Top
Best
New

Posted by boyter 15 hours ago

Bucketsquatting is finally dead(onecloudplease.com)
290 points | 153 commentspage 4
perunamies 12 hours ago|
[flagged]
ChrisMarshallNY 15 hours ago||
[flagged]
iknownothow 14 hours ago||
I'd ask politely to refrain from such comments :)

This is not me criticising you. I totally understand the urge to say it. We're all thinking the thing you're thinking of. It takes effort not to give into it ;)

The reason I personally would refrain from making such comments is that they have the potential to end up as highest ranked comment. That would be a shame. Topic of S3 bucketsquatting is rather important and very interesting.

ramon156 14 hours ago|||
You did not really give a reason to refrain from making a joke. Don't take yourself too serious
AznHisoka 14 hours ago||||
He is just comment squatting :)
Hamuko 14 hours ago|||
>We're all thinking the thing you're thinking of.

I wasn't but I sure am now.

DonHopkins 14 hours ago||
It sounds like a sensitive subject, very delicate, and of no concern to law enforcement, for private videos of an artistic nature.

https://www.youtube.com/watch?v=KaQ-s_P5mwM

useftmly 9 hours ago||
[flagged]
lijok 15 hours ago|
Huh? Hash your bucket names
why_only_15 15 hours ago||
if your bucket name is ever exposed and you later delete it, then this doesn't help you.
lijok 13 hours ago||
The entire article talks about “guessing” the bucket name as being the attack enabler, not the leaking of it. What does the landscape look like once you start doing the basics like hashing your bucket names? Is this still a problem worth engineering for?
Maxion 15 hours ago||
I don't think that'd prevent this attack vector.
alemwjsl 14 hours ago||
Ok; salt, and then hash your bucket names
xxs 13 hours ago||
that doesn't help either. 'Salt' is public and usually different/unique per entry/name.

If you mean to use a "secret" prefix (i.e. pepper) then, that would generate effectively globally unique names each time (and unpredictable too) but you can't change the pepper and it's only a matter of time it'd leak.

tosti 11 hours ago|||
Random pepper. Or just, y'know, randomly generate the effing string. Can't be that hard.
lcnPylGDnU4H9OF 11 hours ago|||
If they can't make the bucket before you do then they are not "bucket squatting", and they can't do so for a salted and hashed bucket name without knowing the salt at runtime.

The public/private distinction seems moot here, too: the salt is a throwaway since you just need the bucket name.

Even if you do need to keep track of the salt, it should be safe for the attacker to know, at least with respect to this attack, because you already own the bucket which the attacker would otherwise hoard.

ethanrutherford 4 hours ago||
The "squatting" part of "bucket squatting" is a bit of a misnomer here. The attack vector is actually in the opposite direction.

1. You set up an aws bucket with some name (any name whatsoever).

2. You have code that reads and/or writes data to the bucket.

3. You delete the bucket at some later date, but miss some script/process somewhere that is still attempting to use the bucket. For the time being, that process lies around, silently failing to access the bucket.

4. The bucket name is recycled and someone else makes a bucket with the same name. Perhaps it's an accident, or perhaps it's because by some means an attacker became aware of the bucket name, discovers that the name is available, and decided to "squat" the name.

5. That overlooked script or service is happy to see the bucket it's been trying to access all this time is available again.

You now have something potentially writing out private data, or potentially reading data and performing actions as a result, that is talking to attacker-owned infrastructure.

nulltrace 1 hour ago|||
Seen this happen with Terraform. One team tears down a stack, bucket gets deleted, but another stack still has the name hardcoded in an output. Next CI run uploads artifacts to a bucket name that's now up for grabs. You only notice when deploys start failing. Or worse, succeeding against someone else's bucket.
CloakHQ 3 hours ago|||
[dead]