ch11.htm
来自「Maximum Security (First Edition) 网络安全 英文」· HTM 代码 · 共 1,114 行 · 第 1/4 页
HTM
1,114 行
<HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>The TAMU distribution is available at <A HREF="ftp://coast.cs.purdue.edu/pub/tools/unix/TAMU/"><TT>ftp://coast.cs.purdue.edu/pub/tools/unix/TAMU/</TT></A>. <HR></BLOCKQUOTE><H4><FONT COLOR="#000077"><B>ATP (The Anti-Tampering Program)</B></FONT></H4><P>ATP is a bit more obscure than TripWire and the TAMU distribution, but I am notcertain why. Perhaps it is because it is not widely available. In fact, searchesfor it may lead you overseas (one good source for it is in Italy). At any rate, ATPworks somewhat like TripWire. As reported by David Vincenzetti, DSI (University ofMilan, Italy) in "ATP--Anti-Tampering Program":<DL> <DD>ATP 'takes a snapshot' of the system, assuming that you are in a trusted configuration, and performs a number of checks to monitor changes that might have been made to files.</DL><BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>"ATP--Anti-Tampering Program"<I> </I>can be found at <A HREF="http://www.cryptonet.it/docs/atp.html"><TT>http://www.cryptonet.it/docs/atp.html</TT></A>. <HR></BLOCKQUOTE><P>ATP then establishes a database of values for each file. One of these values (thesignature) consists of two checksums. The first is a CRC32 checksum, the second anMD5 checksum. You might be wondering why this is so, especially when you know thatCRC checksums are not entirely secure or reliable, as explained previously. The explanationis this: Because of its speed, the CRC32 checksum is used in checks performed ona regular (perhaps daily) basis. MD5, which is more comprehensive (and thereforemore resource and time intensive), is intended for scheduled, periodic checks (perhapsonce a week).</P><P>The database is reportedly encrypted using DES. Thus, ATP provides a flexible(but quite secure) method of monitoring your network and identifying possible trojans.<BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>ATP docs and distribution can be found at <A HREF="ftp://security.dsi.unimi.it/pub/security"><TT>ftp://security.dsi.unimi.it/pub/security</TT></A>. <HR></BLOCKQUOTE><H3><FONT COLOR="#000077"><B>Hobgoblin</B></FONT></H3><P>The Hobgoblin tool is an interesting implementation of file- and system-integritychecking. It utilizes Ondishko Consistency checking. The authors of the definitivepaper on Hobgoblin (Farmer and Spafford at Purdue) claim that the program is fasterand more configurable than COPS and generally collects information in greater detail.What makes Hobgoblin most interesting, though, is that it is both a language andan interpreter. The programmers provided for their own unique descriptors and structuralconventions.</P><P>The package seems easy to use, but there are some pitfalls. Although globbingconventions (from both csh and sh/bash) are permissible, the Hobgoblin interpreterreserves familiar and often-used metacharacters that have special meaning. Therefore,if you intend to deploy this powerful tool in a practical manner, you should setaside a few hours to familiarize yourself with these conventions.</P><P>In all, Hobgoblin is an extremely powerful tool for monitoring file systems. However,I should explain that the program was written specifically for systems located atthe University of Rochester and, although it has been successfully compiled on avariety of platforms, your mileage may vary. This is especially so if you are notusing a Sun3, Sun4, or VAX with Ultrix. In this instance, some hacking may be involved.Moreover, it has been observed that Hobgoblin is lacking some elements present inother file-integrity checkers, although I believe that third-party file-integritycheckers can be integrated with (and their calls and arguments nested within) Hobgoblin.<BLOCKQUOTE> <P><HR><FONT COLOR="#000077"><B>Cross Reference:</B></FONT><B> </B>Hobgoblin and its source are located at <A HREF="ftp://freebsd.cdrom.com/.20/security/coast/tools/unix/hobgoblin/hobgoblin.shar.Z.uu.Z"><TT>ftp://freebsd.cdrom.com/.20/security/coast/tools/unix/hobgoblin/hobgoblin.shar.Z.uu.Z</TT></A>. <HR></BLOCKQUOTE><H3><FONT COLOR="#000077"><B>On Other Platforms</B></FONT></H3><P>You're probably wondering whether there are any such utilities for the Windowsplatform. It happens that there are, though they are perhaps not as powerful or reliable.Most of these tools use checksum integrity checkers and are, therefore, not as comprehensiveas tools that employ MD5. Flatly stated, the majority for the Microsoft platformare intended for use as virus scanners.</P><P>For this reason, I have not listed these utilities here (a listing of them doesappear in Chapter 14, "Destructive Devices"). However, I do want to addressa few points: It is generally assumed that trojans are a security problem primarilyfor UNIX and that when that problem is a Windows problem, it usually involves a virus.There is some truth to this, and there are reasons for it.</P><P>Until recently, security on IBM compatibles running Microsoft products was slim.There was no need for complex trojans that could steal (or otherwise cull) information.Thus, the majority of trojans were viruses encased in otherwise useful (or purportedlyuseful) programs. That situation has changed.</P><P>It should be understood that a trojan can be just as easily written for a Microsoftplatforms as for any other. Development tools for these platforms are powerful, user-friendlyapplications (even VC++ far surpasses C compiling utilities made by other firms).And, now that the Windows environment is being used as Internet server material,you can expect the emergence of trojans.<H2><FONT COLOR="#000077"><B>Summary</B></FONT></H2><P>People generally equate trojan horses with virus attacks and, while this is accurateto some degree, it is not the whole picture. True, trojans on the PC-based operatingsystems have traditionally been virus related, but on the UNIX platform, a totallydifferent story emerges. On the UNIX platform, crackers have consistently craftedtrojans that compromise security without damaging data or attaching unauthorizedcode to this or that executable.</P><P>In either case, however, one thing is clear: Trojans are a significant securityrisk to any server as well as to machines networked to that server. Because PC-basedservers are becoming more common on the Internet, utilities (above and beyond thosevirus checkers already available) that can identify trojaned files must be developed.<H3><FONT COLOR="#000077"><B>Resources</B></FONT></H3><P>Following you will find an extensive list of resources concerning object reconciliation.Some of these documents are related to the process of object reconciliation (includingpractical examples) and some are related to the process by which this reconciliationis performed. All of them were handpicked for relevancy and content. These are themain papers available from the void (some books are sprinkled in as well). I recommendthat every system administrator at least gain a baseline knowledge of these techniques(if not actually implement the procedures detailed within).</P><P><B>"MDx-MAC and Building Fast MACs from Hash Functions." </B>Bart Preneeland Paul C. van Oorschot. Crypto 95.</P><UL> <LI><A HREF="ftp://ftp.esat.kuleuven.ac.be/pub/COSIC/preneel/mdxmac_crypto95.ps">ftp.esat.kuleuven.ac.be/pub/COSIC/preneel/mdxmac_crypto95.ps</A></UL><PRE></PRE><P><B>"Message Authentication with One-Way Hash Functions." </B>Gene Tsudik.1992. IEEE Info<FONT COLOR="#000000">com 1992.</FONT></P><UL> <LI><A HREF="http://www.zurich.ibm.com/Technology/Security/publications/1992/t92.ps.Z">http://www.zurich.ibm.com/Technology/Security/publications/1992/t92.ps.Z</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"RFC 1446--1.5.1. Message Digest Algorithm."</B>Connected: An Internet Encyclopedia.</FONT></P><UL> <LI><A HREF="http://www.freesoft.org/Connected/RFC/1446/7.html">http://www.freesoft.org/Connected/RFC/1446/7.html</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"Answers To FREQUENTLY ASKED QUESTIONS About Today'sCryptography." </B>Paul Fahn. RSA Laboratories. 1993 RSA Laboratories, a divisionof RSA Data Security.</FONT></P><UL> <LI><A HREF="http://www.sandcastle-ltd.com/Info/RSA_FAQ.html">http://www.sandcastle-ltd.com/Info/RSA_FAQ.html</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"The Checksum Home Page." </B>Macintosh Checksum.</FONT></P><UL> <LI><A HREF="http://www.cerfnet.com/~gpw/Checksum.html">http://www.cerfnet.com/~gpw/Checksum.html</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"RFC 1510--6. Encryption and Checksum Specifications."</B>Connected: An Internet Encyclopedia.</FONT></P><UL> <LI><A HREF="http://www.freesoft.org/Connected/RFC/1510/69.html">http://www.freesoft.org/Connected/RFC/1510/69.html</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"RFC 1510--6.4.5. RSA MD5 Cryptographic ChecksumUsing DES (rsa-md5des)." </B>Connected: An Internet Encyclopedia. J. Kohl. DigitalEquipment Corporation, C. Neuman, ISI. September 1993.</FONT></P><UL> <LI><A HREF="http://www.freesoft.org/Connected/RFC/1510/index.html">http://www.freesoft.org/Connected/RFC/1510/index.html</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"Improving the Efficiency and Reliability of DigitalTime-Stamping." </B>D. Bayer and S. Haber and W. S. Stornetta. 1992.</FONT></P><UL> <LI><A HREF="http://www.surety.com">http://www.surety.com</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"A Proposed Extension to HTTP: Simple MD5 AccessAuthentication." </B>Jeffery L. Hostetler and Eric W. Sink. 1994.</FONT></P><UL> <LI><A HREF="http://www.spyglass.com/techreport/simple_aa.txt">http://www.spyglass.com/techreport/simple_aa.txt</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"A Digital Signature Based on a Conventional EncryptionFunction." </B>Ralph C. Merkle. Crypto 87, LNCS, pp. 369-378, SV, Aug 1987.</FONT></P><P><FONT COLOR="#000000"><B>"An Efficient Identification Scheme based on PermutedKernels." </B>Adi Shamir. Crypto 89, LNCS, pp. 606-609, SV, Aug 1989.</FONT></P><P><FONT COLOR="#000000"><B>"An Introduction To Digest Algorithms." </B>Proceedingsof the Digital Equipment Computer Users Society Australia, Ross N. Williams. Sep1994.</FONT></P><UL> <LI><A HREF="ftp://ftp.rocksoft.com/pub/rocksoft/papers/digest10.tex">ftp://ftp.rocksoft.com/pub/rocksoft/papers/digest10.tex</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"Data Integrity With Veracity." </B>Ross N.Williams.</FONT></P><UL> <LI><A HREF="ftp://ftp.rocksoft.com/clients/rocksoft/papers/vercty10.tex">ftp://ftp.rocksoft.com/clients/rocksoft/papers/vercty10.tex</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"Implementing Commercial Data Integrity with SecureCapabilities." </B>Paul A. Karger. SympSecPr. Oakland, CA. 1988. IEEECSP.</FONT></P><P><FONT COLOR="#000000"><B>"Trusted Distribution of Software Over the Internet."</B>Aviel D. Rubin. (Bellcore's Trusted Software Integrity (Betsi) System). 1994.</FONT></P><UL> <LI><A HREF="ftp://ftp.cert.dfn.de/pub/docs/betsi/Betsi.ps">ftp://ftp.cert.dfn.de/pub/docs/betsi/Betsi.ps</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"International Conference on the Theory and Applicationsof Cryptology." </B>1994 Wollongong, N.S.W<I>. Advances in Cryptology,</I> ASIACRYPTNovember 28-December 1, 1994. (Proceedings) Berlin & New York. Springer, 1995.</FONT></P><P><FONT COLOR="#000000"><B>"Managing Data Protection" (Second Edition).</B>Dr. Chris Pounder and Freddy Kosten, Butterworth-Heineman Limited, 1992.</FONT></P><P><FONT COLOR="#000000"><B>"Some Technical Notes on S/Key, PGP..."</B>Adam Shostack.</FONT></P><UL> <LI><A HREF="http://www.homeport.org/~adam/skey-tech-2.html">http://www.homeport.org/~adam/skey-tech-2.html</A></UL><PRE></PRE><P><FONT COLOR="#000000"><B>"Description of a New Variable-Length Key, 64-BitBlock Cipher" (Blowfish). </B>Bruce Schneier. Counterpane Systems.</FONT></P><UL> <LI><A HREF="http://www.program.com/source/crypto/blowfish.txt">http://www.program.com/source/crypto/blowfish.txt</A></UL><H1></H1><CENTER><P><HR><A HREF="../ch10/ch10.htm"><IMG SRC="../button/previous.gif" WIDTH="128" HEIGHT="28"ALIGN="BOTTOM" ALT="Previous chapter" BORDER="0"></A><A HREF="../ch12/ch12.htm"><IMGSRC="../button/next.gif" WIDTH="128" HEIGHT="28" ALIGN="BOTTOM" ALT="Next chapter"BORDER="0"></A><A HREF="../index.htm"><IMG SRC="../button/contents.gif" WIDTH="128"HEIGHT="28" ALIGN="BOTTOM" ALT="Contents" BORDER="0"></A> <BR><BR><BR><IMG SRC="../button/corp.gif" WIDTH="284" HEIGHT="45" ALIGN="BOTTOM" ALT="Macmillan Computer Publishing USA"BORDER="0"></P><P>© <A HREF="../copy.htm">Copyright</A>, Macmillan Computer Publishing. Allrights reserved.</CENTER></BODY></HTML>
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?