[Info-vax] Communications security, was: Re: New VSI Roadmap (yipee!)

Simon Clubley clubley at remove_me.eisner.decus.org-Earth.UFP
Sun Mar 1 08:40:07 EST 2015


On 2015-02-28, johnwallace4 at yahoo.co.uk <johnwallace4 at yahoo.co.uk> wrote:
> On Saturday, 28 February 2015 21:33:42 UTC, David Froble  wrote:
>> 
>> You're going to make Kerry unhappy ........
>> 
>> You're both right, today's practices are poor to downright bad.
>> 
>> Look at the anti-virus programs.  They may check for known problems, but 
>> otherwise they just let things go through.  Perhaps this is the real 
>> problem.
>> 
>> Now, I'm not saying the following would work.  But it's what I've been 
>> thinking about.
>> 
>> Instead of letting communications happen unless a known problem is 
>> found, perhaps what needs to happen, at least in some cases, is only 
>> letting communications pass that are known and expected.  Yeah, that 
>> would be a lot of work, perhaps way too much.  Sure wouldn't work for 
>> Susie doing Facebook.
>> 
>> Maybe some type of communications manager that controls what traffic can 
>> reach the computer.  Actually knows what the communications are and what 
>> they will be doing.
>> 

It isn't just the traffic reaching the computer you have to worry about.
You also have to plan for the day when a way through your defences is
found and your system gets compromised.

In that case, you also have to worry about unusual _outgoing_ connections.

>> While I don't have what I'd consider an answer, I do feel that the way 
>> things are done now just isn't ever going to work.
>
> Somebody (Simon?) might be along soon suggesting looking at (for example)
> SELinux. And they'd have a very fair starting point.
>

Oh great, Simon's getting predictable. :-)

I have actually done something like this multiple times. For one example,
with Apache I configured a SELinux policy to allow a PHP script to
open an outgoing connection to a specific target port (so it could
access some information) but I banned it from being able to create
outgoing connections to other random ports.

Yes, it's work to setup and it's certainly no silver bullet, but I felt
more comfortable knowing that if that script had ever got compromised,
then, regardless of what it _tried_ to do, this was a good step to try
and cut down the number of ways it could actually be abused and increase
the chances the breach would actually be contained.

SELinux is a good step (and one I use), however in the end, it's only a
step. It's never wise to rely on a single security feature in isolation.

Simon.

-- 
Simon Clubley, clubley at remove_me.eisner.decus.org-Earth.UFP
Microsoft: Bringing you 1980s technology to a 21st century world



More information about the Info-vax mailing list