| Security '03 - Invited Talk 
Internet Security: An Optimist Gropes For HopeBill Cheswick, Lumeta Click here to start
  Table of Contents
            Internet Security: An Optimist Gropes For Hope
        Firewalls and Internet Security
        Most common question from the press:
        Universal Answer
        Why?
        Aug. 1993
        In August 1993
        CERT advisories: 1994
        CERT advisories, 1994
        CERT advisories, 1994 (cont.)
        Many attacks were theoretical...
        ...and then they happened...
        There are a lot more players, and on average they are a lot less secure
        When I started at the Labs (Dec 1987)
        Now, everyone is on the Internet
        We've been losing ground for decades
        Life cycle of a security bug, roughly
        Yeahbuttal
        Cost vs. Benefits
        OTOH, tools we didn't have in 1994
        Bright spots, now
        I am optimistic.  Good security is possible
        There are a lot of benefits
        Financial business models are working
        And Microsoft...
        What does good security feel like?
        The Morris worm: Nov. 1988
        Some facts to keep in mind: economics
        Some things we can't fix
        Social Engineering
        I need to manage expectations here
        Software will always have bugs
        People pick lousy passwords
        Some facts to keep in mind: users are not security experts
        Social Engineering (cont.)
        Another Problem With Strange Programs
        Managing expectations: Denial-of-Service
        Wireless passwords
        Experts cut corners, too
        I cheated on my authentication test
        I cheated on my authentication test (cont.)
        Some principles and tools
        Security strategies
        Staying out of the game
        Defense in depth
        Layered Positive Measures to Assure Against Unauthorized Use
        Secure defaults are important
        Security doesn't need to be inconvenient
        Some solutions: Hardware tokens
        One-time Passwords
        Authentication
        Principles and tools: encryption
        Encryption is necessary, but not sufficient
        Tools: Trusted Computing Base
        Default servicesSGI workstation
        More default services
        If You Don't have a Trusted Computing Base...
        Firewalls Perimeter Defenses
        Firewalls have their uses
        Firewalls: Not a panacea
        Anything large enough to be called an "intranet" is probably out of control
        PPT Slide
        PPT Slide
        Some intranet statistics from Lumeta clients
        Perimeter defenses don't work if the perimeter is too big
        Example: Life Without a Firewall
        It can be done
        Life without a firewall
        We need to be able to trust our hosts
        Secure host technology
        Secure host technology
        Routes to root
        root network services
        Setuid-root programs
        Root: The gatewat to privilige
        Setuid-root
        So, don't have network services...
        So, don't have users...
        Get rid of setuid programs if you do have users
        Minimize root network services
        Three layers of defense we might have
        Chroot
        Awful stuff you have to do to jail a program
        Example: a web server highly-resistant to defacement
        Goal
        Implementation
        Other software I have jailed
        Sample message
        Sample message
        Some jail themselves, or should
        Example: Amazon, Fedex, ...
        Things are getting better: we have business models
        Example: Spook networks
        Talk to spooks: they have security experience
        Spooks
        Spooks...
        Ches's wish list
        Ches's wish list
        More wishes
        Ches's wish list
        Still theoretical
        Conclusion
        Questions
         
 |