Another Business Case for Integrating OpenBSD into IT Infrastructures

2005-11-28 Thread Sean Comeau
Greetings,

At the recent PacSec conference in Tokyo, I demonstrated how we can
easily secure wireless networks with OpenBSD.  This solution uses IPsec
to protect the traffic between the wireless clients and the Access
Points.  Users authenticate using OpenSSH (authpf) before they are
allowed access to network resources.  All of this is automated making it
user friendly and very secure.

Near the end of the presentation, I spoke about the future of wireless
networks using OpenBSD as Access Points.  Both hostapd and sasyncd are
very recent additions to OpenBSD.  I gave everyone a taste of the future
with a live demonstration showing stateful failover of a VPN tunnel
using sasyncd.

The presentation in HTML can be seen here:
http://www.openbsd-support.com/jp/en/htm/mgp/index.shtml

The PDF can be found here:
http://www.pacsec.jp/core05/psj05-scomeau-en.pdf

Conference site:
http://www.pacsec.jp/

Enjoy!

--
World Security Pros. Cutting Edge Training, Tools, and Techniques
London, England  *  February 20/21 2006  *  http://eusecwest.com/



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-10 Thread mdff
hi misc@,

which hardware r u talking about for example? we'd like
to use such real servers, but we can't decide what vendor
to choose. we definitely do not want to build our own
server (taking the raid controller from vendor x and the
disks from vendor y, having an overkill xeon mabo from z
and so on). we'd like to have on-site hw-support at least
next day (being in austria this is not possible with all
the big server-sellers)

our favourite was/is HP's DLxxx series, but mickey@ is
working on the ciss-port for their storage controllers and
we don't know when it's stable for production use...

any experience values which vendor to choose servers from?
and of course, where the newer hardware is fully supported
by openbsd?

 Avoid relying on cheap hardware to make your cost point.  OpenBSD runs 
 well on real, modern servers.  Managers at mid/large companies aren't 
 going to want to hear about how you pulled machines out of the trash and 
 now the business depends on them, even if they're 4x redundant.



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-10 Thread Mark Uemura
Hi Steve,

I was happy to get your comments and was not offended by anything you
said.  I'm very happy to learn from anyone, especially if it is going
to improve the presentation.  You made some good points that I will use
going forward  :)  My objective is really to prove by example  experience
the myriad of benefits gained by integrating OpenBSD into corporate IT
Infrastructures.  Of course, smaller companies would benefit just as much
and would probably appreciate the savings even more so.  I'm just here 
spreading the word :)

Thanks once again.

Cheers,

Mark Uemura
OpenBSD Support Japan Inc.
www.openbsd-support.com

On Wed, Jun 08, 2005 at 11:35:52AM -0400, [EMAIL PROTECTED] wrote:
 Just so you know, aside from my criticisms (which were misdirected since I
 completely misunderstood the purpose of your talk) I thought you put
 together an excellent presentation.  That probably didn't come through in
 my email.  Please keep up the good work.



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-10 Thread Kevin
On 6/10/05, mdff [EMAIL PROTECTED] wrote:
 : Steve Shockley writes:
 Avoid relying on cheap hardware to make your cost point.
 OpenBSD runs well on real, modern servers.  

 any experience values which vendor to choose servers from?
 and of course, where the newer hardware is fully supported
 by openbsd?

I'm facing the same issues -- I need to be able to specify a model
from a reputable vendor for rackmount servers when presenting
projects to management.  Where raw network throughput is not
an issue I will deploy Sun hardware with OpenBSD/Sparc64, but
am starting to get the feeling Sparc64 isn't a high-priority platform
for OpenBSD developers (Do I need to switch to AMD64?).

It's easiest (politically) for me to purchase Dell products,
but this is where fully supported by OpenBSD is a concern.


 we'd like to have on-site hw-support at least next day
 (being in austria this is not possible with all the big server-sellers)

http://www.openbsd.org/support.html#Austria


Kevin Kadow



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-10 Thread Steve Shockley

mdff wrote:

our favourite was/is HP's DLxxx series, but mickey@ is
working on the ciss-port for their storage controllers and
we don't know when it's stable for production use...


I usually wind up using older Compaq and HP servers for OpenBSD, where 
they used either Megaraid, old Adaptec or Smart/2 RAID, and they work 
fine in OpenBSD.  I haven't tried them, but I understand the HP DL145s 
work well, but they're not RAID or hot-swap.


The Dell PERC 4e/Si seems to be an LSI RAID controller, so it's possibly 
well-supported.  That seems to be the built-in RAID on the PowerEdge 
1850 and others.


I've heard Suns v20z servers are good, but if you search the archives I 
think you can find out the company that OEMs them if you don't need the 
support.  I dunno what's inside.


I think IBM's RAID controllers are unsupported.



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-08 Thread steve . shockley
On Mon, June 6, 2005 9:48 am, Mark Uemura wrote:
 Thanks for taking the time to provide me with your feedback.  I'm not
 adverse to getting or taking criticism if I'm wrong and/or if I learn
 something.  As my very close father-like friend says to me, Mark, if
 you're not careful, you'll learn something everyday! :)

Just so you know, aside from my criticisms (which were misdirected since I
completely misunderstood the purpose of your talk) I thought you put
together an excellent presentation.  That probably didn't come through in
my email.  Please keep up the good work.



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-06 Thread Mark Uemura
 This is a Very Nicely Done Presentation!
 
 Dave Feustel 

Hi Dave, 

Thanks a lot for this.

I'm glad that people like it because it was a lot
of work to put it together.  More so than building
and configuring systems ;)

Actually, I did get a lot of help along the way and
Ryan McBride who was really my inspiration.  I essentially
scarfed his amazing carp demo and put a little business
case together.  

Bob Beck, David Gwynne, Jonathan Gray and Michael Paddon
all gave me great suggestions and support.  I can't
forget the guys and gals that made it all possible.  
Thanks to the developers, documentors and supporters
that are equally passionate about OpenBSD and Security.
I'm just having fun and enjoying the ride :) 

Cheers,

Mark Uemura
OpenBSD Support Japan Inc.
www.openbsd-support.com

P.S. Thanks Theo!



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-06 Thread Steve Shockley

Ray Percival wrote:

To start with http://www.schneier.com/pptp.html and also because I for
one don't trust *any* security related code that I can't get the source
for. I think I'm not alone here by any means.


You're talking about PPTP, I'm talking about IPsec.


Fact of the matter is we can look at the OpenSSH code and see if the
problems that we know about are fixed or not. You can't do that with
closed source. So do you really want to trust your data going over a
public network to a vendor with Microsoft's rep for getting crypto and
security wrong?


You're talking about MS PPTP vs. OpenSSH, I'm talking about MS IPsec VPN 
vs. third-party VPN hardware (Checkpoint, Intel, Cisco).




Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-06 Thread Steve Shockley

Theo de Raadt wrote:

Lots of commentary from you, Steve... is that why you are the one giving
the talks?


I'm not sure I have anyone to give a talk to, and I haven't done 
anything quite as interesting (or large-scale) as this with OpenBSD.


(Besides, isn't it less talk, more code?  Of course I'm probably 
better at talking than coding.)




Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-06 Thread Miod Vallat
 (Besides, isn't it less talk, more code?  Of course I'm probably 
 better at talking than coding.)

Actually, I don't know why, but people keep getting the sentence wrong,
for no good reason.

The real sentence is ``less talk, more cheese''.

Note that, I have a list if you somehow can't find good cheese to order.

Miod



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-06 Thread Steve Shockley

Mark Uemura wrote:

six month prior to
me taking over the SysAdmin position.


Ah, see when I read the slides, I got the impression that you came in as 
a consultant to do all this, not that you did it all in-house.



I for one have problems putting a Windows Server on the Internet.  Even
within a DMZ and hardened as much as I know how.   I just wouldn't be able
to sleep at nights. 


Oh, it'd be fine, for at least several minutes.


If there is a Secure Commercial Wireless Solution that even comes
close to the solution that I have implemented in regards to the OpenBSD's
security track record, usability, interoperability and ease of use, 
ease of administration and cost, then please do enlighten me.


(If I knew of one that existed, I would have mentioned it.)


The basis
of what was implemented are on the slides.  You mention authpf in a
negative sense.  I think it was the best thing developed since sliced
bread :)  That's not totally true.  OpenBSD on Zaurus, PF, CARP and SPAMD
are also right up there ;)


I'm not trying to be negative towards authpf, I'm trying to describe 
reasons someone might have to not use it.  I don't like all the crap 
Cisco makes you install to use their solution either.


VPN: Why the hell does everyone hate the included Microsoft VPN?  If you 
run an MS shop, it's easy and cheap.  That uses IPsec, ISAKMP and PKI. 

Maybe because there's an easier, cheaper and more secure alternative!


(Compared to Cisco or Intel, not OpenBSD.)

It also has features to quarantine Windows clients that don't meet your 
criteria for system security.

No comment.


Why?  If you've got untrusted/unmanaged Windows clients that can connect 
into the network (i.e. Bob from Accounting connecting in from his 
unprotected home machine) then this is useful.  It's more for 
manageability than security.



Obviously you've not run Checkpoint on Windows :)  But that's okay,
I wouldn't wish it on anyone 8-)  By the way, in my talk, I do mention
a point in time (August 2003) when I had to protect my firm standard 
Checkpoint Firewall with my OpenBSD Firewall due to an outbreak of

'nachi', 'msblaster'  'sobig' viruses.  Imagine that, an OpenBSD
firewall out in front protecting another firewall because it was going
to 100% CPU utilization with dual CPU's!


Heh.  I've done the same thing with spamd and (anti-spam) mail servers, 
to add greylisting during a spam flood so the real servers could catch up.




A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-05 Thread Mark Uemura
Hi All,

I recently gave a talk that may interest some.  I hope
that it could be used by anyone presenting the merits
of OpenBSD and related Projects as a business case for
the corporate world.  The slides can be used by anyone
in any manner that would best benefit the Project.

I've updated our company website with the presentation.

http://www.openbsd-support.com/jp/en/htm/mgp/index.shtml

I hope this helps others put forth a good case for
OpenBSD in their working environment.

Cheers,

Mark T. Uemura
OpenBSD Support Japan Inc.
www.openbsd-support.com



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-05 Thread Theo de Raadt
Lots of commentary from you, Steve... is that why you are the one giving
the talks?

Mark Uemura wrote:
 I hope this helps others put forth a good case for
 OpenBSD in their working environment.

Overall the presentation is well-done, but I take some exception with 
some of your conclusions on slide 34.  I know when I talk to a vendor 
and get unrealistic comparisons, mentally that vendor is out the door.

DNS: You don't need a dual P3 with 2gb for a DNS server in Windows.  If 
the server isn't an AD controller, that P3/500 would be plenty.  If it 
is an AD controller, then the server size depends on how many users you 
have, and to offer a good comparison, you'd have to size the OpenBSD 
machine for Kerberos and LDAP.

(Same argument for DHCP, if you run a DHCP server on a dual P3, the 
server is going to be bored most of the time.)

I also noticed you're comparing a PC to a server.  For any OS, a real 
server will generally be a higher quality and more stable than a PC. 
PCs don't have hot-swap drives or power supplies.  Again, this isn't a 
fair comparison.

Remote access: Windows' built-in Remote Desktop is included with the OS, 
you don't need OpenBSD for that.  You couldn't do that over your Intel 
VPN?  Remote Desktop is potentially vulnerable to MITM, but it's 
probably more secure than an external web site like GoToMyPC.

You can also install OpenSSH on your Windows machines and manage them 
with netsh or a variety of other command-line tools.

Wireless: I'm not sure if Server 2003 can act as an AP, I haven't tried 
setting it up.  It can, however, provide 802.1X authentication, which 
requires less end-user configuration (on Windows clients) than authpf.

VPN: Why the hell does everyone hate the included Microsoft VPN?  If you 
run an MS shop, it's easy and cheap.  That uses IPsec, ISAKMP and PKI. 
It also has features to quarantine Windows clients that don't meet your 
criteria for system security.

(Yes, the MS PPTP protocol had some weaknesses, but that was 1998. 
That'd be like avoiding OpenSSH because the SSH 1.0 protocol had some 
weaknesses.)

Web: I assume you had some talking points here, specifically about 
privsep and code cleanup in OpenBSD's Apache.  The biggest problems with 
IIS are from admins enabling it when they don't need to, or using IIS 
when another product would do.  The Microsoft developers are even 
learning to run the web processes as low-privilege processes (Srv 2003 
SP1), although third-party developers aren't paying attention.

Besides, you can run Apache on Windows, so the core argument is between 
the trunk Apache and OpenBSD's Apache.

IDS: Snort doesn't run on Windows?

Firewall: I'm not familiar with Checkpoint, but their web site 
(http://www.checkpoint.com/products/downloads/firewall-1_datasheet.pdf) 
says that Checkpoint on Windows requires 256mb RAM and doesn't list 
processor requirements.  Sounds like somebody just wanted to buy a big 
server.  There's no good reason to have two processors in a firewall.

Other comments: When you boil it down, the $500 for Server 2003 isn't 
really all that expensive for a mid-size or large company.  CALs can 
make a difference in large companies, but that doesn't really come in to 
play here.

You've made a good argument for using OpenBSD as a redundant firewall or 
access point, but that's more Cisco's domain than Microsoft's.  Maybe 
find out if you can set up a redundant file server using OpenBSD/CARP, 
and compare that to active/passive Windows server clustering.

Don't use Micro$oft, it makes you sound like a zealot, and hasn't been 
funny since 1992.  Well, maybe leave it on slide 25, I like it 
contrasted with ChequePoint.

Avoid relying on cheap hardware to make your cost point.  OpenBSD runs 
well on real, modern servers.  Managers at mid/large companies aren't 
going to want to hear about how you pulled machines out of the trash and 
now the business depends on them, even if they're 4x redundant.

Slide 3: The first two paragraphs only preach to the converted.  Maybe 
add a fourth bullet point, Your competitors are probably saving money 
using it, depending on your audience.



Re: A Business Case for integrating OpenBSD into IT Infrastructures

2005-06-05 Thread Ray Percival
On Sun, Jun 05, 2005 at 10:25:39PM -0400, Steve Shockley wrote:
 Mark Uemura wrote:
 Remote access: Windows' built-in Remote Desktop is included with the OS,
 you don't need OpenBSD for that.  You couldn't do that over your Intel
 VPN?  Remote Desktop is potentially vulnerable to MITM, but it's
 probably more secure than an external web site like GoToMyPC.

 VPN: Why the hell does everyone hate the included Microsoft VPN?  If you
 run an MS shop, it's easy and cheap.  That uses IPsec, ISAKMP and PKI.
 It also has features to quarantine Windows clients that don't meet your
 criteria for system security.
To start with http://www.schneier.com/pptp.html and also because I for
one don't trust *any* security related code that I can't get the source
for. I think I'm not alone here by any means.

 (Yes, the MS PPTP protocol had some weaknesses, but that was 1998.
 That'd be like avoiding OpenSSH because the SSH 1.0 protocol had some
 weaknesses.)
No. It would be like SSH having well documented fundamental flaws and
then a group with a reputation for producing bad code told us that
they were all fixed but not letting us look at the code telling us that
they are fixed.

Fact of the matter is we can look at the OpenSSH code and see if the
problems that we know about are fixed or not. You can't do that with
closed source. So do you really want to trust your data going over a
public network to a vendor with Microsoft's rep for getting crypto and
security wrong?

I sure as hell know I don't want to.
--
BOFH excuse #99:

SIMM crosstalk.

[demime 1.01d removed an attachment of type application/pgp-signature which had 
a name of signature.asc]