December 2005 Volume 30 Number 6
Total Page:16
File Type:pdf, Size:1020Kb
DECEMBER 2005 VOLUME 30 NUMBER 6 THE USENIX MAGAZINE OPINION Musings security issue RIK FARROW Monoculture on the Back of the Envelope DAN GEER SECURITY Secure Embedded Systems Need Microkernels GERNOT HEISER Breaking the Ties That Bind: Application Isolation and Migration SHAYA POTTER AND JASON NIEH Spying with Bots THORSTEN HOLZ A Summary of Savvy Backbone Defense RAVEN ALDER The Virtual Firewall VASSILIS PREVELAKIS Linux vs. OpenBSD: A Firewall Performance Test MASSIMILIANO ADAMO AND MAURO TABLÒ Using Memory Dumps in Digital Forensics SAM STOVER AND MATT DICKERSON Using Version Control in System Administration LU KE KANIES Writing Detection Signatures CH RISTOPHER JORDAN (WITH CONTRIBUTIONS FROM JASON ROYES AND JESSE WHYTE) Teaching Computer Security, Privacy, and Politics MING CHOW USENIX NOTES 2006 Election for Board of Directors Getting It Wrong PETER H. SALUS USACO Team Brings Home the Gold ROB KOLSTAD Thanks to Our Volunteers ELLIE YOUNG Summary of USENIX Board of Directors Meetings ELLIE YOUNG AND TARA MULLIGAN SAGE Code of Ethics CONFERENCES 14th USENIX Security Symposium The Advanced Computing Systems Association Upcoming Events 7TH IEEE WORKSHOP ON MOBILE COMPUTING 2ND STEPS TO REDUCING UNWANTED TRAFFIC SYSTEMS AND APPLICATIONS (WMCSA 2006) ON THE INTERNET WORKSHOP (SRUTI ’06) Sponsored by IEEE Computer Society in cooperation JULY 6–7, 2006, SAN JOSE, CA, USA with USENIX http://www.usenix.org/sruti06 APRIL 6–7, 2006, SEMIAHMOO RESORT, WA, USA Paper submissions due: April 20, 2006 http://research.ihost.com/wmcsa2006 15TH USENIX SECURITY SYMPOSIUM 3RD SYMPOSIUM ON NETWORKED SYSTEMS (SECURITY ’06) DESIGN AND IMPLEMENTATION JULY 31–AUGUST 4, VANCOUVER, B.C., CANADA Sponsored by USENIX, in cooperation with ACM SIGCOMM http://www.usenix.org/sec06 and ACM SIGOPS Paper submissions due: February 1, 2006 MAY 8–10, 2006, SAN JOSE, CA, USA http://www.usenix.org/nsdi06 7TH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDI ’06) 5TH SYSTEM ADMINISTRATION AND NETWORK Sponsored by USENIX, in cooperation with ACM SIGOPS ENGINEERING CONFERENCE (SANE 2006) NOVEMBER 6–8, 2006, SEATTLE, WA, USA Organized by Stichting SANE and co-sponsored by Stichting http://www.usenix.org/osdi06 NLnet, USENIX, and SURFnet Paper submissions due: April 24, 2006 MAY 15–19, 2006, DELFT, THE NETHERLANDS http://www.sane.nl/sane2006 SECOND WORKSHOP ON HOT TOPICS IN SYSTEM DEPENDABILITY (HOTDEP ’06) 2006 USENIX ANNUAL TECHNICAL NOVEMBER 8, 2006, SEATTLE, WA, USA CONFERENCE (USENIX ’06) http://www.usenix.org/usenix06 MAY 30–JUNE 3, 2006, BOSTON, MA, USA Paper submissions due: July 15, 2006 http://www.usenix.org/usenix06 Paper submissions due: January 17, 2006 20TH LARGE INSTALLATION SYSTEM ADMINISTRATION CONFERENCE (LISA ’06) SECOND INTERNATIONAL CONFERENCE ON DECEMBER 3–8, 2006, WASHINGTON, D.C., USA VIRTUAL EXECUTION ENVIRONMENTS (VEE ’06) Sponsored by ACM SIGPLAN in cooperation with USENIX JUNE 14–16, OTTAWA, ONTARIO, CANADA http://www.veeconference.org/vee06 4TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES (MOBISYS 2006) Jointly sponsored by ACM SIGMOBILE and USENIX, in cooperation with ACM SIGOPS JUNE 19–22, UPPSALA, SWEDEN http://www.sigmobile.org/mobisys/2006 For a complete list of all USENIX & USENIX co-sponsored events, see http://www.usenix.org/events contents OPINION 2 Musings RIK FARROW 6 Monoculture on the Back of the Envelope DAN GEER SECURITY 9 Secure Embedded Systems Need Microkernels GERNOT HEISER 14 Breaking the Ties That Bind: Application Isolation and Migration SHAYA POTTER AND JASON NIEH 18 Spying with Bots THORSTEN HOLZ 24 A Summary of Savvy Backbone Defense RAVEN ALDER 27 The Virtual Firewall VASSILIS PREVELAKIS 35 Linux vs. OpenBSD: A Firewall Performance Test VOL. 30, #6, DECEMBER 2005 MASSIMILIANO ADAMO AND MAURO TABLÒ 43 Using Memory Dumps in Digital Forensics EDITOR ;login: is the official SAM STOVER AND MATT DICKERSON Rik Farrow magazine of the [email protected] USENIX Association. 49 Using Version Control in System Administration MANAGING EDITOR ;login: (ISSN 1044-6397) is LUKE KANIES Jane-Ellen Long published bi-monthly by the 55 Writing Detection Signatures [email protected] USENIX Association, 2560 CH RISTOPHER JORDAN (WITH CONTRIBUTIONS COPY EDITOR Ninth Street, Suite 215, FROM JASON ROYES AND JESSE WHYTE) Steve Gilmartin Berkeley, CA 94710. 62 Teaching Computer Security, Privacy, and Politics [email protected] $85 of each member’s annual MING CHOW PRODUCTION dues is for an annual sub- Rob Carroll scription to ;login:. Subscrip- Casey Henderson tions for nonmembers are USENIX NOTES $115 per year. TYPESETTER 64 2006 Election for Board of Directors Star Type Periodicals postage paid at [email protected] Berkeley, CA, and additional 65 Getting It Wrong offices. PETER H. SALUS USENIX ASSOCIATION 2560 Ninth Street, POSTMASTER: Send address 66 USACO Team Brings Home the Gold Suite 215, Berkeley, changes to ;login:, ROB KOLSTAD California 94710 USENIX Association, Phone: (510) 528-8649 2560 Ninth Street, 66 Thanks to Our Volunteers FAX: (510) 548-5738 Suite 215, Berkeley, ELLIE YOUNG CA 94710. http://www.usenix.org 67 Summary of USENIX http://www.sage.org ©2005 USENIX Association. Board of Directors Meetings USENIX is a registered trade- ELLIE YOUNG AND TARA MULLIGAN mark of the USENIX Associa- tion. Many of the designa- 68 SAGE Code of Ethics tions used by manufacturers and sellers to distinguish their CONFERENCE REPORTS products are claimed as trade- marks. USENIX acknowl- 69 14th USENIX Security Symposium edges all trademarks herein. Where those designations ap- pear in this publication and USENIX is aware of a trade- mark claim, the designations have been printed in caps or initial caps. WELCOME TO THE EIGHTH SECURITY edition of ;login:. I was asked if I would like R IK FARROW to edit one issue of ;login: per year back in 1998, and the only thing that has changed this year is that I am now editing regular issues of ;login: as well. Well, perhaps that’s not the only thing that has musings changed this year. Google has announced that it is partnering with NASA. PalmOne has dropped its pro- [email protected] prietary PalmOS and aligned itself with Microsoft. So- laris 11 and FreeBSD 6 are out in Beta. Microsoft and Intel are attempting to finesse the issue of the next DVD format by choosing to back HD DVD as opposed to Sony’s Blue Ray. On the security front, things have been relatively quiet. There was a lot of foo-for-all when Michael Lynn decided to resign from ISS rather than remain silent about the exploit he had written for Cisco IOS. While Lynn delivered his exposé at Black Hat Las Vegas, Cisco and ISS got restraining orders against Black Hat in an attempt to prevent copies of Lynn’s presentation from escaping “into the wild.” Of course, that attempt failed, and resulted in even more copies of the presentation being passed around. Nothing like screaming “fire” to get attention. There were immediate fears of the ultimate Internet worm that would bring on “a digital Pearl Harbor.” But no worm or exploit has emerged . so far. I have written in the past about the relative fragility of the routing infrastructure, and a monoculture of routers will certainly not help things. I’ll have more to say about IOS, Cisco’s Internet Operating System, later. But on the MS worm front, nothing nearly as exciting as in past years. No Slammer, spreading faster than any worm ever (90% of vulnerable systems in just 10 minutes). No Blaster, leading to fears that Al Qaeda had launched a cyberattack that had led to the FirstEnergy-initiated blackout in August of 2003. Blaster had nothing to do with it and neither did Al Qaeda; downsizing had much more responsibility for the blackout. Not even a new root vulnerability in Sendmail (last in 2003, and I am happy that things have gone well there). Does this mean we, programmers and sysadmins, can now rest easy? That the problems with program de- sign and architecture have been solved, and that the worms and exploits are now things of the past? Hardly. Weakness in Depth In the world of security, we like to talk about defense in depth, having layers of protection. You know, first 2 ;LO GIN: V OL. 30, NO. 6 you have a packet filter, then a DMZ, with a firewall between the DMZ and the internal networks. There will be IDS both in the DMZ and at critical points on the internal networks, firewalls on critical systems, host-based intrusion detec- tion, centralized patch management and authentication. Boy, this sounds good just writing about it. And will it work? What exactly do I mean by “weakness in depth”? Weakness in depth alludes to the design of the operating systems we use every day. Way back in the dark ages of computing, when a fast processor could exe- cute one million instructions per second and be used to provide winter heat for the building it lived in, deep thinkers came up with the notion of the Trusted Computing Base. The TCB would be the bare minimum amount of code re- quired to execute any application securely. Thus, no matter how poorly and in- securely the code had been written, even if a program was written with mali- cious intent, it would be impossible to violate the rules set down by the TCB. Having written that, let’s consider what passes for a TCB today. You might think that picking out the TCB from the rest of the OS is a difficult task. But it’s not, really, because all computers use similar hardware. The TCB relies on two hardware features for security: memory management and privilege level. Of these, the privilege level is the simplest. Processors can run in one of two (or more) privilege levels. Some processors have just two; the Intel x86 line has four, but only two are used.