I agree Alexander--if you're trying to manage system executables with
SAFER policy its going to be a maintenance hassle over time. I think if
your approach is to implicitly disallow everything and then try and
allow all OS executables, you're going to have a big headache, between
getting all the OS exes right and keeping up with patch changes to them.
Cert. rules work ok but lots of apps, esp. line-of-business ones, are
not typically signed, so this could be a problem. Bottom line is that I
think SAFER is only part of a multi-pronged strategy for controlling
what executes on a system and is probably best used for explicitly
denying execution of known exes, paths, certs, etc.

My .02,

Darren



-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Alexander
Suhovey
Sent: Tuesday, February 14, 2006 11:02 AM
To: Alexander Suhovey
Subject: RE: [ActiveDir] Hash-based Software Restriction Policy


I wonder if this approach would work in modern hostile environment where
patches just keep coming. Don't you think that locking down
workstation(s) in this way will put a great deal of additional work to
the change management process? In case you don't have one you'll really
need it. You see, with every change (patches and updates for OS and
software) of binary base on your clients first you will need to find out
changed binaries, add new hashes (including those of setup files)  to
GPO, then wait for policy to propagate, and only after that you can
start making actual changes. And this is all in addition to your usual
QA process for changes. Sounds like quite a lot of work to me.
I'd use Certificate policies instead. MS as well as major sw vendors
usually sign executables. By using certificate policies you achieve at
least same level of security as with hashes and  guess what - you don't
need to maintain a huge and ever growing list of hashes, just a few
software signing certificates you trust. As for executables that are not
signed, you can always use your own certificate trusted by your clients.

Don't get me wrong, I'm not trying to say that hash-based software
restriction policy is evil, its beautiful. I'm just curious if it is
worthy and workable in real corp. environments. Anyone?

--Al


> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Clay, Justin 
> (ITS)
> Sent: Monday, February 13, 2006 10:27 PM
> To: [email protected]
> Subject: [ActiveDir] Hash-based Software Restriction Policy
> 
> Hey All,
> 
>  
> 
> I was curious if any of you have set up hash-based software 
> restriction policies. I'd like to set up a policy to only allow the 
> executables that I've hashed to run, and I'm hoping that someone has a

> list of all of the base executables I'll need to hash just for WinXP 
> to boot and log in successfully.
> Hopefully someone else has already done the work, so that I don't have

> to use trial and error to figure out all the exe's I need to hash.
> 
>  
> 
> Thanks,
> 
>  
> 
> Justin Clay
> ITS Enterprise Services
> Metropolitan Government of Nashville and Davidson County 
> Howard School Building
> Phone: (615) 880-2573
> 
>  
> 
> 
> 
> ITS ENTERPRISE SERVICES EMAIL NOTICE
> 
> The information contained in this email and any attachments 
> is confidential and may be subject to copyright or other 
> intellectual property protection. If you are not the intended 
> recipient, you are not authorized to use or disclose this 
> information, and we request that you notify us by reply mail 
> or telephone and delete the original message from your mail system.
>       
> 


List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive:
http://www.mail-archive.com/activedir%40mail.activedir.org/
List info   : http://www.activedir.org/List.aspx
List FAQ    : http://www.activedir.org/ListFAQ.aspx
List archive: http://www.mail-archive.com/activedir%40mail.activedir.org/

Reply via email to