Intrusion Detection Systems mailing list archives
Re: NFR vs. RealSecure Recommendation
From: "Marcus J. Ranum" <mjr () nfr net>
Date: Fri, 15 Sep 2000 13:09:32 -0400
Archive: http://msgs.securepoint.com/ids FAQ: http://www.ticm.com/kb/faq/idsfaq.html IDS: http://www-rnks.informatik.tu-cottbus.de/~sobirey/ids.html HELP: Having problems... email questions to ids-owner () uow edu au NOTE: Remove this section from reply msgs otherwise the msg will bounce. SPAM: DO NOT send unsolicted mail to this list. UNSUBSCRIBE: email "unsubscribe ids" to majordomo () uow edu au ----------------------------------------------------------------------------- Elliot Turner wrote:
NFR utilizes 'n-code', which is considered configuration data, an attacker could subsequently disable all detection activities on the IDS host by simply changing or removing the 'n-code' files on the appliance hard disk.
That's conceivably possible, but it's a hell of a lot harder than messing with a system that's got a full-blown operating system on it. Since there are no file manipulation utilities on an IDA you'd have to find something you could buffer overrun and use raw system calls to rewrite config files. With the way we configure things, if you just deleted the config files, you'd actually generate a load of reported errors. Anyhow, I sense a bit of sour grapes, Elliot. What does Mimestar do? You run on Linux, right? So your users have to secure Linux and then install your product? I can see why you'd want to try to find flaws with our approach... :)
2). An attacker could modify system CMOS settings to bypass the CD-ROM entirely, booting from the hard disk.
When we lay out the hard disk, we don't even put a boot sector on it. So you'd have to repartition it and make it bootable. At that point, why bother? It'd clearly not look like an NFR anymore. Also, you'd have to get a new boot block onto the machine - kind of a trick without any executables or command interpreters to work with.
They could then install a trojaned kernel and file-system directly on the hard disk, thus skipping the NFR CD-ROM and completely compromising the machine.
They could also send paratroopers in to seize the computer room at gunpoint and shoot holes in the hard disk. Which would be every bit as obvious as replacing our kernel with someone else's. Our kernel doesn't look or act like a normal UNIX kernel. So you'd have to build your own custom NFR kernel. Nobody who understands security will tell you that something can be perfect against every possible (no matter how ridiculously contrived) scenario. All I'm saying is that I believe the way we designed the IDA's operating environment is light-years ahead in terms of security _and_ convenience. Other systems (including yours, apparently) make the user worry about Linux security or NT security or Solaris security. Other systems make the user install a kernel, partition disks, install patches, etc ad nauseam. Other systems, when a hacker breaks into them, offers the hacker a comfortable operating environment complete with command interpreter, PERL, FTP and ssh. Aren't you carrying sour grapes a bit far, Elliot? Can you explain how your approach is better than ours, security-wise or management-wise?
our install process. NFR can be installed and managed by a secretary instead of someone who makes $80,000/year.Okay, let's seriously think about this. Installation, sure. But anyone with a decent amount of IDS experience knows that any current system, NFR included, cannot be managed by a mother who has little to no computer experience (not to mention security experience).
Sure, but you've missed the point. The way our customers deploy NFR, they have an NFR central in a secure location, usually a NOC. The people who manage the NOC systems and the central are typically security savvy administrators. But, with our super-easy way of installing an IDA, it's not necessary to send those savvy administrators out to install the sensors. Anyone can install a sensor and have it talking back to a NOC in minutes. So you can use your staff most effectively. When you configure a central to recognize a new IDA one of the things you can do is have it write a configuration floppy disk that contains all the settings the IDA will need to talk to the central. If the floppy is in the IDA when it boots the first time, it'll pull the configuration files directly in, without requiring any user intervention at all (except for where it asks "are you sure it's OK to erase the hard disk and use it for NFR data?") So you could conceivably just mail someone the floppy and the CDROM, tell them "put these in a machine, plug it in and turn it on" and wait for the data to appear at your NOC. Now, that, my friends, is slick. ;)
IDS solutions generate lots of data, and require knowledge of deployment in order to mesh in with existing network hardware configurations.
See above.
Even with a good attack description/resolution database, knowledge of the network is required to know whether or not certain attacks were successful or merely "door-knocks". I doubt anyone's mother knows if they have the version of IIS that was patched against the .HTR overflow vulnerability installed on their network. They probably don't even know what IIS is.
You've fallen into the mindset-trap of most first generation ID systems. The person who installs a system does not have to be the same as the person who manages it. Who, in turn, does not have to be the same person who consumes its data. We never assume that the people processing the data from an NFR are ignorami. We're just saying we made our sensors so that ignorami can install them, so that your valuable administrators can do what they're good at, instead of wasting time running around installing NT or Linux or Solaris and locking them down and patching them, etc.
<snip> While this message may sound critical, it's not entirely intended to be as such. I think NFR has done some interesting work in the intrusion detection field.
It's OK to be critical, Elliot. We welcome these kind of dialogs with other practitioners in the field. On the other hand, let me hold you to a standard of intellectual honesty. While you're trying to poke criticisms at _our_ solution, you're manifestly failing to tell anyone how your approach is better. So you come off a bit as sour grapes, don't you think?
However I also believe that there is no current perfect solution, in regard to security of an appliance host OS or management (IE: The "mom" factor).
Nothing's ever perfect; anyone with any integrity will know that and admit it. All a security product designer can do is build the best stuff they know how to build - that's what we do. Bluster aside, I think we've raised the bar for manageability and security of intrusion detection systems. Y'all will catch up eventually, but by then maybe I'll have thought of something better than the IDA. :) mjr. ----- Marcus J. Ranum Chief Technology Officer, Network Flight Recorder, Inc. Work: http://www.nfr.net Personal: http://www.ranum.com
Current thread:
- Re: NFR vs. RealSecure Recommendation Marcus J. Ranum (Sep 16)
- Re: Re: NFR vs. RealSecure Recommendation mark . teicher (Sep 16)
