ch24.htm
来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 837 行 · 第 1/4 页
HTM
837 行
that one or two holes do exist but that it is extremely unlikely that they can beexploited, carefully consider his explanation. Interrogate him as to what "extremelyunlikely" means and why he thinks the contingency is just so.</P><P>If his explanation is that the level of technical expertise required is highlyadvanced, this is still not a valid reason to let it slide, particularly if thereare currently no known solutions to the problem. If there are options, take them.Never assume (or allow a consultant to assume) that because a hole is obscure ordifficult to exploit that it is okay to allow that hole to exist.</P><P>Only several months ago, it was theorized that a Java applet could not accessa client's hard disk drive. That has since been proven to be false. The argumentinitially supporting the "impossibility" of the task was this: The programmingskill required was not typically a level attained by most crackers. That was patentlyincorrect. Crackers spend many hours trying to determine new holes (or new ways ofimplementing old ones). With the introduction of new technologies, such as Java andActiveX, there is no telling how far a cracker could take a certain technique.</P><P>Security through obscurity was once a sound philosophy. Many years ago, when theaverage computer user had little knowledge of his own operating system (let aloneknowledge of multiple operating systems), the security-through-obscurity approachtended to work out. Things were more or less managed on a need-to-know basis. Theproblem with security through obscurity, however, becomes more obvious on closerexamination. It breaks down to matters of trust.</P><P>In the old days, when security through obscurity was practiced religiously, itrequired that certain users know information about the system; for example, wherepasswords were located and what special characters had to be typed at the prompt.It was common, actually, for a machine, upon connection, to issue a rather crypticprompt. (Perhaps this can be likened to the prompt one might have received as a Delphiuser just a few years ago.) This prompt was expecting a series of commands, includingthe carrier service, the terminal emulation, and so on. Until these variables wereentered correctly (with some valid response, of which there were many), nothing wouldhappen. For example, if the wrong string was entered, a simple <TT>?</TT> would appear.A hacker coming across such a system would naturally be intrigued, but he could spendmany hours (if not weeks) typing in commands that would fail. (Although the command<TT>HELP</TT> seems to be a pretty universal way to get information on almost anysystem.)</P><P>Things changed when more experienced users began distributing information aboutsystems. As more and more information leaked out, more sophisticated methods of breachingsecurity were developed. For example, it was shortly after the first release of internalprocedures in CBI (the Equifax credit-reporting system) that commercial-grade softwarepackages were developed to facilitate a breaking and entering into that famous computerizedconsumer credit bureau. These efforts finally culminated with the introduction ofa tool called CBIHACK that automated most of the effort behind cracking Equifax.</P><P>Today, it is common for users to know several operating systems in at least afleeting way. More importantly, however, information about systems security has beenso widely disseminated that at this stage, even those starting their career in crackingknow where password files are located, how authentication is accomplished, and soforth. As such, security through obscurity is now no longer available as a validstance, nor should it be, especially for one insidious element of it--the fact thatfor it to work at all, humans must be trusted with information. For example, evenwhen this philosophy had some value, one or more individuals with an instant need-to-knowmight later become liabilities. Disgruntled employees are historically well knownto be in this category. As insiders, they would typically know things about a system(procedures, logins, passwords, and so forth). That knowledge made the security inherentlyflawed from the start.</P><P>It is for these reasons that many authentication procedures are now automated.In automated authentication procedures, the human being plays no part. Unfortunately,however, as you will learn in Chapter 28, "Spoofing Attacks," even theseautomated procedures are now suspect.</P><P>In any event, view with suspicion any proposal that a security hole (small thoughit may be) should be left alone.<H2><FONT COLOR="#000077"><B>Choosing a Consultant</B></FONT></H2><P>There are many considerations in choosing a security consultant. First, it isnot necessary that you contract one of the Big Ten firms (for example, Coopers andLybrand) to secure your network. If you are a small business, this is likely costprohibitive. Also, it is overkill. These firms typically take big contracts for networksthat harbor hundreds (or in WANs, thousands) of machines.</P><P>If you are a small firm and cannot afford to invest a lot of money in security,you may have to choose more carefully. However, your consultant should meet at leastall the following requirements:<UL> <LI>He should be local.<BR> <BR> <LI>He should have at least four years experience as a system administrator (or apprentice administrator) on your platform. (If some of that experience was in a university, that is just fine.)<BR> <BR> <LI>He should have a solid reputation.<BR> <BR> <LI>Generally, he should not have a criminal record.<BR> <BR> <LI>He should have verifiable references.</UL><H3><FONT COLOR="#000077"><B>Why Local?</B></FONT></H3><P>Your consultant should be local because you will need to have him available ona regular basis. Also, as I've noted, remote administration of a network is justnot a wise thing.<H3><FONT COLOR="#000077"><B>Experience</B></FONT></H3><P>You notice that I say that university experience will suffice, so long as it doesnot comprise the totality of the consultant's security education. Why? Because theacademic community is probably the closest to the cutting edge of security. If youthumb through this book and examine the references, you will notice that the majorityof serious security papers were authored by those in the academic community. In fact,even many of the so-called commercial white papers cited within this book were alsoauthored by students--students who graduated and started security firms.<H3><FONT COLOR="#000077"><B>Reputation</B></FONT></H3><P>I suggest that your consultant should have a solid reputation, but I want to qualifythat. There are two points to be made here, one of which I made at the beginningof this book. Just because former clients of a consultant have not experienced securitybreaches does not necessarily mean that the consultant's reputation is solid. AsI have said, many so-called security spe- cialists conduct their "evaluation"knowing that they have left the system vulnerable. In this scenario, the individualknows a little something about security, but just enough to leave his clients ina vulnerable situation with a false sense of security. Technically, a totally unprotectednetwork could survive unharmed for months on the Internet so long as crackers don'tstumble across it.</P><P>It would be good if you could verify that your potential consultant had been involvedin monitoring and perhaps plugging an actual breach. Good examples are situationswhere he may have been involved in an investigation of a criminal trespass or othernetwork violation.</P><P>Equally, past experience working for an ISP is always a plus.<H3><FONT COLOR="#000077"><B>Criminal Record</B></FONT></H3><P>Background checks are intrusive. I realize that. However, consider what you areundertaking. Most smaller businesses today would be paralyzed if their data weresuddenly corrupted or unusable. If yours is such a business, and your potential consultantis not an established firm, I would seriously consider a background check. However,the existence of a criminal record (especially if that record is for computer-relatedcrimes) does not necessarily preclude the individual as a candidate. Much dependsupon the time that has passed since the conviction, the circumstances of the case,and so forth. For example, I would hire Randall Schwartz without thinking twice.His technical skills are well known.<H2><FONT COLOR="#000077"><B>Your Network</B></FONT></H2><P>There are several ways you can view security, but I prefer the simple approachand that approach is this: Your network is your home. Consider that for a moment.Try to visualize your network as an extension of yourself. I realize that this soundsa bit esoteric, but it really isn't. You can more easily grasp what I am drivingat by considering this: What type of data is on your network? I will wager that Ican tell you what's there. Yes; I will bet that only the most unimportant thingsare on your network--things like your financial information, your identity, yourthoughts, your feelings, your personal reflections, your business...your life.</P><P>Would you let the world walk through the front door of your home? Would you letcomplete strangers rifle through your drawers, looking for personal documents orfinancial statements? Of course not. Then why would you let someone do it over anetwork? The answer is: You wouldn't. The problem is, computers seem relatively benign,so benign that we may forget how powerful their technology really is.</P><P>Software vendors want us to rush to the Internet. The more we use the network,the more software they can sell. In this marketing frenzy, they attempt to minimizesome fairly serious problems out there. The truth is, the Internet is not secureand will continue to exist in this state of insecurity for some time to come. Thisis especially so because many of the networking products used in the future willbe based on the Microsoft platform.</P><P>Admittedly, Microsoft makes some of the finest software in the world. Security,however, has not been its particular area of expertise. Its Internet operating systemis going to be NT--that's a fact. That is also where the majority of Microsoft'ssecurity efforts are being concentrated, and it has made some significant advances.However, in the more than 20 years that UNIX has been in existence, it has neverbeen completely secure. This is an important point: UNIX is a system that was designed--almostfrom its beginning--as an operating system for use on the Internet. It was what theDefense Department chose as the platform to develop ARPAnet. The people who designedit are among the most talented (and technically minded) software engineers on theplanet. And even after all this, UNIX is not secure. We should expect, then, thatWindows NT will take some time to get the bugs out.</P><P>So, in closing on this subject, I relate this: Your network is your home. It isworthy of protection, and that protection costs money. Which brings us to the nextissue...<H2><FONT COLOR="#000077"><B>Cost</B></FONT></H2><P>How much should security cost? It depends on what type of network you have. Ifyour network is large and heterogeneous, those conditions are going to increase thecost. It is important that you understand why, because when you go to the table tonegotiate a security package, you need to know what you are talking about.<H3><FONT COLOR="#000077"><B>The Homogenous Network</B></FONT></H3><P>If you currently have a homogenous network, you should see a break in cost. Hereis why: Each operating system implements TCP/IP just slightly differently than therest, at least at the application level. Each operating system also has one or moreadditional or proprietary protocols that aren't available on other systems (or thatcan be available, but only with special software). For example, Windows 95 uses theSMB protocol, which is not widely available in default installations of every operatingsystem. Certainly, there are clients available; one of them is SAMBA, which runson Linux and perhaps on other operating systems. Because each operating system isdifferent but all machines running the same operating system are basically the same,a security consult of a homogenous network is less intensive than one that harborsmany different platforms. It should therefore cost less.</P><P>While this is true, it does not mean that you can get a homogenous network securedfor next to nothing. In most instances, it is not possible for security attributesto simply be cloned or replicated on all workstations within the network. Varioussecurity issues may develop. Some of those involve topology, as I have explainedin other chapters and will again discuss here.</P><P>We know that a network segment is a closed area; almost like a network withinitself. We also know that spoofing beyond that network segment is almost impossible.(Almost.) The more network segments your network is divided up into, the more secureyour network will be. (Ideally, each machine would be hardwired to a router. Thiswould entirely eliminate the possibility of IP spoofing, but it is obviously costprohibitive.) Where you make those divisions will depend upon a close assessmentof risk, which will be determined between your technical staff and the consultant.For each segment, you will incur further cost, not only for the consultant's servicesbut for the hardware (and possibly for software).<H3><FONT COLOR="#000077"><B>The Heterogeneous Network</B></FONT></H3><P>If you have a network comprised of many different platforms, the problem of securingit becomes more complex. Here's an example, again using SAMBA as a focal point. Incertain situations, passwords are revealed when using SAMBA in traffic between UNIXand Windows 95 boxes. The more protocols you have running and the more third-partysoftware from different vendors (on different platforms) you have, the more complicatedyour security assessment will be.</P><P>Certainly, even from a practical standpoint, there are immediate problems. First,due largely to the division between the PC and workstation worlds, the security consultantsyou contract may be unfamiliar with one of more of the platforms within your network,and they may need to call outside help for them. Also, and this is no small consideration,your consultants may ultimately be forced to provide at least a small portion ofproprietary code: their own. If this subject crops up, it should be discussed thoroughly.There is a good chance that you can save at least some cost by having these consultantstie together existing security packages, using their own code as the glue. This isnot nearly as precarious as it sounds. It may involve nothing more than redirectingthe output of log files or other, ongoing processes to plain text (or some otherform suitable for scanning by a program on another platform).</P><P>The problem with hiring toolsmiths of this sort is that you may find your securitydependent upon them. If your local system administrator is not familiar with the
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?