Point well taken, but to bash a vendor or an ISP without having ALL the
facts in front of me is acting like a lynch mob. These threads grow into a
life of their own, and it is unfair to formulate or repeat a judgement of
opinion based upon what amounts to hearsay. Now, don't get me wrong, I do
not use any of their products, so I will not defend their honor, or their
robustness etc.... but I have learned one thing in the past few years....
the box has to be configured properly, testing has to be a regular thing,
and a person must remain ever vigilant in their business. And one other
thing, I may listen to other's opinions, but I try things out, play with
them myself, and formulate my own conclusions. Not reading about something
or acting on hearsay... we used to call that piling on... and it really does
not accomplish anything worthwhile in the end... We are not living in a
perfect world... the real issue is how well did the two react, did they
have properly planned and up to date recovery procedures in place and were
they able to execute them?
> -----Original Message-----
> From: mouss [SMTP:[EMAIL PROTECTED]]
> Sent: Friday, December 08, 2000 12:24 PM
> To: Frederick M Avolio; Crumrine, Gary L; Kathy;
> [EMAIL PROTECTED]
> Subject: RE: More info on NAI & McAfee website hacked.
>
> I fully agree, and would like to add that the point here (fro me) is that:
> a security vendor has something of his own hacked.
> how has this been done and why may be important or not depending
> on your opinions, but this directly lower their credibility as a firewall
> vendor. How would I, a customer among others, believe their
> sales guy when he comes and say "ya know, we are good at security,
> s you can use our product with confidence". my first reply, and I'm sure
> that's the same for many people is "oh, sorry, but no I won't trust your
> company since it has been incapable of securing its own site. either
> gimme serious arguments or I'll go another place".
>
> In other words, the incident makes their selling process harder. They can
> no more rely on TIS history and the robustness of the proxy architecure,
> as
> one could say "ok, TIS were great. what you guys have done to the Gauntlet
> is
> a crime...."
>
>
> cheers,
> mouss
>
>
> At 08:31 07/12/00 -0500, Frederick M Avolio wrote:
> >At 06:26 AM 12/7/00 -0500, Crumrine, Gary L wrote:
> >>I agree that pointing a finger at the ISP may be the easy way out, but
> it
> >>may not be all their fault. Both the ISP and NAI are victims... not the
> >>criminals.
> >
> >Generally, this is the same as: Well, it's an outside web server and it
> >doesn't have any secret stuff on it, so it is a sacrificial lamb
> >system. As I've mentioned before, the term "sacrificial lamb" has less
> to
> >do with the system and more to do with you and your job if you're
> supposed
> >to secure it.
> >
> >If it has your company name on it, you suffer. Years ago, before the web,
>
> >there was an FBI machine on the UUCP network. It was basically a PC that
> >sat in a back room. Not connected to anything else. But... it had the
> name
> >fbi.gov associated with it. So whatever happened to it reflected on the
> >FBI. When the CIA web site was hacked, it didn't matter that it wasn't
> >connected to any secure system. It was a site that had "cia.gov" in its
> name.
> >
> >Blame doesn't imply criminal behavior.
> >
> >Is the attacker to blame. Of course, and it was criminal behavior (in
> some
> >places).
> >
> >Is the ISP to blame? Sure. Anyone offering web site space and support
> >should also provide the best security possible. Most ISPs are clueless
> >about security. And their customers are more interested in speed and
> >connectivity and up-time than they are about how the web server is
> >secured. So, the customers are to blame, also, for not demanding
> something
> >better.
> >
> >Is NAI to blame? Sure. As a customer, as I said in the previous
> paragraph,
> >if they did not demand to see a security architecture and monthly audit
> >reports (anyone do that with their web site provider?). Also, as a
> >supposedly clueful security company, if they did not require hardening of
>
> >the NT server, and installation of their fine IDS tools. Also, they
> should
> >be doing periodic verification of all of their systems exposed to the
> >outside, including those hosted by others. Would their vulnerability
> >scanner have detected an unpatched IIS? It should.
> >
> >Could NAI have done everything possible, done it almost flawlessly, and
> >still had this happen? Yes. But they still bear part of the blame. They
> >are still responsible. It's their site and they are a security company.
> >
> >It doesn't mean that they should pack it in and they no longer have any
> >credibility. If that were the case, where would Microsoft, Cisco, and
> >Check Point be? But, as I said yesterday in a post, it should at least be
>
> >a warning to other such companies, especially the small to medium sized
> >security vendors, to be aware of the pitfalls and to not get so sloppy.
> >
> >
> >Fred
> >Avolio Consulting, Inc.
> >16228 Frederick Road, PO Box 609, Lisbon, MD 21765, US
> >+1 410-309-6910 (voice) +1 410-309-6911 (fax)
> >http://www.avolio.com/
> >
> >-
> >[To unsubscribe, send mail to [EMAIL PROTECTED] with
> >"unsubscribe firewalls" in the body of the message.]
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]