Date: Wed, 24 Apr 2002 11:54:14 +0200 From: Andy Sporner <sporner@nentec.de> To: Terry Lambert <tlambert2@mindspring.com> Cc: Robert Watson <rwatson@FreeBSD.ORG>, "Greg 'groggy' Lehey" <grog@FreeBSD.ORG>, Jordan Hubbard <jkh@winston.freebsd.org>, Oscar Bonilla <obonilla@galileo.edu>, Anthony Schneider <aschneid@mail.slc.edu>, Mike Meyer <mwm-dated-1019955884.8b118e@mired.org>, hackers@FreeBSD.ORG Subject: Re: Security through obscurity? (was: ssh + compiled-in SKEY support considered harmful?) Message-ID: <3CC680C6.2020608@nentec.de> References: <Pine.NEB.3.96L.1020423213946.55944I-100000@fledge.watson.org> <3CC67F5E.44FC802D@mindspring.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi,
I hate to jump into this fray, but if this is going to be a public
thread, will
everybody make the reply to the list??? :-) So far I only see Terry's
emails.
Thanks!
Andy
Terry Lambert wrote:
>Robert Watson wrote:
>
>>On Tue, 23 Apr 2002, Terry Lambert wrote:
>>
>>>>The reality is that reducing exposure is an important part of any security
>>>>posture.
>>>>
>>>This is an argument for security through obscurity.
>>>
>>>If we are talking risk reduction, then we can easily achieve it
>>>statistically through obscurity. In fact, this is exactly what FreeBSD
>>>does through its choice of TCP sequence numbers.
>>>
>>"Security by obscurity" refers to a behavioral phenomena in system design
>>and delivery, not to a technical design principle. For example, it refers
>>to using a secret algorithm, but does not refer to using a secret key with
>>a published algorithm. So disabling services in a default configuration
>>reduces risk by reducing exposure, but it's not security by obscurity.
>>
>
>However, if the goal is risk reduction, then "securty by
>obscurity" arguably reduces risk.
>
>
>>When shipping third party code, or our own code, we accept that some code
>>is more at risk than other code. That risk might be the result of
>>complexity, privilege, exposure, ... Whatever the reason, it's
>>disingenuous to sweep it under the rug ("all our code is good, so we ship
>>it all turned on") rather than select safe defaults and let people turn on
>>what they need.
>>
>
>This somewhat drops us into the "What is UNIX?" argument. I
>don't think you want to go there.
>
>
>>>Application state is not necessary for incoming connections which are
>>>self-identified by source and destination IP and port; the existing
>>>stateless firewall code can handle them completely, without introducing
>>>problems.
>>>
>>X arguments that disable the X11 protocol over TCP will work regardless of
>>the configured TCP port for XFree86. Firewall rules won't. Also,
>>firewall rules may interfere with other applications, where X11
>>configuration won't. Both have their place.
>>
>
>I can run sendmail on another port as well. At some point, you
>have to accept that there are Schelling points where policy and
>implementation can rendesvous. It's not reasonable to argue that
>an external mechanism is unusable because someone *might* start
>X11 with a different port. They *might* start it with the argument
>that reenables TCP. The coupling argument you are making here is
>specious: the default model for firewall protection is "disable
>everything by default, and enable only that which is explicitly
>permitted".
>
>The point is that there is already a model for TCP service protection,
>and adding another frob on the side of each server for it really
>obfuscates the application of a uniform model to the problem.
>
>If we grant for a moment your argment "complexity := vulnerability",
>then this increase of complexity is a problem, isn't it?
>
>
>>>Actually, it would be more useful to concentrate on so-called "stealth
>>>firewall" technology, so that OS identification due to port scans, etc.,
>>>is impossible, and so it looks as if there is no machine there
>>>whatsoever, if there are no services actively listening AND access is
>>>permitted to the source machine.
>>>
>>No doubt an interesting area to explore.
>>
>
>Mostly, it boils down to dropping packets instead of sending RSTs
>or ACKs.
>
>-- Terry
>
>To Unsubscribe: send mail to majordomo@FreeBSD.org
>with "unsubscribe freebsd-hackers" in the body of the message
>
>
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3CC680C6.2020608>
