Printer Friendly

Infosecurity Europe 2008: a selection of papers from exhibitors at Infosecurity Europe 2008, Europe's dedicated Information security event. Now in its 13th year, providing an education programme, new products & services, over 300 exhibitors and 11, 700 visitors from every segment of the industry. 22nd-24th April 2008 in the Grand Hall, Olympia: www.infosec.co.uk.

Why is LDAP Failing Audits?

For Unix/Linux shops, the security and compliance shortcomings of NIS and NIS+ have become evident in recent years. Lightweight Directory Access Protocol (LDAP) initially seemed a viable alternative that would also allow organizations to manage their Microsoft and Unix user populations in a standard way. So why are LDAP-based management systems now increasingly falling foul of auditors? And what can enterprises do to avoid this?

When it was first introduced, NIS provided a handy mechanism for centrally managing user and host information in large networks. However, the protocol lacks any inherent support for authentication and authorization, and it is difficult to produce audit trails keeping track of changes to user and host definitions across the system. With the advent of LDAP, many organizations saw the opportunity of consolidating user data for both Microsoft and Unix/Linux systems in one centralized directory. The problem is that organizations running LDAP are still failing security and compliance audits. LDAP simply does not per se include enough security features to satisfy auditors.

Unmanaged LDAP--that is, LDAP implemented as a core provisioning service within the enterprise, but without add-on functionality to secure and control its use--includes support for central controls on passwords, but without integrating security add-ons, LDAP password is the only authentication choice, unless users are allowed to set up their own authentication. In the latter case, a lack of centralized controls over authentication, for example being unable to prevent users from setting up SSH Public Key authentication with no password, can prove costly in audits.

Unmanaged LDAP does not provide enough fine-grained access controls to satisfy IT and compliance auditors. They want to know exactly who can access what resources, when. Unmanaged LDAP cannot control access for individual users or hosts, let alone at the service level.

Audit trails are another problem. Unmanaged LDAP provides no greater central auditing capabilities than NIS, and does not deliver the kind of documented output showing that provisioning and access policies are actually being enforced in the network that auditors require.

Finally, one of the biggest problems with relying on LDAP for network management is the issue of local functional accounts. When business critical applications require these local functional accounts to operate, application managers are rightly reluctant to hand over control of these accounts to external LDAP systems. However, not doing this leaves the enterprise with perhaps dozens of local accounts that are not under centralized control and not subject to policies. This leads to audit failures.

Given recent audit failures, more and more organizations are looking at strategies to manage LDAP across the different operating systems they use, releasing its potential as a provisioning and management tool while ensuring that it does not become a compliance liability.

One strategy on the table is to use Active Directory, Microsoft's implementation of LDAP, to manage all the resources in the network, both Microsoft and non-Microsoft. This category of solutions attempts to extend Active Directory authentication and Group policies to non-Microsoft resources including Unix and Linux systems.

While this approach leverages the investments many organizations have already made in Active Directory, solutions designed to graft Active Directory security models onto Unix and Linux environments typically control access on a host-by-host basis, and do not offer the granularity of managing access to individual Unix/Linux services. When it comes to the pressing problem of controlling the use of privileged accounts on Unix and Linux, a hot potato when it comes to audits, such solutions typically rely on variants of the freeware sudo utility, but do not include features like specific controls on su operations or keystroke logging.

Another approach to centralizing identity and access management in the enterprise is to find tools that will manage Unix and Linux systems with sufficient granularity to satisfy auditors and will at the same time integrate with managed LDAP systems, even allowing an LDAP system such as Active Directory to be used as the principal repository of identity data.

This strategy recognizes that specialized management systems are needed to control the specifics of the Unix and Linux environment. With a security model that differs from the Microsoft Active Directory Model, controlling Unix and Linux presents a different set of problems, including properly monitoring privileged accounts and the smooth deployment of secure protocols like SSH, to name but two. Such an approach will typically involve deploying a solution that can manage Unix/Linux authorization at the service level, not the host level, but can also securely integrate with LDAP directories to bring Unix and Linux into the enterprise's central provisioning and identity management system.

When it comes to auditing too, your audit output is only as detailed as the controls you have in place, so if you are controlling access at service level rather than host level, you have more detailed information to present to auditors. Similarly, robust controls on privileged account operations such as keystroke logging provide more evidence of accountability than using sudoers files to guarantee this vital element of Unix/Linux security.

This approach enables functional

accounts to be safely run in a local context meaning application managers can rest easy, but at the same time includes these local accounts in a centralized system of controls, subject to enterprise-wide policies, and centrally audited.

As industry searches for a new paradigm to manage mixed Microsoft and Unix/Linux environments, one thing is for sure: Unmanaged LDAP systems are failing audits, and it is imperative for companies to assess and determine what their strategy will be moving forward.

www.foxt.com

FoxT is exhibiting at Infosecurity Europe 2008.

Losing Control of Your Windows Network

Peter Wood, Chief of Operations, First Base Technologies I imagine that most people would consider the chances of an attacker guessing a privileged account name and password in two or three guesses to be astronomical. Unfortunately, nothing could be further from the truth. Breaking into corporate networks, and thereby corporate information, has never been easier. Why? Firstly, access to systems (usually Windows) at the desk-top is universal. Secondly, most people, including IT staff, don't appear to know how to select adequately secure passwords.

We have used the following technique for the past ten years, and it still gives us administrative control of a Windows network in at least fifty percent of cases. Imagine that you are a disgruntled employee or perhaps an intruder who has gained access to the building posing as a cleaner or a visitor. You will be able to gain complete control of the organisation's Windows network in less than 20 minutes if this works.

First you plug in a Windows laptop anywhere on the network--this can be in head office, at a branch office or store, anywhere in any trusted third-party premises or perhaps through a remote connection. You browse the net work using Windows Explorer and see all the Windows machines on the network--there's no need to logon or join a domain for this to happen (or of course you could be using a legitimate desktop or laptop machine if you are an employee or contractor).

Select a server (they're usually named in a obvious fashion) and attempt a "null session" connection--null sessions is a standard feature of NT & Windows 2000 which enables you to list users, groups, group memberships, etc. without any form of authentication whatsoever. There's plenty of free and licensed software on the Internet that will help you to establish a null session and then interrogate this information--my personal favourite is Hyena, a tool designed for managing Windows networks, but many miscreants will use free tools like SuperScan or Cain & Abel.

Next check the domain account lockout policy so you know how many password attempts you will be permitted in how long before the account is locked out (and a possible alert raised). Now list the users in the Administrators and Domain Admins groups and look for patterns, or rather exceptions to a pattern. Typically, organisations use formal naming conventions for user accounts, with combinations of surname and first name or initials such as WOODP.

Unfortunately, these are usually ignored where service accounts are concerned--service accounts are administrator-level accounts used to enable applications to log on to servers and domains (applications such as Backupexec, ArcServe and Tivoli are obvious examples). Select each of these service accounts in turn and try to guess its password--it's not as hard as you might think.

Frequently, network administrators will select something obvious, such as a password the same as the account name! Of course there are also long lists of default account names and passwords on the web which you can try. Beware that you don't exceed the account lockout threshold within the specified time period, otherwise even the most harassed admin may eventually guess something is up.

If these fail, try those accounts which look like shared administrator accounts or scripted accounts, such as Ghost, Install, Autolnstall or similar. At least fifty percent of the time you'll gain Domain Admin access, allowing you to create your own administrator account, join the domain legitimately and help yourself to any information on any server.

Clear guidance on setting up service accounts and how to select a high quality, easily remembered password would eliminate this vulnerability. Some technical understanding of how Windows passwords work would also help IT staff select better quality passwords.

www.firstbase.com

First Base Technologies is exhibiting at Infosecurity Europe 2008.

Cyber Crime Threatens The Core Infrastructure Supporting Critical Business Activities

Tapping into fibre optic cables is easier than you think! Bernard Everett, Region Sales Director Western and Southern Europe InfoGuard

As we start to assess the damage and possible consequences of the 25 million people now open to data fraud after two disks containing personal and financial records have gone missing, it has to be asked 'what happens if this information

was treely available to anyone possessing off the shelf eaves-tapping equipment?'

State-of-the-art fibre optic networks are employed by many banks, insurance companies, enterprises and public authorities as their communication backbone, supporting critical business activities, it just so happens to be the place where industrial espionage is rife. If no security precautions are taken to prevent the theft of data, the consequences could be devastating. Unlike in this most recent case were two disks have clearly gone missing, in a premeditated tapping of an optical network it is extremely unlikely that the victim will even be aware the perpetrator exists; information will not go missing as our data thief will be simply eaves dropping and coping what transpires over the network.

What could it mean to your business?

The world has been shocked to think that the institution that sets the standard and writs the rules, legislating how data needs to be protected can be today at the forefront of one of the largest losses involving 25m files containing individual personal information.

In the commercial sector directors are now made personally liable and can face prosecution, and made to pay damages and fines and can even face imprisonment. In regards to HM Revenue and Customs the question can be rightly asked as to who will ultimately take responsibility?

For some industry sectors the worst impact can be the devastating customer's trust which as in the case of Northern Rock can have huge consequences on the investment and stability of a financial institution.

In a survey by the Wall Street Journal it is estimated that companies that have incurred a breach of information can face a share price loss of up to 3.3% on the day of disclosure, followed by 5-24% thereafter with only 30% of such companies being able to recover at all. A recent example is Card Systems which lost $300m in the first 24hrs after disclosing a breach in which 45m credit card details were hacked; Card Systems were then acquired by its competitor Choice Point. After the humiliation of numerous press conferences, the financial damage does stop with the share price. There are huge additional indirect costs associated with a breach where sensitive data whether it is National Security Numbers, Health Data, Credit Card details or other financial records are lost. Some of these costs will be linked to Public hearings, e.g. Bank of America and Card Systems, call centers, investigations, and credit checks. With an estimated cost of between $100 and $125 per customer, it is reported that Atlantis Resort paid an approximate $6m and Fidelity $15m in additional indirect costs.

It is unlikely that in this situation the HM Revenue and Customs will go out of business as it is clear who ultimately will pick up the tap for this 'oversight'!

www.infoguard.com

InfoGuard is exhibiting at Infosecurity Europe 2008.

More exclusive features will follow in the April issue of Database and Network Journal.
COPYRIGHT 2008 A.P. Publications Ltd.
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2008 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:DATABASE AND NETWORK INTELLIGENCE
Publication:Database and Network Journal
Date:Feb 1, 2008
Words:2125
Previous Article:A clear divide remains between vendor and user when it comes to BPM technology: the way forward for Business Process Management (BPM) involves better...
Next Article:The business in China procurement summit.
Topics:


Related Articles
Proactive security: safeguards to make the net work. (Security).
Centrally managed network security: hope or reality? Don't wait for the standards to evolve. (Software Intelligence).
Exhibitions & conferences.
Infosecurity covers the globe.
Infosecurity Europe breaks all records.
Storage Expo review--data storage takes the spotlight.
Infosecurity Europe 2008.
Oracle highlights strong regional presence in Business Applications and Middleware at GITEX 2008.

Terms of use | Privacy policy | Copyright © 2019 Farlex, Inc. | Feedback | For webmasters