Full Disclosure mailing list archives

Re: Sony: No firewall and no patches


From: "Thor (Hammer of God)" <thor () hammerofgod com>
Date: Tue, 10 May 2011 23:51:51 +0000

I'll reply in kind combining threads, but sans insulting statements like "in the face of incomprehension."  You make 
grand assumptions about what you can do, and what is "trivial" as if you think all vulnerabilities automatically give 
you administrative access or something.   You thinking that just because you owned my web server, it is "trivial" to 
bypass outbound rule enforcement - this is not only assumptive, but incorrect.   Most attacks or breached do not, in 
fact, result in that level of access.  

You apparently live and work in a world of absolutes where you assume you can send traffic to my web server and just 
alter the response as you see fit.  You've also apparently had a *very* different incident response history than I 
have.   But, at Arbor, I would also expect that you in a world very different than most and interact with a much 
different traffic model.  My experience is quite different, and I have personally seen too many instances to count 
where the use of firewalls has, without question, been what has saved a company.  But I'm glad it works for you, which 
is really what this conversation is about: what actually works for people. 

Feel free to argue all you wish about how firewalls are ineffective and a waste, but I have empirical evidence that 
shows otherwise.  I'm glad your ops experience serves you, but I would never count on ACLs alone to secure my 
infrastructure, particularly when it requires one to have wide open outbound ACLs.  And actually, I would do both (and 
normally do in production networks).  

So, to wrap up my input in this regard, people should use what works for them assuming they know what problems they are 
trying to solve and how they are solving them.   But just because people don't automatically embrace your opts 
processes doesn't mean we can't "comprehend" it.  It's really not rocket science you know...

-----Original Message-----
From: full-disclosure-bounces () lists grok org uk [mailto:full-disclosure-
bounces () lists grok org uk] On Behalf Of Dobbins, Roland
Sent: Tuesday, May 10, 2011 4:33 PM
To: full-disclosure () lists grok org uk
Subject: Re: [Full-disclosure] Sony: No firewall and no patches

On May 11, 2011, at 12:52 AM, Bruno Cesar Moreira de Souza wrote:

How would you block an ACK tunnel using only a packet filter?
(http://ntsecurity.nu/papers/acktunneling/) You don't need to stop the
httpd service to create this kind of tunnel, as the packets from the attacker
would just be ignored by the httpd service, but could be intercepted by the
malicious code executed on the compromised server (using the same
approach employed by network sniffers).

See my previous response to Thor.  I don't intend to keep this thread going
forever in the face of incomprehension, but this focus on corner-case
exfiltration techniques which are easily obviated by OS and service/app BCPs
and appropriate monitoring, to the point of instantiating unnecessary and
harmful state in front of servers which makes it trivial to take them down,
demonstrates that in general, the infosec community pretty much
completely ignores the availability leg of the confidentiality-integrity-
availability triad.

Which is disappointing, given that availability is in fact the most important leg
of that triad.

But, I guess if availability is nil, one has achieved perfect confidentiality and
integrity, since the applications and services and data are completely
inaccessible, so perhaps that's a big win for confidentiality and integrity, after
all.

;>

-----------------------------------------------------------------------
Roland Dobbins <rdobbins () arbor net> //
<http://www.arbornetworks.com>

              The basis of optimism is sheer terror.

                        -- Oscar Wilde

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: