Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Researchers Reveal Holes in Grid

    Written by

    Paul F. Roberts
    Published May 13, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      New research into security weaknesses in a popular secure remote access technology highlights the vulnerability of large-scale computing environments such as grids and supercomputing clusters to a potentially crippling form of attack.

      The SSH (Secure Shell) technology is used by security administrators and other technical users to connect to remote machines via a secure, encrypted tunnel.

      The system is used widely in university and research networks, and security researchers at the Massachusetts Institute of Technology last week published a paper showing how a simple worm could grab SSH user credentials from one machine and move rapidly among any number of connected systems, causing whats known as a “cascade failure.”

      This type of attack would be especially damaging in a grid or cluster environment, in which hundreds or thousands of high-powered computers are linked together and shared by multiple users.

      Many industry heavyweights, including Sun Microsystems Inc., Oracle Corp. and IBM, are pushing grid or on-demand computing initiatives, although little has been said about the security of such architectures.

      /zimages/5/28571.gifClick here to read more about security threats in grid computing.

      The researchers, from MITs Computer Science and Artificial Intelligence Lab and Lincoln Laboratory, found that malicious hackers could use an SSH file called “known_hosts” to gather lists of remote systems visited by other users via SSH.

      Information in known_hosts files is not usually encrypted or otherwise protected from viewing. While the data stored in the files doesnt give a hacker access to those systems, it could be a road map to other servers running SSH, said Will Stockwell, one of the papers authors and an undergraduate researcher at CSAIL, in Cambridge, Mass.

      For example, known_hosts data, when coupled with a critical and widespread SSH vulnerability, could allow a virus or worm to quickly find and try to infect other systems that it knows run SSH, Stockwell said.

      /zimages/5/28571.gifRead details here about a proposed early warning system for worm attacks.

      Even though SSH has been widely deployed for years, the security holes raised by the MIT researchers escaped notice, experts agree.

      “Nobody realized they were there. Security involves someone saying, You can do this,” said Bruce Schneier, chief technology officer of Counterpane Internet Security Inc., of Cupertino, Calif., and a widely respected cryptographer.

      And the MIT research suggests that known_hosts could be a gold mine for a virus or worm author. The team from MIT collected more than 8,000 unique addresses from known_hosts files on 92 systems, and researchers believe that hackers could harvest many more with unfettered access to machines on which SSH is used to manage other systems, according to the MIT report.

      Such a worm is still hypothetical, but experts say that an attacker last year used a compromised version of SSH to gather user credentials and break into sensitive machines at Stanford University; The National Supercomputing Center; and the TeraGrid, a network of supercomputing centers.

      The supercomputing community is also trying to learn from last years hacks. Leading scientists from labs across the world gathered for the first-ever International Workshop on Cluster Security at the IEEE CCGrid conference in Cardiff, Wales, last week to discuss short- and long-term fixes for security issues, according to Bill Yurcik, senior security engineer at the National Center for Supercomputing Applications at the University of Illinois, in Urbana-Champaign.

      The interconnected nature of supercomputing and cluster environments means an SSH worm that could traverse known_hosts files could create a cascade failure, quickly moving between linked research networks, according to a presentation given at the conference by Stuart Schechter of Lincoln Lab, another author of the SSH paper.

      Paul F. Roberts
      Paul F. Roberts

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.