Skip to content

Threats

aagbsn edited this page Oct 12, 2013 · 4 revisions

OONIThreat-ModelRolesUse-CasesThreatsImpactsDisclosure


Contents

Threats

This is part of OONI's Threat-Model.

This document outlines hypothetical security risks for OONI's associated Roles. Each potential threat listed below is represented in the Impacts table.

Security vulnerabilities do not go here! They should be tracked as issue tickets or if they are sensitive, please see Disclosure.

Taxonomy

This taxonomy comes from a brainstorm of potential threats. If you realize potential threats not covered here, or you propose a more useful organization, let Nathan or Daira know.

Bad Report Data

Note: These threats involve the production or consumption of report data itself. An attacker may attempt to modify or influence report data, or they may use report data to compromise privacy.

Note: These threats are distinct from Resource Abuse in which an attacker compromises OONI-related infrastructure, or other infrastructure for general abuse.

Inaccurate Report Data - which is inaccurate or elided leading to inaccurate analyses.

"Toxic" Report Data - whose contents is a risk for someone, even when accurate.

Bad Non-Report Data

"Toxic" Non-Report Data - This potential data gathered "out of band" represents a risk to various roles.

Note: This is distinct from Bad Report Data. In the case of Bad Report Data, an attacker manipulates the storage/publication of the data, or they use the publicly available report data to subvert privacy assumptions. In this section, an attacker relies on non-report data such as web server logs, proxy logs, etc...

Deanonymizing Data Correlation

This category represents a risk to privacy due to correlation from multiple data sources, including report and non-report data.

  • ooniprobe Operator Usage Exposure From Correlation [impact] - The fact that a ooniprobe Operator ran ooniprobe can be deduced by correlating multiple data source -- e.g. Timing information in published reports and router logs are analyzed together to determine a ooniprobe Operator was running ooniprobe
  • ooniprobe Operator Personal Exposure From Correlation [impact] - Personal details about a ooniprobe Operator can be deduced by correlating multiple data source -- e.g. Timing information in published reports, router logs, and video recordings from an internet cafe are analyzed together to determine the face or identity of a ooniprobe Operator.
  • oonib Operator Usage Exposure From Correlation [impact] - The fact that a oonib Operator runs oonib can be deduced from multiple data sources -- e.g. The uptime of a collector's hidden service is correlated with a known outage of a oonib Operator's infrastructure to deduce they operator a collector.
  • oonib Operator Personal Exposure From Correlation [impact] - Personal details about a oonib Operator can be deduced from multiple data sources -- e.g. The IP address of a test helper, reverse DNS, and whois are all queried together to determine a physical address of a oonib Operator.
  • Bystander Personal Exposure From Correlation [impact] - Multiple data sources are correlated to deduce personal information about a Bystander -- e.g. Timing information from published reports along with censoring firewall policy change time correlation reduce the IP search space to a small set and all users of an ISP are investigated.
  • Private Infrastructure Exposure From Correlation [impact] - Data correlation reveals details about private infrastructure -- e.g. A report includes reverse DNS lookups with associated timing information, which is correlated to DNS server logs to deduce details about the ooniprobe Operator's DNS configuration.

Resource Risks

Note: This section is about abusing resources (whether intentional or inadvertant) independent of report data or non-report data privacy issues. Threats involving report or non-report data often also involve resource abuse, so these are distinct, but non-overlapping categories of threat.

Direct Compromise

Direct Denial of Service

Note: This section excludes DOS against non-OONI infrastructure which is leveraged by OONI infrastructure. See Leveraged Attacks below.

  • ooniprobe DOS [impact] - Resource usage patterns of ooniprobe allow remote attackers to incapacitate the host it runs on. e.g. An HTTP net test reads and stores an HTTP response of arbirarily large size, and a malicious web server consumes all disk on the ooniprobe host.
  • Test Helper DOS [impact] - Resource usage patterns of a test helper allow remote attackers to incapacitate the host it runs on. e.g. An HTTP test helper reads and stores an HTTP request of arbirarily large size, and a malicious web server consumes all disk on the test helper host. e.g. A test helper performs reverse DNS lookups based on an incoming request, and the time or other cost of the DNS lookup is larger than the initial malicious client's request; meanwhile an unlimited number of client requests are accepted and honored.
  • Collector DOS [impact] - Resource usage patterns of a collector allow remote attackers to incapacitate the host it runs on. e.g. Recording an infinitely long report fills up the disk, preventing other reporting.
  • Publisher DOS [impact] - Resource usage patterns of Publisher infrastructure allow remote attackers to incapacitate that infrastructure -- e.g. Report aggregation decompresses data in reports and a malicious report contains a compression bomb, leading to DOS of space or memory in Publisher infrastructure.
  • Directory Service DOS [impact] - Resource usage patterns of Directory Service allow remote attackers to incapacitate the host it runs on. e.g. Malicious clients open and hold a large number of TCP connections without making a request until the Directory Service host runs out of available sockets, preventing legitimate requests.

Leveraged Attacks

These threats involve abusing OONI infrastructure to attack other systems.

Note: This includes DOS against external services, in contrast to Direct Denial of Service above.

  • ooniprobe localhost Leveraged Attack [impact] - A vulnerability in ooniprobe allows a remote attacker to attack other processes on the ooniprobe host. e.g. A user is running a service which accepts connections only from localhost, and a malicious test input causes ooniprobe to reflect an attack vector to that internal third-party service.
  • ooniprobe Extra-Host Leveraged Attack [impact] - A vulnerability in ooniprobe allows a remote attacker to attack other hosts via the ooniprobe process. e.g. A malicious input causes ooniprobe to forward a remote expoit to a vulnerable third party web server.
  • oonib localhost Leveraged Attack [impact] - A vulnerability in oonib allows an attacker to leverage an attack on other resources on the same virtual machine. e.g. A single VM hosts both oonib and an unrelated service, and a test helper provides a proxy service which is used to connect to the other service through localhost.
  • oonib Shared Hardware Leveraged Attack [impact] - A vulnerability in an oonib VM allows compromise of a service on a separate VM on the same hardware. e.g. The virtualization on a hardware host insufficiently protects resources between VMs, and an oonib vulnerability allows a remote attacker to consume so many resources as to DOS the other VMs. e.g. The virtualization has a vulnerability allowing a compromised oonib VM to compromise other VMs or the base OS.
  • oonib Extra-Host Leveraged Attack [impact] - A vulnerability in oonib allows an attacker to leverage an attack on other hosts.
  • Directory Service localhost Leveraged Attack [impact] - A vulnerability in the Directory Service allows a remote attacker to compromise other processes on the same host.
  • Directory Service Extra-Host Leveraged Attack [impact] - A vulnerability in the Directory Service allows a remote attacker to compromise other processes on different hosts. e.g. A network vulnerability in the Directory Service allows a remote attacker to forward traffic to another host on the same internal network. e.g. A vulnerability in the Directory Service allows an attacker to supply malicious test helper or collector addresses to ooniprobe to leverage a DOS or other attack.

Collateral Infrastructure Damage

These threats involve OONI tests denying service to, or otherwise harming, other infrastructure accidentally.

Clone this wiki locally