Secure Your Network NSA-style 42
farker haiku writes "The NSA has unclassified a pdf on how to secure your network in sixty minutes. All in all, it's an interesting and informative read if you are in the security biz. The article covers a variety of topics such as Buffer Overflows, Intrusion Detection Systems and using Tripwire ASR to ensure the integrity of your network server."
Classified information? (Score:4, Insightful)
The NSA has unclassified a pdf on how to secure your network in sixty minutes.
This was classified? All the information in this document has been freely available on the Web for quite some time now...
I'm still gonna print this up and put it on my shelf...the NSA logo on the front looks pretty impressive. ^_^
Re:Classified information? (Score:2)
I believe he should have said "The NSA has AN unclassified a pdf
I doubt it was ever classified to beginwith.
Re:Classified information? (Score:2)
UNclassified. Not DEclassified. Adjective, not verb.
Re:Classified information? (Score:4, Informative)
Re:Classified information? (Score:1)
Re:Classified information? (Score:2)
Security Through Sudo (Score:2)
Re:Security Through Sudo (Score:2)
Hmm... not quite. They both have their purposes:
There are other distinctions between them as well, but this should give you the idea of what e
Re:Security Through Sudo (Score:2)
The benefit sudo gives you, however, is you can restrict the users and groups who have this sudo access on a more fine-grained basis, whereas a setuid binary can be accessed by anyone in that group.
So really, the parent is right.
Re:Security Through Sudo (Score:2)
Good point - you can implement setuid using sudo; I'd never thought of that, since it's easier to just chmod +s the requisite binary....
I was more trying to describe how (fine-grained) sudo is different from setuid... but looking back, you're right: the parent asked if we can eliminate setuid using sudo, which we almost can.
Except, remember: sudo *is* a setuid binary.
Re:Security Through Sudo (Score:1)
With ACL (Access Control List) support in filesystems now, is sudo really more fine-grained at permissions than setting an ACL on the setuid file? or are they about equal?
Re:Security Through Sudo (Score:1, Interesting)
ownt!
Re:Security Through Sudo (Score:3, Interesting)
Really, disabling the root account entirely and instead letting users (well, administrators) use sudo doesn't really increase security that much. If you have root access to the box, you have root access to the box, be it via su, login or sudo. If you have the
Re:Security Through Sudo (Score:1)
Re:Security Through Sudo (Score:1)
Faster than 60 minutes.... (Score:4, Insightful)
Step 1. Unplug it.
Ta-daaaa! Secure at last.
Re:Faster than 60 minutes.... (Score:2)
You just reminded me of an old comic from Rory Blyth.
Re:Faster than 60 minutes.... (Score:2)
Hmm... that document is dated from 2002... (Score:2)
Still, it makes an interesting read. Not so much "Secure your network in 60 minutes", but rather, "the first 60 minutes towards ensuring your network is secure".
Re:Hmm... that document is dated from 2002... (Score:3, Insightful)
Not that different. It's only three years ago, after all.
Sure, there are certainly some differences, with certain types of threats becoming more common and other sorts of threats becoming less common, but I'm not really aware of any fundamentally new threats appearing during that period, at least not anything that the `old' defenses (as described by this paper) aren't effective against.
Probably t
NSA: Purely Professional (Score:4, Funny)
I don't think they finished the job.
Lots of good stuff there... (Score:3, Informative)
confused (Score:1)
Anyone care to explain this? 'Cause the file certainly doesn't.
Re:confused (Score:4, Informative)
This assumes you have some systems which can ONLY use the LM hash. Systems with later capabilities can be forced NEVER to use LM hashing by simply using a 15-character password or longer, which won't fit in an LM hash even if it is enabled (which it shouldn't be these days, *unless* you have legacy systems that require it).
Re:confused (Score:3, Informative)
Re:confused (Score:2)
Also, IIRC, "traditional" Unixes had issues with >8 character passwords, in the days before MD5/Twofish shadow passwords.
NSA-style? (Score:3, Interesting)
Somehow I doubt it.
In general, this is a pretty reasonable approach to securing your network. It's much more secure than it was when you started, but it's not locked down so tight that you can't get any work done on it.
Like the rest of the world, the computers at the NSA are probably locked down to varying degrees depending on their function and the type of data they contain.
This general sort of lockdown (as described in this document) might be appropriate for systems that don't contain confidential information and don't perform mission critical services, but I would imagine that `NSA-style' would really apply to the systems that contain confidential, top secret, etc. information, and the degree that these systems would be locked down would be much much more than is described in this document. And is probably still classified, though much of it could probably be figured out by anybody skilled in the area of computer security.
For starters, the `top secret' computers at the NSA probably don't have any network access at all, or if they do have some, it's to a small, secure network of similarly secured systems (and NOT to the Internet) and physical security is taken to the extremes (think movies like Mission Impossible.) Code probably isn't run on these systems that hasn't been gone over, line by line, by the NSA itself. This sort of scrutiny requires lots of time and money, so any software being run is probably relatively old. The hardware itself is probably checked similarly, so it's likely to not be state of the art itself, except for the security components used to protect it.
THAT would be `NSA-style'. And the only way you're likely to read the books on how that works are to 1) get the appropriate clearances from the government (Classified? Top Secret? I don't know), 2) get a job with the NSA, and 3) *need to know* what's in that book.
Re:NSA-style? (Score:2)
Do I know quantitatively how right I am? No. I just know that in general, I'm usually right. (And if I don't know, I'll say `I don't know', which is also right (unless I do know, I guess.) So yes, the deck is indeed stacked.)
Ok, enough of that sillyness :)
I believe that only the gnu versions of those utilities ha
Re:NSA-style? (Score:1)
Are you trying to imply that the NSA only runs in-house software or FOSS programs? Do you REALLY think Microsoft would allow that? Somehow I doubt it. Why would they trust that insecure, terrorist-supporting software when they can use trusted, innovative software?
Re:NSA-style? (Score:2)
If the NSA asked Microsoft for their source code, they'd probably get it. And they probably have asked for it, and have probably had it for a long time now.
Microsoft actually does give out their source code (or at least parts of it) to companies who have a serious need for it, and are willing to sign all sorts of NDAs to get access to it.
I certainly do believe tha
Full Text Of Article (Score:1, Funny)
2. Place large concrete box in hole
3. Place computer in concrete box
4. Fill box with molten lead
5. Cover box with concrete lid
6. Fill in hole
Re:Full Text Of Article (Score:1)
(sorry, but you were asking for it...)
Not a dup (Score:2)
Slashdotted? (Score:2)
OLD publication: Updated July 12, 2002 (Score:2)
From the cover page of the NSA Guide:
Updated July 12, 2002
Version 1.2
The Guide has been the same for almost exactly 3 years.
Secure Your Network in Sixty *Seconds* (Score:2)
Mystery step (Score:1)
But I don't quite understand some of the steps in the document. For example, what do these lines do? Oh well. To paraphrase Superman, If we can't trust the NSA, who can we trust?
Re:Mystery step (Score:1)
Re:Mystery step (Score:2)