Date: Thu, 10 Aug 2006 03:45:47 -0700 From: "Nikolas Britton" <nikolas.britton@gmail.com> To: "Marc G. Fournier" <scrappy@freebsd.org> Cc: Paul Schmehl <pauls@utdallas.edu>, freebsd-questions@freebsd.org Subject: Re: BSDstats Project v2.0 ... Message-ID: <ef10de9a0608100345s1fb744cdxf5a520d83faa9313@mail.gmail.com> In-Reply-To: <ef10de9a0608100327r5b402d64xc4eef38a4f61ba4e@mail.gmail.com> References: <20060807003815.C7522@ganymede.hub.org> <20060808201359.S7522@ganymede.hub.org> <44D91F02.90107@mawer.org> <20060808212719.L7522@ganymede.hub.org> <20060809072313.GA19441@sysadm.stc> <20060809055245.J7522@ganymede.hub.org> <44D9F9C4.4050406@utdallas.edu> <20060809130354.U7522@ganymede.hub.org> <ef10de9a0608091700x6cc268ear6566c26f93f1fdf0@mail.gmail.com> <ef10de9a0608100327r5b402d64xc4eef38a4f61ba4e@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On 8/10/06, Nikolas Britton <nikolas.britton@gmail.com> wrote: > On 8/9/06, Nikolas Britton <nikolas.britton@gmail.com> wrote: > > On 8/9/06, Marc G. Fournier <scrappy@freebsd.org> wrote: > > > On Wed, 9 Aug 2006, Paul Schmehl wrote: > > > > > > > Marc G. Fournier wrote: > > > >> On Wed, 9 Aug 2006, Igor Robul wrote: > > > >> > > > >>> On Tue, Aug 08, 2006 at 09:30:42PM -0300, Marc G. Fournier wrote: > > > >>>> Could create problems long term .. one thing I will be using the > > > >>>> IPs to do is: > > > >>>> > > > >>>> SELECT ip, count(1) FROM systems GROUP BY ip ORDER BY count DESC; > > > >>>> > > > >>>> to look for any 'abnormalities' like todays with Armenia ... > > > >>>> > > > >>>> hashing it would make stuff like that fairly difficult ... > > > >>> You can make _two_ hashes and then concatenate to form unique key. > > > >>> Then you still be able to see "a lot of single IPs". Personaly, I dont > > > >>> care very much about IP/hostname disclosure :-) > > > >> > > > >> Except that you are disclosing that each and every time you send out an > > > >> email, or hit a web site ... :) > > > >> > > > > The systems I'm concerned about are on private IP space, to not send email > > > > and don't have X installed, much less a web browser and can only access > > > > certain FreeBSD sites to update ports. In fact, they're not even accessible > > > > from *inside* our network except from certain hosts. In order to > > > > successfully run the stats script on these hosts, I would have to open a hole > > > > in the firewall to bsdstats.hub.org on the correct port. > > > > > > > > And yes, I *am* paranoid. But if you really want *all* statistics you can > > > > get, then you'll have to deal with us paranoid types. My workstation, which > > > > is on a public IP, is already registered. > > > > > > Done ... now I really hope that the US stats rise, maybe? I have a hard > > > time believing that Russia and the Ukraine have more deployments then the > > > 'good ol'US of A' ... or do they? *raised eyebrow* > > > > > > Here is what is now stored in the database (using my IP as a basis) > > > > > > # select * from systems where ip = md5('24.224.179.167'); > > > id | ip | hostname | operating_system | release | architecture | country | report_date > > > ------+----------------------------------+----------------------------------+------------------+------------+--------------+---------+--------------------------- > > > 1295 | 45c80b9266a5a6683eee9c9798bd6575 | 4a9110019f2ca076407ed838bf190017 | FreeBSD | 6.1-RC1 | i386 | CA | 2006-08-09 02:34:05.12579 > > > 1 | 45c80b9266a5a6683eee9c9798bd6575 | 9a45e58ab9535d89f0a7d2092b816364 | FreeBSD | 6.1-STABLE | i386 | CA | 2006-08-09 16:01:03.34788 > > > > > > > Why don't you just broadcast the ip address, it's what your doing now > > anyways. 253^4 is a very small number. > > > > infomatic# perl > > my $num = 0; > > system "date"; > > while ($num <= 409715208) { > > $num++ > > } > > system "date"; > > Wed Aug 9 18:18:45 CDT 2006 > > Wed Aug 9 18:20:48 CDT 2006 > > > > 2 minutes * 10 = 20 minutes to iterate though 4 billion IP addresses > > on a very slow uni-proc system. I could even store every IP to md5 > > hash using less then 222GB of uncompressed space. > > > > If you want... give me the md5 hash of a real ip address that is > > unknown to me and I will hand you the ip address in two days... or > > less. run the IP address though like this: > > > > md5 -s "xxx.xxx.xxx.xxx" > > > > I have other things to do with my time, so I don't really want to do > > this, but if that's what it takes to stop this idea dead I'll do it. > > > > > > Here's a better way to explain the problem: > > Let's say we need to find Marc's IP address but we only have it's md5 > hash value. Some of you may think this is hard to do but it's not. All > we need to do is compute every IP address into a hash and then match > Marc's hash to one in are list: > > 24.224.179.164 = e7e7a967c5f88d9fb10a1f22cd2133d2 > 24.224.179.165 = 3aa9b50aa7190f5aca1f78f075dc69c2 > 24.224.179.166 = c695175e48d649e3496ac715406a488d > 24.224.179.167 = 45c80b9266a5a6683eee9c9798bd6575 > > So what is an IP address?... mathematically speaking it's 4 base 255 > numbers grouped together: > > {0, ..., 255}.{0, ..., 255}.{0, ..., 255}.{0, ..., 255} > > To calculate how many combinations there could be you simply take the > base unit and raise it to the 4th power, since there are 4 of them. > This gives us 255^4 combinations or 4,228,250,625 TCP/IP addresses. We > also know that the first number can't be 0 or 255 and the others can't > be 255, we can also rule out all 127.x.y.z loopback and multicast > 224.x.y.z - 239.x.y.z addresses: > > (237^1) * (254^3) > > This leaves us with 3,883,734,168 valid IP addresses. We can divide > this number by 5,000 and run it through a simple perl script to get a > time estimate on how long it will take to compute all these hashs. We > will split it into 4 parallel jobs: > > my $number = 0; > while ($number <= 194187) { > system "md5 -s $number >> /usr/data/hashlist1"; > $number++; > } > > my $number = 194188; > while ($number <= 388373) { > system "md5 -s $number >> /usr/data/hashlist2"; > $number++; > } > > my $number = 388374; > while ($number <= 582560) { > system "md5 -s $number >> /usr/data/hashlist3"; > $number++; > } > > my $number = 582561; > while ($number <= 776747) { > system "md5 -s $number >> /usr/data/hashlist4"; > $number++; > } > > Ok, it took me 48 minutes to go though 1/5000th of the numbers using 1 > dual-core Xeon system. Considering that my algorithm is very > inefficient and that this task is perfect for cluster computing we can > easily beat this time estimate... > > If a cracker got hold of your database he could crack all the hashes > in a short amount of time and then have the IP addresses, detailed > system version, and full hardware information for exploitation. very > very bad. For hashes to work correctly the input data needs to be > larger then the hash itself, for example: > > asglkhasdlgkjhasldkjhadlkjfhadlgkjhsadlkgjhsadlaskjdhgqalsdjkh > in md5 is e498d452efdfbfda87e522ff3af3b638. To crack that you have to > tackel ether the hash itself or the hash input... both are extremely > large numbers and impossible to brute force using todays hardware: > > 16^32 is the md5 hash, hexadecimal is base 16: > 16^32 = 340,282,366,920,938,463,463,374,607,431,768,211,456 > > 27^62 is the input for the hash, {a, ..., z} is 27 letters: > 27^62 = 55,533,286,725,436,600,015,342,211,508,328,744,516 > ,059,680,22,346,098,411,797,141,428,073,753,123,071 > ,084,716,289,129 > > That should be 26^62... foggy head / time for bed. -- BSD Podcasts @: http://bsdtalk.blogspot.com/ http://freebsdforall.blogspot.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ef10de9a0608100345s1fb744cdxf5a520d83faa9313>