Symantec CTO on Flash Attacks 179
scubacuda writes "Robert Clyde, CTO of Symantec, recently warned an audience at the United Nations that there's an increasing gap between the speed at which attacks are being launched and the industry's ability to respond. Most attacks on Web sites are classified as Class III threats because they tend to take several hours/days to execute. Recently, however, Class II "Warhol attacks"--such as the SQL Slammer worm that make themselves famous in 15 minutes--have emerged. Before long, Clyde predicts that groups of well-funded hackers working in concert will be able to launch Class I "Flash attacks." To combat this, Clyde says that patches would need to be developed more quickly and deployed continuously in an automated mode. Admins would need better ways of locking down networks so an attack on one router is automatically recognized by all routers on the network; throttling back the throughput of suspicious packets on the network in order to limit damage; automating tools for ensuring that all network clients are compliant with security policies; and creating Web services technologies that do not interfere with application performance."
Flash Attack? (Score:5, Funny)
Re:Flash Attack? (Score:2)
Re:Flash Attack? (Score:4, Funny)
(*Well actually I have, but that don't fit into my slashdot-image and would not make this joke funny.)
Re:Flash Attack? (Score:1, Funny)
You needn't worry, there's no risk of that.
Re:Flash Attack? (Score:2)
Well, but ... (Score:2)
What really fits the image is using the slightest excuse to brag that you don't fit the image.
Seriously... (Score:2, Interesting)
Re:Seriously... (Score:2)
Let me guess..... (Score:5, Funny)
Alex
Re:Let me guess..... (Score:2, Interesting)
Re:Let me guess..... (Score:2)
Who is modding this as interesting? I think it's supposed to be funny. I smell Symantec employees modding this up.
Re:Let me guess..... (Score:2)
and Symantec has just the product to sort all this out?
Who is modding this as interesting? I think it's supposed to be funny. I smell Symantec employees modding this up.
Its an attempt at sarcasm at way past my bedtime, I'd imagine that Symantec people have better things to do on a weekend other than hang on
Network structure server software (Score:5, Insightful)
I'm feeling uncomfortable with execs trying to stir up public funding for their non-public industry.
Re:Network structure server software (Score:2, Interesting)
Automated mode... (Score:4, Insightful)
You mean like Windows Update?
Re:Automated mode... (Score:5, Funny)
No, no, no. We're talking about something that helps to fix the problem.
Re:Automated mode... (Score:2, Informative)
Re:Automated mode... (Score:3, Interesting)
Re:Automated mode... (Score:1)
Flash Attacks (Score:4, Interesting)
How in the world are these "flash attacks" supposed to attack the entire internet in seconds? Launch from multiple points at once? Go faster than light?
Re:Flash Attacks (Score:4, Informative)
A synchronized DDoS attack, launched from already owned machines, controlled by a central source would be classified as a flash attack I beleive.
Whereas worms take some time to infect, and they "worm" their way from machine to machine, flash attacks happen suddenly, because the machines are already infected, just waiting for instructions.
Re:Flash Attacks (Score:3, Insightful)
Yes Slammer started on a single machine, but did not do real damage until it hit critical mass.
i was awestruck (as I'm sure others will have been) when I heard about this "warhol" type attack actually coming - before it happened
The Future (Score:2, Insightful)
Re:The Future (Score:2)
Hetrogeneous networks (Score:5, Interesting)
Monoculture is bad.
Diversity is the only way out of this, long term. The idea of having only one codebase for 95% of the computers in the world is insane. The long term fix is to actively encourage alternative platforms, and multiple competing versions of software that aren't clones.
A hetrogeneous network is going to be much more resilient, though this is a tradeoff from efficiency. As with the original design of the internet (packetizing data instead of streams), the tradeoff more than pays for itself in the long run.
--Mike--
Re:Hetrogeneous networks (Score:4, Interesting)
However, the corn was then susceptible to one virus that could have killed nearly all the corn.
With one OS dictating the market's every move, it only takes one virus to render the world useless.
Re:Hetrogeneous networks (Score:2)
When that occurs, most people will finally wakeup and realize that Microsoft OSes are not secure.
But the world won't be useless, just heavily inconvenienced. The Internet will survive, and response times for non-Windows users will be excellent!!!
Re:Hetrogeneous networks (Score:2)
Day 0 - Spread like crazy through Samba shares, IMs, e-mail (with a *.zip file), and URL (a la CodeRed)
Day 3 - Pass out *.doc/*.xls files to random people in the address
that's hard to maintain though (Score:2)
Re:that's hard to maintain though (Score:2)
Neither ssh1 nor ssh2 has been shown to have major flaws in the practical sense. There have been some flaws in some implementations.
You seem to be saying that because IIS has had a bunch of problems, the "diverse" solution is to use HTTP, FTP, Gopher, IRC and AIM for html transport.
Most of the people arguing in favor of diversity are merely saying that if IIS, Apache, Tomcat, Zope, Tux, and an O'caml/Perl/C#/whatever webserver we
protocols and implementations (Score:2)
Even just keeping diverse implementations is difficult though. If you wrote your software for Apache, you usually have to run Apache on all your webservers; if you need to use 3rd-party software written for Apache, the same goes. The only way this is really sustainable is if there are a small number of very major players of about equal strength (say,
Not quite so sure (Re:Hetrogeneous networks) (Score:3, Insightful)
So having multiple OSes as you suggest just increases the number of potential security holes, making your network eas
Re:Hetrogeneous networks (Score:3, Insightful)
Diversity is just a form of security through obscurity. Which we all know is bad, as it is anathema to the Open Source philosophy.
Besides, think about how expensive diversity is. Won't it be great in a few years when any code can run on any OS from any vendor, on any hardware? That notion is a just logical extension of current trends, after all. Just to name a few examples, we have cygwin and wine, thousands of ports in every direction being produced and Moore's Law all at work to
Re:Hetrogeneous networks (Score:3, Insightful)
Let me repeat: Diversity of Windows installations caused so much pain in the case of Slammer. If all your machines are uniform, they are much easier to maintain.
And what is a heterogeneous network? One that uses IP, DECnet and IPX?
Re:Hetrogeneous networks (Score:2)
--Mike--
Re:Hetrogeneous networks (Score:4, Insightful)
If this "healthy mix" included a vulnerable MS SQL server, you lost when Slammer hit.
The problem with diversity is that considerably increases maintainance costs and requires admins with multi-platform skills. In my experience, most admins have problems staying up-to-date with respect to their primary platform and learn all this new security stuff. What will happen if they have to follow, developments for, say, three platforms, Linux, Windows and Solaris?
Diversity is a very effective defense, of course, but it comes rather late in the list of things you should do to increase security. Diversity will not help you if you can't keep up patching your machines, for example. It will make things worse in this case because diversity increases the workload and leads to less patching.
Fess up (Score:2, Funny)
Re:Fess up (Score:3, Funny)
The first time I read it was a "Flush Attack" - and I thought, no the iLoo was a joke.
The next time flash was used I read it as "Flesh" and was thinking that a flesh attack might not be so bad.
Last but not least, I saw thousands of angry flash cards marching and attacking a server.
Making more coffee now.
Symantec and it's dirty tricks (Score:5, Insightful)
Usually it is accompanied by a round of advertisement telling you how (through the use of their products) you can protect yourself.
I am all for computer security, and no doubt there are many pitfalls yet to come, but staffing enough programmers to instantly respond to what they term a "flash attack" would make Microsoft look like small potatoes. I guess during all of that free time between attacks they can rewrite MSxxx to close those bugs MS can't get around to (in six years or more)
On the other hand, look for rising stock prices as Macromedia sues Semantic for defamation and misuse of their branded media player.
Re:Symantec and it's dirty tricks (Score:3, Interesting)
Unfortunately, a few years ago on slashdot posts like mine above were so truthful that few would consider them worthy of modpoints.
Symantec makes good virus protection software. But they have saturated their market. Nearly every PC targeted at the average user is sold with one of their products pre-installed.
Virus software is not sexy, few will rush out to grab the latest release, or even bother with the online updates. Symantec stirs the pot every now and then with a timely reminde
Oh, is that all? (Score:2)
Swift justice, harsh punishment (Score:2, Interesting)
Speed is the key to deterrence. Arrest someone; put them to trial; punish them. Swift, harsh but just punishment is a deterrent. If attacks result in loss of life, capital punishment is called for.
The law should be changed so that appeals don't drag out for 20 years. That old saw is as true today as it ever was:
Re:Swift justice, harsh punishment (Score:2)
Locks are good deterrents, laws are not. The lock must be properly applied before the crime happens.
Criminals in the US (and elsewhere I'd believe) really don't think that they will be caught. Although crime is a sober serious subject, sometimes this disbelief results in some very funny arrest reports. I know because I get to enjoy them as I watch TV, they make the best "reality" shows I've seen all season.
Re:Swift justice, harsh punishment (Score:4, Interesting)
That's stupid -- what you want is impossible. Suppose the attacker is in country A and and the victims of the attack are in country B. How are country B's authorities going to bring the attacker to justice if he isn't even within their jurisdiction? Furthermore, identifying the attacker might not be possible at all. Suppose that the attacker uses a publicly accessible computer located in a coffee shop or a public library to release the virus or worm or whatever he comes up with? More realistically, what if the attacker uses his own computer, connected to the Internet by way of an unsecured wireless network? If there's no paper trail, then the authorities can't determine who launched the attack. As you can see, tougher laws are not sufficient to deter attacks since, due to the decentralized and anonymous nature of the Internet, it's so easy to avoid detection.
Steve
Re:Swift justice, harsh punishment (Score:2, Insightful)
With regard to various network based attacks, just about anyone anywhere would be in a position to retaliate.
Re:Swift justice, harsh punishment (Score:2, Insightful)
Want to stop exploits? Write good code and have it reviewed, test it, review it again, test again...release and test, review............
Severe punishments or punishment in general are rarely good enough deterrents. Do you have $15 000 to give to the RIAA? I'm sure the millions on Kazaa don't but they trade anyway because they never think about getting caught.
The solution...education/ethics training. You have to teach people not to be assholes BEFORE t
Fear what? (Score:2)
Ok, when is the endless parade to 'secure' things going to come to and end. There will always be risk inherent in everything, and there is no way to eliminate it.
But now people are worrying about the 'net being brought to a crawl by these so-called flash attacks. Look, if you corporate pinheads didnt put the internet into a state of stagation by putting in the lobby to pass all these restrictive laws, we wouldnt even have this problem
Before all these 'laws' designed to protect came along the internet was
Warhol (Score:4, Interesting)
"Recently, however, Class II "Warhol attacks"--such as the SQL Slammer worm that make themselves famous in 15 minutes--have emerged."
If they were really Warhol attacks, they'd be crappy hacks (because they'd only be famous for 15 minutes, not in 15 minutes.)
*in* 15 minutes... (Score:1)
To badly paraphrase him, "In 15 minutes every virus will be famous." :)
Re:Warhol (Score:2)
Let's go over the plan again... (Score:2)
So to stop a worldwide automated intrusion from working, we need to set up a worldwide automated method of changing the core software of all of our systems very quickly.
In summary therefore, customers of IT must wait for months while a commercial software outfit fucks around with an as yet undisclosed vulnerability, but should be prepared to instantly and automatically apply whatever hack and munge job said company puts together at the last minute when the bad guys actually start exploiting the problem.
Wh
Re:Let's go over the plan again... (Score:2, Interesting)
While I agree in principle, the idea of ensuring more responsible code could also be used to support regulation of programmers in a similar fashion to the way some states regulate engi
Re:Let's go over the plan again... (Score:2)
While I agree in principle, the idea of ensuring more responsible code could also be used to support regulation of programmers in a similar fashion to the way some states regulate engineers.
Well, I didn't consider making this a matter of legislation, but consider the converse of what you are proposing. Do you really feel comfortable with the idea of laws requiring IT managers to patch their systems in an automated and rapid manner?
I don't think you can write laws to govern this sort of activity. HIPAA
Re:Let's go over the plan again... (Score:2)
No proposal was intended. Just the observation that the idea of enforcing responsibility in coding can be used to justify other measures.
Do you really feel comfortable with the idea of laws requiring IT managers to patch their systems in an automated and rapid manner?
I don't support this idea either.
I don't think you can write laws to govern this sort of activity. HIPAA pretty much proves that. Because they couldn't figure out what security
Flash Attack? (Score:2)
I hate these virus protection propagansists (Score:2, Insightful)
Dah! (Score:4, Insightful)
Basically what he just said, in order, was:
1. If something breaks it should be fixed quickly soon
2. If something breaks you should turn it off before it breaks any more
3. You should try to make things not break
Those three principles are done simply as a matter of common sence by your average guy riding a bicycle, and I beleive those same principles are followed by good coders and good sysadmins as pretty much the most obvious part of their job.
The only difference between his suggestion an bicyle repair is that the computer system is automated, which is done with systems already in place on networks with competant sysadmins.
The whole suggestion is both facile and bleeding obvious and I hope that nobody was impressed by it.
It's a cult! (Score:5, Interesting)
One solution (as pointed to by an earlier poster) is diversity.. If people are running different OSs and different flavours then it's a bit harder for somebody to take total control. I wouldn't even suggest a 100% movement away from MS (although 75% would make life a lot easier). Even the heavily audited OpenBSD has managed a root compromise or two in it's history, and it only takes one zero-day bug to bring down a whole system.
For those people running MS, yes -- you definitely need help. That having been said, I would still suggest some diversity there... Not all machines should be running Semantic. There should be at least a few running other AntiVirus products (like AVG). That way if Semantic misses something, there's still a possibility that one of the other virus checkers in a company will catch the bug (and enable faster recovery). It would also provide some hope of survival in the case of a symantec takeover like I mentioned in the first paragraph.
Re:It's a cult! (Score:2)
So a site with a critical web server would somehow need to run multiple instances using different web server packages under different OSes using different processors. Then there's the entire aspect of the back-end software like the DB to think about! And it would all have to
Re:good one (Score:2)
Oh Great. (Score:1)
"Yes, that blue screen that you're seeing is actually what is known as a 'flash attack' that is becomming so common...."
A Mo' Betta' Solution.... (Score:3, Interesting)
Most admins with any security background know that the right answer is DEFAULT DENY.
When is the mainsteam going to wake up?
Re:A Mo' Betta' Solution.... (Score:2)
There's perhaps a few DOZEN sql servers that actually are supposed to be open and accessable to the public. I'm guessing here because personally I don't know of a single one and I can't think of a single reason why you'd want to set one up that way, so perhaps I've overestimated.
The rest are BACKEND servers, which should have been accessable ONLY by the host that uses them. If they'd all been properly firewalled the slammer worm would have never happened.
If you want to stop this kind of shit f
Re:A Mo' Betta' Solution.... (Score:2)
or... (Score:5, Insightful)
But that's just me...maybe people do want more 'windows update'-like systems so they can get back to their game of tetris.
-davidu
"Flash Attacks" from Well Funded Hackers? (Score:5, Insightful)
I'm not sure I see how this necessarily follows. Certainly it is possible, and part of security is taking into account what can be done, but I don't know how you would assume it at all likely. If I had to name the biggest security threat right now (in my humble opinion, that is) I'd be far less concerned about groups of well-funded hackers (funded by who? Terrorists? Saddam? Commie subversives?) than I would about DDoS attacks launched by some bored teen-ager (something a little more television should cure, at any rate).
DDoS attacks are very difficult to stop so long as plenty of unsecured home computers are available on broadband connections. All the host-based security in the world by the victim is virtually useless if he hasn't the bandwidth to resist the attack.
Meanwhile, where are these groups of well-funded attackers, and what motivation have they? DDoS attacks are individual events; they do not propogate themselves across the internet the way SQL Slammer did. Each is of course its own sort of risk, and the effects of worms such as Slammer are similar, creating DoS attacks by attempting to propogate so fast. But I just don't see what connection more and more aggresive worms have to do with groups of organized, well funded hackers acting for international terrorists or the like (a concern repeatedly brough up by the US Cybersecurity Czar). This sounds, in some respects, like Clyde is reiterating the same refrain, a refrain which calls for harsher crackdowns and beefing up target security when we should be holding companies with insecure code (such as MSSQL) responsible and encouraging software companies and users to beef up security not only on servers but on PCs, as well.
In regards to how much real-world damage a cyberattack can create, this is a matter of much dispute, and it seems highly unlikely that terrorist organizations will resort to such moves rather than traditional, far more terrifying and effective acts of random violence. Still, I am pleased that some interest is being taken into cybersecurity; I just hope the focus is in the right place.
Re:"Flash Attacks" from Well Funded Hackers? (Score:2)
Well, someone had to say it. It's time for the war on bored teenagers! They are an absolute menace to society, as I'm sure the Iraqi information minster will tell you.
"Flash Attacks" from Under Funded Hackers? (Score:2)
The only plausible protection is diversity and in general making things so that people are aware of what's happening rather than having everything hidden.
The Unix Honor Virus would be extremely effective, if only the victims would actualy fall for it.
I'm sure I'm not the only one thinking it... (Score:3, Informative)
Side note: if you use Mozilla, download the autoscroll [mozdev.org] patch. When you middle-click to start the scrolling process, the Flash ads disappear. This is a very cool side-effect.
Why the United Nations? (Score:2, Interesting)
Here Be Dragons (Score:3, Funny)
"SKYNET became self-aware at 4:01 AM on August 4th, 1997 and at 4:12 it ordered a pre-emptive nuclear strike."
Updating automatically = more vulnerability (Score:2, Insightful)
Re:Updating automatically = more vulnerability (Score:2)
Proactive vs. reactive (Score:1, Informative)
Interesting... (Score:1)
CylantSecure 2.0 Named Best Security Solution in LinuxWorld's Product Excellence Awards Program
MOSCOW, Idaho -- Cylant today announced that CylantSecure 2.0, an industry leading host-based intrusion defense system, was named "Best Security Solution" for LinuxWorld's Open Source Product Excellence Awards. Cylant beat out four other finalists to win the award, including IBM and Computer Associates.
LinuxWorld Conference & Expo (August 12 - 15 at San Francisco's Moscone Center) is t
The sky is falling? (Score:2)
It's in Symantec's best interest for people to be afraid. Take this with a grain of salt, people -- and always follow the money.
Well-funded hackers? (Score:3, Interesting)
So what corporate SOB is funding this sort of thing?
faster patches not the answer (Score:3, Insightful)
They are necessary, but can never be sufficient, because there is always a threat that the bad guys will find a vulnerability before the vendor and the users even have an inkling of its existence. We need systems that are hardened so that they aren't likely to have anything that can be so easily compromised. Most of the automated worms out there have spread because systems were running services that the user didn't really want to run or even know were running, or those services were running extensions and modules that users only rarely need, or client software had default settings to execute arbitrary code from perfect strangers unprompted, yet another feature that users rarely need or are even aware of. If a feature is more likely to be used as a vector for a worm than by the user base, maybe, just maybe, it shouldn't be turned on.
A Warhol worm, or what Symantec wants to call a flash attack, cannot effectively be responded to. We need proactive security, or we've already lost.
Luckily, most OS vendors are getting there. Major linux distributions install by default with host-based firewalls blocking incoming connections. Even Microsoft is improving somewhat with Windows 2003's default security, although we'll just see whether Microsoft offsets their gains by more losses with new "features."
"Flash attacks" are a myth (Score:5, Funny)
Jeez, you people shouldn't believe everything you read on an internet rumors site.
i suggest everyone migrate (Score:2)
security through... um... obscurity
Well Funded Hackers (Score:2, Funny)
Or if you're not so well-funded you achieve the same effect by linking a site on Slashdot.
i've been reading the responses (Score:4, Interesting)
"somebody is crying wolf to stir up business obviously!"
holier than thou, no corporate geek is smarter than me false sense of security is just as dangerous as false alarmism, no?
no, i am not a symantec drone, but during the may day week after the hainan island spy plane incident a few years back, didn't some rather organized attacks and counterattacks occur between american and chinese hackers feeling a little too much of their nationalistic jingoistic cojones?
i mean, if china and the us, or china and taiwan, or pakistan and india, or any other country with a well-developed technical base started seriously getting pissed off with another, you can BET the websites in each other's countries would have a SERIOUS problem
am i spreading FUD? or does my "false" alarmism insult your "false" sense of security?
go cnhonker.com if you dare
Re:i've been reading the responses (Score:4, Insightful)
"SERIOUS problem"? Like what? People get a slow response from the Taiwanese tourism site? No more Taiwanese posts to Slashdot? What is this "serious trouble"?
Anybody who wants to cause that kind of trouble can achieve it more easily by overloading phone lines, putting white powder into envelopes, or spreading rumors about SARS.
holier than thou, no corporate geek is smarter than me false sense of security is just as dangerous as false alarmism, no?
All I know is that Symantec has never caught a virus on my PC, but it has caused numerous software to fail, sometimes in very mysterious ways that were difficult to track down. Regardless of whether there is a problem to be fixed in the first place, Symantec is not the company to fix it.
Re:i've been reading the responses (Score:2)
learn some perspective... you can cage ANY server shutdown as "inconsequential" due to the "fringe" and "unnecessary" nature of the internet, no?
don't let my post get you excited now... you are the one arguing against "false" alarmism, remember?
one thing you should be aware of.... (Score:4, Interesting)
Here's just one example: Symantec used to offer a bounty for viruses. It's rather underpaid antivirus support staff, with access to all documented viruses as well as existing exploits in current software would, on their free time, craft viruses and then 'discover' them for the bounty. The trick was to do this through friends, often splitting the rewards, to avoid getting caught out.
Despite this, the management was well aware that its antivirus staff was creating much of the virus 'problem'. And they turned a blind eye to these activities, because it generated more business for them.
This is just one example of a number of rather reprehensible business practices I observed while working for Symantec. I found the company to be so sleazy I terminated my contract after five months, and refused to work with them again.
Max
yeah, yeah... (Score:3, Insightful)
It's no wonder this comes from someone at an anti-virus corporation, whose main purpose is to patch the holes left in unsecure operating systems. Now, if he had suggested the correct solution, making the systems at least somewhat resilient to attacks in the first place, he would also suggest that his company shouldn't really need to exist, making shareholders unhappy.
I can't imagine a worse nightmare than having to rely on insecure systems going through automated updates with a frequency as low as 15 minutes. Do you think all those patches are going to work? That they are actually tested? That they don't create as many new holes as they tighten? That they don't change your carefully tuned setup which wasn't vulnerable for what the patches are supposed to fix anyway?
Please give me some design and forethought instead...
Don't trust Symantec (Score:4, Interesting)
Maybe Symantec employs a few smart people, but the company as a whole acts if it were a bunch of incompetent, parasitic morons. Symantec's predictions related network security could be true, of course, but keep in mind that this company has a strong business interest in an insecure Internet.
Attacks accelerating, symantec stocks dropping (Score:4, Interesting)
I have never liked virusscan vendors, they call their product "antivirus software", but it hasn`t changed one bit since the dos days when they where just tools to find which of the 100 files on your hd where infected with one of the 10 or so viruses in the wild. They dont offer any protection against the holes in all the new services and features in operating systems and applications. They only offer help cleaning up known mallware (except for mallware from people that can sue symantec for interfering with their business: spreading spyware)
Clyde: The attacks are increasing in frequency and in complexity," noted Clyde. "And the bar to becoming an attacker is being lowered because the tools are getting more sophisticated. Someone can now learn to use the tools effectively in weeks to months rather than years."
With the Antivirus vendors the attack frequency is always going up ;-) I believe them on that one though. But the complexity? Nothing as complex as nimbda for months now. "the tools" in my view where asambler compilers in the old days, and are C/C++ compilers these days... I hardly think this mathers that much, and if it did, why didn`t we see more C viruses in the dos days? (visual basic has a harder time abusing vulanerabilities, and therefore is unlikely to be used in real worms)
Clyde: The eventual rise of Flash attacks means that the industry will have to take a more proactive approach to security because the attacks will happen faster than humans can respond, Clyde said. "The vulnerability threat window is shrinking and in theory could become zero. We used to have six months between when a vulnerability was discovered to come up with a patch before somebody exploited it. But for Code Red, the time was only 28 days."
A proactive aproach? well I guess the "sitting around eating pie" option is definantly out of the windows then? The vulnarability window for me goes from the moment the faulty code is compiled to the moments every single user is running patched code, everywhere... Getting this window to zero could prove difficould but I am sure mister Clyde will be offering a product that reduces the time to "virtually zero", although it wont be A product but really a service.... an expensive one. I think the six months between discovery and exploit, are six months between vendor notification and bugtraq post of exploit code, I dont think there has ever been a vulnarability so complex it would take a competent coder more then hours to build something exploiting the hole. There are many competent coders out there, not all of them post their work to bugtraq. The posted exploits are usualy posted to force vendors into patching code real fast (usualy after they apeared to be doing nothing for a while), I guess that when it comes to holes in a microsoft product used by 50% of the planet "real fast" is just shorter then the stuff that was discused in the old days on bugtraq.
Clyde: To deal with this eventuality, Clyde said patches would need to be developed more quickly and deployed continuously in an automated mode.
Fast machines with big pipes where what made code red spread fast, machines like the windowsupdate servers.... If even the open source community has problems getting software safely to the users (several cracked ftp mirrors with altered releases) then its safe to asume that big players in the software market are not gonna get the automated update system right in one try. Just think of the holes in hotmail.... sure updating services will have more attention on security, but the hotmail holes where really really pathetic and the most recent one wasn`t any more complex then the previous ones.
Clyde: Other areas that need to be worked on include adaptive management and lockdown of networks so an attack on one router is automatically recognized by all routers on the network; the ability to throttle back the throughput of suspicious packets on the network in order to limit damage; automated tools for ensuring that
The real point about Slammer (Score:5, Insightful)
Of course, Slammer had been patched 6 months prior. So a big part of this problem is that people don't apply patches.
Virus Checkers Don't Work (Score:2, Insightful)
Virus checkers don't work
Norton/Symantec/McAfee would like you to believe that $39.95/year or whatever will protect you but the truth is: these programs check against known viruses only. There is always an incubation period between the appearance of a new virus in the wild and the appearance of the update to detect and kill it. This incubation period provides a window for a real virus to do real damage.
To date, there have been no highly damaging viruses.
Patches??? (Score:2)
SQL 'slammer' should NEVER have been an issue. BASIC security practices would have stopped it. What kind of retards run SQL exposed to the Internet???
Yes, patches are important, but basic common sense is much much more important. Like...people complaining about getting 'pop up spam'. Uhh...why do you have the net messenger service, let alone Netbios, exposed to the public Internet in the first place???
I've seen Jetdirect cards on th
Clearly NOT a job for... (Score:2)
This Is Like George Bush... (Score:2)
Counterattacks (Score:2)
Can you recite Goedel's theorem? (Score:2)
Cyber-AIDS.
Re:Just use McAfee's solution (Score:5, Interesting)
No not making the worm, but going to address the UN about these three classes of attacks. Who came up with these classes and the names? I would be surprised to find out it was anyone other than Symantec, I've never heard of them before.
In particular this supposed "Class I flash attack" which sounds right out of your favorite cold war B-Movie, Clyde is warning of well funded squads of uber hackers funded by national agencies. He is just pandering towards current international paranoia regarding terrorism.
It's even better than creating the attacks themselves (since you run the risk of gettin caught), creating attackers that don't even exist! (yet?)
Speculation and cyber fantasy aside, everyone who lets loose worms or viruses to my knowledge generally turns out to be people with no backing and no real agenda. Has there ever been evidence of international players being caught with their hand in the cookie jar funding any kind of worm or virus or ddos attack?
And really, if you were to effectively prevent this kind of attack by deploying systems widely, wouldn't these super hackers simply launch an attack when they had found an effective way around these measures?
I think it's more likely that frequent update systems would keep out the lowest common denominator attacks, script kiddies and common worms.
Don't get me wrong i think there are big issues with how software comes configured and how security holes are dealt with, and i think it is for the good of the internet as a whole organism that these be addressed, and one of them may very well be very quick automated updating of network facing software.
But it pisses me off to see someone from what i would consider a shady industry (virus protection) addressing people at the UN about these future terrorist hacker squads or whatever, essentially fear mongering to sell software. All on the backs of a great tragedy that had nothing to do with any of this.
"It will not be long before well-funded teams of hackers sponsored by countries or other organizations begin to create Flash attacks that can be launched in seconds,"
Re:Just use McAfee's solution (Score:3, Interesting)
Talk to any number of "in the know" types in the public or private sectors and one of their number one suggestions for personal security is to run some type zone alarm style personal firewall that allows you to manage and block outgoing communications from processes running on your computer. The reason? To combat key loggers and the like that once run and communicating virtually anonymously over the int
Re:Just use McAfee's solution (Score:5, Interesting)
And it doesn't even need to be a hacker. What if your government becomes interested in all your activities? I'm sure TIA gets a lot easier if you can install backdoors on demand on all computers.
What happens if such a patch breaks something? Instead of a few machines breaking, you could break machines all over the world before anyone can get the word out.
PARENT POST IS PLAGIARIZED (Score:3, Informative)
From Bruce Schneier's February 15 Crypto-Gram [counterpane.com]:
"But there's an interesting Microsoft twist. During the days of the attack, Microsoft tried to deflect any blame by claiming that they issued a patch for the vulnerability six months previously, and that the only affected companies were the ones who didn't keep their patches up to date. A couple of days later, news leaked that Microsoft's own network was hit pretty badly by the worm because they didn'
MOD PARENT DOWN - COPY & PASTER (Score:2)
This will explain what I'm talking about [slashdot.org]