At 05:33 PM 7/16/02, Williams, Larry wrote:
>I don't know enough to form an educated guess, and I would have to do 
>major research to make something like this work for me, but here's my 
>invention exchange.
>
>- You could use group membership to indicate who has returned their 
>forms.  When someone does return the form, you add their user ID to the 
>group that affords them Internet access.

Obviously, this principle would have to be applied at some level -- but it 
might not be so straightforward in a mixed-client environment (there's not 
necessarily any correlation between a Windows NT/2000 "group" and a UNIX 
group)... unless, possibly, everything was centrally managed from something 
like an LDAP or RADIUS server.

>- You could create a login script that first checks if the user belongs to 
>the Internet group and then issues an iptables command to grant access to 
>the user's current IP.
>- You could create a logout script that removes their IP when they leave.
>- If the logout script doesn't run, maybe when they drop the connection 
>(doesn't it run anyway?), a cron event could check for stale IPs and purge 
>any from iptables.

BAD idea.  Scenario:

Joe Q. User (who belongs to the 'Internet' group) logs in -- a rule is 
added to iptables to allow Internet access from his IP (say 192.168.100.1).

Jane A. Hacker (who is not in the 'Internet' group -- indeed, they wouldn't 
even need an account on the local domain!  The only access required would 
be physical access to the network.  Bring in a laptop with Linux installed 
and plug it into any convenient Ethernet jack...) performs a DoS attack 
(ping flood, exploit script, ARP spoofing, whatever) against Joe Q. User's 
machine.  Once Joe Q. User's machine is knocked off the (local) 'net, Jane 
A. Hacker instructs her computer to assume an IP address of 192.168.100.1 
(a MAC address takeover would also be likely).  Voila!  Jane A. Hacker now 
has Internet access through the company's pipe.  In addition, your script 
to check for 'stale IPs' wouldn't work, because that IP address is in use 
(by Jane A. Hacker's machine).  Also, if you logged IP address->username 
logins, anything that Jane A. Hacker does with that Internet access would 
be logged under Joe Q. User's name!

In theory, a good idea.  It would also work if you had a small, TRUSTED 
group of employees.  But unfortunately, one can never rule out the 
possibility of an insider attack... running a proxy server which requires 
authentication would be a superior method in this case (among other 
possibilities).

Just my thoughts...
- Peter Kristolaitis


Reply via email to