Wednesday, February 28, 2007

On "Five mistakes of data encryption"

This fun article covers some of the other mistakes that often occur when organizations try to use encryption to protect data at rest and data in transit and thus improve their security posture.

Friday, February 23, 2007

On Blogging, Personal Branding and Log Mananement


So, a while ago I posted this visual cloud representation of a Clusty search engine query for "log management" and I said "notice something interesting?"

This picture actually shows what was so interesting (I just rerun the query today to make sure it is still there)

So, seeing this again caused me to philosophize :-) a bit: is it a good thing that your very name becomes fused with a specific technology? I do love log management, but should I be happy (or sad?) that Clusty thinks that "anton" is closely related to "log management."

If you think that it was an ego post, skip it :-)

Thursday, February 22, 2007

Keep Harping on It ...

On multiple occasions (search my blog...) I harped - no less - about this and now finally more of the smart people are saying this too: "But I do know that in 2007, the good guys will continue to surf in the wake of the bad guys’ innovation."

Nothing new here for most of my readers, but those folks who read too much vendor marketing about "saying ahead of the hackers" should pay attention.

Wow, There: That's a Bit Extreme, Isn't It?

Hmmm, this sounds a bit extreme to me: "Most companies who are trying to do security in-house are not getting it done." But, apparently, not to Bruce Schneier...

Wednesday, February 21, 2007

SaaS, Web Hacking, "Web Suing" and Stuff ...

Here is a fun and disturbing trend; a real one this time :-) since we all saw a bunch of fake "trendware" being brought up during the RSA marketing crapstorm ...

So, imagine the world without legitimate vulnerability research. Scary like its 1992, right [unless your name is Pete] ...

It starts from this: "Current law (in the U.S., the U.K. and several other Western nations) allows flaw hunters like H.D. Moore (Month of Browser Bugs) and Kevin Finisterre (Month of Apple Bugs) to publicly disclose critical vulnerabilities to their hearts' content. Conversely, searching for flaws in a public Web application [public web site] is illegal, in no uncertain terms."

More on this: "The Chilling Effect" that says: "But then, right when security researchers were getting good at the disclosure game, the game changed. The most critical code moved to the Internet, where it was highly customized and constantly interacting with other highly customized code. And all this Web code changed often, too, sometimes daily. Vulnerabilities multiplied quickly. Exploits followed. But researchers had no counterpart methodology for disclosing Web vulnerabilities that mirrored the [some say crappy, but still somewhat workable - A.C.] system for vulnerability disclosure in off-the-shelf software. It's not even clear what constitutes a vulnerability on the Web. Finally, and most serious, legal experts can't yet say whether it's even legal to discover and disclose vulnerabilities on Web applications like the one that Meunier's student found [but most say its not - A.C.]. [see article for the story]"

And here too: 'Grossman's take is that Web security significantly suffers from the legal climate that prohibits so many trained eyes from inspecting Web applications, which are developing new--insecure--functionalities every day. I asked Grossman if he had a prediction for the future.  "Yeah," he said. "The bad guys are gonna win."'

So, what do we have here? One can look for vulnerabilities ln in COTS or OSS software and then disclose them in whatever fashion (even "irresponsible" disclosure is still legal, IMHO but IANAL). But if you write a custom web app, as many do and many-many-many :-) more will do in the coming years, and deploy it on the web, nobody but you can legally discover vulnerabilities in it. See the point? If vulnerability disclosure does indeed improve the software security, a similar force will not be active in the realm of web applications. And as more applications move to the web, we are looking at 1992 pre-Bugtraq world all over again, which can be summarized as "those who know and dare, 0wn" :-)

But you know what? There is an opposite but equally disturbing trend related to liability. Few picked this one yet. So, many folks have been advocating that software vendors be liable for vulnerabilities whatever resulting vulnerability consequences such as data loss. For example, here Bruce Scheier (one of the most vocal proponent of this) says that "Liability changes everything. Currently, there is no reason for a software company not to offer feature after feature after feature, without any regard to security. Liability forces software companies to think twice before changing something. Liability forces companies to protect the data they are entrusted with. Liability means that those in the best position to fix the problem are actually responsible for the problem."

And here is the fun thing: many agree that it is very hard to sue a software vendor if you lose the data due to their vulnerability, but you know what? You can sue a web application operator or a web site owner if they lose your data! Specifically,

Can't sue SAP, can sue Salesforce.

Can't sue MS for Office, can sue Google for Docs.

Can't sue Mozilla for Thunderbird, can sue Yahoo for Yahoo Mail.

Isn't it fun?! In other words, sue the software vendor for vuln-resulted data loss - get trouble, sue the SaaS vendor - get cash!

Am I wildly off base? Comment away!!

Monday, February 19, 2007

On "The Cult Of Compliance": Humor, but Not Really

Read, laugh and weep :-) Some fun quotes:

- "Known by their Pharisaical stance, Consultants are the high priests of the Compliance Cult. "
- " ... They [vendors] have the fatted calves and doves for you to buy and sacrifice at the alter of the Golden Calf under the watchful eye of the High-Priest Consultant."
- "Compliance Is Not A Vending Machine"

On FISMA Compliance

Just something to think about here: why is there a "zero connection between high FISMA scores and lower impact or number of intrusions." Read more at the ever-insightful TaoSecurity.

Video from RSA's Security Bloggers Meeting

Even though I still don't get why I should listen to podcasts or watch the videopodcasts when I can just read the stuff much faster, here is a fun video from RSA's Security Bloggers Meeting. I guess it is kinda cool to be "caught on tape" sometimes :-) - yes, you can see me arguing (or agreeing :-)) with Ron Gula in the background ...

One Fun Bit on Acunetix vs NetworkWorld

One thing that nobody picked on the whole Acunetix vs NetworkWorld web hacking statistic is: the security world seems split into two camps which hardly talk to each other.

1. 70% of exploitable web sites is waaaay to low. All but a very few are in fact "hackable"

vs

2. The number is waay too high. Maybe that many are vulnerable, but surely not exploitable.

So, what's your take on this split?

Compliance vs Out-of-Compliance?

Here is a fun one: do you care about compliance or do you care about being (or even "being caught") out of compliance? The question is asked by the enlightened minds behind SecurityBuddha.com blog.

Good question indeed!

A Good "Final" Word on Security Awareness

Good article on security awareness. One sentence summary: build your security awareness program, educate the users AND prepare that it WILL fail miserably.

"Some end users may help, but you can't rely on all of your users to do anything. End users are hopeless. If you use that as your first premise, you've got a better chance of building a truly secure environment."

More Fun Predictions, Non-Security

"Developments at extreme edges of science can be extrapolated, though, to give at least indications of what the next decade or two might hold. Here are a few things that could emerge in the next ten years."

Read more.

One thing on the list that is somewhat related to infosec is "Personal Privacy Concerns." Specifically, they say that "opportunities for identity theft, online fraud and cyberterrorism will be greater and far more sophisticated than we can begin to imagine in our primitive circa-2007 paradigm."

Useful Reading for Those Who Think "All Security Will be in the Network"

Nothing Earth-shattering but useful reading for those who think that ALL security will be in the network infrastructure soon.

Friday, February 16, 2007

Thursday, February 15, 2007

Anton Security Tip of the Day #8: What Just Changed?

Following the now old :-) "tradition" of posting a security tip of the appropriate time interval (mentioned here, here ; SANS jumped in as well), I decided to follow along and join the initiative. One of the bloggers called it "pay it forward" to the community.

So, Anton Security Tip of the Day #8: What Just Changed?

Let's close our eyes for a second and dive deep into the bizarre and menacing world of a Windows event log. As I mentioned before, massive Windows server log collection got a jump start in recent years due to wide availability of agentless Windows log collection tools, such as Project LASSO. (yes, many people think that agents suck event when they are useful - weird, isn't it?)

Windows event logs, the "Big Three" of System, Security and Application as well as other logs, share a lot of contradicting properties: way too much detail in some areas and missing critical info in others, consistent and thoughtful design here and sheer stupidity there, nice structured data sometimes and confusing mumbo-jumbo in other cases. And the universe of the event log is never static, the whole thing flows and morphs with each Windows release and at time with each update. New event IDs are being created, changed and loaded with new roles and new info.

In this tip, we will look at some fun Windows log entries and explain their meaning for your organization as well as cover what you should do if you encounter them. Given that the realm of Windows event log is so huge, we will start from looking at events that indicate changes of different kinds, mostly configuration and user account. So, what just changed?

I. "Computer Account Deleted" or "User Account Deleted": obviously, service or user account was deleted. Who did it? When? Why? Answer all the questions above and then you can go back to sleep - or to your incident response plan :-)

II. "Computer Account Created" or "User Account Created": same thing - depending upon when? why? who? this event means nothing or something pretty ugly.

III. "Computer Account Changed" or "User Account Changed": similarly, changes to accounts are reflected in the events containing this text. Account changes do include privilege level changes that are often of particular interest.

At this stage, it might be appropriate to ask: why aren't we going by Windows event ID to identify the above events of interest, but instead choose to use the above text blurbs? Well, up to Vista, Windows event IDs often aren't :-) Meaning that they don't identify the event sufficiently. Sometimes, they are overloaded and the same ID applies to very different things. Sometimes, the opposite happens - same event, different IDs (e.g. a lot of login/logout stuff)

IV. "Policy Change": might mean almost anything on a Windows system. Thus, we can't really tell you much; you need to read the event to see what actually changed (if anything!)

V. "The system time was changed" might not matter that much, but if you are looking to use your logs as forensic evidence (i.e. use them in court) you might want to track all the time changes since they will affect the log timestamps on the server where time changed.

VI. "The following schema object was modified" oooh, don't you love Active Directory! This indicates that some of the AD objects changed - fortunately, the object name will be in the same event.

Enough for today! Windows logging makes most everyone's head hurt (unless you are Eric or Randy, I guess :-))

So, to conclude, make sure that you collect Windows event logs and analyze them on an ongoing basis, preferably using your log management system.

As I mentioned before, I am tagging all the tips on my del.icio.us feed. Here is the link: All Security Tips of the Day.

Yet Again, On ISP Log Data Retention

Can somebody once again explain: why some say that "retention of records by Internet Service Providers" will "stifle online communication?" The quoted proposed law is H.R. 837 aka SAFETY Act.

Seriously, people, will you communicate less if you know your ISP logs all connections? May I also remind you of this blurb.

On Bombing from Orbit ...

Stuff like this always cracks me up ...

Wednesday, February 14, 2007

Monday, February 12, 2007

Security Minus the Castle Metaphor Equals ... ?

So, I was reading this book the other day which was, for the umpteenth time, explaining "how is [information] security like a castle." You know, all the usual stuff about the walls, gates,  inner fortress, moat, archers, tripwires, mantraps, vandals outside and malignant insiders - where else? -  inside, etc which are commonly mentioned when people talk about this immortal  metaphor. However, are we taking this one too far? Just as a mental exercise, let's think: how is modern information security NOT like a castle? Before you throw your brain into overdrive to ponder this question :-), why do we care? We do, because I think that "the whole castle thing" is getting counter-productive in some respects and limits the progress in the field of information security. There is way too much castle-building going on already :-)

Let me drop a few that I thought about, some obvious and some hopefully less so :-) 

  • An obvious one that has to do with the nature of information security vs physical  castle defense- you can "lose everything" without "losing anything" (in case of an undisclosed information theft)
  • Another one: castle defense is inherently static; not much of "active defense" is possible since in the end it boils down to either a prolonged siege or a quick bloody assault. Similarly, organization's network is not going anywhere, but information might be defended more dynamically (if I knew how exactly,  I might be launching a new company now :-))
  • Audit matters much more in networks than at castles; if your castle security is breached, there is usually nobody left to do audit trail or log analysis
  • Here is the opposite: castles has security tools and features "built-in", modern networks - mostly "bolt-on"...
  • Many quote the growth of "de-peremetrization" or broader decentralization of security as something that moves security away from the castle metaphor, but, on some level, having one huge castle (in the form of an enterprise network) vs having clusters of "tiny castles" (in the form of "self-defending documents" or whatever similar protected bits of data) is still talking walls and gates

Any ideas, thoughts, anything? 

Got It! Best Headline of a Telnet 0day Article ...

So, before making fun of Solaris telnet 0day, I was looking for the funniest headline of any article discussing this. Got this - "Another good reason to stop using telnet."

Do you people REALLY need ANOTHER one???!!!

Friday, February 09, 2007

On "A Diamond in the Rough of Security Predictions"

Just want to say thank you to these guys for speaking highly about my predictions. And, yes, my 2006 predictions were made in the very beginning of 2006 ...

BTW, blogs that require login to leave comments are evil :-)

Just What Is "NAConomics"?

Just what is "naconomics"? See the answer here.

Oh, RSA 2007

So, I spent a day at RSA 2007 on Wednesday, from about 9AM to 11PM ... Oh, was it fun!! Here are some highly informal impressions.

First, what's are the Security Buzzwords of the Year

  • Identity - yes, I dare say that the word "identity" blessed the maximum number of vendor booths, even more than ...
  • ... yes, more than NAC - and thus I continue to insist that knacking noise :-) will be waning this year. Hopefully - at least the NAC vendors should hope - not the deployments though ... And don't forget to NAP.
  • Data security together with leak "prevention"; a formidable presence indeed, given a large number of vendors that "do it" or, more accurately, "claim to do it"
  • I guess I should mention endpoint security, but to me it sounds a bit like RSA 2006 ...

Another thing that amazed me was a huge (!) number of new security companies. I have noticed dozens of new vendors, some doing interesting and some boring and old stuff. Initially, when I started my "vendor walk" and passed thru a couple of aisles, I started developing a mild case of "marcusranum-itis" i.e. "same old stuff around", but later I did see a few fun and innovative companies. Also, I met a couple of folks who pitched their new company ideas to me; that was deeply cool as well. So, I hereby proclaim that security innovation marches on, despite some dumb claims to the contrary.

Again (as I commented here), I've seen a few "walking dead" companies present. For some of them, it seems like they truly blew the last 20 grand on the show, hoping - in vain - that somebody [dumb] would buy them. I am talking about those whose quarterly revenue dropped into 6 digits after being in business for a few years. You know who they (you? :-)) are!

What made my RSA day is of course a Security Bloggers Meet-up (that everybody blogged about already - here, here,  and yes, even here somewhere); it was a very fun event indeed. For those who are into that sort of thing, a few of the security "celebrities" such as Bruce Schneier and  Stephen Toulouse blessed the event with their presence. I am so looking forward to it in 2008!

Finally, somebody mentioned to me that they also had the presentations - you  know, people speaking and stuff - at RSA. I was like "Wow, seriously!" :-)  And I thought that RSA is mostly known for its parties ...

Technorati tags: , ,

Thursday, February 08, 2007

Ultimate Firewall Plus From MJR

Now with IPS, secure tunneling and port 80 "protection" :-)

A quote: "... You'll notice there is a large hole sort of in the center. That represents TCP Port 80."

This Doesn't Sound Right, Does It?

Eric Fitzgerald: "I get asked the question pretty regularly how to determine from the security log whether a user logged on using a smart card or not.

The short answer is, you can't be absolutely certain. The longer answer is, well, you can be pretty certain for the time being, especially if you're not running any non-Microsoft Kerberos code."

Esoterica indeed.

Wednesday, February 07, 2007

At RSA 2007 Today

BTW, I am wandering around RSA today. Want to meet? Drop me an email ...

Monday, February 05, 2007

So, Is Security An Art?

Now, I realize that for some this question will sound like "Is plumbing an art?" or even "Is accounting an art?"  However, I think now is not a bad time to ponder this one, again. You might recognize this post as being of the type "written_while_flying" :-) only more so since it is actually of a type "written_while_flying_from_Europe." :-)

It started from a CrateMaster 2000 joke about a CVSS. And then this comment came in: "CVSS is the same way. It tries to reduce something to a single number (or set of numbers) that is inherently complex. It gives the appearance of scientific legitimacy to something that is as arbitrary as a game or movie review. ("I give this vuln two thumbs  up!!!")."

And then this: "The fundamental problem with cyber-security metrics is that the things we can
easily quantify are rarely interesting, and the things that are interesting are hard to quantify..."

On the other hand, many folks in our profession are sitting on huge piles of checklists and counting the days when security becomes a formal if unexciting discipline, reduced to a set of simple, and, well, not so simple, rules that everybody would need to follow (and some actually would). A science of sorts. Or a least a management discipline.

As I put it in my landmark :-) post on "Will Security Ever Be Done?" (also some discussion here) I find this complete transition rather unlikely. However, I think vuln scoring is picking a wrong battle for the "security is an art" types. Say whatever you want, but a well-define vuln scoring seems perfectly doable, even if not trivial. And CVSS is a quality effort to get there, with some results to show.

Now, on the other hand, something like incident response will never become formal and will not be reduced to just following a checklist (even though incident response checklists are immensely useful!), just as - analogy alert! - police investigative work will never be reduced to following a formalized procedure ...

How about making the next step along this road: are those parts of infosec which are akin to art immeasurable by definition (kinda like poetry)? This question should be left unanswered for now (esp. given that I am finishing this post at Mini MetriCon 2007)

Sunday, February 04, 2007

LogLogic Party at RSA 2007

LogLogic Party at RSA!!!

"Fancy a free beer, some good company and a bit of fun at this year's RSA conference. We'll be celebrating a year of stunning growth for LogLogic and the market as a whole at TWO - a hot new bar, two blocks from Moscone at..... We'll be throwing in some door prizes...

Last year LogLogic doubled our customers year-on-year, grew revenue three times, and increased customer traction both in the U.S. and abroad across a wide range of industries -- especially financial services, banking, healthcare, and retail. With major news in the works, we are entering 2007 with a bang and are in the mood to invite you to our celebration just before the kickoff of the RSA Conference.The market is moving to LMI, find out why. If you want to have a serious conversation about LMI, great. If you just want to come by and have a beer, we'll raise a glass with you. Attendees will have the chance to mingle with hackers, log gurus, security geeks, and us loggies!

On Monday, February 5th, starting at 6 PM, LogLogic will be hosting a cocktail reception at TWO. TWO is between 3rd and 2nd off Howard, very easy walking distance from the Moscone Center.

Sign up for the event with an RSVP to rsvp@loglogic.com

Here are directions to TWO (the restaurant formerly known as Hawthorne Lane). (http://www.two-sf.com/about/directions.html)."

Dr Anton Chuvakin