At 01:27 PM 2/12/01 -0500, Michael T. Babcock wrote:


I just said 'good logging'.  Your definition of 'good' is up to you.

Packet logging should record all network activity that is on the wire, with 
the ability to gzip or rotate through a set of named files.

 > 2. Hack utilities - where does one receive corporate support for hack
 > utilities, unless you pay for them (i.e. L0phtcrack, ISS Security Scanner,
 > Cybercop, Retina, Nessus and on and on).. Those type of hack utilities may
 > or may not test for all the cgi-bin/phf variations, some IDS may not
detect
 > either.

To know whether your IDS actually detects current exploits, you need to be
both aware of the current exploits and either how to test them against your
IDS or know someone else has.  This is where a good mailing list about
vulnerability testing comes in handy (like the discussion forums for Snort).


Vulnerability testing is varies from one organization to another, some 
organizations even bring in unqualified or sometimes qualified security 
auditors to conduct a Security footprint or Risk Assessment throwing attack 
scripts that they know about at the IDS system.  Unless the IT staff are 
dedicated to researching and keeping the tools up to date, in most cases 
this is the not the case, they just have a different set of auditors come 
back the following year.

 > 3. Unless your a whiz at crafting malicious or varying sized packets
loaded
 > with exploits, etc

... or you have a security company monitor and keep your IDS up to date for
you who you trust.  (Entirely new issue there ... )

Actually, that is correct, entirely old and new issue there, there are 
companies that will offer a Managed Service Provider type service, usually 
staffed with a couple of trophies and then lined with a lot of off the 
street or 1 or 2 years experienced hands.  The cheaper the better profit 
margin from those out rageously high prices they try to gouge customers with.


 > 4. What about application testing tools, what QoS, etc, etc.
Organizations
 > are looking at IDS to be able to handle lots and lots of traffic, typical
 > hack utilities do not test for that

Its not that hard to get a series of replayable logs from something like
Snort or tcpdump that you can throw at your network over and over and over
again as fast as you can ...


It is not the fact of playing back Snort or tcpdump recorded traffic, but 
the need for such tools become painfully clear that organization will 
constantly hear from their high priced security auditors Bill and Malcolm" 
We use a combination of commercial and cobbled together freely available 
tools".. Corporations just eat that up. and in some cases seek a more 
reputable service company that uses a single commercially available tool 
which the corporation can go out and purchase.

It isn't about how fast you replay the packets over the wire, but how the 
packets are generated, if they are one continous loop with variations to 
trigger, not really a good way to conduct QA especially when one might have 
to test this, that or the other thing.

.


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to