81 slides 40 Years of Internet Arms Races… Bill Cheswick [email protected] .

79
81 slides 40 Years of Internet Arms Races… Bill Cheswick [email protected] http://www.lumeta.com

Transcript of 81 slides 40 Years of Internet Arms Races… Bill Cheswick [email protected] .

Page 1: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

40 Years of Internet Arms Races…

Bill Cheswick

[email protected]

http://www.lumeta.com

Page 2: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Thinking about security…

Page 3: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

3 of 8140 Years of Internet Arms Races

Talk outline

• Intro

• Some thoughts on thinking bad thoughts

• Various races

• Predictions– You got that with the 40 years, right?

• Wishes–My dad’s computer, and Windows OK–Windows SP2

Page 4: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

4 of 8140 Years of Internet Arms Races

Since some of you asked…

• Chief Scientist at Lumeta, a Bell Labs spin-off– Founded in 2000. 45 people in the

company

• We map large corporate and government networks, and find leaks in the network perimeter

• I am still figuring out what a chief scientist does

• Second edition of the firewalls book came out last year: Cheswick, Bellovin, Rubin

Page 5: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

5 of 8140 Years of Internet Arms Races

Page 6: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

6 of 8140 Years of Internet Arms Races

Before the whining and predicting, something useful

• Lost friends web page

• Cheap research web pages

• Please give me feedback if I get something wrong– I do get out much from my little Internet

startup (Lumeta)– You folks keep me honest.

Page 7: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Security People are Paid to Think Bad

Thoughts

-Bob Morris

Page 8: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Fred Cohen and me

Page 9: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

9 of 8140 Years of Internet Arms Races

What do you do with bad thoughts?

• The world is full of threats

• One can get a bit pessimistic

• CIA asked a number of us for some of our bad thoughts

• Watch your ethics! Are you battling the forces of darkness?

Page 10: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

10 of 8140 Years of Internet Arms Races

Questions about an evil idea

• Has it already been done? How would you detect it?

• If not, why hasn’t it happened yet?

• What are the strategic preparations needed?

• What are the tactical preparations needed just before the attack?

• Can we detect strategic preparations?

• Can we detect tactical preparations?

Page 11: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

11 of 8140 Years of Internet Arms Races

Minor example: Internet mapping

Page 12: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

12 of 8140 Years of Internet Arms Races

Minor example: Internet Mapping Project

• Hal Burch and me, since 1998

• AUCERT has corresponded (complained) to us a number of times

• Basic technology: 250,000 traceroutes/day

• Question: who else is doing this?

Page 13: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

13 of 8140 Years of Internet Arms Races

10:45:42 udp 5 uma1.co.umatilla.or.us11:28:12 udp 1 64.d9b7d1.client.atlantech.net10:57:05 udp 43101:24@0+ omval.tednet.nl10:57:05 udp 43101:1456@24+ omval.tednet.nl10:57:05 udp 43101:625@1480 omval.tednet.nl11:30:59 udp 7 ns1.yamato.ibm.com

Page 14: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

14 of 8140 Years of Internet Arms Races

Minor example: Internet Mapping Project

• Andrew Gross and rstatd

Page 15: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

15 of 8140 Years of Internet Arms Races

Some thoughts on computing safety

• Morris worm at Bell Labs (1988)

• “Best block is not be there”– Karate Kid I

• “You got to get out of the game”– Fred Grampp

• I’ve never detected a virus or worm on one of my important systems.

Page 16: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

16 of 8140 Years of Internet Arms Races

Don’t let opposition practice on you during an arms race

• Dictionary attacks on passwords

• Crashme tests on programs, protocols, and operating systems–Weakness using COTS!

Page 17: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

17 of 8140 Years of Internet Arms Races

Page 18: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

18 of 8140 Years of Internet Arms Races

The Internet security arms race

• Defenders can control the battlefield

• An uneasy truce may be good enough, if the business case can make usable predictions

Page 19: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

19 of 8140 Years of Internet Arms Races

The Internet is a fine place to practice attacks

• Automated

• Anonymous

• Many “volunteers”

• Don’t give them a dictionary, “oracle”, or “cribs” to try automated attacks on

• Monoculture of software in hosts and routers

Page 20: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

20 of 8140 Years of Internet Arms Races

The Internet is a fine place to practice defenses

• MILnet has been under attack since the mid-1980s

• That makes the threats much clearer

• It gives the defenders a chance to get good at their job

Page 21: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Arms Races:Eavesdropping

Page 22: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

22 of 8140 Years of Internet Arms Races

Arms race:Eavesdropping

• Ethernet, ftp, and telnet were poor starts

• WEP, POP3, IMAP, AIM added to the confusion– POP3 passwords are the most common I

sniff over the air at conferences like this

• Crypto wars of the mid-1990s tied our hands

• This race should be over, victory to the defenders

Page 23: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

23 of 8140 Years of Internet Arms Races

Eavesdropping victories

• SSL ends direct credit card sniffing

• Ssh lets me access secure machines from anywhere

• IP/SEC is a bit of a pain to deploy, but that should get better– VPN products are very useful

• CPUs have plenty of spare power now.

• Check your work with dsniff

Page 24: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

24 of 8140 Years of Internet Arms Races

Eavesdropping problems

• Casual web access and DNS queries still mostly in the clear.

• Most ISPs still offer or insist on POP3 and IMAP, not SSL versions of these

• Widespread use of client certificates could limit access to these possibly dangerous network services

Page 25: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

25 of 8140 Years of Internet Arms Races

Eavesdropping arms races

• Attack patterns vs. snort

• Tcpdump/libpcap vs. killer packets

Page 26: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Arms Race: Battle for control of the

computer and data

Page 27: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

27 of 8140 Years of Internet Arms Races

The battle for control of the computer

• Who owns the software in your computer? Who should be allowed to add and run programs?– Microsoft has assumed this since DOS

• Viruses and worms

• Pop-overs and pop-unders

• Spyware

• Automatic update systems

• Same battle over data in computers controlling your car– Thermostat? Front door lock? Toaster?

Page 28: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

28 of 8140 Years of Internet Arms Races

Goals for this extraware

• Zombie nets to assist with malfeasance, including forwarding of spam

• Collect marketing data

• Display advertisements

• Enforce licensing restrictions

Page 29: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

29 of 8140 Years of Internet Arms Races

Solution: operating system only executes known programs

• Virus problem goes away

• Unix/Linux systems mostly do this already

• OS updates and auxiliary program installs a problem

• This feature not available on Microsoft operating systems (see below)

Page 30: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

30 of 8140 Years of Internet Arms Races

Extraware problems

• Some business practices assume this ability is available

• Some web page writers assume that I am willing to use possibly dangerous features in my browser (or a particular browser)

Page 31: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

31 of 8140 Years of Internet Arms Races

Virus arms race

• Early on, detectors used viral signatures

• Virus encryption and recompilation (!) has thwarted this

• Virus detectors now simulate the code, looking for signature actions

• Virus writers now detect emulation and behave differently

• Virus emulators are slowing down, even with Moore’s Law.

Page 32: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

32 of 8140 Years of Internet Arms Races

Virus arms race

• I suspect that virus writers are going to win the detection battle, if they haven’t already– Emulation may become too slow– Even though we have the home-field advantage– Will we know if an undetectable virus is released?

• Best defense is to get out of the game.– Don’t run portable programs, or– Improve our sandbox technology

• People who really care about this worry about Ken Thompson’s attack– Read and understand “On Trusting Trust”

Page 33: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

33 of 8140 Years of Internet Arms Races

The emulation arms race

• Vmware versus the real thing– 4tphi

• Honeypots vs. bulkers– http://www.sendsafe.com/honeypot-hunter

.php

Page 34: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Arms Race:Authentication and

identification

Page 35: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

35 of 8140 Years of Internet Arms Races

Password cracking

• Works 3% to 60% of the time using offline dictionary attacks–More, if the hashing is misdesigned

• This will never get better, so…

• We have to get out of the game

Page 36: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

36 of 8140 Years of Internet Arms Races

Passwords sniffed at this conference

Page 37: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

37 of 8140 Years of Internet Arms Races

Authentication/Identification Arms races

• Password/PIN selection vs. cracking

• Human-chosen passwords and PINs can be ok if guessing is limited, and obvious choices are suppressed

• Password cracking is getting better, thanks to Moore’s Law and perhaps even botnets

Page 38: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

38 of 8140 Years of Internet Arms Races

Colossus(ver 2.0)

TonySale

Page 39: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

39 of 8140 Years of Internet Arms Races

We don’t know how to leave the user in charge of security decisions, safely.

Page 40: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

40 of 8140 Years of Internet Arms Races

Authentication solutions:two factor authentication

• In my laptop: ssh key unlocked by long passphrase

• Better: USB “key” unlocked by PIN. Five bad PINS, and it is gone.–We already carry a bunch of keys, so why

not one more

Page 41: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

41 of 8140 Years of Internet Arms Races

Hardware tokens

• These need to be open source drivable, and cheap

• The business model has never been one for global adoption

• Challenge/response form factor is the safest, but not acceptable if humans are in the loop

Page 42: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

42 of 8140 Years of Internet Arms Races

Authentication arms race:predictions

• We’ve already won this, from a business model standpoint–Web SSL plus password is good enough

for banking

• USA needs two factor authentication for social security number. (Something better than MMN or birth date.)

• I don’t see this improving much, but a global USB dongle would do it

• Don’t wait for world-wide PKI.

Page 43: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Arms race (sort of):destructible hardware

Page 44: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

44 of 8140 Years of Internet Arms Races

Arms race (sort of)hardware destruction

• IBM monochrome monitor

• Some more recent monitors– Current ones?

• Hard drives? Beat the heads up?

• EEPROM write limits– Viral attack on .cn and .kr PC

motherboards–Other equipment

• Anything that requires a hardware on-site service call

Page 45: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

45 of 8140 Years of Internet Arms Races

Arms race (sort of)hardware destruction

• Rendering the firmware useless– This can be fixed (mostly) with a secure

trusted computing base.

Page 46: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

46 of 8140 Years of Internet Arms Races

Software upgrade race: literally a race

• Patches are analyzed to determine the weakness

• Patch-to-exploit time is now down below 10 hours– NB: spammers have incentive to do this

work

• Now the good guys are trying to obfuscate code!

• Future difficult to say: dark side obscures everything.

Page 47: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

47 of 8140 Years of Internet Arms Races

Arms Races:firewalls

• IP blocking

• Ip aware (stateful)–More dangerous– Permits firewalking

• Ultimately, firewalls are a hack, and should go away

Page 48: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Arms Races:deception

Page 49: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

49 of 8140 Years of Internet Arms Races

West coralSnake

Scarlet king snake

Page 50: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

(the west coral snake is venomous)

Page 51: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

51 of 8140 Years of Internet Arms Races

Arms Races: deception

• Jails– Cliff Stoll and SDInet

• Honeypots– Honeynet– honeyd

• The deception toolkit---Fred Cohen

Page 52: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

52 of 8140 Years of Internet Arms Races

Bulkers vs honeypots

• http://www.send-safe.com/honeypothunter.php

Page 53: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

53 of 8140 Years of Internet Arms Races

User education vs. user deception

• We will continue losing this one

• Even experts sometimes don’t understand the ramifications of choices they are offered

Page 54: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

54 of 8140 Years of Internet Arms Races

Historic Arms races

• SYN packet attacks

• TCP sequence number guessing

Page 55: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

My Dad’s computer

Skinny-dipping with Microsoft

Page 56: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

56 of 8140 Years of Internet Arms Races

Case study:My Dad’s computer

• Windows XP, plenty of horsepower, two screens

• Applications:– Email (Outlook)– “Bridge:” a fancy stock market monitoring

system– AIM

• Cable access, dynamic IP address, no NAT, no firewall, outdated virus software, no spyware checker

Page 57: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

57 of 8140 Years of Internet Arms Races

This computer was a software toxic waste dump

• It was burning a liter of oil every 500 km

• The popups seemed darned distracting to me

• But he thought it was fine–Got his work done– Didn’t want a system administrator to

break his user interface somehow

Page 58: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

A proposal:Windows OK

Page 59: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

59 of 8140 Years of Internet Arms Races

Windows OK

• Thin client implemented with Windows

• It would be fine for maybe half the Windows users– Students, consumers, many corporate

and government users

• It would be reasonable to skinny dip with this client–Without firewall or virus checking

software

Page 60: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

60 of 8140 Years of Internet Arms Races

Windows OK

• No network listeners– None of those services are needed, except

admin access for centrally-administered hosts

• Default security settings

• All security controls in one or two places

• Security settings can be locked

Page 61: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

61 of 8140 Years of Internet Arms Races

Windows OK (cont)

• There should be nothing you can click on, in email or a web page, that can hurt your computer– No portable programs are executed ever,

except…

• ActiveX from approved parties–MSFT and one or two others. List is

lockable

Page 62: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

62 of 8140 Years of Internet Arms Races

Windows OK

• Reduce privileges in servers and all programs

• Sandbox programs– Belt and suspenders

Page 63: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

63 of 8140 Years of Internet Arms Races

Office OK

• No macros in Word or PowerPoint. No executable code in PowerPoint files

• The only macros allowed in Excel perform arithmetic. They cannot create files, etc.

Page 64: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

64 of 8140 Years of Internet Arms Races

Vulnerabilities in OK

• Buffer overflows in processing of data (not from the network)

• Stop adding new features and focus on bug fixes

• Programmers can clean up bugs, if they don’t have a moving target– It converges, to some extent

Page 65: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

Microsoft client security

It has been getting worse: can they skinny-dip safely?

Page 66: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

66 of 8140 Years of Internet Arms Races

Windows MEActive Connections - Win ME

Proto Local Address Foreign Address State TCP 127.0.0.1:1032 0.0.0.0:0 LISTENING TCP 223.223.223.10:139 0.0.0.0:0 LISTENING UDP 0.0.0.0:1025 *:* UDP 0.0.0.0:1026 *:* UDP 0.0.0.0:31337 *:* UDP 0.0.0.0:162 *:* UDP 223.223.223.10:137 *:* UDP 223.223.223.10:138 *:*

Page 67: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

67 of 8140 Years of Internet Arms Races

Windows 2000

Proto Local Address Foreign Address State TCP 0.0.0.0:135 0.0.0.0:0 LISTENING TCP 0.0.0.0:445 0.0.0.0:0 LISTENING TCP 0.0.0.0:1029 0.0.0.0:0 LISTENING TCP 0.0.0.0:1036 0.0.0.0:0 LISTENING TCP 0.0.0.0:1078 0.0.0.0:0 LISTENING TCP 0.0.0.0:1080 0.0.0.0:0 LISTENING TCP 0.0.0.0:1086 0.0.0.0:0 LISTENING TCP 0.0.0.0:6515 0.0.0.0:0 LISTENING TCP 127.0.0.1:139 0.0.0.0:0 LISTENING UDP 0.0.0.0:445 *:* UDP 0.0.0.0:1038 *:* UDP 0.0.0.0:6514 *:* UDP 0.0.0.0:6515 *:* UDP 127.0.0.1:1108 *:* UDP 223.223.223.96:500 *:* UDP 223.223.223.96:4500 *:*

Page 68: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

68 of 8140 Years of Internet Arms Races

Windows XP, this laptop Proto Local Address Foreign Address State TCP ches-pc:epmap ches-pc:0 LISTENING TCP ches-pc:microsoft-ds ches-pc:0 LISTENING TCP ches-pc:1025 ches-pc:0 LISTENING TCP ches-pc:1036 ches-pc:0 LISTENING TCP ches-pc:3115 ches-pc:0 LISTENING TCP ches-pc:3118 ches-pc:0 LISTENING TCP ches-pc:3470 ches-pc:0 LISTENING TCP ches-pc:3477 ches-pc:0 LISTENING TCP ches-pc:5000 ches-pc:0 LISTENING TCP ches-pc:6515 ches-pc:0 LISTENING TCP ches-pc:netbios-ssn ches-pc:0 LISTENING TCP ches-pc:3001 ches-pc:0 LISTENING TCP ches-pc:3002 ches-pc:0 LISTENING TCP ches-pc:3003 ches-pc:0 LISTENING TCP ches-pc:5180 ches-pc:0 LISTENING UDP ches-pc:microsoft-ds *:* UDP ches-pc:isakmp *:* UDP ches-pc:1027 *:* UDP ches-pc:3008 *:* UDP ches-pc:3473 *:* UDP ches-pc:6514 *:* UDP ches-pc:6515 *:* UDP ches-pc:netbios-ns *:* UDP ches-pc:netbios-dgm *:* UDP ches-pc:1900 *:* UDP ches-pc:ntp *:* UDP ches-pc:1900 *:* UDP ches-pc:3471 *:*

Page 69: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

69 of 8140 Years of Internet Arms Races

FreeBSD partition, this laptop

Active Internet connections (including servers)Proto Recv-Q Send-Q Local Address Foreign Address (state)tcp4 0 0 *.22 *.* LISTENtcp6 0 0 *.22 *.* LISTEN

Page 70: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

XP SP2

Bill Gets It

Page 71: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

71 of 8140 Years of Internet Arms Races

Microsoft’s Augean Stables:a task for Hercules

• 3000 oxen, 30 years, that’s roughly one oxen-day per line of code in Windows

• It’s been getting worse since Windows 95

Page 72: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

72 of 8140 Years of Internet Arms Races

XP SP2: Bill gets it

• “a feature you don’t use should not be a security problem for you.”

• “Security by design”– Too late for that, its all retrofitting now

• “Security by default”– No network services on by default

• Security control panel– Many things missing from it– Speaker could not find ActiveX security settings

• There are a lot of details that remain to be seen.

Page 73: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

73 of 8140 Years of Internet Arms Races

Microsoft really means it about improving their security

• Their security commitment appears to be real

• It is a huge job

• Opposing forces are unclear to me

• It’s been a long time coming, and frustrating

Page 74: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

74 of 8140 Years of Internet Arms Races

Microsoft secure client arms race

• We are likely to win, but it is going to be a while

Page 75: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

75 of 8140 Years of Internet Arms Races

Ches’s wish list

• browsersandbox.org– Uses a .conf file, supplied with browser– Same .conf file for any major OS– Sandbox is impenetrable, no matter what

• I know people have offered solutions for ten years

• I need portability: Linux, FreeBSD, maybe even MSFT, which needs sand boxing in their OS.

Page 76: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

76 of 8140 Years of Internet Arms Races

Ches’s wish list(cont.)

• Self-jailing samba

• Self-jailing apache

Page 77: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

77 of 8140 Years of Internet Arms Races

Ches’s wish list(cont.)

• USB “key” for every computer

• No big investment for centralized servers

• Open source interface

• Business model: the dongle hardware, not the servers and software– Atalla had this in 1988!

• Different key for system administrator

• Software that doesn’t abuse admin permission– I.e. least privilege

Page 78: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

78 of 8140 Years of Internet Arms Races

Conclusions

• Computers are still like my Olds ’88

• They ought to stay that way, to foster creativity and alternatives

• I think we will be getting better, over all

Page 79: 81 slides 40 Years of Internet Arms Races… Bill Cheswick ches@lumeta.com .

81 slides

40 Years of Internet Arms Races

Bill Cheswick

[email protected]

http://www.lumeta.com