Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 27 Mar 2001 19:45:51 -0500
From:      Peter Radcliffe <pir@pir.net>
To:        security@FreeBSD.ORG
Subject:   Re: SSHD revelaing too much information.
Message-ID:  <20010327194550.A20633@pir.net>
In-Reply-To: <4.3.2.20010327173917.02803ae0@207.227.119.2>; from jeff-ml@mountin.net on Tue, Mar 27, 2001 at 06:09:11PM -0600
References:  <4.3.2.20010327160147.02c1b6c0@207.227.119.2> <20010327005503.J5425@rfx-216-196-73-168.users.reflex> <Pine.NEB.3.96L.1010326205118.81313D-100000@fledge.watson.org> <p05010404b6e5bb325d3c@[128.113.24.47]> <20010327005503.J5425@rfx-216-196-73-168.users.reflex> <p05010407b6e693b73e7c@[128.113.24.47]> <4.3.2.20010327160147.02c1b6c0@207.227.119.2> <20010327173454.J12888@pir.net> <4.3.2.20010327173917.02803ae0@207.227.119.2>

next in thread | previous in thread | raw e-mail | index | archive | help
"Jeffrey J. Mountin" <jeff-ml@mountin.net> probably said:
> Argh, this can go on and on...

Which shows there are two distinct opinions here, and both should
be allowed for.

> Presuming the first "vulnerable" needs and "un" prefix and say that this 
> sounds like a shell game method of hoping they don't find the vulnerable 
> system.  Better to spend time keeping up-to-date than shuffling and hope 
> they don't guess the right shell or server.

It's not a game or hoping, and I spend all the time needed to stay up
to date but often vunerabilitiues are known in the black hat camp well
before the white hats find out.

I also see many scans only going for the machines with advertised
vunerable versions and ignoring the ones which lie or give no version
number (as I've already stated with IDS watching bind.version scans).

> Chances are they will be scanning blocks of IPs and if that is the case no 
> slight-of-hand will hide the fact of where the vulnerable system is.

This happens. The other case also happens.

> All cute wording aside, there was a time when I removed the version number 
> from a daemon and found that the number of probes increased.  Did it make 
> the system any more secure, no.  Almost as bad as using a "honey pot" to 
> lure the bears away.  Before they only came around now and again.  Now they 
> come for the honey you put out.  Attracting more bears may not be necessary 
> bad, but can increase the risk of an "incident."

My direct experience disagrees with you. Machines where I remove or
obscure version numbers get an order of magnitude less probes than
those that have plain version numbers.

The bind servers on my work class B that don't give out version
numbers have NEVER been attacked. The scans for version.bind ignore
them. The recent bind vunerabilities were well known before there was
an available fix, and my not handing out version numbers meant the
machine was not attacked before the fixes were available.

> Better to spend time limiting the loss should the house be broken into than 
> hiding the fact there is a house there.

You can't fight what you don't know. Not all vunerabilities are known
or have fixes.

> Obscurity is a waste of time for little benefit IMO.

When it takes little effort and helps in some situations, I disagree
with you.

P.

-- 
pir                  pir@pir.net                    pir@net.tufts.edu


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010327194550.A20633>