The Enemy Within: Firewalls and Backdoors 225
hrbrmstr writes "SecurityFocus is running an article on firewalls and backdoors on their InFocus site. They provide info on firewall types, backdoor classifications, some examples of real backdoors and tips on mitigating their use on your network." Some good topics explained for the beginner, and it's a nice refresher for the veteran admin as well.
Good info (Score:4, Insightful)
Kinda makes me wonder, though, how often articles like this spawn ideas in the minds of the "wrong people," leading to attacks or attempts to attack. Anyone else ever wonder that?
Re:Good info (Score:5, Insightful)
An example would be lets say you're making your own home made cluster remote administrative tool for admining all of your servers from one console. What would be more secure:
A: Greeting the user upon connection with a description of the service, full protocol docs, source code, etc.
B: Sitting, waiting 5 seconds for the first command before dropping the connection. If client sends one wrong byte, instantly drop the connection and firewall their ip so that they cant get a single packet through.
Obscurity isnt security in itself, however it does make a nice addition to an already secure setup.
And if you think full disclosure means instant security, take a look at that opensource database thats had a serious bug in it for 8 years that was only found recently. I can't think of the name off hand, I believe it started with 'Inno'. Even though "thousands of eyes scoured the source code" it still didnt get noticed for eight years-- that is, noticed by anyone that went public with it.
Re:Good info (Score:2, Informative)
The rule (Score:4, Insightful)
Only if "modern" meant "known." Everything else is fair game.
Re:The rule (Score:3, Interesting)
Assuming you have a default ALLOW policy. I'd find it hard to attack an MSSQL server behind a firewall that autodrops all traffic to 1433/1434(udp). (Why I'd want an MSSQL server is another matter.)
It still doesn't stop attacks against kernel-level packet handling but it'll take down most unknown service-level attacks.
remember (Score:2)
Re:The rule (Score:3, Insightful)
So, you just have to hack those hosts, and then you're in.
Fireawlls are not the answer, really.. they mask problems. Firewalls should be the very last step in your security initiative.
Of course, I'll get replies to this about how this is just how it is done - well, too bad - it's not the best way to go and if you don't know it, you should.
Re:The rule (Score:5, Interesting)
Yes and no. If you rely solely on firewalls, yes, because firewalls just contain damage and prevent it spreading. You definitely still have to take care of the weak security on the affected machine(s). However, if you think of security as an ongoing effort (i.e. no "last step"), you'll see that monitoring your firewall may give you much quicker notification of abnormal activity.
Personally, I much prefer to be warned by port scans, etc., than to rely solely on hardening for protection from attacks. It's like having a fence around your house, with a gate in front, and having a burglar standing outside, rattling the front gate, yelling "hey, I'm about to try to break into your house!" He might get over the fence or through the gate, but you'd be awfully stupid, if you knew some burglers did that, not to at least have the wall and the gate.
Carrying the metaphor a little too far, of course, it's a heck of a lot easier to track the guy down and "remove the threat," if you know he's going to try something, and where he is, before he does tries it.
Re:The rule (Score:2)
I much prefer to find a balance between necessary security precautions (e.g., keeping automatically up to date with patches) and going
Re:The rule (Score:2)
If your multiple lines of defense are just string checking, yeah it's not going to be secure for new attacks. If the defense is against the type rather than the specific attack, you are much better off because the type is 'known' even if the attack is
layers (Score:4, Informative)
>Packet filters [1]
> * Operates at Layer 3
> * Also known as Port-based firewalls
> * Each packet is compared to against a list of rules (source/destination address, source/destination port, protocol)
based on tcp/udp port numbers? that would be layer 4, right? Imho Layer 3 applies to ip-address only.
>Application-level gateways [2]
>
> * Operates at Layer 5
> * Application-specific
> * Example: Web (http) proxy
I thought the application layer is layer 7?
someone?
cheers
Sascha
Re:layers (Score:3, Insightful)
Re:layers (Score:2)
Protocols such as HTTP and FTP usually start at the session layer (layer 5) which is what application-level gateways are working on. For you to manipulate sessions transparently you need to hijack the connection at the session layer otherwise you'd need special support for proxy servers.
That said, many applications usually include support for proxy servers anyway since transparent proxies are no
Re:layers (Score:2, Informative)
port numbers are still layer 4 but application drops down to five
see. [firewall-software.com]
Eep! (Score:2, Funny)
Crap, how'd they find m--I mean, that poor sucker.
Re:Eep! (Score:2, Funny)
Re:Eep! (Score:5, Funny)
Re:Eep! (Score:2)
Beware of this guy, man. I also hacked his computer and formatted his HD. He immediately retaliated by formatting my harddisk in return!
Stateful Packet Inspection recommended (Score:5, Interesting)
Pretty much all of Netgear's home routers [netgear.com] have stateful packet inspection features. Some of them are quite inexpensive (how about US$80 [buy.com] for a model that even includes a print server!).
The great thing about stateful packet inspection is that you don't have to configure it. If you want to play some new game that does multiplayer play on the Internet through some wacky port, it will just work, and meanwhile if some random guy blasts packets at that port or any other they will bounce off. If you didn't ask for a packet, it gets turned away.
(If you ever serve as tech support for a friend or family member, be sure they buy a firewall/router with stateful packet inspection!)
Of course, that cuts both ways: any back-doors in your network will just work, also. Don't figure that just having a cool firewall/router with stateful packet inspection is a guarantee that you are secure. But it's a nice start, and it's what I recommend to anyone who has an always-on Internet connection.
steveha
Re:Stateful Packet Inspection recommended (Score:4, Informative)
Of course, somewhat intellegent packet filtering at the router beats the hell out of those "home firewall" programs that make pop ups every time you run a new program.
Re:Stateful Packet Inspection recommended (Score:2)
Re:Stateful Packet Inspection recommended (Score:5, Informative)
Re:Stateful Packet Inspection recommended (Score:2)
Simple. Don't use Windows.. That's a Windows problem.
I quit using Windows in August of 2002 and have not had a single worm, virus, trojan, backdoor, hack, sneeze, fart, or burp since..
Re:Stateful Packet Inspection recommended (Score:4, Interesting)
It's an unpleasant side-effect of the "security does not come through obscurity" argument: since truly strong security is more or less impossible for fully-networked commodity workstations, the more popular an operating system or protocol server implementation is, the more likely it is to be hacked, cracked, and just generally abused.
I've seen this even within the microcosm of Linux servers; the one time I tried to put a relatively well-firewalled (but not, unfortunately, religiously-patched) Red Hat server out on the net, it was hit with a rootkit within a week. Once that was replaced with an OpenBSD system ru awanning the same services, (albiet with a somewhat more recent version of OpenSSH) I was free to check back no more than once every few days to make sure that everything was in order.
(Note: before anyone flames me for my sloppy sysadmin practices, please be aware of two facts: one, at the time, I was already working 40+ hours a week as a lowly coder, and was solely responsible for the design, development, deployment, and maintenance of the dynamic product support website whose server got cracked, and two, I've more than learned my lesson, and now know how to firewall, audit, and harden a system well enough to be back to the point of worrying about application, rather than network or OS-level, security. And, I no longer put anything running Red Hat anywhere near an open port and public IP address, unless I'm ready to wipe and reinstall at a moment's notice.)
Re:Stateful Packet Inspection recommended (Score:5, Insightful)
This has nothing to do with thechnology but more to do with attitude, policy and productivity.
You see in most trades/proffessions you need to learn how a tool works before you are eveluated on the tool. After that you need to apply the tool to the trade, which means you need to understand the workings of the trade. This takes years.
Now, with computers, we have business that are trying to fit the trade to their tools. When that does not work and they encounter problems, they hire someone who knows one tool. They then try to force the tool into the business.
This will never work! You cannot make a general tool to fit every need and at the same time make this tool easy to use. A good example that I can bring up is for MS Word users. Placing graphics in word does not make word a publishing software. All it has done is waste your time and the other person who is to open the document. Word is made for typing letters when we use it for other things it becomes complex. IT DOES A POOR JOB and it costs you more time and money than buiying the right tool or asking someone who is in the trade.
Now before buying any software you need to identify what your needs are. Do you need to access files from home? Better yet why are you taking work home? How manyhours do you propose to work? If you wish to spend more time with your familly then mabye you should look at sleeping less because sitting in front of your computer is NOT familly time. In most cases this an ego issue (Look I can PISS farther than you!) an not a technologie issue.
If Linux can only STOP trying to be Windows then the virus issue will stay with Windows. We have seen on the server side that Linux has not followed in the Windows steps.
One last question why do you first start talking about the desktop and then give a server example?
hmm, that's FUD (Score:3, Insightful)
2. your computer != all non windows setups
3. 10 Months is not a long time
4. Robert Morris
Re:hmm, that's FUD (Score:2)
I have ONE laptop from work that has Windows on it. I only fire it up when I *HAVE NO CHOICE*....
I *USED* to be 100% Windows here, at home and work. I work on Windows computers for people, professionally. I'm IT..
It's not FUD, it's FACT.. I know it from experiance.
I've worked on computers for a living since 1981 and "played with them" since 1978. I didn't just fall off of the turnip truck...
big deal (Score:3, Insightful)
Go read Security Focus [securityfocus.com] and count the number of "Design Errors"
Here's one from today's front page
Linux Kernel Privileged Process Hijacking Vulnerability **
> I have 7 PC's here at home, all of them are Linux.
Your cock waving has no effect I'm afraid.
> It's not FUD, it's FACT.
Re:Stateful Packet Inspection recommended (Score:3, Insightful)
This is a ridiculous argument. Any worm worth two cents is just going to communicate out using port 80, and if the author is really clever it will do it by opening http pages using Internet Explorer so the traffic doesn't look different, and not even local application level firewalls or authenticated proxies can stop it.
Blocking outgoing traffic does nothing for security, and tons to block legitimate applications and the true power of the Internet (as opposed to the Web).
Re:Stateful Packet Inspection recommended (Score:2)
For example, routing MS Gaming Zone to 127.0.0.1 via internal DNS did wonders for productivity around here. The same is true for any of the other 100% timewaster sites, Gator, porn, Yahoo, etc.
Sure a few people will figure it out, but those are on my staff.
Re:Stateful Packet Inspection recommended (Score:3, Interesting)
Re:Stateful Packet Inspection recommended (Score:3, Informative)
You're very confused. This behaviour is absolutely nothing to do with stateful packet inspection. *ALL* routers will behave like this if you enable routing of all outbound traffic - even really cheap and simple NAT firewalls (not really even a firewall). Allowing all outbound traffic means that any tr
Re:Stateful Packet Inspection recommended (Score:3, Informative)
The last time I looked at a cheap firewall/router that did not have stateful packet inspection, I seem to recall that it had most ports closed. That if you wanted to run some wacky program on some wacky port (your new game, for instance) that you would have to fire up the web browser, go to the admin form, and open the port. A
Re:Stateful Packet Inspection recommended (Score:2)
Re:Stateful Packet Inspection recommended (Score:2)
It could also be configured to only allow game playing by certain characters, at certain times of the day (even if it does use port 80) and/or require you to provide extra authentication to go out.
For S
I like (Score:5, Interesting)
http://smoothwall.org/beta/ [smoothwall.org]
I put three nics in a Pentium 90 that I found on a trash heap. One nic goes to my RR cable modem, one nic goes to my switch and one nic is for my son's Playstation 2.
I can control every aspect of the firewall from any pc on the green nic. The firewall pc doesn't even have a keyboard or monitor.
I can VPN through it with ease and I have port forwarding from an oddball port number to port 21 for a private FTP so that RR won't find it.
It's really easy to use and so far I've had no problems.
Of course ALL the machine inside of it are Linux boxes and all of them are using iptables (w/shorewall) so everything is really secure..
For a super easy, very cheap and very fast firewall try floppyfirewall at http://zelow.no/floppyfw [zelow.no]
No worries here...
Re:I like (Score:3, Interesting)
What was your reasoning behind adding a NIC specifically for the PS2? It should work fine just connecting to your switch, and assuming you have DHCP running for your internal network it won't even require any setup for the PS2. Plus, you can get an XBox as well and plug that into the switch, and have both running at the same time.
I'm s
Re:I like (Score:5, Informative)
Several of the games want huge chunks of ports opened up. Uh uh. Not gonna do that. So I added the third nic as a DMZ (smoothwall calls it "Orange Zone") so that the PS2 has unhindered access to the web.
There are three nics,
red=nic to modem (dhcp)
orange= nic to PS2 - 192.168.2.1
green=nic to my lan - 192.168.1.1
The red zone is the nic that goes to the cable modem, it gets it's IP from RR's DHCP.
The orange zone nic is hard coded to 192.168.2.1 (by me) and the PS2 is 192.168.2.2 There are no port restrictions on it, it's raw and naked on the net, as it wants to be..
Since it's a PS2 it doesn't matter.
Smoothwall provides DHCP for the green zone so whatever I plug in to it works. Nice. People bring me PC's all the time to work on.
Another nice thing smoothwall does is take care of dynamic DNS for me, I have a freebee domain from dyndns.org so I can FTP to a private box on my lan from remote sites (while working) and I have accounts setup for my friends so they can ftp in too.
I hard coded one of my boxes to a specific IP then port forward from port XXXX to port 21 at my internal IP of 192.168.1.205. Only my friends and I know it's there and can access it. Very handy.
Veyr often I get somewhere and remember that I forgot something important! Bada bing! I can connect up to the house and get it... Smoothwall is VERY handy for my needs. I have no complaints about it...
Re:I like (Score:2)
Okay, I'm still a little confused. (Read my suppositions about your reason here [slashdot.org], if you like)
/24s instead of one /2
Can you not assign more than one block to a NIC? Assigning them as two discrete
Re:I like (Score:2)
1. I'm lazy. I have plenty of old nics laying around too. I'll get more elaborate with it another day.
Besides, I don't feel overly compelled to put much effort into it, he's moving off to college this fall.
This simple fix works. In two months he'll be moving out (Hooray!! Shhhh!! I didn't say that!!)
2. My son just got his Linksys adapter and was bugging me. This was the most easy and the fastest way to shut him up..
There! Now I feel better that the truth is out...
Re:I like (Score:3, Informative)
Well, I have a confession to make, then, also, just so you don't feel bad:
Remember what I said about the PPPOE and ICS and a star config with one NIC on the gateway, and all that?
I actually ran that for a while when I was living with my parents, before moving out. It was dog-slow when they'd be on their box though, sometimes, because ICS isn't exactly very efficient, and bouncing it in and out across the same segment didn't help. Plus, they couldn't tur
Re:I like (Score:3, Informative)
Nice, but I strongly suggest you use SSH instead, particularly since you're on a cable connection.
You can download a windows client called putty [greenend.org.uk]. It's a small, standalone
Re:I like (Score:3, Insightful)
First of all, I don't see the problem about putting the *public* key of an ssh server in the registry
Secondly, you can easily clean up everything putty has put in the registry by using the -cleanup switch. (e.g. putty -cleanup)
Re:I like (Score:2)
I use scp for copying files. Usually between *nix boxes, but there's pscp (command line) and WinSCP (GUI) if you're on a windows box.
Does sftp do anything winSCP [winscp.vse.cz] can't?
Oh, and if you're somewhere where you can't install software for whatever reason, there's a java SSH [javassh.org] client too. This needs to be hosted from the same IP you're connecting to bec
Re:I like (Score:2, Informative)
I've never used Smoothwall, instead doing all of that by hand (setting up a firewall, DHCP; haven't bothered with dyndns though, since I used to have static IPs and now that I don't I haven't found a need to connect to my home PCs yet). The way I would've setup your topology would have been to set a given IP to the PS2's mac rather than just getting a random IP, and then setup appropriate firewall rules for that IP. The rest of the internal network would have its own separate rules.
Then again, I didn't
Re:I like (Score:2)
I also want to play with chained firewalls, that is one physical firewall going into
another one then into my lan. Like the mega-paranoid version..
Just for fun..
Re:I like (Score:2)
Except he says he has a switch, already [slashdot.org]:
He's assigning IP via DHCP either way, probably, and the switch would be easier.
There's only three possible advantages I can see to this setup.
Re:I like (Score:3, Interesting)
The PS2 did not like being behind a firewall. The game people say to open up huge blocks of ports to allow unsolicited incoming traffic. I don't like that concept.
If I open up 1000 ports (ports 6,000 to 7,000) plus a handful of other ports, and the PS2 is on the same zone as my other machines, well you get the picture.
I *THINK*
Re:I like (Score:2)
Good reason. Easy is always good.
Someday, you might try to route the unfiltered block to the same NIC as the filtered block, just to see that it can be done, but no need to break what works, certainly.
The cool part about routing both that w
Re:I like (Score:2)
Re:I like (Score:2)
Did you RTFA? (Score:2)
I've done something similar. But did you RTFA? It's point was that backdoors are often not blocked by firewalls because firewall policies on outgoing connections are usually permissive. What matters, in the context of this article, is what your iptables restrict, not whether you have th
Re:Did you RTFA? (Score:2)
Now if I had some Windows machines on the lan then I *would* have cause for concern.
But of course I *don't* have any windows boxes so I sleep really well at night..
Really well...
Re:I like (Score:2)
I drive around and rescue them, clean them up real nice, convert them to Linux based firewalls and resell them for $$$....
Now for the people that I sell them to, well headless *IS* a good deal for them, they need it that way..
Re:I like (Score:2)
-bloo
Re:I like (Score:3, Insightful)
But the firewall is MUCH better.
Besides, you can add one or more DMZ nics in a PC.
And if you find a serious problem with your firewall, you just fix it. You can even totally change the software out and get very, very precise tunning of your iptables. I think they call it granular control..
No can do with a $50 bestbuy firewall/router... A $50 router is kind of like a having a Chihuahua guarding your home.
Re:I like (Score:2)
I will end up trying out Clarkconnect sometime in the future, I evaluate lots of stuff because I get requests from people that have different needs.
I don't believe that there is ONE package that will suit the needs of EVERYONE. That "one size fits all" theory just never works out in actual practice...
What I would really like to find is a GPL firewall package that will also retrieve email, filter it for virus, then serve to the lan. I have M$ customers that
Re:I like (Score:2)
ClarkConnect includes RAV antivirus. I just read that on the http://www.clarkconnect.org [clarkconnect.org] website.
RAV was recently purchased by M$ [ravantivirus.com]. So much for security.
I won't use or recomend any products based on M$ and most certainly won't use and products produced or owned by M$..
how come... (Score:3, Funny)
SecurityFocus says no MacOS EVER exploited once! (Score:3, Interesting)
I find it both sad and amusing that people try to publish studies about this topic without first addressing the fact that there are more secure platforms for webserving.
It is a concrete fact that that no MacOS based webserver has ever been hacked into in the history of the internet.
The MacOS running WebStar and other webservers as has never been exploited or defaced, and are are unbreakable based on ample historical evidence.
In fact in the entire SecurityFocus (BugTraq) database history there has never been a Mac exploited over the internet remotely. Scan it yourself.
For years, except, for the last week, the army has always used MacOS and has never had a breakin on a Mac. Unlike their other MS defacements.
http://uptime.netcraft.com/up/graph?site=www.arm y. mil
That is why the US Army gave up on MS IIS and got a Mac for a web server.
I am not talking about FreeBSD derived MacOS X (which already had a more than a 30 explo its and potential exploits in BugTraq) I am talking about current Mac OS 9.x and earlier which are highly sophisticated abstract-OS models.
Why is is hack proof? These reasons
1> No command shell. No shell means no way to hook or intercept the flow of control with many various shell oriented tricks found in Unix or NT. Apple uses an object model for procces to process communication that is heavily typed and "pipe-less"
2> No Root user. All mac developers know their code is always running at root. Not hing is higher (except undocumented microkernel stufff where you pass Gary Davidians birthday into certain registers and make a special call). By always being root there is no false sense of security, and programming is done carefully.
3> Pascal strings. ANSI C Strings are the number one way people exploit Linux and Wintel boxes. The mac avoids C strings historically in most of all of its OS. In fact even its roms originally used Pascal strings. As you know pascal strings are faster than C (because they have the length delimiter in the front and do not have to endlessly hunt for NULL), but the side effect is less buffer exploits. Individual 3rd party products may use C stings and bind to ANSI libraries, but many do not. In case you are not aware of what a "pascal string" is, it usually has no null byte terminator.
4> Macs running Webstar have ability to only run CGI placed in correct directory location and correctly file "typed" (not mere file name extension). File types on Macs are not easily settable by users, expecially remotely. Apache as you know has had many problems in earlier years preventing wayward execution.
5> Macs never run code ever merely based on how a file is named. ".exe" suffixes mean nothing! For example the file type is 4 characters of user-invisible attributes, along with many other invisible attributes, but these 4 bytes cannot be set by most tool oriented utilities that work with data files. For example file copy utilities preserve launchable file-types, but JPEG MPEG HTML TXT etc oriented tools are physically incapable by designof creating an executable file. The file type is not set to executable for hte hackers needs. In fact its even more secure than that. A mac cannot run a program unless it has TWO files. The second file is an invisible file associated with the data fork file and is called a resource fork. EVERY mac program has a resource fork file containing launch information. It needs to be present. Typically JPEG, HTML, MPEG, TXT, ZIP, C, etc are merely data files and lack resource fork files, and even if the y had them they would lack launch information. but the best part is that mac web programs and server tools do not create files with resource forks usually. TOTAL security.
4> Stack return address positioned in s afer location than some intel OSes. Buffer exploits take advantage of loser programmers lack of string leng
Re:SecurityFocus says no MacOS EVER exploited once (Score:3, Funny)
That's because there is a grand total of 1 (ONE) MacOS based webserver(s) on the internet.
Re:SecurityFocus says no MacOS EVER exploited once (Score:3, Insightful)
Right. It's secure because they removed all the things that make a computer worth using. No command shell? How do you do remote administration? Bleh, i could go on, but I don't care.
its quite amusing that there are over 200 or 300 known vulnerabilities in RedHat over the years
I think you mean "200 or 300 fixed vulnerabilities". That's just how it goes, I guess. They find a problem, it is disclosed, and fixed. End of story. Unlike other OS's that try to hide all their problems inst
Re:SecurityFocus says no MacOS EVER exploited once (Score:2)
You just described DOS. (Score:4, Funny)
Re:SecurityFocus says no MacOS EVER exploited once (Score:3, Informative)
Well, I'm not "the linux community", but I'd like to see your MacOS 9 box serve up files for twenty thousand students and staff with decent performance and mantain an uptime greater than single digits.
Routers (Score:5, Interesting)
Re:Routers (Score:4, Insightful)
Kind of funny that this comes up right as I'm thinking that my hardware/router based firewall isnt' enough and that I need to back it up with a linux software firewall.
IIRC on the home routers, any program requesting a port to talk out of can recieve a request back on it. SO... your WORM opens up port n, sends the info, get's it's commands to try on your system, then sends off the next command it's done/how and waits for it's marching orders.
Re:Routers (Score:2, Insightful)
To do this, the worm would already have to be on your disk. If your system is already infected, then all bets are off....
If Jane Q Public has a router that requires port-forwarding for external connections, and she takes other reasonable precautions to prevent an initial infection (re. downloads, email attachments etc.), she will be
Re:Routers (Score:2)
If you use IPTables on your linux box, you're not going to be doing much. IPTables is just a packet filter, and can't block access to individual applications.
Re:Routers (Score:2)
SSH Tunnels (Score:5, Informative)
Rus
Re:SSH Tunnels (Score:4, Interesting)
For even more pertinacious network environments, one can use httptunnel [nocrew.org] or the more advanced desproxy [sourceforge.net]
Most secure solution isnt simple, but its the best (Score:5, Informative)
2) For services you must offer to internal users (www access etc), use good proxies and authenticate every connection.
3) Ensure all services/software products are up to date with security patches. This INCLUDES user workstations.
4) Keep track of security-related sites and lists, such as bugtraq, packetstorm etc.
5) IDS' inside your perimeter to detect anything you're missing. After all, no-one (and by extention, no-one's ACLs) is perfect.
6) Ensure you pay close attention to any remote-access you offer. Modem banks, VPN endpoints etc. Preferably these should also be access-controlled via ACL's of some sort.
7) Ensure you configure your software properly. Seems stupid, I know. But a perfectly secure (from a bugs point of view) mail server is suddenly a problem if you've forgotten to disable mail relay.
8) Ensure you have the right topology. There's no point in spending hundreds of man hours securing services, auditing router ACLs etc etc if theres fifteen different ingress/egress points to your network. The less, err, gresses you have, the more you can concentrate your efforts and thus use your time effectively.
Caveats: I may have missed one or two points in the above summary of practice, but hey - it's a friday arvo and I want to get my work finished so im not here late.
Also note that while the above list sounds relatively easy to implement, IT ISN'T. Be prepared for a lot of work if you want to do it right.
Re:Most secure solution isnt simple, but its the b (Score:2, Insightful)
Re:Most secure solution isnt simple, but its the b (Score:2)
Call up a company, promise them anonymity, and ask them how much hackers cost them last year, and they'll throw out some exorbitant figure. The best indicator to their *real* losses, though, is how much they spend on computer security, which in the view of computer security experts is never "enough" - i.e. the computer security experts overestimate the problem.
Default deny (Score:3, Interesting)
Hmm, well, not necessarily. I am thinking this is why there is such a thing as a default-deny firewall ruleset policy.
For example, you have a dns server and http server up and running on the standard ports, and anything else gets binned.
I'd say that's a fine example of 20-year-old technology (firewalls) catching a backdoor.
Something like Zonealarm for linux? (Score:2, Interesting)
Re:Something like Zonealarm for linux? (Score:2)
Right now even the worst spyware offenders have clean Unix/Linux versions/equivalents, so it's pointless.
Re:Something like Zonealarm for linux? (Score:2, Interesting)
Re:Something like Zonealarm for linux? (Score:2)
Another interesting idea would be to expand this to work on a NAT gateway, dynamically adding iptables/pf/etc. rules for individual machines or entire subnets. Or maybe even go further and do traffic analysis at higher levels ("disallow all traffic of this type (Kazaa, etc.) from this subnet"). Of course, this is getting way ahead, and I a
The whole article describes: (Score:5, Insightful)
2. How to become a perfect target of DoS attack through paranoia (imitation of any intrusion-like activity will make the supposed origin unable to access you).
3. How to defend yourself when you have already lost, and are for all practical purposes as good as dead.
This article is missleading. (Score:2)
This piece of balance was less than objective:
Chances are significantly higher that in most organizations a hacker will have a much easier time finding an un-patched Windows or *nix system to exploit than they will an un-patched and/or misconfigured piece
Everyone seems to be missing the point (Score:5, Insightful)
The concluding sentences contain the main learning point, as I see it: you need a way to identify all connections down to the source (user).
And you need to make sure that all those dumb users know you're watching them and that you will hold them accountable for breaches of security that they initiate.
Or is all that so obvious that no-one has felt the need to point it out?
Re:Everyone seems to be missing the point (Score:2)
Using restrictive ACL's on your outbound interfaces, you can kill connectivity for most types of malicious connections. For protocols you MUST run - say HTTP, outgoing SQL, outgoing SMTP and the like - you *proxy* every single connection, and ensure each connection is authenticated.
The beauty of this solution is two-fold. First, it blocks off almost every type of malware connection you're going to see from exiting your network to $SKIDDIOT on the outside. Secondly,
The more you tighten your grip... (Score:2)
This is, so far as I can tell, standard industry practice in certain places, and I'll tell you the result: everything gets tunnelled over HTTP.
When people have some brand new protocol (say, when Microsoft was developing SOAP)
Re:Everyone seems to be missing the point (Score:2)
Firewall Systems Considered Harmful (Score:3, Insightful)
Firewall Systems Considered Harmful [clock.org]
Transparent firewalls (Score:3, Interesting)
But it seems that it's quite uncommon for firewalls to even support this feature and even less common for people to actually use it in this mode. Is there a reason that more firewalls don't support this functionality, or are there good reasons not to configure your network like this?
A major problem we would have if we used something like a Cisco PIX is that we wouldn't be able to see the websites we are hosting. The domain would map to a normal internet facing address, yet we can't see those addresses from the LAN (they don't seem to apply the port mapping to connections that have come from the LAN - so we'd need to look at them on their internal IP or something).
How many people actually use transparent firewalls? Or how do you get round the problems above if you're a web hosting company and you don't have a transparent firewall? Do any decent firewalls (apart from Sonicwalls) actually support this?
Nick...
Re:Transparent firewalls (Score:5, Informative)
Setup the PIX. Use static maps for the IP addresses, so your webservers etc are behind the pix but using the public IP's. When an internal machine tries to connect to the IP address of your website (say 210.20.38.129), the request is forwarded to your default router (border router usually, unless you're on a larger network). The router gets the request, goes "hey, im responsible for that IP. It should go *HERE*" and fowards it back to the webserver *through* the PIX. At no point does the PIX attempt to map the IP address of 210.20.38.129 to the MAC addy of your webserver for the internal connection. Only after the connection has bounced off the border router does the PIX go "hey, incoming *external* request for 210.20.28.129. I've got a static route for that. I'll send it to $webserver". And your connection works.
Now, if you use a domain name for the request (as most people do when using a web browser), your internal requests will first bounce off your internal DNS. And that's where the problem is. Your internal DNS is configured to point www.myinternalwebserver.com to 192.168.0.129 (or whatever the machine's internal interface is) instead of the public IP address. If it was pointed at the public address, your machine would get said address returned to it after doing the DNS lookup and follow the steps in the paragraph above. Namely, the req bounces off the border router.
As a side note, transparent firewalls are synonyms for bridged firewalls. I.e. it's impossible to actually gain network connectivity to the firewall because for all intents and purposes, it's setup to act as an intercept on a peice of cat5, not as two interfaces seperating two network segments. Think of it as tapping a Cat5 cable and trying to ping the tap itself. Not going to happen, as neither the bridged firewall system (or the tap, per example) have interfaces with an IP address.
There's a guide floating around the net on how to implement bridged/transparent firewalls using OpenBSD if you're interested. It can be found at http://ezine.daemonnews.org/200207/transpfobsd.ht
Re:Transparent firewalls (Score:2)
The other criteria which I forgot to mention is that we also need VPN support. Can a bridging firewall support VPNs when, it doesn't actually have an external facing IP of it's own? Presumably it would have to create a virtual IP address and use that for the VPN?
I don't really want to try building one myself using BSD, as then it would be my fault if
Re:Transparent firewalls (Score:3, Informative)
Re:Transparent firewalls (Score:3, Informative)
There is no requirement for a Checkpoint/1 or Cisco PIX firewall, for example, to use private addresses on the inside, and translate them into public addresses on the way out. It's just a question of how you configure the system.
On the one hand, you could have your public addresses "on the inside of the firewall", with one address being the firewall's "insi
Bits go in. Bits go out. That's what networks do. (Score:4, Interesting)
The real problem here is that these Security Focus people are still trying to design a harder eggshell. Any "barrier" must allow some traffic through, or it will break the network. You cannot install a barrier that understands how to distinguish between good and bad traffic. It is not a closed problem. It is an open-ended problem. It isn't about computers or technology. Its about people and subversion. The answer is too difficult for most people: trust is arbitrary and inherenly flawed, but it is absolutely necessary for human interaction. The technology just fools us into thinking we can control things like a vending machine. The problem seems to be transparent because we can see lots of stuff on the inside of technological subversion, but at the bottom is void: trust is arbitrary and error prone.
The real answer is that we must do what we are already doing, willingly, instead of reluctantly as we do now: accept subversion as a part of the system. We must understand that we created the space-time in which the subversion is manifest. It must be percieved as the limits of our power. Once that is understood, it is also understood how to coexist with limited power. This is the fundamental social problem: being with others. Consider that the subverion is another feeling person expressing their limited power outside the scope of our limited power. Take compassion on that person if they do not know the suffering they cause will come back to them. Do what you can, each as individuals, to absorb the effects of those bad effects so that they do not become causes of other bad effects.
Recurse your awareness; avoid recursing your (or others') mistakes. Security does not exist. Only fools really believe in it.
Re:Bits go in. Bits go out. That's what networks d (Score:2)
Re:heh, 3Com (Score:5, Funny)
I remember this time I was all drunk and busy trolling slashdot and I got to this article that was related to what I do for a living, only it was related in the most remedial of fashions and I was like "right on, I can troll this motherfucker like it ain't nobody's business, fo shizzle mah nizzle, and I may even get mod points cuz of the bullshit I'm about to spew."
Anyway, I was reading this mofo and I came across some whack job herion addict post that said some stupid shit and I read it and reread it and reread it, and was like "well, I'd troll this sumbith, but the wanker can't even write coherently". So I read it again and was basically like "WHAT?!?!" and then I was all passed out.
Re:heh, 3Com (Score:2, Funny)
shit! (Score:3, Informative)
look what certain backdoors [afentis.com] can do to you.
Re:Just remembered (Score:5, Funny)
Re:Just remembered (Score:3, Funny)
That's where the man sits up and begs and the woman rolls over and goes to sleep.
arf! (Score:4, Funny)
If only I could do that self-licking thing, like they do afterwards. Why do they even bother with the middle?