If you got the impression I am knocking OSSEC, I am not. On a LAN or
private network there is no point in looking at another product because
it is free and it rocks. I believe when you cross hostile networks (the
cloud) the rules change. Static PSK is no more secure than having a
strong password that never gets changed.
There are other products that use three party authenticated agents and
encrypted traffic with all the trimmings but if you need that, they will
find you. The ones I know are ridiculously expensive and am not selling
anything but the idea that open source is cool and developers who make
it get hero status in my book.
Fips is a pain and does not really improve security of communications in
transit, it is all about securing the endpoints and protecting the
executing code and junk like that.
I guess what caused my reservation is the fact that if a key compromise
did happen, you could be spied on forever and you would not be able to
detect it. An operational control of assigning new keys to the clients
frequently would mitigate that.
On 12/21/2010 04:21 PM, Michael Starks wrote:
On 12/21/2010 12:53 PM, loyd. darby wrote:
I agree with this assessment up to a point. For most of us security is
about balancing risk, technology and financial constraints.
The log data that ossec moves generally does no contain the keys to the
store but would be useful in helping a bad guy case the joint. To use
the log data to compromise your network, they would have to be a chain
of other security failures. If the network you are protecting serves up
dental records for a neighborhood clinic, OSSEC is probably going to
meet or exceed your requirements. If the network is a federal reserve
bank, you are going to have to wrap it inside some more robust
cryptographic and operational controls.
I'm a bit confused. What part of my response do you not agree with? I
was basically just reiterating how OSSEC works.
As to your point about not meeting some federal requirements, it may
be true in some cases--the cryptography, for example, may have to be
FIPS validated, but that does not mean that OSSEC is not suitable to
an environment where strong protections are needed.
OSSEC is the only software I know of that goes to the lengths it does
to protect the transport of logs. I would love to hear about some
other examples--I just may not know--but the SIEMs and log management
products I have worked with do not seem to care too much about log
transport. Logs are transported using regular RPC methods, FTP, syslog
and in other unauthenticated, clear-text ways. OSSEC does
authentication, encryption and even replay protection. Who else does?
--
R. Loyd Darby, OSSIM-OCSE
Project Manager DOC/NOAA/NMFS
Infrastructure coordinator
Southeast Fisheries Science Center
305-361-4297