Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-16 Thread Tracy Reed
On Sun, May 15, 2011 at 01:59:54AM +0200, Łukasz Bromirski spake thusly:
  Netgear? Or perhaps Linksys? That doesn't inspire much confidence. :)
 
 Five seconds spent with google would actually provide you with the
 both current and past Roland work, how it relates to the thread,
 and saved you from making fool of yourself.

I am familiar with his background. I just don't believe that they are
legitimately the world's largest manufacturer of firewalls by units shipped
by the brand we know them as. It's a sort of disingenuous marketing game.

-- 
Tracy Reed   Digital signature attached for your safety.
CopilotcoProfessionally Managed PCI Compliant Secure Hosting
866-MY-COPILOT x101  http://copilotco.com


pgpDIpSbyzE98.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-15 Thread Pavel Kankovsky
On Wed, 11 May 2011, Dobbins, Roland wrote:

 So the outbound stateful checking of server response traffic is moot,
 and simply constitutes a stateful DDoS chokepoint which makes it trivial
 for an attacker to take down the server in question by filling up the
 state-tables of said firewall with well-formed,
 programatically-generated traffic.

irony
Yup. We all know servers handle traffic without any of those
pesky state-tables that can be filled up with well-formed,
programatically-generated traffic.
/irony

-- 
Pavel Kankovsky aka Peak  / Jeremiah 9:21\
For death is come up into our MS Windows(tm)... \ 21st century edition /


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-14 Thread Łukasz Bromirski
On 2011-05-12 01:43, Tracy Reed wrote:
 On Wed, May 11, 2011 at 04:49:13PM +, Dobbins, Roland spake thusly:
 My operational experience, including that acquired during my tenure working
 for the world's largest manufacturer of firewalls by units shipped,
 contradicts this statement.

 Netgear? Or perhaps Linksys? That doesn't inspire much confidence. :)

Five seconds spent with google would actually provide you with the
both current and past Roland work, how it relates to the thread,
and saved you from making fool of yourself.

-- 
There's no sense in being precise when |   Łukasz Bromirski
  you don't know what you're talking |  jid:lbromir...@jabber.org
  about.   John von Neumann |http://lukasz.bromirski.net

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-12 Thread Craig Miskell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 11/05/11 23:05, phocean wrote:
  Also, if you filter (and you should) both inbound and outbound traffic, 
  how do you allow legitimate responses to the server?
I think Roland said earlier that outbound connections from these boxes
should be going out another interface, presumably (my presumption)
through a stateful firewall of some kind, because ACLs wouldn't be
sufficient.

This is perhaps the aspect that has been missed in this discussion
(mentioned once, not particularly picked up on, and not really noted
again).  It eliminates many of the concerns of using ACLs over stateful.

- -- 
Craig Miskell
Systems Administrator, Catalyst IT
DDI: +64 4 8020427
==
Everything about the *nix culture points to not
walking anywhere except possibly to a pub :-P
- Jim Perrin on CentOS mailing list
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
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=6N5Y
-END PGP SIGNATURE-

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-12 Thread Thor (Hammer of God)
 On 11/05/11 23:05, phocean wrote:
   Also, if you filter (and you should) both inbound and outbound
  traffic,  how do you allow legitimate responses to the server?
 I think Roland said earlier that outbound connections from these boxes
 should be going out another interface, presumably (my presumption)
 through a stateful firewall of some kind, because ACLs wouldn't be sufficient.
 
 This is perhaps the aspect that has been missed in this discussion (mentioned
 once, not particularly picked up on, and not really noted again).  It 
 eliminates
 many of the concerns of using ACLs over stateful.

Actually, the stateless solution was to just ACL via known good source ports. 
 And this was a large part of my original response of the value of firewalls in 
front of a server. Limiting outbound traffic to responses to valid initiated 
traffic is an important security control, specifically because the ACL's 
wouldn't be sufficient.

The examples I was going to tally up for Roland were any number of SQL 
injection attacks where tftp and ftp command files were created (in this case, 
by some tool that I presume created .cmd files just like we all used to do with 
echo ) to get other toolsets.  These requests failed as the SQL box 
couldn't make outbound connections.  There was no capability for the attacker 
to initiate another remote connection to craft a response to.  

I was actually going to try to get detailed information from way back where 
Code Red propagation was avoided by outbound connection attempts as well, but I 
don't really see the value in doing that at this point.  I also had Slammer 
research where I tested ISA's resilience to blocking outbound UDP 1434 
connections, but I think it suffices to say that there are many, many valid 
examples of why stateful inspection of traffic is valuable and adds security in 
depth. 

I had some other responses as well, but I have to bolt.  I'll make sure to 
catch up on the rest of the responses before I do so as well.

t

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-12 Thread Bruno Cesar Moreira de Souza

--- On May 11, 2011, Dobbins, Roland rdobb...@arbor.net escreveu:

 On May 11, 2011, at 12:52 AM, Bruno
 Cesar Moreira de Souza wrote:
 
  How would you block an ACK tunnel using only a packet
 filter? (http://ntsecurity.nu/papers/acktunneling/) You don't
 need to stop the httpd service to create this kind of
 tunnel, as the packets from the attacker would just be
 ignored by the httpd service, but could be intercepted by
 the malicious code executed on the compromised server (using
 the same approach employed by network sniffers). 
 
 See my previous response to Thor.  I don't intend to
 keep this thread going forever in the face of
 incomprehension, but this focus on corner-case exfiltration
 techniques which are easily obviated by OS and service/app
 BCPs and appropriate monitoring, 

I don't think it is incomprehension. Some people just don't agree with the 
incorrect and generic statement that stateful firewalls are useless to protect 
servers. 

I can agree that in some specific cases, when the availability is the main 
concern for external servers, you may consider to use ACLs instead of a 
stateful firewall. It's an option to be more resilient against DDoS attacks. 
However, I can't agree that it should be a rule for every DMZ and external 
network in the world, because there are other options to prevent DDoS attacks 
(including using clustered firewalls), and also the stateful firewalls have 
value to restrict the action of an attacker after a server compromise.

Also, you are underestimating the skill of some attackers. My experience as a 
penetration tester and security incident investigator shows that it is not 
always so easy (even for organizations with 24x7 monitoring) to detect the 
action of attackers. As said before, a stateful firewall can be a strong layer 
of defense to restrict the damage of an attack, and to avoid backdoors and 
covert channels.

to the point of
 instantiating unnecessary and harmful state in front of
 servers which makes it trivial to take them down,

I'm not convinced that it is always significantly easier to take down a 
firewall than the web server. In many cases, it can be also trivial to take a 
web server down with a DoS attack (tool example: 
http://ha.ckers.org/slowloris/).

 demonstrates that in general, the infosec community pretty
 much completely ignores the availability leg of the
 confidentiality-integrity-availability triad.

No, the infosec community seeks to balance these three legs. However, to decide 
which leg you are going to give more protection for in each environment (for 
example, a DMZ) and in each organization, it's better to conduct first a risk 
analisys. 

For example, for a bank it can be worse to have an external penetration 
incident into critical database servers allowing modification of financial 
information than an unavailability incident on the Internet Banking web site.

 
 Which is disappointing, given that availability is in fact
 the most important leg of that triad.

This is a misleading statement. It depends on the information, environment, 
risks, organization etc. For many organizations, the confidentiality and 
integrity of the information stored in critical database servers can be much 
more important than the availability of the public web sites. This is why 
organizations with a minimum information security maturity conduct risk 
analisys before deciding which security mechanisms they will implement.


Bruno Cesar M. de Souza 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-12 Thread Thor (Hammer of God)
Good morning, Mr. Pot!!  :-p

From: full-disclosure-boun...@lists.grok.org.uk 
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Cal Leeming
Sent: Wednesday, May 11, 2011 10:04 AM
To: Dobbins, Roland
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Sony: No firewall and no patches

He says, 34 emails later. :|
On Wed, May 11, 2011 at 10:29 AM, Dobbins, Roland 
rdobb...@arbor.netmailto:rdobb...@arbor.net wrote:
On May 11, 2011, at 4:22 PM, phocean wrote:

 So why going private?


Because full-disclosure isn't the best forum for a lengthy discussion of this 
type.

---
Roland Dobbins rdobb...@arbor.netmailto:rdobb...@arbor.net // 
http://www.arbornetworks.com

   The basis of optimism is sheer terror.

 -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
 It doesn't sound good to me and maybe other people here.
 I am interested too even if I have followed it passively so far.
 So why going private?

 On Wed, 11 May 2011 00:35:41 +, Dobbins, Roland wrote:
 On May 11, 2011, at 7:18 AM, Thor (Hammer of God) wrote:

  Let's take it offline - you can share back with the group if you 
 feel it valuable.


 Sounds good to me, thanks much!

 
 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

   The basis of optimism is sheer terror.

 -- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 11, 2011, at 4:22 PM, phocean wrote:

 So why going private?


Because full-disclosure isn't the best forum for a lengthy discussion of this 
type.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Christian Sciberras
Whereas hardcore pornography (@Cal) is?




On Wed, May 11, 2011 at 11:29 AM, Dobbins, Roland rdobb...@arbor.netwrote:

 On May 11, 2011, at 4:22 PM, phocean wrote:

  So why going private?


 Because full-disclosure isn't the best forum for a lengthy discussion of
 this type.

 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
 Well, but this doesn't seem to be a problem when it comes to lunatic 
 errands of Andrew or Call's porn, so why would it bother to talk about 
 security?

 I want to read how you justify that stateful hardware is useless to 
 check sessions of TCP and upper protocols.
 Of course, it doesn't protect from all kind of attacks and you cited 
 some of these cases, but there are plenty of cases where it is useful.

 On Wed, 11 May 2011 09:29:24 +, Dobbins, Roland wrote:
 On May 11, 2011, at 4:22 PM, phocean wrote:

 So why going private?


 Because full-disclosure isn't the best forum for a lengthy discussion
 of this type.

 
 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

   The basis of optimism is sheer terror.

 -- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
 You were faster than me! :)

 On Wed, 11 May 2011 11:38:23 +0200, Christian Sciberras wrote:
 Whereas hardcore pornography (@Cal) is?




 On Wed, May 11, 2011 at 11:29 AM, Dobbins, Roland 
 rdobb...@arbor.netwrote:

 On May 11, 2011, at 4:22 PM, phocean wrote:

  So why going private?


 Because full-disclosure isn't the best forum for a lengthy 
 discussion of
 this type.

 
 ---
 Roland Dobbins rdobb...@arbor.net // 
 http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 11, 2011, at 4:52 PM, phocean wrote:

 I want to read how you justify that stateful hardware is useless to  check 
 sessions of TCP and upper protocols.


In front of servers, where there is no state to inspect.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Peter Osterberg
I would also love to follow the discussion

phocean skrev 2011-05-11 11:22:
  It doesn't sound good to me and maybe other people here.
  I am interested too even if I have followed it passively so far.
  So why going private?

  On Wed, 11 May 2011 00:35:41 +, Dobbins, Roland wrote:
 On May 11, 2011, at 7:18 AM, Thor (Hammer of God) wrote:

  Let's take it offline - you can share back with the group if you 
 feel it valuable.

 Sounds good to me, thanks much!


 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

  The basis of optimism is sheer terror.

-- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
 Wrong. Passive FTP is the first example that comes to my mind where 
 inspection (based on statefulness) is needed.
 Also, if you filter (and you should) both inbound and outbound traffic, 
 how do you allow legitimate responses to the server?
 In many cases and network designs, statefulness also allows to build 
 slightly shorter and more efficient filtering rules.
 This way, a step toward simplicity is often a step toward security.

 On Wed, 11 May 2011 09:54:59 +, Dobbins, Roland wrote:
 On May 11, 2011, at 4:52 PM, phocean wrote:

 I want to read how you justify that stateful hardware is useless to  
 check sessions of TCP and upper protocols.


 In front of servers, where there is no state to inspect.

 
 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

   The basis of optimism is sheer terror.

 -- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 11, 2011, at 6:05 PM, phocean wrote:

  Passive FTP is the first example that comes to my mind where inspection 
 (based on statefulness) is needed.


I really don't want to continue this on full-disclosure, but there's still no 
material security value to stateful inspection in front of servers, with either 
active or passive ftp.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
 If you say so, then it must be true.

 On Wed, 11 May 2011 11:33:37 +, Dobbins, Roland wrote:
 On May 11, 2011, at 6:05 PM, phocean wrote:

  Passive FTP is the first example that comes to my mind where 
 inspection (based on statefulness) is needed.


 I really don't want to continue this on full-disclosure, but there's
 still no material security value to stateful inspection in front of
 servers, with either active or passive ftp.

 
 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

   The basis of optimism is sheer terror.

 -- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Michael Krymson
I can't speak for everyone, but I certainly find this discussion far more
interesting and useful to security than quite a few others on here. So feel
free to keep it public.

I'm not about to wade in too deeply, but I thought I'd summarize and add a
few notes.

--
STATEFUL (session-based filter)
Pros
- can provide other filtering services during inspection (depends on device
feature set)
- won't have to constantly fight battles (against admins, vendors, clients,
auditors, managers, outsiders) to explain why you don't have a firewall
- handles ephemeral ports, dynamic connections, and matches returning
traffic well

Cons
- more DDoS susceptible
- another piece of hardware so another point of failure
- won't add much when you're already accepting * into IP x on port n

--
ACLs (packet-based filter)
Pros
- with pure ACLs, will always be faster
- as such it can scale with traffic better
- excellent when you're just blanket stopping all traffic except * to x on
port n

Cons
- poor filter for ephermeral port needs, or dynamic connections
- susceptible to protocol anamolies used in attacks (includes covert
channels)
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
 Thanks this useful sum-up for the discussion.

 I have a few comments though:

  - DDoS : anyway, a firewall isn't more susceptible to DoS than the 
 server it protects. If you look at the hardware performance of modern 
 firewalls, if an attacker has the ability to DoS it, then only a 
 considerable server farm that very few companies can afford will be able 
 to sustain it. So I think this can't be counted as a negative point, 
 even if in theory it has less performance than stateless.
  - SPoF : there are clusters (active/active or active/passive) for 
 firewalls as well as for server.
  - stateless scales badly on large networks, because it requires much 
 more complex and lengthy rules if you are serious with security.

 Another advantage of stateful is that there is a first sanity check of 
 the sessions on a specialized hardware rather than on a generic TCP/IP 
 stack of a bloated server OS.
 For instance, the network stack of Windows is probably much more prone 
 to bug/crash due to poor handling of crafted packets than a dedicated 
 firewall (Checkpoint, Cisco, Fortinet...) may be.


 On Wed, 11 May 2011 09:22:33 -0500, Michael Krymson wrote:
 I can't speak for everyone, but I certainly find this discussion far 
 more
 interesting and useful to security than quite a few others on here. 
 So feel
 free to keep it public.

 I'm not about to wade in too deeply, but I thought I'd summarize and 
 add a
 few notes.

 --
 STATEFUL (session-based filter)
 Pros
 - can provide other filtering services during inspection (depends on 
 device
 feature set)
 - won't have to constantly fight battles (against admins, vendors, 
 clients,
 auditors, managers, outsiders) to explain why you don't have a 
 firewall
 - handles ephemeral ports, dynamic connections, and matches returning
 traffic well

 Cons
 - more DDoS susceptible
 - another piece of hardware so another point of failure
 - won't add much when you're already accepting * into IP x on port n

 --
 ACLs (packet-based filter)
 Pros
 - with pure ACLs, will always be faster
 - as such it can scale with traffic better
 - excellent when you're just blanket stopping all traffic except * to 
 x on
 port n

 Cons
 - poor filter for ephermeral port needs, or dynamic connections
 - susceptible to protocol anamolies used in attacks (includes covert
 channels)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 11, 2011, at 10:03 PM, phocean wrote:

  - DDoS : anyway, a firewall isn't more susceptible to DoS than the server it 
 protects. If you look at the hardware performance of modern 
 firewalls, if an attacker has the ability to DoS it, then only a considerable 
 server farm that very few companies can afford will be able to sustain it.

My operational experience, including that acquired during my tenure working for 
the world's largest manufacturer of firewalls by units shipped, contradicts 
this statement.

  - stateless scales badly on large networks, because it requires much more 
 complex and lengthy rules if you are serious with security.

This is a) untrue and b) a near non-sequitur.  In general state is much more 
harmful on larger networks than on smaller ones; and there's no correlation at 
all between the size of a network and the complexity of network access policies.

 Another advantage of stateful is that there is a first sanity check of the 
 sessions on a specialized hardware rather than on a generic TCP/IP 
 stack of a bloated server OS.

Marketing aside, those 'sanity checks' take place in software, not in hardware; 
and they actually constitute a greatly broadened attack surface (look at the 
multiple vulnerability notices/patch notices for any commercial stateful 
firewall you can name, as well as for open-source stateful firewall packages).

 For instance, the network stack of Windows is probably much more prone to 
 bug/crash due to poor handling of crafted packets than a dedicated 
 firewall (Checkpoint, Cisco, Fortinet...) may be.

Sadly, this is also not borne out by experience.  Quite the opposite, actually.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
Le mercredi 11 mai 2011 à 16:49 +, Dobbins, Roland a écrit :
 On May 11, 2011, at 10:03 PM, phocean wrote:
 
   - DDoS : anyway, a firewall isn't more susceptible to DoS than the server 
  it protects. If you look at the hardware performance of modern 
  firewalls, if an attacker has the ability to DoS it, then only a 
  considerable server farm that very few companies can afford will be able to 
  sustain it.
 
 My operational experience, including that acquired during my tenure working 
 for the world's largest manufacturer of firewalls by units shipped, 
 contradicts this statement.

Can you develop? I still don't see how the hell the typical web server
will handle as much traffic as one of these Checkpoint, Cisco or
whatever monsters.

 
   - stateless scales badly on large networks, because it requires much more 
  complex and lengthy rules if you are serious with security.
 
 This is a) untrue and b) a near non-sequitur.  In general state is much more 
 harmful on larger networks than on smaller ones; and there's no correlation 
 at all between the size of a network and the complexity of network access 
 policies.

I was talking about complexity correlation between using stateful or
stateless. Maybe it does not make any difference on a frontal firewall
with a few servers behind. But on a large network with inter-vlan
filtering, it matters a lot. Believe me, this one is based on my
operational experience.

 
  Another advantage of stateful is that there is a first sanity check of the 
  sessions on a specialized hardware rather than on a generic TCP/IP 
  stack of a bloated server OS.
 
 Marketing aside, those 'sanity checks' take place in software, not in 
 hardware; and they actually constitute a greatly broadened attack surface 
 (look at the multiple vulnerability notices/patch notices for any commercial 
 stateful firewall you can name, as well as for open-source stateful firewall 
 packages).

I still trust more the network stack of a Linux/BSD/IOS dedicated box
than the one of a Windows Server. And it means a crafted packet has to
go through mixed devices.

 
  For instance, the network stack of Windows is probably much more prone to 
  bug/crash due to poor handling of crafted packets than a dedicated 
  firewall (Checkpoint, Cisco, Fortinet...) may be.
 
 Sadly, this is also not borne out by experience.  Quite the opposite, 
 actually.

Well maybe. I have no certitude on this point, but if you have facts,
it's welcome.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 12, 2011, at 12:09 AM, phocean wrote:

 I still don't see how the hell the typical web server will handle as much 
 traffic as one of these Checkpoint, Cisco or whatever monsters.

That's the dread secret - they aren't really 'monsters'.

 But on a large network with inter-vlan filtering, it matters a lot. Believe 
 me, this one is based on my operational experience.

Size  complexity, complexity  size.  They are orthogonal concepts.  Small 
networks can be complex, large networks can be simple.

 I still trust more the network stack of a Linux/BSD/IOS dedicated box than 
 the one of a Windows Server.

Sure - but that has nothing to do with the 'sanity checks' and 'inspectors', 
which are custom-coded.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phil
Quoting phocean 0...@phocean.net:


 Can you develop? I still don't see how the hell the typical web server
 will handle as much traffic as one of these Checkpoint, Cisco or
 whatever monsters.




I agree, it just leverage the load to another dedicated hardware, thus  
your web server will work better without that role. (and I add that on  
private IOS like on sonicwall, it make it hard to hit with a 0day vuln)

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
Le mercredi 11 mai 2011 à 17:15 +, Dobbins, Roland a écrit :
 On May 12, 2011, at 12:09 AM, phocean wrote:
 
  I still don't see how the hell the typical web server will handle as much 
  traffic as one of these Checkpoint, Cisco or whatever monsters.
 
 That's the dread secret - they aren't really 'monsters'.

When I look at the specs of high end machines of most makers, they are
and they outmatch most of x64 servers. Do you mean they lie?
I don't mean to defend them, I really don't care, but can you develop?

 
  But on a large network with inter-vlan filtering, it matters a lot. Believe 
  me, this one is based on my operational experience.
 
 Size  complexity, complexity  size.  They are orthogonal concepts.  Small 
 networks can be complex, large networks can be simple.

Ok. First English is not my mother language, so I try to be precise but
that not always easy :)
Second, I am talking about rules sizes, not network sizes, and by
complexity, I wanted to address the ease of administration. You will
certainly agree that the more rules there are, the most risks there are
of human mistake.
Reducing rules by something like 70% in an improvment and an advantage
that stateful can have.

 
  I still trust more the network stack of a Linux/BSD/IOS dedicated box than 
  the one of a Windows Server.
 
 Sure - but that has nothing to do with the 'sanity checks' and 'inspectors', 
 which are custom-coded.
 
 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com
 
   The basis of optimism is sheer terror.
 
 -- Oscar Wilde
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 12, 2011, at 12:20 AM, phil wrote:

 (and I add that on private IOS like on sonicwall, it make it hard to hit with 
 a 0day vuln)

Everyone/everything has vulnerabilities of one sort or another:

https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=8232

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 12, 2011, at 12:31 AM, phocean wrote:

 When I look at the specs of high end machines of most makers, they are and 
 they outmatch most of x64 servers.


http://urbanairship.com/blog/2010/09/29/linux-kernel-tuning-for-c500k/

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phil
Quoting Dobbins, Roland rdobb...@arbor.net:

 On May 12, 2011, at 12:20 AM, phil wrote:

 (and I add that on private IOS like on sonicwall, it make it hard  
 to hit with a 0day vuln)

 Everyone/everything has vulnerabilities of one sort or another:

 https://www.fuzeqna.com/sonicwallkb/consumer/kbdetail.asp?kbid=8232


I agree, but the rate of disclosure is much less than for windows or linux OS.

Secondly, if you read correctly that vuln, it only affect the web  
interface, by default it's not open on the WAN side from any sonicwall  
IOS...

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Cal Leeming
He says, 34 emails later. :|

On Wed, May 11, 2011 at 10:29 AM, Dobbins, Roland rdobb...@arbor.netwrote:

 On May 11, 2011, at 4:22 PM, phocean wrote:

  So why going private?


 Because full-disclosure isn't the best forum for a lengthy discussion of
 this type.

 ---
 Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Cal Leeming
God damn it. lol.

On Wed, May 11, 2011 at 10:53 AM, phocean 0...@phocean.net wrote:

  You were faster than me! :)

  On Wed, 11 May 2011 11:38:23 +0200, Christian Sciberras wrote:
  Whereas hardcore pornography (@Cal) is?
 
 
 
 
  On Wed, May 11, 2011 at 11:29 AM, Dobbins, Roland
  rdobb...@arbor.netwrote:
 
  On May 11, 2011, at 4:22 PM, phocean wrote:
 
   So why going private?
 
 
  Because full-disclosure isn't the best forum for a lengthy
  discussion of
  this type.
 
 
  ---
  Roland Dobbins rdobb...@arbor.net //
  http://www.arbornetworks.com
 
 The basis of optimism is sheer terror.
 
   -- Oscar Wilde
 
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Thor (Hammer of God)
I'm happy yo make it public, I was just being respectful of the membership. 
This wouldn't be the first time that someone got pissed off at a technical 
discussion on FD while other crap goes un-noticed.

Sent from my Windows Phone

From: Cal Leeming
Sent: Wednesday, May 11, 2011 11:58 AM
To: phocean
Cc: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Sony: No firewall and no patches

God damn it. lol.

On Wed, May 11, 2011 at 10:53 AM, phocean 
0...@phocean.netmailto:0...@phocean.net wrote:
 You were faster than me! :)

 On Wed, 11 May 2011 11:38:23 +0200, Christian Sciberras wrote:
 Whereas hardcore pornography (@Cal) is?




 On Wed, May 11, 2011 at 11:29 AM, Dobbins, Roland
 rdobb...@arbor.netmailto:rdobb...@arbor.netwrote:

 On May 11, 2011, at 4:22 PM, phocean wrote:

  So why going private?


 Because full-disclosure isn't the best forum for a lengthy
 discussion of
 this type.


 ---
 Roland Dobbins rdobb...@arbor.netmailto:rdobb...@arbor.net //
 http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread phocean
Le mercredi 11 mai 2011 à 17:40 +, Dobbins, Roland a écrit :
 On May 12, 2011, at 12:31 AM, phocean wrote:
 
  When I look at the specs of high end machines of most makers, they are and 
  they outmatch most of x64 servers.
 
 
 http://urbanairship.com/blog/2010/09/29/linux-kernel-tuning-for-c500k/

Nice but not very precise : nature of packets, fragmentation, sessions,
bandwidth, etc.
Anyway, most appliances run a version of Linux or some BSD, so there is
potentially not much difference with an appliance.

To go back to my point: an application server (IIS, Apache) cannot
sustain as many connections as a firewall (of course in a sane and
standard environment).
So you cannot tell that a firewall will increase the risk of DoS.

From what I have seen so far as arguments, I think the discussion is
over.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Tracy Reed
On Wed, May 11, 2011 at 04:49:13PM +, Dobbins, Roland spake thusly:
 My operational experience, including that acquired during my tenure working
 for the world's largest manufacturer of firewalls by units shipped,
 contradicts this statement.

Netgear? Or perhaps Linksys? That doesn't inspire much confidence. :)

-- 
Tracy Reed


pgplGxvSfZfNz.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread Dobbins, Roland
On May 12, 2011, at 3:49 AM, phocean wrote:

 To go back to my point: an application server (IIS, Apache) cannot sustain as 
 many connections as a firewall (of course in a sane and standard environment).

Sorry, but my operational experience is quite the opposite.  And one generally 
deploys clusters of servers, in any kind of even semi-important site.

 So you cannot tell that a firewall will increase the risk of DoS.

I can and do tell you that.  I further tell you that enforcing network access 
policies for servers in stateless ACLs instantiated in ASIC-based routers and 
layer-3 switches is the way to go.  I tell you this based upon my direct 
experience working for the largest manufacturer of firewalls in the world, and 
on my day-to-day operational experience with people calling up and screaming 
that 'the data center is down' and the proximate cause being a stateful 
firewall which gave up the ghost to trivial amounts of traffic.

For example, I've seen 80kpps of SYN-flood take down a stateful firewall rated 
for 2.5gb/sec.

 From what I have seen so far as arguments, I think the discussion is over.

The folks cited on pp. 41 - 42 of the survey in question have reached a 
different conclusion:

http://www.eweek.com/index2.php?option=contenttask=viewid=66503pop=1hide_ads=1page=0hide_js=1catid=45

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-11 Thread James Matthews
Most security certifications are a mockery of entire industry.

On Mon, May 9, 2011 at 7:33 PM, Ivan . ivan...@gmail.com wrote:

 I guess that makes a mockery of the PCI DSS framework!

 On Tue, May 10, 2011 at 9:03 AM, Thor (Hammer of God) 
 t...@hammerofgod.com wrote:

  Maybe they should call that You don't have to patch genius!  Lol


 http://www.eweek.com/c/a/Security/Sony-Networks-Lacked-Firewall-Ran-Obsolete-Software-Testimony-103450/


 Sent from my Windows Phone

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/




-- 
http://www.goldwatches.com

--
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Tracy Reed
On Tue, May 10, 2011 at 02:49:05AM +, Thor (Hammer of God) spake thusly:
 I agree - You can chalk that one up to the auditors.  There was mention of
 that in the article, and I too would be interested in what auditing firm
 signed off on that one.   

Things can change after the audit so don't be too fast to crucify the auditors.
What was running during the audit may not be what was running when the
intrusion happened. PCI Compliance is very much a point-in-time sort of thing.

Not only that, but there may have never been an audit. Sony is probably
comprised of a number of level 2 merchants. Not one giant Sony Corporation
Level 1 which would invoke an audit. It might even be smart for them to try to
arrange it that way as audits can be very expensive for an infrastructure as
large as theirs. We're talking hundreds of thousands of dollars.

If they are not a Level 1 merchant their system administrators and maybe
internal Sony auditors probably self-assessed and filled out SAQ-C or D on
their own. That works on the honor system. Although I hear the economic
consequences can be severe if you lie on the SAQ and it is found out after a
compromise. So there is no guarantee that there was ever an outside PCI audit.

Each payment card brand generally requires more than 6 million transactions of
their brand annually to be considered Level 1 and require on-site audits with
that brand. Visa has around 44%, MasterCard 31%, Amex 20%, and Discover 5% of
the payment card market. 

So if Sony's payment card market share follows the industry average they would
have to do at least 6M Visa, 4.2M MasterCard, 2.7M Amex, and .7M Discover. For
a grand total of 13.6M transactions annually to be likely to have hit Level 1
status with Visa. Sony says 77M user accounts have been compromised. It is hard
to extrapolate how many credit card transactions that might be though.

PSN has been operating for 4.5 years. 77M records over 4.5 years is 17M records
per year. And that is if everyone does one transaction per year and buys the
1year subscription for $4/month. A lot of people probably buy the 3 month or
maybe there is a month to month option in which case the number of transactions
would be a lot higher. And I have no data on subscribers who drop off and don't
renew which would make it less. So...it seems plausible that they could have
been a Level 1 merchant, especially by the fourth year when presumably their
user base is at its peak so far. We'll just have to wait for more details to
know for sure.

-- 
Tracy Reed


pgpIYx6YQpmwz.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Tracy Reed
On Tue, May 10, 2011 at 05:07:39AM +, Dobbins, Roland spake thusly:
 Stateful firewalls have no place in front of servers, where every incoming
 request is unsolicited, and therefore there is no state to inspect in the
 first place.

The PCI SSC requires a stateful firewall in front of servers processing credit
card data. Not only to block inbound access to any ports or services
accidentally exposed but the outbound policy must also be default deny to make
it more difficult to exfiltrate stolen data. If you have traffic going out to a
high numbered port and you are not keeping state how do you know if that is a
reply packet to an existing inbound connection or if it is an unauthorized
outbound connection?

Of course, the network should be properly segmented so that only the servers
processing payment data are in-scope. You may be right about not putting a
stateful firewall in front of the gaming servers (in Sony's case).

 Where stateful firewalls in front of Web servers are incorrectly mandated by
 various regulatory frameworks, making use of mod_security or its equivalent
 on the Web servers themselves ensures compliance without creating a DDoS
 chokepoint.

If you don't have a stateful firewall blocking outbound connections why would
the traffic even have to go through mod_security?

-- 
Tracy Reed


pgp36dgrgMFoy.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Ivan .
doesn't it also mandate the encryption of CC info? requirement 4 Encrypting
and Storing Credit Card Data

plenty of reports that the data was not encrypted, and also plenty that say
it was.

On Tue, May 10, 2011 at 4:40 PM, Tracy Reed tr...@ultraviolet.org wrote:

 On Tue, May 10, 2011 at 05:07:39AM +, Dobbins, Roland spake thusly:
  Stateful firewalls have no place in front of servers, where every
 incoming
  request is unsolicited, and therefore there is no state to inspect in the
  first place.

 The PCI SSC requires a stateful firewall in front of servers processing
 credit
 card data. Not only to block inbound access to any ports or services
 accidentally exposed but the outbound policy must also be default deny to
 make
 it more difficult to exfiltrate stolen data. If you have traffic going out
 to a
 high numbered port and you are not keeping state how do you know if that is
 a
 reply packet to an existing inbound connection or if it is an unauthorized
 outbound connection?

 Of course, the network should be properly segmented so that only the
 servers
 processing payment data are in-scope. You may be right about not putting a
 stateful firewall in front of the gaming servers (in Sony's case).

  Where stateful firewalls in front of Web servers are incorrectly mandated
 by
  various regulatory frameworks, making use of mod_security or its
 equivalent
  on the Web servers themselves ensures compliance without creating a DDoS
  chokepoint.

 If you don't have a stateful firewall blocking outbound connections why
 would
 the traffic even have to go through mod_security?

 --
 Tracy Reed

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 10, 2011, at 1:40 PM, Tracy Reed wrote:

 If you have traffic going out to a high numbered port and you are not keeping 
 state how do you know if that is a
 reply packet to an existing inbound connection or if it is an unauthorized 
 outbound connection?


You use stateless ACLs to filter outbound traffic as well, only allowing 
traffic originating from required well-known ports to ephemeral high ports.  
This is a basic network access policy Best Current Practice (BCP).  
'Client-side' traffic originating from the server, such as DNS lookups and so 
forth, should be channeled through a completely different NIC on a completely 
different, isolated segment with proxies and so forth.  And all management 
access should take place via an OOB/DCN management network, on yet another 
NIC/segment.

And mod_security will pass PCI DSS audits just fine.

As PayPal's head of opsec was quoted recently, PCI DSS is too vague in many 
places, and is overly-specific in others.  It should be re-factored to an 
outcomes-based model, IMHO.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Bruno Cesar Moreira de Souza
On May 10, 2011, Dobbins, Roland rdobb...@arbor.net wrote:
On May 10, 2011, at 1:40 PM, Tracy Reed wrote:

 If you have traffic going out to a high numbered port and you are not keeping 
 state how do you know if that is a
 reply packet to an existing inbound connection or if it is an unauthorized 
 outbound connection?


 You use stateless ACLs to filter outbound traffic as well, only allowing 
 traffic 
 originating from required well-known ports to ephemeral high ports.  



The stateless ACLs would not prevent ACK tunneling 
(http://ntsecurity.nu/papers/acktunneling/). 

Although your infrastructure would be stronger against DDoS attacks, your 
environment would be more susceptible to covert channels and backdoors. If the 
organization security concern is mainly availability, I could agree in 
deploying a packet filter to protect external servers. However, if an external 
intrusion or sensitive data leakage would cause more damage to the 
organization's business or reputation, I would not recommend it. Additionally, 
the organization may have different DMZ's or external networks with different 
security levels. 


Regards,

Bruno Cesar M. de Souza


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Pete Smith
On 10 May 2011 15:07, Dobbins, Roland rdobb...@arbor.net wrote:

 On May 10, 2011, at 6:03 AM, Thor (Hammer of God) wrote:

  Maybe they should call that You don't have to patch genius!


 Stateful firewalls have no place in front of servers, where every incoming
 request is unsolicited, and therefore there is no state to inspect in the
 first place.  Stateful firewalls in front of servers merely serve as DDoS
 chokepoints due to the large amount of unnecessary state they instantiate.


This statement is only true for unauthenticated services which are not
dealing with financial information. Would you suggest a bank not protect
their internet banking service with a firewall because a DDoS might take the
service off line? Or would you tell them to use a firewall
in conjunction with a specific upstream device which may even be installed
installed at the ISP end of the link to deal with DDoS?

As Tracy mentioned having a stateful firewall is useful to block outgoing
traffic, using an ACL just doesn't cut it, if an attacker initiates a
connection dest port higher than 2048 (to some other server the attacker
controls) and source port of 80 that will pass through an ACL without
issues, this would not be so on a stateful firewall.

mod_security might be good practice to use in a layered approach... but if
you're running old versions of apache (like sony were) then it's not hard
for an attacker to control the memory space used by mod_security and allow
all packets, if the webserver is owned, then it's owned, no controls
implemented on that server can be trusted or relied on.

Pete
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Valdis . Kletnieks
On Tue, 10 May 2011 16:48:45 +1000, Ivan . said:

 plenty of reports that the data was not encrypted, and also plenty that say
 it was.

Probably double-rot-13 encrypted for added security.  Works especially well on
credit card numbers. ;)



pgpCp3RwJJDfX.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread nix
 Maybe they should call that You don't have to patch genius!  Lol

 http://www.eweek.com/c/a/Security/Sony-Networks-Lacked-Firewall-Ran-Obsolete-Software-Testimony-103450/



I could understand if this would happend to a script kid without knowledge
of security but when it did happened to sony with 100M users. Pathetic.
Luckily I was not user of their network.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 10, 2011, at 4:42 PM, Pete Smith wrote:

  if an attacker initiates a connection dest port higher than 2048 (to some 
 other server the attacker controls) and source port of 80 that will pass 
 through an ACL without issues, this would not be so on a stateful firewall.


If the attacker's in a position to generate an outbound connection sourced from 
a well-known port (which presumably is supposed to have an httpd attached to 
it), there's nothing a stateful firewall can do to improve matters.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 10, 2011, at 8:53 PM, Bruno Cesar Moreira de Souza wrote:

 The stateless ACLs would not prevent ACK tunneling 
 (http://ntsecurity.nu/papers/acktunneling/). 

Again, if an attacker's already in a position to do that, the game is already 
over.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Thor (Hammer of God)
 On May 10, 2011, at 4:42 PM, Pete Smith wrote:
 
   if an attacker initiates a connection dest port higher than 2048 (to some
 other server the attacker controls) and source port of 80 that will pass
 through an ACL without issues, this would not be so on a stateful firewall.
 
 
 If the attacker's in a position to generate an outbound connection sourced
 from a well-known port (which presumably is supposed to have an httpd
 attached to it), there's nothing a stateful firewall can do to improve 
 matters.

You can if you require authentication, which I do even here at the HoG labs.  
Well, except for rules specifically created for other devices such as, 
ironically, my PS3. :)

Mike Kaeo's presentation is interesting, and certainly has merit where it 
applies - but saying stateful firewalls have no place in front of servers is 
far too generic of a statement.   There are any number of topological 
deployment scenarios where firewalls certainly provide security in depth and 
added security, irrespective of what Mr. Kaeo's opinion on the matter is.  If 
one can design a secure access model using router ACLs then right on, but that 
doesn't mean that other models don't work.

I'm unclear as what you mean by no state to inspect in the first place in 
regard to firewalls in front of servers - my TMG box most certainly inspects 
state when I access assets via the firewall.   I think I know what you really 
meant by that statement, but can you explain your point a bit more?  I want to 
make sure I'm not missing something.

t



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 10, 2011, at 10:45 PM, Thor (Hammer of God) wrote:

 There are any number of topological deployment scenarios where firewalls 
 certainly provide security in depth and added security, irrespective of what 
 Mr. Kaeo's opinion on the matter is.

The only one I can think of is between a middleware server and a front-end 
server or a middleware server and a back-end server; and even then, if an 
attacker has successfully compromised the middleware server, the tame's already 
over.  Certainly not in front of servers routinely connected to by client 
machines.

That isn't just Merike's opinion, btw - it's a well-known BCP in the global 
opsec community (as distinct from the infosec community).  Her preso simply 
codifies what folks who perform Internet opsec for a living already know.

  If one can design a secure access model using router ACLs then right on, but 
 that doesn't mean that other models don't work.

It means they're unnecessary, and instantiating an unnecessary stateful DDoS 
chokepoint in front of a server is a net security loss, not a gain.

 I'm unclear as what you mean by no state to inspect in the first place in 
 regard to firewalls in front of servers - my TMG box most certainly inspects 
 state when I access assets via the firewall.


How does inserting a stateful firewall in front of a Web server help, given the 
stateless nature of HTTP and the fact that all incoming connections to the 
server are unsolicited?  Same for a DNS server.  There is no state for the 
firewall to inspect in order to determine whether to pass/fail those packets, 
stateless ACLs in hardware-based routers/layer-3 switches are the way to go.

All the talk of exfiltration via a covert channel is irrelevant, given that a) 
when the httpd on the server stops responding, that's a big giveaway that 
there's a problem, and b) that if the attacker is in control of a remote host 
to which he wishes to exfiltrate data, he can simply initiate an inbound 
connection and then generate the appropriate outbound responses, since he's 
effectively in charge of both ends of the connection, and c) there're far 
easier and less visible/onerous ways to exfiltrate data, anyways.

There are no stateful firewalls emplaced in front of the extremely popular 
servers/services accessed by gazillions of Internet users on a daily basis - at 
least, the ones that stay up, heh.  And every time I get a call from someone 
screaming 'the IDC and everything in it is down', it's because there's an 
unnecessary stateful firewall fronting the whole thing, and it's trivially easy 
for an attacker with even a very small botnet to take down said stateful 
firewall with programmatically-generated attack traffic which will conform to 
all the firewall rules and 'inspectors' and whatnot, but which will fill up the 
firewall state-tables, crowd out legitimate traffic, and eventually cause said 
firewall to fall over.

Stateful firewalls make perfect sense in front of endpoint networks comprised 
of client machines which shouldn't receive unsolicited connections across some 
defined policy boundary.  They make no sense in front of servers, but folks 
have been conditioned to think that firewalls are some kind of universal 
security panacea.  Which is especially ironic in the context of this thread, 
given that Sony have publicly stated that their servers were in fact exploited 
by traffic which passed straight through their stateful firewalls.

;

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Bruno Cesar Moreira de Souza

--- On May 10, 2011, Dobbins, Roland rdobb...@arbor.net wrote:

 On May 10, 2011, at 8:53 PM, Bruno Cesar Moreira de Souza wrote:
 
  The stateless ACLs would not prevent ACK tunneling 
  (http://ntsecurity.nu/papers/acktunneling/). 
 
 Again, if an attacker's already in a position to do that,
 the game is already over.

The game is over for this compromised server. However, the attacker possibly 
wants to attack other servers in the network and then compromise sensitive 
database servers. If the compromised server is not behind a stateful firewll, 
it will be easier to create a tunnel to access unauthorised ports (such as 
database network services) and attack other servers. In the worst case, the 
attacker may be able to penetrate the internal network through this tunnel. It 
would be possible to create a covert channel through a stateful firewall? Yes, 
but if the firewall is well configured, you increase the complexity of the 
attack and there is more chance the attack will be detected.

Additionally, using a covert channel, the attacker can create a backdoor to 
keep his access. Even if the exploited vulnerability is fixed in a short time, 
the attacker will still be able to easily control the compromised server. And 
perhaps his access will keep unnoticed for a long time.



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Bruno Cesar Moreira de Souza

--- On May 10, 2011, Dobbins, Roland rdobb...@arbor.net escreveu:

 On May 10, 2011, at 10:56 PM, Bruno
 Cesar Moreira de Souza wrote:
 
  If the compromised server is not behind a stateful
 firewall, it will be easier to create a tunnel to access
 unauthorised ports (such as database network services) and
 attack other servers. 
 
 
 That's untrue if even the most basic BCPs for crafting and
 enforcing network access policies have been followed. 
 Plus, the moment the httpd stops working, that should ring
 alarm bells via even the most basic NMS/OSS monitoring.

How would you block an ACK tunnel using only a packet filter? 
(http://ntsecurity.nu/papers/acktunneling/) You don't need to stop the httpd 
service to create this kind of tunnel, as the packets from the attacker would 
just be ignored by the httpd service, but could be intercepted by the malicious 
code executed on the compromised server (using the same approach employed by 
network sniffers). 

 
  Even if the exploited vulnerability is fixed in a
 short time, the attacker will still be able to easily
 control the compromised server.
 
 Not if it's taken offline and scrubbed down to the bare
 metal, as should be routine after a compromise.
 

This is true IF the compromise was detected. I'm talking about the common case 
when the compromise is not detected, but after some time the vulnerability is 
fixed (for example, through patching).  If the attacker installed a backdoor in 
the compromised server, which uses a convert channel through your packet 
filter, then you may not detect the problem for a long time.


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Thor (Hammer of God)
 How does inserting a stateful firewall in front of a Web server help, given 
 the
 stateless nature of HTTP and the fact that all incoming connections to the
 server are unsolicited?  Same for a DNS server.  There is no state for the
 firewall to inspect in order to determine whether to pass/fail those packets,
 stateless ACLs in hardware-based routers/layer-3 switches are the way to go.

HTTP may be stateless, but the TCP connection isn't.  The purpose for my 
firewall in front of my web server is that if you get on the box, or can 
somehow try to initiate an external connection (e.g. SQL injection), you will 
not be able to do so.  My web server will only respond with return HTTP traffic 
if the session has already been initiated.  You can't make any outbound 
connections from it no matter what your source port is.   How is a simple ACL 
allowing anything from 80 outbound secure?  

 All the talk of exfiltration via a covert channel is irrelevant, given that 
 a) when
 the httpd on the server stops responding, that's a big giveaway that there's a
 problem, and b) that if the attacker is in control of a remote host to which 
 he
 wishes to exfiltrate data, he can simply initiate an inbound connection and
 then generate the appropriate outbound responses, since he's effectively in
 charge of both ends of the connection, and c) there're far easier and less
 visible/onerous ways to exfiltrate data, anyways.

Which is why we have security in depth.  The old there are 10 ways to do it 
anyway so why bother argument just don't hold water for me.   My above 
response could easily obviate 5 of those ways, so there is value add.   Your 
stance of irrelevant and unnecessary and other superlative postures is far 
too heavy handed in my opinion - and just because ops likes something doesn't 
mean it has anything to do with security.  I'm not sure who you are talking to, 
but no one in my org ever considers a firewall a security panacea, nor any 
single technology for that matter. 

 
 There are no stateful firewalls emplaced in front of the extremely popular
 servers/services accessed by gazillions of Internet users on a daily basis - 
 at
 least, the ones that stay up, heh.  And every time I get a call from someone
 screaming 'the IDC and everything in it is down', it's because there's an
 unnecessary stateful firewall fronting the whole thing, and it's trivially 
 easy
 for an attacker with even a very small botnet to take down said stateful
 firewall with programmatically-generated attack traffic which will conform to
 all the firewall rules and 'inspectors' and whatnot, but which will fill up 
 the
 firewall state-tables, crowd out legitimate traffic, and eventually cause said
 firewall to fall over.

Of course there are firewalls in front of some of these services, and if it is 
trivial for someone with a small bot to take down the firewall, then someone is 
not doing their job.  

 Stateful firewalls make perfect sense in front of endpoint networks
 comprised of client machines which shouldn't receive unsolicited connections
 across some defined policy boundary.  They make no sense in front of
 servers, but folks have been conditioned to think that firewalls are some kind
 of universal security panacea.  Which is especially ironic in the context of 
 this
 thread, given that Sony have publicly stated that their servers were in fact
 exploited by traffic which passed straight through their stateful firewalls.

The fact that someone was able to navigate through firewalls speaks to the 
configuration, not the technology.  Sony actually said they didn't have 
firewalls, and only had ACLs, so you're point is lost there, I think.  

t

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 11, 2011, at 4:01 AM, Thor (Hammer of God) wrote:

 HTTP may be stateless, but the TCP connection isn't.  The purpose for my 
 firewall in front of my web server is that if you get on the box, or can 
 somehow try to initiate an external connection (e.g. SQL injection), you will 
 not be able to do so.

Again, if I'm an attacker and I've already pwn3d your box, this is a trivial 
issue.

But let's pretend it isn't.  Since I've pwn3d your box, I can quite easily 
initiate an inbound connection to your box from some other outside box which is 
outside and is under my control, which will conform to your inverted 
state-check, and thus I have my connection, and can exfiltrate data.

  How is a simple ACL allowing anything from 80 outbound secure?

Given the above, the question is, how is it insecure?  Especially since it 
removes the DDoS state-table vector?

 The old there are 10 ways to do it anyway so why bother argument just don't 
 hold water for me.

It should in a scenario in which the cost/benefit ratio is so clearly weighted 
towards the cost side, with so little on the benefit side.

   My above response could easily obviate 5 of those ways, so there is value 
 add.

Look, if you have stateless ACLs only allowing access to your box via 
destination ports TCP/80 and TCP/443 and denying everything else, and stateless 
ACLs which only permit outbound traffic sourced from TCP/80 and TCP/443 to 
ephemeral ports, then the only way someone is going to be able to access your 
box from the outside in the first place is via those selfsame TCP/80 and 
TCP/443 ports.  Which means that your stateful outbound checking is for nought, 
since the attacker is going to be able to initiate a session which passes your 
firewall policy rules and the inverted state check, anyways, or he isn't going 
to be able to access your box at all.

As far as a sidewise compromise or a compromise from 'inside' (assuming there 
is an 'inside'; public-facing servers ought not to be conflated with 
workstation access LANs and the like at all), again, if you have appropriate 
functional separation and network access policies in place, plus you're 
monitoring all of it using appropriate visibility technologies, that isn't an 
issue, either.

So, all this stateful checking you're doing on outbound traffic from your Web 
server doesn't actually benefit you one iota, and it makes it trivially easy to 
exhaust the state-tables in your firewall.  If you don't believe me, take a 
tool like Siege or Tsung and set it up to hammer your server through the 
stateful firewall with lots and lots of unique connections.

 Of course there are firewalls in front of some of these services, and if it 
 is trivial for someone with a small bot to take down the firewall, then 
 someone is not doing their job.

It's because of the nature of stateful firewalls.  Yes, S/RTBH or flowspec or 
IDMS can and are used to protect said stateful firewalls and everything behind 
them from DDoS, but those stateful firewalls shouldn't be there in the first 
place.

 The fact that someone was able to navigate through firewalls speaks to the 
 configuration, not the technology.  Sony actually said they didn't have 
 firewalls, and only had ACLs, so you're point is lost there, I think. 


http://gamer.blorge.com/2011/05/01/sony-press-conference-compensation-details-and-psn-to-resume-this-week/

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 11, 2011, at 12:52 AM, Bruno Cesar Moreira de Souza wrote:

 How would you block an ACK tunnel using only a packet filter? 
 (http://ntsecurity.nu/papers/acktunneling/) You don't need to stop the httpd 
 service to create this kind of tunnel, as the packets from the attacker would 
 just be ignored by the httpd service, but could be intercepted by the 
 malicious code executed on the compromised server (using the same approach 
 employed by network sniffers). 

See my previous response to Thor.  I don't intend to keep this thread going 
forever in the face of incomprehension, but this focus on corner-case 
exfiltration techniques which are easily obviated by OS and service/app BCPs 
and appropriate monitoring, to the point of instantiating unnecessary and 
harmful state in front of servers which makes it trivial to take them down, 
demonstrates that in general, the infosec community pretty much completely 
ignores the availability leg of the confidentiality-integrity-availability 
triad.

Which is disappointing, given that availability is in fact the most important 
leg of that triad.

But, I guess if availability is nil, one has achieved perfect confidentiality 
and integrity, since the applications and services and data are completely 
inaccessible, so perhaps that's a big win for confidentiality and integrity, 
after all.

;

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Thor (Hammer of God)
I'll reply in kind combining threads, but sans insulting statements like in 
the face of incomprehension.  You make grand assumptions about what you can 
do, and what is trivial as if you think all vulnerabilities automatically 
give you administrative access or something.   You thinking that just because 
you owned my web server, it is trivial to bypass outbound rule enforcement - 
this is not only assumptive, but incorrect.   Most attacks or breached do not, 
in fact, result in that level of access.  

You apparently live and work in a world of absolutes where you assume you can 
send traffic to my web server and just alter the response as you see fit.  
You've also apparently had a *very* different incident response history than I 
have.   But, at Arbor, I would also expect that you in a world very different 
than most and interact with a much different traffic model.  My experience is 
quite different, and I have personally seen too many instances to count where 
the use of firewalls has, without question, been what has saved a company.  But 
I'm glad it works for you, which is really what this conversation is about: 
what actually works for people. 

Feel free to argue all you wish about how firewalls are ineffective and a 
waste, but I have empirical evidence that shows otherwise.  I'm glad your ops 
experience serves you, but I would never count on ACLs alone to secure my 
infrastructure, particularly when it requires one to have wide open outbound 
ACLs.  And actually, I would do both (and normally do in production networks).  

So, to wrap up my input in this regard, people should use what works for them 
assuming they know what problems they are trying to solve and how they are 
solving them.   But just because people don't automatically embrace your opts 
processes doesn't mean we can't comprehend it.  It's really not rocket 
science you know...

 -Original Message-
 From: full-disclosure-boun...@lists.grok.org.uk [mailto:full-disclosure-
 boun...@lists.grok.org.uk] On Behalf Of Dobbins, Roland
 Sent: Tuesday, May 10, 2011 4:33 PM
 To: full-disclosure@lists.grok.org.uk
 Subject: Re: [Full-disclosure] Sony: No firewall and no patches
 
 On May 11, 2011, at 12:52 AM, Bruno Cesar Moreira de Souza wrote:
 
  How would you block an ACK tunnel using only a packet filter?
 (http://ntsecurity.nu/papers/acktunneling/) You don't need to stop the
 httpd service to create this kind of tunnel, as the packets from the attacker
 would just be ignored by the httpd service, but could be intercepted by the
 malicious code executed on the compromised server (using the same
 approach employed by network sniffers).
 
 See my previous response to Thor.  I don't intend to keep this thread going
 forever in the face of incomprehension, but this focus on corner-case
 exfiltration techniques which are easily obviated by OS and service/app BCPs
 and appropriate monitoring, to the point of instantiating unnecessary and
 harmful state in front of servers which makes it trivial to take them down,
 demonstrates that in general, the infosec community pretty much
 completely ignores the availability leg of the confidentiality-integrity-
 availability triad.
 
 Which is disappointing, given that availability is in fact the most important 
 leg
 of that triad.
 
 But, I guess if availability is nil, one has achieved perfect confidentiality 
 and
 integrity, since the applications and services and data are completely
 inaccessible, so perhaps that's a big win for confidentiality and integrity, 
 after
 all.
 
 ;
 
 ---
 Roland Dobbins rdobb...@arbor.net //
 http://www.arbornetworks.com
 
   The basis of optimism is sheer terror.
 
 -- Oscar Wilde
 
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 11, 2011, at 6:51 AM, Thor (Hammer of God) wrote:

My experience is quite different, and I have personally seen too many instances 
to count where the use of firewalls has, without question, been what has saved 
a company.

I would be extremely interested to learn details of how a stateful firewall in 
front of a server saved a company, when stateless ACLs in hardware-based 
network infrastructure devices would've led to failure.  Seriously, if you 
don't mind outlining the scenario, I think it would be very instructive.

 So, to wrap up my input in this regard, people should use what works for them 
 assuming they know what problems they are trying to solve and how they are 
 solving them.


If an attacker is already in a position to issue commands and induce your box 
to do things, he *already has his covert channel over which he can exfiltrate 
data*.  So the outbound stateful checking of server response traffic is moot, 
and simply constitutes a stateful DDoS chokepoint which makes it trivial for an 
attacker to take down the server in question by filling up the state-tables of 
said firewall with well-formed, programatically-generated traffic.

That's my point, in a nutshell.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Ivan .
Ill throw this into the mixer while on topic of FWs

The TCP Split Handshake: Practical Effects on Modern Network Equipment
http://nmap.org/misc/split-handshake.pdf


On Wed, May 11, 2011 at 10:18 AM, Thor (Hammer of God)
t...@hammerofgod.com wrote:

  I would be extremely interested to learn details of how a stateful firewall 
  in
  front of a server saved a company, when stateless ACLs in hardware-based
  network infrastructure devices would've led to failure.  Seriously, if you 
  don't
  mind outlining the scenario, I think it would be very instructive.

 I'd be happy to - I too would like to dive a bit deeper into what your points 
 are as I find them interesting as well.  Let's take it offline - you can 
 share back with the group if you feel it valuable.

 t

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-10 Thread Dobbins, Roland
On May 11, 2011, at 7:18 AM, Thor (Hammer of God) wrote:

  Let's take it offline - you can share back with the group if you feel it 
 valuable.


Sounds good to me, thanks much!

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-09 Thread Christian Sciberras
I congratulate all those that made a good pawn (pwn?) out of Anonymous,
urging the group into a vendetta attack in the name of George Hotz; while
the upper echelon collected the bounty; loads of user information.

Must be the social engineering effort of the century considering the size of
the outcome as well as suckering a different kind of victim into it.

Of course, on the other side of the Fail scale there is Sony, but the media
will do the job of an appropriate critique - so I won't even bother.



On Tue, May 10, 2011 at 1:33 AM, Ivan . ivan...@gmail.com wrote:

 I guess that makes a mockery of the PCI DSS framework!

 On Tue, May 10, 2011 at 9:03 AM, Thor (Hammer of God) 
 t...@hammerofgod.com wrote:

  Maybe they should call that You don't have to patch genius!  Lol


 http://www.eweek.com/c/a/Security/Sony-Networks-Lacked-Firewall-Ran-Obsolete-Software-Testimony-103450/


 Sent from my Windows Phone

 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-09 Thread The Security Community
On Mon, May 9, 2011 at 7:03 PM, Thor (Hammer of God)
t...@hammerofgod.com wrote:
 Maybe they should call that You don't have to patch genius!  Lol

 http://www.eweek.com/c/a/Security/Sony-Networks-Lacked-Firewall-Ran-Obsolete-Software-Testimony-103450/



Maybe they *DID* call him.

https://www.infosecisland.com/blogview/10813-Getting-Off-the-Patch.html

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-09 Thread Tracy Reed
On Tue, May 10, 2011 at 09:33:23AM +1000, Ivan . spake thusly:
 I guess that makes a mockery of the PCI DSS framework!

Not at all. PCI DSS does not guarantee security. And if they didn't have a
firewall and were running outdated software they weren't compliant anyway.

-- 
Tracy Reed


pgp7fWhMJ9F7L.pgp
Description: PGP signature
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-09 Thread Nick FitzGerald
Thor (Hammer of God) wrote:

 Maybe they should call that You don't have to patch genius!  Lol
 
 http://www.eweek.com/c/a/Security/Sony-Networks-Lacked-Firewall-Ran-Obsolete-Software-Testimony-103450/

Or, to paraphrase Sony BMG's (then) Global Digital Business President 
Thomas Hesse*:

   Most people, I think, don't even know what patch management, threat
   assessment or a firewall is, so why should _we_ care about them?

This group of companies clearly has DNA to prevent them from learning. 
Maybe a good reaming by the legal system this time will finally 
penetrate their corporately-ignorant ways?  (And yes, somewhat 
ironically, I am sending this from a Sony laptop...)



* http://www.npr.org/templates/story/story.php?storyId=4989260 -- the 
quote is from around 1:56 in the audio.





Regards,

Nick FitzGerald


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] Sony: No firewall and no patches

2011-05-09 Thread Dobbins, Roland
On May 10, 2011, at 6:03 AM, Thor (Hammer of God) wrote:

 Maybe they should call that You don't have to patch genius! 


Stateful firewalls have no place in front of servers, where every incoming 
request is unsolicited, and therefore there is no state to inspect in the first 
place.  Stateful firewalls in front of servers merely serve as DDoS chokepoints 
due to the large amount of unnecessary state they instantiate.

Instead, network access policies for servers should be implemented utilizing 
stateless ACLs on hardware-based routers and/or layer-3 switches capable of 
handling mpps of traffic.

Keeping OSes and apps/services up-to-date with patches and configured securely 
is extremely important, of course; and network access policies should be 
implemented per the above.  But blindly sticking stateful firewalls in places 
where there's no state to inspect and where they actually do more harm than 
good in terms of actual security posture isn't a solution.  Where stateful 
firewalls in front of Web servers are incorrectly mandated by various 
regulatory frameworks, making use of mod_security or its equivalent on the Web 
servers themselves ensures compliance without creating a DDoS chokepoint.

See 
http://www.nanog.org/meetings/nanog48/presentations/Monday/Kaeo_FilterTrend_ISPSec_N48.pdf
 and 
http://www.eweek.com/index2.php?option=contenttask=viewid=66503pop=1hide_ads=1page=0hide_js=1catid=45
 for more details on this particular sub-topic.

---
Roland Dobbins rdobb...@arbor.net // http://www.arbornetworks.com

The basis of optimism is sheer terror.

  -- Oscar Wilde

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/