NYT Magazine Says No Network Is Secure 144
bw writes "The NYTimes magazine explains why there is no such thing as a secure network. Along the way, it compares the attacks of script kiddies to a million monkeys firing catapults at random -- some attacks are bound to succeed. Also, Eugene Spafford thinks that after Y2K suits dwindle away, hungry lawyers will start looking at how the promiscuous connectivity of modern office apps can have dangerous side effects (think Melissa with a payload). " A truly excellent article! It's quite long, but worth the reading time, and if you don't have a (free) NYT login yet, this is the time to get it.
The problems with security (Score:1)
Network admins in a lot of corporations simply do not take it seriously. The attitude is "Hey! We're behind a firewall, there's no reason to worry about security." Bzzt! Wrong. In a corporate environment, the outside internet is only half your problem. You have to fear your own users just as much. All it takes is one employee who is disgruntled or a corporate spy or who simply knows to much and sets up a vpn link from home to work using SSH and you've got a major problem on your hands.
Also, users tend to not like security because it makes their lives more difficult. This problem is particularly bad with the clever users who often figure out how to bypass security in order to make their lives easier. Once security is compromised, you've got an opening for those corporate spies and disgruntled employees.
If you want any measure of security at all, you'll keep your sensitive machines off any network connected to the Internet. Apart from that, I'd suggest running a REALLY secure operating system such as DG/UX with the B2 options installed. In order to get the B2 rating, they had to audit every single function in their C library to insure that there were no side effects that could compromise security. They also had to audit all of the system programs that the OS ships with. They have Posix.1e functionality and then some. It's really quite an impressive system.
Charles C. Mann has a clue (Score:1)
In the August issue of the Atlantic Monthly, he has a very clueful article about Linux, and goes into the GNU story. There were a few minor inaccuracies, but the big one is failing to mention RMS' greatest contribution: gcc.
Unfortunately, the August issue of Atlantic is not yet on-line. But monitor the URL
http://www.theAtlantic.com/atlantic/issues/curr
and it will appear eventually. Also you can search the Atlantic for previous articles by Mann. Slashdot readers will probably enjoy his multipart series on copyright issues in the digital age.
Re:Security whine or blame ...? (Score:1)
Passwords (Score:2)
What's worse is that for better system security, passwords should be hard to guess which, unfortunately, makes them hard to remember. Over a dozen different hard to remember passwords that should be changed every couple of months is near impossible to manage.
We need a better solution.
Will
Re:Great article for the non-literate masses (Score:2)
How about '--verbose'? :)
MS owns the file formats (Score:1)
Microsoft Office. It's not just the number-crunching that needs to be classified -- the resulting statistical analysis, report, and presentation are classified too. In fact, many people with classified data on their computers -- probably a majority -- have it there for communication only.
For an amazing fraction of the people in this country, these kinds of tasks imply use of MSOffice. And the rest of us have to communicate with them.
Re:Too much security is a security flaw (Score:1)
Yeah, right. (Score:1)
You assume that the only reason people crack computer systems is for the challenge. Crackers like to push this image because it makes them look like the "tormented genius" who breaks into computer systems as an intellectual challenge. In fact, they provide a service by showing us our security holes! What wonderful people! (Sarcasm intended)
It is a well-known cracker ethic that once you break in, you don't damage the data. However, a number of crackers (especially the current onslaught of 13-16 year-olds who may or may not understand the "community" they have chosen to align themselves with) don't follow these guidelines and just break things. Denial of Service attacks have become more common, yet taking down a computer system is just a few steps less severe that destroying it's data. Sometimes having your information when you need it is as important as having it at all.
And I haven't even talked about the virus writers who have violated the "don't touch the data" principle more often than all crackers combined. That's another use of security: to keep programs from destroying the data of other programs. The only difference between a trojan horse and a buggy program is intent. A simple bug can trash a whole system if the operating system allows it.
Basically, to argue that security is unnecessary, one has to pretend people don't do things just to be annoying. They do, and they will if you let them. Cracking is driven by curiousity and the desire to destroy. You've only considered one of those motivations.
By your criteria, the only computers that ought to be hooked to the Internet are the vast majority of home machines that are used for games and web-surfing.
Everyone else has data to protect and work to get done.
Re:Yeah, right. (Score:1)
Security where you don't expect it (Score:2)
Not so long ago it seemed that you could get away with not auditing the many large applications which are not set[ug]id and do not directly process data from the network.
Nowadays even the most innocuous tool is going to have malicious data piped through it sooner or later - ghostscript, libjpeg, your cddb-enabled CD applet.
While an attacker may not crack root directly through such attackes, it still let them use your account - i.e you email, PGP keys and personal files. They may still crack root later using keystoke sniffers, careless passwords or bugs in local setuid apps.
The solution? We can start by making sure that all developers understand that security is a basic requirement for all software - you would think that this is a given, but alas security is usually an afterthought (if it is considered at all). Compliers like stackguard-gcc and languages with built-in security like Java will help, as will fast virtual machines that we can use to imprision suspicious code.
Class Action Suit Against MS for Melissa Virus? (Score:1)
How about that? We all saw the news reports about how much it was costing companies for downtime and cleanup. It is a direct result of Microsoft's poor attention to even the most minimal security. The numbers are big enough to warrant a suit. Companies everywhere (except software probably) would probably like to see Microsoft's products held to the same standards for safety and fitness for purpose that their products are. They would probably like to see that Microsoft can't get away with making fraudulent claims in marketing materials anymore. Anyone else think it could work?
I don't think it'll work that way... (Score:1)
They won't lose marketshare unless people really believe they are doing something wrong and that their software is not the best available. That won't happen as long as Microsoft is allowed to continue blaming everyone else for their own security problems. Microsoft is a big respectable corporation. They wouldn't lie about this, right? They'd get in trouble if they did, right? The government looks out for consumers on stuff like this, right?
The only way to expose them is to take them to court and win. That is probably what it will take to wake up the PHBs of the world.
Problem is both... (Score:1)
Seems to me that the situation should be handled similarly to the way the police deal with someone who left their car open with the keys in the ignition because they "just had to run in and drop something off real quick." When their car gets stolen, the police will do what they can to find the person who did it and punish them, but the person who was dumb enough to leave the thing wide open gets a ticket for that as well. Consider it a ticket for negligence that costs taxpayers money by unnecessarily inviting crime. People shouldn't make things so easy for criminals. This aplies to everyday security, and should obviously be taken much more seriously by individuals and companies with more to lose than a car.
What I'd really like to know.. (begging responses) (Score:1)
I'm telling you: This is a very important election cycle. We had better make sure that the public understands the issues, and that the politicians disclose their positions... and then vote!
Ok. I'll agree with you on this. Now, how do you propose we do this?
How do you go about explaining these issues to people without sounding like a conspiracy nut?
How do you get "the people" to pay attention to something they don't really understand.
How do you give them a reason to pay attention? Probably 70% will be happy if the government "cracks down on crime" and "stops violence in our schools," and/or "saves social security" or "ensures good health care for HMO members." None of which they are likely to really do, but they will claim they did, and people will believe that.
Then there's the problem of getting ANY politician to state his/her position on things that they don't even want to admit are issues. They don't want this stuff to be public usually. If it does go public, they have to seriously oversimplify it and then spout some cheesy rhetoric that will make people nod their heads and think they understand what's going on.
Most likely, though, they don't even have a position. In that case, it is likely that they will just go along with the people who are funding their campaign rather than doing what's in the long-term best interests of all of us. This can be applied to all tech-related issues really. That's why I'm asking these things. It's not just the things you mentioned in your post, but many other issues as well. The decisions they make aren't just going to be policies that can simply be changed later. They have a lot of real world changes that will cost a lot of money to make, and even more money to change again later. It's rather important to get it right the first time.
Finally, who do we talk to about all this? Who are the top geeks that have the ear of Congress and the other various government bodies? Do such people exist? Are they trustworthy? Are they reasonable? Will they listen? I'd like to do something besides just talk about it on /., you know? What I'd like to find out is where I should expend time and energy to make the most impact. Anyone have any ideas about this? I'd like to see the government start doing things right with regard to technology, for a change.
Re:Too much security is a security flaw (Score:2)
That's a good point. The problem is the asymetry in the process. You can get into a lot of trouble for failing to classify a document that needs to be, but no trouble for classifying a document that doesn't need it. Also, it's easy to get a document classified, but an extensive review is required to de-classify it. That's why we still have classified military secrets from WWI.
Just imagine the harm if a terrorist group knew how many Sopwith Camels we have stationed around the country!
Too much security is a security flaw (Score:3)
An important point made in the article is that overly paranoid security causes users to bypass ALL of the security. If you make users accept new randomly generated passwords each week, they will write them down. If you allow your audit procedures to take years, they will quietly install unapproved soft/hardware.
The two most ignored aspects of security are determining what level of security is actually required in the first place, and minimizing the burden of the security on being productive.
Of course, even when that's all taken care of, there will still be cases where truly paranoid security actually IS called for. At that point, the problem becomes one of employee education, and an HR issue. You can't have a secure system if your employees won't respect that security need, or if they are black hats. Especially in the latter case, security flaws are not the system admin's fault.
Ask US West why no passwords on DSL (Score:1)
A friend of mine recently installed DSL. I telneted from his machine to my ISP's shell account. I checked where I had logged in from, and telneted back to his modem. With no password I could easily have made it unusable and inaccesible to him. Obviously after that demonstration he fixed it!
His IP address completely gave things away: wdsl106.*.*.*. It would not be difficult to check the numeric range and screw everybody up. In fact, I would like to see it done as it would bad PR for that crap company US West - it might improve things before DSL is completely rolled-out and there is the potential for some real and very expensive damage.
Re:I resent this work of slander... (Score:1)
There are problems with biometrics, though... (Score:2)
The other problem comes with theft. Nowadays, people will shoulder-surf or guess your password, or steal your token; eiother way you're rarely hurt. But I don't want to think of what they'd do to get my handprint or retinas.
Re:Lawyers' feeding frenzy: Microsoft as a target (Score:1)
Microsoft is arrogant (Score:1)
Being a hack victim can actually help on occasion (Score:1)
Why do I consider this helpful? Several reasons. My org is unbelievably averse to change, and my repeated requests to do upgrades (solaris to 2.6 or at least to patch 2.5, upgrade wuftpd/httpd/bind/sendmail, put in antispam measures, remove production stuff from development box, etc) were continually denied or put off. This hack was kind of the 'I told you so' which I could use as ammunition (along with my previous emails, so remember kids, DO EVERYTHING IN EMAIL AND KEEP BACKUPS! The phone should be used for ordering food and holding paper down on the table) in my battle to upgrade. Now I was able to put in BIND 8.2, Sendmail 8.9.2 (+ antirelay, screw the ignorant misconfigured customers trying to go thru it), wuftpd 5.0, sshd 1.2.27, etc...
I'm also only going to be there for 2 more days, before I start my new job across town for a substantial pay rise (and parking space!). Of course, they don't have a replacement for me, and I'm the only unix sysadmin in the entire company (btw, they have about 10-15 boxes, handling DNS for the org and its customers (about 200 domains), sendmail (forwarding for customers), apache (4-5 sites), samba, etc). They'll probably need a whole bunch of work until they find a replacement.. I'm thinking $200/hr, so I can get 'em for all the agita they gave me... STICK EM UP!
Educated Users are Worse Than the Clueless (Score:1)
The article touched on a more disturbing trend I have seen. Educated Users (or somewhat). Those users who are running Server OS's at home, and understand how to circumvent Security SOP's. I see users bring in modems from home and hook them up. People dialing out of the company to their NT or *nix boxes at home with dedicated inet connections.
I can deal with users who are want to argue why is a bad passwd. It is the users who are more educated and tend to forget that the workstation/network they use at work, is not theirs.
Re:Educated Users are Worse Than the Clueless (Score:1)
Re:Educated Users are Worse Than the Clueless (Score:1)
Re:Educated Users are Worse Than the Clueless (Score:1)
Re:Educated Users are Worse Than the Clueless (Score:1)
AGREED! After reading my orginal post a second time I don't think I got across my point. Using "Educated" was a poor choice, "Dangerous" would've been more appropriate. Those individuals that know just enough to try something "cool", but don't know quite enough that they shouldn't.
The problem lies not only with those users, but ultimately with the impotence of our IS department.
Here's a cool example. IS does auditing of Web traffic so they can bring in some cool charts that show user's visiting unauthorized (porn etc.) sites at the next director's meeting, thereby getting the "OK" to further restrict net access. Unfortunately, after a month of auditing, the only users visiting unauthorized sites were the directors themselves:(
Re:Educated Users are Worse Than the Clueless (Score:1)
Cypherpunk (Score:1)
Re:Security whine or blame ...? (Score:1)
Need for new theory (Score:1)
Re:Microsoft good? (Score:1)
It would be hard to prove that Microsoft *doesn't* fix bugs/security holes quick enought. After all, they are commerical -- how long should it take them to recall a defective product?
Unless you can prove that either Microsoft or any Linux product spefically ignores a certain security holes, they can not be sued.
For example, they might be able to try to sue Microsoft over the Melissa virus, since Word Macros are a well known security flaw [they run with virtually no protection/sandboxing features (such as disabled file I/O), besides a macro warning box], which Microsoft should have done something about.
That's basically the same kind of like GM purposely (and knowing it) shipping defective seat belts, causing the death of 23 people in the past year. Of course GM would get sued for it, and the sueing party would likely win. Of course if GM didn't know about the problem -- it would be quite unlikely that any law suit against them would be successful.
It's not a price issue -- we already know that GPL'd software has to follow the law, eventhough it's GPL'd (which makes stealing parts of commerical code or reverse engineering illegal or infriging on trademarks). Recently the author of gaim, the gnome aol instant messager was required to remove "AOL" logos from his product. So he had to follow the law.
So basically the same laws apply to closed source and opensource projects.
One thing to note: OpenSource projects would be *MUCH* harder to sue, since you could easily claimed that the user:
1) didn't get the lastest updates / didn't read bugtraq
2) didn't fully inspect / test the code before installing (since he had everything the author had).
But still, the author would be responsble if the problem was blatly obvious (such as every Caldera employee knew that every 99th CD would distroy the user's Windows partition or the source code proved that this features was spefically coded in by a Caldera employee). This would be a definate lawsuit. However if this wasn't a known bug, the author would not be repsonble.
***So does Microsoft really know that Macros are a real security hole (or just a great easy to use feature that as a side effect makes viruses easy to write), and that they are ignoring to fix it?
***Well, we will leave it up to the lawyers to decide. Obviously, everybody has there own opinions.
Thanks,
Andrew B. Arthur aka AArthur
arthur99@global2000.net
AIM: aarthurppc
Re:Very Balanced Article (Score:2)
I'm glad to have seen it called out in print.
This phenomenon points up the fact that most of the security functionality being implemented is aftermarket layers upon software systems which are inherenltly not secure, and not impedance-matched across platforms. Until information systems are designed from the bare-metal up with sound, standardized information security practices in mind, this phenomenon will persist.
A successful attempt to subvert the security of a system should render it inoperable (like a dead man switch) and the data effectively lost to the author of the subversion and every one else until an authorized principal intervenes.
The system also needs to distinguish sensitive data and non-sensitive data, secure conduits and insecure conduits--somewhat like Perl's taint mechanism. If inconveniences are only assiciated with sensitive operations, the users are less likely to revolt.
Re:Ironclad Networks (Score:1)
Gah, security is a pain in the butt.
Re:I hope this doesn't inspire a "security crackdo (Score:1)
I attended a security seminar, given by a big American corporation, within in the last year. The instructor was a ex Air Force half-wit who regurgitated a bunch of bad ideas for network security. I came a way with the feeling that people are already making plans to make the Internet less open: fewer hosts, fewer competitiors (Internet 2). It fits right in with Microsoft's new server applications strategy.
I'm telling you: This is a very important election cycle. We had better make sure that the public understands the issues, and that the politicians disclose their positions... and then vote!
Re:A wall is as strong as its weakest brick. (Score:1)
What is more convient that putting your finger on the scanner imbeded in your keyboard and nothing else to login? How is that insecure? You cant steal my finger.
Re:systems wide open (Score:2)
Suppose that all systems were open, then:
1. no one would hack any system, most files on most systems are not very interesting and if there were no challange in cracking them no one would bother.
If you actualy read the artivle, you would know that attacks come from 'scrit kiddies' There is no challange for them now. They would continue to attach networks for fun.
2. Sysadmins would have time for more interesting things than building barricades around the systems. more work would get done.
Sysadmins would spend 100% of there time fighting fires from the lack of security, and no work would get done. Even if the network is never attacked, they still would be fixing probem caused by lack of security. Another reason for security is to pervent internal users from donig what thet shouldnt. Imagine if everyone could 'rm -rf /'
3. if someone really needed to get access to some machine he wouldn't be stop by security measures (I have some files on that machine but I don't have access anymore and all my important work has to wait until tomorrow when the sysadmin comes bck in)
Did you not read about grey networks? Secure data will migrate to insecure networks. Secure work will be done on grey boxes. And you seem to be implying that the sysadmin has supreme access to both networks. In anything but a day old unix box, sysadmin provilages aer fragmented and customized to individule admins. Its hard to do this with the default security model on unix or NT. Thats what NDS is for. unix is a all or nothing with suid's hacked in on top, NT by default grants everyone all access, and you havwe to expilicity deny rights. Only NDS on netware (or solaris, nt or cladara (?)) works sainly with ACL's and stuff.
Re:A wall is as strong as its weakest brick. (Score:2)
There are three forms of authentication. Something you have, something you know, and something you are. The first is something like a key, or a (magnetic stripe on a) credit card. You use a key to authenticate yourself to a door, or the ignition on your car. You might use a mag stripe to do the same, open a door.
Something you know, is a password, or a pin, simple enough.
Something you are is biometrics. Fingerprint scans, retina scans, facial recognition, DNA, etc.
Good authentication requires two of these, preferably one being biometrics. Toe get money out of a ATM you need to have a bank card, and you need to know your PIN. To enter a secure room you may need all three, a PIN, a mag card, and a guard to match your face to the picture on your ID badge.
Since remembering a password is hard (*cough*) people given the choice will choose easy passwords, or not, write it down and tape it to there monitors. Either method doesn't help security at all. If logins in requires a fingerprint scan instead of a password, then your double better. Finger print scans are more secure to break then good passwords and you can't tape your finger to your monitor.
Its not impossible to make a system that is both easy to use and secure. Unfortunately systems are never both because sysadmins and developers don't realize that users will subvert security if its hard to use.
Re:systems wide open (Score:1)
I'd bet you have never worked for a PHB (assuming you have worked at all). Often one isn't given the resources to do a task once let alone spend time to automate it. And how the heck do you automate something like reinstating passwords. As the article pointed out the wetware attack is commonly the easiest one and admins spend a lot of time dealing with it.
Blame Microsoft, Blame Yourself (Score:1)
Yet, we see in the NYT article that even the systems that reside on the Secret / Most Secret "air gap" networks are running MS software. WHY IN THE HELL ARE THEY DOING THAT?!?!? These people are supposed to know better, but they do it anyway. More than likely they were "ordered" to do it by someone who doesn't know any better, and doesn't have the common sense to trust the people that were hired because they know better.
Running MS software within a designated secure environment should result in charges of high treason.
Re:A wall is as strong as its weakest brick. (Score:1)
Anyone in the house have a pocket knife?
Re:Lawyers' feeding frenzy: Microsoft as a target (Score:1)
When you buy a car, you have a reasonable expectation that it won't gratuitiously explode for lame reasons.
When you buy Microsoft products, you know that they will fuck up. Microsoft has been around for many years now and the "quality" of their products is well-known. Is ignorance really a believable excuse anymore? If you buy MS, you deserve to lose.
There's a funny idea going around: "Nobody ever got fired for buying Microsoft." Hopefully, that quote will begin to lose its meaning over the next few years. If I buy Microsoft and my company loses thousands of dollars per month due to screwups, then I deserve to be fired for my stupidity or negligence. And if I were working for the government or military, the word "treason" starts to sound applicable.
Anyway, MS shouldn't be sued over this. They should simply lose marketshare (or -- *gasp* --- improve their products!) as people start having to take accountability for using known-defective software. Let 'em explain to their stockholders how "goodwill" on the balance sheet has been placed in the liabilities section.
A wall is as strong as its weakest brick. (Score:2)
if your user will tell his password to someone else, your work is in vain.
Melissa, ExploreZip, and Happy99 are good examples of this.
You try to build a good secure system for your users,
which in fact are smart enough not to tell anyone their passwords.
But the users did the mistake of having friends with Outlook...
(they are smart enough not to run exe files they get by mail)
Bam! Your mailserver is flooded.
(I think a solution would be to discard messages with "X-Mailer: Microsoft Outlook"
and tell the sender about security problems with it)
What you can do is to revoke access for "security hazards".
If a user is too dumb to tell his password, tell him not to do so,
and tell him that if people do "bad things" to his data
If the user has access to important things, revoke his access.
Disallow insecure software, etc.
Also, use SATAN-alike tools (NESSUS is quite nice).
Bottom line:
A wall is as strong as its weakest brick,
so instead of trying to make a strong brick stronger,
try to take care of the weak ones.
---
The day Microsoft makes something that doesn't suck,
Re:Lawyers' feeding frenzy: Microsoft as a target (Score:1)
want black-box ActiveX controls to run. Period.
Why not just pop up a dialog saying "This MS
product is collaborating with an MS web designer
to pump an unspecified privileged executable
(written for your inherently insecure system)
your way. Would you like to risk losing all
your valuable data for the opportunity to play
with an annoying interactive advertisement that
you probably won't like, and if you do it's just
because you've become a mass-market puppet?"
p.s., this forum is in English, please learn
to use it.
Re:A wall is as strong as its weakest brick. (Score:2)
Ill considered (Score:1)
Becouse if/when someone sues Microsoft for bugs then the Linux comunity will be next on the list.
Reputation aside Microsoft has a lot of money and that more than anything will attract lawsutes.
RedHat and other such companys are also easy targets... once people see money in it...
My origianl post was a tad slanderous of Microsoft.. That wasn't a smart thing to do...
Re:systems wide open (Score:1)
In the case of opening all systems though, it's a nice pipedream, nothing else. The fact of the matter is that it would not work (the emptying bank account example is enough to show that). I don't see any real conclusion to the current scenario of skR1pt k1dd1e monkeys firing their catapaults... There is no coherent "community", there's always going to be someone releasing the exploits in Point'n'Click form, so there's always going to be the kiddies. Dead end. Please check and try again.
--Remove SPAM from my address to mail me
Far be it from me to flame... (Score:1)
Actually, hold on, never mind. I think its inanity is so blatant I need say nothing.
--Remove SPAM from my address to mail me
Re:Scary stuff... (Score:1)
How about starting with Better-DNS-Knowledge.org?
IIRC, underscores aren't allowed in domain names.
Re:No Network is secure.. (Score:1)
I think you mean:
"It took them that long to figure this out?"
Thats much better;)
Security whine or blame ...? (Score:1)
Who's to blame a/o are you whining? I have said, for many years, only users and administrators can secure a system/network. Also; if it breaks, then the user is never held responsible, because the user can be blamed for system/network problems, but the administrator must always resolve the problem. In other words never blame the customer-user of a system a/o network - for the designed and/or innate weaknesses and problems of the systems/networks.
A stupid user with the same password on multiple systems or an enterprise/corporate/research network that requires a user to maintain 10 to 20 passwords for day to day work is "almost" as stupid as the user.
For real security always think point/person to point/person and network I/O ledger/log (monitor payload for terminal/user signature and sensitive content)
The person at the terminal end, and/or the administrator of the network is always the cause of the security breach. If you don't look at and demand security built in to your H/S, then why should H/S companies put a priority on system/network security and spend profit dollars on developing better H/S security. However, no matter what H/S security is developed, I expect security breaches will happen as long as users and administrators don't work together and brief each other on "How To" secure
Lets not ask congress for more (forever lasting) worthless/unworkable laws that allow US to blame the criminals for self-inflicted problems by lazy administrators, Tech-Stupid CEOs/Bosses,
I hope this doesn't inspire a "security crackdown" (Score:1)
I hope this doesn't inspire PHBs to pressure the system administrators into tightening network security too much. Those of use behind firewalls already suffer enough.
Where I'm studying, the only thing access we have to the net is via a web proxy. Apparently everything else is too insecure, including ssh. Fortunately, if you know the right people, you can get access to the SOCKS5 server, which will let you do most things (although I still haven't found a good telnet client for NT which will work with this particular SOCKS server).
It's lucky we're even allowed email privileges after last years mail-bombing that had our mail servers unavailable for a couple of days... ;-)
Re:I hope this doesn't inspire a "security crackdo (Score:2)
Don't get me wrong, security is definately important. But as this article points out, it's really the users that are insecure, more than anything else.
Obviously there's only so much you can do to secure machines and networks, but if you don't have educated users, then you may as well leave the whole system open. ;-)
I was only complaining because it's frustrating to know you can't access your own machine via ssh from elsewhere because the sys-admin has deemed ssh to be 'too insecure' for use on the network, despite the fact that the only people who would want to use it are those who are probably quite aware of security issues already.
Re:I hope this doesn't inspire a "security crackdo (Score:1)
Slashdot Passwords (Score:1)
a simpler solution would be to use somthing like
g%4d3*af for everything, I ususly use the same password, anyway, you don't need to remember your
_
"Subtle mind control? Why do all these HTML buttons say 'Submit' ?"
Re:Lawyers' feeding frenzy: Microsoft as a target (Score:1)
_
"Subtle mind control? Why do all these HTML buttons say 'Submit' ?"
Re:Educated Users are Worse Than the Clueless (Score:1)
Personally, I like the smarter users, they don't make idiotic mistakes such as bad passwords, and install software. They understand rules better and what is implied in them, along with their consequences.
Re:Security whine or blame ...? (Score:1)
I don't think it's so much stupidity as just ignorance. Was it an end to stupidity or an end to not knowing that too much causes cancer?
---
When in doubt, scream and shout!
the problem (Score:2)
move to secure OSes? (Score:1)
One wonders if articles like this will result in more traffic toward operating systems built with security in mind like OpenBSD.
Re:Lawyers' feeding frenzy: Microsoft as a target (Score:2)
I think this quote from Michael J. Miller, editor-in-chief of PC Magazine is appropriate (from his opinion column of May 25, 1999 [zdnet.com]). He is speaking about the Melissa virus:
Certainly Windows 9x and other consumer-level products from Microsoft leave much to be desired in the way of security. In fact, the first time I discovered you could bypass the Windows 95 "login" by pressing Cancel, I nearly blew a gasket laughing.
Microsoft does user interfaces probably better than anyone. But despite what many consider to be a superior "look and feel", I won't use Internet Explorer because I don't like the inherent security risk associated with ActiveX components. Similarly, though it might be more convenient, I won't turn on embedded macros in any Office product because it's not worth the risk.
The great benefit of the Melissa virus for me is that the wipespread coverage got my students asking me about the virus. I was able to take a day explaining the nature of macros and why the fundamental design of Microsoft Office puts them at risk. Now at least those that paid attention are more cognizant of the security issues with the systems they use every day.
Re:systems wide open (Score:1)
Go down Main St. and tell all the shop keepers to leave their front door unlocked and instead spend their time/money to get a bigger safe for the cash and other valuables.
Then, when I woke up at 4:00am and I suddenly had a craving for a candy bar, a book, a new coat, a TV, or a Ferrari, I could just go and get one. Leaving the appropriate amount of cash on the counter... of course.
Wow. Wouldn't this be nice and convenient.
I disagree.... (Score:1)
possible
If you're suggesting that it's possible to totally secure your
network, then you're just plain wrong.
It doesn't matter how often you do a "sweep", it doesn't matter what
tools you use, you can only scan for holes that you know about. What
happens when a cracker finds a hole that you DIDN'T know about?
Any sysadmin that believes his/her network is impregnable is a poor
sysadmin, because they delude themselves that they're better than they
are. Remember the old adage "Pride goeth before a fall."
Re:Microsoft good? (Score:1)
What if you buy a used computer from somebody; does the MS EULA prevent you from transferring your license in this manner? If not, is the EULA in effect for the new licensee? If so, can you legally be held responsible for defects in the godos?
Re:A wall is as strong as its weakest brick. (Score:1)
If they got a digital version of your fingerprint, they'd have to either (1) break the encryption scheme in the hardware key, (2) get physical access to both your finger and your key.
Suppose the bad guys will be able to break cyrptographic keys of length N at some point in the future. My hardware stores a cryptographic key of length 3N. I then break my cryptographic key into three strings of length N and store each piece in a different bank vault. Then the NSA will need to do at least two black bag jobs to be able to access my data.
systems wide open (Score:1)
Suppose that all systems were open, then:
1. no one would hack any system, most files on most systems are not very interesting and if there were no challange in cracking them no one would bother.
2. Sysadmins would have time for more interesting things than building barricades around the systems. more work would get done.
3. if someone really needed to get access to some machine he wouldn't be stop by security measures (I have some files on that machine but I don't have access anymore and all my important work has to wait until tomorrow when the sysadmin comes bck in)
Re:There are problems with biometrics, though... (Score:1)
I don't personally think DNA is a good primary verification, considering you're shedding it everywhere you go.
The problem with the retina is that, unlike the fingerprints, the retinal image changes with disease processes such as Diabetes, Hypertension, Hyperlipidemias, Hydrocephalus, etc. It might be beneficial to spot these early b/c you can't log into the system, but once these pathologies start, your retinal scan will change slowly over time.
However, I would bet that fingerprint verification and retinal scans together would be easy enough to implement and quick enough for a computer to verify that they could be used together for very high accuracy.
Re:I resent this work of slander... (Score:1)
--bdj
Very Balanced Article (Score:3)
It also makes an interesting point, one that I've had to deal with for a long time, and most security folks have as well: One of the difficulties in securing information is that these measures many times make life difficult for the users, and when those users are technically skilled themselves, life gets that much more difficult.
The problem lies at the very essence of security. A secure system restricts the flow of information contained within it, but this is counterproductive to what users are trying to accomplish. Unfortunately for the users, sometimes it's more important to have secure information than ease of use. And as long as malicious individuals exist, this will be a "necessary evil".
Re:Very Balanced Article (Score:1)
All the crackdown really accomplishes is user hostility towards MIS, because it is inflexible and the reasoning behind it isn't open to discussion.
Re:Yeah, right. (Score:1)
And how many of those have a copy of Quicken or MS Money on them?
Great article for the non-literate masses (Score:2)
It goes just deep enough to clarify a bunch of issues for those who have only seen the knee-jerk reactionary articles of the overworked sensationalist press. It does leave a few questions unanswered, and although I would like to see the answers, this article is right in not including them.
So the FBI caught a teen aged hacker who stole a password and got into a bunch of sensitive computers at SFI, LANL, LLNL, and a few others, and they didn't call in a swat team lead by Janet Reno. That in itself is a revelation. The press hungry FBI actually did their jobs instead of sucking some columnists dick? Stop the presses! Makes you wonder what they did to the stupid guy who mailed his only password to all his cow-orkers where any script kiddie could pick it up. Did the FBI come down on him like a ton of bricks? Did he get a 5-10 year sentence for aiding and abetting a felony involving national security? Probably not.
There is also a great section on connecting two secure networks together with an encrypted line, and then having one of the nets get compromised. It doesn't matter how strong the encryption is, the end systems are still the weak link in the chain.
I'm going to have to get reprint permission for this article, third generation photocopies won't do it justice.
the AC
Re:Ironclad Networks (Score:2)
This is just out of curiosity, since I've been recently involved (actively avoiding) a discussion about which is better, host or net scanning. My position is that both are needed. An unpopular answer because that costs more money
the AC
Re:insecure home DSL and VPNs. (Score:2)
There was some technical details about how all unregistered boxes would always be directed to a sign in page, so the consumer would just have to enter a credit card number and the box would then reboot with a real IP address. Then the consumer could start surfing the web within minutes.
Great idea, but I asked about setting passwords on the modems or the PCs. The horror and shock was obvious. Seems they did some studies, and found that if an average consumer has to enter a password to secure their system, they prefer not to buy or use the product. But the legal department had forced them to design their web site so the consumer would have to scroll through three pages of smallest type legalese, pressing accept at the bottom of each page. Buried in all that was a warning to set passwords. That was acceptable, but forcing it was not.
So afterwards got a tour of the demo network, with some sample set top boxes and PCs. Whipped out the portable hacking/cracking laptop, and within a few minutes had control of every modem and PC. The big company is going back to the drawing board for the rollout plans, maybe to get each customer to set a line noise type password on their modems, and force them to write it down as part of the login process for the first day or two.
People never learn, which is why crackers have life so easy.
the AC
Re:Lawyers' feeding frenzy: Microsoft as a target (Score:2)
The NY times article had the amusing quote about cars: sure they would cost a penny, and do 400 miles an hour etc (the old analogy), but what if every day, someone on the other side of the world caused the car to explode, killing its occupants and several bystanders.
What if when we buy a car, there is this piece of paper stuck behind the drivers glass, saying, "by opening this door, you agree not to hold Ford motor company liable for any drawbacks in the design of this car, and for any damages, monetary or otherwise, that you or your family should suffer through use of this car. We do not warrant this cars fitness for any purpose".
Like it or not, we are moving to a virtual world, our assets are becoming digital not physical, and along with that comes the fruits of bad design: damages, responsibility, lawyers and so on, just like there is in the physical world. Microsoft, and every vendor better grasp that, and either hide behind a barricade of legalese (not a sustainable strategy), or behave as if they were making X-ray machines, cars, industrial saws, and other potentially deadly gadgets.
So I agree. Although picking on microsoft isnt the whole issue, you can equally well pick on ebay, oracle, sun, HP, IBM and all of them. But microsoft does have the most arrogant attitude so by all means lets kick them first.
insecure home DSL and VPNs. (Score:4)
You wouldnt believe what I find.. or maybe you would. many PCs have readable netbios usernames, back orifice was found twice out of 100 machines. Cisco 675 home DSL router/modems with NO password and NO enable password, open shares with guest logins, socks servers, firewalls with web configuration ports visible on the wrong side (my side), web servers meant for internal use with convenient displays of the internal network on them, visible from outside.
And of course machines that blue screen after they get pinged with one of the many packets that cause Bills code to scribble where it shouldnt, but cant blame people for that.
The current incidents reported of breakins to home PCs on fulltime net access, also in the NY times, (with a Linux box partially comprised through imapd I believe), could be reduced with some very basic external checking... Something ISPs should provide as a free service.
Right now it would be trivial to construct with a bit of perl and a bad attitude, a sweeper that found enough PCs on DSL or cable to get straight to the top of the seti@home charts, or launch an attack against something harder, all from the bedrooms of guys who uses there PC to balance his checkbook.
The far worse risk here:.. imagine somebody has VPN to their super secure office network, and its via internet DSL, and they are lax in security. How long before somebody writes a VPN scanner that finds insecure fulltime connected PCs and gets onto them to see if there is a VPN to a corporation that can be snooped/cracked/hijacked/watched. Companies think an end-to-end encrypted VPN is secure, but they dont think enough that the end of their tunnel is managed by an employee with little knowledge on security, and on a windows PC with a config that is by default insecure.
-Justin
Scary stuff... (Score:2)
Lawyers have this ability to turn simple things into gigantic monsters. Put a lawyer to start working on security-related cases and one of them will likely make all of us look like the Devil incarnate through misunderstanding of the difference between Hacker and Cracker.
But what can we do? I think we need to keep working hard at plugging the difference between Hacker and Cracker into the public awareness.
If we don't do this job well enough, we might end up seeing unfortunate cases of public-opinion turning against us. Since I aspire to be a representative of Better_Operating_Systems.org and a member of the Open Source movement, I don't like that idea...
Has anyone any idea just how well the public understands the Hacker/Cracker difference? How much work do we have in this field? Perhaps we can harness the Net itself to find out. Maybe a poll in the right place, or a letter to everyone you know asking them to ask their family and neighbors to see if they understand the difference...
We ought to get started.
Its worse, think Y2k lawyers on linux! (Score:1)
Even if they don't attack linux, I would lay good odds that they could change the software landscape where one cannot use linux or any other OSS in a corporate environment because it hasn't been 'audited' and studied by a VLO (Very Large Organization) for ISO complaince (or some such garbage). That alone limits software so that it may only be created and sold by a large organization. If that happens, then any corporation cannot obtain insurance and would be susceptable to a huge liability for using OSS.
On another foot, any commercial entity that supports or distributes OSS coould be hit with liability?
OSS as distributed now requires that the origional authors have no liability for any effects, planned, or unplanned on it. They won't distribute OSS if it opens them up to liability. If it opens them up to being sued any time in the future, they won't take that risk and will never release it.
VPN + public key = security (Score:1)
Re:VPN + public key = security (Score:1)
Re:Microsoft good? (Score:1)
Tokens are the answer... (Score:1)
If you could get a token for $5 that lasted for three years then I think they would be much more prevalent and they would be incorporated into security schemes much more often.
Of course I would only be supportive of their use in internal systems or "services" such as your ISP that you have to give personal information to. I would not support their use in general e-commerce, as it would be too easy to track everybody and the products they purchase. Besides, the way these devices work now is not condusive to e-commerce (you can't share your token ID and serial with multiple vendors because if they knew it they could pose as you -- there could be a service company that was setup that multiple vendors could authenticate to though).
Re:systems wide open (Score:1)
Re:(quote by spaf) (Score:1)
Re:Scary stuff... (Score:1)
Naw, just send 3 of your friends an e-mail to the tune of:
"The cDc and 2600 have decided that the portion of the public that knows the correct definitions of the words 'hacker' and 'cracker' should be rewarded. They are also testing out a new e-mail tracking program, and have decided to use this to reward the people whom they feel deserve it. Define the words 'hacker' and 'cracker', and then forward this message along with your definition to all of your friends. If you're right, 2600 and the cDc will mail you $5000 plus $5 for every person you sent the letter to."
Then read all the definitions in the letter when you eventually get it back.