This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SCG D BIGIP"

From OWASP
Jump to: navigation, search
(Remediation)
m (Typo etc)
 
(3 intermediate revisions by one other user not shown)
Line 15: Line 15:
  
 
== Common Misconfigurations ==
 
== Common Misconfigurations ==
=== BIG-IP persistence cookie information leakage ===
+
=== Persistence Cookie Information Leakage ===
 
==== Description ====
 
==== Description ====
  
Line 82: Line 82:
 
</pre>
 
</pre>
  
=== BIG-IP HTTP Server header information leakage ===
+
=== HTTP Server Header Information Leakage ===
 
==== Description ====
 
==== Description ====
  
Line 135: Line 135:
 
</pre>
 
</pre>
  
=== Administrative access to BIG-IP system via Internet ===
+
=== Access to management interface from Internet ===
 
==== Description ====
 
==== Description ====
  
Line 170: Line 170:
 
#* For all self IPs set "Port Lockdown" option to "Allow None".
 
#* For all self IPs set "Port Lockdown" option to "Allow None".
 
#* Click on "Update" button.
 
#* Click on "Update" button.
# If you need to administer BIG-IP using Self IPs you should also use private (RFC 1918) IP-address space
+
# If you need to administer BIG-IP using Self IPs you should also use private (RFC 1918) IP-address space.
# The most unsecure configuation is to use routable addresses on your Self-IPs. In this case it is highly recommended to lock down access to the networks that need it. To lock-down SSH and the GUI for a Self IP from a specific network. For examle, to permit access from network 192.268.2.0/24 it is necessary to perform the following commands in TMSH
+
# The most unsecure configuation is to use routable addresses on your Self-IPs. In this case it is highly recommended to lock down access to the networks that need it. To lock-down SSH and the GUI for a Self IP from a specific network. For examle, to permit access from network 192.268.2.0/24 it is necessary to perform the following commands in TMSH:
 
<pre>
 
<pre>
 
modify /sys sshd allow replace-all-with { 192.168.2.* }
 
modify /sys sshd allow replace-all-with { 192.168.2.* }
Line 178: Line 178:
 
</pre>
 
</pre>
  
=== Protection against HTTP host header attacks ===
+
=== HTTP host header insufficient validation ===
 
==== Description ====
 
==== Description ====
  
Host header in HTTP requests is not always validated by BIG-IP systems by default. This validation depends on enabled modules, features and their configuration: for example, BIG-IP system in APM portal access mode performs a base sanitization of HTTP host header against XSS attacks. In most cases BIG-IP systems handle HTTP request with arbitrar Host header. This weakness can lead to vulnerabilities which can be used in [http://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ different attacks based on HTTP Host header] (e.g., [http://www.ptsecurity.com/download/DNS-rebinding.pdf DNS Rebinding], [https://www.mehmetince.net/concrete5-reflected-xss-vulnerability-via-http-header-host-parameter/ XSS], [http://www.skeletonscribe.net/2013/05/practical-http-host-header-attacks.html password reset poisoning], etc).   
+
Host header in HTTP requests is not always validated by BIG-IP systems by default. This validation depends on enabled modules, features and their configuration: for example, BIG-IP system in APM portal access mode performs a base sanitization of HTTP host header against XSS attacks. In most cases, BIG-IP systems action HTTP requests with an arbitrary Host header. This weakness can lead to vulnerabilities which can be used in [http://www.acunetix.com/blog/articles/automated-detection-of-host-header-attacks/ different attacks based on HTTP Host header] (e.g., [http://www.ptsecurity.com/download/DNS-rebinding.pdf DNS Rebinding], [https://www.mehmetince.net/concrete5-reflected-xss-vulnerability-via-http-header-host-parameter/ XSS], [http://www.skeletonscribe.net/2013/05/practical-http-host-header-attacks.html password reset poisoning], etc).   
  
 
==== How to test ====
 
==== How to test ====
Line 277: Line 277:
 
# Log in to the Configuration utility.
 
# Log in to the Configuration utility.
 
# Navigate Access Policy > Customization > General. Change all "BIG-IP" substrings to some neutral strings.
 
# Navigate Access Policy > Customization > General. Change all "BIG-IP" substrings to some neutral strings.
# Navigate Access Policy > Customization > Advanced. Change strings with "BIG-IP" values. For example, go to the Customization Settings > Access profiles > /Common/<profile_name> > Logout > logout.inc. Change "<title>BIG-IP logout page</title>" to "<title>Logout page</title>".
+
# Navigate Access Policy > Customization > Advanced. Change strings with "BIG-IP" values.
 +
:: For example, navigate to the Customization Settings > Access profiles > /Common/<profile_name> > Logout > logout.inc. Change "<title>BIG-IP logout page</title>" to "<title>Logout page</title>".
  
 
+
=== APM session exhaustion DoS attack ===
=== Protection against APM session exhaustion DoS attack ===
 
 
==== Description ====
 
==== Description ====
  
Line 312: Line 312:
 
save /sys config
 
save /sys config
 
</pre>
 
</pre>
 +
 +
=== APM brute force attack ===
 +
==== Description ====
 +
 +
By default, BIG-IP APM virtual server with any type of authentication is vulnerable to brute-force password attack.
 +
 +
==== How to test ====
 +
 +
Burp Suite Intruder or similar tools can be used to perform brute force attack.
 +
 +
==== Remediation ====
 +
 +
The Minimum Authentication Failure Delay and Maximum Authentication Failure Delay options or CAPTCHA can be enabled to slow down or mitigate brute-force passwords attacks against BIG-IP APM.
 +
 +
To enable Minimum Authentication Failure Delay and Maximum Authentication Failure Delay options using the Configuration utility
 +
 +
# Log in to the Configuration utility.
 +
# Go to Access Policy > Access Profiles. Click a profile name.
 +
# Enable Minimum Authentication Failure Delay and Maximum Authentication Failure Delay options and change their values if necessary.
 +
# Click Update and then click Apply Access Policy.
 +
 +
To enable CAPTCHA using the Configuration utility
 +
 +
# Log in to the Configuration utility.
 +
# Go to Access Policy > CAPTCHA Configurations and create a new one.
 +
# Go to Access Policy > Access Profiles. Click Edit link for the profile name.
 +
# Click Logon Page. Set the created CAPTCHA configuration.
 +
# Click Apply Access Policy.
  
 
== References ==
 
== References ==

Latest revision as of 00:59, 3 December 2015

This article is part of the OWASP Secure Configuration Guide.
Back to the OWASP Secure Configuration Guide ToC: https://www.owasp.org/index.php/Secure_Configuration_Guide Back to the OWASP Secure Configuration Guide Project: https://www.owasp.org/index.php/OWASP_Secure_Configuration_Guide


Summary

The BIG-IP family of products offers the application intelligence network managers need to ensure applications are fast, secure and available. All BIG-IP products share a common underlying architecture, F5's Traffic Management Operating System (TMOS), which provides unified intelligence, flexibility and programmability. Together, BIG-IP's powerful platforms, advanced modules, and centralized management system make up the most comprehensive set of application delivery tools in the industry.

BIG-IP devices work on a modular system, which enables to add new functions as necessary to quickly adapt to changing application and business needs. The following modules are currently available for the BIG-IP system:

  • Application Acceleration Manager (AAM)
  • Advanced Firewall Manager (AFM)
  • Access Policy Manager (APM)
  • Application Security Manger (ASM)
  • Global Traffic Manager (GTM)
  • Link Controller (LC)
  • Local Traffic Manager (LTM)
  • Protocol Security Module (PSM)

Common Misconfigurations

Persistence Cookie Information Leakage

Description

An attacker can receive sensitive information about internal network via BIG-IP LTM persistence cookie.

To implement persistence sessions BIG-IP system inserts a cookie into the HTTP response, which well-behaved clients include in subsequent HTTP requests for the host name until the cookie expires. The cookie, by default, is named BIGipServer<pool_name>. The cookie is set to expire based on the time-out configured in the persistence profile. The cookie value contains the encoded IP address and port of the destination server [1] in one of the following format:

  • IPv4 pool members: BIGipServer<pool name> = <The encoded server IP>.<The encoded server port>.0000
  • IPv6 pool members: BIGipServer<pool name> = vi<The full hexadecimal IPv6 address>.<The port number calculated in the same way as for IPv4 pool members>
  • IPv4 pool members in non-default route domains: BIGipServer<pool name> = rd<The route domain ID>o00000000000000000000ffff<The hexadecimal representation of the IP address of the pool member>o<The port number of the pool member>
  • IPv6 pool members in non-default route domains: BIGipServer<pool name> = rd<The route domain ID>o<The full hexadecimal IPv6 address>o<The port number of the pool member>

Examples:

  • BIGipServer<pool_name>=1677787402.36895.0000
  • BIGipServer<pool_name>=vi20010112000000000000000000000030.20480
  • BIGipServer<pool_name>=rd5o00000000000000000000ffffc0000201o80
  • BIGipServer<pool_name>=rd3o20010112000000000000000000000030o80

After decoding of the BIG-IP persistence cookie value an attacker can receive an internal IP address, port number, and routed domain for backend servers. In some cases an attacker can also retreive sensitive informaion via <pool_name> suffix of the cookie name. For example, if an administrator give meaningful name to server pool (e.g. Sharepoint, 10.1.1.0, AD_prod) an attacker will get some additional information about network. Besides, an attacker detects that BIG-IP system is used in network infrustructure.

How to test

  1. Run intercepting proxy or traffic intercepting browser plug-in, trap all responses where a cookie is set by the web application.
  2. If possible, log in to web application and inspect cookies.
  3. Find a cookie with a name beginning with BIGipServer string or with a value that has one of the formats above (e.g., 1677787402.36895.0000 for IPv4 pool members scheme).
  4. Try to decode this value using available tools (e.g., Metasploit module for F5 BigIP Backend Cookie Disclosure, BeEF module for BigIP cookie disclosure or BurpSuitePro Plugin for Big IP Cookie Decoding).
  5. Inspect suffix of BIGipServer cookie name and verify that it does not contain any sensitive information about network infrustructure.

This example shows a GET request to BIG-IP with LTM module and a response containing BIGipServer cookie.

Example 1

GET /app HTTP/1.1
Host: x.x.x.x

Result Expected:

HTTP/1.1 200 OK
Set-Cookie: BIGipServerOldOWASSL=110536896.20480.0000; path=/

Here we can see that pool has the meaningful name OldOWASSL and get the following destination server address:

  • IP Address = 192.168.150.6
  • Port = 80

Remediation

Configuring secure cookie persistence by using the Configuration utility

  1. Log in to the Configuration utility.
  2. Navigate Local Traffic > Profiles > Persistence.
  3. Create new secure persistence profile with persistence type equals to "Cookie".
  4. Check the custom box for "Cookie Name" and enter a cookie name that does not conflict with any existing cookie names.
  5. Check the custom box for "Cookie Encryption Use Policy" and choose a "required" option. Enter a passphrase in "Encryption Passphrase" field.
  6. Click on "Finished" button.
  7. Assign created persistence profile to virtual server.

Configuring cookie persistence by using the TMSH

  1. Log in to TMSH.
  2. Run the following commands:
create ltm persistense cookie <profile_name>
modify ltm persistense cookie <profile_name> cookie-name <secure_cookie_name>
modify ltm persistense cookie <profile_name> cookie-encryption required
modify ltm persistense cookie <profile_name> cookie-encryption-passphrase <secure_passphrase>
modify ltm virtual <virtual_server> persist replace-all-with { <profile_name> }
save /sys config

HTTP Server Header Information Leakage

Description

An attacker can receive information that a web application is protected by BIG-IP system via HTTP Server header.

BIG-IP system uses different HTTP Profiles for managing HTTP traffic. In particular, BIG-IP system uses HTTP Profile that specifies the string used as the server name in traffic generated by LTM. The default value is equal to "BigIP" or "BIG-IP" and depends on BIG-IP system version. An attacker can detect that BIG-IP is used in network infrustructure and then know role, type, and version of the BIG-IP system.

How to test

  1. Run intercepting proxy or traffic intercepting browser plug-in, trap all responses from a web application.
  2. If possible, log in to web application and inspect HTTP responses.
  3. If Server header contains "BIG-IP" or "BigIP" value then BIG-IP is used.

This example shows a GET request to BIG-IP and a response containing Server header inserted by BIG-IP LTM.

Example 2

GET / HTTP/1.1
Host: x.x.x.x

Result Expected:

HTTP/1.0 302 Found
Server: BigIP
Connection: Close
Content-Length: 0
Location: /my.policy
Set-Cookie: LastMRH_Session=05da1fc5;path=/;secure
Set-Cookie: MRHSession=03e47713f1a8ef1aaa71cd9d05da1fc5;path=/;secure
Set-Cookie: MRHSHint=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/

Remediation

It is recommended to remove Server header from HTTP responses.

Removing Server header via Configuration Utility.

  1. Log in to the Configuration utility.
  2. Navigate Local Traffic > Profiles > Services > HTTP.
  3. Create new secure HTTP profile.
  4. Enter empry string in "Server Agent Name" field.
  5. Click on "Finished" button.
  6. Assign created HTTP profile to virtual server.

Removing Server header via TMSH

  1. Log in to TMSH.
  2. Run the following commands:
create ltm profile http <profile_name>
modify ltm profile http <profile_name> server-agent-name none
save /sys config

Access to management interface from Internet

Description

An attacker can access to BIG-IP management interface via Internet. This is can lead to different attacks on BIG-IP administrative tools, unauthorized access or mass enumeration of BIG-IP systems via search engines.

The BIG-IP system uses the following two network connection entry points [2]:

  • TMM switch interfaces
  • Management interface (MGMT)

Either the TMM switch interfaces or the MGMT interface can provide administrative access to the BIG-IP system. The TMM switch interfaces are the interfaces that the BIG-IP system uses to send and receive load-balanced traffic. The MGMT interface is the interface to perform system management functions via browser-based or command line configuration tools. The MGMT interface is intended for administrative traffic and cannot be used for load-balanced traffic. It is recommended to connect MGMT interface to a secure, management-only network, such as one that uses an RFC1918 private IP address space. Otherwise an attacker can identify BIG-IP systems in your network and then attack them via management plane.

How to test

  1. Try to use the following queries for Google (googledorks):
    • inurl:"tmui/login.jsp"
    • intitle:"BIG-IP" inurl:"tmui"
  2. Try to use the following queries for Un1c0rn
    • BIG-IP
    • bigip
    • BigIP
  3. Try to use the following queries for Shodan
    • F5-Login-Page
    • WWW-Authenticate: Basic realm=BIG-IP
    • BigIP
    • BIG-IP

Remediation

  1. Connect MGMT interface to special management network only. Management network should operates under private (RFC 1918) IP-address space that is completely separate from the production network.
  2. The most secure configuration is to set "Allow None" on all Self IPs and only administer a BIG-IP using the Management Port. Setting "Allow None" on each Self IP will block all access to BIG-IP's administrative IP addresses except for the Management Port. Access to individual ports can be selectively enabled, but this is not recommended in a highly secure environment.
    • Log in to the Configuration utility.
    • Navigate Network > Self IPs.
    • For all self IPs set "Port Lockdown" option to "Allow None".
    • Click on "Update" button.
  3. If you need to administer BIG-IP using Self IPs you should also use private (RFC 1918) IP-address space.
  4. The most unsecure configuation is to use routable addresses on your Self-IPs. In this case it is highly recommended to lock down access to the networks that need it. To lock-down SSH and the GUI for a Self IP from a specific network. For examle, to permit access from network 192.268.2.0/24 it is necessary to perform the following commands in TMSH:
modify /sys sshd allow replace-all-with { 192.168.2.* }
modify /sys httpd allow replace-all-with { 192.168.2.* }
save /sys config

HTTP host header insufficient validation

Description

Host header in HTTP requests is not always validated by BIG-IP systems by default. This validation depends on enabled modules, features and their configuration: for example, BIG-IP system in APM portal access mode performs a base sanitization of HTTP host header against XSS attacks. In most cases, BIG-IP systems action HTTP requests with an arbitrary Host header. This weakness can lead to vulnerabilities which can be used in different attacks based on HTTP Host header (e.g., DNS Rebinding, XSS, password reset poisoning, etc).

How to test

  1. Run intercepting proxy, trap all responses from a web application.
  2. If possible, log in to web application.
  3. Change Host header in HTTP requests. If responses for requests with normal and modified Host header are the same then BIG-IP does not validate Host header.

Remediation

BIG-IP systems can be protected against HTTP host header attacks using Centralized Policy Matching (CPM) feature of LTM module. Let's consider an example of configuration BIG-IP system with LTM and APM modules that illustrates the main idea of protection against these attacks. The following settings ensures that user will be redirected to /vdesk/hangup.php3 script deleting a user's session if HTTP host header contains a value different from permitted and correct hostnames.

Configuring host validation in CPM by using the Configuration utility

  1. Log in to the Configuration utility.
  2. Navigate Local Traffic > Policies.
  3. Click on "Create" button. Input "_host_header_validation" in Name field. Add "http" to Requires box.
  4. Click on "Add" button in Rules section.
  5. Add the following Condition:
    • Operand: http-host
    • Event: request
    • Selector: host
    • Negotiate: not
    • Condition: equals
    • Values: <dns_name_1>, <dns_name_2>, <dns_name_3>, etc
  6. Click on "Add" button.
  7. Add the following Rule:
    • Target: http-uri
    • Event: request
    • Action: replace
    • Parameters
      • Name: path
      • Value: /vdesk/hangup.php3
  8. Navigate to Local Traffic > Virtual Servers. Choose a virtual server that should be protected by CPM.
  9. Click on Resources. Click on "Manage" button for Policies and add _http_host_validation to "Enabled" box.
  10. Click "Finished".

Configuring host validation in CPM by using the TMSH

1. Prepare the following CPM config for host validation
ltm policy _http_host_validation {
    requires { http }
    rules {
        host_validation {
            actions {
                0 {
                    http-uri
                    replace
                    path /vdesk/hangup.php3
                }
            }
            conditions {
                0 {
                    http-host
                    host
                    not
                    values { <dns_name_1> <dns_name_2> <dns_name_3> }
                }
            }
            ordinal 1
        }
    }
    strategy first-match
}
2. Log in to TMSH.
3. Run the following command:
load sys config from terminal merge
4. Copy the config and press CTL-D to submit.
5. Run the following command:
modify ltm virtual <virtual_server> policies add { _http_host_validation }

Protection against mass enumeration via search engines

Description

Web-based components of BIG-IP systems, such as APM, use different HTML pages with default values that can be used for mass enumeration.

How to test

Try to use the following search queries with BIG-IP keyword in Google:

  • intitle:"BIG-IP logout page"
  • "Thank you for using BIG-IP."

Remediation

BIG-IP systems can be protected against web enumeration using Customization mechanism.

  1. Log in to the Configuration utility.
  2. Navigate Access Policy > Customization > General. Change all "BIG-IP" substrings to some neutral strings.
  3. Navigate Access Policy > Customization > Advanced. Change strings with "BIG-IP" values.
For example, navigate to the Customization Settings > Access profiles > /Common/<profile_name> > Logout > logout.inc. Change "<title>BIG-IP logout page</title>" to "<title>Logout page</title>".

APM session exhaustion DoS attack

Description

An unauthenticated attacker can establish multiple connections with BigIP Access Policy Manager and exhaust all available sessions defined in customer's license. In the first step of BigIP APM protocol the client sends a HTTP request to virtual server with access profile (/). The BigIP system creates a new session, marks it as progress (pending), decreases the number of the available sessions by one, and then redirects client to access policy URI (/my.policy). Since BigIP allocates a new session after the first unauthenticated request and deletes the session only if an access policy timeout will be expired the attacker can exhaust all available sessions repeatedly sending initial HTTP request. New versions of BigIP system has secure configuration by default and they are not vulnerable to this attack.

How to test

  1. Log in to the Configuration utility.
  2. Navigate Access Policy > Access Profiles > <profile_name>.
  3. Review 'Max In Progress Sessions Per Client IP' setting.
  4. If 'Max In Progress Sessions Per Client IP' value is equal to 0 then the BigIP system is vulnerable to this attack.

Remediation

The default recommendation is to set value of 'Max In Progress Sessions Per Client IP' in all access profiles to 128.

Protection settings using the Configuration utility

  1. Log in to the Configuration utility.
  2. Navigate Access Policy > Access Profiles > <profile_name>.
  3. Set 'Max In Progress Sessions Per Client IP' value to 128.
  4. Click on "Update" button and then click on "Apply Access policy" for <profile_name>.

Protection settings using the TMSH

  1. Log in to TMSH.
  2. Run the following commands:
modify apm profile access <profile_name> max-in-progress-sessions 128
modify /apm profile access <profile_name> generation-action increment
save /sys config

APM brute force attack

Description

By default, BIG-IP APM virtual server with any type of authentication is vulnerable to brute-force password attack.

How to test

Burp Suite Intruder or similar tools can be used to perform brute force attack.

Remediation

The Minimum Authentication Failure Delay and Maximum Authentication Failure Delay options or CAPTCHA can be enabled to slow down or mitigate brute-force passwords attacks against BIG-IP APM.

To enable Minimum Authentication Failure Delay and Maximum Authentication Failure Delay options using the Configuration utility

  1. Log in to the Configuration utility.
  2. Go to Access Policy > Access Profiles. Click a profile name.
  3. Enable Minimum Authentication Failure Delay and Maximum Authentication Failure Delay options and change their values if necessary.
  4. Click Update and then click Apply Access Policy.

To enable CAPTCHA using the Configuration utility

  1. Log in to the Configuration utility.
  2. Go to Access Policy > CAPTCHA Configurations and create a new one.
  3. Go to Access Policy > Access Profiles. Click Edit link for the profile name.
  4. Click Logon Page. Set the created CAPTCHA configuration.
  5. Click Apply Access Policy.

References