exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

OnApp ECDSA Duplicate Host Keys

OnApp ECDSA Duplicate Host Keys
Posted May 9, 2014
Authored by James Renken

The OnApp IaaS platform fails to remove and regenerate ECDSA host keys upon deployment.

tags | advisory
SHA-256 | fc8d4a81ebc0b76d674cc85691e4034840c20e9d216865f149f268eb4e4b2377

OnApp ECDSA Duplicate Host Keys

Change Mirror Download
OnApp sells a "complete IaaS platform" for hosting providers to offer 
virtual servers. Their platform ships with templates (disk images) for
many different operating systems, which it automatically customizes
(passwords, network settings, etc.) when a new virtual server is deployed.

During each deployment, the platform removes and regenerates the SSH RSA
and DSA host keys that are included with the template.

However, it fails to remove and regenerate the ECDSA host keys in its
templates for newer operating system releases that support ECDSA. All
customers using these templates are using the same ECDSA host key,
unless they have been alert or cautious enough to rekey themselves. They
are gravely vulnerable to attacks on their SSH sessions.

Because I'm not an OnApp customer and do not have direct access to a
copy of their product, I've been unable to confirm all version(s) of
their platform or components that may be vulnerable. These templates,
built in 2012-2013, are vulnerable when used in at least one recent
OnApp release:

Arch Linux 2012.12 x64
Debian 7.1 Plesk x64
Debian 7.2 x64
Gentoo 12.1 x64
Ubuntu 12.04 x64

I reported this issue to OnApp on March 16, 2014 with a tentative
disclosure date of April 16, 2014.

As of April 15, 2014, OnApp Support reports that Debian 7 templates have
been updated.

As of May 8, 2014, none of OnApp's release notes have mentioned this
issue, and the Debian 7.2 x64 template remains vulnerable on at least
one OnApp customer's deployment.

It is trivially easy for attackers to identify vulnerable systems. Hosts
using OnApp should immediately contact all customers that are
potentially affected. Customers of OnApp-based hosts who are using
ECDSA-capable SSH daemons should immediately rekey.

--
James Renken
Sandwich.Net, LLC
https://www.sandwich.net/
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close