Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 28 Nov 2021 10:16:25 +0100
From:      Stefan Esser <se@freebsd.org>
To:        freebsd-hackers <freebsd-hackers@freebsd.org>
Subject:   Does not appear to be (too) malicious ...
Message-ID:  <b66c39a4-1836-eab8-db9f-e839d14b13be@freebsd.org>
In-Reply-To: <CA%2ByoEx881o6frd-zy-rV55xR3vg%2BjugN0ZigdH8nAYGsB6_NfA@mail.gmail.com>
References:  <cd41bda5-6a14-c4e2-3d74-b0c5d52480ec@zohomail.com> <05580cd8-1bbf-8783-b190-40d9cdacade6@m5p.com> <CA%2ByoEx881o6frd-zy-rV55xR3vg%2BjugN0ZigdH8nAYGsB6_NfA@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------jJawxrU5A1eSOwo2T9I0TDz1
Content-Type: multipart/mixed; boundary="------------r89bkpw8tJuQV0dww9P5PQpt";
 protected-headers="v1"
From: Stefan Esser <se@freebsd.org>
To: freebsd-hackers <freebsd-hackers@freebsd.org>
Message-ID: <b66c39a4-1836-eab8-db9f-e839d14b13be@freebsd.org>
Subject: Does not appear to be (too) malicious ...
References: <cd41bda5-6a14-c4e2-3d74-b0c5d52480ec@zohomail.com>
 <05580cd8-1bbf-8783-b190-40d9cdacade6@m5p.com>
 <CA+yoEx881o6frd-zy-rV55xR3vg+jugN0ZigdH8nAYGsB6_NfA@mail.gmail.com>
In-Reply-To: <CA+yoEx881o6frd-zy-rV55xR3vg+jugN0ZigdH8nAYGsB6_NfA@mail.gmail.com>

--------------r89bkpw8tJuQV0dww9P5PQpt
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Am 28.11.21 um 02:06 schrieb Mario Lobo:
> On Sat, Nov 27, 2021, 20:27 George Mitchell <george+freebsd@m5p.com> wr=
ote:
>=20
>> On 11/27/21 17:40, Obsto Clades via freebsd-hackers wrote:
>>> I hacked on the FreeBSD source code to produce a version of the OS th=
at
>>> cannot be remotely hacked.  Before you tell me that is impossible, I
>>> have an answer to that response on my FAQ page.
>>>
>>> If you are interested in checking out my OS, you can find instruction=
s
>>> on my site's home page:  https://obstoclades.tech/
>>>
>>> I invite you to check it out.
>>>
>>
>> Hmm, my mother told me never to click on links in strange emails ...
>> -- George
>>
>=20
> curl http://obstoclades.tech
[...]
>        <p class=3D"red">Connection denied by Geolocation Setting.</p>
>        <p><b> Reason: </b> Blocked country: <font color=3D"red">  </fon=
t> </p>
>        <p>The connection was denied because this country is blocked in =
the
> Geolocation settings.</p>
>        <p>Please contact your administrator for assistance.</p>
>      </div>
>      <div class=3D"band">WatchGuard Technologies, Inc.</div>
>    </div>
>  </body>
> </html>

$ fetch --no-verify-peer -v -o /tmp/obstoclades.html https://obstoclades.=
tech
resolving server address: obstoclades.tech:443
SSL options: 82004854
Verify hostname
TLSv1.3 connection established using TLS_AES_256_GCM_SHA384
Certificate subject: /CN=3Dobstoclades.tech
Certificate issuer: /C=3DUS/O=3DLet's Encrypt/CN=3DR3
requesting https://obstoclades.tech/
fetch: https://obstoclades.tech: size of remote file is not known
local size / mtime: 34916 / 1638088913
/tmp/obstoclades.html                             34 kB  181 kBps    00s

There is actual contents in this file, and it does not seem to contain an=
y
malicious parts. It starts with:

<!DOCTYPE html>
<!--
      File:  ObstoClades.html
      Copyright (c) 2021 Obsto Clades, LLC
 -->
<html lang=3D"en">
  <head>
    <meta charset=3D"UTF-8">
    <title>Security is a Joke</title>
    <meta name=3D"description"
          content=3D"This demonstrates a modified BSD Operating System de=
signed
to prevent remote hacking of single-purpose computer systems.">
    <link rel=3D"stylesheet" type=3D"text/css" href=3D"/css/obstoclades.c=
ss"/>
    <link rel=3D"icon" type=3D"image/x-icon" href=3D"/favicon.ico"/>
    <script
src=3D"https://ajax.googleapis.com/ajax/libs/jquery/3.4.1/jquery.min.js">=
</script>
    <script src=3D"js/obstoclades.js" defer=3D"defer"></script>
  </head>

And besides the jquery.min.js dowloaded from ajax.googleapis.com only the=

following short and apparently benign script is downloaded as obstoclades=
=2Ejs:

/*
 * File:  obstoclades.js
 * Copyright (c) 2017 Obsto Clades, LLC
 */

$(document).ready(function()
{
    var $content =3D $(".content").hide();
    $(".img").on("click", function (e)
    {
        $(this).parent().parent().toggleClass("expanded");
        var ttt =3D $(this).parent().children(".tooltiptext");
        if ($(this).parent().parent().hasClass("expanded"))
        {
                ttt.replaceWith("<span class=3D\"tooltiptext\">Click to
close</span>");
        }
        else
        {
                ttt.replaceWith("<span class=3D\"tooltiptext\">Click to
open</span>");
        }
        $(this).parent().parent().next().slideToggle();
    });
    var textHeight =3D $("#left-side-header-text").height();
    $("#old_english_sheepdog").height(textHeight).width(textHeight);
    $("#button").click(function()
    {
        $("#contactus-form").submit();
    })
});

He invites to attack his server using a SSH login with provided credentia=
ls,
and offers US$1000 for any successful modification of the test server. Se=
e
the following video, which shows that root on the consonle and root via s=
u
in the SSH session get quite different environments:

https://obstoclades.tech/video/demo-video.mp4

This looks like a setup with lots of restrictions applied, probably noexe=
c
mounts of temporary file systems and the like, possibly jails and/or MAC
restrictions.

He thinks that an embedded system configured that way could not be attack=
ed,
but explains that his concept is limited to e.g. IoT use cases (what he
calls "single-purpose computer system").

Anyway, I could not find any malicious content on the web server. Accessi=
ng
with a SSH session (obviously configured to not allow backwards tunneling=
)
should also not be too dangerous from a dumb terminal (but beware of esca=
pe
sequence attacks possible with ANSI terminals, e.g. reprogramming of func=
tion
keys with "ESC[code;string;...p").

It looks to me like kind of a honeypot setup gathering attack attempts to=

see whether a throw-away system can withstand them. All attack attempts a=
re
logged, either to learn how to perform them, or to actually improve the
security of his protection concept in case of a successful break-in.

Regards, STefan

--------------r89bkpw8tJuQV0dww9P5PQpt--

--------------jJawxrU5A1eSOwo2T9I0TDz1
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature"

-----BEGIN PGP SIGNATURE-----

wsB5BAABCAAjFiEEo3HqZZwL7MgrcVMTR+u171r99UQFAmGjSOkFAwAAAAAACgkQR+u171r99UQ3
Wwf8Dk21TWeuXp++0S2nN41g9aATwGvAdujX9WXQLRTEVYPufzLULK3uJcexbzlBIS4/oOrcVaMD
A0PpJx5XBd7GhnijkfPGal1fE3D/rJmnFwE70U8PYbc/9YsR8yVZcZIoLixDZtu5/dqEhhkRRk9K
WkCNg8+l/I/eUEA1UpU1xBfgw2GOQC9rlCMdxqVWodS+yUP/V3w43sOPXbOwdxOlwBsZaBABZhXD
mw+v7t/ocQeNGmd1575sTKuNds+GETIrrDfUrVulhrYMCbgzhdQZ5yZRNWNhzNudu6CD9z+QEqRS
tHdNxm5EUUtBL4QnOxUY0UpZ3t7ZUceKFFGRIhJ/QA==
=KTD3
-----END PGP SIGNATURE-----

--------------jJawxrU5A1eSOwo2T9I0TDz1--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?b66c39a4-1836-eab8-db9f-e839d14b13be>