Ah. I see. I was thinking only of one part of this argument (the application
trying to spawn new  rouge processes), not the idea of the application
becoming rouge itself.


The first comment of the blog post[0] is excellent. And pretty much answers
my main questions:

"First, you have to pay attention to exploits that inject code into running
processes. Since these processes are already running in memory, the
whitelister will not pick up on the overflow. So, patching of those high
risk network services still needs to be a priority. However, you will see if
the exploit is blocked while attempting to create new files or processes,
which helps in determining if you are infected.

Second, never ever never ever put the whitelist on unless you are absolutely
sure you are finished with the box. Otherwise, you will have to back out and
reapply, which can take a good deal of time. Lack of proper planning will
hurt you with whitelisting. Since most owners are concerned about time spent
on security controls, they should be requiring a detailed game plan when
implementing and managing a whitelisted set of systems. And “reapply
whitelist” should always be the very last step.

Third, unintended consequences. I’ve personally had an experience where we
set up a trusted account to apply patches, and the whitelister flaked. It
refused to apply the patches because of the way the patches invoked
permissions from other (non protected) accounts. Very annoying, and since we
didn’t want to add those accounts to the ‘allowed’ list, we had to back out
of the whitelist, patch, regenerate, and reapply. Proper testing should pick
out this issue before it hits production, but there are many ways to install
a patch that could cause this type of situation.

Fourth, in order to run certain kinds of vulnerability assessments,
especially third party ones with custom tools, the whitelister must be
disabled to allow tools to be loaded on the machine. This means that you are
opening the system up to an outside party, so make absolutely sure they
aren’t infected. With the whitelister turned off, owners need to realize
they are at the mercy of the 3rd party’s security. And when the 3rd party is
finished, you may have to regenerate a whitelist, bringing the newly loaded
viruses into the ‘allowed’ list. So, owners should put procedures in place
for 3rd party interaction with the system to minimize this very real risk.

Michael Toecker
Burns & McDonnell"


[0]:
http://www.digitalbond.com/index.php/2009/09/21/another-look-at-application-whitelisting-in-control-systems/

On Fri, Oct 9, 2009 at 2:25 AM, <da...@lang.hm> wrote:

> On Thu, 8 Oct 2009, Joseph Kern wrote:
>
>  On Thu, Oct 8, 2009 at 12:48 AM,  <da...@lang.hm> wrote:
>>
>>> On Wed, 7 Oct 2009, Joseph Kern wrote:
>>>
>>>  Does anyone have experience with using application whitelisting on
>>>> user workstations? This would be used instead of anti-virus.
>>>>
>>>
>>> the problem with doing this _instead_ of AV is that many vunerabilities
>>> come
>>> through 'data' files, and then go on to infect legitimate files.
>>>
>>
>> *narrows eyes* are you sure about this? I thought the execution of all
>> code had to be "vetted". This would include even errant chunks of
>> overflows ... I thought.
>>
>
> possibly we are using different defintions for whitelisting.
>
> I am thinking that you would whitelist particular binaries (say firefox or
> acroread) and then allow those to execute (doing whatever it is that they
> do)
>
> since both of these apps have had vunerabilities that will let the attacker
> execute arbatrary code by feeding them invalid files you hve not solved the
> problem yet.
>
> if you re using whitelisting to mean 'firefox is allowed to read these
> files, and write to those files' or something like this you may have a
> chance, but that's a lot further than I would have thought the term would
> mean. If that is what you mean, then you need to write a custom SELinux (or
> equivalent) policy for every application on your system. It will need to be
> significantly tighter than what any linux distro currently uses.
>
> David Lang
>
>
>  so just whitelisting isn't going to be enough, you are going to also need
>>> to
>>> do tamper detection (tripwire or equivalent)
>>>
>>>
>>> you also are going to have to figure out how to deal with users wanting
>>> to
>>> install things like browser toolbars and plugins.
>>>
>>
>> Users aren't allowed to anyway. So this isn't a problem.
>>
>>
>>> David Lang
>>>
>>>  Any help or opinions will be most welcome. I am interested in doing a
>>>> few experiments, and comparing different products. I want to test the
>>>> complexity and viability of using a whitelist on a single workstation
>>>> instead of an AV product that needs updating.
>>>>
>>>> It seems to be hard even locating free demos of any software. I've
>>>> been googling around a bit, but real opinions are more valuable than
>>>> white papers.
>>>>
>>>> 1. What whitelisting applications have you tried?
>>>> 2. What did you like?
>>>> 3. What did you dislike?
>>>>
>>>> Thanks.
>>>>
>>>> -- Joseph Kern
>>>> _______________________________________________
>>>> Discuss mailing list
>>>> Discuss@lopsa.org
>>>> http://lopsa.org/cgi-bin/mailman/listinfo/discuss
>>>> This list provided by the League of Professional System Administrators
>>>> http://lopsa.org/
>>>>
>>>>
>>>
>>
_______________________________________________
Discuss mailing list
Discuss@lopsa.org
http://lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to