Hi Rich!

On Fri, Feb 19, 2010 at 7:52 AM, Rich Kulawiec <r...@gsp.org> wrote:
> On Wed, Feb 17, 2010 at 10:59:05PM -0500, Jason Beaudoin wrote:
>> As I often have greater respect for a much larger portion of this list
>> than the rest of the internet, I am curious what is thought about
>> current IDS/IPS hardware from vendors like Trustwave, Checkpoint,
>> Alert Logic, mod_security, even snort.. etc, and in particular, the
>> sensibility and effectiveness of using them in high-security
>> environments.
>
> They're very-overpriced junk.

I'm not going to argue, and this discussion has certainly brought up a
few good points which enumerate why, I had just been hoping that the
investment spent would not go towards hardware or a crap system, as
much as the service of having someone looking over the information.

> Let me explain why.
>
> First, if you're using a good firewall (like pf on OpenBSD) and you've
> configured it sensibly (read: default deny-all, bidirectionally) and
> you've done the other things that good network and system design tell
> you to do, then you've done far more for your operation's security
> than any of these overpriced overhyped devices will do for you.

agreed, my situation isn't one with overall flexibility - an IDS/IPS
is a compliance requirement, but I don't really see a commercial
solution fitting my network so much any more.

> Don't forget the value of application-aware proxies behind a
> stateful packet filter.

yes, I am considering mod_security for this, though I'm still trying
to determine how to best organize it, as I just put in an nginx proxy.


> And don't forget to drop packets to/from as much of the Internet
> as you can -- see ipdeny.com.  (Do you *really* need to allow incoming
> port 22 connections from Korea?  Peru?  the US?)  Also use the Spamhaus
> DROP list in your perimeter devices *and* in onboard firewalls just in
> case there's a configuration screwup.  Once you've done this, you
> can fret a lot less about what particular SQL injection attack is
> being carried via HTTP...because you're not even allowing [most of]
> the packets to get anywhere near a web server.

Definitely great suggestions - and while our client-base is
international, and we do travel, I can still use this selectively and
it makes sense to do even with the added overhead to maintain.

> Second, these devices are guaranteed to fail when you'll need them most:
> when an attack comes that they don't have a signature for, won't recognize,
> and won't stop.  (And please don't anyone tell me that this won't happen:
> the Bad Guys can test against them, too, you know.)  See Marcus Ranum's
> "Six Dumbest Ideas in Computer Security" and note #2: "Enumerating
> Badness", which is expounds the fundamental error that all these devices
> make.  Quoting Ranum:
>
>        One clear symptom that you have a case of "Enumerating Badness"
>        is that you've got a system or software that needs signature
>        updates on a regular basis, or a system that lets past a new
>        worm that it hasn't seen before.
>
> Yeah.  Like that.

Indeed. see the ref below

> Third, any sufficiently determined attacker will either bypass or elude
> these devices.  I don't know where you are, what your operation is, etc.,
> but I'll bet that if I *really* wanted to get inside it, that handing
> out free USB memory sticks (with your company's logo on them) to your
> colleagues in the parking lot would be enough to gain a foothold.
> So rather than buying one of these, I think a much more prudent step
> would be to install *internal* firewalls that treat end-user systems
> as untrusted.

Here's a great article that exemplifies the results:
http://www.informationweek.com/blog/main/archives/2010/02/another_massive.htm
l


> To put it another way: your own users are easily the biggest threat.
> Presume that they are either apathetic, idiotic, or actively hostile,
> and defend accordingly.
>
> ---Rsk
>
>

indeed, hence the challenge. thank you for sharing!

~Jason

Reply via email to