|
|
Log in / Subscribe / Register

Security

Brief items

The National Strategy to Secure Cyberspace

[This article was contributed by Tom Owen]

The Friday release of the National Strategy to Secure Cyberspace may have been overshadowed by the recent departure of Richard Clarke, President Bush's Cybersecurity advisor. It certainly didn't get a big build up. But now we have the "final" version of what will doubtless be a continuously evolving strategy.

The draft released in September generated apathy and dismissal after widespread unsourced reports of tech firms lobbying to remove references to insecure "out of the box" configurations and wireless hazards. The biggest change over the draft is external: the Department of Homeland Security (DHS) now exists, with a budget and a head, and by far the majority of the action items fall on it.

The strategic objective is clear:

It is the policy of the United States to prevent or minimize disruptions to critical information infrastructures and thereby protect the people, the economy, the essential human and government services, and the national security of the United States.

as is the purpose of the document:

The purpose of this document is to engage and empower Americans to secure the portions of cyberspace that they own, operate, control, or with which they interact.

The core of the strategy is the five national priorities

  • A security response system
  • A threat & vulnerability reduction system
  • A Security awareness and training program
  • Security within government operations
  • National and International security co-operation
Within the strategy, each priority generates five to fifteen actions and recommendations. The actions typically fall on the federal government, typically the DHS or the United States generally, while the recomendations are for the private sector and academia.

Some consistent themes inform the discussion of all priorities:

  • The threat is real: the US depends on the integrity of cyberspace, and that integrity can now be undone by enemies.
  • Most of what's needed is outside the scope of Government: beyond protecting its own operations and the commons, the work has to be done by corporations, colleges and the public.
  • Public and private can, must, work together
  • Privacy and liberty must be protected. It's not that prominent, but it's a pleasant surprise to see it at all.

Regarding the called-for national security response system:

The National Cyberspace Security Response System will involve public and private institutions and cyber centers to perform analysis, conduct watch and warning activities, enable information exchange, and facilitate restoration efforts.

The plan appears to be mandating DHS to co-ordinate between Government agencies, and academic and private sector agents. Obvious candidates would include CERT, the AV vendors' labs, disaster recovery providers and perhaps operators like Bugtraq.

The challenge is twofold. Firstly, to co-ordinate their work on attacks and vulnerabilities, before and even -- using fax, conferencing and and voicemail -- during an attack, and secondly, to ensure that the private sector is using the resources created. It appears that there will be an effort to remove antitrust obstacles to this co-operation.

Responding to security incidents is important, but so is preventing those incidents before they happen. The strategy asks private and government agencies to communicate better to find and protect against potential problems. Even before the recent "Slammer" worm, others like Nimda and Code Red had made it clear that threats, once released, spread faster than fixes. So it is important to find and fix vulnerabilities before they are exploited.

One stand out point is a clear intention to use criminal justice more aggressively: this might be a good time to stop writing stupid viruses for fun. The strategy gets more specific here. Examples of the work planned include

  • Improving infrastructure: the Commerce Deptartment's review of a national transition to IPv6 and the DHS's intention to bang heads together to get progress on securing DNS and BGP, together with longer term efforts to to add source address verification and secure out-of-band management to the Internet
  • Securing plant and equipment control networks to exclude terrorists from air-traffic control, dams and chemical plants.
  • Addressing software vulnerabilities: establishing a neutral clearinghouse, with, interestingly, a national policy defining appropriate vulnerability disclosure, central testing for patches to Government systems, and promotion of tools and best practice for patch distribution.

Then, there is the call for a national security awareness and training program. This priority addresses a slightly broader range than most. The traditional targets for security training: users, admins and developers, are there, but the plan goes further:

Many information-system vulnerabilities exist because of a lack of cyberspace security awareness on the part of ... procurement officials, auditors, chief information officers, chief executive officers, and corporate boards.

Getting these people trained is not going to be easy. School curricula, awareness programs and certification and the other plan items can reach professionals and users, but getting informed discussion between corporate policymakers at the country club will take something more -- there may be a role for the insurers here.

Of course, the government must also worry about cleaning up its own act, so it is not surprising to see internal security as an important part of this plan. The plan in this area is blandly conventional, revealing that government practice is no better than the private sector. One of the few mentions of a specific technology, wireless, occurs under this heading.

The last item (national and international security coordination) seems like a bland commitment to improve international co-operation, encouraging foreign countries to achieve effective criminal law and participate in information-sharing programs. But early on comes this jaw-dropper:

When a nation, terrorist group, or other adversary attacks the United States through cyberspace, the U.S. response need not be limited to criminal prosecution. The United States reserves the right to respond in an appropriate manner.

The strategy doesn't expand on this point, and responsibility for that action falls on no specific agency, but when it happens, it'll be on the evening news.

Given the source, the document as a whole is at least as good as could have been hoped. Part of the value comes from what's left out:

  • Theres no hysteria about encryption or crackers
  • No plan to wall off the US and unplug those nasty foreigners
  • No dramatic legislative program
  • No mandation or prohibition of specific technologies and vendors

High-level strategic planning can be used to hide a lot of vagueness and unreality, as the broad scope needed in the language and objectives makes it hard to visualise what is intended. This hasn't happened here. The Department of Homeland Security's interest in the network comes into clearer focus. Some of the organisations and networks which will protect cyberspace are making their first appearance here. And we can see that some people are asking the right questions.

Comments (1 posted)

February CRYPTO-GRAM Newsletter

Bruce Schneier's CRYPTO-GRAM newsletter for February is out. It looks at Matt Blaze's lock-picking disclosure (and the reaction to it), SQL Slammer worm notes, the importance of authentication, and more. "I'd rather have as much information as I can to make an informed decision about security. I'd rather have the information I need to pressure vendors to improve security. I don't want to live in a world where locksmiths can sell me a master key system that they know doesn't work or where the government can implement security measures without accountability."

Full Story (comments: none)

New vulnerabilities

mailman: mailman 2.1 cross site scripting vulnerabilities

Package(s):mailman CVE #(s):
Created:February 18, 2003 Updated:February 19, 2003
Description: The email variable and the default error page in mailman 2.1 contains cross site scripting vulnerabilities.

Read the the full advisory for the details.

Alerts:
Gentoo 200302-05 mailman 2003-02-17

Comments (none posted)

nethack: buffer overflow

Package(s):nethack, slashem, falconseye CVE #(s):CAN-2003-0358 CAN-2003-0359
Created:February 18, 2003 Updated:July 15, 2003
Description: Overflowing a buffer in nethack may lead to privilege escalation to games uid.

Read the the full advisory for the details.

Note that falconseye does not contain the file permission error CAN-2003-0359 which affected some other nethack packages.

Alerts:
Debian DSA-350-1 falconseye 2003-07-15
Debian DSA-316-3 jnethack 2003-06-17
Debian DSA-316-2 slashem 2003-06-11
Debian DSA-316-1 nethack 2003-06-11
Gentoo 200302-08 nethack 2003-02-18

Comments (none posted)

OpenSSL: plaintext exposure vulnerability

Package(s):openssl CVE #(s):CAN-2003-0078
Created:February 19, 2003 Updated:March 6, 2003
Description: A vulnerability has been found in OpenSSL that, given the right conditions, could lead to the exposure of transactions in plain text. This problem looks difficult to exploit (it requires a man-in-the-middle attack, among other things), but one can't be too sure, so the OpenSSL project has released versions 0.9.7a (with the fix and some new features) and 0.9.6i (with fixes only). See the announcement for details.
Alerts:
Red Hat RHSA-2003:062-11 OpenSSL 2003-03-06
SuSE SuSE-SA:2003:011 openssl 2003-02-26
Conectiva CLA-2003:570 openssl 2003-02-24
Debian DSA-253-1 openssl 2003-02-24
Mandrake MDKSA-2003:020 openssl 2003-02-21
Trustix 2003-0005 openssl 2003-02-20
Gentoo 200302-10 openssl 2003-02-20
EnGarde ESA-20030220-005 openssl 2003-02-20
OpenPKG OpenPKG-SA-2003.013 openssl 2003-02-19

Comments (none posted)

pam_xauth: root exploit

Package(s):pam_xauth CVE #(s):CAN-2002-1160
Created:February 13, 2003 Updated:July 10, 2003
Description: The pam_xauth module is used to forward xauth information from user to user in applications such as 'su'.

Andreas Beck discovered that versions of pam_xauth supplied with Red Hat Linux since version 7.1 would forward authorization information from the root account to unprivileged users. This could be used by a local attacker to gain access to an administrator's X session. In order to exploit this vulnerability, the attacker would have to get the administrator, as root, to use su to the account belonging to the attacker.

Alerts:
Conectiva CLA-2003:693 pam 2003-07-10
Mandrake MDKSA-2003:017-1 pam 2003-04-28
Red Hat RHSA-2003:035-10 pam_xauth 2003-02-12

Comments (none posted)

php: arbitrary file access and code execution

Package(s):php, mod_php CVE #(s):
Created:February 18, 2003 Updated:February 19, 2003
Description: Kosmas Skiadopoulos discovered a serious security vulnerability [0] in the CGI SAPI of PHP version 4.3.0. PHP [1] contains code for preventing direct access to the CGI binary with configure option "--enable-force-cgi-redirect" and php.ini option "cgi.force_redirect". In PHP 4.3.0 there is a bug which renders these options useless. Please note that this bug does NOT affect any of the other SAPI modules such as the Apache or ISAPI modules.

Anyone with access to websites hosted on a web server which employs the CGI module may exploit this vulnerability to gain access to any file readable by the user under which the webserver runs. A remote attacker could also trick PHP into executing arbitrary PHP code if attacker is able to inject the code into files accessible by the CGI. This could be for example the web server access-logs.

References:
[0] http://www.php.net/release_4_3_1.php
[1] http://www.php.net/

Alerts:
Gentoo 200302-09 mod_php 2003-02-19
OpenPKG OpenPKG-SA-2003.010 php, apache 2003-02-18

Comments (none posted)

syslinux: security issues in installer

Package(s):syslinux CVE #(s):
Created:February 18, 2003 Updated:February 19, 2003
Description: From the syslinux changelog:

"Security flaws have been found in the SYSLINUX installer when running setuid root. Rewrite the SYSLINUX installer so it uses mtools instead. It therefore now requires mtools (specifically mcopy and mattrib) to exist on your system, but it will not require root privileges and SHOULD NOT be setuid."

Alerts:
Gentoo 200302-06 syslinux 2003-02-17

Comments (none posted)

util-linux: predictable mcookie results

Package(s):util-linux CVE #(s):
Created:February 14, 2003 Updated:February 19, 2003
Description: The util-linux package provides the mcookie utility, a tool for generating random cookies that can be used for X authentication. The util-linux packages that were distributed with Mandrake Linux 8.2 and 9.0 had a patch that made it use /dev/urandom instead of /dev/random, which resulted in the mcookie being more predictable than it would otherwise be. This patch has been removed in these updates, giving mcookie a better source of entropy and making the generated cookies less predictable. Thanks to Dirk Mueller for pointing this out.
Alerts:
Mandrake MDKSA-2003:016 util-linux 2003-02-13

Comments (2 posted)

Resources

Egress filtering for a healthier Internet.

This issue of "Linux Security: Tips, Tricks, and Hackery" looks at egress filtering as a way of protecting the net against mass attacks.

Full Story (comments: 1)

Events

The First Honeyd Challenge

The first Honeyd Challenge has been announced along with the 0.5 release of the Honeyd virtual honeypot system. "The goal of this challenge is to develop interesting feature additions to Honeyd. Possible improvements are forensic analysis tools for Honeyd log files, passive fingerprinting of connections, realistic routing topologies, etc."

Full Story (comments: none)

ACNS 2003

The first MiAn International Conference on Applied Cryptography and Network Security will be held October 16 to 19 in Kunming, China. The submission deadline is May 1 for those who would like to present there.

Full Story (comments: none)

NSPW 2003 Call For Papers

The New Security Paradigms Workshop 2003 will be held August 18 to 21 in Ascona, Switzerland. The Call For Papers has gone out, with a submission deadline of April 4.

Full Story (comments: none)

Page editor: Jonathan Corbet
Next page: Kernel development>>


Copyright © 2003, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds