On Tue, 16 Nov 1999, Per Gustav Ousdal wrote:

> > Which still doesn't cover HTTP downloads, especially of self-updating 
> > HTTP-based things like say a new release of IE.  There are simply 
> > becomming too many vectors to get data "in." 
> 
> Yeah, I agree with you, if I was "mht" I "wouldn't be sleeping as good at 
> night" as he/she seems to ;) HTTP is a problem, it just to flexible. And
> I agree: self-updating software is not a good thing. 
> 

Self-updating software removes costly distribution and support issues, I
expect that we'll see a lot more of it in the future, irregardless of if
we'd like to or not.

> But what if the security policy state that only the SysAdmin (or atleast 
> someone who knows about MD5, etc) is allowed to download & install new
> software. Or new software should ONLY be dl from the intranet server. Is
> there a way to enforce such a policy? (i.e. looks at what is beeing sent
> via HTTP, filters out the desired MIME types, unless the person is
> authorised) Might be possible depending on the size and requirements of
> the organisation, but does it exist? 

The problem is that it's possible to write HTTP-enabled software that
bypasses such controls.  The end-user perhaps won't even be aware of the
fact.

[snip]

> Right, HTTP is a difficult one :/ I think part of the problem here is that 
> to many WWW == the Internet, I mean they do everything thru the web
> interface.
> 
> Virus scanning everything should help some, ofcoz it woun't prtotect you 
> against new stuff (but maybe your security policy allows you to settle
> with this).

Given the traffic/bandwidth requirements of the future, this is going to
be a losing game with streaming media.  I'd prefer to look at things that
will work for the next several years, not just a few months.

> One solution to minimizing the risk *could* be to have a net (firewalled 
> from the production network, and with a different security policy (maybe
> the modem pool to wich the users connect from home ;)) of sacrificable
> lambs that allows web browsing. And then limit as much as possible, or
> totaly block WWW on the production network. 

This works for some sorts of industries, but not for others.

[snip]

> I'd really like to see a (at least partially) solution here, since there 
> seems to be no end to this type of virus these days.

The solution is office applications that don't execute foreign content.

[snip]

> > > BTW: Hey, how come everyone else in this tread is @clark.net?? :)
> > 
> > We all chose the best regional ISP before the borg ship that is Verio 
> > moved in.  Or it's all a conspiricy ;)
> 
> Wow, quick, block every thing from clark.net :D Ok, so you all know how to 
> choose the best ISP, still find it amazing that you are all from the

Yep, and we all don't know how to switch when they go downhill too 

> same region :) BTW: what region is that?

Washington, D.C./Maryland/Northern Virginia.

Paul
-----------------------------------------------------------------------------
Paul D. Robertson      "My statements in this message are personal opinions
[EMAIL PROTECTED]      which may have no basis whatsoever in fact."
                                                                     PSB#9280

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to