*>>There are MORE good files that I want to use than bad that I want to
block. *

Except that most of those good files won't get executed if you stop a more
limited number of other executables from launching.

You don't necessarily have to track every version of every known DLL that
might ever get executed, if you can simply track the far more limited number
of executables that would spawn them.

It would appear that you're looking at whitelisting in a very different way
than is typically implemented.  What is your understanding of how a
whitelisting solution would need to work?



*>>If there’s a chance that said application will make a mistake, then we
also need something signature based to block the bad bits.*

Except that the scenario you're presenting is exactly what we call Zero Day
attacks.   Vulnerability is discovered in an approved app (no matter how you
chose to identify "approved app") and it gets exploited.  How is a signature
helping there when the attack is new?

If the vulnerability is one that requires no new executables, then a
zero-day attack is equally damaging to a whitelist or blacklist approach.
If the vulnerability is one that spawns a new executable, then a zero-day
attack is not effective in a whitelist scenario, but just as damaging as
always in a blacklist scenario.

I address the need for vendors to allow features and functionality to be
enabled or disabled independently (in the very next paragraph), which would
provide even more security.  In the meantime, blacklisting at the host level
as the primary means of protection is a game of increasing risk with
diminishing returns...


*ASB *(My Bio via About.Me <http://about.me/Andrew.S.Baker/bio>)
 *Exploiting Technology for Business Advantage...*

*
*



On Mon, Jan 31, 2011 at 2:36 PM, Crawford, Scott <[email protected]>wrote:

>  “Application whitelisting is a good idea, because for every environment,
> there are less items that fall into the “*known good*” category than bad
> code that you don’t want to run.”
>
>
>
> This assumption simply isn’t true. Data = 1’s and 0’s = code. There are
> MORE good files that I want to use than bad that I want to block. If there
> was some magic bullet that ensured “data” files could never contain
> executable bits, then I would agree whole heartedly. But, I don’t believe
> such bullet will ever exist. Therefore data = 1’s and 0’s = code and its up
> to the whitelisted .exe to interpret them correctly. If there’s a chance
> that said application will make a mistake, then we also need something
> signature based to block the bad bits.
>
>
>
> *From:* Andrew S. Baker [mailto:[email protected]]
> *Sent:* Monday, January 31, 2011 12:25 PM
>
> *To:* NT System Admin Issues
> *Subject:* Re: Intel developing security 'game-changer'
>
>
>
> Here are my full thoughts on the subject, as a security mechanism:
>
>
>
>
> http://home.asbzone.com/ASB/archive/2010/05/10/it-s-time-to-re-evaluate-host-based-security.aspx
>
>
>
> No, it is not a panacea, because no security mechanism ever is.  Yes, there
> are drawbacks, but focusing on these technologies will provide a bigger bang
> for the buck and allow us to mitigate the weaknesses sooner.  Either way,
> your ROI is greater in most scenarios which use whitelisting vs
> blacklisting.
>
>
>
> Also, check out the following:
> http://www.schneier.com/blog/archives/2011/01/whitelisting_vs.html
>
>
>
>
>
> *ASB *(Find me online via About.Me <http://about.me/Andrew.S.Baker/bio>)
> *Exploiting Technology for Business Advantage...*
>
>
>
>
>
>  On Mon, Jan 31, 2011 at 12:48 PM, Crawford, Scott <[email protected]>
> wrote:
>
> “No one here has suggested panacea”
>
>
>
> Perhaps not, but that’s not my perception. I see lots of statements like
> “I’m still of the opinion that the only real solution is white-listing. -
> MBS”  Maybe I’m misreading that, but that hints at a panacea and I’m simply
> saying that it’s not.
>
>
>
> All of your other points – I agree.
>
>
>
> *From:* Andrew S. Baker [mailto:[email protected]]
> *Sent:* Wednesday, January 26, 2011 4:35 PM
>
>
> *To:* NT System Admin Issues
> *Subject:* Re: Intel developing security 'game-changer'
>
>
>
> No one here has suggested panacea, but consider how effective it would be
> in a white-listing environment to add most apps to the list in the event of
> a zero-day to an EXISTING app.  You wouldn't have to do anything for an app
> that wasn't already allowed in your environment.
>
>
>
> It is akin to the change in firewall rule-set made in ages gone by from
> Allowed-by-Default to Denied-by-Default.
>
>
>
> Likewise, look at all the environments that have moved towards some form of
> locked down user desktop and see how much of a benefit has resulted.
>
>
>
> Reducing problems by 50-80% off the bat, with little overhead, is always
> desirable.
>
>
>
> *ASB *(My Bio via About.Me <http://about.me/Andrew.S.Baker/bio>)
> *Exploiting Technology for Business Advantage...*
>
>
>
>
>
> On Wed, Jan 26, 2011 at 5:03 PM, Crawford, Scott <[email protected]>
> wrote:
>
> My point is that neither signatures, nor white-listing are a panacea. The
> fact that we’ve been sig based for so long while malware continues to be
> effective leads many to think that white-listing would solve all our woes.
> I’m simply saying that many **current** vulnerabilities circumvent a
> white-list so it can’t be a panacea…unless of course you white-list each
> individual data file.
>
>
>
> *From:* Andrew S. Baker [mailto:[email protected]]
> *Sent:* Wednesday, January 26, 2011 1:55 PM
>
>
> *To:* NT System Admin Issues
>
> *Subject:* Re: Intel developing security 'game-changer'
>
>
>
> Just as network anomaly detection devices don't eliminate the use of
> signatures, whitelisting solutions can still make use of several mechanisms
> for avoiding bad stuff.
>
>
>
> It is the complete RELIANCE on signatures that is troublesome.
>
>
>
> Oh, and btw, I try to avoid Adobe Acrobat altogether.  There are plenty of
> viable alternatives at the moment...
>
>
>
> *ASB *(My Bio via About.Me <http://about.me/Andrew.S.Baker/bio>)
>
> *Exploiting Technology for Business Advantage...*
>
>
>
>
>
> On Wed, Jan 26, 2011 at 2:51 PM, Crawford, Scott <[email protected]>
> wrote:
>
> Unless you’re going to white-list every doc/jpg/pdf/mp3 you’re going to
> open, that’s not a panacea either.  Documents = 1’s and 0’s = code. The only
> difference is what layer its executed at.  Assume you white-list
> AdobeReader.exe. The next time a flaw is found that is exploited through a
> malformed PDF, it will march right through your white-list.
>
>
>
> *From:* Michael B. Smith [mailto:[email protected]]
> *Sent:* Wednesday, January 26, 2011 1:38 PM
>
>
>
> *To:* NT System Admin Issues
>
> *Subject:* RE: Intel developing security 'game-changer'
>
>
>
> I’m still of the opinion that the only real solution is white-listing.
>
>
>
> But that raises its own set of issues.
>
>
>
> Regards,
>
>
>
> Michael B. Smith
>
> Consultant and Exchange MVP
>
> http://TheEssentialExchange.com
>
>
>
> *From:* Andrew S. Baker [mailto:[email protected]]
>
> *Sent:* Wednesday, January 26, 2011 2:35 PM
>
> *To:* NT System Admin Issues
>
> *Subject:* Re: Intel developing security 'game-changer'
>
>
>
> Since a whole lot of allegedly legitimate software acts just like malware,
> they'd have their work cut out for them.
>
>
>
> Try installing a host-based IPS on your system in monitoring mode, and look
> at what it would block -- and why.
>
>
>
> There are certain classes of zero-day that can be blocked by software or
> hardware.  There are others that cannot be, simply because of what passes
> for functionality these days.
>
>
>
> Oh, and I agree with Ben and Jonathan...
>
>
>
> *ASB *(My Bio via About.Me <http://about.me/Andrew.S.Baker/bio>)
> *Exploiting Technology for Business Advantage...*
>
>
>
>
>
> On Wed, Jan 26, 2011 at 1:47 PM, Sean Martin <[email protected]>
> wrote:
>
> Most important statement....
>
>
>
> "*If Intel has hardware technology that can reliably stop zero-day
> attacks, that would be a huge win in the war against malware," Olds said.
> **"The key is that it's reliable. It has to have the ability to discern
> legit software from malware**. But if they can pull this off, it would
> give them quite a competitive advantage **vs. 
> AMD*<http://www.computerworld.com/s/article/9204580/AMD_could_better_fight_Intel_with_new_CEO_>
> *."*
>
>
>
> - Sean
>
>
>
> On Wed, Jan 26, 2011 at 9:37 AM, David Lum <[email protected]> wrote:
>
> What say you, Alex, et all.
>
>
>
>
> http://www.computerworld.com/s/article/9206366/Intel_developing_security_game_changer_?taxonomyId=85
>
>
>
> Hype?
>
> *David Lum** **// *SYSTEMS ENGINEER
> NORTHWEST EVALUATION ASSOCIATION
> (Desk) 503.548.5229 *// *(Cell) 503.267.9764
>
>
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to