Search This Blog

Friday, April 26, 2013

firewall-wizards Digest, Vol 64, Issue 14

Send firewall-wizards mailing list submissions to
firewall-wizards@listserv.icsalabs.com

To subscribe or unsubscribe via the World Wide Web, visit
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
or, via email, send a message with subject or body 'help' to
firewall-wizards-request@listserv.icsalabs.com

You can reach the person managing the list at
firewall-wizards-owner@listserv.icsalabs.com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of firewall-wizards digest..."


Today's Topics:

1. Re: Linked-in and its Phishing-like contacts option!
(Bennett Todd)
2. Re: Linked-in and its Phishing-like contacts option! (Bruce Platt)
3. Re: Linked-in and its Phishing-like contacts option!
(Marcus Ranum)


----------------------------------------------------------------------

Message: 1
Date: Fri, 26 Apr 2013 10:26:55 -0400
From: Bennett Todd <bet@rahul.net>
Subject: Re: [fw-wiz] Linked-in and its Phishing-like contacts option!
To: Firewall Wizards Security Mailing List
<firewall-wizards@listserv.icsalabs.com>
Message-ID:
<CAA9gXs_8OWFEHHg48351Cw1Ch5fcj0EyUUyfJVY6bv7OukiMCw@mail.gmail.com>
Content-Type: text/plain; charset="iso-8859-1"

If user operational security was adequate, we could retire our firewalls,
let our users remote compute with full VPNs in and out, and replace these
relatively slow, fragile, complex, maintenance-intensive sets of boxes with
wire-speed switches.

Plus IDS.

If we feel user operational security isn't adequate, I think it's a fair
topic of discussion, because the drive to try to mend or at least detect
issues ends up in our hands.

We can secure every machine that has IP connectivity to the inside net,
more or less, but user operational security lapses will let vandals or
thugs molest our users.

>From everything I've heard, the targets of some recent high-profile
intrusions had petty good security architecture in place.

Whether it's carrying USB sticks between home and work, or clicking on
links using an overly-complex and hence insecure browser or MUA, folks need
to get their work done.

Some behavior problems can sometimes be partially addressed by training,
but mostly, if there's a problem, we should look for a way to adjust our
firewall and the services it permits, or provide companion services
(owncloud sounds interesting) to help them get their work done without
exposing themselves to folk with hostile intent.

I think discussion of what we should try to do, and why, is every bit as
relevant as - and maybe more useful than - chatting about how best to do it.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://listserv.icsalabs.com/pipermail/firewall-wizards/attachments/20130426/523296a8/attachment-0001.html>

------------------------------

Message: 2
Date: Fri, 26 Apr 2013 07:41:19 -0400
From: Bruce Platt <bruce@ei3.com>
Subject: Re: [fw-wiz] Linked-in and its Phishing-like contacts option!
To: Firewall Wizards Security Mailing List
<firewall-wizards@listserv.icsalabs.com>
Message-ID:
<CAD3WRbL=LYo+iVjXgaa=z+ntz4WN68edLpHfnb4r8z4Nfu1nzA@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"

I have a love/hate relationship with these as well. I was only tempted
down this perfidious path a few years ago when a set of my Grandchildren
asked me to get a Facebook account so we could interact that way as they
live on the other coast from me. I started disliking it within five
minutes when a former employer sent me a request to "friend" him. Then it
became an issue of who can I not be "friends" with among my contemporaries.

Same with Linked-In, same with Twitter.

Up to this point I'm just addressing the personal inconvenience aspect of
it, which is why I chose Crispan's post to which to reply.

But, the larger issue is really the risk of exposing all sorts of personal
/ corporate information in a variety of unwitting ways. This is the part
I hate. We've had many discussions about the risks of allowing people to
use social media web sites from work. It's a losing battle. Entering
one's email password is just one, and Linked-In is not the only villain. I
just made some flight reservations yesterday. The airline website offered
to add the reservation to my Calendar. Not let me download a .cal file,
but to directly insert it into my calendar. Uh, no. Not today.

But, this now get's added to our list of worst practices and meet's Paul's
criteria of being part of overall operational security. I'm honestly not
sure how we could block this stuff in a web-proxy, or be alerted by an IDS
rule short of just blocking the sites. (Maybe this will start more
discussion. How would one try this?)

Mix these with BYOD, and it makes a daunting task indeed.

Cheers

--
+------------------------------------+
Bruce B. Platt, Ph.D.
V.P. Research
ei3 Corporation
136 Summit Avenue
Montvale, NJ 07645
Phone: +1-201-802-9080 ext. 404
Facsimile: +1-201-802-9099



On Fri, Apr 26, 2013 at 12:53 AM, Crispin Cowan <crispin@crispincowan.com>wrote:

> I boycott all social media. I?m not opposed to social networking, but I am
> opposed to some dot.com monetizing my relationships; I do all my social
> networking via open protocols like e-mail, and having a beer with a friend
> ?
>
> I broke this rule once, joining LinkedIn 5 years ago, because I needed a
> job. LinkedIn was a total failure at getting a job, but attending ToorCon
> and having a beer with someone I met there worked. I deleted my LinkedIn
> account when I got tired of the ?Foo wants to connect with you? spam. I?m
> *still* getting LinkedIn spam.
>
> Screw social networking web sites. I don?t have a FaceBook page or a
> Twitter account, and never will.
>
> Funny, I never envisioned myself as Clint Eastwood yelling at kids to get
> off my lawn, but here I am ?
>
> Sent from Windows Mail
>
> *From:* Gautier . Rich
> *Sent:* ?Thursday?, ?April? ?25?, ?2013 ?9?:?28? ?PM
> *To:* Firewall Wizards Security Mailing List
>
>
> Thoughts? I?m wondering why User Operational Security falls under the
> realm of Firewall Wizards.. Other than that, I?d say ? They?re not alone
> by any stretch of the imagination, and plenty of users seem to be perfectly
> willing to accept the risk (or be unaware of it). However, not much you
> can do on the firewall side other than turning off webmail access...
>
>
>
> *Richard Gautier, CISSP*
>
> Enterprise Architect, Federal Group
>
> [image: drc-logo]
>
> 650 Massachusetts Avenue NW
>
> Suite 510
>
> Washington, DC 20001
>
> Office: (571) 226-8828 *|* Cell: (703) 231-2156
>
> rgautier@drc.com *|** * www.drc.com
>
>
>
> *From:* firewall-wizards-bounces@listserv.icsalabs.com [mailto:
> firewall-wizards-bounces@listserv.icsalabs.com] *On Behalf Of *Mathew Want
> *Sent:* Monday, April 22, 2013 7:30 PM
> *To:* Firewall Wizards Security Mailing List
> *Subject:* [fw-wiz] Linked-in and its Phishing-like contacts option!
>
>
>
> Hiya all.
>
>
> Has anyone else noticed the option to see who else they know is connected
> on Linked-in? Have you noticed that if you click on the outlook button it
> asks you for your WORK EMAIL PASSWORD!!!!!
>
> Bloody hell! It's not like the job of getting users to not submit this
> information to other sites isn't already hard enough without this!!! The
> "can't put brains in pumpkins " department must be having a field day over
> this.
>
> Am I the only one that think this is a touch negligent on the part of
> Linked-in? Or should I just accept that it is corporate facebook, accepts
> that they have the dame moral fibre and move on?
>
> Maybe I am expecting too much? Thoughts?
>
> --
>
> Regards,
> M@
>
> --
> "Some things are eternal by nature,
> others by consequence"
> ------------------------------
> This electronic message transmission and any attachments that accompany
> it contain information from DRC? (Dynamics Research Corporation) or its
> subsidiaries, or the intended recipient, which is privileged, proprietary,
> business confidential, or otherwise protected from disclosure and is the
> exclusive property of DRC and/or the intended recipient. The information in
> this email is solely intended for the use of the individual or entity that
> is the intended recipient. If you are not the intended recipient, any use,
> dissemination, distribution, retention, or copying of this communication,
> attachments, or substance is prohibited. If you have received this
> electronic transmission in error, please immediately reply to the author
> via email that you received the message by mistake and also promptly and
> permanently delete this message and all copies of this email and any
> attachments. We thank you for your assistance and apologize for any
> inconvenience.
>
> _______________________________________________
> firewall-wizards mailing list
> firewall-wizards@listserv.icsalabs.com
> https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards
>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://listserv.icsalabs.com/pipermail/firewall-wizards/attachments/20130426/c7bfe065/attachment-0001.html>

------------------------------

Message: 3
Date: Fri, 26 Apr 2013 10:38:18 -0400
From: Marcus Ranum <mjr@ranum.com>
Subject: Re: [fw-wiz] Linked-in and its Phishing-like contacts option!
To: firewall-wizards@listserv.icsalabs.com
Message-ID: <517A915A.8050505@ranum.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed

Bennett Todd wrote:
> If user operational security was adequate, we could retire our firewalls

Software flaws.

mjr.

--
Marcus J. Ranum CSO, Tenable Network Security, Inc.
http://www.tenable.com



------------------------------

_______________________________________________
firewall-wizards mailing list
firewall-wizards@listserv.icsalabs.com
https://listserv.icsalabs.com/mailman/listinfo/firewall-wizards


End of firewall-wizards Digest, Vol 64, Issue 14
************************************************

No comments: