lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6905b1570710141359t7d1ebbd2td66d68e01f33c30c@mail.gmail.com>
Date: Sun, 14 Oct 2007 21:59:19 +0100
From: "pdp (architect)" <pdp.gnucitizen@...glemail.com>
To: "C Q" <kyle.c.quest@...il.com>
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: Remote Desktop Command Fixation Attacks

CQ,

maybe I am making a huge mistake for responding to your message, but
let see. this is what I think about security in depth in a bit more
detail.

let say that we have a wireless network which is guarded by  "security
in depth" network administrators. the first thing they will do is to
secure the actual network by some massive segmentation exercises...
then the connection with enhanced privacy/encryption schemes (WPA2).
They will put more layers on the top of that. For example, the users
need to authenticate with client-side certificates. Now the network
and the connection is secure (sort of), they enforce group policy for
all laptops so that these laptops cannot connect to any other network
(sending probe requests, rogue access points). Right! But now they
also kill the ethernet since a laptop cannot be connected to the
wireless and the wired network since it is also a risk (stepping stone
attacks). Each client has a firewall on the top of that. The firewall
blocks everything that comes in and lets only the browser to go out
through a proxy which requires authentication (NTLM, Basic Auth, etc).
The user of the laptop runs with the least possible privileges and
they cannot install software. They cannot use the CD (Sonny Rootkits),
they cannot use the USB (endpoint security). The laptop has a boot
password as well so in case it is stolen the attackers cannot crack
open the disk.

My question is the following: does this sound sane to you? Do you
really believe that someone will let you do all that, without causing
chaos? Laptops are good because they are mobile. You are allowed to
take them out and work from home. At home you have your own network
which you would like to connect to. Even if you use a different
account on that same laptop to connect to that network, the risk is
still there. A system is as secure as the weakest link.

Companies don't like to hear how you are going to solve all problems
once and for all with some killer security in depth solution because
it is not possible. in order to make things work you have to leave
various doors open. At GNUCITIZEN we have one maxima.. "Be
legitimate!" If the attacker try to be a legitimate user as much as
possible they will stay unnoticed and they will get in.

Now how do we handle security in 21st century the way I see it (btw, I
am not interest in selling any services, in fact, GNUCITIZEN is not
that type of organization)? First of all, careful planning - the
system has to be as secure as flexible and usable even if this means
that you need to have a shared key for all of your wireless networks.
Second, you need a crisis management plan. Natwest got hacked by a MP3
player.. how many of you have heard of it and for how long this story
was on the news? Third, you need to calculate the risk. Example?
Credit card fraud! We know that cards are getting stolen but the
calculated risk is %2 out of the whole, which can be easily
compensated. Etc, etc, etc!

As you can see it is not just technical when it comes to the real
world. In the real world the management gives you instructions and you
have to implement them in the best possible way. Projects stack up.
People leave, new people join in and work on the networks that have
been given. Chaos is the norm! How many of you have seen a network
that is done right? Yeh, there are a few of you, but you are probably
talking about your home network which does not exceed more then 20
machines. How come I have never seen a security in depth in practice.
You guys are more experienced then me, that's for sure... but I've
done quite a few tests in the past 4 years and I know what I've seen.
It is bad, but it is OK, because then we can sit together and walk
through the entire process.

I expect more flames for which I am not planning to respond. If you
think that security in depth works for you... do it! personally, I
will offer something additional to my clients. something, that gives
them that extra safe net, which has nothing to do with security in
depth.

cheers,
pdp

On 10/14/07, C Q <kyle.c.quest@...il.com> wrote:
> I guess there's some logic in spreading FUD about security in depth
> not working. It might be a nice way to scare potential customers
> who don't know much about security into whatever services
> Gnucitizen team sells. However, these kind of tricks
> simply won't work with any seasoned  security professional.
> It'll actually backfire if you are not careful... because you
> won't be taken seriously in the industry. I'm pretty sure
> Pdp's rating in the books of many security professionals
> went down quite a few notches :-) It's a small world...
> and most likely it'll affect your and your company's
> future... because you'll need to do business with
> people like Thor (who gave a great and very logical
> description with proper supporting examples of what
> security in depth is and what's mean to do).
> The chances are that they'll simply choose to work
> with someone else... who betters understands the big
> picture in security :-)
>
> CQ
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter:
> http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>


-- 
pdp (architect) | petko d. petkov
http://www.gnucitizen.org

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ