"Paul D. Robertson" wrote:
>
> On Wed, 31 May 2000, Graham Wheeler wrote:
>
> > > Or, you could just encap the same data in say, five, DNS requests during
> > > each 24 hour period..
> >
> > If all you're doing is stealing the bandwidth of 5 DNS requests in a
> > day, tunnel away!
>
> If you think bandwidth is the biggest risk of tunneling, you should
Not the biggest risk, but I'm basing this on what our clients usually
want to deploy firewalls for in the first place. And bandwidth control
(and being able to split the costs amongst departments) is right up
there in their requirements.
> probably spend some time doing practical security somewhere, or spend more
> time talking strategy with folks who do. Unlike a lot of industries, the
> information security industry has a high number of in-the-field
> practicioners who are aware of and in many cases ahead of vendor
> solutions.
I think I'm pretty well informed, even if you don't think I am.
> I disagree. Most corporations I've worked with aren't worried about the
> bandwidth issues, especially for penthouse.com, it's liability and
> security issues. Bandwith users are trivial to track down and stop.
Well, you've clearly worked with different ones to me. But then you
probably live in the first world, where the cost of Internet
connectivity is negligible (I assume). That isn't the case in much of
the third world, which is where I happen to be. For anyone other than a
medium to large size corporation, Internet connectivity can be a
significant cost. And that's just for a 64kbs leased line. If that's all
you have, and its costing you a fair whack of money every month,
controlling the use of that limited bandwidth is a big issue. And
splitting the cost of that bandwidth can be a major requirement too.
I realise this probably sounds weird to people in the USA.
> That requires a targeted network. Tunnels can be the conduit provided to
> and from malicious code (such as worns and viruses) to provide significant
> vectors into and out of networks- both by genuine bad people and
> potentially malicious employees. The ability to timebomb systems is
> nothing new, and while it's generally not newsworthy that doesn't mean it
> doesn't happen. Tunnels give the same sort of person the oppertunity to
> surrepticiously access systems after they've been terminated and their
> access credentials revoked.
I guess I phrased myself badly. It's not that I don't think that
tunneling is not an issue. Although I admit that's what I literally
said, it's not what I meant). What I meant was that there are easier
ways than tunneling 5 DNS packets a day, or using steganography and
jpegs (which, incidentally, could be somewhat countered by putting
severe restrictions on the size of downloadable image files). SMTP
combined with procmail or a hacked majordomo comes to mind, in terms of
tunneling. If there is a malicious party on the inside, then anythings
possible.
As for timebombs - well, you're not talking about that - you're talking
about someone using a tunnel to trigger a bomb. A timebomb shouldn't
even need that; it just needs to sleep until the right time. What it
needs is a malicious party on the inside. And once you have that, all
the firewalls and bullet-proof glass and CCTV in the world may not be
able to help you.
Ultimately, I'm just arguing that even though it can be argued that
tunneling exploits render firewalls useless, I still think firewalls are
a Good Thing (I should do, as a principal architect, otherwise I'm just
wasting my time, and should be writing tunneling programs instead).
Tunneling exploits seem to me like shovelling coal one piece at a time,
when in fact there is usually a choice of shovels, if not bulldozers,
available.
And I also think that a lot of tunneling can be rendered ineffective.
The DNS example is easily countered, with some intelligent proxying.
Images can be stripped or size restricted or modified on the fly to
counter steganography. Enforcing strong user authentication for access
to services can help to track things down, especially if the
authentication requires interactivity that can't be easily automated.
That's not to say that current products do these things. But as the
attacks evolve and become more commonplace, so will the defenses.
> Trending and analysis can gain precursors to mass tunneling or heavy
> abuse, but don't count on it 100%.
You can't count on anything 100% (except death and taxes).
--
Dr Graham Wheeler E-mail: [EMAIL PROTECTED]
Director, Research and Development WWW: http://www.cequrux.com
CEQURUX Technologies Phone: +27(21)423-6065
Firewalls/VPN Specialists Fax: +27(21)424-3656
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]