|
Message-ID: <CANO=Ty06HaUSu8K6PD2KfPqJCc71=2=1HC1xrnR4fXfHVhkapQ@mail.gmail.com> Date: Wed, 18 Nov 2015 07:31:47 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security <oss-security@...ts.openwall.com> Subject: Re: Data on Linux attacks (was Re: Re: Fwd: x86 ROP mitigation) On Wed, Nov 18, 2015 at 6:13 AM, Josh Bressers <bressers@...hat.com> wrote: > > > > We face the problem that I and my immediate colleagues (on the Red Hat > > tools team) do not have access to information about successful > > compromises, and what attackers actually do today, on GNU/Linux systems, > > both to achieve initial access and to maintain a presence afterwards. > > Under these conditions, anything we implement is, to some degree, > > arbitrary and a shot in the dark. We can still use our best judgment to > > set priorities, but we are very far from being guided by empirical > evidence. > > > > This is a place I think we could all stand to work together on. If anyone > has any information on Linux attacks it would be very useful for planning > future projects. > > There is a lot of evidence against some other platforms, but I've not seen > anything great around Linux specifically. > > If anyone has ideas or comments, I'm all ears. > > -- > JB > I know a lot of cloud providers use various indicators (e.g. memory/cpu/network/disk usage), or straight up IDS to detect compromised/suspicious hosts, but due to the nature of the cloud market they simply inform the account, they do not look into the data in the account directly (e.g. with a human) under any circumstances due to privacy policy/etc. So this removes a huge set of potential data. Same problem as Red Hat faces, we can't simply harvest huge amounts of customer data due to privacy and legal concerns. We would have to rely upon the compromised users coming forth with details/forensic results, so anecdotal, self selected data at best. I know in my experience I had seifried.org hacked many years ago due to a combination of known web based vuln (which I was going to patch as soon as an update came out) and a Kernel local escalation vuln (which I was planning to patch on Monday, but it was a weekend). I also had a full SSH trust setup for all the hosts because I was super lazy, so once they got into the web host they got into all the hosts. Needless to say I don't do things like that anymore. I know the CloudSecurityAlliance.org is working on a platform to provide anonymized information sharing of incidents/attacks, and various other organizations like Infragard have similar programs setup, maybe we can ask nicely for meta data from them. Another alternative is to setup enough honeypots that we get meaningful data, but again this would be self selecting to some degree as we wouldn't see as many APT attacks. -- Kurt Seifried -- Red Hat -- Product Security -- Cloud PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 Red Hat Product Security contact: secalert@...hat.com
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.