Bugtraq mailing list archives

Re: BoS: amodload.tar.gz - dynamic SunOS modules


From: strombrg () hydra acs uci edu (Dan Stromberg)
Date: Fri, 21 Jun 1996 10:57:15 -0700


der Mouse wrote:
So for today, the best defense is really to take pro-active action
and prevent intruders from gaining access to your network.  This can
be done with a combination of firewalls and having a continuous
security assessment program in place where you scan your network for
vulnerabilities and correct.  You can test your own machine with a
scanner from www.iss.net.

I trust Christopher Klaus will forgive me for being a bit suspicious
when I notice that his recommend "best defense" just happens to be what
his company is selling.

For what it's worth, I do consider firewalls a pretty good option,
especially if the security behind the firewall isn't neglected.  I don't
have anything vaguely resembling a vested interest in firewall sales.

That said, not every site (including ours) really has the option of
Using a firewall.

With writeable CDROM drives around $700, has anybody considered
setting up their system [...] and then backing the disk to WCDROM?

As someone else pointed out, all that does is speed up recovery; it
doesn't harden the system against attacks any.

Doing something analogous thing over NFS really can be a tremendous win,
tho.

1) It means you don't have to worry about running out of time for
applying every last security fix, on new machines
2) Done with some forethought, it can be used to bring old machines up
to date quickly on holes that were exposed after the machines were set
up.  To a large extent, this can very nearly outmode "scheduled security
evaluations." and their aftereffects.
3) It opens up opportunities for lots of "nice, but there's no time for
that" modifications that wouldn't happen otherwise - like... applying
vendor patches; putting TCP wrappers, Wietse's rpcbind, and klaxon on
everything; turning off echo, chargen, &c..

IE, such an approach can yield more secure configurations, in less time.
...and it doesn't only benefit security.

To gain the most benefit, ya gotta do make the changes procedurally,
rather than trying to keep a "perfect disk image" around to be copied.
It takes a little longer to set up each modification, but you can then
use that some modification code on new releases of an OS without
overhauling your disk image, not to mention use the modifications
against multiple vendor's OSes.

There's a mailing list dedicated to this sort of thing:
auto-net-request () math gatech edu

Our particular (free) implementation is described at
http://www.oac.uci.edu/support/dcs/automation/autoinstall.html, but it
is tightly coupled with our environment.  The scripts are ftp'able.



Current thread: