Return-Path: <sentto-279987-2381-1001530987-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Wed, 26 Sep 2001 12:05:33 -0700 (PDT) Received: (qmail 30198 invoked by uid 510); 26 Sep 2001 19:04:12 -0000 Received: from n16.groups.yahoo.com (216.115.96.66) by 204.181.12.215 with SMTP; 26 Sep 2001 19:04:12 -0000 X-eGroups-Return: sentto-279987-2381-1001530987-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by mo.egroups.com with NNFMP; 26 Sep 2001 19:03:55 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_3_2_2); 26 Sep 2001 19:03:07 -0000 Received: (qmail 7551 invoked from network); 26 Sep 2001 19:03:06 -0000 Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 26 Sep 2001 19:03:06 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 26 Sep 2001 19:03:47 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id MAA24050 for iwar@onelist.com; Wed, 26 Sep 2001 12:03:37 -0700 Message-Id: <200109261903.MAA24050@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 26 Sep 2001 12:03:37 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Information.Technology-Essential.But.Vulnerable] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Information Technology-Essential But Vulnerable: How Prepared Are We for Attacks? CERT, 9/26/2001 <a href="http://www.cert.org/congressional_testimony/Pethia_testimony_Sep26.html">http://www.cert.org/congressional_testimony/Pethia_testimony_Sep26.html> Testimony of Richard D. Pethia Director, CERTŪ Centers Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Before the House Committee on Government Reform, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations September 26, 2001 Contents: Introduction The Nimda Worm Illustrates How Prepared We Are for Attacks Current State of Internet Vulnerability - Vulnerability of Technology - Intruder Activity: The Ease of Exploitation - Difficulty of Fixing Vulnerable Systems - Limits of Effectiveness of Reactive Solutions Recommended Actions - Higher Quality Products - Expanded Research in Information Assurance - More Technical Specialists - More Awareness and Training for Internet Users Conclusion Attachments Introduction Mr. Chairman and Members of the Committee: My name is Rich Pethia. I am the director of the CERTŪ Centers, which include the CERT Coordination Center (CERT/CC) and CERT Analysis Center (CERT/AC). Thank you for the opportunity to testify on computer security issues that affect the government. Today I will discuss the vulnerability of information technology on the Internet, including information about the Nimda worm, and how prepared I believe the nation is for cyber attacks such as Nimda. My perspective comes from the work we do at the CERT Centers, which are part of the Survivable Systems Initiative of the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University. We have 13 years of experience with computer and network security. The CERT/CC was established in 1988, after an Internet "worm" became the first Internet security incident to make headline news, acting as a wake-up call for network security. In response, the CERT/CC was established at the SEI. The center was activated in just two weeks, and we have worked hard to maintain our ability to react quickly. The CERT/CC staff has handled well over 63,000 incidents and cataloged more than 3,700 computer vulnerabilities. The CERT Analysis Center, established just last year, addresses the threat posed by rapidly evolving, technologically advanced forms of cyber attacks. Working with sponsors and associates, the CERT Analysis Center collects and analyzes information assurance data to develop detection and mitigation strategies that provide high-leverage solutions to information assurance problems, including countermeasures for new vulnerabilities and emerging threats. The CERT Analysis Center builds upon the work of the CERT Coordination Center. The CERT Centers are now recognized by both government and industry as a neutral, authoritative source of data and expertise on information assurance. In addition to handling reports of computer security breaches and vulnerabilities in network-related technology, we identify preventive security practices, conduct research, and provide training to system administrators, managers, and incident response teams. More details about our work are attached to the end of this testimony (see Survivable Systems Initiative). The Nimda Worm Illustrates How Prepared We Are for Attacks The recent attacks by the Nimda, or W32/Nimda, worm demonstrate our vulnerability. The worm modifies web documents (files ending with .htm, .html, and .asp) and certain executable files found on the systems it infects. It then creates numerous copies of itself under various file names. It scans the network for vulnerable computers and propagates through email, thereby causing some sites to experience denial of service or degraded performance. Computers that have been compromised are also at high risk for being used for attacks on other Internet sites. One of Nimda's behaviors is to attack computers that had been compromised by the Code Red worm and left in a vulnerable state. It also targets home users' computers, which are among the most vulnerable. Because of the network traffic generated, Internet Service Providers (ISPs) for home users suffered a negative impact from the worm. Nimda used many means to infect computers, as shown the attached illustration, "Complexity of Nimda Infection Vectors." For example, the worm not only propagates through email attachments and by compromises of vulnerable Internet Information Servers, but it also spreads through shared files on a file server and through web pages containing JavaScript that have been altered on a compromised server. The algorithm used to spread the worm concentrated for the most part on local networks, so the primary effect of the worm occurred at the "edges" of the Internet. Operators of the backbone of the Internet were not significantly affected; however, they did experience an increase in customer service calls. Callers could not reach the Internet because of the local scanning and email traffic caused by the worm, so they thought the Internet was "down." Nimda is the first significant worm or virus that attacks both computers that act as servers and those that are desktop computers. A server provides services such as a web site. Code Red exploited the Internet Information Server (IIS), which is a web server. The Melissa virus spread by means of users' email on desktop computers. Nimda merges the damaging features of both Code Red and Melissa-and more. The first public report of Nimda infections occurred Tuesday, September 18, 2001, between 8:30 and 9:00 a.m. Within an hour, numerous organizations were telling the CERT/CC that they were paralyzed by the worm. By the end of the day, more than 100,000 computers had been affected. That same morning, the CERT/CC published initial information about the worm and actions to take against it. We were also in contact with the vendors of anti-virus products and other response organizations to further spread the word of the problem and to develop antidotes. Later that day, we issued more complete information in a CERT advisory (CA-2001-26). The advisory went to a mailing list of more than 150,000 addresses and was published on our web site (www.cert.org). A copy is attached, along with copies of related advisories. The worm spread so fast that system administrators, users, and vendors did not have time to prepare. Quick response was a challenge because there was no lead time for advance analysis. In contrast, even with Code Red, analysts had a small amount of lead time to examine an early version of the worm before the later, more aggressive version began causing serious damage. Analysts were also hampered by the lack of source code for Nimda. Source code is the original form of the program, basic code that reveals how the worm works. Thus, it was not possible to determine quickly what the worm did and what it could potentially do. Analysts quickly obtained the binary code, but it is time consuming to decompile this code and analyze the inner workings of the worm. Analysis through decompiling can take hours, days, or even weeks, depending on the complexity of the program. Current State of Internet Vulnerability The Nimda worm clearly points out multiple factors that contribute to Internet security problems and pose obstacles to the solutions. They include the vulnerability of technology on the Internet, the nature of intruder activity, the difficulty of fixing vulnerable systems, and the limits of effectiveness of reactive solutions. Vulnerability of Technology Last year, the CERT/CC received 1,090 vulnerability reports, more than double the number of the previous year. In the first half of 2001, we have already received 1,151 reports and expect well over 2,000 reports by the end of this year. These vulnerabilities are caused by software designs that do not adequately protect Internet-connected systems and by development practices that do not focus sufficiently on eliminating implementation flaws that result in security problems. There is little evidence of movement toward improvement in the security of most products; software developers do not devote enough effort to applying lessons learned about the sources of vulnerabilities. We continue to see the same types of vulnerabilities in newer versions of products that we saw in earlier versions. Technology evolves so rapidly that vendors concentrate on time to market, often minimizing that time by placing a low priority on the security of their products. Until customers demand products that are more secure or there are changes in the way legal and liability issues are handled, the situation is unlikely to change. Additional vulnerabilities come from the difficulty of securely configuring operating systems and applications software packages. These products are often shipped to customers with security features disabled, forcing the technology user to go through the difficult and error-prone process of properly enabling the security features they need. While the current practices allow the user to more quickly use the product and reduces the number of calls the product vendor's service center might receive when a product is released, it results in many Internet-connected systems that are misconfigured from a security standpoint. Intruder Activity: The Ease of Exploitation CERT/CC experience shows that there has been a steady advance in the sophistication and effectiveness of attack technology. Intruders quickly develop exploit scripts for vulnerabilities discovered in products such as IIS. They then use these scripts to compromise computers and, moreover, share these scripts so that more attackers can use them. These scripts are combined with other forms of technology to develop programs that automatically scan the network for vulnerable systems, attack them, compromise them, and use them to spread the attack even further. These new attack technologies are causing damage more quickly than those created in the past. The Code Red worm spread around the world faster than the so-called Morris worm moved through U.S. computers in 1988, and faster than the Melissa virus in 1999. With the Code Red worm, there were days between first identification and widespread damage. The Nimda worm caused serious damage within an hour of the first report of infection. In the past, intruders found vulnerable computers by scanning each computer individually, in effect limiting the number of computers that could be compromised in a short period of time. Now intruders use worm technology to achieve exponential growth in the number of computers scanned and compromised. They can now reach tens of thousands of computers in minutes where it once took weeks or months. This fast exploitation limits the time security experts like those at the CERT/CC have to analyze the problem and warn the Internet community. Likewise, system administrators and users have little time to protect their systems. Exacerbating the problem is the difficulty of catching the attackers. Today's Internet protocols make it easy for intruders to disguise their identity and location. Automated attack technology further distances the attacker from the attack. In the great majority of attacks, attackers go unidentified and fear of prosecution offers little deterrent. Difficulty of Fixing Vulnerable Systems With an estimated 2,000 (and climbing) vulnerabilities being discovered each year, system and network administrators are in a difficult situation. They are challenged with keeping up with all the systems they have and all the patches released for those systems. Patches can be difficult to apply and might even have unexpected side effects. We have found that, after a vendor releases a security patch, it takes a long time for system administrators to fix all the vulnerable computer systems. It can be months or years before the patches are implemented on 90-95 percent of the vulnerable computers. For example, we still receive reports of outbreaks of the Melissa virus, which exploits vulnerabilities that are more than two years old. There are a variety of reasons for the delay. The job might be too time-consuming, too complex, or just given too low a priority for the system administration staff to handle. With increased complexity comes the introduction of more vulnerabilities, so solutions do not solve problems for the long term-system maintenance is never-ending. Because many managers do not fully understand the risks, they neither give security a high enough priority nor assign adequate resources. Exacerbating the problem is the fact that the demand for skilled system administrators far exceeds the supply. Even in an ideal situation, conscientious system administrators cannot adequately protect their computer systems because other system administrators and users, including home users, do not adequately protect their systems. Incident reports to the CERT/CC indicate that many people do not keep their anti-virus software up to date; and they do not apply patches to close vulnerabilities. Computers on the Internet are extremely interdependent. The security of each system on the Internet affects the security of every other system. Limits of Effectiveness of Reactive Solutions For the past 13 years, we have relied heavily on the ability of the Internet community as a whole to react quickly enough to security attacks to ensure that damage is minimized and attacks are quickly defeated. Today, however, it is clear that we are reaching the limits of effectiveness of our reactive solutions. While individual response organizations are all working hard to streamline and automate their procedures and are working together to better coordinate activities, a number of factors have combined to limit the effectiveness of reactive solutions. The number of vulnerabilities in commercial off-the-shelf software is now at the level that it is virtually impossible for any but the best resourced organizations to keep up with the vulnerability fixes. The Internet now connects over 109,000,000 computers and continues to grow at a rapid pace. At any point in time, there are hundreds of thousands of connected computers that are vulnerable to one form of attack or another. Attack technology has now advanced to the point where it is easy for attackers to take advantage of these vulnerable machines and harness them together to launch high-powered attacks. Many attacks are now fully automated and spread at nearly the speed of light across the entire Internet community. The attack technology has become increasingly complex and in some cases intentionally stealthy, thus increasing the time it takes to discover and analyze the attack mechanisms in order to produce antidotes. Internet users have become increasingly dependent on the Internet and now use it for many critical applications as well as online business transactions; even relatively short interruptions in service cause significant economic loss and can jeopardize critical services. These factors, taken together, indicate that we are now at the point where we can expect many attacks to cause significant economic losses and service disruptions within even the best response times that we can realistically hope to achieve. Aggressive, coordinated response will continue to be necessary, but we must also move quickly to put other solutions in place. Recommended Actions Working our way out of the vulnerable position we are in requires a multi-pronged approach that helps us deal with the escalating near-term problem while at the same time building stronger foundations for the future. The work that must be done includes achieving these changes: Higher quality information technology products with security mechanisms that are better matched to the knowledge, skills, and abilities of today's system managers, administrators, and users Expanded research programs that lead to fundamental advances in computer security A larger number of technical specialists who have the skills needed to secure large, complex systems Increased and ongoing awareness and understanding of cyber-security issues, vulnerabilities, and threats by all stakeholders in cyber space Higher quality products: In today's Internet environment, a security approach based on "user beware" is unacceptable. The systems are too complex and the attacks too rapid for this approach to work. Fortunately, good software engineering practices can dramatically improve our ability to withstand attacks. The solutions required are a combination of the following: Virus-resistant/virus-proof software - There is nothing intrinsic about digital computers or software that makes them vulnerable to virus attack or infestation. Viruses propagate and infect systems because of design choices that have been made by computer and software designers. Designs that allow the import of executable code, in one form or another, and allow the unconstrained execution of that code on the machine that received it, are the designs that are susceptible to viruses and their effects. Unconstrained execution allows code developers to easily take full advantage of a system's capabilities, but does so with the side effect of making the system vulnerable to virus attack. To effectively control viruses in the long term, vendors must provide systems and software that constrain the execution of imported code, especially code that comes from unknown or not-trusted sources. Some techniques to do this have been known for decades. Others, such as "sandbox" techniques, have been more recently developed. Reducing implementation errors by at least two orders of magnitude - Most vulnerabilities in products come from software implementation errors. They remain in products, waiting to be discovered, and are fixed only after they are found while in use. Worse, the same flaws continue to be introduced in new products. Vendors need to be proactive, and adopt known, effective software engineering practices that dramatically reduce the number of flaws in software products. High-security default configurations - With the complexity of today's products, properly configuring systems and networks to use the strongest security built into the products is difficult, even for people with strong technical skills and training. Small mistakes can leave systems vulnerable and put users at risk when connected to the Internet. Vendors can help reduce the impact of security problems by shipping products with "out of the box" configurations that enable security options rather than require the user to enable them. The user can change these "default" configurations if desired, but would have the benefit of starting from a secure base. Expanded research in information assurance: It is critical to maintain a long-term view and invest in research toward systems and operational techniques that yield networks capable of surviving attacks while protecting sensitive data. In doing so, it is essential to seek fundamental technological solutions and to seek proactive, preventive approaches, not just reactive, curative approaches. The research agenda should seek new approaches to system security. These approaches should include design and implementation strategies, recovery tactics, strategies to resist attacks, survivability trade-off analysis, and the development of security architectures. Among the activities should be the creation of A unified and integrated framework for all information assurance analysis and design Rigorous methods to assess and manage the risks imposed by threats to information assets Quantitative techniques to determine cost/benefit of risk mitigation strategies Systematic methods and simulation tools to analyze cascade effects of attacks, accidents, and failures across interdependent systems New technologies for resisting attacks and for recognizing and recovering from attacks, accidents, and failures More technical specialists: The recent government identification and support of cyber-security centers of excellence and the provision of scholarships that support students working on degrees in these universities are steps in the right direction. The current levels of support, however, are far short of what is required to produce the technical specialists we need to secure our systems and networks. These programs should be expanded over the next five years to build the university infrastructure we will need for the long-term development of trained security professionals. More awareness and training for Internet users: The combination of easy access and user-friendly interfaces have drawn users of all ages and from all walks of life to the Internet. As a result, many users of the Internet have little understanding of Internet technology or the security practices they should adopt. To encourage "safe computing," there are steps we believe the government could take: Support the development of educational material and programs about cyberspace for all users. There is a critical need for education and increased awareness of the security characteristics, threats, opportunities, and appropriate behavior in cyberspace. Because the survivability of systems is dependent on the security of systems at other sites, fixing one's own systems is not sufficient to ensure those systems will survive attacks. Home users and business users alike need to be educated on how to operate their computers most securely, and consumers need to be educated on how to select the products they buy. Market pressure, in turn, will encourage vendors to release products that are less vulnerable to compromise. In addition, support programs that provide early training in security practices and appropriate use. This training should be integrated into general education about computing. Children should learn early about acceptable and unacceptable behavior when they begin using computers just as they are taught about acceptable and unacceptable behavior when they begin using libraries. (source: National Research Council, Computers at Risk: Safe Computing in the Information Age, National Academy Press, 1991, recommendation 3c, p. 37.) Although this recommendation is aimed at elementary and secondary school teachers, they themselves need to be educated by security experts and professional organizations. Parents need be educated as well and should reinforce lessons in security and behavior on computer networks. Conclusion Problems such as the Nimda worm will occur again, and attack technology will evolve to support attacks that are even more virulent and damaging. Our current solutions are not keeping pace with the increased strength and speed of attacks; our information infrastructures are at risk. Solutions are not simple, but must be pursued aggressively to allow us to keep our information infrastructures operating at acceptable levels of risk. However, we can make significant progress by making changes in software design and development practices, increasing the number of trained system managers and administrators, improving the knowledge level of users, and increasing research into secure and survivable systems. Additional government support for research, development, and education in computer and network security would have a positive effect on the overall security of the Internet. Attachments Copyright 2001 Carnegie Mellon University. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Get your FREE VeriSign guide to security solutions for your web site: encrypting transactions, securing intranets, and more! http://us.click.yahoo.com/XrFcOC/m5_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:50 PDT