ch24.htm
来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 837 行 · 第 1/4 页
HTM
837 行
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN"><HTML><HEAD> <TITLE>Maximum Security -- Ch 24 -- T</TITLE></HEAD><BODY TEXT="#000000" BGCOLOR="#FFFFFF"><CENTER><H1><IMG SRC="../button/samsnet.gif" WIDTH="171" HEIGHT="66" ALIGN="BOTTOM" BORDER="0"><BR><FONT COLOR="#000077">Maximum Security: </FONT></H1></CENTER><CENTER><H2><FONT COLOR="#000077">A Hacker's Guide to Protecting Your Internet Site and Network</FONT></H2></CENTER><CENTER><P><A HREF="../ch23/ch23.htm"><IMG SRC="../button/previous.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Previous chapter" BORDER="0"></A><A HREF="../ch25/ch25.htm"><IMGSRC="../button/next.gif" WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Next chapter"BORDER="0"></A><A HREF="../index.htm"><IMG SRC="../button/contents.gif" WIDTH="128"HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <HR></CENTER><CENTER><H1><FONT COLOR="#000077">24</FONT></H1></CENTER><CENTER><H1><FONT COLOR="#000077">Security Concepts</FONT></H1></CENTER><P>On a quiet fall evening not so long ago, the Internet was forever changed. Thatchange took only minutes. If you have been reading this book from cover to cover,you will remember the date in question. However, for readers absorbing this bookselectively, I will reiterate. That date was November 2, 1988. Shortly before dusk,a worm was unleashed on the network. Within hours, this worm incapacitated many machines(reportedly over 1,000 of them) and interrupted or otherwise degraded the performanceof thousands more. (Many of these machines or networks were key research centersengaged in defense-related study.) At the exact moment that the worm was released,the history and future of the Internet changed forever. No one knew it at the time,because it would take a full year in the aftermath to assess what an enormous impactthe incident had. But be assured of this: The change occurred in the same instantthat Morris released his code to the Network.</P><P>Since that time, security has gained almost a cult status. Individuals I knowwho have never had a clue about the subject are suddenly diving for security information.You hear it in restaurants all the time. As you are eating your lunch, the buzz floatsoverhead: firewall, router, packet filtering, e-mail bombing, hackers, crackers...thelist is long indeed. (This book would never have been written if the climate weren'tjust so.) By now, most people know that the Internet is insecure, but few know exactlywhy. Not surprisingly, those very same people are concerned, because most of themintend to implement some form of commerce on the Internet. It is within this climatethat Internet Voodoo has arisen, conjured by marketeers from the dark chaos thatlooms over the Net and its commercial future.</P><P>Marketing folks capitalize on ignorance--that's a fact. I know resellers todaywho sell 8MB SIMMs for $180 and get away with it. However, while technical consultantsdo often overcharge their customers, there is probably no area where this activityis more prominent than in the security field. This should be no surprise; securityis an obscure subject. Customers are not in a position to argue about prices, techniques,and so forth because they know nothing about the subject. This is the current climate,which offers unscrupulous individuals a chance to rake in the dough. (And they are,at an alarming rate.)</P><P>The purpose of this chapter, then, is to offer advice for individuals and smallbusinesses. I cannot guarantee that this is the best advice, but I can guaranteethat it is from experience. Naturally, everyone's experience is different, but Ibelieve that I am reasonably qualified to offer some insight into the subject. Thatsaid, let's begin.<H2><FONT COLOR="#000077"><B>How Security Concepts Can Influence Your Choices</B></FONT></H2><P>First, I want to quickly examine security concepts and how they will influenceyour choices of a security consultant. To begin with, know this: "There is nothingnew under the sun." This quote is a brilliant statement made by William Shakespeare.It is brilliant because, in literature that preceded his own, for thousands of years,the statement had already been made. Therefore, he used a redundancy to articulateredundancy. How does this relate to Internet security? Read on.</P><P>The truth is, TCP/IP has been around for a long, long time. For example, as Ireported in Chapter 18, "Novell," NetWare had fully functional TCP/IP builtinto its operating system back in 1991. UNIX has had it for far longer. So thereis no real problem here. The knowledge is available out there in the void.</P><P>The greater majority of security breaches stem from human error. (That is becausecrackers with limited knowledge can easily cut deep into systems that are erroneouslyconfigured. On more carefully configured networks, 90 percent of these self-proclaimed"super crackers" couldn't get the time of day from their target.)</P><P>These human errors generally occur from lack of experience. The techniques toprotect an Internet server have not significantly changed over the past few years.If a system administrator or security administrator fails to catch this or that hole,he needs to bone up on his advisories.<BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>I will readily admit that some techniques have been improved, largely by the academic community and not so much by commercial vendors. Commercial vendors are usually slightly behind the academic communities, perhaps by a few months or so. Examples of this might include the development of automated tools to screen your system for known security holes. Many of these are written by students or by freelance software developers. These tools certainly streamline the process of checking for holes, but the holes are commonly known to any security administrator worth his salt. <HR></BLOCKQUOTE><P>So, before you haul off and spend thousands (or even tens of thousands) of dollarson a security consult, there are some things that you should consider. Here are acouple test questions:<UL> <LI>Suppose you establish a sacrificial machine, a Macintosh running WebStar and no other TCP/IP servers. The machine is isolated from your network, it has no valuable data on it, and basically, it has no inroad to your internal network. Your network does not run TCP/IP, and none of the publicly accessible nodes perform IP forwarding in any case. Would you pay a security consultant to scan that Web server box? (Instead of either having your system administrator scan it or not scan it at all.) If so, why?<BR> <BR> <LI>You want to co-locate a box at an ISP. You normally work with Microsoft Windows NT (and so does your internal system administrator). Nevertheless, the ISP is trying to convince you to use a SPARC 20 and is willing to sell you one (or lease you one) for fair market value. Do you do it? If so, why?</UL><P>The correct answer to both of these questions is "probably not." Hereare the reasons why:<UL> <LI>Scenario 1: What would the consultant be scanning for? Because the machine is running no other services but HTTP over WebStar, most modern scanners would render a laundry list of "connection refused" and "server not reachable" messages. In other words, the scan would be a complete waste of time and money because no services exist on the machine. Scanners like those discussed in Chapter 9, "Scanners," are used only to attack full-fledged TCP/IP implementations, where services (including NFS and other protocols) are either available and misconfigured or available and not configured at all. The question is, would you or your internal system administrator know this? If not, you might get taken.<BR> <BR> <LI>Scenario 2: Why would you agree to place your Web server in the hands of a company on which you will remain totally dependent? If neither you nor your staff knows UNIX, insist on an NT box. If the provider balks, find another. Commonly, the ISP staff might forward the explanation that they feel UNIX is more secure and they therefore cannot tolerate an NT box on their Ethernet. If you agree to their terms, you will either be dependent upon them for all maintenance and programming or you will have to pay good money to train your system administrator in UNIX.</UL><P>There are literally hundreds of such scenarios. In each, there is an opportunityfor you to get hustled. A security consult is not to be taken lightly. Neither isthe management of your co-located box. Remember that your Web server (wherever itmight be located) is something that can be viewed (and attacked) by the entire world.</P><P>Before you can make an educated choice of a security consultant, you need to befamiliar with basic security principles. That's what this chapter is really all about.<H2><FONT COLOR="#000077"><B>About Remote Security Consults</B></FONT></H2><P>There is a new phenomenon emerging on the Internet. Security consults are nowbeing done (although perhaps not in great number) from remote locations. This iswhere someone in the same city (or another city) tests, defines, and ultimately implementsyour security from the outside. In other words, it is done from a location otherthan your offices or home. I have a couple points to make regarding this type ofprocedure:<UL> <LI>Scan or penetration testing is commonly done from a remote location. The purpose of penetration testing (at the end of the day) is to simulate a real-time attack from the void. There is no replacement for doing this from a remote location. In this limited area of concern, at least, analysis from a remote location is warranted and reasonable.<BR> <BR> <LI>All other forms of security testing and implementation should be done onsite. Implementing security from a remote location is not a secure method and may result in security breaches. As much as the idea may seem attractive to you, I would strongly advise against having any firm or individual handle your security from a remote location. If your network is large and is meant to be as secure as possible, even the existence of a privileged user who can gain remote access to do maintenance work is a security risk. (For example, why would one cut a hole through a firewall just for the convenience of off-site work?)</UL><BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>NOTE:</B></FONT><B> </B>As an example, an individual on the East Coast recently posted an article in Usenet requesting bids on a security consult. I contacted that party to discuss the matter, mainly out of curiosity. Within three hours, the party forwarded to me his topology, identifying which machines had firewalls running, what machines were running IP forwarding, and so forth.</P> <P>Granted, this individual was simply looking for bids, but he forwarded this type of sensitive information to me, an individual he had neither seen nor heard of before. Moreover, if he had done more research, he would have determined that my real name was unobtainable from either my e-mail address, my Web page, or even my provider. Were it not for the fact that I was on great terms with my then-current provider, he [the provider] would not even know my name. So, the person on the East Coast forwarded extremely sensitive information to an unknown source--information that could have resulted in the compromise of his network. <HR></BLOCKQUOTE><P>So, point one is this: Other than penetration testing, all active, hands-on securityprocedures should be undertaken at your place of business or wherever the networkis located. Do not forward information to a potential consultant over the Internet,do not hire someone sight unseen, and finally, do not contract a consultant whoseexpertise cannot be in some way verified.<H2><FONT COLOR="#000077"><B>Security Through Obscurity</B></FONT></H2><P>If a security consultant explains to you (or your system administration staff)
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?