RFC 2196 (Site Security Handbook) Annotated With ISO 27001 References and Other Updates
RFC 2196 (Site Security Handbook) Annotated With ISO 27001 References and Other Updates
RFC 2196 (Site Security Handbook) Annotated With ISO 27001 References and Other Updates
B. Fraser
Editor
SEI/CMU
September 1997
Table of Contents
1.
1.1
1.2
1.3
1.4
1.5
1.6
2.
2.1
2.2
2.3
3.
3.1
3.2
3.3
4.
4.1
4.2
4.3
Introduction....................................................
Purpose of this Work............................................
Audience........................................................
Definitions.....................................................
Related Work....................................................
Basic Approach..................................................
Risk Assessment.................................................
Security Policies...............................................
What is a Security Policy and Why Have One?.....................
What Makes a Good Security Policy?..............................
Keeping the Policy Flexible.....................................
Architecture....................................................
Objectives......................................................
Network and Service Configuration...............................
Firewalls.......................................................
Security Services and Procedures................................
Authentication..................................................
Confidentiality.................................................
Integrity.......................................................
Fraser, Ed.
Informational
2
3
3
3
4
4
5
6
6
9
11
11
11
14
20
24
24
28
28
[Page 1]
RFC 2196
4.4
4.5
4.6
4.7
5.
5.1
5.2
5.3
5.4
5.5
5.6
6.
7.
8.
9.
1.
September 1997
Authorization...................................................
Access..........................................................
Auditing........................................................
Securing Backups................................................
Security Incident Handling......................................
Preparing and Planning for Incident Handling....................
Notification and Points of Contact..............................
Identifying an Incident.........................................
Handling an Incident............................................
Aftermath of an Incident........................................
Responsibilities................................................
Ongoing Activities..............................................
Tools and Locations.............................................
Mailing Lists and Other Resources...............................
References......................................................
29
30
34
37
37
39
42
50
52
58
59
60
60
62
64
Introduction
This document provides guidance to system and network administrators
on how to address security issues within the Internet community. It
builds on the foundation provided in RFC 1244 and is the collective
work of a number of contributing authors. Those authors include:
Jules P. Aronson ([email protected]), Nevil Brownlee
([email protected]), Frank Byrum ([email protected]),
Joao Nuno Ferreira ([email protected]), Barbara Fraser
([email protected]), Steve Glass ([email protected]), Erik Guttman
([email protected]), Tom Killalea ([email protected]), KlausPeter Kossakowski ([email protected]), Lorna Leone
([email protected]), Edward.P.Lewis
([email protected]), Gary Malkin ([email protected]),
Russ Mundy ([email protected]), Philip J. Nesser
([email protected]), and Michael S. Ramsey
([email protected]).
In addition to the principle writers, a number of reviewers provided
valuable comments. Those reviewers include: Eric Luiijf
([email protected]), Marijke Kaat ([email protected]), Ray Plzak
([email protected]) and Han Pronk ([email protected]).
A special thank you goes to Joyce Reynolds, ISI, and Paul Holbrook,
CICnet, for their vision, leadership, and effort in the creation of
the first version of this handbook. It is the working groups sincere
hope that this version will be as helpful to the community as the
earlier one was.
Fraser, Ed.
Informational
[Page 2]
RFC 2196
1.1
September 1997
1.2
Audience
The audience for this document are system and network administrators,
and decision makers (typically "middle management") at sites. For
brevity, we will use the term "administrator" throughout this
document to refer to system and network administrators.
This document is not directed at programmers or those trying to
create secure programs or systems. The focus of this document is on
the policies and procedures that need to be in place to support the
technical security features that a site may be implementing.
The primary audience for this work are sites that are members of the
Internet community. However, this document should be useful to any
site that allows communication with other sites. As a general guide
to security policies, this document may also be useful to sites with
isolated systems.
1.3
Definitions
For the purposes of this guide, a "site" is any organization that
owns computers or network-related resources. These resources may
include host computers that users use, routers, terminal servers, PCs
or other devices that have access to the Internet. A site may be an
end user of Internet services or a service provider such as a midlevel network. However, most of the focus of this guide is on those
end users of Internet services. We assume that the site has the
ability to set policies and procedures for itself with the
concurrence and support from those who actually own the resources. It
will be assumed that sites that are parts of larger organizations
will know when they need to consult, collaborate, or take
recommendations from, the larger entity.
Fraser, Ed.
Informational
[Page 3]
RFC 2196
September 1997
Related Work
The Site Security Handbook Working Group is working on a Users Guide
to Internet Security. It will provide practical guidance to end users
to help them protect their information and the resources they use.
1.5
Basic Approach
This guide is written to provide basic guidance in developing a
security plan for your site. One generally accepted approach to
follow is suggested by Fites, et. al. [Fites 1989] and includes the
following steps:
(1)
(2)
(3)
(4)
(5)
Most of this document is focused on item 4 above, but the other steps
cannot be avoided if an effective plan is to be established at your
site. One old truism in security is that the cost of protecting
yourself against a threat should be less than the cost of recovering
if the threat were to strike you. Cost in this context should be
remembered to include losses expressed in real currency, reputation,
trustworthiness, and other less obvious measures. Without reasonable
knowledge of what you are protecting and what the likely threats are,
following this rule could be difficult.
Fraser, Ed.
Informational
[Page 4]
RFC 2196
1.6
September 1997
Risk Assessment
1.6.1
General Discussion
One step in a risk analysis is to identify all the things that need
to be protected. Some things are obvious, like valuable proprietary
information, intellectual property, and all the various pieces of
hardware; but, some are overlooked, such as the people who actually
use the systems. The essential point is to list all things that could
be affected by a security problem.
One list of categories is suggested by Pfleeger [Pfleeger 1989]; this
list is adapted from that source:
(1)
Fraser, Ed.
Informational
[Page 5]
RFC 2196
September 1997
(2)
(3)
(4)
(5)
(6)
1.6.3
Security Policies
Throughout this document there will be many references to policies.
Often these references will include recommendations for specific
policies. Rather than repeat guidance in how to create and
communicate such a policy, the reader should apply the advice
presented in this chapter when developing any policy recommended
later in this book.
2.1
Fraser, Ed.
Informational
[Page 6]
RFC 2196
September 1997
For example, your goals will probably be very different from the
goals of a product vendor. Vendors are trying to make configuration
and operation of their products as simple as possible, which implies
that the default configurations will often be as open (i.e.,
insecure) as possible. While this does make it easier to install new
products, it also leaves access to those systems, and other systems
through them, open to any user who wanders by.
Your goals will be largely determined by the following key tradeoffs:
(1)
services offered versus security provided Each service offered to users carries its own security risks.
For some services the risk outweighs the benefit of the service
and the administrator may choose to eliminate the service rather
than try to secure it.
(2)
ease of use versus security The easiest system to use would allow access to any user and
require no passwords; that is, there would be no security.
Requiring passwords makes the system a little less convenient,
but more secure. Requiring device-generated one-time passwords
makes the system even more difficult to use, but much more
secure.
(3)
cost of security versus risk of loss There are many different costs to security: monetary (i.e., the
cost of purchasing security hardware and software like firewalls
and one-time password generators), performance (i.e., encryption
and decryption take time), and ease of use (as mentioned above).
There are also many levels of risk: loss of privacy (i.e., the
reading of information by unauthorized individuals), loss of
data (i.e., the corruption or erasure of information), and the
loss of service (e.g., the filling of data storage space, usage
of computational resources, and denial of network access). Each
type of cost must be weighed against each type of loss.
Fraser, Ed.
Informational
[Page 7]
RFC 2196
2.1.2
September 1997
(4)
(5)
(6)
(7)
Fraser, Ed.
Informational
[Page 8]
RFC 2196
September 1997
(2)
(3)
(2)
(3)
(4)
An Accountability
users, operations
audit capability,
(i.e., what to do
detected).
Fraser, Ed.
Informational
[Page 9]
RFC 2196
September 1997
(5)
(6)
(7)
(8)
(9)
Fraser, Ed.
Informational
[Page 10]
RFC 2196
2.3
September 1997
3.
3.1
Architecture
Objectives
3.1.1
Fraser, Ed.
Informational
[Page 11]
RFC 2196
September 1997
The plan should also address how incident will be handled. Chapter 5
provides an in-depth discussion of this topic, but it is important
for each site to define classes of incidents and corresponding
responses. For example, sites with firewalls should set a threshold
on the number of attempts made to foil the firewall before triggering
a response? Escallation levels should be defined for both attacks
and responses. Sites without firewalls will have to determine if a
single attempt to connect to a host constitutes an incident? What
about a systematic scan of systems?
For sites connected to the Internet, the rampant media magnification
of Internet related security incidents can overshadow a (potentially)
more serious internal security problem. Likewise, companies who have
never been connected to the Internet may have strong, well defined,
internal policies but fail to adequately address an external
connection policy.
3.1.2
Separation of Services
There are many services which a site may wish to provide for its
users, some of which may be external. There are a variety of
security reasons to attempt to isolate services onto dedicated host
computers. There are also performance reasons in most cases, but a
detailed discussion is beyond to scope of this document.
The services which a site may provide will, in most cases, have
different levels of access needs and models of trust. Services which
are essential to the security or smooth operation of a site would be
better off being placed on a dedicated machine with very limited
access (see Section 3.1.3 "deny all" model), rather than on a machine
that provides a service (or services) which has traditionally been
less secure, or requires greater accessability by users who may
accidentally suborn security.
It is also important to distinguish between hosts which operate
within different models of trust (e.g., all the hosts inside of a
firewall and any host on an exposed network).
Some of the services which should be examined for potential
separation are outlined in section 3.2.3. It is important to remember
that security is only as strong as the weakest link in the chain.
Several of the most publicized penetrations in recent years have been
through the exploitation of vulnerabilities in electronic mail
systems. The intruders were not trying to steal electronic mail, but
they used the vulnerability in that service to gain access to other
systems.
Fraser, Ed.
Informational
[Page 12]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 13]
RFC 2196
3.1.4
September 1997
3.2.1
Fraser, Ed.
Informational
[Page 14]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 15]
RFC 2196
September 1997
There are many types of services and each has its own security
requirements. These requirements will vary based on the intended use
of the service. For example, a service which should only be usable
within a site (e.g., NFS) may require different protection mechanisms
than a service provided for external use. It may be sufficient to
protect the internal server from external access. However, a WWW
server, which provides a home page intended for viewing by users
anywhere on the Internet, requires built-in protection. That is, the
service/protocol/server must provide whatever security may be
required to prevent unauthorized access and modification of the Web
database.
Internal services (i.e., services meant to be used only by users
within a site) and external services (i.e., services deliberately
made available to users outside a site) will, in general, have
protection requirements which differ as previously described. It is
therefore wise to isolate the internal services to one set of server
host computers and the external services to another set of server
host computers. That is, internal and external servers should not be
co-located on the same host computer. In fact, many sites go so far
Fraser, Ed.
Informational
[Page 16]
RFC 2196
September 1997
as to have one set of subnets (or even different networks) which are
accessible from the outside and another set which may be accessed
only within the site. Of course, there is usually a firewall which
connects these partitions. Great care must be taken to ensure that
such a firewall is operating properly.
There is increasing interest in using intranets to connect different
parts of a organization (e.g., divisions of a company). While this
document generally differentiates between external and internal
(public and private), sites using intranets should be aware that they
will need to consider three separations and take appropriate actions
when designing and offering services. A service offered to an
intranet would be neither public, nor as completely private as a
service to a single organizational subunit. Therefore, the service
would need its own supporting system, separated from both external
and internal services and networks.
One form of external service deserves some special consideration, and
that is anonymous, or guest, access. This may be either anonymous
FTP or guest (unauthenticated) login. It is extremely important to
ensure that anonymous FTP servers and guest login userids are
carefully isolated from any hosts and file systems from which outside
users should be kept. Another area to which special attention must
be paid concerns anonymous, writable access. A site may be legally
responsible for the content of publicly available information, so
careful monitoring of the information deposited by anonymous users is
advised.
Now we shall consider some of the most popular services: name
service, password/key service, authentication/proxy service,
electronic mail, WWW, file transfer, and NFS. Since these are the
most frequently used services, they are the most obvious points of
attack. Also, a successful attack on one of these services can
produce disaster all out of proportion to the innocence of the basic
service.
3.2.3.1
The Internet uses the Domain Name System (DNS) to perform address
resolution for host and network names. The Network Information
Service (NIS) and NIS+ are not used on the global Internet, but are
subject to the same risks as a DNS server. Name-to-address
resolution is critical to the secure operation of any network. An
attacker who can successfully control or impersonate a DNS server can
re-route traffic to subvert security protections. For example,
routine traffic can be diverted to a compromised system to be
monitored; or, users can be tricked into providing authentication
secrets. An organization should create well known, protected sites
Fraser, Ed.
Informational
[Page 17]
RFC 2196
September 1997
to act as secondary name servers and protect their DNS masters from
denial of service attacks using filtering routers.
Traditionally, DNS has had no security capabilities. In particular,
the information returned from a query could not be checked for
modification or verified that it had come from the name server in
question. Work has been done to incorporate digital signatures into
the protocol which, when deployed, will allow the integrity of the
information to be cryptographically verified (see RFC 2065).
3.2.3.2
Electronic Mail
Electronic mail (email) systems have long been a source for intruder
break-ins because email protocols are among the oldest and most
widely deployed services. Also, by its very nature, an email server
requires access to the outside world; most email servers accept input
from any source. An email server generally consists of two parts: a
receiving/sending agent and a processing agent. Since email is
delivered to all users, and is usually private, the processing agent
typically requires system (root) privileges to deliver the mail.
Most email implementations perform both portions of the service,
which means the receiving agent also has system privileges. This
opens several security holes which this document will not describe.
There are some implementations available which allow a separation of
Fraser, Ed.
Informational
[Page 18]
RFC 2196
September 1997
FTP and TFTP both allow users to receive and send electronic files in
a point-to-point manner. However, FTP requires authentication while
TFTP requires none. For this reason, TFTP should be avoided as much
as possible.
Improperly configured FTP servers can allow intruders to copy,
replace and delete files at will, anywhere on a host, so it is very
important to configure this service correctly.
Access to encrypted
passwords and proprietary data, and the introduction of Trojan horses
are just a few of the potential security holes that can occur when
the service is configured incorrectly. FTP servers should reside on
their own host. Some sites choose to co-locate FTP with a Web
server, since the two protocols share common security considerations
However, the the practice isnt recommended, especially when the FTP
service allows the deposit of files (see section on WWW above). As
mentioned in the opening paragraphs of section 3.2.3, services
offered internally to your site should not be co-located with
services offered externally. Each should have its own host.
Fraser, Ed.
Informational
[Page 19]
RFC 2196
September 1997
TFTP does not support the same range of functions as FTP, and has no
security whatsoever. This service should only be considered for
internal use, and then it should be configured in a restricted way so
that the server only has access to a set of predetermined files
(instead of every world-readable file on the system). Probably the
most common usage of TFTP is for downloading router configuration
files to a router. TFTP should reside on its own host, and should
not be installed on hosts supporting external FTP or Web access.
3.2.3.7
NFS
The Network File Service allows hosts to share common disks. NFS is
frequently used by diskless hosts who depend on a disk server for all
of their storage needs. Unfortunately, NFS has no built-in security.
It is therefore necessary that the NFS server be accessable only by
those hosts which are using it for service. This is achieved by
specifying which hosts the file system is being exported to and in
what manner (e.g., read-only, read-write, etc.). Filesystems should
not be exported to any hosts outside the local network since this
will require that the NFS service be accessible externally. Ideally,
external access to NFS service should be stopped by a firewall.
3.2.4
Firewalls
One of the most widely deployed and publicized security measures in
use on the Internet is a "firewall." Firewalls have been given the
reputation of a general panacea for many, if not all, of the Internet
security issues. They are not. Firewalls are just another tool in
the quest for system security. They provide a certain level of
protection and are, in general, a way of implementing security policy
at the network level. The level of security that a firewall provides
can vary as much as the level of security on a particular machine.
There are the traditional trade-offs between security, ease of use,
cost, complexity, etc.
Fraser, Ed.
Informational
[Page 20]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 21]
RFC 2196
September 1997
filters for inbound and outbound packets on each interface (if the
router filters only outbound packets then the router is "outside" of
its filters and may be more vulnerable to attack). In addition to
the router being vulnerable, this distinction between applying
filters on inbound or outbound packets is especially relevant for
routers with more than 2 interfaces. Other important issues are the
ability to create filters based on IP header options and the fragment
state of a packet. Building a good filter can be very difficult and
requires a good understanding of the type of services (protocols)
that will be filtered.
For better security, the filters usually restrict access between the
two connected nets to just one host, the bastion host. It is only
possible to access the other network via this bastion host. As only
this host, rather than a few hundred hosts, can get attacked, it is
easier to maintain a certain level of security because only this host
has to be protected very carefully. To make resources available to
legitimate users across this firewall, services have to be forwarded
by the bastion host. Some servers have forwarding built in (like
DNS-servers or SMTP-servers), for other services (e.g., Telnet, FTP,
etc.), proxy servers can be used to allow access to the resources
across the firewall in a secure way.
A proxy server is way to concentrate application services through a
single machine. There is typically a single machine (the bastion
host) that acts as a proxy server for a variety of protocols (Telnet,
SMTP, FTP, HTTP, etc.) but there can be individual host computers for
each service. Instead of connecting directly to an external server,
the client connects to the proxy server which in turn initiates a
connection to the requested external server. Depending on the type
of proxy server used, it is possible to configure internal clients to
perform this redirection automatically, without knowledge to the
user, others might require that the user connect directly to the
proxy server and then initiate the connection through a specified
format.
There are significant security benefits which can be derived from
using proxy servers. It is possible to add access control lists to
protocols, requiring users or systems to provide some level of
authentication before access is granted. Smarter proxy servers,
sometimes called Application Layer Gateways (ALGs), can be written
which understand specific protocols and can be configured to block
only subsections of the protocol. For example, an ALG for FTP can
tell the difference between the "put" command and the "get" command;
an organization may wish to allow users to "get" files from the
Internet, but not be able to "put" internal files on a remote server.
By contrast, a filtering router could either block all FTP access, or
none, but not a subset.
Fraser, Ed.
Informational
[Page 22]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 23]
RFC 2196
September 1997
4.1
Authentication
For many years, the prescribed method for authenticating users has
been through the use of standard, reusable passwords. Originally,
these passwords were used by users at terminals to authenticate
themselves to a central computer. At the time, there were no
networks (internally or externally), so the risk of disclosure of the
clear text password was minimal. Today, systems are connected
together through local networks, and these local networks are further
connected together and to the Internet. Users are logging in from
all over the globe; their reusable passwords are often transmitted
across those same networks in clear text, ripe for anyone in-between
to capture. And indeed, the CERT* Coordination Center and other
response teams are seeing a tremendous number of incidents involving
packet sniffers which are capturing the clear text passwords.
With the advent of newer technologies like one-time passwords (e.g.,
S/Key), PGP, and token-based authentication devices, people are using
password-like strings as secret tokens and pins. If these secret
tokens and pins are not properly selected and protected, the
authentication will be easily subverted.
Fraser, Ed.
Informational
[Page 24]
RFC 2196
4.1.1
September 1997
One-Time passwords
Kerberos
Fraser, Ed.
Informational
[Page 25]
RFC 2196
4.1.3
September 1997
Password Assurance
Fraser, Ed.
Informational
[Page 26]
RFC 2196
September 1997
(2)
(3)
(4)
(5)
Fraser, Ed.
Informational
[Page 27]
RFC 2196
September 1997
4.2
Confidentiality
There will be information assets that your site will want to protect
from disclosure to unauthorized entities. Operating systems often
have built-in file protection mechanisms that allow an administrator
to control who on the system can access, or "see," the contents of a
given file. A stronger way to provide confidentiality is through
encryption. Encryption is accomplished by scrambling data so that it
is very difficult and time consuming for anyone other than the
authorized recipients or owners to obtain the plain text. Authorized
recipients and the owner of the information will possess the
corresponding decryption keys that allow them to easily unscramble
the text to a readable (clear text) form. We recommend that sites
use encryption to provide confidentiality and protect valuable
information.
The use of encryption is sometimes controlled by governmental and
site regulations, so we encourage administrators to become informed
of laws or policies that regulate its use before employing it. It is
outside the scope of this document to discuss the various algorithms
and programs available for this purpose, but we do caution against
the casual use of the UNIX crypt program as it has been found to be
easily broken. We also encourage everyone to take time to understand
the strength of the encryption in any given algorithm/product before
using it. Most well-known products are well-documented in the
literature, so this should be a fairly easy task.
4.3
Integrity
As an administrator, you will want to make sure that information
(e.g., operating system files, company data, etc.) has not been
altered in an unauthorized fashion. This means you will want to
provide some assurance as to the integrity of the information on your
Fraser, Ed.
Informational
[Page 28]
RFC 2196
September 1997
Authorization
Authorization refers to the process of granting privileges to
processes and, ultimately, users. This differs from authentication
in that authentication is the process used to identify a user. Once
identified (reliably), the privileges, rights, property, and
permissible actions of the user are determined by authorization.
Explicitly listing the authorized activities of each user (and user
process) with respect to all resources (objects) is impossible in a
reasonable system. In a real system certain techniques are used to
simplify the process of granting and checking authorization(s).
One approach, popularized in UNIX systems, is to assign to each
object three classes of user: owner, group and world. The owner is
either the creator of the object or the user assigned as owner by the
super-user. The owner permissions (read, write and execute) apply
only to the owner. A group is a collection of users which share
access rights to an object. The group permissions (read, write and
execute) apply to all users in the group (except the owner). The
world refers to everybody else with access to the system. The world
permissions (read, write and execute) apply to all users (except the
owner and members of the group).
Another approach is to attach to an object a list which explicitly
contains the identity of all permitted users (or groups). This is an
Access Control List (ACL). The advantage of ACLs are that they are
Fraser, Ed.
Informational
[Page 29]
RFC 2196
September 1997
easily maintained (one central list per object) and its very easy to
visually check who has access to what. The disadvantages are the
extra resources required to store such lists, as well as the vast
number of such lists required for large systems.
4.5
Access
4.5.1
Physical Access
Fraser, Ed.
Informational
[Page 30]
RFC 2196
September 1997
Technologies considered here include X.25, ISDN, SMDS, DDS and Frame
Relay. All are provided via physical links which go through
telephone exchanges, providing the potential for them to be diverted.
Crackers are certainly interested in telephone switches as well as in
data networks!
With switched technologies, use Permanent Virtual Circuits or Closed
User Groups whenever this is possible. Technologies which provide
authentication and/or encryption (such as IPv6) are evolving rapidly;
consider using them on links where security is important.
4.5.4
4.5.4.1
Modems
Modem Lines Must Be Managed
Although they provide convenient access to a site for its users, they
can also provide an effective detour around the sites firewalls.
For this reason it is essential to maintain proper control of modems.
Dont allow users to install a modem line without proper
authorization. This includes temporary installations (e.g., plugging
a modem into a facsimile or telephone line overnight).
Fraser, Ed.
Informational
[Page 31]
RFC 2196
September 1997
Maintain a register of all your modem lines and keep your register up
to date. Conduct regular (ideally automated) site checks for
unauthorized modems.
4.5.4.2
Call-back Capability
Some dial-in servers offer call-back facilities (i.e., the user dials
in and is authenticated, then the system disconnects the call and
calls back on a specified number). Call-back is useful since if
someone were to guess a username and password, they are disconnected,
and the system then calls back the actual user whose password was
cracked; random calls from a server are suspicious, at best. This
does mean users may only log in from one location (where the server
is configured to dial them back), and of course there may be phone
charges associated with there call-back location.
This feature should be used with caution; it can easily be bypassed.
At a minimum, make sure that the return call is never made from the
same modem as the incoming one. Overall, although call-back can
improve modem security, you should not depend on it alone.
4.5.4.4
Fraser, Ed.
Informational
[Page 32]
RFC 2196
September 1997
Dial-out Authentication
Fraser, Ed.
Informational
[Page 33]
RFC 2196
4.5.4.7
September 1997
Auditing
This section covers the procedures for collecting data generated by
network activity, which may be useful in analyzing the security of a
network and responding to security incidents.
4.6.1
What to Collect
Fraser, Ed.
Informational
creates an
should be
either, as
character or
[Page 34]
RFC 2196
4.6.2
September 1997
Collection Process
Fraser, Ed.
Informational
[Page 35]
RFC 2196
September 1997
Collection Load
Audit data should be some of the most carefully secured data at the
site and in the backups. If an intruder were to gain access to audit
logs, the systems themselves, in addition to the data, would be at
risk.
Audit data may also become key to the investigation, apprehension,
and prosecution of the perpetrator of an incident. For this reason,
it is advisable to seek the advice of legal council when deciding how
audit data should be treated. This should happen before an incident
occurs.
If a data
incident,
an event,
treatment
4.6.5
Legal Considerations
Fraser, Ed.
Informational
[Page 36]
RFC 2196
September 1997
Securing Backups
The procedure of creating backups is a classic part of operating a
computer system. Within the context of this document, backups are
addressed as part of the overall security plan of a site. There are
several aspects to backups that are important within this context:
(1)
(2)
(3)
(4)
(5)
5.
Fraser, Ed.
Informational
[Page 37]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 38]
RFC 2196
September 1997
(3)
(4)
(5)
(6)
The remainder of this chapter will detail the issues involved in each
of the important topics listed above, and provide some guidance as to
what should be included in a site policy for handling incidents.
5.1
Fraser, Ed.
Informational
[Page 39]
RFC 2196
September 1997
(2)
Fraser, Ed.
Informational
[Page 40]
RFC 2196
September 1997
(4)
(5)
Fraser, Ed.
Informational
[Page 41]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 42]
RFC 2196
5.2.1
September 1997
Fraser, Ed.
Informational
[Page 43]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 44]
RFC 2196
September 1997
(1)
(2)
(3)
(4)
Fraser, Ed.
Informational
[Page 45]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 46]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 47]
RFC 2196
September 1997
Internal Communications
Fraser, Ed.
Informational
[Page 48]
RFC 2196
September 1997
One of the most important issues to consider is when, who, and how
much to release to the general public through the press. There are
many issues to consider when deciding this particular issue. First
and foremost, if a public relations office exists for the site, it is
important to use this office as liaison to the press. The public
relations office is trained in the type and wording of information
released, and will help to assure that the image of the site is
protected during and after the incident (if possible). A public
relations office has the advantage that you can communicate candidly
with them, and provide a buffer between the constant press attention
and the need of the POC to maintain control over the incident.
If a public relations office is not available, the information
released to the press must be carefully considered. If the
information is sensitive, it may be advantageous to provide only
minimal or overview information to the press. It is quite possible
that any information provided to the press will be quickly reviewed
by the perpetrator of the incident. Also note that misleading the
press can often backfire and cause more damage than releasing
sensitive information.
While it is difficult to determine in advance what level of detail to
provide to the press, some guidelines to keep in mind are:
(1)
(2)
(3)
(4)
(5)
Fraser, Ed.
Informational
[Page 49]
RFC 2196
5.3
September 1997
Identifying an Incident
5.3.1
Is It Real?
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
System crashes.
New user accounts (the account RUMPLESTILTSKIN has been
unexpectedly created), or high activity on a previously
low usage account.
New files (usually with novel or strange file names,
such as data.xx or k or .xx ).
Accounting discrepancies (in a UNIX system you might
notice the shrinking of an accounting file called
/usr/admin/lastlog, something that should make you very
suspicious that there may be an intruder).
Changes in file lengths or dates (a user should be
suspicious if .EXE files in an MS DOS computer have
unexplainedly grown by over 1800 bytes).
Attempts to write to system (a system manager notices
that a privileged user in a VMS system is attempting to
alter RIGHTSLIST.DAT).
Data modification or deletion (files start to disappear).
Denial of service (a system manager and all other users
become locked out of a UNIX system, now in single user mode).
Unexplained, poor system performance
Anomalies ("GOTCHA" is displayed on the console or there
are frequent unexplained "beeps").
Suspicious probes (there are numerous unsuccessful login
attempts from another node).
Fraser, Ed.
Informational
[Page 50]
RFC 2196
(12)
(13)
September 1997
The analysis of the damage and extent of the incident can be quite
time consuming, but should lead to some insight into the nature of
the incident, and aid investigation and prosecution. As soon as the
breach has occurred, the entire system and all of its components
should be considered suspect. System software is the most probable
target. Preparation is key to be able to detect all changes for a
possibly tainted system. This includes checksumming all media from
the vendor using a algorithm which is resistant to tampering. (See
sections 4.3)
Assuming original vendor distribution media are available, an
analysis of all system files should commence, and any irregularities
should be noted and referred to all parties involved in handling the
incident. It can be very difficult, in some cases, to decide which
Fraser, Ed.
Informational
[Page 51]
RFC 2196
September 1997
Handling an Incident
Certain steps are necessary to take during the handling of an
incident. In all security related activities, the most important
point to be made is that all sites should have policies in place.
Without defined policies and goals, activities undertaken will remain
without focus. The goals should be defined by management and legal
counsel in advance.
One of the most fundamental objectives is to restore control of the
affected systems and to limit the impact and damage. In the worst
case scenario, shutting down the system, or disconnecting the system
from the network, may the only practical solution.
As the activities involved are complex, try to get as much help as
necessary. While trying to solve the problem alone, real damage
might occur due to delays or missing information. Most
administrators take the discovery of an intruder as a personal
challenge. By proceeding this way, other objectives as outlined in
the local policies may not always be considered. Trying to catch
intruders may be a very low priority, compared to system integrity,
for example. Monitoring a hackers activity is useful, but it might
not be considered worth the risk to allow the continued access.
5.4.1
Fraser, Ed.
Informational
[Page 52]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 53]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 54]
RFC 2196
September 1997
(2)
(3)
Containment
Fraser, Ed.
Informational
[Page 55]
RFC 2196
September 1997
Eradication
Fraser, Ed.
Informational
[Page 56]
RFC 2196
September 1997
Recovery
Once the cause of an incident has been eradicated, the recovery phase
defines the next stage of action. The goal of recovery is to return
the system to normal. In general, bringing up services in the order
of demand to allow a minimum of user inconvenience is the best
practice. Understand that the proper recovery procedures for the
system are extremely important and should be specific to the site.
5.4.6
Follow-Up
Once you believe that a system has been restored to a "safe" state,
it is still possible that holes, and even traps, could be lurking in
the system. One of the most important stages of responding to
incidents is also the most often omitted, the follow-up stage. In
the follow-up stage, the system should be monitored for items that
may have been missed during the cleanup stage. It would be prudent
to utilize some of the tools mentioned in chapter 7 as a start.
Remember, these tools dont replace continual system monitoring and
good systems administration practices.
The most important element of the follow-up stage is performing a
postmortem analysis. Exactly what happened, and at what times? How
well did the staff involved with the incident perform? What kind of
information did the staff need quickly, and how could they have
gotten that information as soon as possible? What would the staff do
differently next time?
After an incident, it is prudent to write a report describing the
exact sequence of events: the method of discovery, correction
procedure, monitoring procedure, and a summary of lesson learned.
This will aid in the clear understanding of the problem. Creating a
formal chronology of events (including time stamps) is also important
for legal reasons.
Fraser, Ed.
Informational
[Page 57]
RFC 2196
September 1997
Aftermath of an Incident
In the wake of an incident, several actions should take place.
actions can be summarized as follows:
(1)
(2)
(3)
(4)
These
Fraser, Ed.
Informational
[Page 58]
RFC 2196
5.6
September 1997
Responsibilities
5.6.1
During a security incident there are two choices one can make.
First, a site can choose to watch the intruder in the hopes of
catching him; or, the site can go about cleaning up after the
incident and shut the intruder out of the systems. This is a
decision that must be made very thoughtfully, as there may be legal
liabilities if you choose to leave your site open, knowing that an
intruder is using your site as a launching pad to reach out to other
sites. Being a good Internet citizen means that you should try to
alert other sites that may have been impacted by the intruder. These
affected sites may be readily apparent after a thorough review of
your log files.
5.6.3
Fraser, Ed.
Informational
[Page 59]
RFC 2196
September 1997
Ongoing Activities
At this point in time, your site has hopefully developed a complete
security policy and has developed procedures to assist in the
configuration and management of your technology in support of those
policies. How nice it would be if you could sit back and relax at
this point and know that you were finished with the job of security.
Unfortunately, that isnt possible. Your systems and networks are
not a static environment, so you will need to review policies and
procedures on a regular basis. There are a number of steps you can
take to help you keep up with the changes around you so that you can
initiate corresponding actions to address those changes. The
following is a starter set and you may add others as appropriate for
your site.
7.
(1)
(2)
(3)
(4)
(5)
(6)
Fraser, Ed.
Informational
[Page 60]
RFC 2196
September 1997
Some of the tools listed are applications such as end user programs
(clients) and their supporting system infrastructure (servers).
Others are tools that a general user will never see or need to use,
but may be used by applications, or by administrators to troubleshoot
security problems or to guard against intruders.
A sad fact is that there are very few security conscious applications
currently available. Primarily, this is caused by the need for a
security infrastructure which must first be put into place for most
applications to operate securely. There is considerable effort
currently taking place to build this infrastructure so that
applications can take advantage of secure communications.
Most of the tools and applications described below can be found in
one of the following archive sites:
(1)
(2)
(3)
It is important to note that many sites, including CERT and COAST are
mirrored throughout the Internet. Be careful to use a "well known"
mirror site to retrieve software, and to use verification tools (md5
checksums, etc.) to validate that software. A clever cracker might
advertise security software that has intentionally been designed to
provide access to data or systems.
Tools
COPS
DES
Drawbridge
identd (not really a security tool)
ISS
Kerberos
logdaemon
lsof
MD5
PEM
PGP
rpcbind/portmapper replacement
SATAN
sfingerd
S/KEY
smrsh
Fraser, Ed.
Informational
[Page 61]
RFC 2196
September 1997
ssh
swatch
TCP-Wrapper
tiger
Tripwire*
TROJAN.PL
8.
CERT(TM) Advisory
Send mail to: [email protected]
Message Body: subscribe cert <FIRST NAME> <LAST NAME>
A CERT advisory provides information on how to obtain a patch or
details of a workaround for a known computer security problem.
The CERT Coordination Center works with vendors to produce a
workaround or a patch for a problem, and does not publish
vulnerability information until a workaround or a patch is
available. A CERT advisory may also be a warning to our
constituency about ongoing attacks (e.g.,
"CA-91:18.Active.Internet.tftp.Attacks").
VIRUS-L List
Send mail to:
Message Body:
listserv%[email protected]
subscribe virus-L FIRSTNAME LASTNAME
Fraser, Ed.
Informational
[Page 62]
RFC 2196
(3)
September 1997
Internet Firewalls
Send mail to: [email protected]
Message Body: subscribe firewalls user@host
The Firewalls mailing list is a discussion forum for
firewall administrators and implementors.
USENET newsgroups
(1)
comp.security.announce
The comp.security.announce newsgroup is moderated
and is used solely for the distribution of CERT
advisories.
(2)
comp.security.misc
The comp.security.misc is a forum for the
discussion of computer security, especially as it
relates to the UNIX(r) Operating System.
(3)
alt.security
The alt.security newsgroup is also a forum for the
discussion of computer security, as well as other
issues such as car locks and alarm systems.
(4)
comp.virus
The comp.virus newsgroup is a moderated newsgroup
with a focus on computer virus issues. For more
information, including a copy of the posting
guidelines, see the file "virus-l.README",
available via anonymous FTP on info.cert.org
in the /pub/virus-l directory.
(5)
comp.risks
The comp.risks newsgroup is a moderated forum on
the risks to the public in computers and related
systems.
http://www.first.org/
Computer Security Resource Clearinghouse. The main focus is on
crisis response information; information on computer
security-related threats, vulnerabilities, and solutions. At the
same time, the Clearinghouse strives to be a general index to
computer security information on a broad variety of subjects,
including general risks, privacy, legal issues, viruses,
assurance, policy, and training.
Fraser, Ed.
Informational
[Page 63]
RFC 2196
(2)
September 1997
http://www.telstra.com.au/info/security.html
This Reference Index contains a list of links to information
sources on Network and Computer Security. There is no implied
fitness to the Tools, Techniques and Documents contained within this
archive. Many if not all of these items work well, but we do
not guarantee that this will be so. This information is for the
education and legitimate use of computer security techniques only.
(3)
http://www.alw.nih.gov/Security/security.html
This page features general information about computer security.
Information is organized by source and each section is organized
by topic. Recent modifications are noted in Whats New page.
(4)
http://csrc.ncsl.nist.gov
This archive at the National Institute of Standards and Technologys
Computer Security Resource Clearinghouse page contains a number of
announcements, programs, and documents related to computer security.
* CERT and Tripwire are registered in the U.S. Patent and Trademark Office
9.
References
The following references may not be available in all countries.
[Appelman, et. al., 1995] Appelman, Heller, Ehrman, White, and
McAuliffe, "The Law and The Internet", USENIX 1995 Technical
Conference on UNIX and Advanced Computing, New Orleans, LA, January
16-20, 1995.
[ABA, 1989] American Bar Association, Section of Science and
Technology, "Guide to the Prosecution of Telecommunication Fraud by
the Use of Computer Crime Statutes", American Bar Association, 1989.
[Aucoin, 1989] R. Aucoin, "Computer Viruses: Checklist for Recovery",
Computers in Libraries, Vol. 9, No. 2, Pg. 4, February 1989.
[Barrett, 1996] D. Barrett, "Bandits on the Information
Superhighway", OReilly & Associates, Sebastopol, CA, 1996.
[Bates, 1992] R. Bates, "Disaster Recovery Planning: Networks,
Telecommunications and Data Communications", McGraw-Hill, 1992.
[Bellovin, 1989] S. Bellovin, "Security Problems in the TCP/IP
Protocol Suite", Computer Communication Review, Vol 19, 2, pp. 32-48,
April 1989.
Fraser, Ed.
Informational
[Page 64]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 65]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 66]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 67]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 68]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 69]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 70]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 71]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 72]
RFC 2196
September 1997
[Ranum and Avolio, 1994] M. Ranum and F. Avolio, "A Toolkit and
Methods for Internet Firewalls", Trustest Information Systems, 1994.
[Reinhardt, 1992] R. Reinhardt, "An Architectural Overview of UNIX
Network Security"
[Reinhardt, 1993] R. Reinhardt, "An Architectural Overview of UNIX
Network Security", ARINC Research Corporation, February 18, 1993.
[Reynolds-RFC1135, 1989] The Helminthiasis of the Internet, RFC 1135,
USC/Information Sciences Institute, Marina del Rey, CA, December
1989.
[Russell and Gangemi, 1991] D. Russell and G. Gangemi, "Computer
Security Basics" OReilly & Associates, Sebastopol, CA, 1991.
[Schneier 1996] B. Schneier, "Applied Cryptography: Protocols,
Algorithms, and Source Code in C", John Wiley & Sons, New York,
second edition, 1996.
[Seeley, 1989] D. Seeley, "A Tour of the Worm", Proceedings of 1989
Winter USENIX Conference, Usenix Association, San Diego, CA, February
1989.
[Shaw, 1986] E. Shaw Jr., "Computer Fraud and Abuse Act of 1986",
Congressional Record (3 June 1986), Washington, D.C., 3 June 1986.
[Shimomura, 1996] T. Shimomura with J. Markoff, "Takedown:The Pursuit
and Capture of Kevin Mitnick, Americas Most Wanted Computer Outlawby the Man Who Did It", Hyperion, 1996.
[Shirey, 1990] R. Shirey, "Defense Data Network Security
Architecture", Computer Communication Review, Vol. 20, No. 2, Page
66, 1 April 1990.
[Slatalla and Quittner, 1995] M. Slatalla and J. Quittner, "Masters
of Deception: The Gang that Ruled Cyberspace", Harper Collins
Publishers, 1995.
[Smith, 1989] M. Smith, "Commonsense Computer Security: Your
Practical Guide to Preventing Accidental and Deliberate Electronic
Data Loss", McGraw-Hill, New York, NY, 1989.
[Smith, 1995] D. Smith, "Forming an Incident Response Team", Sixth
Annual Computer Security Incident Handling Workshop, Boston, MA, July
25-29, 1995.
Fraser, Ed.
Informational
[Page 73]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 74]
RFC 2196
September 1997
Fraser, Ed.
Informational
[Page 75]