-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Monday 13 January 2003 09:47, Kevin Anderson wrote:
> I don't agree with this.  Most worms run code, and before it can run, it
> needs to be loaded by the OS.  And antivirus should step in at that point.
> At least in theory.

not even in theory. =/ once a process has root priveleges there is very little 
one can do. a very simple and fairly common exploit is to open a remote shell 
that has root privs. if one of your active daemons has some sort of 
vulnerability that allows execution of code or a command, this is quite 
trivial to do. so the active intrusion is actually committed by a program you 
trust. and once that intrusion has been made, all there is a shell which can 
be used to execute other fairly normal (albeit w/root priveleges) commands. 
now, with root one can stop antivirus/worm software, unload kernel mods (or 
worse yet, load them), etc...

the most effective automated antivirus type defense would require being a 
kernel module, a LOT of intelligence and would have to filter all activity on 
the box (network, process and file). this would cause a noticeable drain on 
resources, be circumventable by anything with root privs and still not be 
able to catch many of the possible attacks.

bottom line: you won't prevent a worm getting on your box with the sort of 
software that kills computer viruses. and once you box is compromised, it's 
really quite too late and it's time to reinstall. in some cases, the worm 
deposits a very predictable and well known set of files that can be cleaned 
up and the attacker may not have taken advantage of his newly won resources. 
but it's really quite hard to know for sure.

no, the true solution is what Trevor mentioned: keeping up with security 
patches. and yes, today's autoupdaters are pretty damn reliable, at least 
when it comes to security updates, so that's a great step forward. much 
better than catching the beast after the damage is already done.

firewalls, IDS's, judicious allowance of root privs and only running the 
services you need also help quite a lot. all of those are preventative 
measures that really do work.

if this wasn't the case, things like firewalls and IDS's wouldn't the shiznet 
on servers and all those security people would be urging you to put antivirus 
software on them to protect against attacks.

> Slapper ran code.  Lion ran code.  It didn't come and go, it came, and sat
> running, and running, and running.  AV software could and would catch it.

again, too late. if it's running, it's game over. it's trivial to have a 
payload randomly rename pieces of itself, let alone utter a kill -9 on your 
antivirus software. also, it's non-trivial to lock down potential abuses of 
regular system resources without seriously hampering legitimate usage.

> The transfer of the code to the system may be undetected originally, but it
> would be caught when it tried to run. 

therein's the problem: the original intrusion is often done by running 
malicious code. if you can't detect that, the intruder has all sorts of 
opportunity to do nasty things. unless, of course, you aren't going to allow 
even root to shut down your AV software and you're going to set it up to 
assume that any program that isn't running right now is a virus.

# ls -l
SillyPutty AntiVirus: Potential worm activity has been identified.

> (excepting a rootkit). 

hrm? how would this be different? 

i'm curious: have you played with rootkits or other cracking "tools" much?

> How many machines are still running Slapper, for example? 

too many... 

> And will until it is cleaned from their system.  Even if I accept that a 
> worm moves faster than
> AV updating a DAT file (and I'm not sold on that),

there was a paper doing the rounds in the infosec community last year that 
showed mathematically how a worm that utilizes some half-decently intelligent 
algorithms could sweep across the 'Net in a matter of minutes. code red 
wasn't lucky, math is just very powerful. but even in a more tame scenario of 
several hours, will your AV software co be able to notice it, study it, 
create a reliable fingerprint, and have it on your system within a few hours 
of it launching on the 'net? highly, highly doubtful. these things usually go 
undetected for longer than that.

> I'd still rather see the
> issue resolved by AV software 10 days after the initial attack than not at
> all.

if people are going to use and keep up their AV software, then why not more 
useful approaches that actually work to prevent the problems? of course, AV 
software is so successful on the relatively tame email virus that we hardly 
ever see those around on the 'net...

> Rootkits are cool.  I played with a Windows rootkit once, and it was the
> coolest thing I had ever seen.

heh... just don't say that outloud in front of anyone who's serious in the 
infosec world. rootkits, at least the sort that you can get easily off the 
net (and especially ones for windows), are usually considered the toys of the 
incompetant (scriptkiddies) and are subjects of general derision.

i think you'd love the infosec game, though.. you really should check it out. 
be prepared to do a lot of learning and listening because there are some 
frighteningly brilliant people out there who have a lot to teach. you may 
find whole new worlds out there....

> Linux has tripwire which may not prevent a rootkit from being installed,
> but it should help detect it's presence after the fact. 

yes.

> Though I think rootkits are less common on Windows than Linux.

historically because UNIX is a nicer target and because the windows 
architecture doesn't lend itself to rootkits as nicely as UNIX does. a simple 
backdoor program is usually more effective on win32. win32 is pretty boring 
over the 'net, though many find it quite proffitable =/ exciting and profit 
are not always linked in the world of computer intrusion...

> I updated an RPM for RH7.2 a few months ago, and it kyboshed the admin
> tools for my mail server.  Nothing serious, but it was annoying...  Apache
> was updated, and it rendered some links to our webserver invalid (It
> deleted the links. (ln -s linkname, not the pages)).  Sure, that affects
> only me, but both the mail package and the RPM were developed specifically
> for that version of Red Hat.

you replace files that belonged to the apache rpm? that's ... odd =) you are 
right that even package managers aren't unbreakable, but they do have the 
benefit of not randomly falling apart. it usually takes some conspiring with 
the operator (and yes, i've occassionally been that operator ;)

- -- 
Aaron J. Seigo
GPG Fingerprint: 8B8B 2209 0C6F 7C47 B1EA  EE75 D6B7 2EB1 A7F1 DB43

"Everything should be made as simple as possible, but not simpler"
    - Albert Einstein
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE+I45r1rcusafx20MRAk/rAJ9Dc6qkUvwzMTbkKdr822vo51n40ACdFt2r
qwQg1dHgDgnd8yon8jDg0b8=
=Irh8
-----END PGP SIGNATURE-----

Reply via email to