310 likes | 422 Vues
This presentation discusses the importance of computer security, highlighting threats such as the Slammer and MSBlaster worms. It emphasizes the necessity of implementing multiple layers of security measures, including firewalls and timely updates. The session includes statistics on infection sources, with insights into virus propagation in diverse environments such as universities. It reinforces the message that poor administration remains a significant challenge and provides recommendations for enhancing security protocols while addressing the effectiveness of current solutions.
E N D
Computer Security Update Bob Cowles, SLAC bob.cowles@stanford.edu Presented at HEPiX - TRIUMF 23 Oct 2003 Work supported by U. S. Department of Energy contract DE-AC03-76SF00515
SLAC Computer Security Thinking evil thoughts Protecting from evil deeds HEPiX - TRIUMF
Slammer Impact HEPiX - TRIUMF
India China Japan Korea Australia HEPiX - TRIUMF
http://www.microsoft.com/security/security_bulletins/ HEPiX - TRIUMF
MSBlaster Released MSBlaster at SLAC HEPiX - TRIUMF
FireWall Log – Infected Machines Sep 16 18:29:18 icmp 134.79.137.220 -> 134.79.72.98 (8/0) Sep 16 18:29:19 icmp 134.79.137.220 -> 134.79.72.198 (8/0) Sep 16 18:29:20 icmp 134.79.137.220 -> 134.79.73.42 (8/0) Sep 16 18:38:46 tcp 134.79.137.220(3325) -> 134.76.2.205(135) Sep 16 18:38:47 tcp 134.79.137.220(3169) -> 134.76.2.48(135) Sep 16 18:38:48 tcp 134.79.137.220(3249) -> 134.76.2.128(135) Sep 16 18:40:06 icmp 134.79.129.243 -> 134.79.72.0 (8/0) Sep 16 18:40:06 icmp 134.79.129.243 -> 134.79.72.64 (8/0) Sep 16 18:40:07 icmp 134.79.129.243 -> 134.79.72.128 (8/0) Sep 16 18:40:17 tcp 134.79.136.68(4107) -> 134.79.124.0(135) Sep 16 18:40:18 tcp 134.79.136.68(4194) -> 134.79.124.98(135) Sep 16 18:40:19 tcp 134.79.136.68(4292) -> 134.79.124.196(135) Sep 16 22:28:25 tcp 134.79.129.243(4413) -> 134.76.24.39(135) Sep 16 22:28:26 tcp 134.79.129.243(4377) -> 134.76.22.41(135) Sep 16 22:28:27 tcp 134.79.129.243(4383) -> 134.76.22.113(135) HEPiX - TRIUMF
Infection Sources @ SLAC • 32% VPN • 22% DHCP (reg, internal network) • 20% Fixed IP On vacation, laptop infected outside, etc. • 14% Infected during build / patch • 12% Dialup HEPiX - TRIUMF
Blaster - Easy to Get Infected 09/29/103 11:46:42 Host: 134.79.25.55 Port: 135 TCP Blocked 09/29/103 11:46:41 Host: 134.79.25.55 Port: 135 TCP Blocked email @ 12:21pm: Bob, is host "illusion" yours, as per my so-called memory? But the mac addr is registered to Richard Mount ... Sep 29 11:41:37 dhcp2 dhcpd: DHCPACK on 134.79.25.55 to 00:10:a4:e4:2a:b8 (illusion) host roam-rmount2 { hardware ethernet 00:10:a4:e4:2a:b8; }# 01/25/00 # PC54566, Richard Mount HEPiX - TRIUMF
https://rhn.redhat.com/errata/rh73-errata-security.html HEPiX - TRIUMF
http://docs.info.apple.com/article.html?artnum=61798 HEPiX - TRIUMF
http://sunsolve.sun.com/pub-cgi/show.pl?target=security/sec HEPiX - TRIUMF
http://www.cisco.com/warp/public/707/advisory.html HEPiX - TRIUMF
It Sucks Not to Patch • Popular rookit in many variations • Hides files, directories, processes; precompiled password • With keyboard and/or ssh sniffers • Listens on *all* open ports for backdoor • Any port open inbound allows backdoor signal, sk thens opens outbound tcp for encrypted shell connection HEPiX - TRIUMF
suckit (cont) • Home page http://hysteria.sk/sd/ • Latest versions not publicly available • Also find exploits for • ptrace • sendmail 8.11.x HEPiX - TRIUMF
Virus Warning! http://www.trendmicro.com/map/ Last 24 Hours Last 30 Days HEPiX - TRIUMF
Ballmer @ Gartner ITXpo • Windows has fewer vulnerabilities than RH Linux [RH6] • No roadmap for Linux. There’s nobody to hold accountable for security issues • The security of Microsoft products is our top priority. We have our best brains on it. • We understand this is an issue of customer satisfaction. http://www.theregister.co.uk/content/4/33522.html HEPiX - TRIUMF
Microsoft @ Stanford • Universities tend to be a worst case • Diverse, unmanaged • Population • Hardware • Software • Unlikely to fit into AD model • Stanford had 8000 machines compromised by Blaster BEFORE students returned for classes HEPiX - TRIUMF
Feedback to Microsoft • Clear & meaningful impact statements • Fix IE (30+ outstanding bugs) • Reduce the attack vector (profile services) • Don’t require license check for security patches (e. g. MS Office CD) • No tie-in to IE (no active scripting) HEPiX - TRIUMF
Feedback to Microsoft (cont) • Open up patching tools and process • Understand 3rd party tools +/- • Allow other vendors to use same tools for their Windows products • Provide feedback on real patch status (local & remote) • Need general patch deployment tool not requiring AD HEPiX - TRIUMF
Conclusions [Unchanged from last year] • Poor administration is still a major problem • Firewalls cannot substitute for patches • Multiple levels of virus/worm protection are necessary • Clue is more important than open source HEPiX - TRIUMF
No Easy Solutions Questions? HEPiX - TRIUMF