The web page of Dr. Rick Smith features, among other things, The Center for Password Sanity. This is a set of essays, written while he was working on his book Authentication, all about passwords, their strengths, and their weaknesses. Definitely worth a read, and might even be worth passing along to managers who are still thinking that passwords should be handled the same way they were in 1988.
Back to Basics
February 24, 2011An article on Threatpost makes a compelling point: despite the amount of press lavished upon attacks like Stuxnet or Aurora, most companies don’t need to be worried about the latest and greatest targeted attacks. They need to worry about the basics – SQL injection attacks, phishing, social engineering, and other “boring” threats.
For the vast majority of companies, especially ones outside of the Fortune 100, there is simply no present threat from something like Aurora. Complex, expensive security infrastructures aren’t what you need. You need properly hardened servers, trained employees, and developers who know how to write secure application code.
“Silent Fixes”
February 23, 2011Every so often, Microsoft will issue security fixes that are not tied to a known vulnerability, and which are not intended as a response to a particular CVE bulletin. Many people refer to these as “silent updates”, since their purpose has not been publicly announced. Last week, an explanation of this phenomenon was posted on Technet.
Sanitizing SSDs
February 23, 2011This paper (warning: PDF) from the Usenix FAST conference looks at an interesting question: with hard drives quickly giving way to solid-state drives (SSDs), how do we securely wipe data from workstations using the new technology?
From the paper:
Reliably erasing data from storage media (sanitizing the
media) is a critical component of secure data manage-
ment. While sanitizing entire disks and individual files is
well-understood for hard drives, flash-based solid state
disks have a very different internal architecture, so it
is unclear whether hard drive techniques will work for
SSDs as well.We empirically evaluate the effectiveness of hard
drive-oriented techniques and of the SSDs’ built-in san-
itization commands by extracting raw data from the
SSD’s flash chips after applying these techniques and
commands. Our results lead to three conclusions:
First, built-in commands are effective, but manufactur-
ers sometimes implement them incorrectly. Second,
overwriting the entire visible address space of an SSD
twice is usually, but not always, sufficient to sanitize the
drive. Third, none of the existing hard drive-oriented
techniques for individual file sanitization are effective on
SSDs.
OddJob
February 22, 2011A new trojan, named OddJob, has been discovered. It surreptitiously hijacks a web banking session, cutting off “logoff” attempts and allowing the criminals who operate the trojan remotely to access victims’ accounts.
This is a nasty one.
Definition Monday: SIEM
February 21, 2011Welcome to Definition Monday, where we define and explain a common technology or security concept for the benefit of our less experienced readers. This week: SIEM Systems.
A SIEM, or Security Incident and Event Manager, is a relatively new concept in information security. The concept was pioneered about a decade ago, and has been evolving rapidly ever since.
A SIEM performs two major functions:
Log Centralization
The first, and original, purpose of a SIEM is to serve as a single point of collection for activity logs from disparate systems on an enterprise network. Nearly everything is capable of producing logs in some standarized format: Windows servers, VPN concentrators, network firewalls, managed Ethernet switches, Unix hosts, IDS systems, even individual workstations. In a SIEM deployment, each of these network devices sends its generated logs to a single collection point so that they can be analyzed in one place.
The benefit to this is obvious, if only for troubleshooting purposes. Imagine a mid-sized network that has half a dozen DNS servers, four Active Directory domain controllers, two DHCP servers, redundant border routers, and two hundred wireless access points. Finding a particular wireless host and tracking its Internet activity would take hours or days if each of these devices had to be queried and analyzed separately. With the centralized logging of a SIEM, on the other hand, all the information is in one place and easily searchable, usually with an intuitive web interface. You can track the laptop from the time it is issued an address by the DHCP server to the moment it vanished from the last access point.
Correlation Analysis
Additionally, a modern SIEM deployment will include a correlation software engine to mine through these disparate logs and alert the administrative staff to potential problems.
Imagine this example: your enterprise network has an LDAP-based single sign-on environment. This means that the same account credentials can be used to log in to any system on the network. Now imagine that someone is trying to gain access to an account with the username “admin”, assuming (perhaps rightly) that this account has elevated privileges and so it is a particularly tempting target. Your computers are set up with account lockout rules – logging in with the wrong password five times will lock the account.
The attacker knows this, so he tries four passwords for the “admin” account on a random assortment of hosts on your network. In an environment of any size, four incorrect logins are not going to raise red flags. But if the logs from these different hosts are all flowing into a SIEM system, the administrators should be quickly alerted by the correlation engine that someone is definitely trying to compromise the “admin” account.
Advantages and Disadvantages
The advantage of a SIEM should be obvious – it allows administrative staff to view the current and past condition of a network with a stunning level of transparency and immediacy. Most popular SIEM products will interface with almost anything that speaks TCP/IP – and, generally speaking, writing new plugins to understand a foreign format is a straightforward task.
The main disadvantage of a SIEM is that it is a very complex product, and the simple deployment can be a major project unto itself. Each host needs to be configured to speak to the central console. The correlation engine needs to be carefully tuned to minimize false positives and, more importantly, to minimize false negatives. In a complex network, multiple listening hosts (often known as “probes”) may need to be deployed in order to have a clear view of all network traffic. And the hardware to run a project like this needs to be pretty powerful; this isn’t something that will run in a VMWare container with a dozen other machines. You need power, memory, and disk to do this right.
But if those disadvantages aren’t too daunting, a SIEM is a fantastic tool for anyone who needs to manage a network with more than a few dozen hosts.
Lojack for Students
February 19, 2011The Anaheim Union High School District of California has come up with a new scheme for battling truancy: track students with GPS units.
Students with four or more unexcused absences are issued a GPS unit, which they must carry with them during the day. Their locations are checked five times a day – when they leave home for school, when they arrive, lunchtime, when they leave school, and eight PM. In addition to location tracking, students are assigned to a mentor for one-on-one planning sessions to avoid future truancy.
This is an interesting solution to a common problem – although I have to wonder how beneficial it really is to the other students to divert funds from education to technology, in the interests of filling the classroom with students who would rather not be there.
Android Trojan
February 18, 2011Another trojan for the Android smartphone platform was discovered earlier this week. This is apparently being included in repackaged wallpaper packages and used in the Chinese market. It essentially uses the phone’s data connection in the background to perform search engine queries and click on results; I imagine that click fraud revenue is a motivator.
Old Accounts
February 17, 2011A recent survey conducted by Harris Interactive reveals that roughly 1 in 10 IT professionals still has access to accounts from a previous employer. And, considering that this was a survey of IT people, it’s pretty likely that these accounts are privileged in some way.
Are your employment termination procedures up to date?
(The survey has some other interesting conclusions as well, though I would take them with a grain of salt. Most of them concern account and identity management, and the survey was sponsored by a software company that just happens to have products in that space.)