Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Update Bob Cowles, SLAC stanford.edu Presented at HEPiX - TRIUMF 23 Oct 2003 Work supported by U. S. Department of Energy.

Similar presentations


Presentation on theme: "Computer Security Update Bob Cowles, SLAC stanford.edu Presented at HEPiX - TRIUMF 23 Oct 2003 Work supported by U. S. Department of Energy."— Presentation transcript:

1 Computer Security Update Bob Cowles, SLAC bob.cowles @ stanford.edu Presented at HEPiX - TRIUMF 23 Oct 2003 Work supported by U. S. Department of Energy contract DE-AC03-76SF00515

2 23 Oct 2003HEPiX - TRIUMF2

3 23 Oct 2003HEPiX - TRIUMF3 Slammer Impact

4 23 Oct 2003HEPiX - TRIUMF4 Australia Japan Korea China India

5 23 Oct 2003HEPiX - TRIUMF5 http://www.microsoft.com/security/security_bulletins/

6 23 Oct 2003HEPiX - TRIUMF6

7 23 Oct 2003HEPiX - TRIUMF7 MSBlaster Released MSBlaster at SLAC

8 23 Oct 2003HEPiX - TRIUMF8 FireWall Log – Infected Machines Sep 16 18:29:18 icmp 134.79.137.220 -> 134.79.72.98 (8/0) Sep 16 18:29:19 icmp 134.79.137.220 -> 134.79.72.198 (8/0) Sep 16 18:29:20 icmp 134.79.137.220 -> 134.79.73.42 (8/0) Sep 16 18:38:46 tcp 134.79.137.220(3325) -> 134.76.2.205(135) Sep 16 18:38:47 tcp 134.79.137.220(3169) -> 134.76.2.48(135) Sep 16 18:38:48 tcp 134.79.137.220(3249) -> 134.76.2.128(135) Sep 16 18:40:06 icmp 134.79.129.243 -> 134.79.72.0 (8/0) Sep 16 18:40:06 icmp 134.79.129.243 -> 134.79.72.64 (8/0) Sep 16 18:40:07 icmp 134.79.129.243 -> 134.79.72.128 (8/0) Sep 16 18:40:17 tcp 134.79.136.68(4107) -> 134.79.124.0(135) Sep 16 18:40:18 tcp 134.79.136.68(4194) -> 134.79.124.98(135) Sep 16 18:40:19 tcp 134.79.136.68(4292) -> 134.79.124.196(135) Sep 16 22:28:25 tcp 134.79.129.243(4413) -> 134.76.24.39(135) Sep 16 22:28:26 tcp 134.79.129.243(4377) -> 134.76.22.41(135) Sep 16 22:28:27 tcp 134.79.129.243(4383) -> 134.76.22.113(135)

9 23 Oct 2003HEPiX - TRIUMF9 Infection Sources @ SLAC 32%VPN 22%DHCP (reg, internal network) 20%Fixed IP On vacation, laptop infected outside, etc. 14%Infected during build / patch 12%Dialup

10 23 Oct 2003HEPiX - TRIUMF10 Blaster - Easy to Get Infected 09/29/103 11:46:42 Host: 134.79.25.55 Port: 135 TCP Blocked 09/29/103 11:46:41 Host: 134.79.25.55 Port: 135 TCP Blocked email @ 12:21pm: Bob, is host "illusion" yours, as per my so-called memory? But the mac addr is registered to Richard Mount... Sep 29 11:41:37 dhcp2 dhcpd: DHCPACK on 134.79.25.55 to 00:10:a4:e4:2a:b8 (illusion) host roam-rmount2 { hardware ethernet 00:10:a4:e4:2a:b8; }# 01/25/00 # PC54566, Richard Mount

11 23 Oct 2003HEPiX - TRIUMF11 https://rhn.redhat.com/errata/rh73-errata-security.html

12 23 Oct 2003HEPiX - TRIUMF12

13 23 Oct 2003HEPiX - TRIUMF13

14 23 Oct 2003HEPiX - TRIUMF14

15 23 Oct 2003HEPiX - TRIUMF15 http://docs.info.apple.com/article.html?artnum=61798

16 23 Oct 2003HEPiX - TRIUMF16

17 23 Oct 2003HEPiX - TRIUMF17

18 23 Oct 2003HEPiX - TRIUMF18

19 23 Oct 2003HEPiX - TRIUMF19 http://sunsolve.sun.com/pub-cgi/show.pl?target=security/sec

20 23 Oct 2003HEPiX - TRIUMF20

21 23 Oct 2003HEPiX - TRIUMF21 http://www.cisco.com/warp/public/707/advisory.html

22 23 Oct 2003HEPiX - TRIUMF22

23 23 Oct 2003HEPiX - TRIUMF23 It Sucks Not to Patch Popular rookit in many variations Hides files, directories, processes; precompiled password With keyboard and/or ssh sniffers Listens on *all* open ports for backdoor Any port open inbound allows backdoor signal, sk thens opens outbound tcp for encrypted shell connection

24 23 Oct 2003HEPiX - TRIUMF24 suckit (cont) Home page http://hysteria.sk/sd/http://hysteria.sk/sd/ Latest versions not publicly available Also find exploits for –ptrace –sendmail 8.11.x

25 23 Oct 2003HEPiX - TRIUMF25 Last 24 Hours Last 30 Days http://www.trendmicro.com/map/

26 23 Oct 2003HEPiX - TRIUMF26 Ballmer @ Gartner ITXpo Windows has fewer vulnerabilities than RH Linux [RH6] No roadmap for Linux. There’s nobody to hold accountable for security issues The security of Microsoft products is our top priority. We have our best brains on it. We understand this is an issue of customer satisfaction. http://www.theregister.co.uk/content/4/33522.html

27 23 Oct 2003HEPiX - TRIUMF27 Microsoft @ Stanford Universities tend to be a worst case Diverse, unmanaged –Population –Hardware –Software Unlikely to fit into AD model Stanford had 8000 machines compromised by Blaster BEFORE students returned for classes

28 23 Oct 2003HEPiX - TRIUMF28 Feedback to Microsoft Clear & meaningful impact statements Fix IE (30+ outstanding bugs) Reduce the attack vector (profile services) Don’t require license check for security patches (e. g. MS Office CD) No tie-in to IE (no active scripting)

29 23 Oct 2003HEPiX - TRIUMF29 Feedback to Microsoft (cont) Open up patching tools and process Understand 3 rd party tools +/- Allow other vendors to use same tools for their Windows products Provide feedback on real patch status (local & remote) Need general patch deployment tool not requiring AD

30 23 Oct 2003HEPiX - TRIUMF30 Conclusions [Unchanged from last year] Poor administration is still a major problem Firewalls cannot substitute for patches Multiple levels of virus/worm protection are necessary Clue is more important than open source

31 23 Oct 2003HEPiX - TRIUMF31 No Easy Solutions Questions?


Download ppt "Computer Security Update Bob Cowles, SLAC stanford.edu Presented at HEPiX - TRIUMF 23 Oct 2003 Work supported by U. S. Department of Energy."

Similar presentations


Ads by Google