Spaf's Crystal Ball: Network Security Predictions 93
remora writes "Eugene Spafford[?] (of CERIAS, and co-author of "Practical Unix Security") has written an article for Information Security Magazine with eight of his predictions for the coming years in network security. He touches on subjects such as "Spam will grow as a problem" (obviously), to the "Greater emphasis on international cooperation and communication. Some of the article is fairly predictable, but it is still interesting to hear from one of the more experienced security people out there."
Is it just me... (Score:1)
Ultimate Security (Score:1)
Spam is more than a problem (Score:5, Insightful)
If someone was dumping 100 pornographic adverts into your house's mail box each day, or DOSing your website, they can at least get in trouble. But with spam, nothing really is done to stop them, and they just keep on doing it. Convictions are rare and don't disuade them any more than a parking ticket. It needs to be recognised that spam is doing a heck of a lot to undermine the evolution of the internet.
Re:Spam is more than a problem (Score:4, Insightful)
A domain's resistance to this sort of email-finding depends on the vigilance of the admin and the type of email address you have - "cat@domain" will be more likely to be found than "3liteh1dd0n3m4il@domain".
Also, there are the viruses. You can email someone, they get a virus from someone else, boom - every email address on their harddrive is auto-emailed to every other email address on their harddrive - instantly your email address whisks off to every Korean spam-bot this side of Pluto.
I'm guessing you don't get much spam because:
1) Your admin is good
2) You have an unusual email address
3) You don't email people who get viruses
4) You don't post your address to usenet nor list it on places like Slashdot
Re:Spam is more than a problem (Score:4, Insightful)
Now in contrast, I checked my work mail this monrning and it was about 90 percent spam. Why? Someone high up in the college thought it would be a good idea to out our whole college's e-mail directory online. There defense of the idea was we are a public school and must make everything except the stuff voered by FERPA public. I guess our e-mail and snail mail addresses aren't covered there. Anyway, I tried to tell them within a month our whole directory would have been crawled by a spammer and I was right. Everyone's getting high levels of spam. I even get stuff that could be targetted at students even though they have a entirely different domain and everything for their student issued e-mail accounts. Funny thing was they asked our mail server admin to help set this up! (well, he could have been TOLD to do it too)
Re:Spam is more than a problem (Score:2)
People get spam because they aren't careful who they give their address out to. It's as simple as that!
Re:Spam is more than a problem (Score:2, Informative)
We suffered a lot from spam where I work, but since I have installed QMail and rblsmtpd, plus set up local blacklists and whitelists (banning large chunks of the korean network space seems to work wonders) our levels of spam have dropped dramatically. And this is even with morons who still give out their company email address on every single website they can find.
Re:Spam is more than a problem (Score:2)
You mean to tell me a good mail admin has to force crap like this on you in order to reduce spam? HECK NO! Number 4 and possibly number 3 on your list are the only vaild ones. Unusual e-mail addresses will only last about 5 minutes if you try to institute that. The hassle (typing in a mile long e-mail address) is more then it's worth (less spam). Spam reduction happens by BEING A SMART USER! That means, don't give it to every Tom, Dick and Harry. Don't put it on the ladies room wall either. You mean you'd hand person after person on the street a piece of paper with your e-mail address or home address on it? I didn't think so.
In the many years I have been using compuers I have only seen a virus attack come via Code Red and when a stupid admin infected a file everyone touches when they login to the network. Both of these were no fault of my own. I have done what many used to consider risky computing. Downloading from BBS's and the Net. Some people still think that stuff is dangerous. It can be, if you just download and install/run any piece of code! If you practice being a smart user you don't download from websites that look terrible or work terribly. In the BBS days you did not download stuff from a new system until you were on a couple days and got a feel for how the system was run. You don't click on executables you get in E-mail unless you knew it was coming! You don't click OK everytime you see it on the screen! You READ what is on the screen. If everyone would just do simple things like that, even Microsoft systems would be a whole lot safer.
Re:Spam is more than a problem (Score:2)
Re:Spam is more than a problem (Score:2)
This problem will grow unless govt takes more interest in internet and stricter anto-spam laws are there. But the case is that with more govt interference come more evils. The only option is offence, like finding their home numbers and ringing them up at 2am to tell them if they want to buy so and so cream... Mahatma Gandhi once said
"An eye for an eye will make the world blind"
But I guess that seems a better option than my ISP bills.
Re:Spam is more than a problem (Score:2)
I think you mean spamassassin [spamassassin.org] rather than spamassasin [spamassasin.org]. The misspelled-domain squatters are at it again.
Interesting point... (Score:5, Insightful)
"Expect to see several established products fail or be withdrawn because they are too invasive, have unfriendly interfaces, or are found to be considerably less effective than claimed."
This kinda makes me think of the effect that ZoneAlarm have had on the personal firewall market for instance. 3 years ago, firewall technology was clunky and strictly for the network administrator. Nowadays anyone can have a simple to configure basic level of protection thanks to a product that broke the paradigm and set a new standard for ease of use. Of course, the really security consciuos out there still have their infinitely configurable command-line tools, but at the same time, my dad (for instance) can feel comfortable with a product that he can understand.
Re:Interesting point... (Score:3, Interesting)
a) "My machine is completely invulnerable, I have a personal firewall!"
b) The firewall says: "AIEEEEE!!! A dangerous hacking attempt is in progress", and the user panics, because someone pinged his machine.
Re:Interesting point... (Score:4, Insightful)
a) Still be careful with information you give out/files that you open
b) Turn off automatic notification.
It's definitely better than no protection or completely mis-configured protection because the user interface is designed for systems administrators.
Hence the whole point of Zone Alarm as a paradigm-buster.
Re:Interesting point... (Score:2)
Fads and Flash (Score:5, Insightful)
Whats the Use in enabling data streaming over bluetooth when we can't safely sent files over LANS and existing technology
Oh and I really think the advent of Wireless Networks and 3G Systems will open up a whole new Can of Worms in terms of security - We can Already intercept calls over GSM systems, now we're looking to send huge chunks of data via the same systems!
Someone is gonna get burnt...
Re:Fads and Flash (Score:2, Interesting)
We can intercept them, yes. But can we do anything with the intercepted data? I don't think so because it is encyrpted -granted a small key- but that's good enough to kill off the amateur eavesdroppers. It's not like the analog crap of 10 years ago, that anyone with a scanner could listen to
Re:Fads and Flash (Score:2)
Software Engineering (Score:2, Interesting)
1) Apparently this guy hasn't been using windows.
2) He hasn't read the book "Mythical Man Month".
As I see it this statement is not insightful but redundant.
Re:Software Engineering (Score:3, Informative)
1) Apparently this guy hasn't been using windows.
I'm sure he has to some extent, but I believe he uses Mac OS X in his office.
2) He hasn't read the book "Mythical Man Month".
Yes, he has. It was assigned reading for one of the courses he taught.
Recall, this is a predicition, a guess. Wierder predictions have come true.
The reason most people use Windows is because they don't realize they have a choice. For the average consumer who can't handle Linux/BSD/etc. and uses PCs at work and therefore is more comfortable with Windows than MacOS, there realistically isn't a choice. That's why appliance PCs will take off (IMO), if they're designed right. Because of the age old KISS (Keep It Simple, Stupid) formula. If you make it easy enough for everybody to use, they will. That is, as long as they are willing to pay the price for the functionality. That's why appliance PCs have failed so far...
Re:Software Engineering (Score:3, Informative)
What the?! (Score:4, Interesting)
I always thought it was the other way around!
As in we should exercise more caution about closed source systems no matter which one we are advocating !!
Oh well!
Open not necessarily better for security... (Score:3, Insightful)
oTrojaning of popular open source software (such as OpenSSH and tcpdump).
oRepetitive exploits in the same software, such as the recent BIND exploits in the latest version (and the eighty or ninety exploits that came before it).
oProgrammers releasing details of security flaws after their platform is covered but before everybody else has a chance to patch the problem.
So I think he may have a point. Closed source isn't secure, to be sure, but irregardless these continual problems with dealing with security flaws in free software beg the question of whether or not the open source methodology is much better in 'root'ing out problems.
Note: I'm just talking about security, not overall quality of product. I still use open source because I feel it is superior to closed source in so many ways. However, I want to burst this bubble we've collectively got about "Thousands of eyes on the source code mean we're all safer", because obviously it isn't turning out that way.
Re:Open not necessarily better for security... (Score:4, Informative)
Latest version? I don't think so. BIND currently has three main code bases:
v4.x - essentially an ugly, bug ridden hack (or at least it seemed like it).
v8.x - a very stable DNS server, but unfortunately largely built upon the v4.x codebase and inheriting issues galore as a result.
v9.x - A complete rewrite of v8.x, plus extra features, with much more attention paid to code integrity.
Almost ALL of the recent serious BIND exploits, including the recent one you are referring to, have been focused upon the v4.x and 8.x trees. Sure, v9.x isn't without it's problems, but all in all, it's proven to be pretty secure and stable so far.
Re:What the?! (Score:2, Insightful)
Re:Real Network Security (Score:5, Funny)
Oh please don't try and convince me that wireless is more secure!
Re:Real Network Security (Score:2)
No, I meant no network connection at all.
Re:Real Network Security (Score:1)
Oh please don't try and convince me that wireless is more secure!
Or that IR is a practical alternative...
Or that you won't get mugged carrying the CD-Rs between home and office for you sneaknernet...
Re:h4x0r? (Score:1)
http://us.imdb.com/Title?0113243 [imdb.com]
The greatest security risk... (Score:2, Funny)
As far as you web server is concerned, getting slashdotted ranks way up there, along with using IIS (gratuitous MS baching). =)
His point on open source (Score:2)
Is exactly what? Placing open source in that list makes no sense to me. Why?
Re:Its Simple (Score:2)
Yes, it clears some things up *hidden message here* - but not related to my guestion. :)
Re:His point on open source (Score:3, Insightful)
http://www.cerias.purdue.edu/about/related/spon
Re:His point on open source (Score:2, Insightful)
Re:His point on open source (Score:4, Informative)
I believe he mentions it in response to the common belief that OSS is *inherently* more secure than closed source. We use tons of open-source software at CERIAS, so it's not the case that Spaf has a dislike for open source.
-Ed
Re:His point on open source (Score:2)
Thanks for that info :) I guess the thing that I did not understand, is why he put open source inbetween words that describe specific technologies (VOIP, Bluetooth, open source, automated patching, RFIDs and biometrics) - I mean, open source/closed source/shared source whatever are methods(not maybe the correct word, blame my english) under which you can create the other mentioned specific technologies. It just seemed to me that for some reason, he wanted to put open source in that -wrong- family.
Re:His point on open source (Score:1)
I can't speak for him, but I didn't read that deeply into it. I took it as a list of technologies/methods of solving problems that we have to look closely at, because they could be problematic from a security standpoint (mostly because people make assumptions about how secure they are).
-Ed
Spam may not be a problem much longer (Score:4, Informative)
Re:Spam may not be a problem much longer (Score:2)
There's a patch and spiel about an exim module and filter that hooks into SpamAssassin at http://marc.merlins.org/linux/exim/sa.html
HTH,
Re:Spam may not be a problem much longer (Score:4, Insightful)
There was a slashdot article the other day that mentioned the return rate on spam was something like 0.001-0.002%. If a filter that learns can kill 90% of it or more then you can stick an extra 0 in there at least. Let the fuckers burn their money if they wish, but there will be a point when most of them will simply give up.
Re:Spam may not be a problem much longer (Score:1)
(And Bayesian filters are no panacea, nor are they invulnerable, btw; I still get the occasional junk-mail through here, despite my better efforts. I even had one over the weekend that fell back to SpamAssassin and scored over 27 but bogofilter considered clean - simply base64-encoded all its body, and I don't know that bogofilter either handles that well, or if it does, it hadn't been well enough trained against that sort of mail.)
The best way is still a moderately aggressive "just say NO!", not a passive acceptance, IMO. Spam should always be nuked at source.
Re:Spam may not be a problem much longer (Score:1)
Re:Spam may not be a problem much longer (Score:1)
And in the process, more bandwidth will be consumed (which is where the real work-load is inflicted on the 'Net, not and the end-recipient) and the poor eejits out there *not* using these filters will still be getting crap.
cooperation: 'out-share' hackers (Score:5, Insightful)
I like the part about cooperation. Hackers do it for years successfully, while network administrators prefer to sit in their closets under tin-foil hats hoping to preotect themself with obscurity.
Systems to share already exist. Just check the "Internet Storm Center" [incidents.org] and DShield [dshield.org] for a place to exchange logs and ideas.
Re:cooperation: 'out-share' hackers (Score:1)
Most important point (Score:5, Insightful)
Consumers and technologists will continue to be enamored with fads and flash rather than quality and safety. Wireless will continue to be deployed in sensitive locations despite the terrible vulnerabilities and risks. Furthermore, we'll see policymakers and technicians continue to place faith in technology to solve our problems instead of investing in sound management and trained personnel.
The point being that security is frequently misunderstood, isn't sexy and doesn't appeal to the mass market. Possibly the only way to change this is for security to become a major feature of the products (a bit like microsoft is saying it's doing now) so that people will come to expect the security... Somewhat similar to the safety features in cars...
Well I'll be a monkey's uncle! (Score:2, Insightful)
Slashdot reporting on something that says Open Source has security problems? Wow!
For all of you who's wondering what he's talking about, think: trojan in OpenSSL, trojan in libpcap, immediate disclosure of apache vulnerabilities... its not all peaches and cream just because its open. Closed source has some important inherant security benefits.
You must be new here... (Score:2)
Appliances? (Score:5, Insightful)
Spaf apparently believes that consumers aren't capable of dealing with real computers; he thinks dedicated apps and devices are the future.
This reminds me of the NC vs. PC debate. PCs were supposedly too clunky, hard to use, and powerful for the average user; NCs were going to replace them. Eventually, PCs ate NCs.
I believe that looking at this issue from a security point of view is somewhat misleading. As Spaf himself seems to realize, most domestic consumers are misinformed and apathetic about security. The average person will see a refrigerator, that for no good reason, can go online, rather than a secure online service. PCs will still be more versatile than appliances, and will continue to provide more value. Remember how the next big thing 10 years ago was the iCoffeeMaker?
Domestic consumers won't use them. Corporate consumers won't use them. Who will adopt appliances?
Re:Appliances? (Score:5, Interesting)
Re:Appliances? (Score:4, Insightful)
You can only win against a PC if you can offer the NC at "ridiculous" (for past standards) price. Everything should be thin clients if you ask me, and if I need I could "network to my own server" or to a server provider i hired (for my personal apps, my disk space, email, whatever). Everything will be distributed services.
The PC will then be a seens as a "local NC + server" all-in-one.
But we'll have to wait some years. It will be fun:
- No instalation of software
- Almost no configuration, except for user choices
Just imagine: click here to play Doom IV (service cost $0,05 a minute, or buy a monthly pack at $10). Here to launch a word process (prices start at $0,02 (OO) and up to $0,10 (MSO)). Click here for phone service, etc. etc.
Companies offering lots of "service packs" (not the MS ones! Real service packs). Your own computer will be irrelevant, the best stuff WILL NOT INSTALL ON YOUR COMPUTER.
The reasoning behind this is simple: as network speeds become incresingly powerfull, there will an inflexion point in the economics of running a local computer: when the needed "combined" bandwith for using all the applications you need + upgrade to them and updates surpasses the needed bandwith to just broadcat the "video stream" to your computer, network computing will arrive.
And the needed bandwith to broadcast a video signal grows little over time and can even go down (small screens, PDAs) but the bandwith to install new games, OSs, to watch video and applications and to stay current is growing exponentially.
It's just a matter of time! Gone will be the days one will have a computer faster than your friend. You could compile your kernel in 3 seconds in a virtualized mainframe as long as you don't exceed your CPU/hour quota!
People will ask what CPU/hour you are hiring (if you run a server) and how many clients/hour are you serving, not how much mbits you have
Re:Appliances? (Score:2)
X does just that, the application broadcasts you the video inside the window you are using and if you hide the apps, it stops using your bandwith. So you only need need enough bandwidth to fill a screen even if you use many apps (+ some overhead).
Re:Appliances? (Score:2)
Re:Appliances? (Score:2, Informative)
For instance, I have a store bought firewall. I have an extra box that I could have made into a linux firewall, but i just didn't feel like it. There was a time when I might have done it for the educational benefits, but there are other things I want to do and people I want to those thing with.
This was also what was great about the original Mac. I don't know if anyone remembers the morass of the pc world 20 years ago. Hacked up cables, printer codes in word processor documents, device drivers for each program, networks that were hand configured, if not coded. The original Mac ushered in a world of microcomputers and component that just worked. Cables would work, layers were abstracted so one printer driver, or set of menus, or modem drivers, would work for all applications. It was a box on the table that let the user compute. It was, in fact, an appliance. Like a TV things could be plugged into it. MS ran with part of this idea, but for the most part never fully implemented the 'appliance' part.
A big reason we do not have such a device is that MS sucks at embedded software and lives at the teat of yearly upgrade cycles, and has convinced consumers that MS is the only solution. For instance, I tried to give one relative a old mac that did exactly what she wanted, did not need to be upgraded every month(it was very stable software that had not been upgraded in two years). The problem was she was so indoctrinated into the MS world and did not believe that this machine could do what she wanted. She basically was so branded by MS that anything else would not do. So now she has a machine that does not consistently work, and will have this machine until MS and companies like Dell develop machine that just works. I am not holding my breath.
So yes I do expect to see many computing devices being made into appliances. I know my life would be much easier if I could just give my relatives a secure box that they can plug into the wall and use. It would dial, download mail and surf the web. It would not be so flexible that it could run spyware, download webbugs in email, or become owned.
Re:Appliances? (Score:2)
Game consoles.
Re:Appliances? (Score:3, Insightful)
When you want to do one job, and do it well, a dedicated piece of hardware almost always wins out over a general-purpose computer. Can a PC with 2 nics and the appropriate software do everything a high-end router can do? Sure it can. Then why do people by dedicated routers? Because they are more reliable, have better performance, consume less power, and are simpler to administer. It's the same reason you have a toaster and an oven. A toater does one thing: it converts bread into toast easily, reliably, and efficiently. You can't cook your Thanksgiving turkey in the toaster, but that's why you have an oven. You can make toast in your regular oven, but it takes more power, it's easier to burn it, and it's far less convienient.
predictions? hardly ... (Score:2, Interesting)
1) Consumers will never be able to 'distinguish safe code from the typical dreck they're used to buying' just because there's no _SAFE_ code and they're not supposed to do so. They're _CONSUMERS_.
2) Yes the sales of security products will grow, US goverment and media are working around the clock with their 'war on human rights'.
3) I don't understand the point behind this rant.
4) The spam _IS_ a problem already, but there're effective solutions. Smart ISP already offer SPAM filtering service.
5) I hope he's not talking about US DOJ way of international cooperation when any human being living on earth is subject to US laws, which is also known as "All your ass belongs to us".
6) When lawyers and insurance companies jump in, software prices will skyrocket and we're going to see even more stupid EULAs and laws. That's the way lawyers work.
7) Oh, consumers _ALWAYS_ focus on wrong things, it's hardly any news. But, honestly who made him (or me) god to say: What you do is the wrong thing?
8) Open source isn't technology it's more a philosophy, a way of thinking. Other mentioned technologies can be safe enough for average consumer or company when implemented properly. Even matches are dangerous technology in the fire-lighter's hands.
Caution with open source? (Score:4, Insightful)
It would be nice if he could give us a concrete reason why we should "exercise caution" with open source. Does he really have a valid point, or is he just propogating the "open source is less secure because crackers can see the code" myth?
Re:Caution with open source? (Score:3, Informative)
Why is that a bad thing? Risk Analysis... You can never achieve 100% security. At best, you can develop a plan that takes into account most anything that can go wrong: Fire, Burglary, Natural Disaster, Hacking, etc. If you blindly trust a component, then your risk analysis isn't worth anything.
PS: Spaf... See... I wasn't asleep in class.
Re:Caution with open source? (Score:3, Insightful)
Open source may or may not be more secure because it allows for independent code review. It is NOT, however, inherently secure which is something that some people seem to think.
What he's saying is that none of these things are a panacea. We can't say that we're secure because we use open source software (like tcpdump, sendmail, BIND), nor can we say that we're safe from bad guys because of biometrics.
He's reminding us of the fundamental point of security: It's a journey, not a destination. The technologies that he mentioned are great cases of either or both (a) easily breakable technology, and (b) technology that too many people are willing to wave their hands at and call 'secure.'
Caution is a fair attitude, I'd say.
Iris firewall/filter appliance. (Score:3, Funny)
Ok, yes, I watch too much Sci-Fi channel...
Ineffective laws (Score:2, Informative)
As reports of spectacular security failures increase, the public will feel more and more insecure. Instead of taking their own responsibility, they will turn to the lawmakers to provide them with laws that will give them back their security. These laws will come, since the lawmakers have to do something, even if the effect would be largely debatable.
One point where I disagree (Score:2, Interesting)
The last thing I want is all my security tools prepackaged in my OS. Not all intrusion detection is the same. Not all firewalls are the same. I want to be able to pick the tools that make sense for the needs of my network. I want to be able to run some of my critical security services on separate dedicated boxes from critical network services. (Obviously the firewall, but other stuff too.) I want to create multiple layers of security distributed around my network. I don't want the OS of my production box to give away all the details of my security posture.
We all know that admins out there fail to keep up patch levels at an enormous rate, let alone creating a well designed multi-layered security posture. Maybe rolling it all into one box would simplify the job of getting to a minimally secure configuration. But seriously, who doesn't believe that the black-hats wouldn't have a field day with this? He talks about real solutions, but the only real solution, now or 10 years from now, is hiring IT security experts to create and maintain a real comprehensive security solution.
I don't disagree that "underlying systems" need to be "rearchitected" to meet basic security needs, if that means, for example, that MS needs a radically different approach to integrating security concerns into the OS development process. But that isn't a solution to the problems addressed by what he calls "add-on" security tools. That's a different problem, and an important one. But no matter how well designed my underlying OS, I'm still going to put it behind a firewall, I'm still going to run some sort of IDS, I'm still going to monitor the logs, and I want control over how I do those things.
Or maybe I'm reading his relatively sketchy argument wrong, but I can't figure out a different way to take it.
Open up first, secure later... (Score:1)
For that reason, I think eventually every commincation protocol will have requirements that clearance to send be requested before the actual payload is allowed. And furthermore, upstream routers would remember when permission is denied for a limited time and repeat the denial, therefore cutting off DOS attacks early in their journey, and assuring most people still have access to the apparent target.
Interview with Spaf: more DEPTH (Score:2)
This interview with Spaf [geartest.com] goes into much more depth about his thinking about security -- or 'assurance' as he says -- because '...security really is a property that's an absolute that we can never quite achieve.'
Read the interview. [geartest.com]
Last Post! (Score:1)
miles closer to globular cluster M13 in the constellation Hercules, and
still there are some misfits who continue to insist that there is no
such thing as progress.
-- Ransom K. Ferm
- this post brought to you by the Automated Last Post Generator...