Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security

New Log4J Flaw Caps Year of Relentless Cybersecurity Crises (wsj.com) 77

'Exhausted' network defenders say technological dependency creates new vulnerabilities. From a report: Cyberattacks on major technology providers and the interconnected world of software and hardware that power the global economy continued at a relentless pace in 2021, according to U.S. officials and security experts. Instead of one company being victimized at a time like in a traditional data breach, thousands were often exposed simultaneously. Businesses, hospitals and schools also worked to defend themselves against an onslaught of ransomware attacks, which increasingly reap $10 million or more in extortion payments. The annus horribilis culminated this month with discovery of a flaw in an obscure but widely used internet code known as Log4j, which one senior Biden administration official said was the worst she had seen in her career. The latest vulnerability comes as U.S. officials warn corporate leaders of a potential surge of cyberattacks while businesses slow their operations during the holiday season.

The string of incidents highlights how decades of digital transformation have linked business and government computer systems in opaque and sometimes surprising ways that will create new vulnerabilities. Major disruptions are certain to continue, cybersecurity officials said. "Network defenders are exhausted," said Joe Slowik, threat-intelligence lead at the security firm Gigamon. New attention and investment in cybersecurity hasn't improved the status quo, he said. "Money is flowing into the field, but largely on technical solutions while the core need -- more capable people -- remains hard to address."

This discussion has been archived. No new comments can be posted.

New Log4J Flaw Caps Year of Relentless Cybersecurity Crises

Comments Filter:
  • this wouldn't happen if we had better architects, that take security seriously...
    In how many companies is security not bothered with on the altar of reducing spending ?

    • by Z00L00K ( 682162 ) on Friday December 24, 2021 @02:44AM (#62111469) Homepage Journal

      For more info on the subject I suggest watching the Computerphile video: https://www.youtube.com/watch?... [youtube.com]

    • by Krishnoid ( 984597 ) on Friday December 24, 2021 @03:18AM (#62111495) Journal

      There is a perception in both the private and government sector, that security, both physical and digital, is something you can buy. Witness the mammoth growth of airport security products following 9/11, and the sheer number of vendors at security conferences. With that, government officials and corporate executives often think you can simply buy products and magically get instant security by flipping on the switch. The reality is that security is not something you can buy; it is something you must get.

      -- Bruce Schneier, Schneier on Security [schneier.com]

    • We need better people! People who would never think to violate another persons property. Either digital or in the real world.
    • It isn't the problem with people that know (including Architects), but the people that THINK they know, but don't.

      Then there is the next level of bullshit, once its hits the MBA level, then knowing is a positive hindrance. If you do actually know something, one cannot indeed hit that level. If you do, you lose something on the way. "Did you ever hear the tragedy of Darth Plagueis The Wise? I thought not. Itâ(TM)s not a story the MBA would tell you."

      • Nah, real world experience says either people don't care, or they aren't paid to care. Worked for ViaSat and was literally told that there are more important things, like getting more subscribers.
      • by jythie ( 914043 )
        Though one of the big problems is that many people think they know, and people who know they do not know do not really have a good way to evaluate them.
    • this wouldn't happen if we had better architects, that take security seriously... In how many companies is security not bothered with on the altar of reducing spending ?

      Security, even today, is still viewed as a FUD product. And you usually can't sell it until that Doubt is confirmed by an attack bad enough that a judge orders it. And to be quite honest, Greed N. Corruption doesn't really give a shit when most of the impact flows away from them like water running off a CxOs golden parachute.

      And remember the most obvious problem; his wouldn't happen if users were smarter and actually gave a shit about security or privacy. They're still not, and it's getting worse. The b

    • by hey! ( 33014 )

      We need better people every kind of position. Good people are both shockingly expensive and at the same time a bargain; it's a question of your planning horizon. Most organizations try to solve a problem with the cheapest labor possible, which is a short term optimization.

      The problem is there isn't enough of people with high level thinking skills. Obviously the way to address that with education, but the focus on incorporating more STEM subject matter into lower education isn't going help much; it's only

  • I mean, no one has ever audited the repo for Log4J. This remote execution has been in there for a while. It was only when somone was trying to hack the old Java version of Minecraft that the guy found it.

    Still.. While I don't get why log4j2 is getting all the flack. From the code and what I read, its just because of older versions of Java that were patched. Not to say going from 8 to 9 is easy.

    • by pjt33 ( 739471 )

      It would be more accurate to say that it's because it's because log4j was trying too hard to be "enterprise", so the default configuration enabled some really powerful functionality that only a small minority of users would want.

    • From the code and what I read, its just because of older versions of Java that were patched.
      Yes, some idiots claimed that. But it is not. It is a "feature" in log4J that has nothing to do there and got abused as bug/exploit.
      The background is two fold:
      a) that log4j version can load java classes remotely (why the programmers even added that feature: beyond me) - via ldpa
      b) log4j supports pattern substitution, so you can have a message like log("we are here ${context.variable}" + some _text); and during logging that pattern gets expanded.

      Unfortunately, that variable some_text might be data from an untrusted source, and the idiotic programmers thought: they do pattern expansion inside of those texts/variables, too!!

      If I understand it correctly, if an outsider can smuggle something like "ldap.POT://some.remote.host.com:my.bad.class.HackIt" into the variable some_text above, log4J will try to expand it and load the referenced class via ldap, a complete braindead idea by the programmers.

      • Bloat. Pure and simple. This is why Unix's original premise to have many small tools that each did very, very specific things, was brilliant in a number of ways. It's ridiculous that a library for logging can basically be turned into a shell or OS capable of loading and executing code from any remote location.

        Trying their hardest to adhere to Zawinski's Law apparently.

        Ironically he also said this:

        Some people, when confronted with a problem, think "I know, I'll use regular expressions." Now they have two problems.

        • It's ridiculous that a library for logging can basically be turned into a shell or OS capable of loading and executing code from any remote location.
          Yes, it is ridiculous.

          Consider the time spent to even implement that useless feature.

          Somehow I have the feeling the "exploit" was placed there intentionally.

          • Consider the time spent to even implement that useless feature.

            Somehow I have the feeling the "exploit" was placed there intentionally.

            I doubt it took much time at all. JNDI already existed to handle the remote fetch and execute. Log4j just used JNDI.

            As for why they did that. I'm going on a hypothetical here. Assume someone has 100 servers and they want to send an email when something happens. So they code up a e-mailer class that would now have to be pushed out to all 100 servers on every patch.

            How about instead of updating all 100 servers, we have the servers pull down the e-mailer when that thing happens. That way we don't have to

            • by narcc ( 412956 )

              As for why they did that. I'm going on a hypothetical here. Assume someone has 100 servers and they want to send an email when something happens. So they code up a e-mailer class that would now have to be pushed out to all 100 servers on every patch.

              How about instead of updating all 100 servers, we have the servers pull down the e-mailer when that thing happens. That way we don't have to patch all 100 servers every time, they will all pull the update automatically. Marvelous! Time saved! Scheduling update windows no longer needed!

              Why would anyone think that was good idea? Why?! There are countless better ways to accomplish the same thing safely and with less effort.

              There's no hope for the future, is there?

              • The only hope I see is that people start learning from these kinds of mistakes.

                And by "people" I include management, in spite of some evidence. :)

                Management often hamstrings the efforts of experienced developers to design for security, reliability, flexibility, maintainability, and longevity.

                I wish they wouldn't keep doing that. But most of them probably will, especially if they keep getting credit for minimizing costs and time to market, but not accountability for the harm that results from the resulting

        • Sadly, the time-tested "Unix's original premise" on Linux gave way to systemd some time ago on nearly all mainstream distributions.

          I continue to use Gentoo in part for that reason; it is not systemd-based by default, though systemd is becoming more popular within the Gentoo ecosystem. I've been able to avoid it thus far.

          It does still live on in the world of object-oriented programming, as the "single responsibility principle," whereby each class is supposed to do one thing well and to have minimal dependen

      • by jythie ( 914043 )
        ugh.. the 'load classes remotely' thing I can unfortunately see. a while back i was working at a big tech company that really had a culture of 'wow, 3rd party instantiation in java is great, we should use it for everything!'.. so their whole infrastructure was built around a bunch of xml files and loaders, some of which were indeed remote. It was like magic you could configure one service to tell another service to dynamically load arbitrary classes and poof you could make things do stuff without reloadin
        • You can do that in .NET also, but I would consider that a very bad practice, unless you use code signing or some other way to validate the classes you're about to load.

          Note: I've worked on more than one Java system (NOT for my current employer) where bits of code were stored in a database, so we could do things like change the names of report header columns without having to re-test and re-deploy the entire system. Of course there were likely much better ways to achieve the same result, like separating the

      • that log4j version can load java classes remotely (why the programmers even added that feature: beyond me) - via ldpa

        I don't know how it got into log4j exactly, but it's a common "feature" in object serialization libraries, in many languages, and it always comes with security vulnerabilities.

        • Log4J is supposed to only log text. It does not (de-)serialize objects.

          In object deserialization something like this could happen, if you can compromise the classpath. But that would not work remotely.

    • I think you misunderstand the relationship to Java. The Java side of this was also patched in Java 8, back in October 2018, so there was no need to jump Java versions.

      The Log4j side of the problem is that Log4j thought it was a clever idea to enrich log entries by fetching information via JNDI/LDAP across the network. It apparently did not bother with any sort of checking or sanitizing: just fetch and blindly trust. This was inexcusably stupid.

      The Java side of this was allowing Java code to be loaded vi

      • Or (b) they did install those updates, and then deliberately opened the barn door by re-enabling JDNI/LDAP code execution. In either case, inexcusably stupid.
        Actually not stupid. Because they would not know that log4J had this bug/feature/exploit. Remember: it got discovered just a few weeks ago.
        AND, there are plenty of reasons why you want to load classes via JDNI, for starters: JNDI is exactly designed to do that. However the problem is that people needing such features should have their services running

      • Library dependency hell is not only still a real thing, but inadvertently creating it is now considered a "best practice" by some.

        "Don't reinvent the wheel. Let a library do it." This isn't always bad advice, but it absolutely does need to be balanced by an understanding of the ENTIRE dependency graph and the problems that might result from any security, compatibility, versioning, "diamond dependency," or other issues anywhere within that graph . . . often in parts that devs tend not to see or use directl

    • by jythie ( 914043 )
      I though it was not found in minecraft, but instead mojang was the first company to warn its users.
  • was the worst she had seen in her career. Even after 2 weeks, we still don't even know what it was used for..
    • by ebvwfbw ( 864834 )

      was the worst she had seen in her career. Even after 2 weeks, we still don't even know what it was used for..

      It's the Biden admin. Who are they kidding? It was also the first one she's ever seen I bet. I'm sure they didn't hire a real security person. This administration is so full of fakes it's not funny.

      I can think of a bunch that was worse. Off the top of my head, Solar winds come to mind. That threw a bunch of agencies and companies into a whirlwind. Much worse than this one.

  • Another consequence of such wide spread vulnerabilities is that another menace that has already brought the Internet to its knees before becomes feasible again. A self replication worm exploiting this kind of vulnerability could bring our whole digital infrastructure down. The difference with 1988 is that practically our whole world is now depending on it.

    https://en.wikipedia.org/wiki/... [wikipedia.org]

  • The problem is mainly that servers, especially Windows servers, do not run with MAC enabled. Yes, Windows has MAC, it doesn't work well, since the implementation is flawed, but it does help to limit damage in cases like these. Linux servers all have MAC (SELinux/AppArmor) enabled by default, and then frequently disabled by clueless admins.
    • The exploit code is a deserialised object running the in JVM. Not sure SELinux will make too much difference - this all happens in the JVM. SELinux can only enforce rules at that level.

      And yes, you could lock down the JVM so it doesn't have network access (in which case the exploit wouldn't work), but that may not be practical depending on the app. And if the exploit does run, and the attackers gets code execution then they just need to find an LPE to get around SELinux. In that case, a good SELinux config

      • This raises a good point, access control really needs to include actions inside the VM. The old as400's did this because the VM was essentially the OS so all objects (regardless of language etc.) had the access control rules applied.
  • by ClueHammer ( 6261830 ) on Friday December 24, 2021 @03:57AM (#62111545)
    Santa was arrested today after being caught using the New Log4J Flaw to further his research into who is naughty and who is nice, When questioned as to why he was compelled to do this did this Santa replied "I had no choice, as neither facebook or google had this one key bit of information, but they had everything else."
    • Don't kid yourself. Both Facebook and Google have the information on whether you've been naughty or nice. They just prefer to use that to sell ads to coal companies (a big season for them - lumps of coal don't sell very well otherwise) rather than just give it to Santa.

  • by loufoque ( 1400831 ) on Friday December 24, 2021 @04:11AM (#62111565)

    The way I see it, the problem is that log4j, like most other logging libraries out there, has formatting built into its logging.

    That's just a terrible idea, which leads to similar problems as that of SQL injection etc.

    The correct way to do logging, in my opinion, is to record serialized objects rather than a formatted string.

    • by nagora ( 177841 )

      The way I see it, the problem is that log4j, like most other logging libraries out there, has formatting built into its logging.

      That's just a terrible idea, which leads to similar problems as that of SQL injection etc.

      The correct way to do logging, in my opinion, is to record serialized objects rather than a formatted string.

      Unless you mean something else, I don't see formatting as being related to this issue at all, and making logs binary introduces more dependencies and thus more potential holes.

      Log4j was trusting URLs and fetching from them. That's insane.

      • I never suggested making the log use a binary format, though of course that becomes possible with such a system too.

        • I never suggested making the log use a binary format, though of course that becomes possible with such a system too.

          You mentioned logging serialized objects. In Java, that's pretty much putting binary - well, java bytecode - directly into the log since Java has ways to save/load serialized classes.

          That's actually what caused a massive security flaw in Apache Struts years ago as people were serializing a Java class and then including it in the headers of HTTP requests. Which meant the server would run the class before checking the user permissions.

    • The correct way to do logging, in my opinion, is to record serialized objects rather than a formatted string.

      This exploit is in the (unexpected) deserializing of an object. Inevitably if you log a serialized object, you're going to want to deserialize it later... what could possibly go wrong? For my use of logs (diagnosing what went wrong after the fact), plain text is good for me. There are few exploits available when opening up a text file (no doubt there is something possible in many editors, probably with malformed Unicode).

      The real flaw is that the format string could wind up executing arbitrary code based on

      • We're talking about different types of serialization.

        Deserializing should not allow arbitrary code evaluation like was happening in this case.

        • by Shaeun ( 1867894 )

          We're talking about different types of serialization.

          Deserializing should not allow arbitrary code evaluation like was happening in this case.

          but in reality, your premise is correct. Deserialization should never allow arbitrary code to run.

    • Not necessarily a bad idea, but you need to be restrictive.
      Sometimes you'd like to format certain information like client IP address or timestamp, and that's useful. But don't overdo it.

    • by _xeno_ ( 155264 )

      The correct way to do logging, in my opinion, is to record serialized objects rather than a formatted string.

      So just so you know, under the hood, that's exactly how log4j2 works. Sort of.

      What gets logged is ultimately a LogEvent [apache.org] object. (LogEvent is an interface, not an actual class.) It's essentially a formatted string message with a whole bunch of other metadata about the event being logged attached to it - think log level, time it happened, where it happened, that kind of stuff.

      The problem wasn't in logging a "formatted string." The problem wasn't the "formatting." The problem was that, for some unknown reason,

  • Freebies (Score:4, Informative)

    by chill ( 34294 ) on Friday December 24, 2021 @06:06AM (#62111641) Journal

    A big problem is commercial vendors treating open source code as free, not of cost, but of responsibility. They use it so they don't have to commit resources to coding that function themselves, but then wash their hands at it. Log4j is a great example. There wasn't one application in our environment that had the latest version before this debacle. I counted half a dozen 2.x and another handful of 1.x, but none had been upgraded behind what worked for them when they built their app.

    Even though the FOSS developers were providing free updates and patches, nobody bothers to update the components unless something breaks in their app. Testing a point update takes time, and time is money, and they aren't spending money unless absolutely forced.

    Add to that the overall fragility of commercial applications... One of our major vendors we constantly fight with because while their app runs on Red Hat, we apply CIS hardening to all our systems and that breaks their application. So, in an effort to help, we the customer, went thru step-by-step to figure out exactly what hardened config was breaking their app and gave them all the information. They did nothing with it. It turns out their one-button patching/upgrade process is dependent on a generic RHEL install and that breaks differently. Per our support contract they ended up having to manually patch our system and it took them three days instead of an hour.

    The best hope I see on the horizon is the feds demanding software bill of materials for anything sold to them. Then we can see all the out of date components the lazy, cheap bastards are using and say "patch that shit".

    Up to date patching and configuration are by far and away the two most effective security steps you can take. Damn near every one of the CISA alerts say the same thing -- patch and configure. Just do it.

    • I counted half a dozen 2.x and another handful of 1.x, but none had been upgraded behind what worked for them when they built their app.

      Even though the FOSS developers were providing free updates and patches, nobody bothers to update the components unless something breaks in their app. Testing a point update takes time, and time is money, and they aren't spending money unless absolutely forced.
      I don't think it has anything to do with money and free.

      It is a matter of culture. Supposed a freshling comes from

      • Newever versions, e.g. for log4J, suprisingly do not fix automatically unknown bugs (aka exploits).
        Yes, but there are a bunch of other vulns in the older versions that would be fixed. 0-days are what defense in depth is for, but there are tons of unpatched, known vulnerabilities out there. See : https://duo.com/decipher/cisa-orders-federal-agencies-to-patch-hundreds-of-known-flaws [duo.com]

        So, regarding culture: if you run an organization in a head position, you can demand that stuff gets audited and upgraded as soon as a new library is out and considered "stable". But you, or someone you are superior too, has to damn do it! Otherwise the software stays as it is.

        I'm trying. We've just implemented a toll called Sonatype which tracks component versions, licenses, compatibilities, etc. We're very aggressively pushing an "keep every component updated" policy.

        That would never have happened in any system I was involved in. And as the logs are audited: strange expansions most likely would been seen.

        Really? Be honest. We have around 200 servers and monitor the logs but there are literally millions of entries every day. How quickly do you expect to catch the occasional odd expansion? Needle in a haystack doesn't do this justice.

        • by Shaeun ( 1867894 )

          Newever versions, e.g. for log4J, suprisingly do not fix automatically unknown bugs (aka exploits). Yes, but there are a bunch of other vulns in the older versions that would be fixed. 0-days are what defense in depth is for, but there are tons of unpatched, known vulnerabilities out there. See : https://duo.com/decipher/cisa-orders-federal-agencies-to-patch-hundreds-of-known-flaws [duo.com]

          So, regarding culture: if you run an organization in a head position, you can demand that stuff gets audited and upgraded as soon as a new library is out and considered "stable". But you, or someone you are superior too, has to damn do it! Otherwise the software stays as it is.

          I'm trying. We've just implemented a toll called Sonatype which tracks component versions, licenses, compatibilities, etc. We're very aggressively pushing an "keep every component updated" policy.

          That would never have happened in any system I was involved in. And as the logs are audited: strange expansions most likely would been seen.

          Really? Be honest. We have around 200 servers and monitor the logs but there are literally millions of entries every day. How quickly do you expect to catch the occasional odd expansion? Needle in a haystack doesn't do this justice.

          Though to be fair, it can be done by doing a frequency analysis of the log messages themselves. This condenses the messages quite a bit. Added to that is you should know what messages you are likely to get, parse out what you know is there, and then investigate what is left.,
          It's just frequency analysis on log files. Literally something you should be doing anyway.

        • Really? Be honest. We have around 200 servers and monitor the logs but there are literally millions of entries every day. How quickly do you expect to catch the occasional odd expansion? Needle in a haystack doesn't do this justice.
          That is actually extremely easy if you indeed "eye ball" monitor your logs.
          Basically everything that is unexpected causes an monsterous visual glitch on a scrolling text output.

      • All software requires ongoing maintenance, for these amongst many other reasons.

        But management often won't pay for that maintenance. "It's not broke, so why 'fix' it?" Or, "We already paid for it once. Why should we have to pay again and again?" Car analogies should work, but for some reason they don't. "Of course I have to pay for gas. Of course I have to change the oil once in a while. But that's a car. This is software. It doesn't have physically movable parts. It's made out of ones and zeroes

        • I'm so sick of it that if I financially able, I would seriously consider a different career.
          Same for me :D

          Being a Software Consultant was a bad choice. It is kind of parody, they pay me for my advice but do not follow it. Then they fail, lol. Or half fail, most - hm, I think all - of my projects where deployed successfully, but not in the shape I hoped.

          • Isn't that the worst? I did consulting a couple decades back (yes, I'm that old). Same deal. I like to take pride in my work. But, whether working for an employer or a private client, it's almost always been a struggle to define projects and get the needed resources so as to allow for even the possibility of success. I push hard for that because I know how important it is. But not always with the greatest results.
            • whether working for an employer or a private client, it's almost always been a struggle to define projects and get the needed resources
              That never really was the problem, as that is often already set. But conducting and following technical advise, regardless if it is approach, architecture, tools or anything regarding sound craftsmanship always was a hardship.

              Often they did not knwo what a revision control system is - or how it is used properly: "Oh, Sourcesafe is not good?"

    • Spot on. I see the same thing on the Windows side. We recently purchased a well know Bar Code Scanner software package and it installs out of date and unsupported MSSQL components as well as a really old version of JQuery. In addition, applying the DISA STIGs breaks the application at multiple points. The company was notified and just didn't seem to care.
      • Wish I had a cup of coffee for every time I evaluated software (usually but not always proprietary), pointed out problems of a similar nature, and was told in essence, "screw you, you're just trying to weasel out of your responsibility, which will be to make this Just Work. No excuses. Just get 'er done."

        Also: management would usually like to think in terms of "buy or build" but it almost never works out that way. It's "buy and integrate," versus "build and integrate." Leaving the integration side out o

  • by cjonslashdot ( 904508 ) on Friday December 24, 2021 @07:10AM (#62111699)
    Software today is so brittle and vulnerable because of choices made decades ago. It did not have to be this way. https://cliffberg.medium.com/t... [medium.com]
  • If you keep adding infinite features onto a kludgy system, you get infinite complexity, and infinite security flaws.

  • So we just need to recruit more of them into the roles!

    Seriously: we need security firms to start offering college scholarships, work placements (paid internships) etc. The idea that competent CS undergrads get minimum wage jobs over the summer or at college should be an anathema; they need to be employed by companies early and effectively.

    Beyond that; those of us who are stock holders need to be writing to the CEO or CIO of companies we're invested in and asking them pointed questions about their policies,

"The whole problem with the world is that fools and fanatics are always so certain of themselves, but wiser people so full of doubts." -- Bertrand Russell

Working...