[435] in Intrusion Detection Systems

home help back first fref pref prev next nref lref last post

Re: Good logging and real-t

daemon@ATHENA.MIT.EDU (Doug Hughes)
Mon Nov 27 06:08:52 1995

Date: Fri, 24 Nov 1995 15:00:32 -0600 (CST)
From: Doug Hughes <doug@Eng.Auburn.EDU>
To: ids@uow.edu.au
In-Reply-To: <Pine.LNX.3.91.951123190904.3487B-100000@bach.cis.temple.edu>
Reply-To: ids@uow.edu.au

On Thu, 23 Nov 1995, Alexander O. Yuriev wrote:

> On Tue, 21 Nov 1995, Doug Hughes wrote:
> 
> >  Bypasses are certainly possible. However, the intruder would have to gain
> > access, become root, somehow login to the remote restricted access machine
> > (which by the way has rlogin, telnet, rexec, and shell stuff turned off)
> > kill the program watching the logs (which would certainly make it disappear
> > off the screen) and then restart it, all without the user noticing, and with
> > 5 seconds..
> 
> You have just assumed something that  you should not assume i.e. that in 
> order to bypass your system intruder need to penetrate trusted host. If I 
> am an intruder I am can attempt quite successfully perform attack against the 
> syslog protocol instead of attempting to take over the trusted system.
> 
> 
Oh no, I don't make that assumption at all. However, the only known 
attack (to me) on syslog is to flood the syslog host with syslog information.
Since the watcher is showing the logs, I think it would difficult not
to notice the program going nuts displaying information of little value
over and over and over again. (to me that spells dead give-away, batten 
hatches)
The only other way would be actually pluck syslog packets off the wire.
If you can do this, you're already root, and hopefully would have been
caught via another trap/log.

Certainly it's not perfect, but it's a useful tool. 
____________________________________________________________________________
Doug Hughes                                     Engineering Network Services
System/Net Admin                                Auburn University
                        doug@eng.auburn.edu
                Pro is to Con as progress is to congress

home help back first fref pref prev next nref lref last post