Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 Apr 2002 11:54:14 +0200
From:      Andy Sporner <sporner@nentec.de>
To:        Terry Lambert <tlambert2@mindspring.com>
Cc:        Robert Watson <rwatson@FreeBSD.ORG>, "Greg 'groggy' Lehey" <grog@FreeBSD.ORG>, Jordan Hubbard <jkh@winston.freebsd.org>, Oscar Bonilla <obonilla@galileo.edu>, Anthony Schneider <aschneid@mail.slc.edu>, Mike Meyer <mwm-dated-1019955884.8b118e@mired.org>, hackers@FreeBSD.ORG
Subject:   Re: Security through obscurity? (was: ssh + compiled-in SKEY support     considered harmful?)
Message-ID:  <3CC680C6.2020608@nentec.de>
References:  <Pine.NEB.3.96L.1020423213946.55944I-100000@fledge.watson.org> <3CC67F5E.44FC802D@mindspring.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

I hate to jump into this fray, but if this is going to be a public 
thread, will
everybody make the reply to the list???  :-)  So far I only see Terry's 
emails.

Thanks!



Andy

Terry Lambert wrote:

>Robert Watson wrote:
>
>>On Tue, 23 Apr 2002, Terry Lambert wrote:
>>
>>>>The reality is that reducing exposure is an important part of any security
>>>>posture.
>>>>
>>>This is an argument for security through obscurity.
>>>
>>>If we are talking risk reduction, then we can easily achieve it
>>>statistically through obscurity.  In fact, this is exactly what FreeBSD
>>>does through its choice of TCP sequence numbers.
>>>
>>"Security by obscurity" refers to a behavioral phenomena in system design
>>and delivery, not to a technical design principle.  For example, it refers
>>to using a secret algorithm, but does not refer to using a secret key with
>>a published algorithm.  So disabling services in a default configuration
>>reduces risk by reducing exposure, but it's not security by obscurity.
>>
>
>However, if the goal is risk reduction, then "securty by
>obscurity" arguably reduces risk.
>
>
>>When shipping third party code, or our own code, we accept that some code
>>is more at risk than other code.  That risk might be the result of
>>complexity, privilege, exposure, ...  Whatever the reason, it's
>>disingenuous to sweep it under the rug ("all our code is good, so we ship
>>it all turned on") rather than select safe defaults and let people turn on
>>what they need.
>>
>
>This somewhat drops us into the "What is UNIX?" argument.  I
>don't think you want to go there.
>
>
>>>Application state is not necessary for incoming connections which are
>>>self-identified by source and destination IP and port;  the existing
>>>stateless firewall code can handle them completely, without introducing
>>>problems.
>>>
>>X arguments that disable the X11 protocol over TCP will work regardless of
>>the configured TCP port for XFree86.  Firewall rules won't.  Also,
>>firewall rules may interfere with other applications, where X11
>>configuration won't.  Both have their place.
>>
>
>I can run sendmail on another port as well.  At some point, you
>have to accept that there are Schelling points where policy and
>implementation can rendesvous.  It's not reasonable to argue that
>an external mechanism is unusable because someone *might* start
>X11 with a different port.  They *might* start it with the argument
>that reenables TCP.  The coupling argument you are making here is
>specious: the default model for firewall protection is "disable
>everything by default, and enable only that which is explicitly
>permitted".
>
>The point is that there is already a model for TCP service protection,
>and adding another frob on the side of each server for it really
>obfuscates the application of a uniform model to the problem.
>
>If we grant for a moment your argment "complexity := vulnerability",
>then this increase of complexity is a problem, isn't it?
>
>
>>>Actually, it would be more useful to concentrate on so-called "stealth
>>>firewall" technology, so that OS identification due to port scans, etc.,
>>>is impossible, and so it looks as if there is no machine there
>>>whatsoever, if there are no services actively listening AND access is
>>>permitted to the source machine.
>>>
>>No doubt an interesting area to explore.
>>
>
>Mostly, it boils down to dropping packets instead of sending RSTs
>or ACKs.
>
>-- Terry
>
>To Unsubscribe: send mail to majordomo@FreeBSD.org
>with "unsubscribe freebsd-hackers" in the body of the message
>
>




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3CC680C6.2020608>