Prevention?  As is tying up the fingers of those creating and distributing
viri in the first place???

Thanks,

Ron DuFresne

On Wed, 13 Dec 2000, Dave Mikulka wrote:

> Time to unlurk for a message or two....
> 
> Someone brought up a while ago that a real look to the future should be
> in prevention. To this day I still wonder why it is that the antivirus
> software vendors don't take more steps to PREVENTION. In addition to
> constantly updating their lists of known virus patterns, why aren't they
> spending some time and money to research new possible patterns and
> prevent them. Cause lets be honest, if theres hackers out there who can
> come up with new trojans, then theres people out there who can be hired
> to create them ahead of time and prevent them as well. 
> Obviously it isn't as simple as all that, but it would be nice to see a
> company that actually took a serious effort in the right direction. 
> As a network admin, I know it sure would be nice to hear about a new
> virus and my system is already protected against it instead of having to
> clean it out of my network after the fact and install a patch to ammend
> the virus definition file. 
> 
> Dave Mikulka
> 
> -----Original Message-----
> From: Stephen Gutknecht (firewalls) [mailto:[EMAIL PROTECTED]]
> Sent: Wednesday, December 13, 2000 2:05 PM
> To: '[EMAIL PROTECTED]'; [EMAIL PROTECTED]
> Cc: [EMAIL PROTECTED]
> Subject: RE: Undesired outbound data "leaking" - the next frontier?
> 
> 
> Yes, but let's look toward the future.  Is this problem getting larger
> or
> smaller?  Unless new programs like RealAudio/Napster/etc stop being
> created,
> I will say it could get larger.
> 
> Checksum of programs on the client --- that is exactly what "Anti-virus"
> software is basically doing, scanning all files on a system and doing
> pattern matching.  The anti-virus software vendors are also in the
> business
> of making "lists" and distributing those "lists" of patterns.
> 
> I personally don't see as much need for the real-time "system slowing"
> non-stop virus scanning that Martin [[EMAIL PROTECTED]] talks about for
> this
> type of issue.  A scan every 24 hours would seem sufficient to identify
> potentially "undesired" programs (above and beyond normal virus
> scanning).
> 
> I can think of two technologies available today:
> 
>   --- The netnanny web filter software.  These companies are in the
> business
> of tracking the web pages out there and classifying them based on porno
> and
> other factors.  What about "safe to post data"?  Yes, these lists of
> sites
> are far far far from perfect... but the technology and model exists.
>   --- The anti-virus checking of executables.
> 
> A new type of program and server?
> ===================================
> Maybe there needs to be a new network protocol?  Maybe a digital
> signature
> applied to the opening packet of a network session?  Maybe some new type
> of
> program that runs on client PC's and requests permission from a
> "outbound
> security server" before a firewall would allow a new session?
> 
> That doesn't sound like a bad idea.  Something like ZoneAlarms that runs
> on
> the client operating system and intercepts all outbound traffic... but
> INSTEAD of asking the user of the PC ("do you want to allow iexplore.exe
> to
> go outbound") -- it does a request to a "corporate authorization
> server."
> And base the program detection on a digital signature/checksum -- not
> just
> the name of the exe!  So far, at least one program (Zone Alarms) has
> proven
> sufficient at detecting new outbound traffic session on a PC.
> 
> And besides, the firewall policy could be to block ALL OUTBOUND unless
> authorized.  So if the person isn't running the "authorized outbound
> requester program," or has a trojan that bypasses it -- outbound data
> would
> never get out...
> 
> The same could be said for user identification.  Perhaps "logging into
> the
> firewall" should be required for outbound Internet use in general.  We
> know
> is in our email and custom applications, but we really have no idea who
> a
> web surfer is (other than their machine IP)?
> 
> Oh yha, one other thing... any program that blocks user access when the
> program isn't authorized... it should allow the user to be sent to a
> custom
> web page and not just pop up a "you can't connect" error.  This way the
> MIS-types can at least provide the user (via private web server) with
> site-specific informaton on how to deal with the issue.
> 
>   Stephen Gutknecht
>   Renton, Washington
> 
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Cutting the space budget really restores my faith in humanity.  It
eliminates dreams, goals, and ideals and lets us get straight to the
business of hate, debauchery, and self-annihilation." -- Johnny Hart
        ***testing, only testing, and damn good at it too!***

OK, so you're a Ph.D.  Just don't touch anything.

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to