Quote from SWJ12:
igsi,
You are wrong on this issue.
The issue was using IDS on the desktop. You seem want to talk about something different.
I am a sysadmin and while I try to patch my systems whenever possible, it is a completely unrealistic expectation. First of all, while I try to stay on top of all patch notifications, the high # of warnings and alerts for the numerous systems I administer makes it impossible for me to be absolutely certain that all systems are always patched to the current version. Secondly, as all of the public servers I administer are in production environments, I cannot go and willy nilly update a server anytime I want. I have to schedule maintenance windows and downtimes, first perform the upgrade in a staging environment, QA against that upgrade, etc. Many times only a "warning" issued and we do not upgrade systems until a "high priority alert" issued. It's the realities of system administration.
OK, you point is "I am to busy to stay on top of the patches." If you were "homeadmin", how many systems you would be responsible for? See the difference? That's not it. I am not done with you as sysadmin yet.
For desktop users, how many times have you seen an MS update notification, and how long was the delay between when the update was available and when you actually installed the update?
The timing may vary but I hope you do realize that in automated environment the time frames we are looking at are hours not weeks. This includes both, BTW, desktops and servers.
Relying on such security hardening technologies as IDS (which is just one element of "hardening")
You confuse hardening security with hardening system and IDS is part of neither of those.
You don't have to take my word for it. Besides, compared to you I'm probably a technology neophyte. So why not take a recognized security expert's word on the risks of relying on patches as a security measure? (Look at Jay Beale's answer to the question "What are the top things sysadmins can do to protect themselves?")
http://newsforge.com/article.pl?sid=02/10/25/1728232
Note that Beale talks about:
1. Hardening your system using security measures such as IDS is the most important!
Here is an excerpt from the article you're referring to which lists what hardening involves:
1. Configuring necessary software for better security
2. Deactivating unnecessary software
3. Configuring the base operating system for increased security
Did it ever occur to you that Beale nowhere mentioned IDSs in the very article you were referring to?
2. Patches are important, obviously, but there is risk due to the non-zero time it takes a vendor to release a patch and you to apply it.
Yes, there is a risk for servers. And the servers should be hardened because of this. However, this is not applicable to desktops because, as a rule, you don't run on the desktop remotely exploitable software, with an exception of Internet software such as email clients and browsers. That kind of software must be patched immediately. And, BTW, IDS is not an appropriate technology to keep your browser and email client safe anyway.
3. With a a hardened system you can actually break the exploits so that you can't be hacked, even while you still have broken software on the system.
That's what Beale says. And below is how you continued:
We have a Cisco IDS in addition to Tripwire and Snort. Even if we have susceptible software, we are at much less risk because we scan all incoming packets at network and server, and if something slips through and is compromised we know about it the same day!
Oh boy, you are confused one. Beale is talking about how not to get hacked and you are talking about how to find out that you being or already got hacked. Let me just say that network based IDSs have nothing to do with hardening OS. It's not that the other types IDSs do but mentioning Cisco in this context is just hillarious.
5. Obviously, the best approach is do all 3 things Beale mentions (hardened system && patches && firewall) .
Correct.
I just wanted to raise my hand and say that dottom isn't the only one who thinks that relying on firewall and a system administer to patch all vulnerable systems is sufficient. No way.
First, we were talking about desktops, not the networks full of servers. Second, dottom was not talking about hardening, which I confirm again, is very important but about IDS. You think that IDS is part of hardening and that's where you dead wrong. Hardening has nothing to do with idss.
Neither you nor dottom could present an argument what to use IDS for, whether on the desktop or on the server, or on the network. Not because there is no use to it but because you do not understand what it's for and misuse it.
Besides providing some peace of mind, especially to paranoid one, IDSs can be used as tools for collecting forensic evidence and catching insiders in the act (see http://www.sans.org/resources/idfaq/ipe.php for the reference). I want to point out once again that none of these has practical application for home systems.