ch24.htm

来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 837 行 · 第 1/4 页

HTM
837
字号
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"><HTML><HEAD>		<TITLE>Maximum Security -- Ch 24 -- T</TITLE></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF"><CENTER><H1><IMG SRC="../button/samsnet.gif" WIDTH="171" HEIGHT="66" ALIGN="BOTTOM" BORDER="0"><BR><FONT COLOR="#000077">Maximum Security: </FONT></H1></CENTER><CENTER><H2><FONT COLOR="#000077">A Hacker's Guide to Protecting Your Internet Site and Network</FONT></H2></CENTER><CENTER><P><A HREF="../ch23/ch23.htm"><IMG SRC="../button/previous.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Previous chapter" BORDER="0"></A><A HREF="../ch25/ch25.htm"><IMGSRC="../button/next.gif" WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Next chapter"BORDER="0"></A><A HREF="../index.htm"><IMG SRC="../button/contents.gif" WIDTH="128"HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <HR></CENTER><CENTER><H1><FONT COLOR="#000077">24</FONT></H1></CENTER><CENTER><H1><FONT COLOR="#000077">Security Concepts</FONT></H1></CENTER><P>On a quiet fall evening not so long ago, the Internet was forever changed. Thatchange took only minutes. If you have been reading this book from cover to cover,you will remember the date in question. However, for readers absorbing this bookselectively, I will reiterate. That date was November 2, 1988. Shortly before dusk,a worm was unleashed on the network. Within hours, this worm incapacitated many machines(reportedly over 1,000 of them) and interrupted or otherwise degraded the performanceof thousands more. (Many of these machines or networks were key research centersengaged in defense-related study.) At the exact moment that the worm was released,the history and future of the Internet changed forever. No one knew it at the time,because it would take a full year in the aftermath to assess what an enormous impactthe incident had. But be assured of this: The change occurred in the same instantthat Morris released his code to the Network.</P><P>Since that time, security has gained almost a cult status. Individuals I knowwho have never had a clue about the subject are suddenly diving for security information.You hear it in restaurants all the time. As you are eating your lunch, the buzz floatsoverhead: firewall, router, packet filtering, e-mail bombing, hackers, crackers...thelist is long indeed. (This book would never have been written if the climate weren'tjust so.) By now, most people know that the Internet is insecure, but few know exactlywhy. Not surprisingly, those very same people are concerned, because most of themintend to implement some form of commerce on the Internet. It is within this climatethat Internet Voodoo has arisen, conjured by marketeers from the dark chaos thatlooms over the Net and its commercial future.</P><P>Marketing folks capitalize on ignorance--that's a fact. I know resellers todaywho sell 8MB SIMMs for $180 and get away with it. However, while technical consultantsdo often overcharge their customers, there is probably no area where this activityis more prominent than in the security field. This should be no surprise; securityis an obscure subject. Customers are not in a position to argue about prices, techniques,and so forth because they know nothing about the subject. This is the current climate,which offers unscrupulous individuals a chance to rake in the dough. (And they are,at an alarming rate.)</P><P>The purpose of this chapter, then, is to offer advice for individuals and smallbusinesses. I cannot guarantee that this is the best advice, but I can guaranteethat it is from experience. Naturally, everyone's experience is different, but Ibelieve that I am reasonably qualified to offer some insight into the subject. Thatsaid, let's begin.<H2><FONT COLOR="#000077"><B>How Security Concepts Can Influence Your Choices</B></FONT></H2><P>First, I want to quickly examine security concepts and how they will influenceyour choices of a security consultant. To begin with, know this: &quot;There is nothingnew under the sun.&quot; This quote is a brilliant statement made by William Shakespeare.It is brilliant because, in literature that preceded his own, for thousands of years,the statement had already been made. Therefore, he used a redundancy to articulateredundancy. How does this relate to Internet security? Read on.</P><P>The truth is, TCP/IP has been around for a long, long time. For example, as Ireported in Chapter 18, &quot;Novell,&quot; NetWare had fully functional TCP/IP builtinto its operating system back in 1991. UNIX has had it for far longer. So thereis no real problem here. The knowledge is available out there in the void.</P><P>The greater majority of security breaches stem from human error. (That is becausecrackers with limited knowledge can easily cut deep into systems that are erroneouslyconfigured. On more carefully configured networks, 90 percent of these self-proclaimed&quot;super crackers&quot; couldn't get the time of day from their target.)</P><P>These human errors generally occur from lack of experience. The techniques toprotect an Internet server have not significantly changed over the past few years.If a system administrator or security administrator fails to catch this or that hole,he needs to bone up on his advisories.<BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>I will readily admit that some techniques	have been improved, largely by the academic community and not so much by commercial	vendors. Commercial vendors are usually slightly behind the academic communities,	perhaps by a few months or so. Examples of this might include the development of	automated tools to screen your system for known security holes. Many of these are	written by students or by freelance software developers. These tools certainly streamline	the process of checking for holes, but the holes are commonly known to any security	administrator worth his salt. <HR></BLOCKQUOTE><P>So, before you haul off and spend thousands (or even tens of thousands) of dollarson a security consult, there are some things that you should consider. Here are acouple test questions:<UL>	<LI>Suppose you establish a sacrificial machine, a Macintosh running WebStar and	no other TCP/IP servers. The machine is isolated from your network, it has no valuable	data on it, and basically, it has no inroad to your internal network. Your network	does not run TCP/IP, and none of the publicly accessible nodes perform IP forwarding	in any case. Would you pay a security consultant to scan that Web server box? (Instead	of either having your system administrator scan it or not scan it at all.) If so,	why?<BR>	<BR>		<LI>You want to co-locate a box at an ISP. You normally work with Microsoft Windows	NT (and so does your internal system administrator). Nevertheless, the ISP is trying	to convince you to use a SPARC 20 and is willing to sell you one (or lease you one)	for fair market value. Do you do it? If so, why?</UL><P>The correct answer to both of these questions is &quot;probably not.&quot; Hereare the reasons why:<UL>	<LI>Scenario 1: What would the consultant be scanning for? Because the machine is	running no other services but HTTP over WebStar, most modern scanners would render	a laundry list of &quot;connection refused&quot; and &quot;server not reachable&quot;	messages. In other words, the scan would be a complete waste of time and money because	no services exist on the machine. Scanners like those discussed in Chapter 9, &quot;Scanners,&quot;	are used only to attack full-fledged TCP/IP implementations, where services (including	NFS and other protocols) are either available and misconfigured or available and	not configured at all. The question is, would you or your internal system administrator	know this? If not, you might get taken.<BR>	<BR>		<LI>Scenario 2: Why would you agree to place your Web server in the hands of a company	on which you will remain totally dependent? If neither you nor your staff knows UNIX,	insist on an NT box. If the provider balks, find another. Commonly, the ISP staff	might forward the explanation that they feel UNIX is more secure and they therefore	cannot tolerate an NT box on their Ethernet. If you agree to their terms, you will	either be dependent upon them for all maintenance and programming or you will have	to pay good money to train your system administrator in UNIX.</UL><P>There are literally hundreds of such scenarios. In each, there is an opportunityfor you to get hustled. A security consult is not to be taken lightly. Neither isthe management of your co-located box. Remember that your Web server (wherever itmight be located) is something that can be viewed (and attacked) by the entire world.</P><P>Before you can make an educated choice of a security consultant, you need to befamiliar with basic security principles. That's what this chapter is really all about.<H2><FONT COLOR="#000077"><B>About Remote Security Consults</B></FONT></H2><P>There is a new phenomenon emerging on the Internet. Security consults are nowbeing done (although perhaps not in great number) from remote locations. This iswhere someone in the same city (or another city) tests, defines, and ultimately implementsyour security from the outside. In other words, it is done from a location otherthan your offices or home. I have a couple points to make regarding this type ofprocedure:<UL>	<LI>Scan or penetration testing is commonly done from a remote location. The purpose	of penetration testing (at the end of the day) is to simulate a real-time attack	from the void. There is no replacement for doing this from a remote location. In	this limited area of concern, at least, analysis from a remote location is warranted	and reasonable.<BR>	<BR>		<LI>All other forms of security testing and implementation should be done onsite.	Implementing security from a remote location is not a secure method and may result	in security breaches. As much as the idea may seem attractive to you, I would strongly	advise against having any firm or individual handle your security from a remote location.	If your network is large and is meant to be as secure as possible, even the existence	of a privileged user who can gain remote access to do maintenance work is a security	risk. (For example, why would one cut a hole through a firewall just for the convenience	of off-site work?)</UL><BLOCKQUOTE>	<P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>As an example, an individual on	the East Coast recently posted an article in Usenet requesting bids on a security	consult. I contacted that party to discuss the matter, mainly out of curiosity. Within	three hours, the party forwarded to me his topology, identifying which machines had	firewalls running, what machines were running IP forwarding, and so forth.</P>	<P>Granted, this individual was simply looking for bids, but he forwarded this type	of sensitive information to me, an individual he had neither seen nor heard of before.	Moreover, if he had done more research, he would have determined that my real name	was unobtainable from either my e-mail address, my Web page, or even my provider.	Were it not for the fact that I was on great terms with my then-current provider,	he [the provider] would not even know my name. So, the person on the East Coast forwarded	extremely sensitive information to an unknown source--information that could have	resulted in the compromise of his network. <HR></BLOCKQUOTE><P>So, point one is this: Other than penetration testing, all active, hands-on securityprocedures should be undertaken at your place of business or wherever the networkis located. Do not forward information to a potential consultant over the Internet,do not hire someone sight unseen, and finally, do not contract a consultant whoseexpertise cannot be in some way verified.<H2><FONT COLOR="#000077"><B>Security Through Obscurity</B></FONT></H2><P>If a security consultant explains to you (or your system administration staff)

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?