Cloudbleed: When security means living with complexity

By

[Blog post] It's difficult trying to do the right thing.

One reason IT security is so difficult to get right is that we’re dealing with multiple interconnected systems, software, and hardware that interact with each other in sometimes unexpected ways.

Cloudbleed: When security means living with complexity

We rarely know the full story on what is happening within a specific IT system. When even experts have to painstakingly trawl through code to figure out what it actually does and how it handles hardware - as opposed to what the developer thought it would do - you realise that there’s an awful lot taken on trust in the IT business.

One unfortunate consequence of this is when you need to add another layer of security to systems, you end up increasing their complexity. And complexity makes everything harder to understand and less secure.

Take Transport Layer Security (TLS) authentication and encryption: on paper it’s a great idea. Only a totally careless person sends data in plain text over the internet these days, so it’s a good thing to add TLS for security, right?

If TLS works as intended, yes, you'll be more secure. But in practice, incidents over the last few years have shown that anyone deploying TLS needs to sleep with one eye open.

From Heartbleed to digital certificate snafus, TLS has its own peculiar set of gremlins that can lie hidden in plain sight and potentially compromise your systems without you even knowing.

This can be due to bugs or inattention and laziness from vendors, as was found in a recent security product audit, which showed most came with some pretty serious TLS interception flaws that could be exploited.

Let’s be honest: TLS and associated bits and pieces require plenty of expertise and understanding to get right (which is why you see so many mistakes).

Outsourcing the management of TLS to specialists who have that deep level of expertise and understanding can be a good idea rather than learning things yourself, but even that can go wrong.

And when it does, you need a vendor that’s not only quick to react, but straight with the facts so you can assess what damage has been done.

The recent Cloudbleed scare discovered by Google’s Project X security squad is a good example: a code flaw in parts of content delivery network and reverse proxy provider Cloudflare meant that in some cases, the content of uninitialised system memory was returned to TLS clients.

That data could have contained sensitive information such as passwords, and, to make matters worse, search engines cached some of that information.

Cloudflare handled the situation with aplomb, and provided an honest assessment of what had happened, as well as a technical deep dive into Cloudbleed.

The flaw was fixed quickly and most of the search engine results deleted, but as a testimony to how complex and hard to understand these things are, a number of customers were unsure if they needed to do anything and whether they were affected.

Who can blame them, when even experts like Cloudflare’s engineers missed a case of unexpected software behaviour with potentially serious consequences.

Whilst reducing complexity in your systems might seem like the right response, it won't always fix the problem.

Ultimately, it boils down to living with the fact that the unexpected can - and will - happen, and having a plan in place when complexity bites you.

That, and hope that sometime soon we’ll figure out how to focus on the simple and elegant rather than the complex and convoluted.

Got a news tip for our journalists? Share it with us anonymously here.
Tags:
Juha Saarinen
Juha Saarinen has been covering the technology sector since the mid-1990s for publications around the world. He has been writing for iTnews since 2010 and also contributes to the New Zealand Herald, the Guardian and Wired's Threat Level section. He is based in Auckland, New Zealand. Google
Read more from this blog: SigInt

Most Read Articles

Eagers Automotive finds unauthorised access to parts of IT systems

Eagers Automotive finds unauthorised access to parts of IT systems

Hackers hit Victoria's court recording database

Hackers hit Victoria's court recording database

St Vincent's Health Australia warns cyber attack forensics could "take some time"

St Vincent's Health Australia warns cyber attack forensics could "take some time"

Yakult Australia confirms cyber incident

Yakult Australia confirms cyber incident

Log In

  |  Forgot your password?