the help of securitytxt.org 13
  • 14. Who is on the receiving end of reports? • The IT teams will receive reports in our ticketing system – csirt@apnic.net already existed, but not publicly used • The IT teams will manage upgrades of 3rd party software • What about the code APNIC creates internally? • THE DEVELOPERS! – Oh hey, developers, we didn’t forget about you (honest) – Can we inject security patching procedures into your development cycle? – Can we impose time frames for confirming vulnerabilities, fixing vulnerabilities, testing, and pushing into production? 14
  • 15. A premature birth • Just 5 days before the VRP web page is published, a vulnerability report is sent to csirt@apnic.net – Stored self-XSS (Cross Site Scripting) in a display name field • Early test of our vulnerability report handling procedures • Added a Thank You section to the VRP page, with our early bird security researcher as the first entry. 15 Thanks Denny!
  • 16. The (actual) birth of the APNIC VRP! • VRP web page quietly went live on 28/07/2020 – https://www.apnic.net/community/security/apnic-vulnerability-reporting-program/ • APNIC Blog post on 03/08/2020 – https://blog.apnic.net/2020/08/03/apnic-launches-vulnerability-reporting-program/ 16
  • 17. A slow controlled start 17 Note: these numbers are based on first reports of unique validated security vulnerabilities 0 2 4 6 8 10 12 14 07/2020 08/2020 09/2020 10/2020 11/2020 12/2020 01/2021 02/2021 03/2021 04/2021 05/2021 06/2021 07/2021 08/2021 09/2021 10/2021 11/2021 12/2021 Number of Vulnerability Reports (monthly)
  • 19. Types and severities of vulnerabilities • 16 x Information Disclosure • 10 x Reflected XSS • 5 x Denial of Service • 5 x Stored XSS • 4 x Clickjacking • 3 x P1 vulnerabilities – SQL Injection – Sensitive Information Disclosure 19 0 5 10 15 20 25 30 35 40 P1 P2 P3 P4 P5 Vulnerabilities by Severity
  • 20. P1 Incident that went public 20
  • 21. Types and severities of vulnerabilities • 16 x Information Disclosure • 10 x Reflected XSS • 5 each of: – Denial of Service – Stored XSS • 4 each of: – Clickjacking – CSRF 21 • 1 each of: – Exposed admin panel – Exposed Kibana instance – Host header poisoning – Insecure cookie setting – Insecure Direct Object References – Leaking info via referrer – localhost DNS record can lead to XSS – Missing HSTS – Open redirect – REST API exposed – Subdomain takeover – Unrestricted file upload – Unsafe Cross-Origin Resource Sharing – Weak password policy • 3 each of: – Bypass business logic – Email flood - lack of rate limiting – WP xmlrpc.php exposed • 2 each of: – Cached data access after logout – Conject injection – Cookie stealing – Missing SPF – No expire after pw change – Sensitive information disclosure – SQL injection
  • 22. Who reported the vulnerabilities • 45 security researchers sent in single reports • 9 security researchers sent in two reports each • 3 security researchers sent in three reports each • 1 security researcher sent in four reports • 1 security researcher sent in five reports • Most multiple reports came in on the same day – Half for the same service, half for different services • We also received 33 duplicate reports – Mostly relating to original reports received in the first 4 months 22 Note: these numbers are based on first reports of unique validated security vulnerabilities
  • 23. Lessons learned • VRPs / VDPs are useful to complement existing security tools and practices • Good communication with internal stakeholders is important – Before, during, and after launch • Standard operating procedures and response templates ensure consistent handling of reports and reporters • Bounties aren’t required to launch a VRP • Management reporting gets harder with more reports and details 23
  • 24. What’s happened since? • At around the one year mark of operations, APNIC compared the services of vulnerability coordination vendors • HackerOne was selected to receive, validate, and triage vulnerability reports for APNIC – They also provide reporting and privately advertise to their researchers • Triaged reports are sent to our IT team who then route the report to the appropriate product development team 24
  • 25. What’s happened since? • The VRP web page has been updated to include the HackerOne submission form, in preference to csirt@ • The Out of Scope list has been expanded – “Working as intended” items such as FTP directory listing – Rate limiting issues on non-authenticated endpoints – Missing security flags on cookies that don’t relate to authentication • The Thank You / Hall of Fame list has grown • APNIC is more secure 25