4.9 • 696 Ratings
🗓️ 9 November 2021
⏱️ 7 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Tuesday, November 9, 2021 edition of the Sansonet Storm Center's Stormcast. My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:14.2 | Today we've got a diary from Xavier talking about Palm the plugable of vacation modules. Now, this is a security feature and a security tool, |
0:24.4 | but Xavier talks about how attackers may abuse this tool. The way Palm works is that you're able |
0:33.2 | to set up configuration files for different services, so for example, SSH, LDAB, but also for |
0:39.4 | authentication actions like, for example, pseudo, and you can then define modules that will, for example, |
0:46.9 | check passwords, check multifactor authentication keys, or whatever you want to use for authentication. Of course, authentication is always |
0:56.7 | critical for security. An attacker able to manipulate these configuration files is highly dangerous. |
1:05.5 | In the simplest form, an attacker could, for example, just enable some weak authentication mechanisms, |
1:13.4 | and with that bypass some hardening that, for example, you took for SSH or other exposed services. |
1:22.8 | But then there are also some outright malicious palm modules, for example, Palm Steel, which, |
1:30.3 | well, as the name implies, steals your credentials. |
1:33.7 | The Palm modules, of course, have access to your credentials, because after all, they're used |
1:39.3 | to verify them. |
1:40.9 | And this very simple module, as Xavier mentions, only 40 lines of code, |
1:48.2 | allows the attacker to dump any credentials entered by the user into a flat file. Monitoring your |
1:55.9 | Palm configuration is certainly critical and something that should be done continuously. |
2:01.9 | Some kind of file integrity monitor is what Xavier here suggests. |
2:07.4 | And that's certainly a good idea. |
2:10.1 | Also, it's not just Linux. |
2:11.8 | A lot of Unix and BSD-like systems, like for example, MacOS are using this for authentication and definitely |
2:20.8 | treat all these configuration files as highly sensitive, and they should never really change. |
2:27.3 | So doing some kind of file integrity monitoring makes a lot of sense here. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.