At 11/9/2001 11:27 AM -0500, you wrote:
> > >
> > > By some sources, over 80% of attacks, thefts, sabotages, etc. are 
> internal.
> > >
>I'm a statistician by training and my education says that most such
>statistics are BULL!  Actually they are quite meaningless as a
>generalization.

Mark Twain said: "There are three kinds of lies: lies, damned lies, and 
statistics."

I won't go into the obvious implications for statisticians <grin>, but I do 
feel that YMMV can be taken a little too far, and in fact used to 
manipulate the truth. Secondly, you should be careful to question or 
understand someone well before judging their statements. Thirdly, I don't 
give a damn what your education says; I will, however, respect *your* 
opinion despite finding it not-fully-thought-out.

Note that I included "attacks, thefts, sabotages, etc." implying that I was 
lumping a great deal of problems into a single category. I stand by that 
statement (despite my academic training in finance, statistics, and 
mathematical probability modeling).

Example 1: Often customer lists are stolen by an employee leaving for 
another company, along with price lists, costing information, and other 
valuable information. Direct damage? None. Indirect damage? Immense. 
Solvable by ssh? No. Internal attack/theft/etc.? Hell yes.

Example 2: When everyone has access to files, and one blithering idiot 
clicks on a virus which infects the entire company and brings down the 
server, a great deal of money can be lost. Solvable by ssh? No. Internally 
caused? Yes.

I'm not going to bother going on, but I'll also note that many exploits can 
only be used by people who already have local access, who then get elevated 
privileges. Victims of social engineering, people who share passwords with 
family so they get free Internet access at home, there are thousands of 
ways in which internal factors cause loss, damage, destruction, or denial 
of service. There are not that many ways in which outsiders can do this, 
although there are more of them trying.

Result? Studies by PwC, KPMG, McKinsey, Accenture (née Andersen 
Consulting), and many many others hold that the "large majority" (there, 
you happier?) of damage and losses is caused by internal factors.

>E.g. if the local environment is such that everyone has read access to
>each others' files anyway, then password stealing locally is probably not
>going to be attributed a high probability, but even in that environment,
>external threats will be regarded as being much more likely and the
>effects much more damaging.

Really? The value of that information and how it could be sold, stolen, 
altered, erased (erroneously or otherwise) seems to have escaped you. 
Anytime you have a difference between the perception of value between two 
people for the same factor, the potential for misconduct rises.

I've seen small businesses crumble when the secretary sold confidential 
information to someone else. Read your Shakespeare: you are always most 
vulnerable to those nearest you.

> > > By my own consulting practices, a *huge* percentage of problems are
> > > internally-caused.
> > >
>Maybe so, in the type of environments you consult in!

Kindly present a scenario we can discuss in which internal factors should 
be disregarded as a potential source of problems or loss.

>And in those environments, where the company's secrets are all online
>and industrial espionage might have enormous consequences, it might pay
>to be careful, even approaching paranoia.

Paranoia is the unjustified belief that someone is "out to get you." In 
today's world, with Nimda and Code Red and crackers galore and script 
kiddies at 3-for-a-dollar and virii and industrial espionage and 
God-knows-what-else... in that world, anyone with any real secrets can be 
SURE that someone, somewhere, wants to break into their systems and 
damage/steal their data for some reason.

>However, in the majority of environments that I install, local problems
>are of almost no consequence.

Really? Again, I'd be happy to discuss specifics. Your cases, your 
examples. I'll show you that locals can and do cause problems, even if 
unwittingly. Come on... you never had an idiot do "format c:/" before?

>   As I said, YMMV.

Within reason, yes.

>In my opinion, we should try to use ssh whenever possible.  We can
>take to carrying a floppy with putty on it, for example, so that
>if we get caught at a PC without an ssh client, we can still use
>ssh.

Agreed.

>   However, if it is not possible at that moment, then, instead of
>letting it keep work from being done, we might be able to proceed with
>the telnet or ftp and then we should be responsible for changing
>the password as soon as possible (using a secure connection of course).

1. I've seen machines hacked within 10 minutes of being put online.

2. All my machines with SSH also run Webmin, so I can get to them and run 
my ssh session from any computer, anywhere on Earth, having just a browser. 
*Those* come standard out of the box pretty much anywhere.

>Or, like I said, in some local environments, you might not have to care.

Sooner or later you will have to care. I've also seen small networks 
(including mine, several times) in which someone installed a password 
sniffer (twice external, three times internal) but where the constant use 
of ssh, ssh tunnels for ftp, sftp, and rsync over ssh prevented the bastard 
from getting any more information. One machine hacked, 9 servers intact.

>If you anticipate having to use ftp on an open wire, why not first set
>your password to something you might not mind being captured! :-)

I mind anything being captured. Someone can install a keypress monitor on 
my account in seconds, then when I change the password he still has the new 
one. What's your point?

>Then, change it as soon as possible after using it.

You keep saying "as soon as possible". What (in seconds, minutes, hours, or 
days) do you consider an acceptable period of time?

>Then, you have minimized the exposure.

No. Minimizing is reducing to a minimum (pardon the obviousness). You have 
rendered your account totally vulnerable for only a short period of time, 
which is less dangerous than leaving it open for more time. But minimized 
exposure? Not even close.

>Because it is NOT THERE OUT OF THE BOX on most of the desktop boxen out
>there (from Mr. Bill and Co.).

See my note on Webmin above. I've created at least four different solutions 
for customers to get secure access to boxen without resorting to telnet; 
you just need to be a little more creative.

> > > Heck, on my internal network SSH is much *easier*. I set up the right 
> keys,
> > > and now I type one password when logging in then get access to 
> everything,
> > > properly authenticated, transparently.
>
>Yes, you're lucky.

Ah, a statistician who believes in luck?

>But do you have a mixture of Win95, Win98, NT, Macintosh, and
>Linux boxes on your LAN?  I often do.  I have not found it easier
>in that case.

You have not thought about it enough. So far, Webmin is my favorite way 
around this problem, and I've used it on Win9x, NT/2K, Mac, Linux, Solaris, 
and OS/2. No need to control any box but the one to which I want access, no 
need for anything on the client other than a browser.

>Yes, but why stand on your head if you don't have to?

My point is that, in this case, it is my professional judgment that you 
have to. If you're an airport manager this month, why increase the hassle 
for passengers if you don't have to? Because your perception is that the 
risk justifies the precautions. Same reasoning exactly.

>If telnet is there
>out of the box, but ssh is not, then it might amount to standing on your
>head to get ssh there if all you needed was to quickly check on something
>that was time crucial.  Way the risks against the rewards.

Nothing is so "time crucial" that it justifies my risking the total loss of 
a server or network for a minimum of four hours of downtime while I do a 
full format, reinstall, and restore in the unlikely case it's hacked. 
<weighing...> Nope, not worth it.

The case you're presenting shows carelessness and ill-preparedness on the 
part of the network administrator, forcing him/her to accept 
hugely-increased risks to correct a situation not properly planned for.

>And it might be appropriate where you work.

It's appropriate in my *house*, where my sister once visited and infected 
my wife's computer with some virus from some stupid email, which then 
ripped my network to shreds and trashed my (then) Windows server, 
formatting the entire box.

I am not today aware of any environment where I wouldn't take the time and 
effort to set it up right the first time.

>However, my observation of 25 years in the IT support business leaves me
>with the feeling that policies are often crafted by...

Idiots, definitely. Often, at least. But still, you'll find that even 
non-fascist, non-condescending, non-lazy admins guard information very 
tightly, as they are responsible for the safety and integrity of a company 
asset that only becomes more valuable with time.

Still, you should be ashamed of yourself, criticizing generalizations and 
then using such statements to argue your point. It's even worse when you 
recognize you're doing it!

>Now, maybe there are environments where a high degree of paranoia is
>appropriate and maybe from experience in that environment, users can NOT
>be trusted for some things,

Extreme example: my neighbor's wife cannot be trusted with any of his 
financial information. Why? She clicks on email attachments. There is a 
computer in the house from which she can see anything she likes, so secrecy 
and human trust are not the issue. But *her* computer is forbidden to have 
anything on it. Fascist, untrusting, lazy? No, careful and considering the 
local environment.

>I also think it's important to help users be as productive as possible, and
>delaying work until putty or something is installed is not always the most
>productive approach.

When is it that workers *need* a shell in which to do work, but they find 
themselves in an environment where no secure shell is available? I find 
this scenario downright unrealistic.

Jerry, I understand what you're saying... I just really think you need to 
put more time and thought into this. The risks today--at home, at work, at 
school--are high enough that telnet has ceased to be a viable option for 
the real world, IMHO. Should you choose to disagree, fine. But the 
arguments you have presented here are insufficient to make a case for 
telnet being OK, even in a "closed" environment.


--
Rodolfo J. Paiz
[EMAIL PROTECTED]



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to