Rich Freeman on 12 Jul 2011 05:09:40 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] "IT Security for Non-Dummies"?


On Tue, Jul 12, 2011 at 7:29 AM, Floyd Johnson <fljohnson3@isp.com> wrote:
> What are they doing so horribly wrong? (2) What should we be doing to
> avoid replicating their mistakes?

Well, I'm not sure which breach you're referring to specifically, but
I think the problem is that our whole security model is fundamentally
unsuited to keeping determined attackers out.

The typical operating system is very permissive by default.  This
makes administration much more convenient, but it makes security very
difficult.  There is almost no defense in depth - once somebody is in
the game is over.  There is usually no provision on a typical system
for verification of integrity, so once somebody is in cleanup is very
difficult.

To give an example, I'm a Gentoo developer.  Gentoo includes some
support for SELinux, but it is fairly limited.  To truly support
something like SELinux you need to have definitions/etc for every
package on the system, since it is much more non-permissive by
default.  Few people want to bother with that.  And I wouldn't say
that SELinux itself is the ultimate solution.

Likewise, anybody can download and install tripwire.  However, if you
update packages every day, then you need to update tripwire
definitions every day.  How do you know that something bad won't slip
in between updates?  And, how do you conveniently store those updates
for a remotely-located server such that they don't get tampered with?

The only solution I can see is an OS with security that is fully
integrated.  The OS includes defense in depth (non-permissive by
default, tuned granular permissions per application, etc).  The OS
includes tripwire-like functionality, with signed manifests/etc from
the source (so instead of just scanning everything on your system you
carefully manage a database of hashes, all signed by their sources).
The OS utilizes commercially available hardware to support secure
storage of hashes/etc - with some kind of mechanism to prevent
tampering.  The system verifies itself during boot, or during every
process load, etc.

The modern PC with TPM/etc actually supports much of this, and most of
the components needed to make this work are available (but not
integrated).  However, most people can't be bothered with it, and so
nobody scratches that itch.  Which would you rather run - Ubuntu, or
some Ubuntu clone with 5% of the packages but with security
definitions for all of them?  Sure, 0.01% of the linux community would
like the latter, but they'll never be able to sustain the mass of
developers needed to maintain it.

The problem with security is that poor security is usually good enough
to get the job done.  So, there is little incentive to do better
unless things get much worse...

Rich
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug