Defenses must be at the host level, not the network level. Mike
Muuss and Cliff Stoll have made this point quite eloquently[ncsc]. The
network performed its function perfectly and should not be faulted;
the tragic flaws were in several application programs. Attempts to
fix the network are misguided.
Jeff Schiller likes to use an analogy
with the highway system:
anybody can drive up to your house and
probably break into your home, but that does not mean we should
close down the roads or put armed guards on the exit ramps.
Logging information is important.
The inetd and telnetd interaction logging the source of
virus attacks turned out to be a lucky break, but even so many sites
did not have enough logging information available to identify the
source or times of infection. This greatly hindered the responses,
since people frequently had to install new programs which logged more
information. On the other hand, logging information tends to
accumulate quickly and is rarely referenced. Thus it is frequently
automatically purged. If we log helpful information, but find it is
quickly purged, we have not improved the situtation much at all. Mike
Muusspoints out that frequently one can retrieve such information from
backups[ncsc], but this is not always true.
Denial of service attacks are easy. The Internet is amazingly
vulnerable to such attacks. These attacks are quite difficult to
prevent, but we could be much better prepared to identify their sources
than we are today. For example, currently it is not hard to
imagine writing a program or set of programs which crash two-thirds of
the existing Sun Workstations or other machines implementing Sun's
Network Filesystem (NFS). This is serious since such machines are the
most common computers connected to the Internet. Also, the total lack
of authentication and authorization for network level routing makes it
possible for an ordinary user to disrupt communications for a large
portion of the Internet. Both tasks could be easily done in a manner
which makes tracking down the initiator extremely difficult, if not
impossible.
A central security fix repository may be a good idea. Vendors must
participate. End users, who likely only want to get their work
done, must be educated about the importance of installing security fixes.
Knee-jerk reactions should be avoided. Openness and free flow of
information is the whole point of networking, and funding agencies
should not be encouraged to do anything damaging to this without very
careful consideration. Network connectivity proved its worth as an
aid to collaboration by playing an invaluable role in the defense and
analysis efforts during the crisis, despite the sites which
isolated themselves.