The following forty five (45) Internet/network security gotchas are taken from Firewalls and Internet Security – Repelling the Wily Hacker, Second Edition (ISBN: 0-201-63344-X) by William R. Cheswick, et. al.
- IP source addresses aren’t trustable.
- Fragmented packets have been abused to avoid security checks.
- ARP-spoofing can lead to session-hijacking.
- Sequence number attacks can be used to subvert address-based authentication.
- It is easy to spoof UDP packets.
- ICMP
Redirect
messages can subvert routing tables. - IP source routing can address-based authentication.
- It is easy to generate bogus RIP messages.
- The inverse DNS tree can be used for name-spoofing.
- The DNS cache can be contaminated to foil cross-checks.
- IPv6 network numbers may change frequently.
- IPv6 host addresses change frequently, too.
- WEP is useless.
- Attackers have the luxury of using nonstandard equipment.
- Return addresses in mail aren’t reliable, and this fact is easily forgotten.
- Don’t blindly execute MIME messages.
- Don’t trust RPC‘s machine name field.
- Rpcbind can call RPC services for its caller.
- NIS can often be persuaded to give out password files.
- It is sometimes possible to direct machines to phony NIS servers.
- If misconfigured, TFTP will had over sensitive files.
- Don’t make ftp‘s home directory writable by ftp.
- Don’t put a real password file in the anonymous ftp area.
- It is easy to wiretap telnet sessions.
- The r commands rely on address-based authentication.
- Be careful about interpreting WWW format information.
- WWW servers should be careful about URLs.
- Poorly written query scripts pose a danger to WWW servers.
- The MBone can be used to route through some firewalls.
- Scalable security administration of peer-to-peer nodes is difficult.
- An attacker anywhere on the Internet can probe for X11 servers.
- UDP-based services can be abused to create broadcast storms.
- Web servers shouldn’t believe uploaded state variables.
- Signed code is not necessarily safe code.
- [Client-side script] is dangerous.
- Users are ill-equipped to make correct security choices.
- Humans choose lousy passwords.
- There are lots of ways to grab
/etc/passwd
. - There is no absolute remedy for a denial-of-service attack.
- Hackers plant sniffers.
- Network monitoring tools can be very dangerous on an exposed machine.
- Don’t believe port numbers supplied by outside machines.
- It is all but impossible to permit most UDP traffic through a packet filter safely.
- A tunnel can be built on top of almost any transport mechanism.
- If the connection is vital, don’t use a public network.