RE: Training users to be security-conscious [Re: Securing MS-SQL port 1433]

2005-03-04 Thread Robertson-Ravo, Neil (RX)
We have to use secure pin to access the servers - how secure do you want to
do ;-)  Passwords alone as simply not enough.




-Original Message-
From: John Paul Ashenfelter [mailto:[EMAIL PROTECTED] 
Sent: 04 March 2005 12:17
To: CF-Talk
Subject: Training users to be security-conscious [Re: Securing MS-SQL port
1433]

On Tue, 1 Mar 2005 22:06:48 -0500, Dave Watts <[EMAIL PROTECTED]> wrote:

> > How is this any different than the corporate education about
> > opening attachments (bad) and phishing (bad)? Most people,
> > I'd put forth, *do* know that the internet isn't all that
> > safe and they should be running a firewall. WinXP SP2 finally
> > has it builtin, for gosh sakes.
> 
> While most people may know that they should be running a firewall, I doubt
> very much that most of these people even know what a firewall is. And when
> their system pops up a little message saying "do you want to allow traffic
> from [socket 1] to [socket 2]", they'll click the OK button in many cases
> even if they don't know the import of their actions. And again, your
analogy
> with corporate education about attachments just highlights the idiocy of
our
> industry - we find it more efficient to train untold thousands of people
not
> to double-click something, rather than design a safe system in the first
> place! If we built cars, we'd tell people "don't drive downhill because
the
> brakes don't work", rather than just fixing the damn brakes. How idiotic
is
> that?

On a related note, Kevin Mitnik (quite famous convicted hacker) spoke
about security and (normal) employees recently
(http://www.zdnet.com.au/news/security/0,261744,39183334,00.htm)
-- his conclusion?

Companies eager to tighten up their information security perimeters
should focus not on technology but on teaching their employees how to
say 'no'

I'm pretty sure he's not eligible to sit for the CISSP (that whole
ethics thing) but he does know a thing or two about penetrating
security. So while it certainly is *annoying* that we have to train
users not to open attachments containing Ann/Paris/Brittany pics, not
to give their passwords out over the phone, and not to blithely use
unencrypted wifi access points, and all the rest -- it's not foolish
or stupid at all.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]



~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197454
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Training users to be security-conscious [Re: Securing MS-SQL port 1433]

2005-03-04 Thread Adrian Lynch
What about Joey from friends, he scratched his PIN into the side of the cash
machine(ATM)! I thought that was class :OD

-Original Message-
From: James Holmes [mailto:[EMAIL PROTECTED]
Sent: 04 March 2005 14:58
To: CF-Talk
Subject: RE: Training users to be security-conscious [Re: Securing
MS-SQL port 1433]


If we could just train our users not to write their username and password on
a Post-It on their monitor, I'd be happy.

--
No virus found in this outgoing message.
Checked by AVG Anti-Virus.
Version: 7.0.308 / Virus Database: 266.6.0 - Release Date: 02/03/2005


~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197452
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Training users to be security-conscious [Re: Securing MS-SQL port 1433]

2005-03-04 Thread James Holmes
If we could just train our users not to write their username and password on
a Post-It on their monitor, I'd be happy. 

~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197441
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Training users to be security-conscious [Re: Securing MS-SQL port 1433]

2005-03-04 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 22:06:48 -0500, Dave Watts <[EMAIL PROTECTED]> wrote:

> > How is this any different than the corporate education about
> > opening attachments (bad) and phishing (bad)? Most people,
> > I'd put forth, *do* know that the internet isn't all that
> > safe and they should be running a firewall. WinXP SP2 finally
> > has it builtin, for gosh sakes.
> 
> While most people may know that they should be running a firewall, I doubt
> very much that most of these people even know what a firewall is. And when
> their system pops up a little message saying "do you want to allow traffic
> from [socket 1] to [socket 2]", they'll click the OK button in many cases
> even if they don't know the import of their actions. And again, your analogy
> with corporate education about attachments just highlights the idiocy of our
> industry - we find it more efficient to train untold thousands of people not
> to double-click something, rather than design a safe system in the first
> place! If we built cars, we'd tell people "don't drive downhill because the
> brakes don't work", rather than just fixing the damn brakes. How idiotic is
> that?

On a related note, Kevin Mitnik (quite famous convicted hacker) spoke
about security and (normal) employees recently
(http://www.zdnet.com.au/news/security/0,261744,39183334,00.htm)
-- his conclusion?

Companies eager to tighten up their information security perimeters
should focus not on technology but on teaching their employees how to
say 'no'

I'm pretty sure he's not eligible to sit for the CISSP (that whole
ethics thing) but he does know a thing or two about penetrating
security. So while it certainly is *annoying* that we have to train
users not to open attachments containing Ann/Paris/Brittany pics, not
to give their passwords out over the phone, and not to blithely use
unencrypted wifi access points, and all the rest -- it's not foolish
or stupid at all.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197427
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-03 Thread Robertson-Ravo, Neil (RX)
Eh?

-Original Message-
From: Lee [mailto:[EMAIL PROTECTED] 
Sent: 03 March 2005 16:15
To: CF-Talk
Subject: Re: Securing MS-SQL port 1433

Lee: Hi my name is Lee and I'm "and idiot".

Half the list: Hi Lee!

Lee: I installed my first Windows box in 1998.

Half the list: (Sympathetic Hush)

Lee: Yeah and ever since then my life has been out of 
control. I really need Windows but the problems it's 
caused...

Half the list: Nodding approval...




~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197274
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-03 Thread Lee
Lee: Hi my name is Lee and I'm "and idiot".

Half the list: Hi Lee!

Lee: I installed my first Windows box in 1998.

Half the list: (Sympathetic Hush)

Lee: Yeah and ever since then my life has been out of 
control. I really need Windows but the problems it's 
caused...

Half the list: Nodding approval...


~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197264
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-03 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 22:06:48 -0500, Dave Watts <[EMAIL PROTECTED]> wrote:
> > If someone's installing Visio Enterprise to "work on
> > flowcharts at home", they probably got it from work.
> > Licensing issues aside (since we'll assume they're good
> > there) then their home box gets hosed. PITA, but not much
> > impact on the business.
> 
> My point has nothing to do with "impact on the business". You stated that
> anyone running an unprotected SQL Server was an idiot. I took issue with
> that, and provided a counterexample. It's as simple as that.

And I'm still not convinced by your counterexample. While MSDE is
certainly fundamentally SQL Server (and now officially named that in
the 2005 product editions) the original point was that leaving your
SQL Server wide open for TCP/IP access was an idiotic thing to do. And
on a ColdFusion list, clearly from context we're talking about the SQL
Server(s) interacting with the ColdFusion server(s). (I will make that
clear next time ;)

I think the main value of the MSDE counterexample is as a reminder
that you need to secure your SQL Server against both external threats
(e.g. locking down TCP/IP access) and *internal* threats that avoid or
circumvent the externally-facing security measures. If Joe Homeuser
picks up Slammer on his Visio-installed MSDE, that sucks for him --
but if Jane Sysadmin hasn't protected the internal systems from such a
scenario then she's probably on the way to clean our her desk.

> > How is this any different than the corporate education about
> > opening attachments (bad) and phishing (bad)? Most people,
> > I'd put forth, *do* know that the internet isn't all that
> > safe and they should be running a firewall. WinXP SP2 finally
> > has it builtin, for gosh sakes.
> 
> While most people may know that they should be running a firewall, I doubt
> very much that most of these people even know what a firewall is. And when
> their system pops up a little message saying "do you want to allow traffic
> from [socket 1] to [socket 2]", they'll click the OK button in many cases
> even if they don't know the import of their actions. And again, your analogy
> with corporate education about attachments just highlights the idiocy of our
> industry - we find it more efficient to train untold thousands of people not
> to double-click something, rather than design a safe system in the first
> place! If we built cars, we'd tell people "don't drive downhill because the
> brakes don't work", rather than just fixing the damn brakes. How idiotic is
> that?

I think we both agree that it's idiotic as an industry that we have to
deal with anti-virus software, spam filters, spyware, worms, phishing,
and the like. It's hard to claim otherwise! But we've got the systems
we've got -- if your car *doesn't* have brakes and you say to yourself
"Well, it should have breaks so I'm going to go down this hill anyway.
It will be the engineers' fault!" you are pretty foolish. If you
however attach a parachute to the back of the car to slow you (or do a
Fred Flinstone with your feet to stop) you've at least hedged your
bets.

> > Actually, I think the answer to your question is yes, you did
> > have something happen to you that was completely avoidable
> > and probably deserve it. You chose to keep your door open
> > when they're a high likelihood of attack (we're comparing to
> > the security of the internet, remember).
> 
> You have a peculiar way of defining "deserved".

To think that's the result has been "earned" by your actions? That you
"merited" the attack? (a few definitions just to make sure I'm using
the word in a normal fashion...). I think the cracker, script kiddie,
or disgruntled employee who now has access to your data would
certainly think you deserved it.
-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197253
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-03 Thread Robertson-Ravo, Neil (RX)
-- My original point wasn't that you have to be fully patched to be safe

I agree with that for sure.

-Original Message-
From: John Paul Ashenfelter [mailto:[EMAIL PROTECTED] 
Sent: 03 March 2005 15:28
To: CF-Talk
Subject: Re: Securing MS-SQL port 1433

On Wed, 2 Mar 2005 09:32:10 -, Robertson-Ravo, Neil (RX)
<[EMAIL PROTECTED]> wrote:
> My point is that if you are running 818 you are NOT fully patched.

Not disputing that at all. And even having MS-SQL fully patched on a
Windows box that is missing OS patches doesn't necessarily make you
safe either, considering the other known vulnerabilities in a base
Windows install. But as you probably know from reading the security
bulletins, the overwhelming majority of the vulnerabilities MS issues
patches for can be mitigated by controlling and limiting either remote
access (e.g. blocking external access to services) or securing
physical access -- not fixed for sure, but mitigated. And that
certainly gives you time to assess the effect of the patch/update on
your systems in a calm and controlled way.

My original point wasn't that you have to be fully patched to be safe
-- it was that leaving the door wide open to a known and widely
publicized problem was foolish and stupid, which would make such a
person an idiot.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]



~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197248
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-03 Thread John Paul Ashenfelter
On Wed, 2 Mar 2005 09:32:10 -, Robertson-Ravo, Neil (RX)
<[EMAIL PROTECTED]> wrote:
> My point is that if you are running 818 you are NOT fully patched.

Not disputing that at all. And even having MS-SQL fully patched on a
Windows box that is missing OS patches doesn't necessarily make you
safe either, considering the other known vulnerabilities in a base
Windows install. But as you probably know from reading the security
bulletins, the overwhelming majority of the vulnerabilities MS issues
patches for can be mitigated by controlling and limiting either remote
access (e.g. blocking external access to services) or securing
physical access -- not fixed for sure, but mitigated. And that
certainly gives you time to assess the effect of the patch/update on
your systems in a calm and controlled way.

My original point wasn't that you have to be fully patched to be safe
-- it was that leaving the door wide open to a known and widely
publicized problem was foolish and stupid, which would make such a
person an idiot.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197247
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-02 Thread Robertson-Ravo, Neil (RX)
My point is that if you are running 818 you are NOT fully patched.



-Original Message-
From: John Paul Ashenfelter [mailto:[EMAIL PROTECTED] 
Sent: 01 March 2005 21:53
To: CF-Talk
Subject: Re: Securing MS-SQL port 1433

On Tue, 1 Mar 2005 20:53:13 -, Robertson-Ravo, Neil (RX)
<[EMAIL PROTECTED]> wrote:
>  I would say NONE - all of the SQL boxes we have (and we have thousands)
are
> a) protected with hardware and software security.  They are all patched to
> the highest degree (where needs be, as not all servers require all patches
> for loopholes and indeed some cannot have them).

Great! So by hardware and software security I'll take a stab at
translating that as at least a firewall. So far we're in agreement.
Remember, this started b/c I said anyone who left port 1433 open was
an idiot -- now we're into discussing how to assess the risk from a
specific vulnerability (choosing which patches to apply) and which
service pack which *are* (potentially) past the normal desktop user's
area of responsibility.
 
> Let me ask you, what version of SQL are you running? 8.00.818?

Actually, yes I am on my production servers. My clients are a mix of
..818 (post-SP3 hotfix) and .760 (SP3). And to be completely fair, my
laptop actually runs 8.00.760 (with Named Pipes disabled).
 
> Note you do not have to patch all risks if the risk is low  - for example
> there may be an issue where a maliscious user could access your server but
> its only a problem/issue if the maliscious user can gain access to it...

Agreed -- whether it's MS-SQL or Windows (or Linux or CF or whatever)
you don't have to immediately apply patches if you're not vulnerable
to the issue. As I've said, I run my laptop in *horrors* SP3 instead
of the post-SP3 hotfix -- upgrading wasn't worth the risk (though when
I build a new box, it goes to .818 by default)
 

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]



~|
Discover CFTicket - The leading ColdFusion Help Desk and Trouble 
Ticket application

http://www.houseoffusion.com/banners/view.cfm?bannerid=48

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197079
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-01 Thread Dave Watts
> If someone's installing Visio Enterprise to "work on 
> flowcharts at home", they probably got it from work. 
> Licensing issues aside (since we'll assume they're good 
> there) then their home box gets hosed. PITA, but not much 
> impact on the business.

My point has nothing to do with "impact on the business". You stated that
anyone running an unprotected SQL Server was an idiot. I took issue with
that, and provided a counterexample. It's as simple as that.

> How is this any different than the corporate education about 
> opening attachments (bad) and phishing (bad)? Most people, 
> I'd put forth, *do* know that the internet isn't all that 
> safe and they should be running a firewall. WinXP SP2 finally 
> has it builtin, for gosh sakes.

While most people may know that they should be running a firewall, I doubt
very much that most of these people even know what a firewall is. And when
their system pops up a little message saying "do you want to allow traffic
from [socket 1] to [socket 2]", they'll click the OK button in many cases
even if they don't know the import of their actions. And again, your analogy
with corporate education about attachments just highlights the idiocy of our
industry - we find it more efficient to train untold thousands of people not
to double-click something, rather than design a safe system in the first
place! If we built cars, we'd tell people "don't drive downhill because the
brakes don't work", rather than just fixing the damn brakes. How idiotic is
that?

> Actually, I think the answer to your question is yes, you did 
> have something happen to you that was completely avoidable 
> and probably deserve it. You chose to keep your door open 
> when they're a high likelihood of attack (we're comparing to 
> the security of the internet, remember).

You have a peculiar way of defining "deserved".

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197061
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 20:00:28 -0500, Dave Watts <[EMAIL PROTECTED]> wrote:

> > Even "normal" home users are aware of the need for firewall
> > (and av) software. A $40 dsl/cable/etc router contains a
> > decent enough firewall to protect a MS-SQL server behind it
> > with no more work than plugging it in and turning it on.
> 
> Sure, that's one thing. So Joe Home User goes out and buys a $50 wireless
> router which blocks external access, but allows internal access to other
> machines connecting through WiFi. He plugs it into his cable modem and he's
> all set, until his nextdoor neighbor infects his machine by connecting to it
> through the open-by-default wireless connection! D'oh! I guess he's just an
> idiot, because he doesn't know how TCP/IP works. Too bad he installed Visio
> Enterprise so he could work on flow charts at home. How could anyone be so
> dumb?

If someone's installing Visio Enterprise to "work on flowcharts at
home", they probably got it from work. Licensing issues aside (since
we'll assume they're good there) then their home box gets hosed. PITA,
but not much impact on the business. If it's a work laptop, then their
security officer/sysadmin should be having a discussion with them
about a number of aspects relating to security. Even if they're
running WPA at home, they're potentially screwed as soon as the hit
the coffee shop's open router to get some work while they're on a
business trip. Or as soon as they VPN into the office with their
infected box...

How is this any different than the corporate education about opening
attachments (bad) and phishing (bad)? Most people, I'd put forth, *do*
know that the internet isn't all that safe and they should be running
a firewall. WinXP SP2 finally has it builtin, for gosh sakes.
 
> I've got news for you. Most people don't know how TCP/IP works. And if they
> have to know that in order to use a PC, something is radically wrong with
> PCs.

Why would they have to know how TCP/IP works? Do they have to know how
VBScript and ActiveX work to be aware that they should be running
antivirus software? Or do they just need to be aware of the risk?
 
> Who said anything about developers? Again, there are plenty of applications
> with vulnerabilities, and these may be run by people other than developers.
> Oh, and that list of apps that use MSDE is woefully incomplete, by the way.
> I've worked with several applications that (a) aren't on the list and (b)
> install MSDE without notifying the user.

It's fair that that's an incomplete list. I'd venture that there isn't
one single list of every commercial app running MSDE.
 
> > The assumption that "I didn't know" is an acceptable excuse
> > relating to security, whether it's configuration (e.g.
> > firewall settings) or code (e.g. SQL injection
> > vunerabilities) is a key reason why people get cracked. And
> > frankly, I care less about someone with poor security getting
> > hacked (something along the lines of "getting what you
> > deserve") than what their zombie server can do to my sites or
> > one of the sites I count on -- or about the consequences of
> > the use/misuse of my data they're storing.
> 
> If I leave my front door open and someone walks in and bops me on the head,
> did I get what I deserve? Why is this any different?

Actually, I think the answer to your question is yes, you did have
something happen to you that was completely avoidable and probably
deserve it. You chose to keep your door open when they're a high
likelihood of attack (we're comparing to the security of the internet,
remember). I think the analogy is more akin to having homeowners'
insurance, sure odds are low your house will burn down, but when it
does (or speaking to more personal experience, when trees split your
roof in two consecutive hurricanes) you're going to feel pretty good
you took some basic precautions. No one hopes to use their insurance,
but nearly everyone gets it -- it's just what you do (or in the case
of a mortgage, are required to do) to mitigate your risk. Same with
antivirus, same with a basic firewall.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197060
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 20:01:13 -0500, Dave Watts <[EMAIL PROTECTED]> wrote:
> > IMO if you are so serious about security you should a) put
> > your DB servers on their own network with a firewall between
> > them everything else and b) use Oracle.
> 
> There are plenty of Oracle vulnerabilities - just ask Dave Litchfield.

And, for the record, so does MySQL. Considering there are three major
versions in frequently used in production (3.23.x, 4.0.x, and 4.1.x)
it can be a minefield.

Oh, and PostgreSQL. And DB2. And Sybase. 

Let's just say all of them have vulnerabilities. The best thing I'll
say about Oracle is that you almost *have* to have a certified Oracle
DBA, so odds are your install will be fairly secure. MySQL,
PostgreSQL, MS-SQL -- it's a lot more common to have the sysadmin or
one of the developers roleplay as the "DBA" with varying degrees of
success from a security perspective.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197059
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Securing your app [WAS Re: Securing MS-SQL port 1433]

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 17:24:25 -0500, Adrocknaphobia
<[EMAIL PROTECTED]> wrote:
> IMO if you are so serious about security you should a) put your DB
> servers on their own network with a firewall between them everything
> else and b) use Oracle.

I totally am in agreement with (a) -- mutlilayered security is much
more robust than a single layer, though it's more of a PITA. That's
the normal security tradeoff -- pain, annoyance, and inconvenience
seems to be directly (or possibly exponentially) related to security.

I think (b) is a less clear-cut. If you've got an experienced Oracle
DBA (which is a virtual requirement for a serious Oracle installation)
then you're in good shape. One problem w/ MS-SQL is that (like many
Microsoft products) it's "easy" to set up -- securing it is a
different animal altogether. Thankfully, MS made the default install
of IIS6 more secure, has created tools like the MSBA to help evaluate
SQL Server installations, and published whitepapers on how to secure
the default install which even a non-CISSP, non-MS-SQL DBA should be
able to follow.

And since we've been pounding on MS-SQL, let's be fair and mention the
default configuration out of the box for MySQL. Argghh!
 
> Contracting a virus or having your server turned into a porn FTP
> server are the least of concerns in the corporate world. Worst case
> scenario there is a temporary loss of service until the servers can be
> rebuilt.

Depends on where your business value resides. If you provide content
to libraries and you're suddenly serving porn instead of your
collection of translated work of Aristotle, your business is being
damaged fairly severely, regardless of the downtime to switch over to
your redundant backup site (or rebuild the box -- whichever). Loosing
a worm on the corporate network that affects your internal database
servers that are not even connected to the internet, well that's just
bad too -- especially if you're running something like Great Plains or
Soloman internally...

Of course then there's the downtime of the corporate systems to
*install* the patches in the first place. Rock, hard place.
 
> The primary concern should be in preventing hack attempts where
> private information and trade secrets can be stolen. This is where the
> result can cost the company money. These vulnerabilities reside in the
> applications themselves. Your firewall will do little to prevent this.

And now we're in a whole different type of security discussion -- and
a more valuable one. Firewalls are simply one layer in a multilayer
defense. SQL injection attacks can cause serious damage and are one of
the best examples in the CF world of application-oriented (and far to
common, yet generally easily preventable) security vulnerabilities.
 
> Even if someone broke in to our datacenter, and managed to log on as
> an administrator to our web servers or database server, they could do
> nothing more because the applications themselves are secure.

Without starting another long thread about it, if someone is in your
data center you've got problems. If they are after your data and have
*physical* access there's always a chance they can get your data,
assuming they are willing to spend the money on it. Just like physical
security, data security is all about making the cost of getting the
data more than the data is worth. Sounds like you're doing a fine job.
 
> Application security is the cornerstone of information security. Not
> firewalls and routers.

No doubt. But for multi-tier web applications, the security of each
individual application, from the OS right up through the code your
developers are writing is part of the "application" that needs to be
secured. Many of the most common vulnerabilities that I've seen
exploited happen at the interface between two tiers or applications,
which is exactly why a CF developer needs to be at least vaguely aware
of MS-SQL security issues (e.g. does the "user" the application runs
as *really* need to be dbo?) for example.

All a firewall does is prevent socket connections; all a router does
is route packets (ok, many of these devices are now multifunction, but
that's an aside). Layer 5-7 "firewalls" actual do some more
interesting work to protect your *application* but in any case its all
about controlling which packets get to the box. Securing the allowed
behavior of packets that reach the application is another issue
entirely...

> 
> On Tue, 1 Mar 2005 16:52:40 -0500, John Paul Ashenfelter
> <[EMAIL PROTECTED]> wrote:
> > On Tue, 1 Mar 2005 20:53:13 -, Robertson-Ravo, Neil (RX)
> > <[EMAIL PROTECTED]> wrote:
> > >  I would say NONE - all of the SQL boxes we have (and we have thousands) 
> > > are
> > > a) protected with hardware and software security.  They are all patched to
> > > the highest degree (where needs be, as not all servers require all patches
> > > for loopholes and indeed some cannot have them).
> >
> > Great! So by hardware and software security I'll take a stab at
> > transla

RE: Securing MS-SQL port 1433

2005-03-01 Thread Dave Watts
> My point is that if you're not blocking external access (e.g 
> TCP/IP) access to your MS-SQL Server, then you're an idiot.
> 
>  (see http://dictionary.reference.com/search?q=idiot, 
> particularly the first definition -- "A foolish or stupid person").
> 
> If you're not taking basic precautions with your SQL Server 
> (or any similar tool), you're a danger to you employer, 
> you're a danger to anyone on your subnet (nothing like being 
> on the same gateway as a box or two saturating the pipe with 
> a zombie process), you're a danger to your customers, and 
> you're a danger to anyone a cracker who takes over your box 
> cares to target with spam, DOS, etc.
> 
> I think that perfectly qualifies as a "foolish .. person".

I submit that the truly foolish person here is the one who expects everyone
who uses a computer to also understand network security issues. But good
luck with that, ok?

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197055
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-01 Thread Dave Watts
> IMO if you are so serious about security you should a) put 
> your DB servers on their own network with a firewall between 
> them everything else and b) use Oracle.

There are plenty of Oracle vulnerabilities - just ask Dave Litchfield.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197054
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-01 Thread Dave Watts
> If they are putting a server on a naked Internet connection 
> with an external address, they certainly *should* be aware of 
> basic security.
> Even "normal" home users are aware of the need for firewall 
> (and av) software. A $40 dsl/cable/etc router contains a 
> decent enough firewall to protect a MS-SQL server behind it 
> with no more work than plugging it in and turning it on.

Sure, that's one thing. So Joe Home User goes out and buys a $50 wireless
router which blocks external access, but allows internal access to other
machines connecting through WiFi. He plugs it into his cable modem and he's
all set, until his nextdoor neighbor infects his machine by connecting to it
through the open-by-default wireless connection! D'oh! I guess he's just an
idiot, because he doesn't know how TCP/IP works. Too bad he installed Visio
Enterprise so he could work on flow charts at home. How could anyone be so
dumb?

I've got news for you. Most people don't know how TCP/IP works. And if they
have to know that in order to use a PC, something is radically wrong with
PCs.

> Seriously, running any externally facing app without basic 
> security precautions makes you *not* an idiot? The level of 
> even basic security-awareness should be part of every 
> developer's toolbox -- at least any one worth hiring. And the 
> excuse that "I didn't know MSDE was part of the application" 
> or "I'm not a sysadmin" is a pretty poor one. How hard is the 
> Microsoft Baseline Security Analyzer to use? How hard is it 
> to read the docs?

Who said anything about developers? Again, there are plenty of applications
with vulnerabilities, and these may be run by people other than developers.
Oh, and that list of apps that use MSDE is woefully incomplete, by the way.
I've worked with several applications that (a) aren't on the list and (b)
install MSDE without notifying the user.

> The assumption that "I didn't know" is an acceptable excuse 
> relating to security, whether it's configuration (e.g. 
> firewall settings) or code (e.g. SQL injection 
> vunerabilities) is a key reason why people get cracked. And 
> frankly, I care less about someone with poor security getting 
> hacked (something along the lines of "getting what you
> deserve") than what their zombie server can do to my sites or 
> one of the sites I count on -- or about the consequences of 
> the use/misuse of my data they're storing.

If I leave my front door open and someone walks in and bops me on the head,
did I get what I deserve? Why is this any different?

> When a security issue can affect *me*, then I've got a stake 
> in making sure people do the right thing -- I think security 
> is black and white (you don't see a "Grey Hat" security 
> conference...) Maybe there are varying *degrees* of security 
> idiocy, but all things considered, I'll err on the side of 
> spending the time/money/effort on security instead of taking 
> the risk of being a victim of the "security is too hard"
> syndrome.

Your efforts would be better spent on the developers of insecure
applications, if for no other reason than it's a smaller dataset.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197053
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread Adrocknaphobia
IMO if you are so serious about security you should a) put your DB
servers on their own network with a firewall between them everything
else and b) use Oracle.

Contracting a virus or having your server turned into a porn FTP
server are the least of concerns in the corporate world. Worst case
scenario there is a temporary loss of service until the servers can be
rebuilt.

The primary concern should be in preventing hack attempts where
private information and trade secrets can be stolen. This is where the
result can cost the company money. These vulnerabilities reside in the
applications themselves. Your firewall will do little to prevent this.

Even if someone broke in to our datacenter, and managed to log on as
an administrator to our web servers or database server, they could do
nothing more because the applications themselves are secure.

Application security is the cornerstone of information security. Not
firewalls and routers.

-Adam


On Tue, 1 Mar 2005 16:52:40 -0500, John Paul Ashenfelter
<[EMAIL PROTECTED]> wrote:
> On Tue, 1 Mar 2005 20:53:13 -, Robertson-Ravo, Neil (RX)
> <[EMAIL PROTECTED]> wrote:
> >  I would say NONE - all of the SQL boxes we have (and we have thousands) are
> > a) protected with hardware and software security.  They are all patched to
> > the highest degree (where needs be, as not all servers require all patches
> > for loopholes and indeed some cannot have them).
> 
> Great! So by hardware and software security I'll take a stab at
> translating that as at least a firewall. So far we're in agreement.
> Remember, this started b/c I said anyone who left port 1433 open was
> an idiot -- now we're into discussing how to assess the risk from a
> specific vulnerability (choosing which patches to apply) and which
> service pack which *are* (potentially) past the normal desktop user's
> area of responsibility.
> 
> > Let me ask you, what version of SQL are you running? 8.00.818?
> 
> Actually, yes I am on my production servers. My clients are a mix of
> ..818 (post-SP3 hotfix) and .760 (SP3). And to be completely fair, my
> laptop actually runs 8.00.760 (with Named Pipes disabled).
> 
> > Note you do not have to patch all risks if the risk is low  - for example
> > there may be an issue where a maliscious user could access your server but
> > its only a problem/issue if the maliscious user can gain access to it...
> 
> Agreed -- whether it's MS-SQL or Windows (or Linux or CF or whatever)
> you don't have to immediately apply patches if you're not vulnerable
> to the issue. As I've said, I run my laptop in *horrors* SP3 instead
> of the post-SP3 hotfix -- upgrading wasn't worth the risk (though when
> I build a new box, it goes to .818 by default)
> 
> 
> --
> John Paul Ashenfelter
> CTO/Transitionpoint
> (blog) http://www.ashenfelter.com
> (email) [EMAIL PROTECTED]
> 
> 

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197029
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 15:46:51 -0500, Adrocknaphobia
<[EMAIL PROTECTED]> wrote:
> I'm just trying to figure out where you get off calling someone an
> idiot. This isn't an information security newsgroup. I thought maybe
> you were a subject expert, but you dont have your CISSP... So
> basically, you are just some guy on _COLDFUSION_ list annoying (and
> insulting) people with the stereotypical MS security rant.

I don't think it requires a CISSP to know that a firewall is a good
idea -- we're not talking esoteric software/hardware security here. I
think knowing that a firewall is a good idea is an example of common
knowledge -- not something reserved for folks with a CISSP. If that's
*not* the case, if you're saying that a typical COLDFUSION programmer
doesn't know basic security considerations (lock down ports you don't
want attacked) which for example, my 62-year-old mother-in-law is
aware of, then we're in real trouble.

And *horrors* -- a post on the ColdFusion list covering MS-SQL and
firewalling?!?? Or one that annoys or insults some people? Clearly I'm
breaking new ground here :)

As an aside, how is this a stereotypical MS rant? I'll say the same
thing about MySQL (block port 3306). Or making sure your Apache is
running the point releases that handle the buffer overrun issues.
 
> Exactly what is the point of your thread again?

My point is that if you're not blocking external access (e.g TCP/IP)
access to your MS-SQL Server, then you're an idiot.

 (see http://dictionary.reference.com/search?q=idiot, particularly the
first definition -- "A foolish or stupid person").

If you're not taking basic precautions with your SQL Server (or any
similar tool), you're a danger to you employer, you're a danger to
anyone on your subnet (nothing like being on the same gateway as a box
or two saturating the pipe with a zombie process), you're a danger to
your customers, and you're a danger to anyone a cracker who takes over
your box cares to target with spam, DOS, etc.

I think that perfectly qualifies as a "foolish .. person".
-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197023
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 20:53:13 -, Robertson-Ravo, Neil (RX)
<[EMAIL PROTECTED]> wrote:
>  I would say NONE - all of the SQL boxes we have (and we have thousands) are
> a) protected with hardware and software security.  They are all patched to
> the highest degree (where needs be, as not all servers require all patches
> for loopholes and indeed some cannot have them).

Great! So by hardware and software security I'll take a stab at
translating that as at least a firewall. So far we're in agreement.
Remember, this started b/c I said anyone who left port 1433 open was
an idiot -- now we're into discussing how to assess the risk from a
specific vulnerability (choosing which patches to apply) and which
service pack which *are* (potentially) past the normal desktop user's
area of responsibility.
 
> Let me ask you, what version of SQL are you running? 8.00.818?

Actually, yes I am on my production servers. My clients are a mix of
..818 (post-SP3 hotfix) and .760 (SP3). And to be completely fair, my
laptop actually runs 8.00.760 (with Named Pipes disabled).
 
> Note you do not have to patch all risks if the risk is low  - for example
> there may be an issue where a maliscious user could access your server but
> its only a problem/issue if the maliscious user can gain access to it...

Agreed -- whether it's MS-SQL or Windows (or Linux or CF or whatever)
you don't have to immediately apply patches if you're not vulnerable
to the issue. As I've said, I run my laptop in *horrors* SP3 instead
of the post-SP3 hotfix -- upgrading wasn't worth the risk (though when
I build a new box, it goes to .818 by default)
 

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197019
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-01 Thread Robertson-Ravo, Neil (RX)
I would say NONE - all of the SQL boxes we have (and we have thousands) are
a) protected with hardware and software security.  They are all patched to
the highest degree (where needs be, as not all servers require all patches
for loopholes and indeed some cannot have them).

Let me ask you, what version of SQL are you running? 8.00.818?   If you are
then you are not secure.

Note you do not have to patch all risks if the risk is low  - for example
there may be an issue where a maliscious user could access your server but
its only a problem/issue if the maliscious user can gain access to it...



-Original Message-
From: John Paul Ashenfelter [mailto:[EMAIL PROTECTED] 
Sent: 01 March 2005 17:53
To: CF-Talk
Subject: Re: Securing MS-SQL port 1433

On Tue, 1 Mar 2005 16:24:58 -, Robertson-Ravo, Neil (RX)
<[EMAIL PROTECTED]> wrote:
> Agreed, that original statement reeks of idiocy itself.

How many of your servers have open, externally accessible MS-SQL
ports? Maybe you should go open your MS-SQL box to the world because
you certainly wouldn't be an idiot to keep it open, right?

Ignoring *fundamental* security issues is at best, negligent. Ignoring
know, common, dangerous, documented, publicized security issues seems
to me to count as "idiotic" but you can call it "poor practice",
"negligent", "a mistake" or some other less offensive word if you need
to.

> From: Dave Watts [mailto:[EMAIL PROTECTED]
> > As an aside, there are *plenty* of ways to scan for open SQL
> > Sever ports on your network to find those MSDE installs,  so
> > I'll maintain that anyone with an unsecured SQL Server of any
> > type is, in fact, and idiot.
> 
> That's all well and good, but many people using products which include
MSDE
> aren't network administrators, and don't know about port scanning or any
> other things that network administrators might know about, and they
> shouldn't have to know those things. Not knowing things like this doesn't
> make one "and idiot".

That's true, not "and idiot", but "an idiot" :)

If they are putting a server on a naked Internet connection with an
external address, they certainly *should* be aware of basic security.
Even "normal" home users are aware of the need for firewall (and av)
software. A $40 dsl/cable/etc router contains a decent enough firewall
to protect a MS-SQL server behind it with no more work than plugging
it in and turning it on.

Seriously, running any externally facing app without basic security
precautions makes you *not* an idiot? The level of even basic
security-awareness should be part of every developer's toolbox -- at
least any one worth hiring. And the excuse that "I didn't know MSDE
was part of the application" or "I'm not a sysadmin" is a pretty poor
one. How hard is the Microsoft Baseline Security Analyzer to use? How
hard is it to read the docs?

Of course securing the port doesn't prevent weak passwords. Or the
possiblilty of SQL Injection attacks. Or any of a myriad other common
security weaknesses.

The assumption that "I didn't know" is an acceptable excuse relating
to security, whether it's configuration (e.g. firewall settings) or
code (e.g. SQL injection vunerabilities) is a key reason why people
get cracked. And frankly, I care less about someone with poor security
getting hacked (something along the lines of "getting what you
deserve") than what their zombie server can do to my sites or one of
the sites I count on -- or about the consequences of the use/misuse of
my data they're storing.

When a security issue can affect *me*, then I've got a stake in making
sure people do the right thing -- I think security is black and white
(you don't see a "Grey Hat" security conference...) Maybe there are
varying *degrees* of security idiocy, but all things considered, I'll
err on the side of spending the time/money/effort on security instead
of taking the risk of being a victim of the "security is too hard"
syndrome.
-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]



~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197010
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread Adrocknaphobia
I'm just trying to figure out where you get off calling someone an
idiot. This isn't an information security newsgroup. I thought maybe
you were a subject expert, but you dont have your CISSP... So
basically, you are just some guy on _COLDFUSION_ list annoying (and
insulting) people with the stereotypical MS security rant.

Exactly what is the point of your thread again?

-Adam

On Tue, 1 Mar 2005 15:32:27 -0500, John Paul Ashenfelter
<[EMAIL PROTECTED]> wrote:
> On Tue, 1 Mar 2005 14:12:11 -0500, Adrocknaphobia
> <[EMAIL PROTECTED]> wrote:
> > Do you even have your CISSP?
> >
> > -Adam
> 
> I need a CISSP to understand *basic* security precautions? Like using
> a firewall? No, I don't have a CISSP -- nor is a certification
> directly relevant to the discussion (though I think CISSP is one of
> the better certifications there is as far as rigor and value).
> 
> What I do have is the experience of managing a datacenter containing a
> heterogenous mix of Linux and Windows servers of varying versions for
> 6 years, not to mention handling or securing the on-site and colo
> networks for around a dozen clients. I don't do anything fancy -- PIX
> firewalls on the outside, software firewalls on key internal boxes, a
> little bit of appropriate VLAN segregation, ssh and VPNs where
> appropriate. And then simple monitoring and an occasional run of
> Nessus to ensure things are still tight. And keeping abreast of the
> security fixes/bulletins for the key software I run.
> 
> I have, however, seen numerous folks cracked -- specifically Windows
> folks (probably b/c more clients locally use Windows). I've seen one
> client with a Win NT 4 SP4 server running naked (no firewall) with FTP
> enabled get turned into a porn DVD server. I've seen the Biz School at
> a major univeristy be brought to its knees TWICE by Windows worms. And
> I've seen the CTO of a startup bring in Slammer to the *inside* of
> their network on a laptop... contracted even though he's on dialup at
> home... In al of these cases, a basic firewall rules would have
> prevented the incident.
> 
> Hopefully those of you who are CISSP will be doing something a little
> more sophisticated than arguing that a firewall is a good thing.
> 
> --
> John Paul Ashenfelter
> CTO/Transitionpoint
> (blog) http://www.ashenfelter.com
> (email) [EMAIL PROTECTED]
> 
> 

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197006
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-01 Thread Dave Watts
> I totally get that point. And I'll concede that MSDE may be 
> installed without your direct knowledge, though the lists 
> I've seen of apps that install MSDE are overwhelmingly 
> enterprise/admin apps (and thus would be installed either in 
> a corporate environment with security/network professionals, 
> right?)

Lots of things get installed in environments without security/network
professionals. I mean, Visio, for crying out loud?

> The onus of responsibility has to be shared in any nontrivial 
> application between the creators and the implementors. 
> Unfortunately for the creators of apps based on MSDE, there 
> was a flaw in one of their components (MSDE) that they had no 
> direct control over. This happens -- and is endemic to every 
> level of the software stack -- so implementors need 
> unfortunately need to take proactive steps to mitigate risk.

This is simply not correct with regard to MSDE. You can configure many
aspects of how MSDE is installed when it's bundled with another application,
such as which network protocols are used, which ports are used, what kind of
authentication is used, and so on. For example, if you plan to use it with
your bundled application, why listen on TCP/IP at all unless your
application is incapable of using Named Pipes or Shared Memory?

You seem too quick to absolve blame in the group of people who can most
easily mitigate these sorts of problems, and equally quick to assign it to
the group least able to protect themselves.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197005
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-01 Thread Russ
I totally agree, it's the responsibility of the network administrator to
make sure that the desktop computers are behind a firewall, and therefore
don't have any open ports.  This way even if users have MSDE on their
computer without their knowledge, it won't be open to the world (And now you
only need to worry about somebody bringing in an infected laptop or having
their home pc infected and using the VPN, or an insider attack...) 

Russ

-Original Message-
From: John Paul Ashenfelter [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, March 01, 2005 3:16 PM
To: CF-Talk
Subject: Re: Securing MS-SQL port 1433

On Tue, 1 Mar 2005 14:32:04 -0500, Dave Watts <[EMAIL PROTECTED]> wrote:
> > How many of your servers have open, externally accessible
> > MS-SQL ports? Maybe you should go open your MS-SQL box to the
> > world because you certainly wouldn't be an idiot to keep it
> > open, right?
> >
> > Ignoring *fundamental* security issues is at best, negligent.
> > Ignoring know, common, dangerous, documented, publicized
> > security issues seems to me to count as "idiotic" but you can
> > call it "poor practice", "negligent", "a mistake" or some
> > other less offensive word if you need to.
> 
> I think you're missing my point. My servers are adequately secure because
> it's my job to know how to secure them. But if you install any number of
> third-party products that contain MSDE onto your desktop, are you an idiot
> for (a) not being a network administrator, or (b) not being aware of
> database server security? I would argue that the onus for security of
> desktop applications is largely the responsibility of the creators of said
> applications.

I totally get that point. And I'll concede that MSDE may be installed
without your direct knowledge, though the lists I've seen of apps that
install MSDE are overwhelmingly enterprise/admin apps (and thus would
be installed either in a corporate environment with security/network
professionals, right?) One list is here:
http://www.sqlsecurity.com/applicationslistgridall.aspx. And the
(admittedly only 2) of these manufacturers that I've dealt with for
MSDE-related software issued advisories to their clients about
installing SP3 for MSDE.

The onus of responsibility has to be shared in any nontrivial
application between the creators and the implementors. Unfortunately
for the creators of apps based on MSDE, there was a flaw in one of
their components (MSDE) that they had no direct control over. This
happens -- and is endemic to every level of the software stack -- so
implementors need unfortunately need to take proactive steps to
mitigate risk.

Consider the Feb batch of Microsoft monthly security updates (which
made NPR Morning Edition among other popular media outlets) -- is a
company that built an application that's deployed on a vulnerable
Windows platform stupid for using Windows? No (despite the cries from
the Linux folks...) But take a look at that batch of security updates
-- if you read the the bulk of them are mitigated by using a firewall.
That's not significantly different than the MS-SQL/MSDE vulnerability
that Slammer took advantage of. *Knowing* that there an unknown number
of potential exploits in the os, application, etc, you reduce your
risk by following basic security practices. So while you should
probably apply any of the patches relating to services you use,
there's no need to panic while you do if you've already done some
basic mitigation.

So no, you don't need to be (a) a network administrator or (b) aware
of database security to reduce your risk of exposure to security
issues. You simply need to take some basic precautions (relating to
the triumvirate of anti-virus, firewall, and potentially spyware) that
are basic to the reality of the Internet. As an aside, Slashdot today
ran a link
(http://it.slashdot.org/article.pl?sid=05/02/28/2228245&tid=172&tid=218)
about a test of 6 computers being attached unprotected to the Internet
for a week which probably doesn't point out any new information, but
is interesting in the context of this discussion.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]



~|
Discover CFTicket - The leading ColdFusion Help Desk and Trouble 
Ticket application

http://www.houseoffusion.com/banners/view.cfm?bannerid=48

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197004
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 14:12:11 -0500, Adrocknaphobia
<[EMAIL PROTECTED]> wrote:
> Do you even have your CISSP?
> 
> -Adam

I need a CISSP to understand *basic* security precautions? Like using
a firewall? No, I don't have a CISSP -- nor is a certification
directly relevant to the discussion (though I think CISSP is one of
the better certifications there is as far as rigor and value).

What I do have is the experience of managing a datacenter containing a
heterogenous mix of Linux and Windows servers of varying versions for
6 years, not to mention handling or securing the on-site and colo
networks for around a dozen clients. I don't do anything fancy -- PIX
firewalls on the outside, software firewalls on key internal boxes, a
little bit of appropriate VLAN segregation, ssh and VPNs where
appropriate. And then simple monitoring and an occasional run of
Nessus to ensure things are still tight. And keeping abreast of the
security fixes/bulletins for the key software I run.

I have, however, seen numerous folks cracked -- specifically Windows
folks (probably b/c more clients locally use Windows). I've seen one
client with a Win NT 4 SP4 server running naked (no firewall) with FTP
enabled get turned into a porn DVD server. I've seen the Biz School at
a major univeristy be brought to its knees TWICE by Windows worms. And
I've seen the CTO of a startup bring in Slammer to the *inside* of
their network on a laptop... contracted even though he's on dialup at
home... In al of these cases, a basic firewall rules would have
prevented the incident.

Hopefully those of you who are CISSP will be doing something a little
more sophisticated than arguing that a firewall is a good thing.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:197003
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 14:32:04 -0500, Dave Watts <[EMAIL PROTECTED]> wrote:
> > How many of your servers have open, externally accessible
> > MS-SQL ports? Maybe you should go open your MS-SQL box to the
> > world because you certainly wouldn't be an idiot to keep it
> > open, right?
> >
> > Ignoring *fundamental* security issues is at best, negligent.
> > Ignoring know, common, dangerous, documented, publicized
> > security issues seems to me to count as "idiotic" but you can
> > call it "poor practice", "negligent", "a mistake" or some
> > other less offensive word if you need to.
> 
> I think you're missing my point. My servers are adequately secure because
> it's my job to know how to secure them. But if you install any number of
> third-party products that contain MSDE onto your desktop, are you an idiot
> for (a) not being a network administrator, or (b) not being aware of
> database server security? I would argue that the onus for security of
> desktop applications is largely the responsibility of the creators of said
> applications.

I totally get that point. And I'll concede that MSDE may be installed
without your direct knowledge, though the lists I've seen of apps that
install MSDE are overwhelmingly enterprise/admin apps (and thus would
be installed either in a corporate environment with security/network
professionals, right?) One list is here:
http://www.sqlsecurity.com/applicationslistgridall.aspx. And the
(admittedly only 2) of these manufacturers that I've dealt with for
MSDE-related software issued advisories to their clients about
installing SP3 for MSDE.

The onus of responsibility has to be shared in any nontrivial
application between the creators and the implementors. Unfortunately
for the creators of apps based on MSDE, there was a flaw in one of
their components (MSDE) that they had no direct control over. This
happens -- and is endemic to every level of the software stack -- so
implementors need unfortunately need to take proactive steps to
mitigate risk.

Consider the Feb batch of Microsoft monthly security updates (which
made NPR Morning Edition among other popular media outlets) -- is a
company that built an application that's deployed on a vulnerable
Windows platform stupid for using Windows? No (despite the cries from
the Linux folks...) But take a look at that batch of security updates
-- if you read the the bulk of them are mitigated by using a firewall.
That's not significantly different than the MS-SQL/MSDE vulnerability
that Slammer took advantage of. *Knowing* that there an unknown number
of potential exploits in the os, application, etc, you reduce your
risk by following basic security practices. So while you should
probably apply any of the patches relating to services you use,
there's no need to panic while you do if you've already done some
basic mitigation.

So no, you don't need to be (a) a network administrator or (b) aware
of database security to reduce your risk of exposure to security
issues. You simply need to take some basic precautions (relating to
the triumvirate of anti-virus, firewall, and potentially spyware) that
are basic to the reality of the Internet. As an aside, Slashdot today
ran a link 
(http://it.slashdot.org/article.pl?sid=05/02/28/2228245&tid=172&tid=218)
about a test of 6 computers being attached unprotected to the Internet
for a week which probably doesn't point out any new information, but
is interesting in the context of this discussion.

-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:196999
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=89.70.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433

2005-03-01 Thread Dave Watts
> How many of your servers have open, externally accessible 
> MS-SQL ports? Maybe you should go open your MS-SQL box to the 
> world because you certainly wouldn't be an idiot to keep it 
> open, right?
> 
> Ignoring *fundamental* security issues is at best, negligent. 
> Ignoring know, common, dangerous, documented, publicized 
> security issues seems to me to count as "idiotic" but you can 
> call it "poor practice", "negligent", "a mistake" or some 
> other less offensive word if you need to.

I think you're missing my point. My servers are adequately secure because
it's my job to know how to secure them. But if you install any number of
third-party products that contain MSDE onto your desktop, are you an idiot
for (a) not being a network administrator, or (b) not being aware of
database server security? I would argue that the onus for security of
desktop applications is largely the responsibility of the creators of said
applications.

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:196985
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread Adrocknaphobia
Do you even have your CISSP?

-Adam


On Tue, 1 Mar 2005 12:53:05 -0500, John Paul Ashenfelter
<[EMAIL PROTECTED]> wrote:
> On Tue, 1 Mar 2005 16:24:58 -, Robertson-Ravo, Neil (RX)
> <[EMAIL PROTECTED]> wrote:
> > Agreed, that original statement reeks of idiocy itself.
> 
> How many of your servers have open, externally accessible MS-SQL
> ports? Maybe you should go open your MS-SQL box to the world because
> you certainly wouldn't be an idiot to keep it open, right?
> 
> Ignoring *fundamental* security issues is at best, negligent. Ignoring
> know, common, dangerous, documented, publicized security issues seems
> to me to count as "idiotic" but you can call it "poor practice",
> "negligent", "a mistake" or some other less offensive word if you need
> to.
> 
> > From: Dave Watts [mailto:[EMAIL PROTECTED]
> > > As an aside, there are *plenty* of ways to scan for open SQL
> > > Sever ports on your network to find those MSDE installs,  so
> > > I'll maintain that anyone with an unsecured SQL Server of any
> > > type is, in fact, and idiot.
> >
> > That's all well and good, but many people using products which include MSDE
> > aren't network administrators, and don't know about port scanning or any
> > other things that network administrators might know about, and they
> > shouldn't have to know those things. Not knowing things like this doesn't
> > make one "and idiot".
> 
> That's true, not "and idiot", but "an idiot" :)
> 
> If they are putting a server on a naked Internet connection with an
> external address, they certainly *should* be aware of basic security.
> Even "normal" home users are aware of the need for firewall (and av)
> software. A $40 dsl/cable/etc router contains a decent enough firewall
> to protect a MS-SQL server behind it with no more work than plugging
> it in and turning it on.
> 
> Seriously, running any externally facing app without basic security
> precautions makes you *not* an idiot? The level of even basic
> security-awareness should be part of every developer's toolbox -- at
> least any one worth hiring. And the excuse that "I didn't know MSDE
> was part of the application" or "I'm not a sysadmin" is a pretty poor
> one. How hard is the Microsoft Baseline Security Analyzer to use? How
> hard is it to read the docs?
> 
> Of course securing the port doesn't prevent weak passwords. Or the
> possiblilty of SQL Injection attacks. Or any of a myriad other common
> security weaknesses.
> 
> The assumption that "I didn't know" is an acceptable excuse relating
> to security, whether it's configuration (e.g. firewall settings) or
> code (e.g. SQL injection vunerabilities) is a key reason why people
> get cracked. And frankly, I care less about someone with poor security
> getting hacked (something along the lines of "getting what you
> deserve") than what their zombie server can do to my sites or one of
> the sites I count on -- or about the consequences of the use/misuse of
> my data they're storing.
> 
> When a security issue can affect *me*, then I've got a stake in making
> sure people do the right thing -- I think security is black and white
> (you don't see a "Grey Hat" security conference...) Maybe there are
> varying *degrees* of security idiocy, but all things considered, I'll
> err on the side of spending the time/money/effort on security instead
> of taking the risk of being a victim of the "security is too hard"
> syndrome.
> --
> John Paul Ashenfelter
> CTO/Transitionpoint
> (blog) http://www.ashenfelter.com
> (email) [EMAIL PROTECTED]
> 
> 

~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:196983
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 16:24:58 -, Robertson-Ravo, Neil (RX)
<[EMAIL PROTECTED]> wrote:
> Agreed, that original statement reeks of idiocy itself.

How many of your servers have open, externally accessible MS-SQL
ports? Maybe you should go open your MS-SQL box to the world because
you certainly wouldn't be an idiot to keep it open, right?

Ignoring *fundamental* security issues is at best, negligent. Ignoring
know, common, dangerous, documented, publicized security issues seems
to me to count as "idiotic" but you can call it "poor practice",
"negligent", "a mistake" or some other less offensive word if you need
to.

> From: Dave Watts [mailto:[EMAIL PROTECTED]
> > As an aside, there are *plenty* of ways to scan for open SQL
> > Sever ports on your network to find those MSDE installs,  so
> > I'll maintain that anyone with an unsecured SQL Server of any
> > type is, in fact, and idiot.
> 
> That's all well and good, but many people using products which include MSDE
> aren't network administrators, and don't know about port scanning or any
> other things that network administrators might know about, and they
> shouldn't have to know those things. Not knowing things like this doesn't
> make one "and idiot".

That's true, not "and idiot", but "an idiot" :)

If they are putting a server on a naked Internet connection with an
external address, they certainly *should* be aware of basic security.
Even "normal" home users are aware of the need for firewall (and av)
software. A $40 dsl/cable/etc router contains a decent enough firewall
to protect a MS-SQL server behind it with no more work than plugging
it in and turning it on.

Seriously, running any externally facing app without basic security
precautions makes you *not* an idiot? The level of even basic
security-awareness should be part of every developer's toolbox -- at
least any one worth hiring. And the excuse that "I didn't know MSDE
was part of the application" or "I'm not a sysadmin" is a pretty poor
one. How hard is the Microsoft Baseline Security Analyzer to use? How
hard is it to read the docs?

Of course securing the port doesn't prevent weak passwords. Or the
possiblilty of SQL Injection attacks. Or any of a myriad other common
security weaknesses.

The assumption that "I didn't know" is an acceptable excuse relating
to security, whether it's configuration (e.g. firewall settings) or
code (e.g. SQL injection vunerabilities) is a key reason why people
get cracked. And frankly, I care less about someone with poor security
getting hacked (something along the lines of "getting what you
deserve") than what their zombie server can do to my sites or one of
the sites I count on -- or about the consequences of the use/misuse of
my data they're storing.

When a security issue can affect *me*, then I've got a stake in making
sure people do the right thing -- I think security is black and white
(you don't see a "Grey Hat" security conference...) Maybe there are
varying *degrees* of security idiocy, but all things considered, I'll
err on the side of spending the time/money/effort on security instead
of taking the risk of being a victim of the "security is too hard"
syndrome.
-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Find out how CFTicket can increase your company's customer support 
efficiency by 100%
http://www.houseoffusion.com/banners/view.cfm?bannerid=49

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:196975
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433 [WAS Re: Pro/Con Moving from MSSQL to MySQL]

2005-03-01 Thread Robertson-Ravo, Neil (RX)
Agreed, that original statement reeks of idiocy itself.



-Original Message-
From: Dave Watts [mailto:[EMAIL PROTECTED] 
Sent: 01 March 2005 16:17
To: CF-Talk
Subject: RE: Securing MS-SQL port 1433 [WAS Re: Pro/Con Moving from MSSQL to
MySQL]

> As an aside, there are *plenty* of ways to scan for open SQL 
> Sever ports on your network to find those MSDE installs,  so 
> I'll maintain that anyone with an unsecured SQL Server of any 
> type is, in fact, and idiot.

That's all well and good, but many people using products which include MSDE
aren't network administrators, and don't know about port scanning or any
other things that network administrators might know about, and they
shouldn't have to know those things. Not knowing things like this doesn't
make one "and idiot".

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!




~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:196946
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


RE: Securing MS-SQL port 1433 [WAS Re: Pro/Con Moving from MSSQL to MySQL]

2005-03-01 Thread Dave Watts
> As an aside, there are *plenty* of ways to scan for open SQL 
> Sever ports on your network to find those MSDE installs,  so 
> I'll maintain that anyone with an unsecured SQL Server of any 
> type is, in fact, and idiot.

That's all well and good, but many people using products which include MSDE
aren't network administrators, and don't know about port scanning or any
other things that network administrators might know about, and they
shouldn't have to know those things. Not knowing things like this doesn't
make one "and idiot".

Dave Watts, CTO, Fig Leaf Software
http://www.figleaf.com/

Fig Leaf Software provides the highest caliber vendor-authorized 
instruction at our training centers in Washington DC, Atlanta, 
Chicago, Baltimore, Northern Virginia, or on-site at your location. 
Visit http://training.figleaf.com/ for more information!


~|
Discover CFTicket - The leading ColdFusion Help Desk and Trouble 
Ticket application

http://www.houseoffusion.com/banners/view.cfm?bannerid=48

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:196942
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433 [WAS Re: Pro/Con Moving from MSSQL to MySQL]

2005-03-01 Thread John Paul Ashenfelter
On Tue, 1 Mar 2005 09:30:41 -0500, Adrocknaphobia
<[EMAIL PROTECTED]> wrote:
> Don't be security arrogant.
> 
> -Adam
> 

Actually, it should be "Don't be security *ignorant*.
-- 
John Paul Ashenfelter
CTO/Transitionpoint
(blog) http://www.ashenfelter.com
(email) [EMAIL PROTECTED]

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:196938
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54


Re: Securing MS-SQL port 1433 [WAS Re: Pro/Con Moving from MSSQL to MySQL]

2005-03-01 Thread Adrocknaphobia
Don't be security arrogant.

-Adam


On Tue, 1 Mar 2005 09:04:27 -0500, John Paul Ashenfelter
<[EMAIL PROTECTED]> wrote:
> On Thu, 24 Feb 2005 16:54:37 -0500, Dave Watts <[EMAIL PROTECTED]> wrote:
> > > Of course you can trust MS-SQL -- it's a great database. I'd
> > > ask what kind of idiot leaves port 1433 open on a MS-SQL
> > > server in the first place (due to the number of infections
> > > with the various worms, apparently a lot)?
> >
> > This doesn't really have anything to do with the thread, but to answer your
> > question quite a few people do this, and those people aren't necessarily
> > idiots. Remember that lots of products install some variant of SQL Server,
> > like MSDE, for you, so there are quite a few people running SQL Server
> > without necessarily knowing it, or thinking about having to secure it.
> 
> And remember that if you're implementing basic security measures --
> specifically installing a firewall -- that you shouldn't automatically
> leave port 1433 (or any other non-needed port) open to the world.
> 
> That precaution of course won't prevent problems from someone *inside*
> the firewall infecting you, but again, that should be handled by basic
> security measures.
> 
> As an aside, there are *plenty* of ways to scan for open SQL Sever
> ports on your network to find those MSDE installs,  so I'll maintain
> that anyone with an unsecured SQL Server of any type is, in fact, and
> idiot.
> 
> > Dave Watts, CTO, Fig Leaf Software
> > http://www.figleaf.com/
> >
> > Fig Leaf Software provides the highest caliber vendor-authorized
> > instruction at our training centers in Washington DC, Atlanta,
> > Chicago, Baltimore, Northern Virginia, or on-site at your location.
> > Visit http://training.figleaf.com/ for more information!
> >
> >
> >
> 
> 

~|
Logware (www.logware.us): a new and convenient web-based time tracking 
application. Start tracking and documenting hours spent on a project or with a 
client with Logware today. Try it for free with a 15 day trial account.
http://www.houseoffusion.com/banners/view.cfm?bannerid=67

Message: http://www.houseoffusion.com/lists.cfm/link=i:4:196930
Archives: http://www.houseoffusion.com/cf_lists/threads.cfm/4
Subscription: http://www.houseoffusion.com/lists.cfm/link=s:4
Unsubscribe: 
http://www.houseoffusion.com/cf_lists/unsubscribe.cfm?user=11502.10531.4
Donations & Support: http://www.houseoffusion.com/tiny.cfm/54