Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IT

Antivirus Inventor Says Security Pros Are Wasting Time 282

talkinsecurity writes "Earlier this week Peter Tippett, chief scientist at the ICSA and the inventor of the progam that became Norton Antivirus, had some interesting things to say about the state of the security industry. In a nutshell, Tippett warned that about a third of the work that security departments do today is a waste of time. Tippett goes on to systematically blow holes in a lot of security's current best practices, including vulnerability research/patching, strong passwords, and the product evaluation process. 'If a hacker breaks into the password files of a corporation with 10,000 machines, he only needs to guess one password to penetrate the network, Tippett notes. "In that case, the long passwords might mean that he can only crack 2,000 of the passwords instead of 5,000," he said. "But what did you really gain by implementing them? He only needed one."' Some of his arguments are definitely debatable, but there is a lot of truth to what he's saying as well."
This discussion has been archived. No new comments can be posted.

Antivirus Inventor Says Security Pros Are Wasting Time

Comments Filter:
  • PBKAC (Score:5, Insightful)

    by DigitalisAkujin ( 846133 ) on Thursday February 07, 2008 @01:08PM (#22335566) Homepage
    Software / Hardware security is not too difficult to achieve. If an admin is truly competent they will have no problem getting their lab workstations up and running cleanly and bug free with pretty solid security.

    The issue is usually the idiot that becomes the victim of a well done social hack.

    As usual, the company is only as strong as it's weakest link.
  • chicken egg? (Score:5, Insightful)

    by El_Muerte_TDS ( 592157 ) on Thursday February 07, 2008 @01:09PM (#22335586) Homepage

    If a hacker breaks into the password files of a corporation with 10,000 machines, he only needs to guess one password to penetrate the network

    Why would the hacker need to guess one password from a list of password hashes when he already broke in and was able to elevate his rights to read the password hashes file? He might was well add his own password entry.
  • Re:PBKAC (Score:5, Insightful)

    by GiovanniZero ( 1006365 ) on Thursday February 07, 2008 @01:11PM (#22335612) Homepage Journal
    Agreed, the problem is usually the user. I recently got an email from someone that CCd everyone and when I told him in the future to BCC us he said "oh its ok, I trust everyone on the list not to spam us" I replied "that's great but do you trust them all to keep their machine's clean and free from spyware?"
  • by moderatorrater ( 1095745 ) on Thursday February 07, 2008 @01:12PM (#22335632)
    That's not the point. The point is that instead of making everyone have long passwords, you could take that same time and effort and train them about security risks that are more likely to happen, like them getting an email with an attachment, or using a browser other than IE. The chances of an attacker getting the password file are lower than the chances of a user doing something that will infect their computer because the user hasn't been taught correctly, so why focus on the passwords?
  • Re:PBKAC (Score:5, Insightful)

    by boristdog ( 133725 ) on Thursday February 07, 2008 @01:13PM (#22335658)
    Social Hacking is the main weakness of any system. And most of the time you don't even have to "hack" if you are perceived as "computer literate"

    Who here hasn't had people tell them: "Can you help me with my computer? Here's my password..."
  • by Jennifer York ( 1021509 ) on Thursday February 07, 2008 @01:14PM (#22335668) Homepage
    I've had enough of the Security Vendors and their rhetoric. I'm constantly bombarded with requests to attend sales presentations on the latest intrusion detection pizza box appliance, or spam firewall thingy, etc. The value of these products are only so that the execs can point to their "security initiatives" and "best practices" when a breach of security is discovered. If they look like they've made an effort to curtail the risk, then they still get their big bonus.
  • by Space cowboy ( 13680 ) * on Thursday February 07, 2008 @01:14PM (#22335688) Journal
    So, at first I wondered why an anti-virus man was basically blowing huge holes in the usefulness of his industry by coming out with quotable nonsense, for example:

    But if a hacker breaks into the password files of a corporation with 10,000 machines, he only needs to guess one password to penetrate the network, Tippett notes. "In that case, the long passwords might mean that he can only crack 2,000 of the passwords instead of 5,000,"

    No. If you mandate long passwords on the server, there are no short passwords. That's sort of the point.

    But then, I read on in the article (yeah, I know, it's /., but what the hell), past the flawed car analogy and it became clear - he's making nonsense statements at the start to try and hide his introduction of the meme that an anti-virus program that doesn't really work is still a "really good thing"(TM).

    Now, don't get me wrong, *any* protection is obviously better than none, but this is basically a surrender - instead of selling the common (wrong, but common) "I have an up-to-date anti-virus package, I am protected" perception, they're now moving towards "Hey, we did the best we could; all those *old* virus's/virii(+) are *definitely not getting through". Woo Hoo.

    So perhaps I'm being overly cynical, but it seems to me like a corporate piece with quotable sound-bites (so it gets wide distribution) that tries to deliver the message "hey, we suck, but keep on buying our software", in a more acceptable-to-the-people manner...

    Simon

    (+) And with this, I hope to equally annoy the grammar and spelling nazis out there. [insert random deity] those people piss me off.
  • That efficient? (Score:4, Insightful)

    by Rampantbaboon ( 946107 ) on Thursday February 07, 2008 @01:16PM (#22335722)
    About 3/4 of the work done by the average corporate department is useless. Congrats on the efficency, security people.
  • by torkus ( 1133985 ) on Thursday February 07, 2008 @01:17PM (#22335744)
    What's more secure?

    12 digit change-montly lower+upper+number+ symbol passwords written on sticky notes (or similar) for 75% of users and freely shared due to complete lack of security training

    or

    6 character passwords that only prohibit patters and the username from being used changed every 6 months that people know not to write down or share?
  • Defense In Depth (Score:5, Insightful)

    by ThaNooch ( 1186931 ) on Thursday February 07, 2008 @01:19PM (#22335778)
    No one is trying to create an Iron Curtain. Security departments (most of them hopefully) are taking numerous measures to prevent breaches. Including access controls preventing one compromised computer from getting all the marbles via role-based or well-configured discretionary access controls, appropriate traffic filtering and intrusion detection techs.

    Risk management is the specific practice of minimizing the greatest risks (what will do the most harm and will be the most likely to happen). And for the most part everyone realizes that no risk can be completely eliminated, so we mitigate them as best we can and rely on fundamentally sound access controls et. al. to limit the effect of any breach and hopefully know about and plan for unforeseen circumstances by planning for certain categories of attacks.

    Hopefully I'm right, because if I'm not... I'm scared.
  • Re:chicken egg? (Score:5, Insightful)

    by Penguinisto ( 415985 ) on Thursday February 07, 2008 @01:24PM (#22335872) Journal

    He might was well add his own password entry.

    True, but the idea is that if he's working from a SAM or shadow file written to pilfered backup tape, or got the password DB by use of a whole host of tools designed to suck out a Windows AD SAM from a server to your laptop over, say, a wifi network connection made in the parking lot or somesuch... e.g. you have the hash file, but don't have a clue as to what it contains. A lot of tools are designed to exploit holes in Windows' Active directory to get a copy of the SAM without all the bother of logging in (most required physical access to the box and a reboot, but IIRC there were some that didn't, depending on the exploit used).

    In the corporate espionage type break-ins, it makes more sense to not poke around too much and break stuff as you go, but instead concentrate on finding the means by which you can return to the network with your presence all dressed up as a legit user or three. This way, you have relatively more time and leisure with which to poke around in. If you add your own account (modify a file) and give it privs, you're liable to get someone's attention (self-audits, internal file integrity sweeps such as AFICK provides, etc...). If you merely copy a file, there's less of a potential fuss.

    The tangents and possibilities can go on and on, mostly because security and breaking-in can become less of a science, and more of an art form. :)

    /P (who sees bits and pieces of it from time to time)

  • by moderatorrater ( 1095745 ) on Thursday February 07, 2008 @01:26PM (#22335912)
    Bruce Schneier wrote about the long password requirement and how it can backfire because users can't remember them. My dad keeps his passwords in a text file on his desktop because his job requires them to change it every month, have letters and number and be different from the last 6 passwords. While that's good in theory, it's counterproductive because he doesn't (and can't) keep the passwords safe. Besides, as seen by myspace and phishers, the strength of the password is rarely the weakest link, it's the security skills of the people. In 90% of the cases, strict passwords are completely useless because they're not the weakest link, other parts of the system and the users are.
  • by Anonymous Coward on Thursday February 07, 2008 @01:27PM (#22335930)
    I can fully understand your cynicism, I share a lot of it. However, Peter Tippett does not work for Norton any more. He works for Verizon Business in their Risk Intelligence, and he has spent the past several years doing actual research on risk on an Enterprise level.

    Maybe he's wrong, but he isn't trying to sell you any software.

    Ben
  • Not only that. (Score:5, Insightful)

    by khasim ( 1285 ) <brandioch.conner@gmail.com> on Thursday February 07, 2008 @01:31PM (#22335994)
    But he's confusing ATTACKING a specific company with INFECTING various machines.

    They are not the same. The defenses are not the same. There may be overlap (a workstation at a company gets infected and sends out spam vs a workstation at a company gets cracked and is used to crack other boxes at that company) but that is all.

    All in all, he's 100% backwards on his comments. Just what you'd expect from someone trying to push a specific product from a specific company.
  • Re:PBKAC (Score:5, Insightful)

    by somersault ( 912633 ) on Thursday February 07, 2008 @01:37PM (#22336084) Homepage Journal
    100% security is never possible unless you don't want to give anyone access, ever.
  • by raddan ( 519638 ) on Thursday February 07, 2008 @01:38PM (#22336096)
    Long passwords are trivial to enforce. In Active Directory, for instance, you simply set a policy. Done. Sure, whining users-- get used to it. It's your job to make sure the company has the resources it needs, and if they go down, it's your head on the chopping block.

    The more common scenario that he does not mention is that people who are trying to gain access are trying to brute force a login through a network protocol. NOT running something like rainbowcrack on your password hashes. If they've gotten to that point your passwords are essentially worthless already.

    BUT this is where defense-in-depth comes in. Security is NOT A PRODUCT. It is a mindset. So if your user accounts aren't all administrators and someone finally manages to brute force a network login, at the worst, that person now can do as much damage as one employee. You do have access controls on your employees, right? Not to mention, most "secure" network protocols nowadays make brute-forcing much harder. SSH, for instance, will timeout the connection after X failed login attempts. They now have to work a lot longer. The login prompt in Windows does the same thing.

    So you apply this thinking to everything. Stop using a VPN. Make only the services you want available through your firewall. Do egress filtering. Use a DMZ. Prevent LAN clients from talking to any hosts other than the gateway and servers. When I started, my company originally used VPN to check email on an Exchange server. BAD! Passwords were usually the same as the username. Someone could trivially walk in and have access to the entire WAN. I pointed this out to them and got "But we're using a VPN. Checkpoint says it's secure!" If you have Exchange, take advantage of RPC-over-HTTPS, and then proxy that! There are lots of things you can do. As this guy points out, none of them are perfect, but you never know-- one of those little things might save your ass.
  • by Christianson ( 1036710 ) on Thursday February 07, 2008 @01:38PM (#22336098)
    I think his point might be this: when you enforce strong password policies, you reduce exposure but you do not prevent someone gaining access to your systems. They only have to be lucky once. Strong password policies make it harder for them to be lucky, but not impossible. What do you gain with a strong password policy? You make it much more difficult for someone to use a dictionary attack. Aren't there other ways to protect against that?

    What do you lose with a strong password policy? Good user habits. They will start writing passwords down, or reusing them, and in general starting to do thinks we know you shouldn't. The policy starts becoming a direct impediment to the users, and so they naturally do their best to work around it. You may have reduced your exposure to brute force attacks, but you've opened yourself up to social engineering, and it's not clear that you've won by doing so.

    Which is why (I think) he makes the point about user education. Getting users to follow good security procedures would likely solve more problems than any possible technical solution. This in turn requires a recognition that there are certain technical solutions you simply cannot put in place if you want people to use your system in a secure fashion.

  • Re:PBKAC (Score:4, Insightful)

    by somersault ( 912633 ) on Thursday February 07, 2008 @01:41PM (#22336160) Homepage Journal
    Same. Everyone seems to think I know their password already but I try to tell them that I don't even *need* their password. Also a lot of users don't seem to get the whole 'network' thing and think that you need the normal user's username and password to be able to access a computer. And sometimes when people leave the company then others still use the account of the person that has left without letting me know, so when I remove the account I get questions on why they can't access the account anymore. *sigh* Thankfully they are learning, slowly, but I find it so hard to get into the mindset of those users that I'm never going to be able to anticipate all the moronic things they're likely to do..
  • by Beyond_GoodandEvil ( 769135 ) on Thursday February 07, 2008 @01:42PM (#22336176) Homepage
    BUT this is where defense-in-depth comes in. Security is NOT A PRODUCT. It is a mindset.
    Actually, it's a cost item that gets in the way of the money making work. That is how most people view it.
  • Re:PBKAC (Score:3, Insightful)

    by Bloodoflethe ( 1058166 ) <jburkhart AT nym DOT hush DOT com> on Thursday February 07, 2008 @01:45PM (#22336252)
    It's called an analogy. It was a pretty good one too. He's basically asking why spend tons of cash for a negligible improvement in security. There's no such thing as an unbreakable system. That's why people use detection tools in conjunction with their security measures - if you can't stop em, find out who they are and prosecute them. But even that can be sidestepped with sufficient resources and intelligence on the part of the hacker. I mean, this guy was the inventor of one of the more prominent (and actually pretty high ranking on the lists) anti-virus programs out there. I would say it is safe to assume that he has a pretty decent idea of what you can do to improve security. Also, notice that he is the inventor actually counseling people not to waste money on costly upgrades on software like the software he created and gets paid royalties on! How often does someone admonish people for overusing something that gets him paid?
  • by recharged95 ( 782975 ) on Thursday February 07, 2008 @01:54PM (#22336430) Journal
    I think Tippett's right, most corporations are living in a house of cards--it's securing the net in some cases and in others it's the reverse--most firms are taking a shotgun approach with vulnerability research and patching.

    I see it being more related to the medical field, prevention is great idea (and has been a popular topic lately), but treatment is just as important and not to be forgotten.

    I think he's really suggesting that business practices slow down--for instance, sure it's a painful to have a 15 letter password, but I'm pretty sure using 1 15 letter password for all your 7 important accounts is more secure that 7, 5 letter passwords...

  • Re:PBKAC (Score:3, Insightful)

    by Brian Gordon ( 987471 ) on Thursday February 07, 2008 @01:55PM (#22336458)
    That's not what he was saying.

    It isn't very likely, but it's possible.
    He's opposing closing security holes that are obscure.. but by his own points, you only need ONE security hole. If you don't close the obscure ones it doesn't do you any good.
  • Re:PBKAC (Score:4, Insightful)

    by provigilman ( 1044114 ) on Thursday February 07, 2008 @01:57PM (#22336480) Homepage Journal
    Yeah, the only way to 100% secure a PC is to disconnect it from the network, take out the power supply and then lock in a bank vault. Anything short of that, and it's still vulnerable. It might be the user getting up to use the washroom without locking his station, or it might be some 11 script kiddie...but it doesn't matter. As long as there's power running to it and/or it's hooked to a network, it's vulnerable. Security is just about mitigating the risk.
  • by ssummer ( 533461 ) on Thursday February 07, 2008 @02:03PM (#22336584)
    Unfortunately that kind of thinking which you condemn is present in just about every facet of industry and society. It's called CYA (Cover Your Ass). Its why we have to take off our shoes at the airport, its why doctors order unnecessary tests, its why millions of tons of "expired" food is destroyed every year, its what runs the Legislative and Executive branches, its why we are still in Afghanistan and Iraq, its...
  • by idontgno ( 624372 ) on Thursday February 07, 2008 @02:07PM (#22336644) Journal

    "It is hard for the users it's going to at least be that much harder for the hacker"?

    Up to a point of diminished returns, at which point it's impossible* for the legitimate user, so they cheat and defeat the whole scheme. (Witness the archetypal "I can't remember this stupid password" sticky-note-under-the-keyboard situation.)

    (*"Impossible" is dependent on the user's level of apathy, forgetfulness, or hostility to the security regime.)

    But if you have strong armor around you, you look like a less appealing target as to try to find the one weak scale under your wing.

    That presumes an equal level of interest and intent between the "soft" target and the hardened one. If the hard target contains the more valuable goodies, well, that's just "crunchy on the outside, tender and tasty on the inside."

    Also, for some in the cracking community, an apparently-hard target is an personal challenge to their 1334 hax0r skills, and quite appealing.

    People are more likely to jump on an open WAN then try to break into a hidden one with at least WEP.

    Again, assuming the values of the targets behind the protection schemes are equal. If all you want is free wireless, then one WAP is as good as another. If you want that WAP for a particular reason, you'll target it no matter what its apparent hardness. Every security scheme is fallible; the real value is measured in terms of effectiveness versus the value of what's protected.

    It sounds more like a lot of what we put in to place is useless once they're in, but that doesn't mean to weaken our defenses.

    I suspect the author is arguing that we should strengthen our defenses by implementing effective measures (non-self-defeating, like the too-complicated password example above; or "security theater" measures that sound tough and look effective but can be easily defeated by ignoring their fundamental premise, like complete isolation from the outside except for trusted partners, but then trusting those partners unreservedly--if they get pwn'd so do you)

  • Actually (Score:5, Insightful)

    by DaedalusHKX ( 660194 ) on Thursday February 07, 2008 @02:16PM (#22336766) Journal
    Actually, he seems to be more clear thought than you.

    He's saying "aim for as much security as you can get" not "aim for 100% impregnable", there is no such thing. Even Open BSD isn't impregnable, despite their claims. Nothing is impregnable to a determined and resourceful attacker.

    He is correct in saying, "rather than bunkering up, strive to be indigestible to AS many potential predators and parasites as you can"... i.e. he is admitting the one fact of the universe... "there is an exception to every rule, just because you haven't found it, doesn't mean it doesn't exist somewhere else, in some form.

    The arrow through the roof, for those with the intellectual openness to understand the metaphor is an unlikely incident, but if it does happen, what then. Peter is using that concept, to teach those willing to learn/understand, that for a car to be 100% impregnable, it would have to be arrow, bullet, cannon, nuclear weapon, weather and everything proof, including driver and other driver error proof, road proof, etc. However, the COSTS involved, and the final results are out of reach of even the rich, would make for a rather heavy, expensive and CLUMSY vehicle, and judging by risk, the benefits would far outweigh the costs. Its like flu shots. I travel, talk, do meetings, etc. I get sick very rarely, yet I see so many immediately taking "flu vaccines" out of fear that the flu will kill them. I've never had a relative who either died of the flu or had complications. Neither have I known anyone in my personal life who had these complications, and I have associates who have lived in first, second as well as third world scenarios.

    Thus, in similar vein, driver training gives better results than building the bullet proof car. Don't surf porn with internet explorer is FAR better advice than installing the latest antispyware, and "don't accept email except in plaintext format" is far better advice than trying to balance a proper load of antivirus (which the user might not allow to update, or might become broken, etc). There have been plenty of virus samples that hijacked the latest Symantec and McAfee antivirus, why? Because they tried to be everything to everyone, and when you over extend your coverage, you end up leaving holes in your defenses.

    Properly trained users is like having the original Citizen Militia, not truly powerful, but if properly trained in guerilla warfare and survival, and properly equipped, they can make ANY invading army's life, VERY difficult, to the point where the invading country finds the "host" or "prey" country to be "indigestible."

    Nothing is unassailable, but plenty of plants are poisonous to their consumers, so as to make it a known thing that they are indigestible. The one size fits all solution, from antivirus, to security departments, to everything else, is STILL the same age old problem. No risk can be reduced to 0%. But it can be minimized and compensated for. This is what Peter talks about.

    Its disappointing, I expected that those frequenting this board would've had the ability to apply metaphors in design. Good book for all to read. The Art of War. Get it bundled with The Prince. Good way to learn how to think.
  • Re:PBKAC (Score:5, Insightful)

    by Anonymous Coward on Thursday February 07, 2008 @02:20PM (#22336852)
    Of course, then I see the same person with their password on a Post-It on their monitor, and all hope of them ever learning the lesson is dashed.

    I wouldn't need to keep my password on a Post-It note if you IT guys didn't make me change it every two weeks!

  • by jrothwell97 ( 968062 ) <jonathan@notroswe[ ]com ['ll.' in gap]> on Thursday February 07, 2008 @02:26PM (#22336956) Homepage Journal

    As I understand it, the first antivirus program ever to have existed (although not marketed as such at the time) was the UNIX rm command. This was followed by clones in other UNIXes, and in the popular DOS operating system in which it was invoked with del.

    Used in conjunction with the killall command, it is a very powerful tool indeed. Beats Norton anyways.

  • by thepustule ( 229709 ) on Thursday February 07, 2008 @03:10PM (#22337818)
    The comparison of shooting an arrow into a Ford sunroof is interesting, but to take the thought process to conclusion, you have to think about script kiddies. In this analogy, someone has created a machine that you can mount in the window, which will keep firing arrows down into the street at random, 24hours per day. Eventually, someone IS going to get killed. That's the problem with information security - it's so easy to keep trying to break in.
  • by JerryLove ( 1158461 ) on Thursday February 07, 2008 @03:21PM (#22338006)
    Password rules have long been a specific complaint of mine. Multiple, changing, complex passwords mean that 2/3 desks here have their PWs written down on their monitor, under their KB, etc; And service accounts, some of the most powerful, are immune to the resetting requirement and, often, fail the password strength rules.

    Even worse, some of the password rules are counter-productive. I know of a company that requires a specific special character be in their 8-charater passwords. Know it (easy enough to find), and it's functionally a 7-letter password.

    There's a saying about exercise that I think applies to security: The best exercise is which ever one you will actually do. We are attempting ever more complex technical solutions to what is an increasingly human problem.

    Make sure that your passwords can sync across all of your systems. Make passwords complex but easy to remember. Let's be honest, if 5 failed logins locks you out, and I've assigned you a password like "bluefish", how likely is that password to be hacked by an automated system? About zero. But since it's short, simple, memorable, and universal: I can train you to not write it down. I'm convinced that's better security.
  • Re:PBKAC (Score:3, Insightful)

    by billcopc ( 196330 ) <vrillco@yahoo.com> on Thursday February 07, 2008 @05:14PM (#22340210) Homepage
    That's funny, I also consider that 100% security is not a valid goal, in fact it is impossible. It's yet another unreachable ideal that brings in tons of cash for nothing.

    Far more important than any security contractor, is a proper risk assessment. There's no sense in building a million-dollar lock if it's only guarding a half-eaten twinkie. You look at the cost of various types of breaches, and the cost of a security measure times it's % efficiency, and pick the cheaper of the two.

    In many cases, simply restructuring the network or the data it contains can buy you much more security than any product or policy. I've lost count of the number of times I've seen networks that were sealed shut from the internet, but wide open on the inside. All it takes is a jackass employee with a Wi-Fi hub and the whole thing goes to hell. Give your users what they need and nothing more, and you'll avoid a whole bunch of problems for free.
  • Re:PBKAC (Score:2, Insightful)

    by Opie812 ( 582663 ) * on Thursday February 07, 2008 @06:12PM (#22341206)
    The DBA should have been fired for prefixing a table with 'tbl'.
  • Re:PBKAC (Score:3, Insightful)

    by ozbird ( 127571 ) on Thursday February 07, 2008 @10:20PM (#22343938)
    I wouldn't need to keep my password on a Post-It note if you IT security guys didn't make me change it every two weeks!

    There, fixed it for you - IT guys get pissed off with frequent demands to change their password, too.

Happiness is twin floppies.

Working...