Internet & Web Security

Download Report

Transcript Internet & Web Security

Internet & Web Security
Simson L. Garfinkel
[email protected]
Simson L. Garfinkel
 Web Security & Commerce
(With Gene Spafford)
O’Reilly & Associates, 1997
 Practical UNIX and Internet Security
Garfinkel & Spafford
O’Reilly & Associates, 1997
 Vineyard.NET, Inc.
July 1, 1995-
WARNING #1
 I’m not here to sell you anything.
(No easy answers)
WARNING #2
 I hate Power Point.
Internet Security Today 1/3
 What are the main security-related problems
on the Internet Today?
 Hijacked
web servers
 Denial-of-Service Attacks
 Unsolicited Commercial E-Mail
 Operator Error, Natural Disasters
 Microsoft...
Internet Security Today 2/3
 What are not the major security-related
problems?
 Eavesdropped
electronic mail.
• (Misdirected email is a problem.)
• (Email swiped from backup tapes is a problem.)
 Sniffed
credit card numbers.
• (Credit card numbers stolen from databases is a
problem.)
 Hostile
Java & ActiveX applets.
Internet Security Today 3/3
 So why does the press focus on the non-
problems?
 The
real problems are old problems.
(see Practical UNIX Security, 1991)
 The real problems are hard to solve
(I’m not here to sell you anything.)
 Netscape IPO
(Netscape sells a product, not a service.)
Hijacked Web
Servers
Hijacked Web Servers
 FBI
 August 17, 1996 - Attacks on the
Communications Decency Act.
 CIA
 September 18, 1996 - “Central Stupidity
Agency”
 NetGuide Live
 “CMP Sucks.”
Hijacked Web Servers
 Attacker gains access and changes contents
of web server.
 Usually stunts.
 Can be very bad:
 Attacker
can plant hostile applets.
 Attacker can plant data sniffers
 Attacker can use compromised machine to take
over internal system.
Hijacked Web Servers
 Usually outsiders.
 (Could be insiders masquerading as
outsiders.)
 Nearly impossible to trace.
How do they do it?
 Administrative passwords captured by a
password sniffer.
 Utilize known vulnerability:
 sendmail
bug.
 Buffer overflow.
 Use web server CGI script to steal
/etc/passwd file, then crack passwords.
 Mount the web server’s filesystem.
How do you defend against it?
 Patch known bugs.
 Don’t run unnecessary services on the web
server.
 Don’t run sendmail
 Use
smap if possible.
 Large sites may just after to suffer.
How do you defend? (2)
 Never use telnet or ftp to access web server.
 ssh/scp
 stel
 Security Dynamics’ SecureID
 Digital Pathways’s SecureNet Key
 (S/Key, Kerberos)
How do you defend? (3)
 Practice good host security.
 Don’t run SunOS.
 Use tools like SATAN, ISS, COPS, Tiger...
 Monitor system for unauthorized changes.
 Tripwire
 Monitor system for signs of penetration
 Intrusion detection systems
How do you defend? (3)
 Make frequent backups.
 Have a hot spare ready.
 Monitor your system frequently.
Denial-of-Service
Attacks
Denial-of-Service
 Publicity is almost as good as changing
somebody’s web server.
 Attack
on PANIX
 Attack on CyberPromotions
 Costs real money
 Lost Sales
 Damage to reputation
Kinds of Denial-of-Service Attacks
 Direct attack: attack the machine itself.
 Indirect attack: attack something that points
to the machine.
 Reputation attack: attack has nothing to do
with the machine, but references it in some
way.
Direct Denial-Of-Service Attack
 Send a lot of requests
(HTTP, finger, SMTP)
 Easy
to trace.
 Relatively easy to defend against with TCP/IP
blocking at router.
Direct Denial-Of-Service Attack 2
 SYN Flooding
 Subverts the TCP/IP 3-way handshake
• SYN / ACK / ACK
 Hard
to trace
• Each SYN has a different return address.
 Defenses
now well understood
• Ignore SYNs from impossible addresses.
• Large buffer pools (10  1024)
• Random drop, Oldest drop.
Direct Denial-Of-Service Attack 2
 SYN Flooding 2
 Most machines are not protected.
Indirect Denial-Of-Service Attack
 Attack DNS
 http://www.vineyard.net/  204.17.195.200
 DNS spoofing (hard)
 Upstream DNS server (easier)
 InterNIC (easy!)
Indirect Denial-Of-Service Attack
 Attack Routing
 Attack routers (hard)
 Inject bogus routes on BGP4 peering
sessions (easy)
 Accidents
have been widely reported.
 Expect to see an actual BGP4 attack sometime
this year.
Reputation-based Denial-Of-Service Attack
 Spoofed e-mail
To: [email protected]
From: [email protected]
Subject: Call Now!
Hello. My name is Jean Dixon …
 We got 3.9MB of angry responses.
Unsolicited
Commercial E-Mail
Unsolicited Commercial E-Mail
 Pits freedom-of-speech against right of
privacy.
 Consumes vast amounts of management
time.
 Drain on system resources.
Who are the bulk-mailers?
 Advertising for Internet neophytes.
 Advertising for sexually-oriented services.
 Advertising get-rich-quick schemes.
 Advertising bulk-mail service.
How do they send out messages?
 Send directly from their site.
 Send through an innocent third party.
 Coming soon:
 Sent with a computer virus or ActiveX applet
How did they get my e-mail addresses?
 Usenet & Mailing list archives.
 Collected from online address book.
 AOL registry.
 University directory.
 Guessed
 Sequential CompuServe addresses.
 Break into machine & steal usernames.
Operator Error &
Natural Disasters
Operator Error & Natural Disasters
 Still a major source of data loss.
 Hard to get management to take seriously.
 Not sexy.
 Preparation is expensive.
 If nothing happens, money seems misspent.
Operator Error
 Accidentally delete a file.
 Accidentally install a bad service.
 Accidentally break a CGI script.
 Psychotic break.
Natural Disaster
 Fire
 Flood
 Earthquake
Solutions
 Frequent Backups
 Backup to high-speed tape.
 Real-time backup to spare machines.
 Make sure some backups are off-site.
 Recovery plans.
 Recovery center.
 Test your backups & plans!
Microsoft
Microsoft
 Danger of homogeneous environment.
 No demonstrated commitment to computer
security.
 Windows
95 is not secure.
 Word Macro Viruses.
 ActiveX
 SMB
 Windows NT …?