[5018] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

RE: ROBOTS

daemon@ATHENA.MIT.EDU (DeepSummer-HomeofWebSiteDesignsExt)
Thu Apr 10 13:58:35 1997

From: Deep Summer - Home of Web Site Designs Extraordinare
	 <frank@deepsummer.com>
To: Deep Summer - Home of Web Site Designs Extraordinare
	 <frank@deepsummer.com>,
        "'Matthew Studley'"
	 <matthew.studley@bt-sys.bt.co.uk>
Cc: "www-security@ns2.rutgers.edu" <www-security@ns2.rutgers.edu>
Date: Wed, 9 Apr 1997 03:15:40 -0600
Errors-To: owner-www-security@ns2.rutgers.edu


    Well, personally I make my number one defence a goal
    of never leaving anything susceptable to security
    violation in any place that gives it that susceptablity
    state unless absolutely neccesary.

    My next step would be putting up enough of a defense to
    make it difficult for any evil agents. Sort of like the
    front door philosophy - if someone really wants to
    break in bad enough, the standard front door is not going
    to stop them - even if you have no windows.

    Finally, for extremely sensitive data that absolutely
    has to be accessible via the net, I'd post questions
    to this newsgroup asking for suggestions. The reason?
    Well, quite frankly, I've not yet had the need to have
    anything that sensitive online. You could wipe out my
    entire site right now and I'd have it back online in
    a matter of about an hour or two, and nobody would have
    been hurt in the process because no sensitive data is
    there. I guess I just insinuated the notion that backing
    up one's data is a good thing. I mirror, 100%, everything
    I do for myself and others, on a local non-net-accessible
    storage device. That's obviously not a solution for
    everyone, however.

    That's one reason I joined this list, though - I'm wanting
    to try and become more 'security knowledgable'. As it
    stands, I now use only basic authentication for areas I
    prefer keeping away from all eyes, but, my understanding
    of basic auth (even the HTTP/1.0 RFC mentions this) is
    that it's not a security solution. Perhaps said, it's more
    of a detterant and a way to have a little bit of control
    over your data.

    I'd be curious to see responses to your query from others
    on this list whom I know are a hundrefold more security
    knowledgeable than myself. That would be good reading for
    me as well.

    Sincerely,

    -frank

----------
From: 	Matthew Studley[SMTP:matthew.studley@bt-sys.bt.co.uk]
Sent: 	Wednesday, April 09, 1997 3:52 AM
To: 	Deep Summer - Home of Web Site Designs Extraordinare
Cc: 	www-security@ns2.rutgers.edu
Subject: 	RE: ROBOTS

Hi,

you (Frank - 'Deep Summer') wrote;

>However, I think the main issue (it's fading) was to
>do with how well robots.txt files work. For benevolent
>bots, my logs indicate that robots.txt works wonderfully.
>For evil bots (remember Arnold? Okay, so he was a
>cybernetic organism...) there are other ways of dealing
>with security that have nothing at all to do with
>robots.txt. 

I'm working in a field connected with mobile agents.  Obviously, they (will)
present a whole load of security problems; hopping from machine to machine,
making decisions about their next destination, changing their internal state
(could be goal-related learning, could be viral infection).

As a starting point, can I ask you what methods you'd use to deal with today's
naughty bots?  I admit, there's little similarity between repeated requests
from a distant site and tomorrow's malicious agent, but.....

Cheers,  Matt. 

BT Labs, UK.




home help back first fref pref prev next nref lref last post