Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Handmade & knitted security at Etsy

Bea Hughes
November 22, 2014

Handmade & knitted security at Etsy

Bsides Toronto November 2014.

If you've seen the Berlin one, this is pretty much the same, but with a few more slides and newer cat pictures.

Video at https://www.youtube.com/watch?v=2W4r7RpTw30

Bea Hughes

November 22, 2014
Tweet

More Decks by Bea Hughes

Other Decks in Technology

Transcript

  1. Click to Edith

    View Slide

  2. Ben Hughes

    Etsy

    @benjammingh
    Pwning all the
    Internet of things
    for fun and profit

    View Slide

  3. @benjammingh
    Handmade & knitted security at Etsy
    • I work at Etsy, yes that Etsy.
    • Yes we have a seemingly large security team.
    • We do “some” web stuff. Have “some” servers.

    View Slide

  4. @benjammingh
    Handmade & knitted security at Etsy
    • Intro (we’re here)
    • Users/laptops/the two people with “workstations”.
    • Servers/systems.
    • Data - that small topic.
    • Conclusions

    View Slide

  5. The landscape has changed.
    https://www.flickr.com/photos/andraspasztor

    View Slide

  6. The landscape has changed.
    https://www.flickr.com/photos/andraspasztor

    View Slide

  7. Securing

    laptops

    (and users)

    View Slide

  8. View Slide

  9. What?

    !
    That’s an advert

    !
    A paid advert

    !
    For “TextWrangler”?!

    View Slide

  10. Sink holes!

    View Slide

  11. View Slide

  12. IPv6
    (trust me, this time

    it’s really gonna happen!)

    View Slide

  13. @benjammingh
    Handmade & knitted security at Etsy
    • http://labs.neohapsis.com/2013/07/30/picking-up-the-
    slaac-with-sudden-six/
    • http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/
    configuration/15-2mt/ip6-15-2mt-book/ip6-ra-
    guard.html
    • http://resources.infosecinstitute.com/slaac-attack/
    • https://github.com/Neohapsis/suddensix

    View Slide

  14. @benjammingh
    Handmade & knitted security at Etsy
    • Oprah says “And you get an IDS….”
    • On most desktop OSes (Linux/
    OSX/Windows… I have no idea
    about Windows) you can use the
    firewall like an IDS.
    • PF example:
    pass log quick proto { tcp, udp } to any port { 6881, 31337, $badport }

    View Slide

  15. Servers!
    https://www.flickr.com/photos/stalker_cz/
    (genuine Etsy

    data centre!)

    View Slide

  16. Patching…

    View Slide

  17. https://twitter.com/TimDenike/status/162973991034826752

    View Slide

  18. https://www.blackhat.com/docs/eu-14/materials/eu-14-Kemerlis-Ret2dir-Deconstructing-Kernel-Isolation.pdf

    View Slide

  19. View Slide

  20. @benjammingh
    Handmade & knitted security at
    Uptime security solutions!

    View Slide

  21. @benjammingh
    Handmade & knitted security at
    Uptime security solutions!
    • SELinux - ‘setenforce 0’ as it’s also known as.
    • http://stopdisablingselinux.com/

    View Slide

  22. @benjammingh
    Handmade & knitted security at
    Uptime security solutions!
    • SELinux - ‘setenforce 0’ as it’s also known as.
    • http://stopdisablingselinux.com/
    • grsecurity - set of hardening patches to Linux.
    • http://grsecurity.net/features.php

    View Slide

  23. @benjammingh
    Handmade & knitted security at
    Uptime security solutions!
    • SELinux - ‘setenforce 0’ as it’s also known as.
    • http://stopdisablingselinux.com/
    • grsecurity - set of hardening patches to Linux.
    • http://grsecurity.net/features.php
    • Ksplice - https://www.ksplice.com/ scariest fix ever.

    View Slide

  24. View Slide

  25. View Slide

  26. @benjammingh
    Handmade & knitted security at
    REBOOTING

    View Slide

  27. @benjammingh
    Handmade & knitted security at Etsy
    • There will always be un-patched machines.
    Realities of the situation:

    View Slide

  28. @benjammingh
    Handmade & knitted security at Etsy
    • There will always be un-patched machines.
    • Breeches will occur.
    Realities of the situation:

    View Slide

  29. @benjammingh
    Handmade & knitted security at Etsy
    • There will always be un-patched machines.
    • Breeches will occur.
    • Knowing they happened is much better than not
    knowing.
    Realities of the situation:

    View Slide

  30. View Slide

  31. @benjammingh
    Handmade & knitted security at Etsy
    • Linux kernel auditd events.
    • http://people.redhat.com/sgrubb/audit/ (driest page ever)
    • Mangled with some python because auditd is awful.
    • (will open source this, once the bugs are out. Pinkie swear)
    • Use Mozilla’s https://github.com/gdestuynder/audisp-cef
    • Pay https://www.threatstack.com/ if you “Cloud”.
    • Throw in ELK/syslog/giant file to grep through.

    View Slide

  32. @benjammingh
    Handmade & knitted security at Etsy
    More awesome auditd stuff purely for people downloading
    the slides:
    • http://security.blogoverflow.com/2013/01/a-brief-
    introduction-to-auditd/
    • http://blog.threatstack.com/labs/2014/8/21/threat-stack-
    vs-redhat-auditd-showdown
    • http://www.slideshare.net/MarkEllzeyThomas/
    audit-34493671audit-34493671

    View Slide

  33. https://www.flickr.com/photos/jdhancock
    Data

    View Slide

  34. Backups

    View Slide

  35. @benjammingh
    Handmade & knitted security at Etsy
    • Don’t ship your DB backups off unencrypted.
    • Don’t use symmetric encryption, because the key will
    live with the backup (probably).
    Backups

    View Slide

  36. Canaries

    View Slide

  37. @benjammingh
    Handmade & knitted security at Etsy
    • Put obvious “fake” data in data stores, use IDS to detect
    them in places they should never go.
    “Animal sentinel”

    View Slide

  38. @benjammingh
    Handmade & knitted security at Etsy
    • Put obvious “fake” data in data stores, use IDS to detect
    them in places they should never go.
    • Operational uses too. Spotting non-TLS LDAP traffic.
    “Animal sentinel”

    View Slide

  39. @benjammingh
    Handmade & knitted security at Etsy
    • Put obvious “fake” data in data stores, use IDS to detect
    them in places they should never go.
    • Operational uses too. Spotting non-TLS LDAP traffic.
    • Load Balancer Canary
    “Animal sentinel”

    View Slide

  40. To Conclude

    View Slide

  41. @benjammingh
    Handmade & knitted security at Etsy
    • Laptops/users trust the environment. This isn’t always
    good.
    Conclusions

    View Slide

  42. @benjammingh
    Handmade & knitted security at Etsy
    • Laptops/users trust the environment. This isn’t always
    good.
    • Servers don’t have to run so blindly, there’s a wealth of
    information in the Linux kernel.
    Conclusions

    View Slide

  43. @benjammingh
    Handmade & knitted security at Etsy
    • Laptops/users trust the environment. This isn’t always
    good.
    • Servers don’t have to run so blindly, there’s a wealth of
    information in the Linux kernel.
    • Be careful with data. Help it be careful with you.
    Conclusions

    View Slide

  44. @benjammingh
    Handmade & knitted security at
    !
    You’re all hiring, everyone is hiring.

    View Slide