Powerpoint format

Download Report

Transcript Powerpoint format

Web Site Security
Andrew Cormack
JANET-CERT
[email protected]
©The JNT Association, 1999
Where’s the problem?
Number of CIAC bulletins since October 1997:
Apache
0
IIS
5
Solaris
8
Windows NT
8
( Internet Explorer
3 )
See especially CIAC bulletin J-042 on web security
Web Site Security, Andrew Cormack
©The JNT Association, 1999
First fix your host
Minimal configuration

don’t run things you don’t need
Up to date with patches
Keep it that way

new bugs every month
Pay attention to logs

you may only get one warning
Web Site Security, Andrew Cormack
©The JNT Association, 1999
Limit the scope for errors
Minimal access
restricted users
 restricted hosts (e.g. use TCP wrappers)

Single function
others will compete with web serving
 and make operation much more complicated

Web Site Security, Andrew Cormack
©The JNT Association, 1999
What can go wrong
Denial of service (availability)
Information leakage (privacy)
Loss of control (integrity)
unauthorised modification
 or worse

Web Site Security, Andrew Cormack
©The JNT Association, 1999
Denial of service
Not much you can do to prevent it!

when does popularity become DoS?
Precautions
have more performance than likely attacker
 have different servers for different readers
 be ready with a "sorry" backup

Web Site Security, Andrew Cormack
©The JNT Association, 1999
Information leakage (web stuff)
Web is designed for publishing
Protection mechanisms are weak
files have many names
 addresses can be faked
 passwords can be sniffed

Shared authentication puts other systems at risk!
Use offline encryption if you must
Web Site Security, Andrew Cormack
©The JNT Association, 1999
Information leakage (system stuff)
Caused by
badly configured servers
 badly written scripts
 misguided scripts (finger, last, etc.)

Can lose
script source code
 password or other configuration files

Web Site Security, Andrew Cormack
©The JNT Association, 1999
Loss of control (severe)
Beware of uploads
replacing graphics
 or your home page
 who can publish? how do you know who they are?

Unexpected interactions
uploads of scripts
 java applets on multi-purpose server

Web Site Security, Andrew Cormack
©The JNT Association, 1999
Loss of control (fatal)
Allowing readers to run commands
Never run server as root

hackers have to work harder
Never put test scripts on live server

and check, check and re-check production scripts
Compromised system probably a write-off
Web Site Security, Andrew Cormack
©The JNT Association, 1999
The worst cgi script
w $1
What if $1 is ”andrew;cat /etc/passwd”...
Use perl -wT to trap errors

better a 500 error than a lost system
Even commercial scripts have errors!
Web Site Security, Andrew Cormack
©The JNT Association, 1999
Conclusion
Don't build on sand
Think carefully about "ease of use”
Plan for the worst
Talk with CERT
Never stop!
Web Site Security, Andrew Cormack
©The JNT Association, 1999
Don’t forget the browser
Browsers sometimes run untrusted code
ActiveX - can run any Windows application
 JavaScript - limited but powerful functions
 Java - runs in a sandbox, but this may leak
 Added “viewers”, e.g. word, excel

Beware!
Web Site Security, Andrew Cormack
©The JNT Association, 1999
Applet capabilities
Such programs can do anything the user can
read or write files on local disk or network
 make calls on the network

Browser control is a hard problem

but not unique: mail and office apps are the same
Technical fixes are draconian
User education (like viruses) is the best bet
Web Site Security, Andrew Cormack
©The JNT Association, 1999
Web Site Security, Andrew Cormack
©The JNT Association, 1999