DataMuseum.dk

Presents historical artifacts from the history of:

DKUUG/EUUG Conference tapes

This is an automatic "excavation" of a thematic subset of
artifacts from Datamuseum.dk's BitArchive.

See our Wiki for more about DKUUG/EUUG Conference tapes

Excavated with: AutoArchaeologist - Free & Open Source Software.


top - metrics - download
Index: T c

⟦b4a06c4f9⟧ TextFile

    Length: 7526 (0x1d66)
    Types: TextFile
    Names: »conclusion.latex«

Derivation

└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
    └─⟦f36518b41⟧ »./worm/mit.tex.tar.z« 
        └─⟦87f8973c9⟧ 
            └─⟦this⟧ »conclusion.latex« 

TextFile

\section{Lessons and Open Issues}
\label{lessons}

The virus incident taught many important lessons.  It also
brought up many more difficult issues which need to be
addressed in the future
\ifieee
:
\else
.

\subsection{Lessons from the Community's Reactions}

The chronology of events is interesting.  The manner in which the
Internet community reacted to the virus attack points out areas of
concern or at least issues for future study.

\begin{itemize}
\item Connectivity was important.  Sites which disconnected from the network at
the first sign of trouble hurt themselves and the community.  Not only
could they not report their experiences and findings, but they
couldn't get timely bug fixes.  Furthermore, other sites using them as
mail relays were crippled, thus delaying delivery of important mail,
such as Andy Sudduth's Thursday morning posting, until after the
crisis had passed.  Sites like MIT and Berkeley were able to
collaborate in a meaningful manner because they never took themselves
off the network.

\item The ``old boy network'' worked.  People called and sent electronic mail 
to the people they knew and trusted and much good communication happened.
This can't be formalized but it did function quite well in the face of
the crisis.

\item Late night authentication is an interesting problem.  How did you know
that it really is MIT on the phone?  How did you know that Keith Bostic's
patch to \prog{sendmail} is really a fix and isn't introducing
a new problem?  Did Keith really send the fix or was it his evil twin,
Skippy?

\item Whom do you call?  If you need to talk to the manager of the Ohio
State University network at 3:00am whom do you call?  How many people can
find that information, and is the information up to date?

\item Speaker phones and conference calling proved very useful.  

\item How groups formed and who led them is a fascinating topic for future
study.  Don Alvarez of the MIT Center for Space Research presented his
observations on this at the NCSC meeting.

\item Misinformation and illusions ran rampant.  Mike Muuss categorized
several of these at the NCSC meeting.  Our spotting of a handshake
with \host{ernie} is but one example.  

\item Tools were not as important as one would have expectd.  Most of
decompiling work was done manually with no more tools than a disassembler
(\command{adb}) and an architecture manual.  Based
on its experience with PC viruses, the NCSC feels that more
sophisticated tools must be developed.  While this may be true for
future attacks, it was not the case for this attack.

\item Source availability was important.  All of the sites which responded 
quickly and made progress in truly understanding the virus had UNIX
source code.

\item The academic sites performed best.  Government and commercial
sites lagged behind places like Berkeley and MIT in figuring out what
was going on and creating solutions.

\item Managing the press was critical.  We were not distracted by the
press and were able to be quite productive.  The MIT News office did a
fine job keeping the press informed and out of the way.  Batching the
numerous requests into one press conference helped tremendously.  The
Berkeley group, among others, reported that it was difficult to get
work done with the press constantly hounding them.

\end{itemize}

\subsection{General Points for the Future}

More general issues have popped to the surface because of the virus.
These include the following:
\fi

\begin{itemize}

\item Least Privilege.  This basic security principle is frequently ignored 
and this can result in disaster.

\item ``We have met the enemy and he is us.''  The alleged author of the virus 
has made contributions to the computer security field and was by
any definition an insider; the attack did not come from an outside
source who obtained sensitive information, and restricting information
such as source code would not have helped prevent this incident.

\item Diversity is good.  Though the virus picked on the most widespread
operating system used on the Internet and on the two most popular
machine types, most of the machines on the network were never in
danger.  A wider variety of implementations is probably good, not bad.
There is a direct analogy with biological genetic diversity to be
made.

\item ``The cure shouldn't be worse than the disease.''  Chuck Cole made this 
point and Cliff Stoll also argued that it may be more expensive to
prevent such attacks than it is to clean up after them.  Backups are
good.  It may be cheaper to restore from backups than to try to figure
out what damage an attacker has done\cite{ncsc}.

\item Defenses {\it must} be at the host level, not the network level.  Mike
Muuss and Cliff Stoll have made this point quite eloquently\cite{ncsc}.  The
network performed its function perfectly and should not be faulted;
the tragic flaws were in several application programs.  Attempts to
fix the network are misguided.  
\ifnotieee
Jeff Schiller likes to use an analogy
with the highway system: 
\else
An analogy with the highway system can be made:
\fi
anybody can drive up to your house and
probably break into your home, but that does not mean we should
close down the roads or put armed guards on the exit ramps.

\item Logging information is important.  
The \prog{inetd} and \prog{telnetd} interaction logging the source of
virus attacks turned out to be a lucky break, but even so many sites
did not have enough logging information available to identify the
source or times of infection.  This greatly hindered the responses,
since people frequently had to install new programs which logged more
information.  On the other hand, logging information tends to
accumulate quickly and is rarely referenced.  Thus it is frequently
automatically purged.  If we log helpful information, but find it is
quickly purged, we have not improved the situtation much at all.  Mike
Muusspoints out that frequently one can retrieve such information from
backups\cite{ncsc}, but this is not always true.

\item Denial of service attacks are easy.  The Internet is amazingly
vulnerable to such attacks.  These attacks are quite difficult to
prevent, but we could be much better prepared to identify their sources
than we are today.  For example, currently it is not hard to
imagine writing a program or set of programs which crash two-thirds of
the existing Sun Workstations or other machines implementing Sun's
Network Filesystem (NFS).  This is serious since such machines are the
most common computers connected to the Internet.  Also, the total lack
of authentication and authorization for network level routing makes it
possible for an ordinary user to disrupt communications for a large
portion of the Internet.  Both tasks could be easily done in a manner
which makes tracking down the initiator extremely difficult, if not
impossible.

\item A central security fix repository may be a good idea.  Vendors {\it must}
participate.  End users, who likely only want to get their work
done, must be educated about the importance of installing security fixes.

\item Knee-jerk reactions should be avoided.  Openness and free flow of
information is the whole point of networking, and funding agencies
should not be encouraged to do anything damaging to this without very
careful consideration.  Network connectivity proved its worth as an
aid to collaboration by playing an invaluable role in the defense and
analysis efforts during the crisis, despite the sites which
isolated themselves.

\end{itemize}