Open Source for Perimeter Security @ JDJ

779 篇文章 0 订阅
<script type="text/javascript"> </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
<script type="text/javascript"> </script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>

  Does the Open Source community provide world-class Security technology? Can organizations stop dealing with commercial vendors for Security software?

  To avoid any undue suspense, the answers are: "Emphatically yes" and "Maybe, but you probably need to make an investment of some kind." But let's take a look at the evidence - this article references two Open Source projects: netfilter and Snort.

  Escalating ChallengesFirst, it's clear that the challenges related to Security are escalating. Outbreaks of viruses and worms are becoming more virulent and spreading faster. Blended threats and application-specific attacks are becoming more sophisticated and harder to detect. Wireless communications, instant messaging, and peer-to-peer networks are Opening new holes in corporate defenses. Top management is taking a sudden and unaccustomed interest in IT Security. Yet IT departments are not getting additional reSources to meet these growing pressures.

  Innovation in Open SourceHow can the Open Source community help? Clearly there is a terrific surge of innovation in the field of IT Security coming from Open Source developers and the supporting infrastructure of Linux- and Open Source-related organizations, Web sites, and publications.

  A search on the word "Security" on the freshmeat Web site (http://freshmeat.net) turns up more than 1,200 entries (see Table 1).

  Security Advantages of Open SourceThere is a lively discussion about the virtues of Security applications on Linux versus Windows, and of Open Source projects versus proprietary software.

  There is no doubt that today there are far more worms and exploits on Windows-based systems than on Linux-based products. It is not certain if this is simply because the larger number of Windows systems makes a more inviting target for hackers, or if the architecture of Linux is inherently more resistant to attack.

  There is a strong case that Linux does have structural advantages for Security. for example, at Astaro we have stripped out elements of Linux that are not needed for our Security package. This removes many vulnerabilities that a hacker could use to attack a more complex version of the operating system. Performing this kind of pruning would be far more difficult with Windows.

  A more important factor, however, is the fundamental development process used for Open Source projects.

  for major projects, code is rigorously examined and exhaustively tested by hundreds of individuals - far more than even the largest commercial vendor can bring to bear on a single product.

  The pace of learning and improvement is also much faster than would be possible in a typical commercial setting. Vulnerabilities are exposed more quickly, and solutions developed and tested more readily.

  Perhaps most important, in the Open Source world it is impossible to hide or downplay Security vulnerabilities. The Open Source development process harnesses human nature to ruthlessly expose and eliminate weaknesses, rather than to deny mistakes or delay remediation.

  Myths About Open Source DevelopmentThere is a widespread and wholly inaccurate impression that Open Source development is somehow haphazard and undisciplined, a free-for-all among brilliant but uncoordinated individuals. In fact, most major Open Source projects are very tightly managed by a small, highly disciplined core team. This team determines the architecture of the software, selects the code to be included, and manages all phases of the development process. It enforces strict Source control processes, and establishes detailed coding styles and Security guidelines.

  Critical mass in the Open Source world comes from the dozens, hundreds, or even thousands of developers who examine and test existing software and submit new code. These developers provide the quantity of inspiration, innovation, and plain hard work that is impossible to duplicate in a commercial setting. However, the core team is always there to coordinate the work of the masses and select the best work to include in the primary branch of the software.

  An Example: The netfilter ProjectAn excellent example of a cutting-edge Open Source effort is the netfilter project (www.netfilter.org). This is a Linux-based packet filter that features stateful firewalling, Network Address Translation (NAT), load balancing, and other kinds of packet mangling.

  The project was founded in 1999 in Australia and has now grown to more than 100,000 lines of code contributed by over 700 developers. There are currently about 300 active developers submitting about 1,400 postings a month to the development mailing lists.

  The netfilter project is managed by a core team of 4 members who winnow down the submissions to an average of 65 code improvements and fixes per month.

  This is an excellent illustration of the principles we've been discussing - an effort that utilizes the contributions of hundreds of developers, working on a project they love, managed by a small and disciplined core team.

  Limitations of Open SourceOpen Source projects are an outstanding Source of world-class Security technology, but they are not a panacea for developers or IT managers who need to deploy reliable, manageable software in a real-world production environment.

  The Open Source community is driven by technical enthusiasm, not commercial needs. While most Open Source developers understand the requirements of IT departments very well, they cannot reasonably be expected to donate their free time to working on mundane management issues.

  As a result, Open Source projects provide brilliant, innovative solutions to fundamental problems, but ease of use and ease of management are typically afterthoughts.

  This tendency can manifest itself in several ways: command-line interfaces or less-than-intuitive GUIs, lack of documentation and help facilities, highly manual methods to update software and threat signatures, and limited reporting capabilities. These shortcomings are minor for the highly skilled developer who enjoys digging into a new piece of technology, but they are fatal for the systems administrator or IT manager who needs to complete a lot of tasks in a short time.

  Beyond the level of the individual Open Source project, there is no incentive to integrate separate packages into what an IT manager would view as a complete solution.

  While all Open Source code is available for inspection, that does not mean that all of it is inspected with equal thoroughness. Many eyes will view the technically exciting parts, but the environment does not lend itself to saying: Will you please review and test the boring parts?

  Finally, support options are limited for most Open Source software.

  Harnessing Open Source Software for SecurityHow can organizations harness the explosive growth and innovation of the Open Source community (and its low costs) without suffering from limitations?

  There are basically two choices:

  Allocate sufficient reSources to fill the gaps themselves.

  Let a commercial vendor integrate and support a complete solution based on Open Source components. In both cases the tasks are basically the same:

  Somebody needs to create the interfaces and the documentation to make the tech-nology readily accessible to the typical overworked user or administrator (who is being distracted by a constant barrage of competing demands).

  Somebody needs to set up automated processes to validate settings, patch software, update threat signatures, and back up configurations.

  Somebody needs to create the reports so that the average administrator (who is still distracted and harried) can troubleshoot problems and track trends.

  And if the solution involves multiple components (which is typical in Security), someone needs to integrate the components and do thorough testing to make sure that the pieces work together under all types of hostile conditions.

  An Illustration: Preparing Snort for the Typical AdministratorOne of the most successful Open Source projects is Snort (www.snort.org), a network intrusion detection system. Snort's intrusion detection engine is widely considered to be equal to or better than any vendor-developed alternative, and the project supports a database of more than 2,000 intrusion detection rules.

  However, the Snort technology in its raw form is much better suited to a highly trained Security specialist than to the average systems administrator. Configuring the system and the large number of rules requires a fairly high level of expertise, not to mention a lot of time. Updating the rule set on a regular basis is also a time-consuming manual process.

  About a year ago Astaro decided to utilize the Snort project as the core of a new "Intrusion Protection" module of our Linux Perimeter Security solution (see Figure 1). However, to fit the software to the needs of a typical administrator, we had to add quite a bit of functionality. for example, we:

  Created a user interface that made it simple to turn intrusion detection rules on and off either individually or in categories relating to different applications and protocols (so, for example, if a particular application or protocol is not in use at a site all of the related rules could be turned off for better performance)

  Modified the automated update service so that new intrusion threat patterns could be added with the same process that updates the firewall software and virus signatures

  Integrated the intrusion detection engine with our firewall so that the firewall could immediately block intrusions (and modified the user interface mentioned above so that the administrator could toggle back and forth between "intrusion detection" and "intrusion prevention" for each rule)

  Removed some of the functionality from the Open Source project by eliminating some of the intrusion detection rules that we felt would cause too many false positives or slow down per-formance without providing a measurable benefit to Security If you want to make this comparison yourself, you can download a free version of Astaro Security Linux at https://my.astaro.com/download and download the Snort code from www.snort.org/dl.

  A Two-Way StreetCommercial companies who utilize Open Source projects must make significant contributions back to the community, such as funding projects and developers and making versions of proprietary software available at no cost. It's also important to adhere to the various Open Source licensing rules, for example, by publishing any changes made to the project code. These activities make commercial companies active contributors to the growth and success of the Open Source movement.

  Open Source: Leverage the Pros, Ditch the ConsLet's come back to the questions we posed at the beginning of this article:

  Does the Open Source community provide world-class Security technology?

  Can organizations stop dealing with commercial vendors for Security software? The answer to the first question is clearly yes. In fact, we would argue that the best Security technology in the world today is being created by the Open Source community. The level of expertise, and the number of contributors to Security-related Open Source projects, is truly incredible. And as we discussed earlier, Open Source development processes are well organized and disciplined.

  The answer to the second question is: maybe, but you probably you need to make an investment of some kind:

  You can use Open Source Security projects "out of the box" if you have a high skill level, a tolerance for rough edges, and no need to rely on less dedicated coworkers.

  Your organization can commit reSources to adding management features, integrating components, and providing support so that the technology can be utilized by your average administrator.

  You can work with a vendor who integrates and packages Open Source projects for a commercial audience. In all three of these cases you can take advantage of a very dynamic Source of sophisticated technology at a total cost that is significantly lower than traditional Security packages. This is truly an area where everyone can win.

<script type="text/javascript"> </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
<script type="text/javascript"> </script><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值