released for zebra, hylafax, minimalist, Glibc, XFree86, Sane, postgresql, and
apache. The distributors include Conectiva, Debian, Mandrake, RedHat, SuSE, and
Trustix.One of the
more powerful and cutting edge technologies in security today is honeypots. Those
who have a need for better network monitoring and increased intrusion detection
capabilities should find value in their usage. The concept of honeypots has been
around for many years, but until recently they haven't had much widespread use.
More recently, research has been done to precisely define what honeypots are,
and the development of honeypot type classification. With community involvement,
Lance Spitzner uses the following definition to define honeypots: "A honeypot
is an information system resource whose value lies in unauthorized or illicit
use of that resource."
To the average IT person, honeypots may be somewhat confusing.
How could any system value from 'unauthorized or illicit' use? Isn't it the
responsibility of security professionals to ensure that there is no wrongful
use to IT systems? I don't think this analogy is completely appropriate, but
a honeypot is similar to a police sting operation. The name honeypot almost
implies that the IT resource is 'bait' to lure unauthorized users. While this
could be true, I'm not sure that it is the best way to think about honeypots.
Lance's definition contains the word value. What value is there in setting up
an easy target to lure unauthorized user? That's almost like buying a car and
always leaving it unlocked with the keys in it, parking it by your normal car,
hoping someone will steal your 'honeycar' rather than the car that you use everyday.
In my opinion, that is a very expensive protection system.
A better approach is to have specific goals in mind when implementing
honeypots. Are you going to use this as research, simply to gain knowledge to
help you better protect against the enemy, or are you a corporate user who wants
to use a honeypot as a supplement to your intrusion detection system? Often,
corporate IDS' have so many alerts, it is nearly impossible to sort out real
events. Honeypots provide an excellent method of identifying unauthorized traffic
and activity, simply because any traffic hitting a honeypot is by default unauthorized.
Honeypots have many uses and should not be installed just for the 'cool' factor.
If one is mis-configured and sitting on your network, it is potentially a huge
To find out more, I suggest the Honeynet project:
Until next time, cheers!
Benjamin D. Thomas
An Introduction and Interview with Founder, James Yonan
- In this article, Duane Dunston gives a brief introduction to OpenVPN and interviews
its founder James Yonan.
- Dan Verton, the author of The Hacker Diaries: Confessions of
Teenage Hackers is a former intelligence officer in the U.S. Marine Corps
who currently writes for Computerworld and CNN.com, covering national cyber-security
issues and critical infrastructure
Linux Advisory Watch
is a comprehensive newsletter that outlines the security vulnerabilities that
have been announced throughout the week. It includes pointers to updated packages
and descriptions of each vulnerability.
of service vulnerabilities
Multiple denial of service vulnerabilities have been resolved.
format string vulnerabilities
The SuSE Security Team discovered several exploitable formats string vulnerabilities
A security-related problem has been discovered in minimalist, a mailing
A bug was discovered in the getgrouplist function in glibc that can cause
Updated XFree86 packages for Red Hat Linux 9 provide security fixes to font
of service vulnerability
Several bugs in sane were fixed to avoid remote denial-of-service attacks.
The getgrouplist function in GNU libc allows may attackers to cause a denial
Buffer overflow in to_ascii for PostgreSQL 7.2.x, and 7.3.x before 7.3.4,
Multiple stack-based buffer overflows in mod_alias and mod_rewrite have
Integer overflow vulnerability
An integer overflow in ls in the fileutils or coreutils packages may allow