[3330] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

RE: www web security !

daemon@ATHENA.MIT.EDU (Alex Filacchione)
Tue Oct 22 15:03:34 1996

From: Alex Filacchione <alexf@iss.net>
To: "'John Cronin'" <John.Cronin@oit.gatech.edu>
Cc: "BZH01572@niftyserve.or.jp" <BZH01572@niftyserve.or.jp>,
        "joang@lix.intercom.es" <joang@lix.intercom.es>,
        "pyb@cadrus.fr"
	 <pyb@cadrus.fr>,
        "www-security@ns2.rutgers.edu"
	 <www-security@ns2.rutgers.edu>
Date: Tue, 22 Oct 1996 12:15:59 -0400
Errors-To: owner-www-security@ns2.rutgers.edu

->
->Why should you not put your web server BEHIND a firewall?  It opens up 
your
->internal network (it provides a path through your firewall.  All someone
->needs to do is compromise your webserver, not your firewall then)

I would not put it behind the firewall if it was intended primarily for
EXTERNAL use

[SNIP]

.  If possible, I would put it on
it's own subnet, or perhaps with the firewall.

=-=-=-
I am assuming that the web server is for external use.  If you are dealing 
with a one machine firewall (packet filter), then I would put the web 
server on the outside.  If you are dealing with something more along the 
lines of a "bootstrap" firewal where you have 3 machine set up like so:

Internet<->Packet filter<->Proxy Server<->Packet Filter<->Internal net

I would put the web server on a separate subnet off of the proxy server. 
 This way if someone *does* compromise the web server, they still have to 
go through the proxy server and a second packet filter to get inside, the 
web server is protected by the initial packet filtering gateway router, and 
because it is subnetted off, sniffers installed on that machine will do no 
good.  I'm sure that probably 90% of the firewalls out there are one 
machine firewalls (my own made up statistic) and not "bootstrap" firewalls.
=-=-=-=-=-

->Don't leave compilers lieing (sp?) around.  If you need to use one, 
install
->it via a console log-in, and then delete it.

Or compile on another machine, and then tar up the needed files and 
transfer
them to the web server.

=-=-=-=-
Well, this is just in case the web server is an OS that the internal net is 
not using.  An ISP that I worked for once upon a time (I did not web or 
security work for them, btw) had internal Suns and linux boxes, but the web 
server was running Free BSD or BSDI or something.
=-=-=-=-

I got the demo version at Networld+InterOp.

[SNIP]

This is not a criticism of the software.  However,
you cannot rely on a port scanner alone.  I know for a fact that the 
version
of sendmail I was running at the time had the usual buffer overflow 
problems,
and the ISS Web Security Scanner did not detect that.  I did not really
expect it to, as my version of sendmail was quite recent, and the CERT
bulletins etc had just gone out.  (Sendmail 8.7.5, for those who are 
curious).

=-=-=-=-=-
Relying on a port scanner alone would be foolish.  It does, however, help a 
great deal in finding things that you might have otherwise missed.  Taking 
the same route that an attacker might is always prudent, if only for 
scanning "just in case" you missed something.

Re: Sendmail.  The latest, 8.8, is vulnerable.  The vulnerability was 
posted to bugtraq and BoS on the 17th.  I believe that we are working on 
adding this test to our latest version of the Intranet Scanner software (I 
don't know off-hand when you will be able to download a version that will 
include this check, though. Check the web site periodically).

We are trying to add new bugs as they come out.  We can't get every one, 
but we generally release new versions with new bug checks after a number of 
bugs have been added (say 4 or 5) so we don't have to add new versions to 
the web site every other day!

Later,

Alex F
alexf@iss.net
webmaster/security training


home help back first fref pref prev next nref lref last post