--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/6516ecf1.4a0a0220.a70ef.ee4fSMTPIN_ADDED_MISSING%40gmr-mx.google.com.
We use Duo.
I'm not aware of any fraudulent pushes. OTOH, if a user declines the push, perhaps by mistake, a notification is generated to someone (the user, or a Duo admin? I can't remember).
However, if the account ID/password has been compromised, then attempts by the malefactor to log in will generate pushes, and if the victim approves the notification then the intrusion is successful.
Kurt
On Fri, Sep 29, 2023 at 9:27 AM Ken Dibble <ke...@stic-cil.org> wrote:
--
- I realize this is off-topic, but:
- Is there any known way by which a DUO user can receive a bogus push
- notification without someone having that person's login credentials
- for the system using DUO?
- Are there any known instances in which a spoofed DUO push contains
- the option to report the push as fraudulent, and then an
- apparently-legitimate DUO fraud report is issued to us?
- Thanks.
- Ken Dibble
- www.stic-cil.org
- --
- You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
- To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
- To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/6516ecf1.4a0a0220.a70ef.ee4fSMTPIN_ADDED_MISSING%40gmr-mx.google.com .
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CADy1Ce7L%3Dn9tztLwHPB5GugxvcCviBqFh1FUcOyXDHDjj2EuFQ%40mail.gmail.com .
If you are using Duo for Windows with RDP and the device doing RDP goes to sleep, sometimes when it wakes back up it will reconnect RDP in the background and trigger Duo (it's not an acronym) which may be interpreted as an unexpected prompt.
Admins can also trigger pushes from the admin site. But generally no the pushes are legitimate indicating the associated user attempted to access a Duo protected service.
Sent from Gmail Mobile
On Fri, Sep 29, 2023 at 11:27 AM Ken Dibble <ke...@stic-cil.org> wrote:
--
- I realize this is off-topic, but:
- Is there any known way by which a DUO user can receive a bogus push
- notification without someone having that person's login credentials
- for the system using DUO?
- Are there any known instances in which a spoofed DUO push contains
- the option to report the push as fraudulent, and then an
- apparently-legitimate DUO fraud report is issued to us?
- Thanks.
- Ken Dibble
- www.stic-cil.org
- --
- You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
- To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
- To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/6516ecf1.4a0a0220.a70ef.ee4fSMTPIN_ADDED_MISSING%40gmr-mx.google.com .
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CA%2BDi7Pt8WP7ODfWJAqERhT9f9%2BgWx%3DHQOyOrSPhnMt1KT3FP4g%40mail.gmail.com .
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/65170ebc.050a0220.72e57.c55dSMTPIN_ADDED_MISSING%40gmr-mx.google.com.
Do you have magical users that actually read and follow instructions?
Sent from Gmail Mobile
- --
- To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CA%2BDi7Pv%3D-xoqWEQ_-hVQqv9aydGenZP5a3gOKwSSbrCuPrFJdQ%40mail.gmail.com .
ROFL
Cynthia Erno
From: ntsys...@googlegroups.com <ntsys...@googlegroups.com>
On Behalf Of CR Hiestand
Sent: Friday, September 29, 2023 1:53 PM
To: ntsys...@googlegroups.com
Subject: Re: [ntsysadmin] DUO Phishing Question
|
ATTENTION: This email came from an external source. Do not open attachments or click on links from unknown senders or unexpected emails. |
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CA%2BDi7Pv%3D-xoqWEQ_-hVQqv9aydGenZP5a3gOKwSSbrCuPrFJdQ%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CA%2BDi7Pv%3D-xoqWEQ_-hVQqv9aydGenZP5a3gOKwSSbrCuPrFJdQ%40mail.gmail.com .
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/SA0PR09MB7116255F8025D19F4FBE2EA7A5C5A%40SA0PR09MB7116.namprd09.prod.outlook.com .
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/651aeb27.6b0a0220.b452a.822cSMTPIN_ADDED_MISSING%40gmr-mx.google.com .
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/651b0039.050a0220.41741.daaeSMTPIN_ADDED_MISSING%40gmr-mx.google.com.
What do the Duo logs in their admin portal show? They should show you the date/time, Duo protected app used, and the source IP among other things.
On Mon, Oct 2, 2023 at 1:39 PM Ken Dibble <ke...@stic-cil.org> wrote:
- In the instance under discussion, we have now learned:
- The laptop was in our office, connected by LAN cable to our network, and turned off. (We don't enable wake-on-LAN here.) The user got a Duo push on her phone while at home at around 11:30 pm. There are only two ways to activate our Duo: 1) Log into the domain-user specific installation of the VPN client on the computer 2) Log into the VPN user portal on our router. In both cases, the user must submit the correct domain user credentials, and have them accepted by the DC, before Duo will send a push.
- The user got an official-looking Duo push on the phone, which had an option for her to report a fraudulent attempt, which she did. We then got an email, apparently from actual Duo, almost immediately reporting that attempt.
- Assuming that the user did not share her credentials with anyone else intentionally, how could this have happened?
- One way would be if she violated our rules and applied a password to her domain user account that she had previously used for some other purpose--for which the credentials were stolen. Then we would expect to see an attempt to log into the router user portal at around 11:30 pm, but the logs showed no such attempt.
- We will check the logs on the laptop to see if it was running when she thought it was shut down. In the meantime, can anyone suggest ANY other explanation for these facts?
- Thanks.
- Ken Dibble
- www.stic-cil.org
- At 12:09 PM 10/2/2023, I wrote:
- Yeah, I find the concept of zombie laptops butt-dialing Duo in the middle of the night pretty funny too.
- So, an update on this:
- Testing showed that the VPN caches the credentials regardless of whether the user checks the "save my information" box or not. Computer goes to sleep, disconnecting the internet while the VPN is connected. Computer decides to wake itself up for some reason (we've seen that before), which results in the internet connection being restored (either via LAN cable or because the user told Windows to automatically connect to some WAP). That triggers the VPN to use its stored credentials to reconnect, meaning it submits them through the Duo proxy server, gets them okayed by the LDAP server, after which the proxy calls Duo to send a push.
- So another "magical" solution would be to tell users to make sure to disconnect the VPN before going away from the computer. Compliance there would be about the same.... Though I suppose getting woken up in the middle of the night by a push on your phone might motivate you.
- We have the idle-peer disconnection time set pretty high so we can remotely install CUs to unattended machines. I don't really want to cut that time down by much. We're still looking into whether we can configure the VPN not to auto-reconnect; might be possible by means of an obscure route involving uploads of what look like JSON files.
- Jeez, I just love 2FA....
- Thanks.
- Ken Dibble
- www.stic-cil.org
- At 03:07 AM 10/2/2023, Erno, Cynthia M wrote:
- ROFL
- Â
- Cynthia Erno
- Â
- Â
- From: ntsys...@googlegroups.com < ntsys...@googlegroups.com> On Behalf Of CR Hiestand
- Sent: Friday, September 29, 2023 1:53 PM
- Subject: Re: [ntsysadmin] DUO Phishing Question
- Â
- ATTENTION: This email came from an external source. Do not open attachments or click on links from unknown senders or unexpected emails.
- Â
- Do you have magical users that actually read and follow instructions?
- Sent from Gmail Mobile
- Â
- Â
- --
- To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/651b0039.050a0220.41741.daaeSMTPIN_ADDED_MISSING%40gmr-mx.google.com .
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CA%2BSdsNHp_QC7yF9m1LV3pwdPQ5poo7HJJQ-BGtEgfESQyyGLbw%40mail.gmail.com .
The logs never have an IP address; they all show 0.0.0.0 regardless of whether the 2nd factor is accepted or not. Sometimes the "Authentication Method" column will give a location, such as: "Duo Push Binghamton NY United States" (which is where we are). Sometimes they say "Duo Push location unknown". In this case, for this user, there were two logged events, about 3 minutes apart.
The first was "Denied - no response" with "Location unknown".
The second was "Denied - user marked fraud" with "Location Binghamton NY United States".
What location is referenced by these logs? The location of the phone receiving the push? The location of the sending server (seems likely since we have locations in the logs from other cities in New York where our employees never go)? The location of the process that attempted to log into the Duo-managed interface?
Thanks.
Ken Dibble
www.stic-cil.org
At 01:49 PM 10/2/2023, Mike wrote:
What do the Duo logs in their admin portal show? They should show you the date/time, Duo protected app used, and the source IP among other things.
On Mon, Oct 2, 2023 at 1:39â€Â¯PM Ken Dibble <ke...@stic-cil.org> wrote:
- In the instance under discussion, we have now learned:
- The laptop was in our office, connected by LAN cable to our network, and turned off. (We don't enable wake-on-LAN here.) The user got a Duo push on her phone while at home at around 11:30 pm. There are only two ways to activate our Duo: 1) Log into the domain-user specific installation of the VPN client on the computer 2) Log into the VPN user portal on our router. In both cases, the user must submit the correct domain user credentials, and have them accepted by the DC, before Duo will send a push.
- The user got an official-looking Duo push on the phone, which had an option for her to report a fraudulent attempt, which she did. We then got an email, apparently from actual Duo, almost immediately reporting that attempt.
- Assuming that the user did not share her credentials with anyone else intentionally, how could this have happened?
- One way would be if she violated our rules and applied a password to her domain user account that she had previously used for some other purpose--for which the credentials were stolen. Then we would expect to see an attempt to log into the router user portal at around 11:30 pm, but the logs showed no such attempt.
- We will check the logs on the laptop to see if it was running when she thought it was shut down. In the meantime, can anyone suggest ANY other explanation for these facts?
- Thanks.
- Ken Dibble
- www.stic-cil.org
- At 12:09 PM 10/2/2023, I wrote:
- Yeah, I find the concept of zombie laptops butt-dialing Duo in the middle of the night pretty funny too.
- So, an update on this:
- Testing showed that the VPN caches the credentials regardless of whether the user checks the "save my information" box or not. Computer goes to sleep, disconnecting the internet while the VPN is connected. Computer decides to wake itself up for some reason (we've seen that before), which results in the internet connection being restored (either via LAN cable or because the user told Windows to automatically connect to some WAP). That triggers the VPN to use its stored credentials to reconnect, meaning it submits them through the Duo proxy server, gets them okayed by the LDAP server, after which the proxy calls Duo to send a push.
- So another "magical" solution would be to tell users to make sure to disconnect the VPN before going away from the computer. Compliance there would be about the same.... Though I suppose getting woken up in the middle of the night by a push on your phone might motivate you.
- We have the idle-peer disconnection time set pretty high so we can remotely install CUs to unattended machines. I don't really want to cut that time down by much. We're still looking into whether we can configure the VPN not to auto-reconnect; might be possible by means of an obscure route involving uploads of what look like JSON files.
- Jeez, I just love 2FA....
- Thanks.
- Ken Dibble
- www.stic-cil.org
- At 03:07 AM 10/2/2023, Erno, Cynthia M wrote:
- ROFL
- Â
- Cynthia Erno
- Â
- Â
- From: ntsys...@googlegroups.com < ntsys...@googlegroups.com> On Behalf Of CR Hiestand
- Sent: Friday, September 29, 2023 1:53 PM
- Subject: Re: [ntsysadmin] DUO Phishing Question
- Â
- ATTENTION: This email came from an external source. Do not open attachments or click on links from unknown senders or unexpected emails.
- Â
- Do you have magical users that actually read and follow instructions?
- Sent from Gmail Mobile
- Â
- Â
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/651b0707.050a0220.5d89d.11beSMTPIN_ADDED_MISSING%40gmr-mx.google.com .
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CA%2BSdsNF2Hzq1SrGay_W89Xibb764uEiWhif20yb%3DmTqibHZc0Q%40mail.gmail.com.
We usually see the IP of the user as well as the general location of that IP (based on whatever geolocation database Duo is using).
But we don't use the Duo LDAP proxy, which is why you are probably seeing 0.0.0.0 for everything.
I believe Duo has a text log file on the server that runs the proxy as well; anything interesting in there?
On Mon, Oct 2, 2023 at 2:08 PM Ken Dibble <ke...@stic-cil.org> wrote:
- The logs never have an IP address; they all show 0.0.0.0 regardless of whether the 2nd factor is accepted or not. Sometimes the "Authentication Method" column will give a location, such as: "Duo Push Binghamton NY United States" (which is where we are). Sometimes they say "Duo Push location unknown". In this case, for this user, there were two logged events, about 3 minutes apart.
- The first was "Denied - no response" with "Location unknown".
- The second was "Denied - user marked fraud" with "Location Binghamton NY United States".
- What location is referenced by these logs? The location of the phone receiving the push? The location of the sending server (seems likely since we have locations in the logs from other cities in New York where our employees never go)? The location of the process that attempted to log into the Duo-managed interface?
- Thanks.
- Ken Dibble
- www.stic-cil.org
- At 01:49 PM 10/2/2023, Mike wrote:
- What do the Duo logs in their admin portal show? They should show you the date/time, Duo protected app used, and the source IP among other things.
- On Mon, Oct 2, 2023 at 1:39â€Â¯PM Ken Dibble <ke...@stic-cil.org> wrote:
- In the instance under discussion, we have now learned:
- The laptop was in our office, connected by LAN cable to our network, and turned off. (We don't enable wake-on-LAN here.) The user got a Duo push on her phone while at home at around 11:30 pm. There are only two ways to activate our Duo: 1) Log into the domain-user specific installation of the VPN client on the computer 2) Log into the VPN user portal on our router. In both cases, the user must submit the correct domain user credentials, and have them accepted by the DC, before Duo will send a push.
- The user got an official-looking Duo push on the phone, which had an option for her to report a fraudulent attempt, which she did. We then got an email, apparently from actual Duo, almost immediately reporting that attempt.
- Assuming that the user did not share her credentials with anyone else intentionally, how could this have happened?
- One way would be if she violated our rules and applied a password to her domain user account that she had previously used for some other purpose--for which the credentials were stolen. Then we would expect to see an attempt to log into the router user portal at around 11:30 pm, but the logs showed no such attempt.
- We will check the logs on the laptop to see if it was running when she thought it was shut down. In the meantime, can anyone suggest ANY other explanation for these facts?
- Thanks.
- Ken Dibble
- www.stic-cil.org
- At 12:09 PM 10/2/2023, I wrote:
- Yeah, I find the concept of zombie laptops butt-dialing Duo in the middle of the night pretty funny too.
- So, an update on this:
- Testing showed that the VPN caches the credentials regardless of whether the user checks the "save my information" box or not. Computer goes to sleep, disconnecting the internet while the VPN is connected. Computer decides to wake itself up for some reason (we've seen that before), which results in the internet connection being restored (either via LAN cable or because the user told Windows to automatically connect to some WAP). That triggers the VPN to use its stored credentials to reconnect, meaning it submits them through the Duo proxy server, gets them okayed by the LDAP server, after which the proxy calls Duo to send a push.
- So another "magical" solution would be to tell users to make sure to disconnect the VPN before going away from the computer. Compliance there would be about the same.... Though I suppose getting woken up in the middle of the night by a push on your phone might motivate you.
- We have the idle-peer disconnection time set pretty high so we can remotely install CUs to unattended machines. I don't really want to cut that time down by much. We're still looking into whether we can configure the VPN not to auto-reconnect; might be possible by means of an obscure route involving uploads of what look like JSON files.
- Jeez, I just love 2FA....
- Thanks.
- Ken Dibble
- www.stic-cil.org
- At 03:07 AM 10/2/2023, Erno, Cynthia M wrote:
- ROFL
- Â
- Cynthia Erno
- Â
- Â
- From: ntsys...@googlegroups.com < ntsys...@googlegroups.com> On Behalf Of CR Hiestand
- Sent: Friday, September 29, 2023 1:53 PM
- Subject: Re: [ntsysadmin] DUO Phishing Question
- Â
- ATTENTION: This email came from an external source. Do not open attachments or click on links from unknown senders or unexpected emails.
- Â
- Do you have magical users that actually read and follow instructions?
- Sent from Gmail Mobile
- Â
- Â
- --
- --
- --
- To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/651b0707.050a0220.5d89d.11beSMTPIN_ADDED_MISSING%40gmr-mx.google.com .
--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
- To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/CA%2BSdsNF2Hzq1SrGay_W89Xibb764uEiWhif20yb%3DmTqibHZc0Q%40mail.gmail.com .
Look at the NPS server itself and see where it’s sending logs. There are multiple options as I recall, but it’s been a few years since I’ve done one.
--
There are 10 kinds of people in the world...
those who understand binary and those who don't.
¯\_(ツ)_/¯
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/651c22ed.250a0220.c39af.f6e2SMTPIN_ADDED_MISSING%40gmr-mx.google.com.