lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed Sep 28 21:06:13 2005
From: mlsecurity at lab42.ch (Reto Inversini)
Subject: Suggestion for IDS

Hi,

Michael Holstein wrote:
>> Our company plan to install IDS to protect our resources, I'm already
>> read about snort as NIDS, but, that's software based. I'm interesting
>> with hardware based that will work transparently with our Cisco PIX,
>> no need to make changes in our firewall. What's your suggestion.

Don't throw away your money would be my first advice :-) Think about
what you need to protect and against who. Calculate your risks and
define what measures could mitigate these - an IPS is just one of these
and IMHO not the first one I would use.

If you want to stick with Cisco, there is also an IDS module for the PIX:

http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/

But I never played with it, so I can't give you any advice about that.

> 
> 
> My first piece of advice on this is to ignore any company that says they
> deliver a "turnkey" solution. Such a thing doesn't exist.

Full Ack.

> 
> Any IDS will work with any firewall .. unless, of course, you want to
> connect the two together (eg: dynamically ACL the PIX based on what the
> IDS sees). That, IMHO, is an invitation do DOS yourself (think .. I
> spoof a packet that --looks like an attack-- from your upstream router,
> or smtp server, etc). There's dozens of ways to do this, including free
> with snort.

To add to the burden: An IDS/IPS can be tricked in many ways by a
skilled attacker. Therefore, you still need other measures of protection
for your resources. Another question is, how you deal with encrypted
traffic, e.g. traffic to an SSL aware application. Of course you can
break up the SSL traffic and inspect it, but this has serious privacy
issues and poses another risk. If you don't break it up, your
application is still vulnerable to e.g. SQL Injections.

> 
> You can also examine snort's "inline" mode in which you setup bridging
> between two interfaces, and let snort "decide" which packets to forward.
> In order to make such a thing redundant, be prepared to do some fancy
> H/A stuff with a pair of servers.
>
> And don't forget .. an IDS is certianly not "fix and forget" .. it
> requires daily tinkering (new sigs come out daily .. and they're almost
> always noisy and require tuning). In most any decent sized network,
> having a dedicated admin to chase the IDS alerts and keep an eye on
> things is almost a given.

If you really want to "buy" something useful, hire the best admins
available - the ones that take it personally if a system/network doesn't
work as expected. A skilled admin is by far the best protection for your
resources.

> And as for having an IDS "protect" your network .. well .. forget that.
> An IDS is great for statistical research and forensics .. but with
> botnets and whatnot going SSL, you're time/resources are much better
> spent finding your vulnerabilities and patching your hosts.

Yep, and if you want to go even further, harden your hosts, follow the
principle of least privilege and do a decent network separation. And if
you still have some money after that, you can go for an IPS. An IPS can
only work in a very well segmented and documented network. You need to
know your traffic very well, otherwise it would be a shot in your own
leg, if you deploy an IPS as the service interruptions caused by it
would exceed the downtimes by malicious attacks by far.

> 
> My $0.02.

I've thrown in another $0.02 :-)

> 
> Cheers,
> 
> Michael Holstein CISSP GCIA

Best regards
Reto Inversini

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ