Sie sind auf Seite 1von 20

April 2005 ISSN 1353-4858

Featured this month Contents


NEWS
Tips to defeat DDoS 2
Vulnerability assessment tools:
the end of an era? Qualys ticks compliance box 2

Russian hackers are world class 3


Vulnerability assessment tools, traditionally, amass a monumental
amount of flaws. A continuously growing number of vulnerabilities
means that the tools need to be constantly updated. FEATURES
This means that the number of vulnerabilities appears overwhelming. Also, not all of
De-perimeterisation
these flaws are of significance to security. Host-based patch management systems
Inside out security:de-perimeterisation 4
bring a coherence to the chaos. The clear advantages of using these tools question
the value of traditional vulnerability assessment tools. Andrew Stewart describes the Vulnerabilities
advantages of using patch management technologies to gather vulnerability data. He A contemporary approach to network
proposes a lightweight method for network vulnerability assessment, which does not vulnerability assessment 7
rely on signatures, or suffer from information overload. Turn to page 7....
Cryptography
Crypto race for mathematical infinity 10

Biometrics
Tips to defeat DDoS Biometrics: the eye of the storm 11

From the coal face of Bluesquare Proactive security


Online gambling site, Bluesquare, has survived brutal distributed denial- Proactive security: vendors wire the cage
of-service attacks, and CTO, Peter Pederson presented his survival check- but has the budgie flown... 14
list at a recent London event.
Pederson held his ground by refusing to pay DDoS extortionists who took PKI
Bluesquare's website down many times last year. He worked with the National Hi- Managing aspects of secure messaging
Tech Crime Unit to combat the attacks and praised the force for its support. between organizations 16
Speaking at the E-crime congress, Pederson, played a recording of the chilling voice of
an extortionist, who phoned the company switchboard demanding money. RFID
After experiencing traffic at 300 Megabits per second, Pederson said he finds it amus- RFID: Misunderstood or untrustworthy 17
ing when vendors phone him with sales pitches boasting that they can stop weaker
attacks. He has seen it all before. Story continued on page 2... Snort

Network Security Manager’s preferences for


the Snort IDS and GUI add-ons 19
RFID – misunderstood or untrustworthy?
The biggest concern with RFID is the ability to track the location of a per-
REGULAR
son or asset. Some specialized equipment can already pick up a signal News in brief 3
from an RFID tag over a considerable distance.
But an RFID tag number is incomprehensible to a potential attacker without access to
a backend database. The problem is that an attacker may get access to such a data-
base. Bruce Potter examines if RFID really is a sinister security nightmare. Turn to
page 17...

ISSN 1353-4858/05 © 2005 Elsevier Ltd. All rights reserved


This journal and the individual contributions contained in it are protected under copyright by Elsevier Ltd, and the following terms and conditions apply to their use:
Photocopying
Single photocopies of single articles may be made for personal use as allowed by national copyright laws. Permission of the publisher and payment of a fee is required for all other photocopying, including multiple or
systematic copying, copying for advertising or promotional purposes, resale, and all forms of document delivery. Special rates are available for educational institutions that wish to make photocopies for non-profit
educational classroom use.
NEWS

perform an annual self-assessment and


Editorial office:
Elsevier Advanced Technology
Qualys ticks compliance quarterly network scan.
"The payment card industry's security
PO Box 150
Kidlington, Oxford
box requirements (PCI, SDP, Visa CISP)
OX5 1AS, United Kingdom apply to all merchants with an Internet
Tel:+44 (0)1865 843645 Brian McKenna
facing IP, not just those doing E-com-
V ulnerability management vendor,
Fax: +44 (0)1865 853971
E-mail: s.hilley@elsevier.com
Qualys, has added new policy merce, so the magnitude of retailers this
Website: www.compseconline.com
compliance features to its program affects is significant," said
Editor: Sarah Hilley
QualysGuard product. This allows Avivah Litan, vice president and research
Supporting Editor: Ian Grant
Senior Editor: Sarah Gordon security managers to audit and director at Gartner.
International Editoral Advisory Board: enforce internal and external policie Qualys says it achieved compliance sta-
Dario Forte, Edward Amoroso, AT&T Bell Laboratories; Fred on a 'software as a service' model, the tus by proving their ability to detect,
Cohen, Fred Cohen & Associates; Jon David, The Fortress;
company says. identify and report vulnerabilities com-
Bill Hancock, Exodus Communications; Ken Lindup,
Consultant at Cylink; Dennis Longley, Queensland In a related development, the company mon to flawed web site architectures and
University of Technology; Tim Myers, Novell; Tom Mulhall;
Padget Petterson, Martin Marietta; Eugene Schultz,
is trumpeting MasterCard endorsement configurations. These vulnerabilities, if
California University, Berkeley Lab; Eugene Spafford, for the new features set. not patched in actual merchant websites,
Purdue University; Winn Schwartau, Inter.Pact
Andreas Wuchner-Bruehl, head of could potentially lead to an unautho-
Production/Design Controller:
Esther Ibbotson
global IT security at Novartis comment- rized intrusion.
Permissions may be sought directly from Elsevier Global ed, in a statement: that: "Regulations "The payment card industry's security
Rights Department, PO Box 800, Oxford OX5 1DX, UK; such as the Sarbanes-Oxley Act and standards are converging, which will
phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail:
permissions@elsevier. com. You may also contact Global Basel II [mean that] much of the burden simplify the compliance process, but
Rights directly through Elsevier’s home page (http:// now falls on IT professionals to assure
www.elsevier.com), selecting first ‘Support & contact’, then
achieving compliance with these stan-
‘Copyright & permission’. the privacy and accuracy of company dards can still be very costly for both
In the USA, users may clear permissions and make data. In this environment, security man-
payments through the Copyright Clearance Center, Inc., 222
merchants and acquiring banks. The
Rosewood Drive, Danvers, MA 01923, USA; phone: (+1) agers must tie their vulnerability man- more the process can be streamlined and
(978) 7508400, fax: (+1) (978) 7504744, and in the UK agement and security auditing practices
through the Copyright Licensing Agency Rapid Clearance
automated, the easier it will be for every-
Service (CLARCS), 90 Tottenham Court Road, London W1P to broader corporate risk and compliance one," said Litan.
0LP, UK; phone: (+44) (0) 20 7631 5555; fax: (+44) (0) 20 initiatives."
7631 5500. Other countries may have a local reprographic
rights agency for payments. Philippe Courtot, chief executive offi-
Derivative Works
Subscribers may reproduce tables of contents or prepare
cer, Qualys said: "security is moving Tips to defeat DDoS
more and more to policy compliance.
lists of articles including abstracts for internal circulation
within their institutions. For example: are your digital certificates (continued from page 1)
Permission of the Publisher is required for resale or distrib- up to date? We offer quick deployability
ution outside the institution.
Permission of the Publisher is required for all other deriva- since we are not selling enterprise soft- The DDoS Forum was formed in
tive works, including compilations and translations. response to the extortionist threat to
ware, but providing it as service.
Electronic Storage or Usage online gambling sites. Pederson is
Permission of the Publisher is required to store or use elec-
Customers don't have software to
adamant about not paying up.
tronically any material contained in this journal, including delploy, and Qualys scans on a continu-
any article or part of an article.
Except as outlined above, no part of this publication may be
ous basis". Peter Pederson’s survival checklist
reproduced, stored in a retrieval system or transmitted in "In 2004 Sarbox was all about keep- against DDoS attacks:
any form or by any means, electronic, mechanical, photo-
copying, recording or otherwise, without prior written per-
ing C-level executives out of jail, but we
mission of the Publisher. are moving beyond that now. The • Perform ingress and egress
Address permissions requests to: Elsevier Science Global
Rights Department, at the mail, fax and e-mail addresses
opportunity is to streamline the best filtering.
noted above. practices generated out of Sarbox con- • Consolidate logs.
Notice sulting as it relates to the security in • Perform application level checks.
No responsibility is assumed by the Publisher for any injury
and/or damage to persons or property as a matter of prod-
your network". • Implement IDS.
ucts liability, negligence or otherwise, or from any use or The latest version of QualysGuard has
operation of any methods, products, instructions or ideas • Implement IPS.
contained in the material herein. Because of rapid advan- been endorsed by MasterCard. The vul-
• Check if 3rd party connections
ces in the medical sciences, in particular, independent veri- nerability management vendor has com-
fication of diagnoses and drug dosages should be made. are open.
Although all advertising material is expected to conform pleted the MasterCard Site Data
to ethical (medical) standards, inclusion in this publication Protection (SDP) compliance testing • Capture current network traffic.
does not constitute a guarantee or endorsement of the • Monitor current system states.
quality or value of such product or of the claims made of process.
it by its manufacturer. From 30 June, this year, MasterCard • Maintain current patches.
will require online merchants • Put procedure and policies in
02158
Printed by processing over $125,000 in monthly place to handle DDos attacks.
Mayfield Press (Oxford) LImited MasterCard gross volume to

2
Network Security April 2005
NEWS

Russian hackers are In brief


world class Microsoft talks up security The government also promised a Warp to
After 25 years of complaints about the show home computer users how to improve
Brian McKenna poor security of its products, Microsoft PC security and lower the risk of them

R ussian hackers are “the best in the


world” Lt. General Boris
Miroshnikov told the eCrimes Congress
has published a 19-page booklet, The
Trustworthy Computing Security Develop-
ment Lifecycle, that outlines the "cradle to
becoming staging posts for hackers attacking
businesses. The US and Holland are consider-
ing creating similar programmes, says the
in London on 5 April. “I will tell them grave" procedures for a mandatory "Security National Infrastructure Security Co-ordina-
Development Lifecycle" for all its Internet- tion Centre (NISCC), which is co-ordinating
of your applause”, he told the clapping
facing products. the scheme.
audience at the start of a speech The new process "significantly reduces" the
reporting on cyber crime developments number and lethality of security vulnerabili- Don't trust hardware
in the region. ties, it says. The new approach comes from Hardware devices are as insecure as any IT sys-
Boroshnikov is head of Department K, Bill Gates and Steve Ballmer, Microsoft's tem, Joe Grand, CEO of Grand Idea told del-
chairman and chief executive. So far software egates at the Amsterdam Black Hat confer-
established within Russian law enforce- produced using the SDL framework includes ence. Attacks include eavesdropping, disrupt-
ment to deal with computer crime in Windows Server 2003, SQL Server 2000 ing a hardware security product, using undoc-
1998. His department has worked close- Service Pack 3 and Exchange 2000 Server umented features and invasive tampering.
ly with the UK's National Hi-Tech Service Pack 3. Network appliances, mobile devices, RFID
tokens and access control devices are all poten-
Crime Unit. Windows Server gets extra protection tially at risk. The storage of biometric charac-
Countries, like Russia, he said, that Windows Server 2003's new Service Pack teristics on back-end systems also sets up
came late to the internet exhibit its 1 allows Windows servers to turn on their avenues of attack, and physical characteristics
problems more dramatically. From firewalls as soon as they're deployed, and are often easily stolen or reproduced.
to block inbound Internet traffic until Researchers recently showed how to exploit
2001-3, computer crime in Russia Windows downloads Microsoft's latest securi- cryptographic weaknesses to attack RFID tags
doubled year on year, he confirmed. ty patches. used in vehicle immobilisers and the Mobil
“Only in 2004 did we hold back the A new security configuration wizard detects SpeedPass payment system. SSL cryptographic
growth”. a server's role as a file server, Web server, or accelerators are also potentially hackable, as
database host, for example, and then disable demonstrated by a recently documented attack
"It used to be naughty boys who com- the software and ports not associated with that against Intel's NetStructure 7110 devices.
mitted these crimes”, he said, “but now role. It also makes DCOM, Microsoft's tech- Wireless Access Points based on Vlinux, such
they have grown up”. It now needs the nology for distributed objects, less prone to as the Dell TrueMobile 1184, can also be
co-operation of telecoms companies, attack, the firm says. hacked.
Security through obscurity is still widely
ISPs, the legal profession, and law
VoIP vulnerabilities addressed practiced in hardware design but hiding some-
enforcement to tackle the problem, he Security worries are holding up adoption thing does not solve the problem, Blackhat del-
said. of VoIP. Even so, research from In-Stat/ egates were told.
Alan Jebson, group COO at HSBC MDR suggests penetration will reach 34%
among mid-sized businesses, and 43% in large
holdings, echoed the Russian’s rueful
enterprises. IM creates instant havoc
‘boast’. "We are up against the best”, To increase adoption rates, the new Voice Security threats from Instant Messages have
he said at the same event. “Some of over IP Security Alliance (VOIPSA) has creat- increased 250% this year, according to a
these Russian hackers have day jobs ed a committee to define security standards for report from IMlogic Threat Center. The
Internet telephony networks. research tracks viruses, worms, spam and
designing highly secure encryption
In large networks, the bandwidth and time phishing attacks sent over public IM net-
technologies”. associated with routing traffic and spam creates works. It found reported incidents of new IM
"We must have comparable laws and a latency problem for VoIP traffic through the threats grew 271% so far. More than half the
sanctions. We need to agree what is a firewall. Other topics include security technol- incidents happened at work via free IM ser-
ogy components, architecture and network vices such as AOL Instant Messenger, MSN
computer crime”.
design, network management, and end-point Messenger, Windows Messenger, and Yahoo
He reported that when Department K access and authentication, infrastructure weak- Messenger.
was in its infancy “80% of computer nesses, vulnerabilities and emerging application
crime was out of sight. We are now get- attacks.
Israel jails colonel for losing PC
ting better because the victims know
Warp speed, Mr Plod The Israeli army jailed the commander of an
who to come to and we have had no The British government has set up six Warps elite Israel Defense Forces unit for two weeks
leaks of victim identity”. (warning advice and reporting points) to allow for losing a laptop computer containing clas-
He concluded that there is a strong businesses to share confidential information sified military information. The laptop
about risks, security breaches and successful should have been locked away, but was appar-
need in Russia for state standards that
countermeasures, and to receive tailored secu- ently stolen while he was on a field trip with
will keep out the “charlatans of comput- rity alerts. his soldiers.
er security”.

3
April 2005 Network Security
DEPERIMETERISATION

armour, rescuing our organizations from


Inside out security: marauding outsiders, it’s time to update
this self-image. The fact is we need to

de-perimeterisation be modern, twenty-first century


intelligence agents, not twelfth century
warriors.
Ray Stanton, global head of BT security practice Instead we should see these new devel-
opments as an opportunity. Let’s face it,
Gone are the days of fortress security 100% security of the network boundary
Ray Stanton
has always been an almost impossible
If you’re into IT security, it’s pretty hard security community is not that surpris- task. As Gene Spafford, Director,
to avoid discussions about deperimiteri- ing. For years we have been working Computer Operations, Audit, and
sation: the loosening of controls at towards attaining the goal of a network Security Technology at Purdue
boundary level in favour of pervasive boundary that is 100 percent secure. University put it: “The only system
security throughout the network, sys- Security managers have tended to adopt which is truly secure is one which is
tems and applications. The idea’s not a siege mentality, and softer boundaries switched off and unplugged, locked in a
new, but it’s certainly a hot topic right appear to be contrary to everything that titanium lined safe, buried in a concrete
now, which is being led by some formi- we are working for. bunker, and is surrounded by nerve gas
dable CSOs in major blue-chips who But we need to stop thinking of our and very highly paid armed guards. Even
have come together to create the Jericho network as a medieval citadel under then, I wouldn’t stake my life on it…”
Forum, to promote the idea. Everybody attack. After all, those fortresses, with Nor would you be able to use it.
seems to be talking about it – and while their thick, high stone walls, were excel- Added to that of course, is the fact
there are senior IT managers and securi- lent at deflecting an enemy for a fixed that boundaries keep moving: new
ty experts who are fully and publicly period of time. But once that enemy got devices, new locations, additional busi-
embracing the idea, there are also those inside the walls, the fight was over with- ness partners, illicit downloads and the
who are feeling more than a little appre- in a matter of hours. The same is true of latest applications, all add to the ever-
hensive about this talk of breaking down most IT networks. Once the hard outer expanding perimeter, making it increas-
the barriers at the edge of the network. shell has been penetrated, it is fairly ingly difficult to define, never mind
After all, it’s just not safe out there – and straightforward to run rampage through secure. And then there’s the weakest link
we’ve all seen the statistics to prove it. IT systems and cause untold amounts of of all: the people. Employees, being
havoc. human, insist on making basic mistakes
And of course, barricading yourself and leaving their passwords lying around
behind high walls doesn’t let the good or opening dubious attachments.
De-perimiterisation can, therefore, be
“ De-perimiter-
isation is a
guys in, doesn’t stop internal attacks
from rebellious subjects, and isn’t exactly
flexible. But flexibility is what the mod-
seen as a chance to stop going after the
impossible, and to focus effort on
achieving acceptable levels of risk. No
ern business is all about. Firms need to
expand. They want their salespeople to more tilting at windmills. No more run-
chance to stop remain connected through their mobile ning to stand still.
devices and remote access. They want to More than that, this is a real opportu-
going after the
collaborate easily with partners and inte- nity to align security with overall organi-
impossible
” grate business processes with customers
and suppliers. Unlike fixed stone walls,
the boundaries of the modern business
sational strategy, and to prove the value
that it adds to the organisation. To do
that, we need to understand where the
are shifting all the time. call for opening up the networks is com-
But opening up the networks provide ing from.
us with opportunities as well as threats. Seizing opportunities
It’s time to stop looking at security from This is not the time for security experts Harnessing the drivers
the outside, and focus instead on looking to revert to their negative, jackbooted De-perimiterisation is driven by several
at security from the inside out. stereotype. The ‘trespassers will be prose- business needs. Firstly, the desire for the
cuted’ signs – along with the negative ‘Martini principle’ - anytime, anyplace,
Manning the battlements expressions and shaking heads – need to anywhere computing. Mobile and flexi-
The fact that de-perimiterisation is caus- be abandoned. Although we all like to ble working have become a normal part
ing some worried muttering within the think of ourselves as knights in shining of the corporate environment. This is

4
Network Security April 2005
DEPERIMETERISATION

happening by default in many organisa- once more. Our responsibility is to The decision should be based upon
tions, who now wish to take control and make sure that everyone is aware of the another fundamental tenet of good secu-
effectively manage the multitude of ven- risks and can make informed decisions. rity practice: thorough assessment of
dors, applications, devices and docu- After that, it’s about putting adequate risk. That customer database from three
ments that are springing up throughout controls in place. This shift in thinking years ago may be of limited value now,
the company. offers us a real possibility that security, but if the contents are leaked, the conse-
The second driver is cost. Accessing indeed IT as a whole, can be brought in quences could be disastrous.
applications through a broadband from the cold and get a much-needed Although policy control and manage-
enabled device, using XML or Web ser- voice at board level. ment has always been a fundamental fac-
vices, reduces the costs associated with tor in any security measures, it will take
connectivity and maintenance of leased a far more central role than it has
lines, private exchanges and even VPNs. Some of the companies that enjoyed so far. Federated security, gran-
At the same time it increases availability, are breaking down the ulated access and rotating users all
through the ‘always on’ connection, and barriers as members of the demand close control. Updates to policy
so flexibility. Jericho Forum: that reflect both changes within the
Finally, there is a need for approved • Boeing
third parties to gain access. In the digi- • British Broadcasting
tal networked economy, collaborative Corporation
working models with partners, joint ven-
tures, outsourcers or suppliers require
secure access to data in real time – which
• Deutsche Bank
• Lockheed Martin
• Pfizer
“ Firewalls will
no longer be at
cannot be achieved with a tough impen- • Reuters
etrable network boundary. • Unilever the edge of the
If we look at the oil and gas indus-
tries, which have been early adopters of
de-perimiterisation – or ‘radical exter-
Back to basics
network

nalisation’ as it is known in BP – we
can see clear examples of all of these But before we tear down the firewalls
and abandon ourselves to every virus organisation and to its immediate envi-
drivers. Significant numbers of workers ronment, will be required on a more reg-
are on the road or in remote locations infestation out there, let’s take a look at
what ‘inside out’ security really involves. ular basis than ever before.
at any given time. Companies tend to We also need to make sure that we still
make a great deal of use of outsourcers De-perimiterisation is actually some-
thing of a misnomer. It’s not about get- get the basics right. For example, viruses
and contractors, and undertake joint
ting rid of boundaries altogether. Rather are not going to go away: there will
ventures with other firms who are part-
it’s a question of re-aligning and refocus- always be new variants and new vulnera-
ners in one region but competitors in
ing them. So instead of a single hard bilities. The 2004 edition of the DTI
another. As a result they have long
shell round a soft centre, an organisation information breaches survey shows that a
recognised the need to let partners
has a more granular approach with inter- massive 74% of all companies suffered a
have access to one part of the system,
nal partitions and boundaries protecting security incident in the previous year,
while keeping the doors firmly barred
core functions and processes – hence the and 63% had a serious incident. Viruses
on others.
inside out approach. Typically the hard still counted for 70% of these, which
In fact around 10% of BP’s staff now
controls around the DMZ (demilitarised seems to indicate that despite their
access the company’s business applica-
zone) will move to sit between the red prevalence, there is still a lack of maturi-
tions through the public Internet, rather
and amber areas, rather than the amber ty in incident management procedures.
than through a secure VPN. This is the
and green. Firewall vendors don’t need to panic
first step in a move towards simplifica-
This takes us back to some basic prin- just yet – there is still going to be a need
tion of the network and enabling access
cipals of security management: deciding for their products in a deperimiterised
for up to 90,000 of the oil company’s
what bits of your systems and accompa- system. The difference is these will no
third party businesses.
nying business processes are key and longer sit at the very edge of the network,
This picture of a flexible, cost effec-
focusing on their security. Rather than but will be strategically placed inside it,
tive, and adaptable business is, not sur-
prisingly, very attractive. And not just to taking a ‘one size fits all’ approach, at device, data or even application level.
those in hydrocarbons. But efforts to inside out security requires us to look at
achieve it can be hampered by current protecting our information assets from Identity management
security thinking. As experts, we need to the perspective of what needs to be While firewalls may sort the ‘good’
reverse this, and be seen as an enabler secured and at what level. HTTP traffic from the bad, they cannot

5
April 2005 Network Security
DEPERIMETERISATION

It seems that inside out security will


act as an impetus towards a more thin-
client based architecture. Centralised
systems are easier to secure than docu-
ments, applications, data and network
connection spread over different gadgets
and different locations. It eliminates the
problems associated with accessing the
network with inappropriate devices.
In one company that has already adopt-
ed de-perimiterisation, employees are
responsible for their own laptops including
the latest patches and anti-virus protection.
But the laptops are thin clients, which
means that IT staff can focus on the secu-
rity of the central server and information
on it, rather than trying to secure an unde-
fined group of peripheral appliances.
Whether there will be a mass migra-
tion to thin client models – or even on-
demand, utility computing, which
seems to be the next logical step – is
impossible to predict. What we do
know is that the move to inside out
security, radical externalisation, de-
perimiterisation or whatever other names
De-perimeterisation - the end of fortress mentality it acquires, will depend on architecting
the environment correctly – and main-
discern the difference between authorized confidential data on personnel or finan-
taining the right levels of control. A flex-
and unauthorized traffic. You also need cial management has not been subject to
ible working model for information
to identify what and who you trust from unauthorized access. With the Data
security management systems that can
both internal and external sources: which Protection Act, human rights legislation,
match the flexibility of the business as a
of your own people should have access to Sarbanes-Oxley, European accounting
whole is also going to be vital.
what systems and processes, and where standards and a dozen other rules and
The debates about de-perimiterisation
you are going to allow partners, cus- regulations to navigate, providing accu-
rate audit trails of who has accessed, or will doubtless continue. There is still a
tomers and the public to go. That means
attempted to access, critical data will lot of work to be done on standards and
that user authentication and identity
remain a basic legal requirement. interoperability of systems. But what we
management is going to play an increas-
can be pretty sure of is that security
ingly important role – with two factor
experts should prepare themselves for a
authentication being the bare minimum. You can never be too thin fundamental change in approach.
Access policies will become more pre- It almost goes without saying that iden-
cise, based on a ‘least privilege’ model, to tity management is much easier when
ensure that only the parts of the system More Information:
the identities belong to an organiza-
required for the job will be available. http://www.opengroup.org/jericho
tion’s own employees. Enforcing policy
Like all policies this will need to be at a partner organization is that much
monitored and updated to match harder. About the author
employees moving through the organisa- And, given that it is hard enough to Ray Stanton is Global Head of Security
tion, and to keep up with changing rela- ensure that your own users have config- Services at BT. He has over six years expe-
tionships with partners. ured their devices properly, it seems rience in Information Services and 21
Identity management will ensure that unlikely that any of us will be able to years in IT Security.Ray has worked for
no unauthorized personnel have access guarantee that partners have done so. both government and commercial organi-
to any part of the system, and will be a But this is crucial, since ill-configured zations in a variety of security related roles
major factor in maintaining compliance. laptops and PDAs represent a significant including project management, security
With a more open network, organisa- security risk at both the outer edge and auditing, policy design, and the develop-
tions will still have to prove that in the core of the network. ment of security management strategies.

6
Network Security April 2005
VULNERABILITIES

they implemented more checks than in


A contemporary reality.
A common practice was for vendors

approach to to create checks for any aspect of a


host that can be remotely identified.

network vulnerabili- This was often done regardless of its


utility for security. As an example,
it is not unusual for network vulnera-

ty assessment Andrew Stewart


bility scanning tools to determine the
degree of predictability in the IP
Andrew Stewart identification field within network
traffic that a target host generates.
Modern network vulnerability assessment tools suffer from an While this observation may be useful
“information overload” problem in certain circumstances, the
pragmatic view must be that there
The roots of this problem lie in the were perceived to be. In some respects are far more influential factors that
fact that the competitive and this is similar to the situation today can influence a host's level of vulnera-
commercial drivers that shaped the where software vendors are judged bility. Nonetheless, network
early market for network vulnerability by the security community on their vulnerability assessment products
assessment products continue to have timeliness to release patches for security typically incorporate hundreds of such
influence today. problems that are identified in their checks, many with similarly question-
These historical goals no longer reflect products. able value.
the needs of modern businesses, howev- The market's desire for a comprehen-
er. A shift in requirements has occurred, sive set of vulnerability checks to be
due to the now widespread use of patch delivered in a timely fashion spurred the Information overload
manufacturers of network vulnerability The result of these competitive drivers
management technologies.
has been that when a network
In this paper I describe the advan-
vulnerability scanner is run against
tages in using patch management tech-
any network of reasonable size, the
nologies to gather vulnerability data. I
printout of the report is likely to
also propose a lightweight method for
network vulnerability assessment,
which does not rely on signatures, and
“ A network vuln.
scanner report
resemble the thickness of a telephone
directory. An aggressive approach to
information gathering coupled with
which does not suffer from information
an ever increasing set of vulnerabilities
overload issues. can be as thick results in an enormous amount of
information that can be reported.
The effect of historical as a phone Such a large amount of data is not
market forces
In the formative years of the commer-
cial network vulnerability assessment
directory
” only intimidating, but it severely limits
the ability to make key insights about
the security of the network. The
market, the number of vulnerability question of “where to begin?” is a
“checks” that vulnerability assessment assessment tools to incorporate ever-larg- difficult one to answer when you are
tools employed was seen as a key metric er amounts of checks into their prod- told that your network has 10,000
by which competing products could be ucts, and to do so with increasing rapid- “vulnerabilities”.
judged. The thinking was that the ity. Some vendors even established Vendors of network vulnerability
more checks that were employed by a research and development teams for the assessment products have tried to
tool, the more comprehensive it would purpose of finding new vulnerabilities. address this information overload prob-
be, and thus the more value its use (An R&D team was also an opportunity lem in several ways. One approach has
would provide. for vendors to position and publicize been to attempt to correlate the output
Vendors were also evaluated on how themselves within the marketplace.) of other systems (such as intrusion
quickly they could respond to newly Vendors were said to have sometimes detection systems) together with vul-
publicised security vulnerabilities. The sought competitive advantage through nerability data to allow results to be
quicker a vendor could update their duplicitous means, such as by slanting prioritised. Another approach has been
product to incorporate the checks for their internal taxonomy of vulnerability to try and “fuse” data together on the
new vulnerabilities, the better they checks in order to make it appear that basis of connectedness, in order to

7
April 2005 Network Security
VULNERABILITIES

increase the quality of data at a higher An advantage here is that it is a rela- did not require a roll-out of host-based
layer. These approaches have spawned tively straightforward task for a software agents. With the now widespread use
new categories of security product, such agent running on a host to determine of agent-based patch management
as “Enterprise Security Management” the host’s patch level. A network vulner- technologies, this barrier has been
(ESM), “Security Information ability scanner has to attempt to remote- overcome.
Management” (SIM), and ly infer that same information, and this Given the advantages in using a host-
“Vulnerability Management”. task is made more difficult if the vulner- based model to gather patch status infor-
But rather than add layers of abstrac- ability scanner has no credentials for the mation, do network vulnerability assess-
tion (and products to buy), the solution target host. ment tools still have a role to play? In
would logically lie in not gathering so Another advantage to using a host- discovering new vulnerabilities, or for
much data in the first place. This has based model for gathering patch data is discovering vulnerabilities in bespoke
now become a viable strategy, because that with an ever-increasing set of vul- applications (such as Web applications),
of the capabilities provided by modern nerability checks being built into net- network vulnerability assessment tools
patch management technologies. work vulnerability assessment tools, the clearly add value. But this is somewhat
probability increases that a check might of a niche market. These are not activi-
adversely affect a network service on a
The rise of patch box. The result might be that the scan
ties that businesses typically wish to per-
form against every device within their
management causes services to crash, restart, or oth- network environment, or on a regular
The widely felt impact of Internet erwise misbehave. The days when port basis. (Scanning a DHCP allocated net-
worms has opened the eyes of businesses scanning would crash the simplistic net- work range provides little value if the
to the importance of patching systems. work stack within printers and other DHCP lease time is short, just as one
Host-based patch management products such devices are probably behind us, example.)
such as Microsoft's SMS (Systems but a business might rightly question
Management Server) and SUS (Software the use of increasingly complex vulnera-
Update Services) are now in wide bility checks to interrogate production
A modern approach
deployment, as are other commercial It is a widely held belief amongst securi-
systems.
and freeware tools on a variety of plat- ty practitioners that the majority of
With an ever-increasing number of
forms. See for example, PM (2005) and security break-ins take advantage of
checks, the impact on network band-
Chan (2004). known vulnerabilities. While there is
width when a network vulnerability
In many respects, this increased focus assessment tool is run also climbs. no concrete evidence for this claim, on
on patch management has diminished (Rate-limited and distributed scanning an intuitive basis it is probably correct.
the traditional role of network vulnera- can help here, but these involve addi- In most cases, the patch for a known
bility assessment tools. If the delta tional complexity.) vulnerability already exists, or the ven-
between current patch status and the There are disadvantages to employing dor affected is in the process of creating
known set of vulnerabilities is already a host-based model, however. Products the patch. (In that latter scenario, the
being directly determined on each indi- which require that an agent be installed version numbers of the particular oper-
vidual host, then there is less need to use on hosts have usually been seen as ating systems or applications that are
a network vulnerability assessment tool time-consuming to deploy and known to be vulnerable are usually
to attempt to collect that same informa- complex to manage. Indeed, the value known, even if the patch itself is
tion (and to do so across the network proposition of network vulnerability not yet available.)
and en masse). assessment tools was, in part, that they A patch management solution can
determine the presence or absence of
patches on hosts, and can also identify
service count
the current version number of operating
telnet 20
systems and installed applications. A
ssh 79
rlogin 3 patch management solution can there-
http 52 fore be used to determine vulnerability
https 26 status. The depth of reporting that
ldap 8 modern patch management tools pro-
vnc 9 vide in this area has in many respects
ms-term-serv 30 already surpassed the capabilities of
pcanywheredata 2
conventional network vulnerability
irc 1
assessment tools. This is possible
Table 1: Display of services running on hosts
because of the advantages inherent in a
host-based model.

8
Network Security April 2005
VULNERABILITIES

which there was no fingerprint match.


os count
An all-Linux organization might worry
HP embedded 26
Cisco embedded 33
about the presence of a Windows 95
Linux 42 machine on its network (and vice-versa,
Windows 553 of course).
OpenBSD 1 This approach is well-suited for
No match 2 detecting the decay in security that
computers tend to suffer over time.
Table 2: Number of operating systems found in a particular network Most businesses employ a standard
build for desktop and server machines
to reduce complexity and increase ease
However, host-based patch manage- gathered on the number of different ser-
of management, but day-to-day admin-
ment tools only have visibility into the vices running on hosts within a network.
istrative activities can negatively impact
hosts onto which an agent has been The policy on this network is to use
that base level of security. Temporary
installed. Organizations still need some Microsoft's Terminal Services for remote
administrative accounts are created but
form of network assessment in order to administration, and therefore the two
then forgotten; services such as file
detect changes that lie outside the visibil- installations of pcAnywhere and the nine
transfer are added for ad hoc purposes
ity of their patch management infra- installations of VNC that were detected
but not removed, and so on. A vulner-
structure. are policy violations that need to be
ability scanner is overkill for detecting
I suggest that this task can be accom- investigated then corrected. Running
pcAnywhere or VNC is not a security this kind of “policy drift”. By employ-
plished using traditional network inter-
“vulnerability” per se, but remote admin- ing more simplistic network informa-
rogation techniques, and does not
istration software certainly has a security tion gathering techniques, the run time
require a library of vulnerability checks.
Well-documented techniques exist for implication. That is the difference of a scan can be reduced, as can the
gathering data related to the population between looking for specific vulnerabili- impact on network bandwidth. The
of a network, the services running on ties and gathering general data on the duration of the information gathering
hosts within the network, and the identi- network. loop is shortened, and this allows
fication of operating systems type As a further example, the IRC server results to be provided quicker,
that was found on the network would which itself reduces risk by allowing
probably raise the eyebrow of most secu- remediation activities to be carried
rity practitioners. out sooner.
Note how simple it is to perform this

“ what data is
still valuable to
analysis, in contrast to having to wade
through hundreds of pages of vulnerabil-
ity assessment report. If a patch man-
Conclusions
Patch management technologies and
processes now deliver to businesses
agement solution is being used to detect the core capability of traditional net-
gather across weaknesses in the patch status of hosts, work vulnerability assessment

the network?
” then this is the type of data that it is
valuable to collect across the network.
This is not traditional vulnerability
tools; namely, the identification of vul-
nerabilities that are present due to miss-
ing patches. Patch management
assessment data, but rather foundational solutions can be used to accomplish
data about the network. this task by identifying the delta
(Fyodor, 1997, 1998). These techniques Table 2 shows data on the number between the set of patches for
do not require a constant research effort of operating system types found known vulnerabilities and the current
to develop new vulnerability checks. within a particular network. Again, patch status of hosts within the
A port scanner written in 1990 could this data was collected using simple environment.
still be used today, whereas a vulnerabili- network information gathering For network-wide vulnerability assess-
ty scanner from the same year would techniques. ment, the question that businesses need
be considered woefully inadequate This network employs both Linux and to ask is: what data is it still valuable to
because it has no knowledge of modern Windows machines as its corporate stan- gather across the network? There is
vulnerabilities. dard. We can therefore say that the little value in employing a noisy, band-
The information that can be gathered detection of a device running OpenBSD width-consuming network vulnerability
using these relatively simple techniques warrants investigation. Similarly, it scan to interrogate production
has enormous utility for security. would be valuable from a security per- systems with an ever-increasing
Consider Table 1, which displays data spective to investigate the two devices for number of vulnerability checks, when

9
April 2005 Network Security
CRYPTOGRAPHY

patch status data is already being About the author Fyodor (1997), “The Art of Port
collected through patch management Andrew Stewart is a Senior Consultant with Scanning”, Phrack Magazine, Volume 7,
activities. No. 51, September 01, 1997.
a professional services firm based in Atlanta,
Employing simple network
Georgia.
information gathering techniques in Fyodor (1998), “Remote OS detection
this supplementary role is easier, takes via TCP/IP Stack FingerPrinting”,
less time, has less impact on network References Phrack Magazine, Volume 9, No. 54,
bandwidth, does not require a Chan (2004), “Essentials of Patch 25th December, 1998.
constantly updated set of vulnerability Management Policy and Practice”,
“checks”, and provides more intuitive Available: http://www.patchmanage- PM (2005), Mailing list archive at
results. ment.org/pmessentials.asp http://www.patchmanagement.org

decade," says Burt Kaliski, chief scientist


Crypto race for at RSA Security. "People didn't think
this was possible."

mathematical Shelf-life
infinity "Now there is no doubt that we need a
new hash function," says Mette
Vesterager, chief executive officer at
Sarah Hilley Sarah Hilley
Cryptico. Vesterager says a competition
will probably be launched to get a new
A newly emergent country has begun to set the pace for
cryptographic mathematicians…

Chinese infosec research efforts are fixat- Even more proof of the hive of crypto
ed on cryptography and researchers are
already producing breakthroughs. A
group of researchers from Shandong
activity in China is that 72% of all cryp-
tography papers submitted to the
Elsevier journal, Computers & Security
“ It is a race
between
University in China stunned the estab- last year hailed from China and Taiwan.
lished crypto community at the RSA And cryptography papers accounted for mathematicians
conference in February by breaking the one third of all the IT security research
integral SHA-1 algorithm used widely in submitted to the journal. and
digital signatures. This SHA algorithm
was conceived deep within the womb of
The Chinese are determined to get
into the subject, says Mike Walker,
head of Research & Development at
computers

Vodafone, who studied cryptography at
Royal Holloway College, London. "If replacement for SHA-1. Such a competi-

“ The Chinese are


determined to
you attract the best people from one
fifth of the world's population, you are
going to sooner or later make a big
tion generated the Advanced Encryption
Standard (AES), from two Belgians in
2000 to replace the Data Encryption
impression." Walker would like to see Standard (DES). DES was published in
get into the more young people venture into cryp- 1977 and had 72,000,000,000,000,000
tography in the UK. He believes the possible key variations, making it diffi-
subject
” general decline in interest in science
and maths is to the detriment of the
country.
cult to break.
NIST have now taken DES off the
shelf, however. No such retirement plan
But no such lack of interest is evident has been concocted for SHA-1 yet. As of
the US National Security Agency's cryp- in China. And the achievement in crack- yet the outcome for the broken algo-
tography labs. It was declared safe until ing the SHA-1 hash function is an rithm is still undecided. But Fred Piper,
2010 by the US National Institute of earthquake of a result. "The breakage of at Royal Holloway says that people will
Standard's and Technology (NIST). But SHA-1 is one of the most significant migrate away from it in the next year or
this illusion was shattered last month. results in cryptanalysis in the past so if the Chinese research is proven. In

10
Network Security April 2005
BIOMETRICS

addition the Chinese attack has reper- This is thanks to cryptographers practical. The British famously cracked
cussions on other hash algorithms such thinking in a different time, a time that the German Enigma code in World War
as MD5 and MD4. is set by the power of computation. II. And American Navy cryptanalysts
This power isn't here yet to make the managed to crack the Japanese code,
Down to earth crack of SHA-1 realistic outside a Purple, in 1940. What governments can
The breakage of SHA-1 is not so dra- research environment. and can't break these days, though, is
matic in the humdrum application of As cryptography is used in one and a very much unknown.
real-life security through, however. On a half billion GSM phones in the world, "The AES algorithm is unbreakable
practical level, Kaliski rates it at a two and it authenticates countless computer with today's technology as far as I'm
out of 10 for impact, even through it is users, devices, transactions, applications, aware," says Royal Holloway's Piper. So
widely used. But cryptographers have to servers and so on, this is good news. It far NIST hasn't even allocated a 'best
think ahead in colossal numbers to keep means that we don't have to worry before' date for the decease of AES. The
up with the leaps in computing power. about underlying algorithms being AES 128 bit key length gives a total of
According to Moore's law, computers attacked routinely like software vulnera- an astronomical 3.4 x (10^38) possible
keep getting faster at a factor of 2 every bilities, for example. The dangers are keys. But if law enforcement can't break
18 months. much more distant. However side chan- keys to fight against terrorism, intelli-
Cryptographers deal with theoretical nel attacks must be watched out for, gence is lost, warns Piper. However, peo-
danger. They bend and stretch the warns Kaliski, which target the imple- ple wonder 'what can the NSA do?', says
realms of mathematics and strive to cre- mentation of cryptography. Piper recom- Vesterager, and 'how big are their com-
ate algorithms that outlive computing mends that keys have to be managed puters?' But the general opinion is that
power and time. It is a race - a race properly to guard against such loopholes AES was not chosen because it could be
between mathematicians and computers. in implementation. broken. Time will show, however, she
Fortunately the crack of algorithms like adds.
SHA-1 doesn't yet affect us mere mor- Big computers And with China pouring large
tals, who unknowingly avail of crypto to Governments have historically been amounts of energy into studying the lan-
withdraw money from the ATM on a embroiled in mathematical gymnastics guage of codes and ciphers, the NSA
Saturday night. even before cryptography became so may want even bigger computers.

In the rest of the article the range of


Biometrics: the eye biometric technologies on the market
together with the risks and true costs of

of the storm implementation that are often ignored


by vendors and politicians alike will be
discussed.
By Mike Kemp, technical consultant, NGS
Software
The search begins
For the last few years vendors and politicians Mike Kemp From the beginning, computer and net-
work security researchers have sought an
alike have touted biometrics technology as an
alternative to the unique identifier,
invaluable, even preferred, approach to secure authentication of
which is currently the most widely used
identity. However, it presents both the end users of the technology
method of authenticating a user to an IT
and those responsible for its implementation with a number of
service. Typically this is a password and
challenges.
username combination. However experi-
Biometrics is often said to be a panacea using biometric technologies to authenti- ence has shown that this mechanism
for physical and network authentica- cate identities. As biometric technologies consistently fails to prevent attacks, as a
tion. But there are some considerable become less costly, many network knowledgeable attacker can employ a
problems with the technology, some of administrators will find themselves hav- range of methods to circumvent this
which can have a major impact on the ing to deal with a comparatively ill- layer of protection.
security posture of the implementing understood series of authentication tech- This model of authentication has
organization. nologies. Ironically some may well been supplemented by multi-factor
At present, the cost of implementation expose the systems they are responsible authentication mechanisms that are
means that relatively few companies are for to an increased level of risk. based on something the user knows (e.g.

11
April 2005 Network Security
BIOMETRICS

a password), something the user has (e.g. National security agencies in various Space invaders
a token), and something the user is countries, led by the US immigration Some forms of biometrics are obviously
(biometrics). authorities, are also seeking reliable more invasive of one’s personal ‘space’
As has been widely discussed , unique authentication systems as part of than others. Fingerprinting, for instance,
although popular, password authentica- the ‘war on terror’. Biometrics is the as- has negative connotations because of its
tion is often associated with poor pass- yet unfulfilled promise of the third pillar use in criminal detection. As such, some
word policies, and management strate- of authentication mechanisms. biometrics may well meet with user resis-
gies that don’t work. Many network At the network level, biometrics may tance that company security officers will
administrators have wrestled with bal- well enable network administrators to need to both understand and overcome.
ancing password authentication and increase the security of their network In 2005, London’s Heathrow airport
password policies against account user environments. There are a number of introduced plans to conduct retinal scans
needs or demands. Too many know how implementation and security issues that in a bid to increase security, and increase
far they have had to compromise security are often overlooked in the push towards the efficiency of boarding gates. At pre-
in order to service users. new methods of authentication. sent there are no figures on user accep-
tance of the scheme, which is currently
Token of affection? Methods of biometric voluntary. However, as retinal scans are
The use of token-based technologies such among the most invasive of biometric
access technologies it would be surprising if the
as SecureID tokens, smart cards and digi- As has been outlined earlier, biometrics
tal certificates is becoming widely accept- voluntary acceptance rate is high enough
is a means of authenticating an
ed, not only in the workplace, but out- to justify either the expense or efficiency
individual's identity using a unique
side as well. Beginning in October 2003 improvement of the solution.
personal identifier. It is a highly
the UK commenced a roll out of Chip sophisticated technology based on
and PIN authentication methods for scanning, pattern recognition and pat- Print sprint
transactions based on bank and credit tern matching. At present it remains Traditionally biometrics is commonly
cards. The primary aim was to combat one of the most costly methods of associated with physical security.
the growing rate of card fraud based on authentication available. However there is a growing shift
the manipulation of magnetic strips or Several different technologies exist towards adopting biometrics as a mech-
signature fraud. So far over 78 million based on retinal scans, iris scans, facial anism to secure authentication across a
Chip and Pin cards are in common use mapping (face recognition using visible network. A number of fingerprint read-
in the UK, more than one for every man, or infrared light, referred to as facial ers are currently available that can be
woman and child on the island. thermography), fingerprinting (including deployed for input to the authentica-
Token-based authentication is not hand or finger geometry), handwriting tion system. These are now cheap and
without its downside, however. In fact, it (signature recognition), and voice reliable enough for IBM to include one
is far from a panacea with regards the (speaker recognition). in some of its latest laptop computers as
security of networks, or indeed one’s per- For biometrics to be effective, the the primary user authentication device.
sonal finances. A number of attack vec- measuring characteristics must be pre- There is also on-going research to
tors exist for both the use of SecureIDs cise, and the false positives and false neg- reduce the cost and improve both the
and the like. Certainly, the number and atives minimised. accuracy and security other biometric
value of card-based frauds appears to When a biometric authentication sys- methods such as facial maps and iris or
have risen since Chip & PIN was intro- tem rejects an authorised individual this retinal scans. Judging by the develop-
duced. Recent research, still ongoing, is is referred to a Type 1 error; a Type 2 ments in the field of biometrics in the last
expected to expose a number of flaws error occurs when the system accepts an 15 years it can only be a matter of time
within the use of Chip and PIN authen- impostor. The effectiveness of a biomet- before everyone can afford the hardware
tication mechanisms in a variety of com- ric solution can be seen in the Crossover for biometric network authentication.
mon environments. Exchange Rate (CER). This is a per-
centile figure that represents the point at Accuracy and security?
PIN-pushers which the curve for false acceptance rates As has already been discussed the bio-
The push towards biometrics comes crosses over the curve for false rejection metrics approach to network authentica-
from a variety of sources. The financial rates. Depending upon the implementa- tion has much promise; however, it is an
industry in particular is resolved to tion of the chosen biometric technology, as yet unrealised potential. One reason is
reduce fraud based on stolen identities, this CER can be so high as to make that it is laden with a variety of short-
which, according to Accenture, the man- some forms unusable for an organisation comings that need to be fixed prior to its
agement consultancy, now costs con- that wishes to adopt or retain an aggres- widespread adoption as an authentica-
sumers and banks $2 trillion a year. sive security posture. tion mechanism.

12
Network Security April 2005
BIOMETRICS

One of the touted benefits of biomet- researcher Tsutomo Matsumoto was able degree of external coercion, such as a
rics is that biometric data is unique, and to fool 11 biometric fingerprint readers change in the legislation.
this uniqueness makes it difficult to steal 80% of the time using 'gummy fingers'.
or imitate. One often-overlooked prob- Worse news came in 2004, when Goodbye to passwords?
lem with the biometric approach is that, researchers revealed that some finger- Biometric technologies have the poten-
unlike other forms of authentication, print readers could be bypassed merely tial to revolutionise mechanisms of net-
they are anything but discreet. Unlike by blowing gently on them, forcing the work authentication. They have several
the traditional password-based model, or system to read in an earlier latent print advantages, such as users never need to
even the token-based approach (e.g. from a genuine user. remember a password, and more
Chip and PIN) no biometric approach Attacks are not limited only to finger- resilience against automated attacks and
relies upon something the user holds as print readers (as found in the current conventional social engineering attacks.
secret. Indeed in all the biometric tech- range of network access devices); both However, the market for such devices is
nologies currently available potential face and iris scanners can be spoofed so new, and the amount of clear statisti-
attackers can see exactly what is going successfully. In the case of the former, a cal research data as to its cost and bene-
on. Obviously, this makes them poten- substitute photograph or video of a fits is Spartan.
tially vulnerable. legitimate user may be able to bypass Most large companies can probably
systems; with regards to iris scanners, a afford to implement them. But doing so
Attack vectors photograph of the iris taken under dif- may have the undesirable side effect of
When evaluating biometrics network fused lighting and with a hole cut for actually increasing their exposure to risk.
administrators should consider possible the pupil can make for an effective In particular, the lack of standardisation
attack vectors. These fall into two dis- spoofing stratagem. and quality control remains a serious
tinct classes, namely: If compromised biometric devices are and grave concern.
a conduit into a network, it may be pos- In the coming years, biometrics may
• Physical spoofing, which relies on sible to manipulate stored data, thus improve as an authentication technolo-
attacks that present the biometric effectively bypassing all security policies gy, if only because politicians and fraud-
sensor (of whatever type) with an and procedures that are in place. sters are currently driving the need for
image of a legitimate user. improvements. At the present level of
• Digital spoofing, which transmits Attack on all sides technical understanding and standardisa-
data that mimics that of a legitimate As has been outlined, biometric technolo- tion, and many signs of user resistance,
user. This approach is similar to gies are far from risk-free. Many (if not network administrators who voluntarily
the password sniffing and replay all) are susceptible to both physical and introduce the technology may find
attacks that are well known and are logical digital attack vectors. The reasons themselves on the bleeding edge, rather
incorporated in the repertoire of for these shortcomings are many, includ- than the leading edge.
many network attackers. ing a potential ignorance about security Network administrators need to ques-
concerns on the manufacturer's part, a tion closely not only the need for bio-
In 2003, two German hackers, lack of quality control, and little or no metrics as a network authentication and
Starbug and Lisa, demonstrated a range standardisation of the technologies in use. access mechanism, but also the levels of
of biometric physical spoofing attacks at There is also the sometimes onerous risk they currently pose to the enter-
the Chaos Computer Camp event. Their and problematic process of registering prise. For most, the answer will be to
attacks relied upon the adaptation of a users who may not embrace the use of wait and see.
technique that has long been known to biometrics, and who may start quoting
many biometrics vendors. In the original passages from the Human Rights Act. About the author
attack vector an attacker could dust a When you think about implementing Michael Kemp is an experienced technical
fingerprint sensor with graphite powder, biometric technologies remember that author and consultant specialising in the
lift the fingerprint, and then subsequent- they do not yet measure perfectly, and information security arena. He is a widely
ly use it to gain entry. many operational and security chal- published author and has prepared numer-
The 2003 attack showed it could cre- lenges can cause them to fail, or be ous courses, articles and papers for a
ate a 'gummy finger' using a combina- bypassed by attackers. Presently there is diverse range of IT related companies and
tion of latex, photo imaging software not enough hard evidence that shows periodicals. Currently, he is employed by
and graphite powder. Although this the real levels of failure and risk associ- NGS Software Ltd where he has been
method may seem somewhat far- ated with the use of biometric authenti- involved in a range of security and d ocu-
fetched, it can be used to bypass a num- cation technologies. It would be a brave mentation projects. He holds a degree in
ber of available fingerprint biometric administrator indeed that chose to Information and Communications and is
devices. Indeed, in 2002, Japanese embrace them blindly and without a currently studying for CISSP certification.

13
April 2005 Network Security
PROACTIVE SECURITY

On this count some progress has been


Proactive security made but there is still a heavy onus on
enterprises to actually implement proac-

latest: vendors wire tive security. Some of this is inevitable,


for no enterprise can make its network

the cage but has secure without implementing some good


housekeeping measures. The products
can only deliver if they are part of a

the budgie flown…. Philip Hunter


coherent strategy involving analysis of
internal vulnerabilities against external
threats.
Philip Hunter
Indeed this is an important first step
towards identifying which products are
Proactive security sounds at first sight like just another marketing
relevant. For example the decline in
gimmick to persuade customers to sign for up for yet another
perimeter security as provided by fire-
false dawn. After all proactivity is surely just good practice,
walls has created new internal targets
protecting in advance against threats that are known about, like
for hackers, notably PCs, but also
bolting your back door just in case the burglar comes. To some
servers that can be co-opted as staging
proactive security is indeed just a rallying call, urging IT managers
posts for attacks. There is also the risk
to protect against known threats, and avoid easily identifiable
of an enterprise finding its servers or
vulnerabilities. All too often for example desktops are not
PCs exploited for illegal activities such
properly monitored allowing users to unwittingly expose internal
as peer-to-peer transfer of software,
networks to threats such as spyware. Similarly remote execution
music or even video, without its knowl-
can be made the exception rather than the default, making it
edge. Identifying such threats and
harder for hackers to co-opt internal servers for their nefarious
putting appropriate monitoring tools in
ends.
place is an important first step along
from the compiled version. The dedi- the pre-emptive path.
Vendor bandwagon
Nevertheless the vendors do seem cated IT security vendors have also
to have decided that proactive security been at it. Internet Security Systems Stop the exploitation
is one of the big ideas for 2005, and has been boasting of how its customers However some of the efforts being
there is some substance behind the have benefited from its pre-emptive made will benefit everybody and come
hype. Cisco for example came out protection anticipating threats before automatically with emerging releases of
with a product blitz in February 2005 they happen. And Symantec has software. Microsoft’s work with
under the banner of Adaptive Threat brought to market the so-called digital PreEmptive Solutions springs to mind
Defence. IBM meanwhile has been immune system developed in a joint here, as the technology concerned is
promoting proactive security at the project with IBM. included with Visual studio 2005.
This technology called Dotfuscator
Unreactive Community Edition is designed to
These various products and strategies make the task of reconstituting
source code from the compiled object

“ Proactive
security has
might appear disjointed when taken
together, but they have in common the
necessary objective of moving beyond
code practically impossible, so that
hackers are unlikely to try. Of course
the risk then becomes of the source
reaction, which is no longer tenable in
code itself being stolen, but that is
to be the modern security climate. The crucial
another matter.
question is whether these initiatives real-
automatic
” ly deliver what enterprises need, which is
affordable pre-emptive protection. If the
solutions extract too great a toll on
Sharing private keys
The principle of ducking and weaving
internal resources through need for con- to evade hackers can also be extended
lower level of cryptography and digital tinual reconfiguration and endless analy- to cryptography. The public key system
signatures, while Microsoft has been sis of reports containing too many false is widely used both to encrypt session
working with a company called positives, then they are unworkable. keys and also for digital signatures.
PreEmptive Solutions to make its code Proactive security has to be as far as pos- The latter has become a target for
harder for hackers to reverse engineer sible automatic. financial fraudsters because if they steal

14
Network Security April 2005
PROACTIVE SECURITY

someone’s private key they can write Internet Security Systems, was quick some cases now it takes just a week or
that person’s digital signature, thereby off the mark, and in September 2002 two, so the processes of developing and
effecting identify theft. But here too distributed an update that provided distributing patches need to be speeded
risks can be greatly reduced through protection. Then in January 2003 came up. Ideally service providers should
pro-activity. An idea being developed by the infamous Slammer Worm exploiting implement or distribute such protection
IBM involves distributing private keys this loophole, breaking new ground automatically.
among a number of computers rather through its rapid propagation, doubling
the infected population every 9 seconds
than just one. Then the secret key can Conclusion
only be invoked, whether for a digital at its height. The case highlighted
Proactive security also needs to be flexi-
signature or to decrypt a message, with the potential for pre-emptive action,
ble, adapting to the changing threat
but also the scale of the task in distrib-
landscape. A good example is the case of
uting the protection throughout the
two-factor security, in which static pass-
Internet.
words are reinforced by tokens generat-

“ Many suppliers
hide issues
Open disclosure
Another problem is that some software
ing dynamic keys on the fly. This has
been the gold standard for controlling
internal access to computer systems
vendors fail to disclose vulnerabities within the finance sector for well over a
from users
” when they do occur, through fear of
adverse publicity. This leads to delay in
identifying the risks, making it even
decade, but recently there have been
moves to extend it to consumer Internet
banking. But some experts reckon this is
harder to be proactive. It makes sense a waste of money because it fails to
therefore for enterprises to buy software
the participation of a number of com- only where possible from vendors that
puters. This makes it harder to steal the practice an open disclosure policy. Many
key because all the computers involved
have to be compromised rather than
just one. In practice it is likely that at
such disclosures can be found on the
BUGTRAQ mailing list, but a number
of vendors, and in some cases even sup-
“ There have
been moves
least one of the computers will be pliers of free software when there would
secure at any one time – at least such is seem nothing to gain by it, hide issues to extend
the theory. This development comes at from their users. There is however a
a time of increasing online fraud and counter argument in that public dissemi- two- factor
mounting concerns over the security of nation of vulnerabilities actually helps
digital signatures. and encourages potential hackers. But authentication
there is the feeling now that in general
the benefits of full disclosure outweigh to Internet
Buglife
There is also scope for being proactive
when it comes to known bugs or vul-
nerabilities in software. One of the
the risks.

Patch it
banking

most celebrated examples came in July Be that as it may the greatest challenge
2002 when Microsoft reported vulnera- for proactive security lies in responding address the different threats posed by
bility in its SQL Server 2000 and distributing patches or updates to Internet fraudsters. These include man
Resolution Service, designed to allow plug vulnerabilities within ever decreas- in the middle attacks which capture the
multiple databases to run on a single ing time windows. As we just saw the one time key as well as the static pass-
machine. There was the potential to Slammer worm took six months arrive, words and replay both to the online
launch a buffer overflow attack, in and the same was true for Nimda. This bank. So it may be that while two-factor
which a hacker invokes execution of left plenty of time to create patches and security will reduce fraud through guess-
code such as a worm by overwriting warn the public, which did reduce the ing or stealing static passwords, the cost
legitimate pointers within an applica- impact. But the window has since of implementing it across a customer
tion. This can be prevented by code shortened significantly – a study by base will outweigh the benefits, given
that prohibits any such overwriting, but Qualys, which provides on-demand vul- that vulnerabilities remain. But nobody
Microsoft had neglected to do so within nerability management solutions, is suggesting that proactive security
Resolution Service. However Microsoft reported in July 2004 that 80% of avoids hard decisions balancing
did spot the vulnerability and reported exploits were enacted within 60 days of solutions against threats and cost of
it in July 2002. One security vendor, a vulnerability’s announcement. In implementation.

15
April 2005 Network Security
PKI

between the networks of participants.


Management Thus all information is protected by
encryption. An investment to purchase

aspects of secure or upgrade the network routers at the


endpoints of the secure tunnel might not
be insignificant.
messaging between Most of the work to implement such
solutions lies in establishing the network

organizations Roger Dean


connection, and a dedicated line may
have a considerable lead time. The same
applies for new network routers as end-
Roger Dean, Head of Special Projects, eema points of a VPN.

Electronic messaging is vulnerable to eavesdropping and imperson-


ation, and companies that do not protect sensitive information lay
Gateway to gateway
themselves open to significant risk. Here we take a short glimpse at encryption using
some of the issues associated with Public Key Infrastructure (PKI), Transport Layer Security
and some less expensive options.
(TLS)
PKI create data-protection issues if published Internet email messages are vulnerable to
Secure messaging employing end-to-end in full. Secondly, corporate directories eavesdropping because the Internet
architectures and PKIs offer message usually allow wildcards in search criteria, Simple Message Transfer Protocol
confidentiality through encryption, and but these are unwise for external connec- (SMTP) does not provide encryption. To
message authentication through digital tion as they could be used to harvest e- protect these messages, servers can use
signatures. However, there are a number mail addresses for virus and spam TLS to encrypt the data packets as they
of implementation and operational issues attacks. Furthermore, organizations may pass between the servers. With TLS, each
associated with them. publish certificates in different locations. packet of data is encrypted by the send-
One of the major criticisms is the ing server, and decrypted by the receiving
overheads involved in certificate and key Dedicated line and server. TLS is already built into many
management. Typically, certificates and messaging servers, including Microsoft
routing Exchange and IBM Lotus Domino, so
keys are assigned a lifetime of one to The underlying idea for this alternative
three years, after which they must be that implementation may simply involve
to a fully blown PKI is to transmit mes-
replaced (rekeyed). A current trend is to the installation of an X.509 server certifi-
sages on a path between the participating
employ a rigorous semi-manual process cate and activation of the TLS protocol.
organizations that avoids the open
to deploy initial certificates and keys and The downside is that data is protected
Internet. There are two major options:
to automate the ongoing management only in transit between servers that sup-
processes. For the initial issuance, it is port TLS. TLS does not protect a mes-
A dedicated line between the sage at all stages during transport, unless
vital to confirm the identity of the key
and certificate recipients; especially involved companies TLS is implemented as a service in all
where messages between organizations With this option all messages are nor- the involved instances.
are to be digitally signed. mally transmitted without any protec-
tion of content. The level of confiden-
Business partners must have trust in
tiality for intracompany traffic thus
Gateway to gateway
each others’ PKIs to a level commensu-
rate with the value of the information to becomes the same for the intercompany encryption using S/MIME
be communicated. This may be deter- traffic and for many types of informa- Gateways
mined by the thoroughness of the tion that may be sufficient. Depending An obstacle to end-to-end PKI is the
processes operated by the Trust Centre on bandwidth, network provider and burden of managing certificates. Also,
that issued the certificates, as defined in end locations, however, this option may once encrypted, messages cannot be
the Certificate Policy and Certificate be expensive. scanned for viruses, spam, or content.
Practice Statement. Gateways that use the
The organisation’s corporate directory A VPN connection between Secure/Multipurpose Internet Mail
plays a critical role as the mechanism for participating companies Extensions (S/MIME) protocol to
publishing certificates. However, corpo- Such a connection normally employs the encrypt and decrypt messages at the
rate directories contain a significant Internet, but an encrypted, secure tunnel organizational boundary can address
amount of information which may on the network layer is established these issues. S/MIME gateways use

16
Network Security April 2005
RFID

public and private keys known as and/or encryption intact. However, it with different types of confidentiality
domain certificates to encrypt and sign cannot currently sign or encrypt mail such as MS/Word, MS/Excel and the
messages that pass between domains. that is sent to a user in a domain that Adobe Family. Another collection is rep-
They have the same format as those used does not have an S/MIME gateway. resented by file compressing tools. These
in desktop-to-desktop S/MIME message allocate the smallest possible storage area
encryption, except that the certificates Pretty Good Privacy (PGP) for any number of files gathered, and are
are issued to domains, not individual The OpenPGP and PGP/MIME proto- often equipped with advanced encryp-
users. Messages are signed and encrypted cols are based on PGP and rely on tion capability. For example, the latest
only while in transit between the MIME for message structure. Today, a version of WinZip is supplied with 256
S/MIME gateways. specialised S/MIME client can’t normal- bit AES encryption.
ly communicate with a PGP client, There are some limitations with com-
although that may change. PGP has pression tools, in the area of secure mes-
been described as a good example of saging. Key handling is cumbersome and
if used extensively it may cause trouble.

“ A major criti-
cism of PKI is
what PKI is; but it enables the user to
scale the PKI implementation from indi-
viduals up to several thousand users. It
Also, compression tools can’t normally
protect the actual message, just the
attached file(s); and the password must
comprises a number of products that
can be implemented incrementally be delivered to the recipient separately –
the overheads preferably by phone. File compression is
according to requirement. With PGP
there is no reason to hesitate to imple- therefore a temporary or special solu-
ment and make use of secure messaging tion, to be used with discernment.
An S/MIME gateway can co-exist with capability because of cost or complexity:
unencrypted SMTP messages and with it’s perfectly possible for the small to More information
end-to-end S/MIME encryption; it can medium sized company ) to create an More information can be found in the
send and receive unencrypted and environment which is functional, inex- full report available from EEMA, a large
unsigned messages to/from any e-mail pensive and easy to manage. multi-national user organization.
domain; and it can receive messages EEMA is exhibiting at Infosecurity
signed or encrypted with conventional, Europe 2005, which is held on the 26th
desktop-to-desktop S/MIME. It will not Attachment, encryption – 28th April 2005 in the Grand Hall,
decrypt the message or verify the signa- and compression Olympia in London.
ture, and it will deliver the message to A number of products for document More details:
the recipient's mailbox with the signature storage and communication are supplied www.infosec.co.uk

RFID Basics
RFID: misunderstood or RFID (Radio Frequency IDentification)
has been around for decades. Initially
untrustworthy? used for proximity access control,
RFID has evolved over the years to be
Bruce Potter used in supply chain tracking, toll bar-
rier control, and even protecting auto-
It seems that everywhere you look, wireless security is in the news. mobiles. The cost of the chips used for
WiFi networks are being deployed in homes and businesses at an RFID are now as low as 0.20USD with
astounding rate. Bluetooth is being in integrated into all manner of readers costing as little as 30USD,
device from cell phone to laptop to automobile. And now RFID tags making large scale deployments more
are starting to show up in some retail stores and gaining acceptance cost effective.
in for use in supply chain management. There are several types of RFID tag.
But of these three technologies, RFID are worried that the current state of The most common and simple is a pas-
is probably the least understood and the technology is not sufficient to sive tag. Passive RFID tags receive their
most feared by the public at large. keep hackers at bay. Ultimately, RFID energy from a remote RFID reader. The
Consumers are afraid of their buying has the capability to change the face tag is able to focus the radio frequency
habits being tracked. Travellers are of supply chain management and energy from the transmitting reader and
concerned about the privacy issues inventory control and we need to be uses the generated electrical impulse to
of RFID in passports. And businesses prepared for that. power the onboard chip.

17
April 2005 Network Security
RFID

These RFID chips are very simple and read at 1 foot, an attacker may be able to idea is the RFID information can no
may have as few as 400 logic gates in be 100 ft away and still interact with it. longer be tied to a value in the database.
them; they can basically be thought as a RFID tags typically only contain a The problem with this method is that
simple memory chip. The chip then unique number that is useless on its there is still an RFID chip active in the
responds with a short burst of informa- own. The idea is that the reader inter- item, even if the data on the chip is ran-
tion (typically an ID unique to the chip) faces with some backend system and dom. An attacker is still able to physi-
that is transmitted by the antenna on the database for all transactions. The data- cally track the tag, and even store data
RFID tag. The reader receives this base stores the information that ties the on it if they so desired. So some tags
information and can then act upon it. unique ID to something of interest. For also have the concept of a KILL com-
Passive tags can be manufactured thinner instance, the database knows that ID mand. When a tag receives a KILL
than a piece of paper and have been 1234 is attached to a bar of soap. An command, it ceases to respond to
integrated into everything from shipping attacker reading RFID’s would not requests from RFID readers. A KILL
labels to clothing. know, without access to the database, command actually terminates the RF
The other types of RFID involve using what ID 1234 is. capability of the chip.
a battery for some part of the RFID Unfortunately, we cannot always While this is good from a privacy per-
transaction. Semi-passive tags use a assume that an attacker will not have spective, it poses a massive security risk.
small onboard battery to power the chip, access to the backend database. As the The KILL command is protected by a
but rely on the energy from the reader last decades of network security have password on the chip. Unfortunately,
for powering the tag’s antenna for trans- demonstrated, backend systems are often RFID chips are very primitive. So many
mission. Semi-active tags turn this con- all too easy a target for an attacker. And enterprises have all their RFID chips cre-
cept around. These tags use the battery once the database tying the unique ID’s ated with the same KILL password.
for powering the antenna but the chip to physical items has been compromised, Further, there is no capability to change
relies on the RF energy from the reader. it would be nearly impossible to retag all the KILL password once a chip has been
An Active tag uses a battery for both the items in response. fabricated. An attacker with knowledge
chip and the transmission of data on the The vast majority of RFID tags on the of an enterprise’s KILL password can
antenna. While the amount of memory market require no authentication to read potentially terminate all the RFID’s they
in the non-active tags is limited to gener- the information on them. This allows are within range of. In a short period of
ally a few hundred bytes (if that), an active anyone, an attacker or even just a com- time, an attacker can render hundreds of
tag can have kilobytes (if not megabytes) petitor, to read the data on an RFID thousands of tags completely useless.
of memory. The drawback of any of the chip. Further, many tags have the capa-
powered tags is that eventually the battery bility to write information to the chip Parting shot
dies and the tag becomes useless. without authentication. This is especial- As RFID tags get cheaper, they will be
ly troubling for enterprises relying on integrated into more and more systems.
Security concerns RFID for things like supply chain man- While an incredible tool for supply chain
There are a wide variety of security con- agement. An attacker could theoretically management and asset tracking, RFID
cerns with RFID tags. One concern of overwrite values on the RFID tags used tags have more in common with 20 year
interest is the ability to track the location by the enterprise, thereby wreaking old memory card technologies than con-
of a person or asset by an unintended havoc with their RFID system. temporary wireless systems. Unlike old
actor. While the RFID specifications memory cards, RFID tags are accessible
generally deal with short ranges (a few Killing a tag from a great distance given advanced
inches to a few feet) between the readers One of the primary privacy concerns wireless equipment. Attacks against
and the tags, specialized equipment can regarding RFID is the ability for a con- RFID tags are trivial and privacy con-
pick up a signal from an RFID tag much sumer to be tracked once they have cerns are everywhere. To date, these con-
farther away. bought an item that contains an RFID cerns have not outweighed the advantages
This is a similar problem to that with tag. To overcome this fear, vendors and to businesses in need of RFID technology
wireless LAN’s. Normally a WLAN is enterprises have devised various ways to and the rate of adoption is accelerating.
only effective for a user within 100m or attempt to terminate the tag. Until new standards and more advanced
so. But an attacker with powerful anten- One method of terminating a tag used chips can be made, RFID tags will
nas can be more than 10km away and for retail sales is to simply change the remain easy targets for attackers deter-
still access the network. RFID tags fall info on the tag to random data when the mined to cause havoc or commit crimes.
prey to the same problem; an attacker can item is sold. That way a store’s security
be two orders of magnitude farther away system knows the item has been sold and About the author
than intended and still read data. For does not sound an alarm when the item Bruce Potter is currently a senior security
instance, if an RFID tag is designed to be leaves. Further, with random data, the consultant at Booz Allen Hamilton.

18
Network Security April 2005
SNORT

Snort. This improvement in the user


Network security managers' interface has greatly expanded the use of
Snort to non-developers since it not only

preferences for the Snort makes this powerful program more


accessible but also more efficient and
easier for non-developers to understand
IDS and GUI add-ons the alerts generated by the IDS (Preece,
Rogers & Sharp, 2002).
Galen A. Grimes, Penn State McKeesport, 4000 University Drive, These interfaces can mainly be divided
McKeesport, PA 15132, USA into two broad categories - the first cate-
gory are those add-ons that organize
Snort, one of the most widely used Intrusion Detection System (IDS) Snort's output into a structured set of
products on the market, is extremely versatile and configurable, and reports and attack trend indicators, and
runs on Linux, most UNIX platforms, and Windows. Snort is a fairly the second category of add-ons are those
difficult product to use fully because of the stark command line inter- that are designed to ease the tediousness
face and the un-ordered scan and attack data. The difficulty associat- of configuring Snort and maintaining its
ed with its command line interface, however, has spawned a near vast signature ruleset.
cottage industry among Snort developers who have created a myriad Most of the front-end interfaces were
of graphical user interfaces (GUIs) in an attempt to provide an easier originally designed to operate on a
means for network security managers to fully configure and use Linux/UNIX platform, but many have
Snort. This analysis will also look at which Snort add-on products are also been ported to operate in
favoured by network security managers. Windows. And there is even a port of
Snort to the Mac OSX platform that
Although the security marketplace has mechanisms for syslog, a user specified
uses the now familiar Mac OSX GUI
no shortage of good, reliable intrusion file, a UNIX socket, or WinPopup mes-
interface.
detection systems, one open source prod- sages to Windows clients using Samba's
uct still manages to hold a very promi- smbclient." (DataNerds, 2002).
nent position in the security manager's While the program is very robust and Who uses Snort?
arsenal - Snort. versatile in its ability to detect more than In this study a population of 195 network
Snort is one of the most widely used 1200 different types of real-time scans security managers from US colleges and
Intrusion Detection System (IDS) prod- and attacks, it is nonetheless somewhat universities were surveyed. The choice of
ucts currently on the market (Northcutt tedious and difficult to use. Snort colleges and universities was arbitrarily
& Novak, 2001). Snort is a command employs a rather cryptic command-line selected from a fairly even distribution of
line intrusion detection program based interface and all program configurations 40 states and the District of Columbia
on the libpcap packet capture library are done by manually editing the one listed in the total of the 6814 colleges and
(http://www.tcpdump.org/). It is extreme- configuration file - snort.conf. Snort universities in the Yahoo search directory
ly versatile and configurable, and runs on outputs its detected scans and probes (By Region > U.S. States).
Linux, most UNIX platforms, and into an unordered hierarchical set of The sample size was comprised of
Windows.[1] According to DataNerds, directories and text files. Its output how- 27.2% of this population. The survey
"Snort is a lightweight network intru- ever can be made more organized and was an attempt to determine whether
sion detection system, capable of per- structured by employing a commonly network security administrators use
forming real-time traffic analysis and used database plug-in (add-on) and Snort and any of the available add-on
packet logging on IP networks. It can directing the output to one of several products and what factors contributed to
perform protocol analysis, content supported SQL database products, such their decision to use the particular add-
searching/matching and can be used to as MySQL (http://www.mysql.com/), on selected.
detect a variety of attacks and probes, PostgreSQL (http://www.postgresql. In the sample, 17.0% had small net-
such as buffer overflows, stealth port org/), Oracle (http://www.oracle.com/), works comprised of less than 1000
scans, CGI attacks, SMB probes, OS fin- or MS SQL Server (http://www. workstations, while 83.0% had large
gerprinting attempts, and much more. microsoft.com/sql/). networks comprised of more than 1000
Snort uses a flexible rules language to Because of the tediousness of working workstations.
describe traffic that it should collect or with a command-line version of Snort, The network administrators were first
pass, as well as a detection engine that the legion of Snort devotees and devel- asked "Do you use the Snort Intrusion
utilizes a modular plug-in architecture. opers have created a near cottage indus- Detection system?". In the sample,
Snort has a real-time alerting capability try around developing and improving 45.3% of network security administra-
as well, incorporating alerting front-end GUI interfaces to complement tors surveyed stated they use Snort and

19
April 2005 Network Security
SNORT

the vast majority of the network security This study seems to suggest that this IDScenter, which includes ACID but
managers who use Snort use it on a category of add-ons is not nearly as popu- only operates on Windows OS.
Linux platform (78.3%). lar as the first category. In this study The addition of a GUI interface such
Of those security managers who do 79.2% of all network security managers as ACID, or any of the other add-ons
not use Snort, they gave the following who use Snort use one or more of the mentioned in this study, has been
reasons why: report/trend analysis add-ons (category 1) shown in numerous other studies to
• Don't use any IDS system (44.8%). while only 25.0% of the network security improve operator efficiency (Mann &
• Snort is not as useful as a commercial managers who use snort use one or more Schnetzler, 1986; Pulat & Nwankwo,
IDS product (24.1%). of the configuration add-ons (category2). 1987) and few will deny that the addi-
• Don't use open source (6.9%). tion of GUI front-ends and report gen-
• Snort installation/setup procedure • IDScenter -available free at: erators have made Snort a more viable
too complicated (6.9%). http://www.engagesecurity.com - product for a larger target audience
• Did not have time to install/setup 16.7% of all network security man- since the interfaces make the product
Snort (6.9%). agers who use Snort use and/or have more usable (Redmond-Pyle & Moore,
• Snort not robust enough (3.4%). tried IDScenter. 1995). In addition to more user-friend-
• Use IPS instead (10.3%). • SnortCenter - available at http:// ly interfaces many of the developer sites
users.pandora.be/larc/index.html - are also now offering installation assis-
Interfaces for organizing Snort's Only 8.3% of the network security tance for Snort.
output managers who use Snort say they also But the development of the variety of
It is not surprising that the vast majority use SnortCenter. GUI front ends described in this article
of the front-end interfaces for Snort are • Hen Wen (MAC OSX) - 8.2% of and the added usability they present,
designed to help users organize and dis- the responding network managers mean security administrators now pos-
play Snort's voluminous output into who use Snort both use and have sess a much wider choice for how they
coherent reports. Even on a small to tried Hen Wen. might want to deploy Snort-based sen-
medium-sized network or network seg- sors on their networks. Since an IDS is a
ment it is not unusual for Snort to gener-
ate between 15 and 20 thousand legiti-
Conclusion passive device with low CPU overhead,
In this study it appears that as network security managers are not limited or
mate alerts each month. Examples of restricted to the choice and number of
size increases network security managers
interfaces are as follows: front-end products they can deploy and
appear much more likely to make the
decision to include an IDS such as can place any number of Snort sensors
• Analysis Console for Intrusion on their network in any combination of
Snort in their security arsenals as sug-
Databases (ACID) - the front-end products previously listed.
gested by security best practices (Allen,
http://www.cert.org/kb/acid- 66.7%
2001). Among the security managers
of all network security managers who References:
who reported using Snort, 87.5%
use Snort say they also use ACID Northcutt, S., & Novak, J. (2001).
administer large networks (>1000 work-
• PureSecure - http://www.demarc. Network Intrusion Detection: An Analyst's
stations and/or host computers) and
com None of the surveyed network Handbook. Indianapolis: New Riders
12.5% administer small networks
security managers use it DataNerds http://www.datanerds.net
(<1000 workstations and/or host com-
• SnortFE - Not used by any survey /~mike/short.html
puters). This study also shows that the
respondents. Preece, J., Rogers, Y., & Sharp, H. (2002).
decision to use Snort as their IDS of
• Snortsnarf - http://www.siliconde- Interaction Design: Beyond Human
choice also includes the choice of which
fense.com. 12.5% of network securi- Computer Interaction. Hoboken, N.J.:
GUI front-end to use and overwhelm-
ty managers use it. John Wiley & Sons, Inc.
ingly the network security managers
• Razorback - http://www.intersectal- Allen, J. (2001) CERT Guide to System
represented in this study chose ACID.
liance.com/index.html - not used by and Network Security Practices.
This choice of Snort add-ons also sug-
survey respondents. Indianapolis: Addison-Wesley Pearson
gests that most security administrators
are using Snort more as an attack trend Education.
Interfaces for configuring Snort analysis tool rather than as a real-time Redmond-Pyle, D., & Moore, A. (1995).
Some Snort developers have concentrat- Graphical User Interface Design and
intrusion indicator. This study also
ed on developing an easier to use Snort Evaluation. London: Prentice Hall
shows that network security administra-
configuration environment for configur-
tors also strongly favor the Snort/ACID
ing Snort's network settings, preproces-
combination in operation on a Linux Note:
sor controls, output plug-ins and updat-
platform (78.3%). This could possibly [1]There is also a port of Snort for the
ing Snort's rules files.
explain the poor showing of the use of Mac OS called Hen Wen

20
Network Security April 2005

Das könnte Ihnen auch gefallen