Interesting reading

Andre Kesteloot andre.kesteloot@ieee.org
Fri, 15 Jun 2001 11:12:48 -0400


Hello Tacoistas,
An exerpt from an interesting Cryto-Gram
Andre'
***********************************

CRYPTO-GRAM, June 15, 2001
Date: 
Fri, 15 Jun 2001 00:56:08 -0500
From: 
Bruce Schneier <schneier@counterpane.com>
To: 
crypto-gram@chaparraltree.com




                  CRYPTO-GRAM

                 June 15, 2001

               by Bruce Schneier
                Founder and CTO
       Counterpane Internet Security, Inc.
            schneier@counterpane.com
          <http://www.counterpane.com>


A free monthly newsletter providing summaries, analyses, insights, and 
commentaries on computer security and cryptography.

Back issues are available at 
<http://www.counterpane.com/crypto-gram.html>.  To subscribe or 
unsubscribe, see below.


Copyright (c) 2001 by Counterpane Internet Security, Inc.


** *** ***** ******* *********** *************



** *** ***** ******* *********** *************

       Honeypots and the Honeynet Project



In warfare, information is power.  The better you understand your enemy, 
the more able you are to defeat him.  In the war against malicious
hackers, 
network intruders, and the other black-hat denizens of cyberspace, the
good 
guys have suprisingly little information.  Most security professionals, 
even those designing security products, are ignorant of the tools,
tactics, 
and motivations of the enemy.  And this state of affairs is to the
enemy's 
advantage.

The Honeynet Project was initiated to shine a light into this 
darkness.  This team of researchers has built an entire computer network 
and completely wired it with sensors.  Then it put the network up on the 
Internet, giving it a suitably enticing name and content, and recorded
what 
happened.  (The actual IP address is not published, and changes 
regularly.)  Hackers' actions are recorded as they happen: how they try
to 
break in, when they are successful, what they do when they succeed.

The results are fascinating.  A random computer on the Internet is
scanned 
dozens of times a day.  The life expectancy of a default installation of 
Red Hat 6.2 server, or the time before someone successfully hacks it, is 
less than 72 hours.  A common home user setup, with Windows 98 and file 
sharing enabled, was hacked five times in four days.  Systems are
subjected 
to NetBIOS scans an average of 17 times a day.  And the fastest time for
a 
server being hacked: 15 minutes after plugging it into the network.

The moral of all of this is that there are a staggering number of people 
out there trying to break into *your* computer network, every day of the 
year, and that they succeed surprisingly often.  It's a hostile jungle
out 
there, and network administrators that don't take drastic measures to 
protect themselves are toast.

The Honeynet Project is more than a decoy network of computers; it is an 
ongoing research project into the modus operandi of predatory hackers. 
The 
project currently has about half a dozen honeynets in operation.  Want
to 
try this in your own network?  Several companies sell commercial
versions, 
much simpler, of what the Honeynet Project is doing.  Called
"honeypots," 
they are designed to be installed on an organization's network as a 
decoy.  In theory, hackers find the honeypot and waste their time with
it, 
leaving the real network alone.

I am not sold on this as a commercial product.  Honeynets and honeypots 
need to be tended; they're not the kind of product you can expect to
work 
out of the box.  Commercial honeypots only mimic an operating system or 
computer network; they're hard to install correctly and much easier to 
detect than the Honeynet Project's creations.  And what's the point? 
You'd 
be smarter to monitor activity on your real network and leave off the 
honeypot.  If you're interested in learning about hackers and how they 
work, by all means purchase a honeypot and take the time to use it 
properly.  But if you're just interested in protecting your own network, 
you'd be better off spending the time on other things.

The Honeynet Project, on the other hand, is pure research.  And I am a 
major fan.  The stuff they produce is invaluable, and there's no other 
practical way to get it.  When an airplane falls out of the sky,
everyone 
knows about it.  There is a very public investigation, and any airline 
manufacturer can visit the National Traffic Safety Board and read the 
multi-hundred-page reports on all recent airline crashes.  And any
airline 
can use that information to design better aircraft.  When a network is 
hacked, it almost always remains a secret.  More often than not, the
victim 
has no idea he's been hacked.  If he does know, there is enormous market 
pressure on him not to go public with the fact.  And if he does go
public, 
he almost never releases detailed information about how the hack
happened 
and what the results were.

This paucity of real information makes it much harder to design good 
security products.  The Honeynet Project team is working to change
that.  I 
urge everyone involved in computer security to visit their Web site. 
Great 
stuff, and it's all real.

<http://project.honeynet.org>

The "Know Your Enemy" series of essays:
<http://project.honeynet.org/papers/>

Articles:
<http://www.zdnet.com/zdnn/stories/news/0,4586,2666273,00.html>
<http://news.cnet.com/news/0-1014-201-5784065-0.html>
<http://www.linuxsecurity.com/feature_stories/feature_story-84.html>
<http://www.computerworld.com/rckey73/story/0,1199,NAV63_STO59072,00.html>