103
slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp [email protected]

Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp [email protected]

Embed Size (px)

Citation preview

Page 1: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 1 of 103

Internet Security: An Optimist Gropes For Hope

Bill Cheswick, Chief Scientist

Lumeta Corp

[email protected]

Page 2: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 2 of 93slide 2 of 103

Page 3: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 3 of 103

Most common question from the press:

“Is Internet security getting better or worse?”

Page 4: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 4 of 103

Universal Answer

It is getting worse.

Page 5: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 5 of 103

Why?

Page 6: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 6 of 93slide 6 of 103

Aug. 1993

• Writing FWAIS first edition

• “Most people use the Internet for email”

• The web was in the future

• Most attacks were still theoretical

Page 7: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 7 of 93slide 7 of 103

In August 1993

• Morris sequence number hijack documented in the 80s, but not seen in the wild

• Wholesale password sniffing hadn’t been seen

• No DOS attacks

• Windows had no standard TCP stack, so it wasn’t a player

• After Morris worm, but worms were scarce– Sendmail had been patched and all was well in

the world (not)

Page 8: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 8 of 93slide 8 of 103

CERT advisories: 1994

• first advisory, released February 3, was a response to a dramatic increase in network monitoring by intruders, who were capturing passwords and installing "back doors" for future access to systems

• attacks increased in a single week from a few isolated reports to indications that tens of thousands of systems may have been compromised

• Unlike most security incidents, this one received extensive attention from the media

• the CERT team notified an archive site that their software being readied for distribution had been modified

Page 9: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 9 of 93slide 9 of 103

CERT advisories, 1994

CA-94:01 Ongoing Network Monitoring Attacks

CA-94:02 Revised Patch for SunOS /usr/etc/rpm.mountd Vulnerability

CA-94:03 AIX Performance Tools Vulnerabilities

CA-94:04 SunOS /usr/ucb/rdist Vulnerability

CA-94:05 MD5 Checksums: SunOS files

CA-94:06 Writable /etc/utmp Vulnerability - SunOS 4.1.X

CA-94:07 wuarchive ftpd Trojan Horse

CA-94:08 ftpd Vulnerabilities- wuarchive and BSDI ftpd

Page 10: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 10 of 93slide 10 of 103

CERT advisories, 1994 (cont.)

CA-94:09 /bin/login Vulnerability

CA-94:10 IBM AIX bsh Vulnerability

CA-94:11 Majordomo Vulnerabilities

CA-94:12 Sendmail Vulnerabilities

CA-94:13 SGI IRIX Help Vulnerability

CA-94:14 Trojan Horse in IRC Client for UNIX

CA-94:15 NFS Vulnerabilities

Page 11: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 11 of 93slide 11 of 103

Many attacks were theoretical…

• SYN packet flooding

• Mail flooding and similar application overflows

• TCP hijacking

• Hadn’t seen a worm in years

• Unix viruses were research topics

• Attacks on the TCP/IP stacks

• Packet amplification

Page 12: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 12 of 93slide 12 of 103

…and then they happened…

• Massive sniffing (1994)

• SYN packet DOS attacks (1996)

• TCP hijacking (1996)

• Ping-of-death (1996?)– Son of “crashme”

• SMURF (1997?)

• Massive worm and viral outbreaks– Mellissa, Code Red, etc. etc.

Page 13: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 13 of 103

There are a lot more players, and

on average they are a lot less secure

Page 14: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 14 of 93slide 14 of 103

When I started at the Labs (Dec 1987)

• Most of the hosts on the Internet were listed in a single file named hosts.txt

• Most of the systems were various flavors of Unix or VMS

• Most systems had some sort of professional system administration, at least sometimes– Win98 was ten years away

• There wasn’t much at stake, perhaps even on MILNET

• MILNET was easy to disconnect, and sometimes was– Well, maybe.

• Numerous attacks were theoretical

Page 15: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 15 of 93slide 15 of 103

Now, everyone is on the Internet

• Grandma has ruined it for all of us

• The Internet subway goes to all the bad neighborhoods

• Vast, dangerous software packages with dangerous capabilities run nearly everywhere

• Most of the theoretical attacks are now implemented and used regularly.

Page 16: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 16 of 93slide 16 of 103

We’ve been losing ground for decades

• Bad guys are figuring out attacks that we have been waiting for over the years– Very few surprises

• Arms races are proceeding on many fronts

• Defense has improved slowly, even on systems where it ought to be easy to improve

• System administration is a nightmare– Open research problem

Page 17: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 17 of 93slide 17 of 103

Life cycle of a security bug, roughly

• It is first discovered

• It is first exploited, usually manually

• It is announced

• A patch is made available

• Some people patch the hole

• A worm or virus exploits the hole

• More people patch it

• Eventually the software goes away

Page 18: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 18 of 103

Yeahbuttal

Page 19: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 19 of 103

Cost vs. Benefits

If you look at just one of these, you are doing half the job

Page 20: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 20 of 93slide 20 of 103

OTOH, tools we didn’t have in 1994

• Available, working, distributable crypto

• No ssh

• Firewalls: build it yourself

• Stateful inspection had been pondered, but not available– Want to hack a kernel?

• IDS, honey pots, and lots of other tools available

Page 21: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 21 of 93slide 21 of 103

Bright spots, now

• The crypto export war appears to be over

• There are better tools available for some situations– Ssh– IPsec– Better Linux and Unix systems– Microsoft security initiative– Honeyd and other tools

• Un*x/Linux/GNU is freely available, and a reasonable solution

Page 22: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 22 of 93slide 22 of 103

I am optimistic. Good security is possible

• One can engineer reliable systems out of unreliable parts

• We have the home-field advantage: we can choose to set the rules on our hosts

• World-class encryption is now available and cheap

• The Bad Guys are giving us lots of practice

Page 23: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 23 of 93slide 23 of 103

There are a lot of benefits

• Some successful web business models– Fedex…package progress– Amazon: access to the 100,000th book on

the best seller list– Access to vast educational resources

• College courses• Research papers in most disciplines• Access to raw data

– Better access to government (still spotty at the local level.)

Page 24: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 24 of 93slide 24 of 103

Financial business models are working

• On-line banking and brokerage access

• Paypal (bismuth)

• Internet access is so widely available and used that the states are starting to tax it

• Insurance companies are still reluctant to write hacking insurance– What does hurricane Andrew look like?

Page 25: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 25 of 103

And Microsoft…

Page 26: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 26 of 103

What does good security feel like?Confidence without hubris

Page 27: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 27 of 93slide 27 of 103

The Morris worm: Nov. 1988

• I was running the Bell Labs firewall

• Heard about the worm on the radio upon awakening

• What was my first reaction?– This is what good security is about

Page 28: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 28 of 93slide 28 of 103

Some facts to keep in mind: economics

• Security is never perfect: economic concerns are always present

• What is the value of what we are trying to protect, and what is our adversary willing to spend– Miscomputation of this balance is the

underlying cause of security breaches

• We are always aiming for “good enough”, though “good enough” has to be good enough

Page 29: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 29 of 103

Some things we can’t fix

We have to engineer around them

Page 30: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 30 of 93slide 30 of 103

Social Engineering

``Hello, this is Dennis Ritchie calling.I’m in Israel now and I have forgottenmy password.’’

``Hello, <admin-name>, I’ve juststarted work here. <Boss-name>said I should have an account on<target-host>‘‘

Page 31: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 31 of 93slide 31 of 103

I need to manage expectations here

• The Internet will never be 100% secure. Such security is not possible

• Some problems are over-constrained

• Security is always about economics– Good enough is good enough

• For many, the Internet is already good enough– Amazon, ebay, fedex, etc. etc.– Viruses, worms, spam aren’t that bad

Page 32: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 32 of 93slide 32 of 103

Software will always have bugs

• Perhaps DEK would be interested in working on inetd, and a web server. A kernel. Heck, the works…

• Marcus Ranum couldn’t get inetd right in 60 lines

• Perhaps formal methods will work some day– Must produce widely-useful morsels of

software– Start with the likes of ASN.1 and

openssl…

Page 33: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 33 of 93slide 33 of 103

People pick lousy passwords

• Best solution: don’t let them– Computer-generated keys are held in

smart keys, USB dongles, etc.

• Don’t allow dictionary attacks on passwords, password-derived keys, PINS– This means that on-line authentication

servers are needed…if you can crack something offline, it becomes a game of sniff-and-crack

Page 34: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 34 of 93slide 34 of 103

Some facts to keep in mind: users are not security experts

• Computer systems are fantastically complex: even the experts do not understand all the interactions

• People pick lousy passwords

Page 35: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 35 of 93slide 35 of 103

Social Engineering (cont.)

Click here to infect your computer.

Page 36: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 36 of 93slide 36 of 103

Another problem with strange programs

Page 37: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 37 of 93slide 37 of 103

Managing expectations: Denial-of-Service

• It is here to stay

• Any public service can be abused by the public

• There are mitigations, but I don’t see full solutions

• Best solution: throw hardware at the problem

Page 38: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 38 of 93slide 38 of 103

Wireless passwords

These are mostly POP3 (email) passwords

G1zmoniq!kkB5cKkn0pf-itAot?78Mhr370ChizYuzTmKm dugod123 tr.fbgi!

Page 39: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 39 of 93slide 39 of 103

Experts cut corners, too

• Fred Grampp’s password was easily found with a dictionary attack

• Ssh hijacking at conferences

• Temporary holes are forgotten

Page 40: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 40 of 93slide 40 of 103

I cheated on my authentication test# acct challenge response

ches '00319 Thu Dec 20 15:32:22 2001 ' '23456bcd;f.k' OKroot '00294 Fri Dec 21 16:47:39 2001 ' 'nj3kdi2jh3yd6fh:/' OKches '00311 Fri Dec 21 16:48:50 2001 ' '/ldh3g7fgl' OKches '00360 Thu Jan 3 12:52:29 2002 ' 'jdi38kfj934hdy;dkf7' OKches '00416 Fri Jan 4 09:02:02 2002 ' 'jf/l3kf.l2cxn.' OKches '00301 Fri Jan 4 13:29:12 2002 ' 'j2mdjudurut2jdnch2hdtg3kdjf;s'/s' OKches '00301 Fri Jan 4 13:29:30 2002 ' 'j2mdgfj./m3hd'k4hfz' OKches '00308 Tue Jan 8 09:35:26 2002 ' '/l6k3jdq,' OKches '84588 Thu Jan 10 09:24:18 2002 ' 'jf010fk;.j' OKches '84588 Thu Jan 10 09:24:35 2002 ' 'heu212jdg431j/' OKches '00306 Thu Jan 17 10:46:00 2002 ' 'jfg.bv,vj/,1' OKches '00309 Fri Jan 18 09:37:09 2002 ' 'no way 1 way is best!/1' OKches '00309 Fri Jan 18 09:37:36 2002 ' 'jzw' NOches '00368 Tue Jan 22 09:51:41 2002 ' '84137405jgf/' OKches '00368 Tue Jan 22 09:51:56 2002 ' 'k762307924a/q' OKches '80276 Fri Feb 1 15:00:18 2002 ' '/,f9gjh,md' OKches '00165 Wed Feb 6 10:37:00 2002 ' 'jduse7fh.,cf' OKches '67795 Mon Feb 11 08:50:11 2002 ' 'dbfho1jdh1m;dhfg' OKches '00164 Thu Feb 14 09:37:16 2002 ' 'jpiw8eury3yru8fkdh' OKches '00164 Thu Feb 14 09:37:34 2002 ' 'm1j4i0kk5;'' OKches '00167 Mon Feb 18 09:34:06 2002 ' 'dm,c.lv/fl7' NOches '77074 Tue Feb 19 09:02:52 2002 ' 'd' NOches '77074 Tue Feb 19 09:02:57 2002 ' 'hbcg3]'d/' OKches '00158 Wed Feb 20 11:33:24 2002 ' 'ebdj8fjtkd;' OK

Page 41: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 41 of 93slide 41 of 103

I cheated on my authentication test (cont.)

ches '00156 Thu Feb 21 09:58:32 2002 ' 'jdufi46945jhfy37/' OKches '00210 Thu Feb 21 09:59:12 2002 ' '123456abcdefihjd32/' OKches '00163 Mon Feb 25 09:24:30 2002 ' 'd' NOches '00163 Mon Feb 25 09:24:35 2002 ' 'ozhdkf0ey2k/.,vk0l' OKches '00154 Tue Feb 26 10:54:48 2002 ' 'j4if9dl/0hgg/' OKches '59810 Tue Mar 12 09:03:40 2002 ' '60673h4,dk/' OKches '59810 Tue Mar 12 09:03:58 2002 ' 'ju607493,l;/' OKches '00156 Tue Mar 12 12:41:12 2002 ' '3+4=7 but not 10 or 4/2' OKches '00161 Fri Mar 15 09:41:20 2002 ' '/.,kl9djfir' OKches '00161 Fri Mar 15 09:41:36 2002 ' '3' NOches '00160 Mon Mar 25 08:52:59 2002 ' '222' OKches '00160 Mon Mar 25 08:53:09 2002 ' '2272645' OKches '29709 Mon Apr 1 11:36:34 2002 ' '4' OKches '87197 Mon Apr 1 11:41:41 2002 ' 'x' NOches '87197 Mon Apr 1 11:41:49 2002 ' '234jkfd' OKches '00162 Wed Apr 3 10:43:58 2002 ' 'zb' NOches '45303 Thu Apr 4 10:52:06 2002 ' 'bn' NOcges '45303 Thu Apr 4 10:52:10 2002 ' '' NOches '45303 Thu Apr 4 10:52:15 2002 ' ''zx' NOches '45303 Thu Apr 4 10:52:19 2002 ' 'zx' NOches '41424 Mon Apr 8 09:49:09 2002 ' 'ab3kdhf' OKches '85039 Tue Apr 9 09:46:06 2002 ' '04' OKches '00154 Tue Apr 9 11:41:16 2002 ' '07' OKches '00160 Tue Apr 16 08:58:29 2002 ' 'jdnfc8djd9dls';/' OKches '00161 Thu Apr 18 10:49:10 2002 ' 'x' NOches '00161 Thu Apr 18 10:49:14 2002 ' '898for/dklf7d' OK

Page 42: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 42 of 103

Some principles and tools

Security 101, the slow part of the talk

Page 43: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 43 of 93slide 43 of 103

Security strategies

• Stay out of the game, if you can

• Defense in depth if you have to be in the game

• Always, always make it as simple as possible

• Design security in from the start: it is an attribute of the infrastructure, not a feature to be added later

Page 44: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 44 of 93slide 44 of 103

Staying out of the game

• “Best block is not be there” – Karate Kid 1

• User’s password and PIN choices are less important if dictionary attacks are not possible

• Mellissa at Lucent– The Unix V7 mailer

• Avoiding the monoculture

Page 45: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 45 of 93slide 45 of 103

Defense in depth

• If you are dealing with imperfect systems, engineer redundancies to improve the reliability

Page 46: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 46 of 93slide 46 of 103

Page 47: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 47 of 93slide 47 of 103

Secure defaults are important

• If you use 10% of the features 90% of the time, the other features can be disabled

• This has long been a problem with Unix systems– Default network services include many

dangerous ones– Most systems still need field-stripping

• New Microsoft security initiatives include a close examination of defaults

Page 48: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 48 of 93slide 48 of 103

Security doesn’t need to be inconvenient

• Modern hotel room keys

• Modern car keys

Page 49: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 49 of 93slide 49 of 103

Some solutions:Hardware tokens

Digital PathwaysSNK-004

• SecureID– time-based

• S/Key– software or printout

solution

• Many others– usually proprietary

server software– New USB dongles

are just the ticket!

Page 50: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 50 of 93slide 50 of 103

One-time Passwords

RISC/os (inet)

Authentication Server.

Id? chesEnter response code for 70202: 04432234

Destination? cetus$

Page 51: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 51 of 93slide 51 of 103

Authentication

• …or use a USB or PCCard key

• You need them for your hotel room and rental car, and you don’t complain about that…

Page 52: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 52 of 93slide 52 of 103

Principles and tools: encryption

• Moore’s law fixed this

• We won the crypto wars

Page 53: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 53 of 93slide 53 of 103

Encryption is necessary, but not sufficient

• Many (most?) attacks aren’t associated with wiretaps

• IPsec is well-defined, and could be ubiquitous

• Microsoft ought to make it the default for their clients

• End-to-end encryption makes the wireless and Ethernet sniffing problem go away

Page 54: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 54 of 93slide 54 of 103

Tools: Trusted Computing Base

• This is hard, but there are usable solutions out there

• It’s debatable whether Microsoft has produced software yet that deserves to be trusted– Their new security thrust is real, but it is a

huge job

Page 55: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 55 of 93slide 55 of 103

ftp stream tcp nowait root /v/gate/ftpdtelnet stream tcp nowait root /usr/etc/telnetdshell stream tcp nowait root /usr/etc/rshdlogin stream tcp nowait root /usr/etc/rlogind exec stream tcp nowait root /usr/etc/rexecd finger stream tcp nowait guest /usr/etc/fingerd bootp dgram udp wait root /usr/etc/bootp tftp dgram udp wait guest /usr/etc/tftpd ntalk dgram udp wait root /usr/etc/talkd tcpmux stream tcp nowait root internalecho stream tcp nowait root internaldiscard stream tcp nowait root internalchargen stream tcp nowait root internaldaytime stream tcp nowait root internaltime stream tcp nowait root internalecho dgram udp wait root internaldiscard dgram udp wait root internalchargen dgram udp wait root internaldaytime dgram udp wait root internaltime dgram udp wait root internalsgi-dgl stream tcp nowait root/rcv dglduucp stream tcp nowait root /usr/lib/uucp/uucpd

Default servicesSGI workstation

Page 56: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 56 of 93slide 56 of 103

More default services

mountd/1 stream rpc/tcp wait/lc root rpc.mountdmountd/1 dgram rpc/udp wait/lc root rpc.mountdsgi_mountd/1 stream rpc/tcp wait/lc root rpc.mountdsgi_mountd/1 dgram rpc/udp wait/lc root rpc.mountdrstatd/1-3 dgram rpc/udp wait root rpc.rstatd walld/1 dgram rpc/udp wait root rpc.rwalld rusersd/1 dgram rpc/udp wait root rpc.rusersd rquotad/1 dgram rpc/udp wait root rpc.rquotad sprayd/1 dgram rpc/udp wait root rpc.sprayd bootparam/1 dgram rpc/udp wait root rpc.bootparamdsgi_videod/1 stream rpc/tcp wait root ?videod sgi_fam/1 stream rpc/tcp wait root ?fam sgi_snoopd/1 stream rpc/tcp wait root ?rpc.snoopd sgi_pcsd/1 dgram rpc/udp wait root ?cvpcsd sgi_pod/1 stream rpc/tcp wait root ?podd tcpmux/sgi_scanner stream tcp nowait root ?scan/net/scannerdtcpmux/sgi_printer stream tcp nowait root ?print/printerd 9fs stream tcp nowait root /v/bin/u9fs u9fswebproxy stream tcp nowait root /usr/local/etc/webserv

Page 57: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 57 of 103

If You Don’t have a Trusted Computing

Base…

Page 58: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

FirewallsPerimeter defenses

Page 59: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 59 of 93slide 59 of 103

Firewalls have their uses

• Medium-grade security

• Personal firewalls are useful

• Firewalls in cheap network equipment does a good job for simple, useful security policies

Page 60: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 60 of 93slide 60 of 103

Firewalls: Not a panacea

• Backdoors usually diminish the effectiveness

• Commercial firewalls are probably OK

• May give community a false sense of security

• The firewall is often the only secure part of a configuration– People go

around them– People go

through the bad ones

– No protection from insiders

Page 61: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 61 of 103

Anything large enough to be called

an “intranet” is probably out of control

Page 62: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 62 of 93slide 62 of 103

Page 63: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 63 of 93slide 63 of 103

This wasSupposedTo be aVPN

Page 64: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 64 of 93slide 64 of 103

Some intranet statisticsfrom Lumeta clients

Intranet sizes (devices) 7,900 365,000Corporate address space 81,000 745,000,000Address space usage efficiency% devices in unknown address space 0.01% 20.86%

% routers responding to "public" 0.14% 75.50%% routers responding to other 0.00% 52.00%

Outbound host leaks on network 0 176,000% devices with outbound ICMP leaks 0% 79%% devices with outbound UDP leaks 0% 82%

Inbound UDP host leaks 0 5,800% devices with inbound ICMP leaks 0% 11%% devices with inbound UDP leaks 0% 12%

% hosts running Windows 36% 84%

Page 65: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 65 of 93slide 65 of 103

Perimeter defenses don’t work if the perimeter is too big

• Small “enclaves” are much safer

• Implemented with– routing restrictions– Intranet firewalls– Encryptions

• Most of my family is in an enclave, and that is about as large as I’d like it to be

Page 66: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 66 of 103

Example: Life Without a Firewall

Trusting Your Computing Base, or Skinny-dipping on the Internet

Page 67: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 67 of 103

It can be done

Page 68: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 68 of 93slide 68 of 103

Life without a firewall

• It’s like skinny-dipping

• For a security person, it keeps one focused

• Extra layers of security built into network services– Belt-and-suspenders

• “net-rot” (“route-rot”?) can be fatal

• Confidence in the face of wide-spread network mayhem

Page 69: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 69 of 93slide 69 of 103

We need to be able to trust our hosts

• Secure software with good system management

• Microsoft doesn’t hack it, yet.– Long history of putting features over

security– A huge software base to fix– Customers used to dangerous services

“Honey, I’ll be home at six” can have a virus!

Page 70: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 70 of 93slide 70 of 103

Secure host technology

• Goes way back: Multics, Burroughs

• Current efforts in *BSD systems (especially NetBSD) and Linux

• Jailing servers, clients(!)– Chroot technologies have a lot of promise– Need solutions over several Unixoid

operating systems

• Microsoft’s security initiative appears to be real

Page 71: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 71 of 93slide 71 of 103

Secure host technology

• Digital Rights Management & Palladium can help us

• Load and run only approved software: that’s not all bad

Page 72: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 72 of 93slide 72 of 103

Routes to root

root

rootnetworkservices

Interactiveuser

Setuidprograms

Adminmistakes

networkservices

start

Page 73: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 73 of 93slide 73 of 103

root network services

• In general, there are way too many of them

root

rootnetworkservices

Interactiveuser

Setuidprograms

Adminmistakesnetwork

services

start

Page 74: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 74 of 93slide 74 of 103

Setuid-root programs

• Waaaaaay too many of these

root

rootnetworkservices

Interactiveuser

Setuidprograms

Adminmistakesnetwork

services

start

Page 75: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 75 of 93slide 75 of 103

find / -perm -4000 -user root -print | wc -l

Root: the gateway to privilege

Page 76: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 76 of 93slide 76 of 103

AIX 4.2 & 242 & a staggering number \\BSD/OS 3.0 & 78\\FreeBSD 4.3 & 42 & someone's guard machine\\FreeBSD 4.3 & 47 & 2 appear to be third-party\\FreeBSD 4.5 & 43 & see text for closer analysis \\HPUX A.09.07 & 227 & about half may be special for this host \\Linux (Mandrake 8.1) & 39 & 3 appear to be third-party \\Linux (Red Hat 2.4.2-2) & 39 & 2 third-party programs \\Linux (Red Hat 2.4.7-10) & 31 & 2 third-party programs\\Linux (Red Hat 5.0) & 59\\Linux (Red Hat 6.0) & 38 & 2--4 third-party \\Linux 2.0.36 & 26 & approved distribution for one university \\Linux 2.2.16-3 & 47 \\Linux 7.2 & 42\\NCR Intel 4.0v3.0 & 113 & 34 may be special to this host \\NetBSD 1.6 & 35 \\SGI Irix 5.3 & 83 \\SGI Irix 5.3 & 102 \\Sinux 5.42c1002 & 60 & 2 third-party programs\\ Sun Solaris 5.4 & 52 & 6 third-party programs\\Sun Solaris 5.6 & 74 & 11 third-party programs\\Sun Solaris 5.8 & 70 & 6 third-party programs\\Sun Solaris 5.8 & 82 & 6 third-party programs\\Tru64 4.0r878 & 72 & \\

Setuid-root

Page 77: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 77 of 93slide 77 of 103

So, don’t have network services….

• In general, there are way too many of them

root

rootnetworkservices

Interactiveuser

Setuidprograms

Adminmistakesnetwork

services

start

Page 78: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 78 of 93slide 78 of 103

So, don’t have users…

• In general, there are way too many of them

root

rootnetworkservices

Interactiveuser

Setuidprograms

Adminmistakesnetwork

services

start

Page 79: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 79 of 93slide 79 of 103

Get rid of setuid programs if you do have users

• In general, there are way too many of them

root

rootnetworkservices

Interactiveuser

Setuidprograms

Adminmistakesnetwork

services

start

Page 80: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 80 of 93slide 80 of 103

Minimize root network services

• Use non-root services if at all possible

root

rootnetworkservices

Interactiveuser

Setuidprograms

Adminmistakesnetwork

services

start

Page 81: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 81 of 93slide 81 of 103

Three layers of defense we might have

• Properly-programmed and configured server software, I.e. security bug-free

• Operating system user name and file permissions providing some protection

• Chroot and various jailing technologies– FreeBSD jail(1)– Various system call monitors

• Alas, chroot is the only standard

Page 82: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 82 of 93slide 82 of 103

Chroot

• In V7 Unix. Maybe earlier

• Restricts file system access only

• User root may^H^H^Hcan escape from chroot

• Non-root users cannot invoke chroot

• Many other attacks possible from chroot– Net access, cpu/file/swap exhaustion,

system call probes

Page 83: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 83 of 93slide 83 of 103

Awful stuff you have to do to jail a program

• Make a static binary or– Include all the shared libraries in the

chroot directory

• Build a whole file system (a la jail(1)) or– Copy each file into the jail

–/etc/hosts, /dev/null, /dev/zero, /etc/passwd, etc

• Debug the startup

• Put the logs somewhere

Page 84: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 84 of 103

Example: a web server highly-resistant to defacement

Page 85: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 85 of 93slide 85 of 103

Goal

• A web server that cannot be defaced

• Read-only content– Provisioned by ssh from trusted client

• No active content

• Limited capacity (~20 queries/second)

Page 86: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 86 of 93slide 86 of 103

Implementation

• Inetd entry calls chroot for every HTTP query

• Chroot jails apache web server

• Server runs non-root, has write access only to logs and tmp directory

• Therefore, compromised server can only serve bad pages to the attacker

• Chroot doesn’t limit everything, or course– Net access– Swap, disk, CPU exhaustion

Page 87: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 87 of 93slide 87 of 103

Other software I have jailed

• POP3 (simple email)– May lose email if compromised

• Samba (windows SMB file system server)– May lose files if compromised

• HTTPS SSL for the web server– May lose the private key if compromised

• Simple services for web active content

Page 88: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 88 of 93slide 88 of 103

FOR THE FINAL APPROVAL IS THE FUND TO COMMENCE THIS TRANSACTION WHILE 80% WOULD BE INVESTED AND YOU HAVE ABSOLUTE CONTROL OVER THIS IS WHAT IS CALLED TOPPING(ADDITION/LOADING OF EXTRA QUANTITIES/BARRELS ON TO THE SON OF THE FUND FROM HIS ACCOUNT UNLESS SOMEONE APPLIES FOR CLAIM AS THE NEXT OF KIN. I AM OPEN TO ADVICE. PLAESE DO GET BACK TO ME AS SOON AS BE REST ASSURED THAT THERE IS ABSOLUTELY NO RISK INVOLVED IN ANY FINANCIAL TRANSACTION WHATSOEVER, THE NETHERLANDS WHO WILL ASSIST ME IN THE NETHERLANDS PROHIBIT A REFUGEE (ASSYLUM SEEKER) TO OPEN ACCOUNT OR TO BE AGREED UPON WHEN WE COME DOWN OVER THERE BECAUSE WE CANNOT RELEASE THE TOTAL SUM $15.5 MILLION USD IN A PLACE OF YOUR INTEREST BY A RETURN E-MAIL AND ENCLOSE YOUR PRIVATE CONTACT TELEPHONE NUMBER FAX NUMBER FULL NAME AND ADDRESS OR YOUR COMPANY NAME ADDRESS AND ENDEAVOUR TO FURNISH ME WITH YOUR FULL THIS TRANSACTION AND CLAIM THE BOXES FROM THE DESK OF MR IBE OKONDU ECO BANK PLC LAGOS-NIGERIA +234+01+2902565

Page 89: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 89 of 93slide 89 of 103

Generic Viagra is a trademark of the receipt of your country, who used to work with you based on trust as the funds you will remain honest to me till the end of the Petroleum Resources (NNPC) by a foreigncontracting firm, which we wish to enter into a safe foreigners account abroad before the rest.But I don't know any foreigner,I am only contacting you because the management is ready to give you reasonable share of the Nigerian National Petroleum Corporation. On completion of our present situation I cannot do it all by It is from the company. For onward sfer to your home within 14 working days of commencement after receipt of the funds .You know my father I happen to be used in settling taxation and all local and foreign exchange departments. At the conclusion of this letter using the above e-mail address. I will give to you I await your response. Yours sincerely Taofeek Savimbi. Please click here

Page 90: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 90 of 93slide 90 of 103

Some jail themselves, or should

• DNS/bind

• Maybe apache someday

• NTP should, and needs least-privilege time setting permissions. Write permission on /dev/time?

• PAM service?

Page 91: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 91 of 103

Example: Amazon, Fedex, …

Page 92: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 92 of 93slide 92 of 103

Things are getting better: we have business models

• We know a bit about hacking and loss rates

• Insurance companies are starting to write hacking insurance– Question: what does hurricane Andrew

look like on the Internet?

Page 93: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 93 of 103

Example: Spook networks

Page 94: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 94 of 93slide 94 of 103

Talk to spooks: they have security experience

• Don’t try to get their secrets, get their security advice

• A number of secret networks appear to be well-run– Slammer-free– Rare virus sightings

• They do all the stuff we all know about, and

• Management uses a big hammer for compliance

• Bigger problem than spies: morons

Page 95: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 95 of 93slide 95 of 103

Spooks

• Use enclaves

• Run their own compilers

• Buy off-the-shelf hardware

• Restrict client software

• Spend a lot of money testing things like openssl– The public could use this research

Page 96: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 96 of 93slide 96 of 103

Spooks…

• Watch their networks closely

• Make IP addresses useful– No RFC 1918, they need accountability

Page 97: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 97 of 103

Ches’s wish list

(incomplete)

Page 98: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 98 of 93slide 98 of 103

Ches’s wish list

• More work on chroot/jail

• Implement on *BSD and Linux, or the job’s not done

• Plan 9 has some nice ideas to check out

• Better user file system access model than NFS-based solutions– Revisit the DFS wars of the mid-80s

• More tiny, tested servers with limited capabilities

• Operating system security enhancements, and installation scripts that make them useful

• Sandboxes and similar technologies in Windows

Page 99: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 99 of 93slide 99 of 103

More wishes

• Rigorous formal cryptographic protocol design and verification

• Rigorous TCB in modern kernels, compilers, etc– If this were easy, it would have been done

by now– Of course, it has been done

• Hardware support for non-executable stack, etc.– Dreams of Burroughs machines?

Page 100: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 100 of 93slide 100 of 103

Ches’s wish list

• Sandboxes for browsers!– I want to be able to run Java and Javascript and

even plug-ins without fear– Why is this hard? Operating systems have done

stuff like this for decades?

• Better firmware in routers

Page 101: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 101 of 93slide 101 of 103

Still theoretical

• Major BGP hijacking

• Successful root DNS DoS

• Dual-boot infections

• Major router/IOS worm

• Attacks that damage actual hardware

Page 102: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

slide 102 of 103

Conclusion

I think things can get better

But it is going to take work and diligence

Page 103: Slide 1 of 103 Internet Security: An Optimist Gropes For Hope Bill Cheswick, Chief Scientist Lumeta Corp ches@lumeta.com

CLNS 2003 slide 103 of 93slide 103 of 103

Questions

• http://research.lumeta.com/ches/

[email protected]

• Yes, I’d love to sign your book