1428 lines
45 KiB
Plaintext
1428 lines
45 KiB
Plaintext
|
|
Episode: 528
|
||
|
|
Title: HPR0528: Bordless Networking
|
||
|
|
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr0528/hpr0528.mp3
|
||
|
|
Transcribed: 2025-10-07 22:33:45
|
||
|
|
|
||
|
|
---
|
||
|
|
|
||
|
|
MUSIC
|
||
|
|
Right, before we start, one thing I hate about this place is when half way through
|
||
|
|
I was really, really good question at the end, I don't know how many of it was.
|
||
|
|
So, if you've got any comments or questions, or your name is Rick or Adam, just feel free
|
||
|
|
to interrupt any point during the talk.
|
||
|
|
Also, if you have a student in the wrong place, I was going to introduce myself, I think
|
||
|
|
you all met me before, haven't you, so, I'm Robert Leidman, fire the way, hello, I run
|
||
|
|
a small IT business, we do QA, and it's Dave Tektor, and it's right software, that's
|
||
|
|
what I think.
|
||
|
|
And you're a media guy, aren't you?
|
||
|
|
Indeed, yes.
|
||
|
|
Teotart, as I've got it.
|
||
|
|
Now, one I'm about to talk about tonight is what I define as borderless networks, OK, or
|
||
|
|
borderless networking.
|
||
|
|
It's not necessarily what I'm going to agree with, but that's the term I'm going to use.
|
||
|
|
So, you start with it.
|
||
|
|
It's only a brief overview.
|
||
|
|
It's not going to be massively technical, but what I'm going to do is to dispel some of
|
||
|
|
the misconceptions, because there's a lot of populars being spoken about out there in
|
||
|
|
the blogs, give a rough out when it means, or what its approach is, I'll try and contrast
|
||
|
|
it with the current sort of classic approach to networking, and show you really where the
|
||
|
|
differences are.
|
||
|
|
First of all, you're telling what it's not, OK, what it's not called into me anyway.
|
||
|
|
It doesn't mean just joining up with the customers and suppliers.
|
||
|
|
This is really what Cisco will make you believe it is if you go to their site.
|
||
|
|
They're really viewing it as the borderless network, really means a sort of absorbing of
|
||
|
|
your customers' networks, and to you, I wasn't having a border between the two.
|
||
|
|
It sort of is that, but that's not the real reasons for doing it.
|
||
|
|
It's one of the reasons, the thing called the Jericho Forum, which I'll talk about later.
|
||
|
|
Came together, but that's not really what it is.
|
||
|
|
That's the sort of Cisco view, and it also isn't about joining VPNs if you've got distant
|
||
|
|
offices from the company joining all together and having a borderless network, so if you're
|
||
|
|
in one site, it feels like you're in the other.
|
||
|
|
That's also what you do, but it isn't the real reason for it.
|
||
|
|
The big misconception about it is that borderless means you're going to throw away your
|
||
|
|
firewall.
|
||
|
|
No, you don't.
|
||
|
|
You're just going to get rid of it and put your machines out on the raw internet.
|
||
|
|
That's the criticism you'll come across of it out there in the blogs, which is, oh, yeah,
|
||
|
|
that's what the Jericho Forum are talking about.
|
||
|
|
That's what borderless network is, and that's actually what borderless network isn't at all.
|
||
|
|
It's nothing to do with that, OK, and it's a really major misconception.
|
||
|
|
The main reason for that is that some of the marketing material from the people promoting
|
||
|
|
borderless networks can be summed up in one line, and they ask a question which is, could
|
||
|
|
you, in theory, operate your entire network if it were on the internet, and there was
|
||
|
|
you would take all the components of your network and put the various places on the internet?
|
||
|
|
Would you still be able to run securely your network like that?
|
||
|
|
They're not proposing it, but that's what people have picked up and think is happening.
|
||
|
|
The idea is that you should be able to have secure enough devices to act and be able
|
||
|
|
to do that in the idea, well, not there yet because of the capabilities or lack of capabilities
|
||
|
|
and machines.
|
||
|
|
It's actually happening now, whether you like it or not.
|
||
|
|
If you go to weather spoons or McDonald's and take your little Wi-Fi phone, you don't
|
||
|
|
drag your firewall in your perimeter into weather spoons with you, you sort of take it on
|
||
|
|
trust that the weather spoons network, then in the counting house, okay, Chris doesn't
|
||
|
|
get it.
|
||
|
|
We know that Chris would break it, but you don't really take it on trust that it's going
|
||
|
|
to be okay, but you're not taking your entire network with you.
|
||
|
|
So this criticism of it in the blogs is actually not reflecting what people do.
|
||
|
|
They wander around with devices in their pockets at the time that are attaching to networks.
|
||
|
|
Now, the other way, I don't know if you're fortunate enough, it's each time.
|
||
|
|
Don't start.
|
||
|
|
No, until I come to that later, actually the answer to that is sort of no and sort of yes,
|
||
|
|
but you should have nice now.
|
||
|
|
So, okay, fascinating is all that was probably what the hell is all of this network, okay?
|
||
|
|
Well, the idea really is that you should recognize that your network perimeter, if you like,
|
||
|
|
is, has been or will be penetrated, okay, you can take your pick out of that, really.
|
||
|
|
That's what it means.
|
||
|
|
It means you should treat your internal network as a hostile network, as hostile as the raw
|
||
|
|
internet, okay, because even if it isn't now, chances are it will be in future or it may
|
||
|
|
well already have been compromised, you just don't know.
|
||
|
|
You know, something goes for this network in here, you have no idea whether the university's
|
||
|
|
network is inherently secure, you might have a clue that it might not be, but you have
|
||
|
|
no idea what other devices are out there looking at you monitoring what you do.
|
||
|
|
So, you should treat your own network in the same way, because if it's compromised and
|
||
|
|
you don't know, it's the same type of network.
|
||
|
|
So, in effect, what we're trying to do is secure every host you have, host PC or device,
|
||
|
|
or whatever one to call it, against every other host.
|
||
|
|
Now, you may already have heard of this, but it has lots of other names, and the one
|
||
|
|
the Jericho Forum calls it is, de-parimiturization, which really trips off the tongue, and that's
|
||
|
|
exactly the same thing as what I go for with our networks.
|
||
|
|
That's the reason I thought for all the lessons, I had a way easier to pronounce it, de-parimiturization
|
||
|
|
at the time.
|
||
|
|
Now, the Jericho Forum was a bunch of sys admins in large enterprises who got together
|
||
|
|
in formally in 2003 to talk about perimeter erosion or crumbly perimeter, say put it, and they
|
||
|
|
formally came together in 2004 or formed something called the Jericho Forum.
|
||
|
|
Jericho, if you don't know the reference, was a political town, which was believed to be
|
||
|
|
really massively fortified, could be knocked down by anything.
|
||
|
|
Something that came along with the murder trumpets and blew it down.
|
||
|
|
It's not.
|
||
|
|
You know, it's a pretty good reference, really.
|
||
|
|
They basically came together to try and, if we go back to what I said about the Cisco idea
|
||
|
|
of what borderless networks is, to try and get their networks to work together, but still
|
||
|
|
to be secure.
|
||
|
|
Now, interestingly enough, it was a chap at the Royal Mail in the UK who came up with the
|
||
|
|
De-parimiturization in 2001, a chap called John Meachan.
|
||
|
|
I don't like the term primarily because it's hard to pronounce, but more because it seems
|
||
|
|
to imply that you're going to go and pull down the river and you're going to rip out all the
|
||
|
|
things that you've got, de-parimitarize yourself, and expose you and everything you have to
|
||
|
|
the internet, which again is that misconception pointed out earlier.
|
||
|
|
That isn't the guess of what de-parimiturization means.
|
||
|
|
So, really, de-parimitarization and borderless don't cover it.
|
||
|
|
They don't really have the meaning they seem to have.
|
||
|
|
But what you might think is that borderless network and your borderless computing is where you
|
||
|
|
want to get to the de-parimitarization is the process.
|
||
|
|
You know, the verb you're going to use to get there.
|
||
|
|
So, we know what it is.
|
||
|
|
We're going to secure each host and every host against, every other host.
|
||
|
|
To assume we have a host on network even when we're at home.
|
||
|
|
And really, the next thing you want to cover is the current approach, which you can see
|
||
|
|
is this one.
|
||
|
|
It's sort of a classic diagram here.
|
||
|
|
Here's my proof of it from a file.
|
||
|
|
There's the internet.
|
||
|
|
We're all hunky-dory.
|
||
|
|
This is the fortress approach.
|
||
|
|
You know, it's the big castle with the entrance guide by a firewall.
|
||
|
|
And so, often you'll have a DMZ to demilitarize, demilitarize the zone, which is where you
|
||
|
|
put your web service for public access.
|
||
|
|
And the reason for having it with DMZ is...
|
||
|
|
Yeah, because you might compromise your internal network.
|
||
|
|
Well, although there's a big fact clue to a problem.
|
||
|
|
If you're having to put these things outside, that tells you that your internal network is a soft target.
|
||
|
|
Soft and easy.
|
||
|
|
It tells you what the main problem with this is, which is...
|
||
|
|
And you can hold the perimeter as much as you like.
|
||
|
|
But once you're in it, then you're like the classic intrusion horse.
|
||
|
|
Once you're in it, you can let loose the dogs of war because you're past the firewall.
|
||
|
|
Yeah.
|
||
|
|
And every machine after that is allowed to be incredibly easy to penetrate.
|
||
|
|
What you tend to do is view this as an...
|
||
|
|
I mean, inside and outside.
|
||
|
|
Yeah, this is inside us.
|
||
|
|
And that lots of outside the internet.
|
||
|
|
Somewhere else.
|
||
|
|
One thing about the word internet is...
|
||
|
|
It's a joining of two short words.
|
||
|
|
It doesn't mean...
|
||
|
|
For instance, in Gallic, Scots Gallic, the word for internet is ethylion, meaning between nets.
|
||
|
|
But it doesn't mean that.
|
||
|
|
They just say an inter...
|
||
|
|
It's to mean inter...
|
||
|
|
Between.
|
||
|
|
It's short for inter-connected networks.
|
||
|
|
There isn't an us and them.
|
||
|
|
It's all about being inter-connected.
|
||
|
|
And this model really is the us and them mentality.
|
||
|
|
And it's the classic one.
|
||
|
|
The other thing that tends to happen is you tend to harden the perimeter.
|
||
|
|
Harden the firewall as much as possible.
|
||
|
|
You can end up overharming it.
|
||
|
|
So you need to open a port or a number of ports for services.
|
||
|
|
Insolid, your firewall, particularly if you're having a remote administration
|
||
|
|
or you're providing remote services to a partner company or something like that.
|
||
|
|
Or you're wanting to administer your own website or something internally.
|
||
|
|
Now the problem is that immediately compromises that model.
|
||
|
|
Once you open a port in the file, two of the internal machines, basically internal machine,
|
||
|
|
you basically drag that internal machine right to the perimeter.
|
||
|
|
That's what you've done.
|
||
|
|
You're not opening a port into your network.
|
||
|
|
You're dragging that machine right up to the perimeter.
|
||
|
|
And overharming leads to that.
|
||
|
|
The other problem with this is there's certain things that will just go straight through the Skype.
|
||
|
|
Straight out through your firewall, straight back into your firewall.
|
||
|
|
You know that, that's how people love Skype.
|
||
|
|
If you interfere with the way Skype works, it just works its way through all the approach it can.
|
||
|
|
It goes via HTTP, then it tries HTTPS.
|
||
|
|
And so until it can get out and get in,
|
||
|
|
Void usually has to go in and out through your firewall as well.
|
||
|
|
There's an awful lot going to go with that.
|
||
|
|
I know you probably think a lot of Skype is Void, but normal Skype Void, if you like.
|
||
|
|
It is very insecure.
|
||
|
|
And it has to have to pass through a file unit or put the port for it.
|
||
|
|
The other thing is that perimeter depends like this.
|
||
|
|
Often can't defend you against the black hat stuff.
|
||
|
|
Pat stuff that comes in via email.
|
||
|
|
Or comes in from a website.
|
||
|
|
There are programs around that you can install on the file.
|
||
|
|
If you're practicing your connections that can scan an HTTP stream for.
|
||
|
|
Mercius files, viruses and so on.
|
||
|
|
But quite frankly, if someone's going out over HTTPS or SSR, SSH,
|
||
|
|
you can't intercept that by default, by definition rather.
|
||
|
|
You can't sequence it in the stream.
|
||
|
|
So you're stuck there as well.
|
||
|
|
The other thing is that I am guilty of this.
|
||
|
|
There's anyone here who actually worked on my application.
|
||
|
|
No, that's good.
|
||
|
|
I could actually just pretend I'm watching.
|
||
|
|
But I'm quite guilty of this.
|
||
|
|
The attitude we're safe because we're behind the firewall can lead to slack application design.
|
||
|
|
I've been good to this.
|
||
|
|
Most of my customers have run my software internally.
|
||
|
|
And because of that, you don't build in certain safeguards that you would for an externally facing application.
|
||
|
|
You maybe don't bother with only three attempts for entering it.
|
||
|
|
Application, because as far as you're considering, you're considering as safe inside the file.
|
||
|
|
Well, you're considering all the staff are safe inside the file.
|
||
|
|
So that's the other thing.
|
||
|
|
You can induce a false sense of security.
|
||
|
|
Now, the other thing with this is it's really too dimensional.
|
||
|
|
Which was fine when you had dialed on that with your connection to the internet.
|
||
|
|
But if you take it and turn it this way, you can see that it can be compromised quite easily by newer devices, if you like.
|
||
|
|
If you consider a handheld device with, say, 3G, GSM and Wi-Fi.
|
||
|
|
Black with your wall.
|
||
|
|
And I thought it would have some new device or a current device.
|
||
|
|
But you are required by your company to connect to the internal network when you're there.
|
||
|
|
Via Wi-Fi, say.
|
||
|
|
If, in some way, it's compromised so the connection can come in over 3G.
|
||
|
|
The access to the internal network is through a completely new dimension.
|
||
|
|
Your firewall is not only not capable of stopping it.
|
||
|
|
It's not even aware of it.
|
||
|
|
It's living in flat land and all these other connections that come in through this other dimension.
|
||
|
|
So that's a three-dimensional view of the network.
|
||
|
|
Nothing you do far from the Peru to there is going to change that.
|
||
|
|
You could try holding the equivalent, but let's face it, the new technology comes along when you're struggling again.
|
||
|
|
I'm not even talking here about ROG, which gives you another insight as well.
|
||
|
|
ROG Wi-Fi points.
|
||
|
|
You know, it's stored on the network.
|
||
|
|
It's supposed to give you something.
|
||
|
|
Well, there are several ways that you do that.
|
||
|
|
Do you have any rules in access points?
|
||
|
|
Yes, I do.
|
||
|
|
There are several ways that you can turn into access points.
|
||
|
|
And I believe there's a new way to do that.
|
||
|
|
Well, indeed.
|
||
|
|
I mean, I've also got Zora such a little tiny line.
|
||
|
|
It's the device you can run.
|
||
|
|
You can post that being on there.
|
||
|
|
I can walk around for building with something which is smaller than another book in my pocket.
|
||
|
|
It's a Wi-Fi point, you know.
|
||
|
|
So, but again, you can see that our model has gone really,
|
||
|
|
which you should be thinking inside of different terms.
|
||
|
|
So that's my criticism, if you like, of the current situation.
|
||
|
|
So, you know, what's the big news?
|
||
|
|
What's a borderless, how is this supposed to help?
|
||
|
|
Well, if you think that this model really is the fortress model, big world, everything inside is safe.
|
||
|
|
The borderless model is more of a hotel.
|
||
|
|
You can wander a liberty through the bar and the public areas, but every room has got to lock on the door.
|
||
|
|
You can invite your customers into the bar, that's not a problem, but your room's locked.
|
||
|
|
So the model there is the hotel room, if you like.
|
||
|
|
You might still have a great big wall around the outside as well, protected from the normal threats.
|
||
|
|
There is no need to discard your current file, if necessary, and that again, as I said, is a misconception.
|
||
|
|
But what you're going to do is to bring the perimeter in and multiply it to each device, each host on your network.
|
||
|
|
So that each host is protected from every other one.
|
||
|
|
The other thing that does, the tends to is drop the inside versus outside idea.
|
||
|
|
You know, we're inside the network, we're outside the network.
|
||
|
|
And, you know, when you leave your hotel room, you're outside the room.
|
||
|
|
And that also intends to be getting so-called inside or attacks, attacks.
|
||
|
|
Because if every host is protected from the other, then an inside or attack is actually no different than an outside or attack,
|
||
|
|
and you're already protecting and you don't sit.
|
||
|
|
This one, it sounds like it's just for corporates, you know, the big labs and all the rest of it.
|
||
|
|
But it's not about the perimeter, it's about the perimeters.
|
||
|
|
So it's about a perimeter on everything, a device you've got.
|
||
|
|
So even if you're at home, the principle is that if at home you've got a PC and a small network,
|
||
|
|
you know, you're behind a router and you've got a network, maybe an iPhone or whatever else.
|
||
|
|
The idea is that when you're out to your network, you would protect it while it's on the Wi-Fi network and so on.
|
||
|
|
The idea is when you come home to your Sage network, you continue to use an encrypted communication method
|
||
|
|
to share your files with your PC, you took your local network as if it were a hostile network.
|
||
|
|
The underlying idea is that that should be a one-granting solution, very simple.
|
||
|
|
Now, you asked me for about SS every client should have an SSH, every device should have an SSH client on it.
|
||
|
|
The idea is more to use it, which is a level 3 protocol in the other side of the network.
|
||
|
|
SSH, SSL, it's on a level 4.
|
||
|
|
So if it's done at level 3, it's pretty much transparent to you.
|
||
|
|
You haven't got to harden your applications to really done at that level.
|
||
|
|
You haven't got to use SSH because your cons are already encrypted.
|
||
|
|
So the idea is that when you come home to your own network, it just assumes that it's a hostile environment that carries on working that way.
|
||
|
|
So when there's a borderless network, they mean treat your network or de-parameterization.
|
||
|
|
They mean treat your network as if the border wasn't there, not to get rid of it.
|
||
|
|
Again, it's not about throwing out the file, it's just about treating everything as having a perimeter and bringing that perimeter closer to you.
|
||
|
|
The idea is to harden each device, to protect each device, not just the network, and to protect the data on the device.
|
||
|
|
Because there's always the ethical hack, so you're probably going to disagree, which is fine.
|
||
|
|
I thought I'm talking so you can just be quiet.
|
||
|
|
There's two types of attack.
|
||
|
|
There's vandalism and data theft, if you like.
|
||
|
|
And I would say to you that all the rest are just subsets of that.
|
||
|
|
Now, the black hacks know their product.
|
||
|
|
And if you're a black hack, you know your product when you're not vandalising.
|
||
|
|
You want email, account details, personal information.
|
||
|
|
So you need to secure the device and the data on the device.
|
||
|
|
That means encryption, encrypting your hard disk and so on.
|
||
|
|
That's what hardening your device means.
|
||
|
|
Now,
|
||
|
|
the other aspect of that is if you're running a hardened bunch of devices on your network,
|
||
|
|
and someone reads another device in, is you may need to have automated standards for what can and cannot connect to your network.
|
||
|
|
You don't want it for someone to bring in a device that compromises everything else.
|
||
|
|
So there are packages out there that can do that for you.
|
||
|
|
They are more geared towards the corporate and so on.
|
||
|
|
But the idea is, the overall idea of the borderless network,
|
||
|
|
is that it should be as difficult to compromise individual machines inside the network
|
||
|
|
as it is to puncture the perimeter.
|
||
|
|
So instead of this, I can get through the perimeter and then all your network is belong to me.
|
||
|
|
When you get in, you find it's just as hard.
|
||
|
|
Now, there are problems with this.
|
||
|
|
Each device needs management.
|
||
|
|
What's new?
|
||
|
|
Yes, you have to manage your devices most of the time anyway.
|
||
|
|
When I discussed this with a couple of you before last week,
|
||
|
|
the comment I got was, well, if you go in this room,
|
||
|
|
then every user is going to have to manage their local firewall settings
|
||
|
|
and deal with their own antivirus and so on.
|
||
|
|
Welcome to the world of windows, really.
|
||
|
|
It's already happening, really.
|
||
|
|
It's, you know, the perimeter is already getting eroded and so on.
|
||
|
|
You do wonder when you look at the windows as now taking,
|
||
|
|
which is you have an onboard firewall for all the time,
|
||
|
|
as opposed to Ubuntu, where when you install it,
|
||
|
|
you haven't got firewalls, am I correct?
|
||
|
|
That's what happened to you when I installed Ubuntu.
|
||
|
|
There's no firewall installed. You have W.
|
||
|
|
Or if it's installed, it's not running.
|
||
|
|
It's installed when I'm running.
|
||
|
|
When I looked up why, the reason was because we're not running any services
|
||
|
|
that are vulnerable.
|
||
|
|
Right?
|
||
|
|
Okay, I have many comments to make about that,
|
||
|
|
but at least nowadays, and I know windows was like that before,
|
||
|
|
but now you can look up the windows and show you first,
|
||
|
|
you first switch it on, and it does really take this approach
|
||
|
|
to a certain extent.
|
||
|
|
You still have the network neighborhood and so on,
|
||
|
|
you know, that's really perhaps a model we should look at
|
||
|
|
more of the Linux people.
|
||
|
|
You know, they know it's assumed that the windows machine
|
||
|
|
is easily compromised, but the assumption about the Linux machine
|
||
|
|
is it's not, but perhaps what we should do is actually
|
||
|
|
be turning the Linux to the other way around,
|
||
|
|
which is start assuming we're just as vulnerable.
|
||
|
|
We haven't been hit yet.
|
||
|
|
I know all the other arguments about no viruses,
|
||
|
|
but it's just an approach we can take.
|
||
|
|
The other problems with the borderless network
|
||
|
|
is avoid really spoils public.
|
||
|
|
You know, it's not secure.
|
||
|
|
It's a lot more work to do with it.
|
||
|
|
It's a bit disappointing, really, if you look at somehow,
|
||
|
|
like Asterisk, okay, it has, you know,
|
||
|
|
runs with avoid criticals on the rest of it,
|
||
|
|
but there's nothing really there to avoid that's designed
|
||
|
|
for real security.
|
||
|
|
There are some certificate things you can do for deploying
|
||
|
|
to device this, but it's more about controlling
|
||
|
|
the distant device that wants to contact you
|
||
|
|
rather than inherent security.
|
||
|
|
But the other one is printers.
|
||
|
|
Your average printer has no facilities
|
||
|
|
of whatsoever for secure communication.
|
||
|
|
Absolutely not.
|
||
|
|
You might not think that's much,
|
||
|
|
but if I capture the post script,
|
||
|
|
streaming is going to your printer
|
||
|
|
from where you're printing.
|
||
|
|
I haven't actually got to do much work to see it.
|
||
|
|
I actually wanted to do two things.
|
||
|
|
I can print it up on my post script printer.
|
||
|
|
Or I can just view it in ocular KPDF.
|
||
|
|
Don't be angry about it on a few post script files.
|
||
|
|
You know, that's a pretty good way of getting information out
|
||
|
|
of the other thing as well as the higher end machines
|
||
|
|
actually have a memory,
|
||
|
|
and then we can often store the,
|
||
|
|
the red dots, you know,
|
||
|
|
make up for the memory.
|
||
|
|
Thanks very much.
|
||
|
|
Or just work my way into the printer and feel stuff out.
|
||
|
|
You know, so...
|
||
|
|
Sorry.
|
||
|
|
Have we ever in the website?
|
||
|
|
Yeah, I know.
|
||
|
|
The last three printers I've all had
|
||
|
|
have their own little web server inside.
|
||
|
|
They're not, you don't talk to the virus,
|
||
|
|
you can't talk to them via HTTPS.
|
||
|
|
So it's compromised your borderless model straight off.
|
||
|
|
It can stack them on the back of a cuck server
|
||
|
|
and use that security.
|
||
|
|
But even so, you know,
|
||
|
|
there are problems with this borderless approach.
|
||
|
|
Room.
|
||
|
|
Hangheld devices.
|
||
|
|
Now, they are often insecure.
|
||
|
|
Particularly because they tend to be closed.
|
||
|
|
It's a closed device.
|
||
|
|
You can't review it.
|
||
|
|
You can't patch it yourself.
|
||
|
|
Look at the iPhone.
|
||
|
|
There was an iPhone route kit a few months ago,
|
||
|
|
which went through all the jail broken iPhones.
|
||
|
|
Yeah, but didn't.
|
||
|
|
And, you know, that's a similar sort of thing.
|
||
|
|
That's a device that...
|
||
|
|
That's what we're all used to.
|
||
|
|
That's what we're all used to.
|
||
|
|
That's what we're all used to.
|
||
|
|
But it could be done.
|
||
|
|
So, if it had been an open system,
|
||
|
|
it's possible it could have been patched.
|
||
|
|
But regardless whether it was jail broken or not,
|
||
|
|
again, it's a possible compromise of your network, you know.
|
||
|
|
And the other example I've got at home is a...
|
||
|
|
UT StarPomage 3000 Wi-Fi phone.
|
||
|
|
It's about 2005.
|
||
|
|
I was studying Aaron this earlier on.
|
||
|
|
And it's a little Wi-Fi phone.
|
||
|
|
It connects the VoIP.
|
||
|
|
It connects the little envelope.
|
||
|
|
You know, Wi-Fi point seems great.
|
||
|
|
Unfortunately, if you look it up,
|
||
|
|
you find it's got an unpass worded.
|
||
|
|
Unuser named RLogin prompt on it.
|
||
|
|
You can go straight on the VoIP
|
||
|
|
to a VX work shell on the machine.
|
||
|
|
Okay?
|
||
|
|
And the VX works.
|
||
|
|
Let you then modify and look around and see what packets
|
||
|
|
are flying past this little tiny device.
|
||
|
|
Yeah.
|
||
|
|
I only found that out having had the phone for two or three years now
|
||
|
|
because I was looking up the information for this.
|
||
|
|
And I thought I would just check the phone.
|
||
|
|
Sure enough, it was listed with a whole load of other devices
|
||
|
|
that you just got.
|
||
|
|
It doesn't sound like much.
|
||
|
|
But once you're seeking your network,
|
||
|
|
it registers with a VoIP server.
|
||
|
|
Remember, say the VoIP
|
||
|
|
is a party, yeah.
|
||
|
|
If you couldn't get on to the device easily,
|
||
|
|
you could use the VoIP server to pass commands back
|
||
|
|
to the phone and get it to do some nasty things
|
||
|
|
on the emotions-safe network.
|
||
|
|
And it also rather spoils the borderless network party,
|
||
|
|
so I said.
|
||
|
|
Lastly, the other criticism of it is,
|
||
|
|
yeah, what if it goes wrong?
|
||
|
|
Well, you know, your network,
|
||
|
|
it's all compromised.
|
||
|
|
Well, guess what?
|
||
|
|
That's where we are now.
|
||
|
|
Yes?
|
||
|
|
If you're not doing it,
|
||
|
|
that's the sake of your network now.
|
||
|
|
As soon as they command you,
|
||
|
|
fireball, that's you.
|
||
|
|
You're open to it.
|
||
|
|
Now.
|
||
|
|
I talked about the Jericho forum,
|
||
|
|
they came up with some rules.
|
||
|
|
There's 11 of them,
|
||
|
|
so it must be really good.
|
||
|
|
Because it goes all the way up to 11.
|
||
|
|
And it's all full of corporate stuff,
|
||
|
|
honestly.
|
||
|
|
But the ones I put in bold here,
|
||
|
|
you know, devices at locations must communicate
|
||
|
|
using open and secure protocols.
|
||
|
|
That's really interesting, these corporate types,
|
||
|
|
they've got to be open,
|
||
|
|
whatever's there's got to be open.
|
||
|
|
All devices must be capable of maintaining their security policy.
|
||
|
|
In other words,
|
||
|
|
any implementation must be capable of surviving
|
||
|
|
with the war internet.
|
||
|
|
Again, that's probably where this misconception comes up.
|
||
|
|
That's what you're going to have to do.
|
||
|
|
I haven't got to do it.
|
||
|
|
What it says is,
|
||
|
|
it should be capable of it.
|
||
|
|
In other words,
|
||
|
|
when you wander into weather spoons in your cases,
|
||
|
|
if you're like,
|
||
|
|
you should confirm your devices
|
||
|
|
if secure as it could be.
|
||
|
|
And data privacy requires a separate version of
|
||
|
|
administrator access,
|
||
|
|
and I'll also be subject to controls.
|
||
|
|
I mean, the problem is,
|
||
|
|
the admin who can do everything.
|
||
|
|
And there are obviously ways to counter that.
|
||
|
|
There's some essay dynamics
|
||
|
|
and app armor,
|
||
|
|
which allow you to prevent root-to-do certain things.
|
||
|
|
Now,
|
||
|
|
those are the commandments.
|
||
|
|
Obviously, they're carrying a biblical reference here.
|
||
|
|
And there's a link for it.
|
||
|
|
There's also a practical guide
|
||
|
|
to implementing it,
|
||
|
|
which is actually quite good.
|
||
|
|
It's actually quite practical as well.
|
||
|
|
There's not sort of,
|
||
|
|
you know,
|
||
|
|
everything would be wonderful if you do this.
|
||
|
|
It's quite practical,
|
||
|
|
and points out in the notation.
|
||
|
|
So, well worth visiting.
|
||
|
|
So, really,
|
||
|
|
there's a question for you as well there,
|
||
|
|
which is a thing about,
|
||
|
|
which is really,
|
||
|
|
you know, where is actually your network perimeter?
|
||
|
|
You know,
|
||
|
|
is it home behind your root-to,
|
||
|
|
or does it also include,
|
||
|
|
you know, your input pocket device?
|
||
|
|
So, to disappoint you,
|
||
|
|
if you're like,
|
||
|
|
a borderless, doesn't actually mean borderless,
|
||
|
|
and deep perimeterisation,
|
||
|
|
doesn't mean deep perimeterisation.
|
||
|
|
But,
|
||
|
|
we're in the community industry,
|
||
|
|
we're used to words,
|
||
|
|
meaning completely opposite to,
|
||
|
|
what they say, you know,
|
||
|
|
is the usual marketing thing.
|
||
|
|
So, that's it for me.
|
||
|
|
I told you it wouldn't be too technical,
|
||
|
|
it wouldn't be too long.
|
||
|
|
But, if you've got any questions,
|
||
|
|
nobody interrupts,
|
||
|
|
I mean, which is,
|
||
|
|
well, a couple of people do.
|
||
|
|
So, if you've got any other questions,
|
||
|
|
then,
|
||
|
|
fire away.
|
||
|
|
I do think it's the way,
|
||
|
|
will it end up going,
|
||
|
|
in some ways,
|
||
|
|
it's drifting gently that way,
|
||
|
|
anyway, you know,
|
||
|
|
if you've got a chance
|
||
|
|
to actually actively do it,
|
||
|
|
well,
|
||
|
|
one thing you mentioned about
|
||
|
|
printer,
|
||
|
|
is this,
|
||
|
|
in America,
|
||
|
|
this
|
||
|
|
flight study council,
|
||
|
|
they had about 2,000
|
||
|
|
computers,
|
||
|
|
sort of viruses,
|
||
|
|
and two,
|
||
|
|
so it all came from
|
||
|
|
a line printer.
|
||
|
|
A printer?
|
||
|
|
Well, that, yeah.
|
||
|
|
Yeah.
|
||
|
|
You know, I'm saying,
|
||
|
|
how could you get to a printer
|
||
|
|
and not find the same thing,
|
||
|
|
you know?
|
||
|
|
Well, again, you know,
|
||
|
|
it's, if they've got
|
||
|
|
web servers on them,
|
||
|
|
you know, it's 10 points down there.
|
||
|
|
If they've got web servers
|
||
|
|
on them,
|
||
|
|
it's just a web server,
|
||
|
|
you know,
|
||
|
|
can you come up on this?
|
||
|
|
It's a library, for example,
|
||
|
|
and doesn't have an Australian
|
||
|
|
password set,
|
||
|
|
which means you can
|
||
|
|
upload a new firmware to it,
|
||
|
|
anyways,
|
||
|
|
which,
|
||
|
|
and if it has a capability
|
||
|
|
of operating a web server,
|
||
|
|
then,
|
||
|
|
if Daniel has a capability
|
||
|
|
of sending and receiving
|
||
|
|
your packet,
|
||
|
|
so you only have to know
|
||
|
|
that,
|
||
|
|
you know,
|
||
|
|
you have to use an
|
||
|
|
analogy, you have to use it,
|
||
|
|
and you can write your own
|
||
|
|
web server that,
|
||
|
|
instead of,
|
||
|
|
whenever something is sent
|
||
|
|
for the printer,
|
||
|
|
it read our excerpt
|
||
|
|
and sends it somewhere else.
|
||
|
|
Well, it did,
|
||
|
|
you just took a copy or foot
|
||
|
|
for your own benefit, yeah.
|
||
|
|
You know,
|
||
|
|
very harmful,
|
||
|
|
or,
|
||
|
|
you know,
|
||
|
|
that's a big,
|
||
|
|
grown-up machine,
|
||
|
|
as it were, you know,
|
||
|
|
it's,
|
||
|
|
it's not only,
|
||
|
|
for example, people,
|
||
|
|
there's,
|
||
|
|
there's HP,
|
||
|
|
and ProCon,
|
||
|
|
so they've got
|
||
|
|
a lot more ProCon
|
||
|
|
for the HTTP printer.
|
||
|
|
And you can
|
||
|
|
overwrite that,
|
||
|
|
write anything you want
|
||
|
|
to the LCD screen,
|
||
|
|
as well.
|
||
|
|
Really?
|
||
|
|
Yes.
|
||
|
|
Yeah.
|
||
|
|
I mean, these,
|
||
|
|
sort of hardware
|
||
|
|
devices,
|
||
|
|
particularly printers,
|
||
|
|
they're not,
|
||
|
|
they don't really think,
|
||
|
|
security.
|
||
|
|
You know,
|
||
|
|
how many of these routers
|
||
|
|
have you got?
|
||
|
|
You can only access
|
||
|
|
them through HTTP,
|
||
|
|
they might say you can only
|
||
|
|
do it through your local
|
||
|
|
network,
|
||
|
|
like,
|
||
|
|
it's the same vertical, for example.
|
||
|
|
Yeah.
|
||
|
|
Because they allow
|
||
|
|
a local access,
|
||
|
|
they don't allow local access
|
||
|
|
but they allow access
|
||
|
|
within something.
|
||
|
|
So that means,
|
||
|
|
as soon as you have access
|
||
|
|
to the local PC,
|
||
|
|
or even,
|
||
|
|
with the web page,
|
||
|
|
you can read our
|
||
|
|
request to the router.
|
||
|
|
Indeed.
|
||
|
|
Well, I've seen,
|
||
|
|
compromised Windows machines,
|
||
|
|
where I've watched
|
||
|
|
the Squid Log go by,
|
||
|
|
and there it is,
|
||
|
|
trying to access
|
||
|
|
all the router
|
||
|
|
default pages in passwords.
|
||
|
|
Yes, Aaron,
|
||
|
|
sort of.
|
||
|
|
You touched on
|
||
|
|
a long, crappy solution,
|
||
|
|
but,
|
||
|
|
in this context,
|
||
|
|
we're talking about
|
||
|
|
we're asking the user
|
||
|
|
to engage in a way
|
||
|
|
that they've never
|
||
|
|
asked them to engage
|
||
|
|
with before.
|
||
|
|
We've set gateways
|
||
|
|
in place of them,
|
||
|
|
and,
|
||
|
|
and almost checkpoints,
|
||
|
|
you,
|
||
|
|
that we push a truck
|
||
|
|
through here,
|
||
|
|
this will add to
|
||
|
|
your security.
|
||
|
|
We will protect you.
|
||
|
|
How do we now go about,
|
||
|
|
redefining the landscape
|
||
|
|
for them now,
|
||
|
|
and saying,
|
||
|
|
now you are in charge
|
||
|
|
of your device.
|
||
|
|
But,
|
||
|
|
and,
|
||
|
|
and I mean,
|
||
|
|
and particularly,
|
||
|
|
like, say the one
|
||
|
|
problem solution,
|
||
|
|
how do we ask,
|
||
|
|
and,
|
||
|
|
Bellman, now,
|
||
|
|
does she really
|
||
|
|
understand why this
|
||
|
|
firewall is saying what
|
||
|
|
it's saying?
|
||
|
|
Yeah, but,
|
||
|
|
you know,
|
||
|
|
it is the question
|
||
|
|
of,
|
||
|
|
I'm sorry.
|
||
|
|
No,
|
||
|
|
well, I'm really there.
|
||
|
|
Yeah,
|
||
|
|
that's a good point,
|
||
|
|
but there,
|
||
|
|
really, as I said before,
|
||
|
|
and,
|
||
|
|
I'm not trying to
|
||
|
|
answer the question,
|
||
|
|
but I think we should look
|
||
|
|
at Windows woods
|
||
|
|
in some ways,
|
||
|
|
ignore XP
|
||
|
|
and all the previous stuff.
|
||
|
|
I know it's hard to do that,
|
||
|
|
but if you look at Windows 7 now,
|
||
|
|
out of the box,
|
||
|
|
everything is switched on,
|
||
|
|
and,
|
||
|
|
and,
|
||
|
|
so is this,
|
||
|
|
and,
|
||
|
|
I was about this issue,
|
||
|
|
or is this something else?
|
||
|
|
A good point now,
|
||
|
|
I'm trying to,
|
||
|
|
yeah, yeah,
|
||
|
|
I understand what you're saying.
|
||
|
|
In some ways,
|
||
|
|
you know,
|
||
|
|
you know,
|
||
|
|
Aunty Thor is actually having to,
|
||
|
|
our Aunty Thor was actually having to do it now anyway,
|
||
|
|
you know,
|
||
|
|
if cousin Jim comes along and says,
|
||
|
|
don't you really need antivirus
|
||
|
|
and norm is really good?
|
||
|
|
She's having to do that anyway.
|
||
|
|
And,
|
||
|
|
at the moment,
|
||
|
|
there isn't any cure for that.
|
||
|
|
Otherwise, you know,
|
||
|
|
we wouldn't normally be repairing
|
||
|
|
our nagas machines
|
||
|
|
when they go on,
|
||
|
|
because let's face it,
|
||
|
|
that's more quiet from now.
|
||
|
|
How we do it,
|
||
|
|
I don't know,
|
||
|
|
as,
|
||
|
|
I know I've said,
|
||
|
|
before,
|
||
|
|
most users need a
|
||
|
|
double-a battery
|
||
|
|
and we give them a nuclear power station.
|
||
|
|
So, you know,
|
||
|
|
I haven't really got an answer to that.
|
||
|
|
But I do think,
|
||
|
|
looking at the way windows now does it,
|
||
|
|
which is where it has a building
|
||
|
|
that is just software tool,
|
||
|
|
and it has,
|
||
|
|
it seems ironic to me,
|
||
|
|
talking about windows
|
||
|
|
and learnings,
|
||
|
|
but it has,
|
||
|
|
the firewall switched off
|
||
|
|
from day one installed,
|
||
|
|
by default,
|
||
|
|
it talks about,
|
||
|
|
it does make the mistake
|
||
|
|
of talking about a local network
|
||
|
|
and a public network,
|
||
|
|
which is wronged,
|
||
|
|
but, you know,
|
||
|
|
by default,
|
||
|
|
the number of things that,
|
||
|
|
that turned on,
|
||
|
|
I think that's the only answer.
|
||
|
|
Yes.
|
||
|
|
Is the situation
|
||
|
|
going on with that?
|
||
|
|
It's not even more
|
||
|
|
extremely well represented
|
||
|
|
than that,
|
||
|
|
as you go up.
|
||
|
|
Extra services,
|
||
|
|
which are outside of the file,
|
||
|
|
but even controlled by your organization,
|
||
|
|
which you're relying on,
|
||
|
|
so, you know,
|
||
|
|
you may have,
|
||
|
|
you know,
|
||
|
|
social networking sites,
|
||
|
|
or, you know,
|
||
|
|
you see,
|
||
|
|
I write a text
|
||
|
|
and stuff,
|
||
|
|
which, you know,
|
||
|
|
it is.
|
||
|
|
Well,
|
||
|
|
obviously,
|
||
|
|
the original Jericho forum
|
||
|
|
came from the big labs,
|
||
|
|
as it were, you know,
|
||
|
|
looking at corporate control,
|
||
|
|
and they tend to have
|
||
|
|
central control.
|
||
|
|
But, the issues
|
||
|
|
that you brought up on,
|
||
|
|
usually already there,
|
||
|
|
anyway,
|
||
|
|
with the current fortress model,
|
||
|
|
but, I do know,
|
||
|
|
you mean, once you've moved me
|
||
|
|
on that,
|
||
|
|
and everyone's gone to the orderless,
|
||
|
|
how are you going to control that?
|
||
|
|
The whole sort of
|
||
|
|
dualist networks,
|
||
|
|
in any way,
|
||
|
|
it's a philosophy
|
||
|
|
to address what's actually
|
||
|
|
happening.
|
||
|
|
Yeah, yeah.
|
||
|
|
I mean, they talk about
|
||
|
|
perimeter erosion,
|
||
|
|
and that's what they're really
|
||
|
|
saying, you know,
|
||
|
|
it's a...
|
||
|
|
And, again, I guess,
|
||
|
|
though, it's like,
|
||
|
|
it seems like it's,
|
||
|
|
uh,
|
||
|
|
acknowledging that,
|
||
|
|
it cannot,
|
||
|
|
it cannot longer have,
|
||
|
|
uh,
|
||
|
|
in fact,
|
||
|
|
controlling what the whole network
|
||
|
|
can have to.
|
||
|
|
It, they talk about that.
|
||
|
|
It makes it,
|
||
|
|
controlling is going to,
|
||
|
|
you know,
|
||
|
|
policy and stuff like that.
|
||
|
|
Yeah, they,
|
||
|
|
I mean, they do use the word
|
||
|
|
policy a lot.
|
||
|
|
It's upward,
|
||
|
|
I use a lot,
|
||
|
|
because it has too many meanings,
|
||
|
|
um, they talk,
|
||
|
|
they call it end-to-end encryption,
|
||
|
|
but I would actually say,
|
||
|
|
what they're talking about is
|
||
|
|
controlling the data.
|
||
|
|
Not, not necessarily,
|
||
|
|
you think, the device.
|
||
|
|
You know, they do drift into
|
||
|
|
DRM,
|
||
|
|
it's a digital rights management,
|
||
|
|
but not very strongly,
|
||
|
|
but what they talk about is,
|
||
|
|
is it's not just about securing
|
||
|
|
the device,
|
||
|
|
but it's about securing access
|
||
|
|
to the data on the device,
|
||
|
|
um,
|
||
|
|
that being the product,
|
||
|
|
is it whether
|
||
|
|
the black hats want,
|
||
|
|
um,
|
||
|
|
which in some ways
|
||
|
|
deals with that.
|
||
|
|
But what I was also
|
||
|
|
to come away,
|
||
|
|
I think, is the idea that
|
||
|
|
it is someone's
|
||
|
|
personal machine.
|
||
|
|
I mean, like,
|
||
|
|
we have that sort of distinction
|
||
|
|
anyway,
|
||
|
|
and then we have the root,
|
||
|
|
and we have our
|
||
|
|
our users,
|
||
|
|
but usually,
|
||
|
|
distals are focused on the idea
|
||
|
|
that actually there's just one
|
||
|
|
user,
|
||
|
|
it just comes in,
|
||
|
|
it uses root,
|
||
|
|
you know,
|
||
|
|
to administer stuff.
|
||
|
|
Um,
|
||
|
|
but,
|
||
|
|
I think that will have to be
|
||
|
|
more enforced,
|
||
|
|
you know,
|
||
|
|
maybe even to the point,
|
||
|
|
where, in fact,
|
||
|
|
if you don't really
|
||
|
|
control your machine
|
||
|
|
in some ways,
|
||
|
|
it's,
|
||
|
|
Tim.
|
||
|
|
Um, I was just wondering,
|
||
|
|
I mean,
|
||
|
|
as in that matter,
|
||
|
|
above,
|
||
|
|
I was the regular
|
||
|
|
brother,
|
||
|
|
I mean, we're talking about
|
||
|
|
firewalls,
|
||
|
|
and the use of
|
||
|
|
security and the machine
|
||
|
|
within a network to,
|
||
|
|
say,
|
||
|
|
rather than having
|
||
|
|
it seen as an
|
||
|
|
internal security network,
|
||
|
|
seeing it as a
|
||
|
|
possibly
|
||
|
|
non-secure network,
|
||
|
|
and thereby,
|
||
|
|
manifesting security
|
||
|
|
procedures,
|
||
|
|
so that the machine,
|
||
|
|
if the network
|
||
|
|
isn't festive,
|
||
|
|
doesn't get festive,
|
||
|
|
but,
|
||
|
|
isn't that just,
|
||
|
|
you,
|
||
|
|
then,
|
||
|
|
the whole problem
|
||
|
|
relies on,
|
||
|
|
even,
|
||
|
|
even if you have a
|
||
|
|
secure machine,
|
||
|
|
say,
|
||
|
|
with a firewall on it,
|
||
|
|
still means that,
|
||
|
|
it's
|
||
|
|
vulnerable
|
||
|
|
to spam,
|
||
|
|
or, you know,
|
||
|
|
viruses received
|
||
|
|
via email,
|
||
|
|
and applications,
|
||
|
|
in general,
|
||
|
|
so, wouldn't that be
|
||
|
|
just application security
|
||
|
|
on top of
|
||
|
|
machine security,
|
||
|
|
on top of a network to
|
||
|
|
security?
|
||
|
|
Yes, in some way,
|
||
|
|
and you are exactly
|
||
|
|
right,
|
||
|
|
and if you go back to
|
||
|
|
the original
|
||
|
|
network and say
|
||
|
|
things, you know,
|
||
|
|
you can't block
|
||
|
|
the black hats,
|
||
|
|
so it's,
|
||
|
|
then, yeah, I agree,
|
||
|
|
but the difference is,
|
||
|
|
that you're
|
||
|
|
sort of isolating
|
||
|
|
the bad,
|
||
|
|
sell hopefully,
|
||
|
|
and, yes,
|
||
|
|
so, you still
|
||
|
|
would be
|
||
|
|
compromised.
|
||
|
|
Yes, I have the
|
||
|
|
pivot.
|
||
|
|
It doesn't do,
|
||
|
|
however,
|
||
|
|
if you've got a
|
||
|
|
monoculture
|
||
|
|
because you've
|
||
|
|
applied it across the
|
||
|
|
border with your
|
||
|
|
machines,
|
||
|
|
you're in just as much,
|
||
|
|
just as much trouble.
|
||
|
|
I mean, at the
|
||
|
|
moment,
|
||
|
|
if it all goes
|
||
|
|
horribly wrong,
|
||
|
|
it's no worse than the
|
||
|
|
current situation,
|
||
|
|
it's not really a very
|
||
|
|
positive sort of,
|
||
|
|
you know,
|
||
|
|
there's not a very
|
||
|
|
very positive approach
|
||
|
|
because once the
|
||
|
|
old-style
|
||
|
|
fortress mentality is
|
||
|
|
gone, what are we
|
||
|
|
going to do if it gets
|
||
|
|
compromised?
|
||
|
|
So, yeah, right?
|
||
|
|
The approach,
|
||
|
|
not just security
|
||
|
|
and that sort of
|
||
|
|
something.
|
||
|
|
Is there any more?
|
||
|
|
There is a bit more.
|
||
|
|
It's,
|
||
|
|
it's to do with,
|
||
|
|
I mean, I'd rather
|
||
|
|
glossed over the idea
|
||
|
|
that a lot of it
|
||
|
|
is to do with it
|
||
|
|
being transparent.
|
||
|
|
So, not only can
|
||
|
|
the user not switch it
|
||
|
|
off, but they're not
|
||
|
|
really even aware of it.
|
||
|
|
Yeah, so you don't need
|
||
|
|
to use it,
|
||
|
|
it hasn't got to use
|
||
|
|
SSH or HTPS
|
||
|
|
because it's all
|
||
|
|
actually done at the
|
||
|
|
lower, you know,
|
||
|
|
much closer to the
|
||
|
|
hardware.
|
||
|
|
Yeah.
|
||
|
|
What do you
|
||
|
|
think the level is
|
||
|
|
when it comes to the
|
||
|
|
users and control
|
||
|
|
and security, do you
|
||
|
|
think it's so much
|
||
|
|
that you don't need to
|
||
|
|
go out and tell people
|
||
|
|
all you need
|
||
|
|
anti-virus,
|
||
|
|
you need a file,
|
||
|
|
would you think it's
|
||
|
|
a file,
|
||
|
|
as far as
|
||
|
|
actually teaching people
|
||
|
|
how to use his
|
||
|
|
products
|
||
|
|
efficiently, I mean,
|
||
|
|
what do you need
|
||
|
|
to work out
|
||
|
|
in the world?
|
||
|
|
Be honest,
|
||
|
|
that if you look at
|
||
|
|
the user landscape
|
||
|
|
out there,
|
||
|
|
and in fact,
|
||
|
|
if you look at the people
|
||
|
|
who came together here
|
||
|
|
from Jericho,
|
||
|
|
you know, they
|
||
|
|
understand they use
|
||
|
|
the landscape,
|
||
|
|
which is they're
|
||
|
|
all the FUs,
|
||
|
|
and they're all
|
||
|
|
going to be,
|
||
|
|
everything's going
|
||
|
|
to be broken
|
||
|
|
unless you take away
|
||
|
|
their sharp knife
|
||
|
|
because,
|
||
|
|
and really, that's
|
||
|
|
what I mean,
|
||
|
|
it's got to be
|
||
|
|
transparent,
|
||
|
|
and I think what you have
|
||
|
|
to do with educating the
|
||
|
|
user is take away
|
||
|
|
that burden of
|
||
|
|
educating the user
|
||
|
|
completely, really.
|
||
|
|
I mean, it's
|
||
|
|
in there.
|
||
|
|
You can't nan it
|
||
|
|
but there's, you know,
|
||
|
|
there's a difference
|
||
|
|
between, I think,
|
||
|
|
I think the problem is
|
||
|
|
that the moment you give
|
||
|
|
them a nice sharp knife,
|
||
|
|
if you get a sharp knife,
|
||
|
|
you know it's sharp,
|
||
|
|
you know, you're
|
||
|
|
going to hurt yourself
|
||
|
|
and, you know,
|
||
|
|
whether or not it's
|
||
|
|
with knives,
|
||
|
|
I admit that most people
|
||
|
|
are going to be
|
||
|
|
a PC,
|
||
|
|
they don't.
|
||
|
|
So I think what you've
|
||
|
|
got to do is take away
|
||
|
|
their dangerous toys.
|
||
|
|
The problem is that
|
||
|
|
trust is keep you
|
||
|
|
more of going
|
||
|
|
and we don't try to
|
||
|
|
use it.
|
||
|
|
It is, but yeah, it is
|
||
|
|
that's a lot of trust.
|
||
|
|
But the problem is that
|
||
|
|
the other side that I
|
||
|
|
speak like Rick's talk
|
||
|
|
on freedom and control,
|
||
|
|
the other side of the coin
|
||
|
|
there is,
|
||
|
|
his apples idea of
|
||
|
|
tying down the device
|
||
|
|
and even tying down
|
||
|
|
the app store.
|
||
|
|
You know, it's not
|
||
|
|
really so much of a
|
||
|
|
commercial thing,
|
||
|
|
I think it's people
|
||
|
|
thinking,
|
||
|
|
they're going to do with
|
||
|
|
trying to make sure they
|
||
|
|
device is compromised.
|
||
|
|
It's losing battle
|
||
|
|
they've lost its
|
||
|
|
strut off, really.
|
||
|
|
But the other side of that
|
||
|
|
coin is a device
|
||
|
|
that's so controlled
|
||
|
|
and locked down
|
||
|
|
that it's not really
|
||
|
|
yours, you know,
|
||
|
|
because it's
|
||
|
|
an awkward position.
|
||
|
|
If you're talking
|
||
|
|
anything like
|
||
|
|
networks within
|
||
|
|
companies, then there's
|
||
|
|
not really, there's
|
||
|
|
anyways, because
|
||
|
|
it shouldn't be used
|
||
|
|
for any other purpose
|
||
|
|
apart from,
|
||
|
|
right?
|
||
|
|
Indeed.
|
||
|
|
It's a lot easier to
|
||
|
|
control the problem
|
||
|
|
isn't it?
|
||
|
|
The VP usually
|
||
|
|
interacts the head
|
||
|
|
of IT
|
||
|
|
and gets to bring
|
||
|
|
the Johnny's
|
||
|
|
PC in and gets to
|
||
|
|
take his home.
|
||
|
|
Then there are
|
||
|
|
other things
|
||
|
|
they've done here
|
||
|
|
which I haven't
|
||
|
|
really covered up.
|
||
|
|
One of them was
|
||
|
|
where you have a
|
||
|
|
portable device
|
||
|
|
like a network
|
||
|
|
or whatever.
|
||
|
|
What you do
|
||
|
|
is a corporation
|
||
|
|
if you like,
|
||
|
|
is you buy
|
||
|
|
and we step back
|
||
|
|
actually.
|
||
|
|
Once you can secure
|
||
|
|
a machine and come
|
||
|
|
to that point where, as
|
||
|
|
I said, the idea is
|
||
|
|
that you'd have a
|
||
|
|
machine with a
|
||
|
|
hard OS capable
|
||
|
|
of just being
|
||
|
|
dropped on the internet.
|
||
|
|
Once you achieve that
|
||
|
|
point, the idea is that
|
||
|
|
you put that out on the
|
||
|
|
internet, a mirror
|
||
|
|
of what you run
|
||
|
|
in-house, because
|
||
|
|
there isn't an
|
||
|
|
inside and outside
|
||
|
|
anymore.
|
||
|
|
Your distant devices,
|
||
|
|
which you're talking
|
||
|
|
about, the normally
|
||
|
|
partner network,
|
||
|
|
that they might get
|
||
|
|
taken home,
|
||
|
|
connect on the
|
||
|
|
internet to the same
|
||
|
|
sort of server they
|
||
|
|
will be using in-house.
|
||
|
|
And others, they're
|
||
|
|
using the cloud, as
|
||
|
|
it's now called, to
|
||
|
|
run the equipment
|
||
|
|
of what they were
|
||
|
|
running in-house,
|
||
|
|
a suitably secure
|
||
|
|
server.
|
||
|
|
So that distant
|
||
|
|
device, which the
|
||
|
|
VP takes home,
|
||
|
|
even when he's at home
|
||
|
|
or he's in secure network,
|
||
|
|
all this connection
|
||
|
|
goes out,
|
||
|
|
connections go out
|
||
|
|
to this secure
|
||
|
|
and it's never off.
|
||
|
|
Yes, because it
|
||
|
|
affect, because
|
||
|
|
there is no
|
||
|
|
outside,
|
||
|
|
there will be.
|
||
|
|
You can put your
|
||
|
|
control mechanisms
|
||
|
|
outside in the cloud
|
||
|
|
and whatever you want
|
||
|
|
to call it.
|
||
|
|
And your VP, he
|
||
|
|
will she can connect,
|
||
|
|
as if they were
|
||
|
|
still at the office.
|
||
|
|
So letting them
|
||
|
|
take the machine home is
|
||
|
|
no longer a problem.
|
||
|
|
And if that machine
|
||
|
|
they take home is also
|
||
|
|
geared to think
|
||
|
|
every network
|
||
|
|
it's hostile, then even
|
||
|
|
if little
|
||
|
|
university is completely
|
||
|
|
trojan-ridden, his
|
||
|
|
machine is still
|
||
|
|
secure.
|
||
|
|
So I didn't
|
||
|
|
have a lot of
|
||
|
|
what he really is
|
||
|
|
worth visiting the
|
||
|
|
Jericho site.
|
||
|
|
It's not a,
|
||
|
|
they're not trying to
|
||
|
|
say anything.
|
||
|
|
They've just got
|
||
|
|
these, these few
|
||
|
|
things.
|
||
|
|
Yes.
|
||
|
|
And there is a
|
||
|
|
two-fold question for
|
||
|
|
people listening
|
||
|
|
to this later on how
|
||
|
|
we system admins
|
||
|
|
are you going to think
|
||
|
|
they're going to be saying
|
||
|
|
that, that, that, that,
|
||
|
|
so you know, about
|
||
|
|
that outside of
|
||
|
|
frags and the impact
|
||
|
|
that I think you
|
||
|
|
version 6 is going to
|
||
|
|
happen.
|
||
|
|
It's not always
|
||
|
|
well,
|
||
|
|
this model of being
|
||
|
|
needed,
|
||
|
|
to have it be version
|
||
|
|
6.
|
||
|
|
How many of them are
|
||
|
|
going to say you
|
||
|
|
actually walk
|
||
|
|
correctly and you
|
||
|
|
cover IPv6?
|
||
|
|
Yes.
|
||
|
|
So I was going to,
|
||
|
|
this is, yeah, you're
|
||
|
|
right, this will.
|
||
|
|
The borderline
|
||
|
|
networking and IPv6 are
|
||
|
|
fairly intimately linked.
|
||
|
|
You know, with IPv6,
|
||
|
|
you can get away
|
||
|
|
without a DHCP
|
||
|
|
server to hand out addresses.
|
||
|
|
The thing with I give you six is, you know, I took a hit Ipsek down on that lower level.
|
||
|
|
You know, down on level three, there below, there's the soldiers or an Ipsek has built in support for it.
|
||
|
|
And for quality of service and so on.
|
||
|
|
That's also important in the quality of this network model because of major threat.
|
||
|
|
It's not talked about, it's like his denied of service.
|
||
|
|
If you've got a notion of open network that's secure, deny of service and problem.
|
||
|
|
IPv6, I think, is going to bring borderless network in whether you like it or not.
|
||
|
|
I suspect that your iPhone is going to pretty soon get an IPv6 address.
|
||
|
|
Yes, it's going to be an internet enable, that'll be it.
|
||
|
|
I suspect that your telephone probably soon is going to be an IPv6 in the UK.
|
||
|
|
The address, because BT's two zero CN or two thousand CN or 20 CN,
|
||
|
|
we're going to call it 21st century network.
|
||
|
|
Because it should be, not 20th century network, but the two thousand.
|
||
|
|
They're going to make all of your phones IP based.
|
||
|
|
Well, there's how many million households in the UK and all for a lot more than there are before.
|
||
|
|
The address is available still free.
|
||
|
|
So how would you go about doing that?
|
||
|
|
Well, you could nat it, but let's face it, you can't have a whole...
|
||
|
|
You could use the 10-0-0 range, perhaps you know, you've got 60 million numbers there,
|
||
|
|
but it's going to be a bit clunky when it comes to an IP address.
|
||
|
|
So what would you do if you're going to have telephones over IP?
|
||
|
|
You can use IPv6.
|
||
|
|
Now, once your telephones are device that's out there,
|
||
|
|
in the why, which it will be, because it's unlikely that BT you're going to say,
|
||
|
|
yeah, you can file all your telephone system,
|
||
|
|
then borders networks, they're here whether you like it or not.
|
||
|
|
You really, really don't want someone to be able to compromise your telephone.
|
||
|
|
That's quite bad news.
|
||
|
|
Before you know your mobile is compromised, but when it comes down to you, yeah.
|
||
|
|
As for how many admins we're just going to know,
|
||
|
|
this is just fractures, technical terms, system admins now,
|
||
|
|
but we've got none.
|
||
|
|
Well, you know, I must say, when I first saw this,
|
||
|
|
I thought, throw my file away,
|
||
|
|
I'd rather repeat this, slap my head in the door, thanks very much.
|
||
|
|
But when you actually look into it,
|
||
|
|
it's not really talking about that.
|
||
|
|
I do see an awful lot of difficulty as we move beyond that.
|
||
|
|
What you have to remember is that,
|
||
|
|
came in because of the National Courage of IPV for addresses,
|
||
|
|
and then has become a sort of now deemed to be, isn't it wonderful,
|
||
|
|
but it was only a stopgap, really.
|
||
|
|
It does work reasonably well,
|
||
|
|
but it actually leads to that false sense of security in some ways.
|
||
|
|
If you see a local address, it must therefore be on my network.
|
||
|
|
Therefore, it's such that it's not a chain of reason
|
||
|
|
and you should really be following these guys out.
|
||
|
|
That's the technical trainers,
|
||
|
|
and I would say that it's a security benefit behind that.
|
||
|
|
That's the one.
|
||
|
|
Well, I can see initially why you would say something,
|
||
|
|
but that's the truth.
|
||
|
|
The problem is, I think, is that the film was very quickly
|
||
|
|
and what might have been true 10 years ago,
|
||
|
|
the physical problem wasn't there,
|
||
|
|
but it might be thought of as true generally,
|
||
|
|
it just really isn't there anymore.
|
||
|
|
I don't see where one can end.
|
||
|
|
As you say, the whole view of the internal external network
|
||
|
|
and then moving away from this idea of having one boarder
|
||
|
|
or DMZ.
|
||
|
|
Where would one stop?
|
||
|
|
Does one stop just machine level?
|
||
|
|
Was it just continuous until you made sure that
|
||
|
|
no application ever used can access everything you should have?
|
||
|
|
Yeah.
|
||
|
|
It's the best answer to that.
|
||
|
|
Well, an application is really an app proxy for the user.
|
||
|
|
You don't want the user to go everywhere, really.
|
||
|
|
If you view the application's acting on behalf of the user,
|
||
|
|
which is what you would have done.
|
||
|
|
Well, why didn't you have a question?
|
||
|
|
I do actually think that's the way.
|
||
|
|
I mean, once you start with, well,
|
||
|
|
my communications needs to be secure.
|
||
|
|
You then start thinking, as I said,
|
||
|
|
it's about securing the data.
|
||
|
|
You then think, well, surely my application needs to be secure.
|
||
|
|
If an application can't trust the other host,
|
||
|
|
which it shouldn't, then yeah, that should be secure.
|
||
|
|
And then you go to the point of all the surely then,
|
||
|
|
if I can't trust anyone accessing that application,
|
||
|
|
unless I've got the credentials or whatever,
|
||
|
|
then I should really secure the data as well.
|
||
|
|
So yeah, I do think at the moment, the perimeter,
|
||
|
|
it actually has to come inside the machine in effect.
|
||
|
|
It's got to come beyond the adapter.
|
||
|
|
You have the host in the adapter.
|
||
|
|
It's got to come into the adapter, which is roughly where it is now,
|
||
|
|
into the host, and then right down into the data.
|
||
|
|
You know, the secure,
|
||
|
|
the secure operating systems, if you like,
|
||
|
|
that have to be validated.
|
||
|
|
Really work that way.
|
||
|
|
You know, the granularity is very fine,
|
||
|
|
of what you can and cannot touch.
|
||
|
|
So yes, I think we all end up as, you know,
|
||
|
|
machines, if the machine's going to be in an extension
|
||
|
|
of you wanting to be as secure as you live,
|
||
|
|
quite frankly, you know,
|
||
|
|
certain exceptions in this room, obviously.
|
||
|
|
But you know, you want it to be as secure as something inside your body,
|
||
|
|
really, and that does mean a really security all the way here.
|
||
|
|
Oh, and in the future,
|
||
|
|
it might be the fact that, you know,
|
||
|
|
it brings a pure end to the data.
|
||
|
|
Well, you know, you're an interface,
|
||
|
|
and someone hacks it, you're really an internal object.
|
||
|
|
That's face it, if you wake up naked,
|
||
|
|
having feathers and greets you.
|
||
|
|
At the senior, you're really going to want to know how that happens.
|
||
|
|
I've always been sorry with you, though.
|
||
|
|
All right, any of us?
|
||
|
|
No, well, thanks very much.
|
||
|
|
Hope you enjoyed it.
|
||
|
|
Thank you.
|
||
|
|
Thank you for listening to Hack with Public Radio.
|
||
|
|
HPR is sponsored by Carol.net.
|
||
|
|
So head on over to C-A-R-O.N-T
|
||
|
|
and all the other things.
|
||
|
|
Thank you very much.
|