Re: Death of antivirus software imminent

2008-01-18 Thread James A. Donald

Alex Alten wrote:
 Generally any standard encrypted protocols will
 probably eventually have to support some sort of CALEA
 capability. For example, using a Verisign ICA
 certificate to do MITM of SSL, or possibly requiring
 Ebay to provide some sort of legal access to Skype
 private keys.

And all the criminals will of course obey the law.

Why not just require them to set an evil flag on all
their packets?

 If there is a 2nd layer of encryption then this would
 require initial key exchanges that may be vulnerable
 to interception or after-the-fact analysis of the
 decrypted SSL payloads.

I guarantee I can make any payload look like any other
payload.  If the only permitted communications are
prayers to Allah, I can encode key exchange in prayers
to Allah.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-18 Thread Ray Dillinger
On Fri, 2008-01-18 at 02:31 -0800, Alex Alten wrote:
 At 07:35 PM 1/18/2008 +1000, James A. Donald wrote:
 
 And all the criminals will of course obey the law.
 
 Why not just require them to set an evil flag on all
 their packets?
 
 These are trite responses.  Of course not.  My point is
 that if the criminals are lazy enough to use a standard
 security protocol then they can't expect us not to put
 something in place to decrypt that traffic at will if necessary.

I see your point, but I can't help feeling that it's a 
lot like requiring all houses to be designed and built with 
a backdoor that the police have a key to, in order to 
guarantee that the police can come in to investigate crimes. 

The problem is that the existence of that extra door, and 
the inability of people to control their own keys to lock 
it, makes crimes drastically easier to commit.  You think 
police don't use DMV records to harass ex-girlfriends or 
make life hard for people they don't like?  You think 
Private investigators and other randoms who somehow finesse 
access to that data all have the best interests of the public 
at heart?  You think the contractor who builds the house 
will somehow forget where the door is, or will turn over 
*all* copies of the keys? 

And stepping away from quasi-legit access used for illegitimate
purposes, you think there're no locksmiths whose services the 
outright criminals can't buy?  You think the existence of a 
backdoor won't inspire criminal efforts to get the key (by 
reading a binary dump if need be) and go through it?

 I guarantee I can make any payload look like any other
 payload.  If the only permitted communications are
 prayers to Allah, I can encode key exchange in prayers
 to Allah.

 Look, the criminals have to design their security system with
 severe disadvantages; they don't own the machines they
 attack/take over so they can't control its software/hardware
 contents easily, they can't screw around too much with the IP
 protocol headers or they lose communications with them, and
 they don't have physical access to the slave/owned machines.

That is a very petty class of criminal.  While the aggregate 
thefts (of computer power, bandwidth, etc) are impressive, 
they're stealing nothing that isn't a cheap commodity anyway 
and the threat to lives and real property that would justify 
the kind of backdoors we're talking about just isn't there. 
Being subject to botnets and their ilk is more like the 
additional cost of doing business in bad weather, than it 
is like being the victim of a planned and premeditated 
crime with a particular high-value target.  

Moreover, we know how to weatherproof our systems.  
Seriously.  We know where the vulnerabilities are and we 
know how to create systems that don't have them.  And we 
don't need to install backdoors or allocate law enforcement 
budget to do it.  More than half the servers on the Internet - 
the very most desirable machines for botnet operators, 
because they have huge storage and huge bandwidth - run 
some form of Unix, and yet, since 1981 and the Morris Worm, 
you've never heard of a botnet composed of Unix machines!  
Think about that!  They do business in the same bad weather 
as everyone else, but it costs them very little, because 
they have ROOFS!

I submit that the sole reason Botnet operation even exists 
is because so many people are continuing to use an operating 
system and software whose security is known to be inferior. 
A(nother) backdoor in that system won't help.

The criminals whose activities do justify the sort of backdoors 
you're talking about - the bombers, the kidnappers, the 
extortionists, even the kiddie porn producers and that ilk - 
won't be much affected by them, because they *do* take the 
effort to get hard crypto working in addition to standard 
protocols, they *do* own their own machines and get to pick 
and choose what software goes on them, and if they're 
technically bent they can roll their own protocols. 

Bear


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-18 Thread Jonathan Thornburg
Alex Alten wrote:
 Generally any standard encrypted protocols will
 probably eventually have to support some sort of CALEA
 capability. For example, using a Verisign ICA
 certificate to do MITM of SSL, or possibly requiring
 Ebay to provide some sort of legal access to Skype
 private keys.

I can certainly imagine various countries legislating such backdoors,
and other countries quietly installing them (assuming they aren't
already there for Skype).  And that will certainly help in catching
some fraction of unsophisticated crooks.

But botnets-for-rent are currently making pretty substantial amounts
of money (eg for sending spam, or ddos attacks, or as phishing hosts),
and are increasingly using professionally written malware.
(http://www.cs.auckland.ac.nz/~pgut001/pubs/malware_biz.pdf)

Given the lure of this much easy money, I think it's much more
likely that the cleverer bad guys will just wrap an un-backdoored ssh
or ssl or ipsec or other good crypto protocol that's already widely
available layer inside the backdoored one(s), giving them (continued)
full security.  For better or worse, I think the bad buys can use
strong crypto horse left the barn a long time ago.


In a more recent message, Alex Alten wrote:
 the criminals have to design their security system with
 severe disadvantages; they don't own the machines they
 attack/take over so they can't control its software/hardware
 contents easily

I don't see your point -- surely once a machine is recruited into
a botnet, the botnet herder can and does load any software s/he wants
onto the new recruit.


 they can't screw around too much with the IP
 protocol headers or they lose communications with them, and
 they don't have physical access to the slave/owned machines.

In what way has this stopped (or even slowed) the Storm worm,
to name one notorious example?

-- 
-- Jonathan Thornburg (remove -animal to reply) [EMAIL PROTECTED]
   School of Mathematics, U of Southampton, England
   Washing one's hands of the conflict between the powerful and the
powerless means to side with the powerful, not to be neutral.
  -- quote by Freire / poster by Oxfam


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-18 Thread Alex Alten

At 07:35 PM 1/18/2008 +1000, James A. Donald wrote:

Alex Alten wrote:
 Generally any standard encrypted protocols will
 probably eventually have to support some sort of CALEA
 capability. For example, using a Verisign ICA
 certificate to do MITM of SSL, or possibly requiring
 Ebay to provide some sort of legal access to Skype
 private keys.

And all the criminals will of course obey the law.

Why not just require them to set an evil flag on all
their packets?


These are trite responses.  Of course not.  My point is
that if the criminals are lazy enough to use a standard
security protocol then they can't expect us not to put
something in place to decrypt that traffic at will if necessary.


 If there is a 2nd layer of encryption then this would
 require initial key exchanges that may be vulnerable
 to interception or after-the-fact analysis of the
 decrypted SSL payloads.

I guarantee I can make any payload look like any other
payload.  If the only permitted communications are
prayers to Allah, I can encode key exchange in prayers
to Allah.


Yeah and you can only communicate with Allah with
that type of design.

Look, the criminals have to design their security system with
severe disadvantages; they don't own the machines they
attack/take over so they can't control its software/hardware
contents easily, they can't screw around too much with the IP
protocol headers or they lose communications with them, and
they don't have physical access to the slave/owned machines.

And, last I heard, they must obey Kerckhoff's law, despite
using prayers to Allah for key exchanges.

Given all this, I'm not saying its easy to do, but it should be
quite possible to crack open some or all of their encrypted
comms and/or trace back to the original source attack
machines.

- Alex

--

Alex Alten
[EMAIL PROTECTED]



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-18 Thread Allen



Alex Alten wrote:

[snip]


These are trite responses.  Of course not.  My point is
that if the criminals are lazy enough to use a standard
security protocol then they can't expect us not to put
something in place to decrypt that traffic at will if necessary.


[snip]


Look, the criminals have to design their security system with
severe disadvantages; they don't own the machines they
attack/take over so they can't control its software/hardware
contents easily, they can't screw around too much with the IP
protocol headers or they lose communications with them, and
they don't have physical access to the slave/owned machines.

And, last I heard, they must obey Kerckhoff's law, despite
using prayers to Allah for key exchanges.

Given all this, I'm not saying its easy to do, but it should be
quite possible to crack open some or all of their encrypted
comms and/or trace back to the original source attack
machines.


However, we do know that criminals are not always lazy. The 
trite comment often said is that if they used the same level of 
effort in a legal enterprise they would have done quite well.


The other proof that they are not lazy is looking at the 
evolution of the sophistication of malware like Storm and 
Nugache. It takes some serious effort to overcome the real 
handicaps that you point out as well as the ratio of the power 
and numbers that are hunting to put them out of business to their 
own numbers.


In many ways it is similar to a guerrilla war where many of the 
advantages are actually held by the tiny band of insurgents, who, 
greatly outnumbered and out-gunned, can in fact change history. 
The Swiss know this and train their military based on this.


Do not be surprised if the dissidents of all stripes use 
improvisation based on malware and other tools like onion routing 
to further their causes and evade suppression.


BTW, while I do not think all dissidents are righteous or 
fighting for righteous causes this does negate the general idea. 
A hammer is a hammer. Good or evil is independent of the tools, 
it depends on what one is pounding, nails or heads.


Best,

Allen

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-14 Thread Sandy Harris
On Jan 12, 2008 9:32 AM, Alex Alten [EMAIL PROTECTED] wrote:

 Generally any standard encrypted protocols will probably eventually have
 to support some sort of CALEA capability. ...

That's a rather large and distinctly dangerous assumption. Here's the
IETF's official line on the question, the abstract section of RFC 2084:

   The Internet Engineering Task Force (IETF) has been asked to take a
   position on the inclusion into IETF standards-track documents of
   functionality designed to facilitate wiretapping.

   This memo explains what the IETF thinks the question means, why its
   answer is no, and what that answer means.

http://www.faqs.org/rfcs/rfc2804.html

The whole question was extensively discussed on an IETF mailing
list set up for the purpose before that RFC was written:
http://www1.ietf.org/mail-archive/web/raven/current/index.html

The aptly named RFC 1984 is also relevant.

Among the more obvious problems are the fact that complexity
is bad for security, that the US government has some history
of abusing wiretaps, and that other governments who would
have access to any such technology are even less trustworthy.

-- 
Sandy Harris,
Nanjing, China

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-14 Thread Steven M. Bellovin
On Fri, 11 Jan 2008 17:32:04 -0800
Alex Alten [EMAIL PROTECTED] wrote:


 
 Generally any standard encrypted protocols will probably eventually
 have to support some sort of CALEA capability. For example, using a
 Verisign ICA certificate to do MITM of SSL, or possibly requiring
 Ebay to provide some sort of legal access to Skype private keys.  

...
 
 This train left the station a *long* time ago.
 
 So it's not so clear that the train has even left the station.
 
You've given a wish list but you haven't explained why you think it
will happen.  The US government walked away from the issue years ago,
when the Clipper chip effort failed.  Even post-9/11, the Bush
administration chose not to revisit the question.

The real issue, though, is technical rather than political will.  CALEA
is a mandate for service providers; key escrow is a requirement on the
targets of the surveillance.  The bad guys won't co-operate...

--Steve Bellovin, http://www.cs.columbia.edu/~smb

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-14 Thread lists

From: Alex Alten [EMAIL PROTECTED]

Writing in support of CALEA capability to assist prosecuting botnet
operators etc ...

 Generally any standard encrypted protocols will probably eventually have
 to support some sort of CALEA capability.

So you havn't heard that the UK has closed down the National High-Tech Crime 
Unit
and the current way to report computer crime is at your police station (good 
luck
with that).  And there's not much sign of anyone else doing much better.
Here's some recent news:
http://www.news.com/8301-10784_3-9848743-7.html

Leaving aside the points others have made about how you can't expect the
cooperation of the crooks you are supposedly aiming for what staggers me
is that after 9 years on this list you still think the government -
any government - is looking out for your interests.


Also why is this thread called Death of antivirus?  What examples can
anyone give me in corporate or mass-market IT of people stopping doing
something merely because it didn't work?

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-04 Thread James A. Donald

Perry E. Metzger wrote:
 I think Steve is completely correct in the case of
 cryptography. We have a lot of experience of real
 world security failures these days, and they're not
 generally the sort that crypto would fix.

They are the sort that a different sort of way of using
crypto could fix.

Jason:
 Authentication is exactly what I need in the case of
 spam/phishing:

Perry E. Metzger wrote:
 People have said that for quite some time. However, I
 doubt it would actually help. In the case of spam, all
 that would end up happening is vast amounts of CPU
 time being spent demonstrating that the made up
 addresses on spam were associated with actual RSA
 keys. (There is no practical limit to the number of
 RSA keys that may be generated.)

First, the phishing case:

Assume that instead of logging in through a possibly
hostile web page, people login using SRP built into the
browser chrome.  Then phishing goes away, because the
man in the middle gets no shared secrets.

Next, the spam case, including spam offering high yield
investments, spam promising millions of dollars stolen
from starving Africans, Indian made viagra, porn sites,
and two hundred and seventy tons of sugar.

To fix spam, we need automatic whitelisting plus
aggressive Baysian filtering.  At present this works
fine, no crypto needed, because the attacker seldom
bothers to adapt to your particular profile.  Tons of
spam descend upon me, and is magically banished, sight
unseen. When impersonation spam attacks become a serious
problem, then we will think about how to use
cryptography to beat them.  Sometimes I have to manually
whitelist people, which Grandma could not do, but that
is a user interface problem - observe that most IM
systems make whitelisting easy enough for Grandma.

 I would actually agree that we can implement operating
 system strategies that make malware harder to write. I
 don't know if it is likely that any current
 techniques, even including the nearly unheard of use
 of formal verification, would actually eliminate
 malware.

OLPC seems very nearly malware proof.  Malware would
require unusual privileges, and there is no easy way to
install software that requires unusual privileges on
OLPC.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-04 Thread Dan Kaminsky

 Crypto solves certain problems very well.  Against others, it's worse
 than useless -- worse, because it blocks out friendly IDSs as well as
 hostile parties.

   
Yawn.  IDS is dead, has been for a while now.  The bottom line discovery
has been that:

1) Anomaly detection doesn't work because anomalies are normal, and
2) Unless you're scrubbing up and down the application and network
stacks, you just have no idea what the host endpoint is parsing.

At the point where crypto shows up, it's already too late.

--Dan

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-04 Thread Alex Alten

At 11:23 PM 1/3/2008 +, Steven M. Bellovin wrote:

On Thu, 03 Jan 2008 11:52:21 -0500
[EMAIL PROTECTED] wrote:

 The aspect of this that is directly relevant to this
 list is that while we have labored to make network
 comms safe in an unsafe transmission medium, the
 world has now reached the point where the odds favor
 the hypothesis that whomever you are talking to is
 themselves already 0wned, i.e., it does not matter if
 the comms are clean when the opponent already owns
 your counterparty.

Right -- remember Spaf's famous line about how using strong crypto on
the Internet is like using an armored car to carry money between
someone living in a cardboard shack and someone living on a park bench?

Crypto solves certain problems very well.  Against others, it's worse
than useless -- worse, because it blocks out friendly IDSs as well as
hostile parties.


I agree with these statements.  I have a couple of comments
regarding crypto and IDS.  I think that we will have to move toward
encrypting more data at rest in some manner that is that is easy for
the user to use (like ATM cash cards) yet difficult for a malicious
piece of software on the user's machine to circumvent.  This will
require that all PC's ship with a trusted hardware/firmware chip
AKA a reference monitor on the motherboard that can safely handle
any red keys.  This also means the PC needs a trusted path to
the user like the pin pad in ATM machines.  Many laptops now
ship with fingerprint scanners, so maybe these things are not such
an onerous requirement on PC manufacturers anymore.  Also
the reference monitor could be used to prevent viruses being able
to completely taking over the user's machine (maybe at least
to maintain some sort of host IDS capability).

For IDS, I think we need to think of it in more the context of policing.
These virus writers are human beings, and I suspect for the most
part a very small fraction of the total Internet population.  We need to
have tools and international Interpol-like treaties in place that allow
police to track down and arrest these people (or deny them access
via an ISP or a carrier).  Many of the tier 1 carriers apparently are
refusing to share IDS information with one another.  This needs to
change.  We need really good IDS tools that track down the control
lines of the botnets, etc., back to their actual handlers.  This may
mean that each carrier must archive large amounts of either netflow
data or even raw packets (say for non-TCP traffic) so that detailed
L7 analysis can take place to track botnet control lines back to their
handlers in after-the-fact investigations.  Also, I hate to say this, we
may need to also require that all encrypted traffic allow inspection of
their contents under proper authority (CALEA essentially).  If we
can do this then we can put real policing pressure on these virus
writers, essentially removing them from being able to attack us
over the Internet.

- Alex

--

Alex Alten
[EMAIL PROTECTED]



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-03 Thread Ivan Krstić

On Dec 31, 2007, at 4:46 PM, Bill Frantz wrote:

My favorite virtual machine use is for the virus to install itself
as a virtual machine, and run the OS in the virtual machine.  This
technique should be really good for hiding from virus scanners.



It's not, and despite the press handwaving about hypervisor rootkits  
being the death of all security as we know it, this attack is largely  
uninteresting in practice. Repeat after me: it's not a real problem,  
and it's unlikely to become a real problem.


A walkthrough with pretty pictures, courtesy of the Matasano folk:
http://www.matasano.com/log/930/side-channel-detection-attacks-against-unauthorized-hypervisors/ 



Cheers,

--
Ivan Krstić [EMAIL PROTECTED] | http://radian.org

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


virtualizaton and security cfp (was Re: Death of antivirus software imminent)

2008-01-03 Thread Sean W. Smith
With this discussion of virtualization and security, it might be a  
good time to note:






IEEE Security  Privacy
Special issue on virtualization
September/October 2008

Deadline for submissions: 6 February 2008

Visit www.computer.org/portal/pages/security/author.xml to submit a  
manuscript

Guest editors: Samuel T. King (UIUC), Sean W. Smith (Dartmouth)

Virtualization has several properties that make it useful for  
security applications. Traditional virtual machine monitors aspire  
to enforce strong isolation among multiple operating systems (OSes)  
running on the same physical hardware, enable software services to  
be implemented below the OS at a layer usually only accessible by  
hardware, and provide low-level software with convenient  
abstractions of the virtual machineís hardware resources. Other  
approaches aspire to provide multiple virtual but isolated images  
of the same OS installation. These properties helped foster a new  
class of virtual-machine- based security services and made  
virtualization a staple of many enterprise computing environments.


A common topic in the early days of computing, virtualization has  
recently seen a resurgence of commercial and research interest.  
Consequently, the security implications of virtualization  
technology are the topic of the Sept./Oct. 2008 special issue of  
IEEE Security  Privacy magazine. We are looking for feature  
articles with an in-depth coverage of topics related to  
virtualization technology and how it applies to security. Among the  
potential topics are:


--Virtualization for intrusion detection
--Virtualization for forensic analysis of compromised computer systems
--Virtualization for analyzing malicious software
--Hardware support for secure virtualization
--Security interfaces between VMMs and operating systems
--Securing applications using virtualization
--Securing attacks using virtualization
--Security analysis of virtualization

The above list is neither complete nor closed. Authors are  
encouraged to submit articles that explore other aspects of  
virtualization and its application to security. Submissions will be  
subject to the peer-review methodology for refereed papers.  
Articles should be understandable to a broad audience of people  
interested in security and privacy. The writing should be down to  
earth, practical, and original. Authors should not assume that the  
audience will have specialized experience in a particular subfield.  
All accepted articles will be edited according to the IEEE Computer  
Society style guide.




-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-03 Thread Anne Lynn Wheeler

Leichter, Jerry wrote:

Virtualization has become the magic pixie dust of the decade.

When IBM originally developed VMM technology, security was not a primary
goal.  People expected the OS to provide security, and at the time it
was believed that OS's would be able to solve the security problems.
  

re:
http://www.garlic.com/~lynn/aadsm28.htm#4 Death of antivirus software 
iminent
http://www.garlic.com/~lynn/aadsm28.htm#6 Death of antivirus software 
iminent
http://www.garlic.com/~lynn/aadsm28.htm#8 Death of antivirus software 
iminent


the other claim was that it was assumed that basic systems were built to 
be secure,
so it would have been quite foreign idea it would be necessary to build 
a secure

specific system.

besides the referenced fairly wide use of gov and commercial 
institutions requiring
high integrity systems ... the early virtual machine systems (cp67 and 
vm370)

were also used by commercial time-sharing service bureaus. most of these
created cms padded cell modifications, a lot of it was to prevent 
users from

damaging themselves (as opposed to the underlying security that prevented
uses from damaging the system and/or each other).

at least some of these services provided online, concurrent services to
(competitive) wall street firms ... who would be using the online services
for highly sensitive financial activities (as example of integrity 
requirements).


a little related x-over from posting in this thread
http://www.garlic.com/~lynn/2008.html#14 hacked TOPS-10 monitors

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-03 Thread alien
Today's VMMs aren't even designed to fit the formal criteria for a VMM
(at least as expressed, intelligently, by Popek and Goldberg back in the
70s).  VMM-aware malware leverages this: for example, by making calls to
VMware's backdoor communications channel from the guest (ie. jerry.c).
If the equivalence principle were actually upheld, this wouldn't be
possible-- but then again, users wouldn't have all those handy features
like cut-n-paste from guest to host.

Sherri



Leichter, Jerry wrote:
 Virtualization has become the magic pixie dust of the decade.
 
 When IBM originally developed VMM technology, security was not a primary
 goal.  People expected the OS to provide security, and at the time it
 was believed that OS's would be able to solve the security problems.
 
 As far as I know, the first real tie of VMM's to security was in a DEC
 project to build a VMM for the VAX that would be secure at the Orange
 Book A2 level.  The primary argument for this was:  Existing OS's are
 way too complex to verify (and in any case A2 required verified design,
 which is impossible to apply to an already-existing design).  A VMM can
 be small and simple enough to have a verified design, and because it
 runs under the OS and can mediate all access to the hardware, it can
 serve as a Reference Monitor.  The thing was actually built and met its
 requirements (actually, it far exceeded some, especially on the
 performance end), but died when DEC killed the VAX in favor of the
 Alpha.
 
 Today's VMM's are hardly the same thing.  They are built for perfor-
 mance, power, and managability, not for security.  While certainly
 smaller than full-blown Windows, say, they are hardly tiny any more.
 Further, a major requirement of the VAX VMM was isolation:  The
 different VM's could communicate only through network protocols.  No
 shared devices, no shared file systems.  Not the kind of thing that
 would be practical for the typical uses of today's crop of VM's.
 
 The claim that VMM's provide high level security is trading on the
 reputation of work done (and published) years ago which has little if
 anything to do with the software actually being run.  Yes, even as they
 stand, today's VMM's probably do provide better security than some -
 many? - OS's.  Using a VM as resettable sandbox is a nice idea, where
 you can use it.  (Of course, that means when you close down the sandbox,
 you lose all your state.  Kind of hard to use when the whole point of
 running an application like, say, an editor is to produce long-lived
 state!  So you start making an exception here, an exception there
 ... and pretty soon the sand is spilled all over the floor and is in
 your eyes.)
 
 The distinction between a VMM and an OS is fuzzy anyway.  A VMM gives
 you the illusion that you have a whole machine for yourself.  Go back
 a read a description of a 1960's multi-user OS and you'll see the
 very same language used.  If you want to argue that a small OS *can
 be* made more secure than a huge OS, I'll agree.  But that's a size
 distinction, not a VMM/OS distinction
   -- Jerry
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-03 Thread dan

  however, another interpretation is that the defenders
  have chosen extremely poor position to defend ... and are
  therefor at enormous disadvantage. it may be necessary
  to change the paradigm (and/or find the high ground)
  in order to successfully defend.


First, it is evident that the malware writers have
reached a level of sophistication where stealth is
more attractive than persistence, i.e., prey are
sufficiently abundant that it does not matter if your
code survives reboot -- you can always get a new
machine soon enough.  Second, as soon as one of these
guys figures out how to hook the memory manager
(which may already have happened), then the ability
to find the otherwise in-core-only malware goes away
as your act of scanning memory will be seen by the
now-corrupted memory manager and the malware will be
thus relocated as you search such that you are
playing blindman's bluff without knowing that you
are.  Third, targetted malware does not defeat the AV
paradigm technically, rather it defeats the business
model as no AV company can afford to craft, test, and
distribute signatures for any malware that does not
already have, say, 50,000 victims.  Fourth, under
so-called Service-Oriented-Architecture, there is no
one anywhere who knows where all the moving parts
are.

The aspect of this that is directly relevant to this
list is that while we have labored to make network
comms safe in an unsafe transmission medium, the
world has now reached the point where the odds favor
the hypothesis that whomever you are talking to is
themselves already 0wned, i.e., it does not matter if
the comms are clean when the opponent already owns
your counterparty.

I blogged on this recently (guest for Ryan Naraine)
and it made the top of Slashdot.  Apologies for
boring those who've already seen it.

--dan

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-03 Thread Bill Frantz
[EMAIL PROTECTED] (Jason) on Wednesday, January 2, 2008 wrote:

On the other hand, writing an OS that doesn't get infected in the first place 
is a fundamentally winning battle: OSes are insecure because people make 
mistakes, not because they're fundamentally insecurable.

I fully agree that a better OS would go a long way toward helping in
the battle.  We even know some techniques for building a better OS. 
Consider plash http://sourceforge.net/projects/plash/, and Polaris
http://www.hpl.hp.com/techreports/2004/HPL-2004-221.html, both of
which run programs for a user with less than that user's privilege. 
This technique helps prevent viruses from infecting computers by
denying them write privileges to system files and most of the user's
files.

The model that any program a user runs can do anything that user is
permitted to do is fundamentally broken.  It is the model that all
current popular OSes support, so in that sense these OSes are
insecure.  The only mistake users make in many cases is running
software with bugs such as buffer overruns, where the virus then
uses the user's privileges to take over their system.  In these
cases, IMHO, blaming the user is inappropriate.  And in all cases,
OSes should give the user more support in making sound decisions. 
See for example: http://www.skyhunter.com/marcs/granmaRulesPola.html

Cheers - Bill

-
Bill Frantz| The first thing you need when  | Periwinkle
(408)356-8506  | using a perimeter defense is a | 16345 Englewood Ave
www.pwpconsult.com | perimeter. | Los Gatos, CA 95032

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-03 Thread Steven M. Bellovin
On Thu, 03 Jan 2008 11:52:21 -0500
[EMAIL PROTECTED] wrote:

 The aspect of this that is directly relevant to this
 list is that while we have labored to make network
 comms safe in an unsafe transmission medium, the
 world has now reached the point where the odds favor
 the hypothesis that whomever you are talking to is
 themselves already 0wned, i.e., it does not matter if
 the comms are clean when the opponent already owns
 your counterparty.

Right -- remember Spaf's famous line about how using strong crypto on
the Internet is like using an armored car to carry money between
someone living in a cardboard shack and someone living on a park bench?

Crypto solves certain problems very well.  Against others, it's worse
than useless -- worse, because it blocks out friendly IDSs as well as
hostile parties.


--Steve Bellovin, http://www.cs.columbia.edu/~smb

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-02 Thread Bill Frantz
On Dec 29, 2007, at 6:37 PM, Anne  Lynn Wheeler wrote:
 Virtualization still hot, death of antivirus software imminent

My favorite virtual machine use is for the virus to install itself
as a virtual machine, and run the OS in the virtual machine.  This
technique should be really good for hiding from virus scanners.

Cheers - Bill

---
Bill Frantz| I like the farmers' market   | Periwinkle
(408)356-8506  | because I can get fruits and | 16345 Englewood Ave
www.pwpconsult.com | vegetables without stickers. | Los Gatos, CA 95032

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-02 Thread Anne Lynn Wheeler

Bill Frantz wrote:
 My favorite virtual machine use is for the virus to install itself
 as a virtual machine, and run the OS in the virtual machine.  This
 technique should be really good for hiding from virus scanners.

re:
http://www.garlic.com/~lynn/aadsm28.htm#2 Death of antivirus software 
imminent
http://www.garlic.com/~lynn/aadsm28.htm#4 Death of antivirus software 
imminent


i commented on that in reference posts mentioning that there have been
uses of virtual machines to study virus/trojans ... but that
some of the new generation virus/trojans are now looking to see if they
are running in virtual machine (studied?).

some of the current trade-off is whether that virtual machine technology
can be used to partition off basically insecure operations (which are widely
recognized as being easy to compromise) and then completely discard
the environment and rebuild from scratch after every session (sort of
the automated equivalent of having to manually wipe an infected machine
and re-install from scratch).

the counter argument is that crooks can possibly also use similar
technology to hide ... once they have infected the machine. the current
issue is that a lot of the antivirus/scanning techniques are becoming 
obsolete

w/o the attackers even leveraging virtual machine technology.

The attackers can leverage the technology in an otherwise poorly
defended machine. Some years ago there was a product claiming
that it could operate even at a public access machine because
of their completeness of their antivirus countermeasures ... even
on an infected machine. I raised the issue that it would be trivial
to defeat all such countermeasures using virtual machine technology.
Somewhat of a skirmish resulted since they had never considered
(or heard of) virtual machine technology ... for all i know there
is still ongoing head-in-the-sand situation.

for little topic drift ... this blog entry:
https://financialcryptography.com/mt/archives/000991.html

and
http://www.garlic.com/~lynn/aadsm28.htm#3
http://www.garlic.com/~lynn/aadsm28.htm#5

there is some assertion that the crooks overwhelming the
defenders countermeasures because they are operating
significantly faster and more efficiently.

however, another interpretation is that the defenders
have chosen extremely poor position to defend ... and are
therefor at enormous disadvantage. it may be necessary
to change the paradigm (and/or find the high ground)
in order to successfully defend.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-02 Thread Angelos D. Keromytis
There was a paper in IEEE Security  Privacy 2006 by Sam King on how  
to do this kind of attack (his system was called SubVirt):

http://www.eecs.umich.edu/virtual/papers/king06.pdf

However, in practice it turns out this is a much harder than people  
think. See Tal Garfinkel's paper on precisely this topic at HotOS 2007:

http://www.stanford.edu/~talg/papers/HOTOS07/abstract.html

-Angelos


On Jan 2, 2008, at 1:09 PM, Anne  Lynn Wheeler wrote:


Bill Frantz wrote:
 My favorite virtual machine use is for the virus to install itself
 as a virtual machine, and run the OS in the virtual machine.  This
 technique should be really good for hiding from virus scanners.

re:
http://www.garlic.com/~lynn/aadsm28.htm#2 Death of antivirus  
software imminent
http://www.garlic.com/~lynn/aadsm28.htm#4 Death of antivirus  
software imminent


i commented on that in reference posts mentioning that there have been
uses of virtual machines to study virus/trojans ... but that
some of the new generation virus/trojans are now looking to see if  
they

are running in virtual machine (studied?).

some of the current trade-off is whether that virtual machine  
technology
can be used to partition off basically insecure operations (which  
are widely

recognized as being easy to compromise) and then completely discard
the environment and rebuild from scratch after every session (sort of
the automated equivalent of having to manually wipe an infected  
machine

and re-install from scratch).

the counter argument is that crooks can possibly also use similar
technology to hide ... once they have infected the machine. the  
current
issue is that a lot of the antivirus/scanning techniques are  
becoming obsolete

w/o the attackers even leveraging virtual machine technology.

The attackers can leverage the technology in an otherwise poorly
defended machine. Some years ago there was a product claiming
that it could operate even at a public access machine because
of their completeness of their antivirus countermeasures ... even
on an infected machine. I raised the issue that it would be trivial
to defeat all such countermeasures using virtual machine technology.
Somewhat of a skirmish resulted since they had never considered
(or heard of) virtual machine technology ... for all i know there
is still ongoing head-in-the-sand situation.

for little topic drift ... this blog entry:
https://financialcryptography.com/mt/archives/000991.html

and
http://www.garlic.com/~lynn/aadsm28.htm#3
http://www.garlic.com/~lynn/aadsm28.htm#5

there is some assertion that the crooks overwhelming the
defenders countermeasures because they are operating
significantly faster and more efficiently.

however, another interpretation is that the defenders
have chosen extremely poor position to defend ... and are
therefor at enormous disadvantage. it may be necessary
to change the paradigm (and/or find the high ground)
in order to successfully defend.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2008-01-02 Thread Leichter, Jerry
Virtualization has become the magic pixie dust of the decade.

When IBM originally developed VMM technology, security was not a primary
goal.  People expected the OS to provide security, and at the time it
was believed that OS's would be able to solve the security problems.

As far as I know, the first real tie of VMM's to security was in a DEC
project to build a VMM for the VAX that would be secure at the Orange
Book A2 level.  The primary argument for this was:  Existing OS's are
way too complex to verify (and in any case A2 required verified design,
which is impossible to apply to an already-existing design).  A VMM can
be small and simple enough to have a verified design, and because it
runs under the OS and can mediate all access to the hardware, it can
serve as a Reference Monitor.  The thing was actually built and met its
requirements (actually, it far exceeded some, especially on the
performance end), but died when DEC killed the VAX in favor of the
Alpha.

Today's VMM's are hardly the same thing.  They are built for perfor-
mance, power, and managability, not for security.  While certainly
smaller than full-blown Windows, say, they are hardly tiny any more.
Further, a major requirement of the VAX VMM was isolation:  The
different VM's could communicate only through network protocols.  No
shared devices, no shared file systems.  Not the kind of thing that
would be practical for the typical uses of today's crop of VM's.

The claim that VMM's provide high level security is trading on the
reputation of work done (and published) years ago which has little if
anything to do with the software actually being run.  Yes, even as they
stand, today's VMM's probably do provide better security than some -
many? - OS's.  Using a VM as resettable sandbox is a nice idea, where
you can use it.  (Of course, that means when you close down the sandbox,
you lose all your state.  Kind of hard to use when the whole point of
running an application like, say, an editor is to produce long-lived
state!  So you start making an exception here, an exception there
... and pretty soon the sand is spilled all over the floor and is in
your eyes.)

The distinction between a VMM and an OS is fuzzy anyway.  A VMM gives
you the illusion that you have a whole machine for yourself.  Go back
a read a description of a 1960's multi-user OS and you'll see the
very same language used.  If you want to argue that a small OS *can
be* made more secure than a huge OS, I'll agree.  But that's a size
distinction, not a VMM/OS distinction
-- Jerry

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2007-12-31 Thread Sherri Davidoff
Anne  Lynn Wheeler wrote:
 Virtualization still hot, death of antivirus software imminent, VC says
 http://www.networkworld.com/news/2007/121707-crystal-ball-virtualization.html

Interesting how virtualization seems to imply safe in the public
mind (and explicitly in that article) right now I'm sure with the
increasing use of virtualization, we'll start to see more VMware-aware
malware and virtual machine escapes in the wild. Another example of
putting many, many eggs in the same basket.

Here's a good article about the first public VMware escape, which
Intelguardians demonstrated at SANSFIRE this summer:
(Note: I'm biased, having worked on this project.)
http://www.pauldotcom.com/2007/07/

What boggles my mind is that despite this, the DoD has still decided to
rely on virtualization software to keep classified and unclassified info
on the same physical systems:
http://www.internetnews.com/storage/article.php/3696996

Sherri



Anne  Lynn Wheeler wrote:
 re:
 Storm, Nugache lead dangerous new botnet barrage
 http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1286808,00.html
 
 from above:
 
 The creators of these Trojans and bots not only have very strong software 
 development and testing skills, but also clearly know how security vendors 
 operate and how to outmaneuver defenses such as antivirus software, IDS and 
 firewalls, experts say. They know that they simply need to alter their code 
 and the messages carrying it in small ways in order to evade signature-based 
 defenses. Dittrich and other researchers say that when they analyze the code 
 these malware authors are putting out, what emerges is a picture of a group 
 of skilled, professional software developers learning from their mistakes, 
 improving their code on a weekly basis and making a lot of money in the 
 process.
 
 ... snip ...
 
 ... and somewhat related
 
 Virtualization still hot, death of antivirus software imminent, VC says
 http://www.networkworld.com/news/2007/121707-crystal-ball-virtualization.html
 
 from above:
 
 Another trend Maeder predicts for 2008 is, at long last, the death of 
 antivirus software and other security products that allow employees to 
 install and download any programs they'd like onto their PCs, and then 
 attempt to weed out the malicious code. Instead, products that protect 
 endpoints by only allowing IT-approved code to be installed will become the 
 norm.
 
 ... snip ...
 
 and post about dealing with compromised machines
 http://www.garlic.com/~lynn/2007u.html#771 folklore indeed
 
 mentioning sophistication in other ways:
 
 Botnet-controlled Trojan robbing online bank customers
 http://www.networkworld.com/news/2007/121307-zbot-trojan-robbing-banks.htm
 
 from above:
 
 If the attacker succeeds in getting the Trojan malware onto the victim's
 computer, he can piggyback on a session of online banking without even
 having to use the victim's name and password. The infected computer
 communicates back to the Trojan's command-and-controller exactly which
 bank the victim has an account with. It then automatically feeds code
 that tells the Trojan how to mimic actual online transactions with a
 particular bank to do wire transfers or bill payments
 
 ... snip ...
 
 there have been some number of online banking countermeasures for
 specific kinds of system compromises  like keyloggers ... but they
 apparently didn't bother to get promises from the crooks to only limit
 the kinds of attacks to those exploits.
 
 some related comments on such compromised machines
 http://www.garlic.com/~lynn/aadsm27.htm#66 2007: year in review
 http://www.garlic.com/~lynn/aadsm28.htm#0 2007: year in review
 
 -
 The Cryptography Mailing List
 Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]


Re: Death of antivirus software imminent

2007-12-31 Thread Ivan Krstić

On Dec 29, 2007, at 6:37 PM, Anne  Lynn Wheeler wrote:

Virtualization still hot, death of antivirus software imminent


My, that sounds awfully familiar:
http://radian.org/~krstic/talks/2007/auscert/slides.pdf

I note that, come the January OLPC software update, I will be using my  
XO laptop for all my e-banking and related needs. It provides a  
drastically more secure platform for doing so than any mainstream  
computer I know exists.


--
Ivan Krstić [EMAIL PROTECTED] | http://radian.org

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]