
Firewall Wizards mailing list archives
RE: Castles and Security (fwd)
From: "Marcus J. Ranum" <mjr () nfr com>
Date: Wed, 03 Jan 2001 19:03:58 -0800
Lance Spitzner wrote:
I feel that in general, the blackhat community does use guerilla tactics. Find an easy kill, move swiftly, and disappear. I'm going to have to play with this one some more.
I think there's a subtle distinction between terrorists and guerillas, FYI. Guerillas (according to my dog-eared copy of Mao, anyhow) focus on destruction of infrastructure and are organized as military units. Terrorists focus on media manipulation, target "soft" and splashy victims, and are usually organized in cell structures. Guerillas are generally ideologically united, while there are some terrorists that are apparently more interested in just causing damage than in serving any particular cause. In other words, I wouldn't dignify the hackers by calling them "guerillas" ;)
However, I still feel castles make an excellent analogy when you want to demonstrate how defense in depth can be applied. Many organizations feel that by throwing up a firewall they are secure. Castles use defense at every layer, networks should follow a simillar concept.
Absolutely. Carcassone (S France) is a great example of early walled city construction, and has multiple layers of walls. Many of the walls have fail-safe points - weaknesses are covered by backup walls that have specific hardpoints from which to counter-attack if the wall is penetrated. Lots of sneaky stuff: break through one door and behind it is _another_ door. So in order to break the next door you have to stand in this small room between the doors - a room that has slots in the ceiling for pouring boiling oil. Ow. The medievals were not as nice to their hackers as we are, today. But let's look to the future. For now, the idea of perimeter defense and defense in depth hold. What happens if those break down? Is it possible that we will move into an environment in which defense is _impossible_?? I think we're on our way there thanks to "firewall friendly" applications, downloadable execution paradigms, and reams of readily-available hackerware. The walls don't count for anything because the attackers are able to transparently flow through them. In a medieval castle, when you were under attack you could close the gates. In a modern .COM website, when you are under attack, you are trying to still interact with your customers!! Classical anti-guerilla operations involve identifying infrastructure targets and guarding them. Typically, they also identify "free fire zones" - which allows the defenders to address the targeting problem by simply assuming that anything in the FFZ is a target. In a terrorism environment, it's much, much harder because you can't identify an FFZ - there are civilians there carrying out their lives. So targeting the bad guys is nearly impossible - you have to wait for them to stand up and start shooting before you can go after them. And they have complete freedom of movement (generally) in small numbers. So I don't think you're defending a castle against hackers. I think you're defending a city about the size of London, England. With a perimeter that is about as well defined as London's. Within the city, there are a huge number of targets, ranging from the obvious big ones like Lords' (Hey, I was born Nov 5, OK?) down to every waste bin that can hold a bomb and every parking space that can hold a car bomb. Every person entering or leaving the city could be a terrorist or a component of a terrorist cell. And, because it's a living, breathing city, you _can't_ control people's movements. There - do you feel _secure_, yet?
Right now, we're working in an environment where it's nearly impossible to tell a "good guy" from a "bad guy". In fact, a bad guy could probably mount a credible defense for a while by merely claiming to be a good guy. That's not possible if the target definition is a bit crisper.I've noticed more hacked websites have posts where the badguys say they just modified the index.html page to prove a point. An attempt to legitimize their actions. Just check out the hacked sites on attrition.org, makes for an interesting read.
Terrorists are full of excuses, too. This is another important consideration in terrorist/counterterrorist operations vis Guerilla warfare. In dealing with terrorists it is absolutely critical to do whatever you can to isolate them from the media. Because the message they are trying to deliver is what they're willing to kill for. The dynamic they are trying to achieve is to get the forces of authority to react to them, and thereby destabilize the political situation by appearing (or being!) heavy-handed in response. As soon as the "good guys" are so jittery that they start searching people on the street or cracking down on people because they look or walk funny, they have accomplished their goal of separating the people from the authorities and making the authorities look scared and ineffective. Now, I'm not saying that law enforcement is _scared_ of hackers, but ineffective might be a word that would fit. The hackers today have the ear of the media to a much greater degree than security practitioners (because they're such snappy dressers?) - so there are lots of parallels. The next question is: what to do about it? The answer's obvious, of course. :) mjr. _______________________________________________ firewall-wizards mailing list firewall-wizards () nfr com http://www.nfr.com/mailman/listinfo/firewall-wizards
Current thread:
- Re: Castles and Security (fwd), (continued)
- Re: Castles and Security (fwd) Darren Reed (Jan 03)
- Re: Castles and Security (fwd) M.Schubert (Jan 04)
- RE: Castles and Security (fwd) Marcus J. Ranum (Jan 03)
- Re: Castles and Security (fwd) Darren Reed (Jan 03)
- Re: Castles and Security Title Randy Grimshaw (Jan 04)
- RE: Castles and Security (fwd) daN. (Jan 03)
- RE: Castles and Security (fwd) Marcus J. Ranum (Jan 04)
- Re: Castles and Security (fwd) Neil Buckley (Jan 05)
- Re: Castles and Security (fwd) Adam Shostack (Jan 08)
- Targeting (was Castles and Security) Stephen P. Berry (Jan 08)
- Re: Castles and Security (fwd) Darren Reed (Jan 03)
- Re: Castles and Security (fwd) Darren Reed (Jan 03)
- Re: Castles and Security (fwd) George Capehart (Jan 05)
- Re: Castles and Security (fwd) Ryan Russell (Jan 08)
- Re: Castles and Security (fwd) George Capehart (Jan 08)