Page 7
<<Back | Index | Next >>

Macintosh Security Basics - Presentation Notes

Fetch security options

From Fetch’s Customize menu, select Preferences and click the Security tab.


You’ll see this when you connect:

Since the Kerberos thing is difficult or impossible to use, we can at least take advantage of the basic security features. Under Fetch’s Security preferences, checking the top two boxes will not make your connection secure, but at least it will remind you when you’re about to expose your password.


E-Mail

Normal POP/POP3 mail is unencrypted

But, most major email clients support SSL

• Mail server(s) must support it too

Eudora and Outlook both have SSL option
• Protects your password and content

• Only for the path between your Mac and your ISP.
Next hop mail server may not.

Always assume that your mail message is not going to be secure for its entire journey to the recipient.
Normal POP/POP3 mail is unencrypted, but most major email clients support some level of extra security (but again, the mail server(s) must support those features as well). Eudora and Outlook both have an option for email over SSL, which if supported on your service provider’s server, protects your password and the email content -- but only for the path between your Mac and your ISP. The next mail server down the line may not have SSL, so you should always assume that your mail message is not going to be secure for its entire journey to the recipient. Eudora also supports APOP (Authenticated Post Office Protocol) which encrypts your password (though not as securely as SSL). There is also S/MIME, in which both the sender and recipient use certificates to sign or encrypt email (sort of PGP-esque).


PGP

The encryption lecture covers the details of PGP. At least one PGP client for the Mac

• PGP.com (formerly Network Associates, Inc.) has “PGPFreeware” (v. 7.0 at the time of this writing) for OS 9 and “PGP 8.0 LIVE” for OS X.
• Free for academic use
• Compatible with other flavors of PGP (such as GPG).

For OS X, there is also GPG (GNU Privacy Guard) -- more on that later.
NPGP, or Pretty Good Privacy, will be/has been discussed in depth in another class, so we won’t go into detail here. There is at least one PGP client for the Mac, which plugs in nicely to Eudora and probably Outlook, and which also provides an easy way to interact with non-standard email clients (like BlitzMail).

The client I use is made by PGP.com (formerly Network Associates, Inc.) and is called simply “PGP” (v. 7.0 at the time of this writing). It’s free for academic use, and it’s compatible with other flavors of PGP (such as GPG).

You can get GPG for OS X, and at this time the GUI is still kinda clunky, but it works if you follow the directions carefully when you set it up.


Attachments (“Enclosures”)

Most common way of getting a virus or other malware is via email attachments

Lots of clever tactics to lure you into opening something that looks legit…beware!

As a Dartmouth Mac user, you have a rare advantage -- BlitzMail. It…

• doesn’t download attachments automatically
• doesn’t interpret HTML mail (spammers send HTML mail with bad Javascripts etc.)
• isn’t Outlook ;)
Probably the most common way of getting an unwanted program (such as a virus) is by receiving an attachment in email. In the last couple years, there have been a huge number of worms which infect Windows machines via the Outlook email program. This is not directly dangerous to Mac users, but it serves to illustrate a point. The recent “Klez” virus/worm used several tactics to increase the likelihood that a recipient of the virus would open the attachment; it would pull email addresses out of the user’s address book or web cache, and create Subject lines from bits of documents or cached webpages on the victim’s computer, then generate more emails from those. The result was that other victims would receive email from people they knew, with message content that looked familiar. What a lure!

The point here is that, while Klez posed no threat to Mac users (even Mac Outlook users), the methods used by Klez demonstrate that viruses can be pretty clever.

Be certain, before you open an attachment, that the sender really is the sender, and that it’s someone you trust. Even then, you should scan the file with your antivirus software before you open it. Norton and others can be easily configured to “quarantine” and check new files before you use them.


More on email at Dartmouth

• BlitzMail hides password (challenge-response)

• Comp Svcs is currently testing software to automatically filter/alert on virus-ridden email before it even gets to you

• Also, there are plans to make the servers fully IMAP-compliant (beta testing now)

• But, the session is still clear text. Your messages can be read.
Dartmouth’s BlitzMail system provides a simple, easy-to-use, yet powerful interface for electronic mail. Its simplicity and uniqueness also add to its security; BlitzMail is immune to all the Outlook email viruses, since it does not arbitrarily download or execute code of any sort. It also does not have HTML mail capability, which thwarts a great deal of spam email containing JavaScripts and other “spyware” elements. Macintosh BlitzMail versions since 2.0.5 will even detect a keystroke logger running on the user’s machine, and will not only alert the user to this fact, but will also scramble the keystrokes as they are written to the keystroke logger’s result file, so the malicious user cannot see what was typed.


BlitzMail’s brethren

Other secure ways to use Blitz:

• WebBlitz (Basement)

• NetBlitz (my favorite, if the regular client is unavailable)

• TextBlitz via SSH (old and primitive, but works in a pinch)
In addition to the real BlitzMail client, there are other secure ways to use Blitz.

WebBlitz -- Uses SSL to protect your session.
https://basement.dartmouth.edu/blitz

NetBlitz -- a streamlined web-based client.
http://netblitz2.dartmouth.edu/Bl.cgi
Has multiple security options -- you can SSL-encrypt just your login, or your whole session, depending on how much speed vs. security you care about.

TextBlitz -- very bare-bones Blitz access. SSH to textblitz.dartmouth.edu as user “blitz” with no password. You’ll be prompted for your BlitzMail login info. You can only read what’s in your inbox. This is very old.


Viruses!

Not really a big deal for Macs (so far).

• Again, small user base and the uniqueness of MacOS = small target
• Most recent big one: Word macro virus (which affected Word documents on all platforms)
• Also, a worm or two
Not a big deal for Macs. There just aren’t very many viruses out there. Again, the small user base and the uniqueness of MacOS make it a small, unattractive target for most of the virus-writing twits in the world.

Probably the most dramatic one in recent history was the Word macro virus (which affected Word documents on all platforms, not just the Mac). It wasn’t super-destructive, but it did manage to irritate just about everybody at Dartmouth for a few months.

Macro scripting language is supposed to be used for creating in-document shortcuts for repetitive functions. The macro scripting language developed by MS apparently can do much more, because a couple years back there was a huge epidemic of macro viruses in Word documents on Windows and Mac (mostly affecting Word version 6). These viruses did a variety of cute things, like alter your “Normal” Word template such that every Word document you opened or created would be infected, and/or embed a chunk of text in every Word document you ever opened, that you could NOT remove from the document (the text contained a message about a Scrabble game), and one variant could even hide a menu in the program (!) which you had to use in order to get rid of the virus! (I thought I had gone insane. The cleanup instructions said “1. Go to the Tools menu” and there WAS NO TOOLS MENU.)


Countermeasures

3 or 4 other known Mac viruses

• Some do have destructive payloads

• Rate of infection is very low Run Norton Antivirus or equivalent

List and description of Mac viruses:

http://www.symantec.com/mac/security/macattack.html
The macro virus thing is pretty much over. Word98 and up have macro support disabled by default and/or built-in macro virus detection. Also, antivirus utilities such as Norton are able to detect and clean or at least quarantine documents containing macro viruses.

The other fairly-memorable and somewhat recent Mac malware was a worm. It used QuickTime’s “autoplay” feature (which starts playing audio CDs as soon as they’re inserted) and some strains of the worm would destroy files with .dat or .data name extensions, but mostly all it did was start up Print Spooler and slow your system down. All you had to do to avoid infection was turn off the autoplay feature in QuickTime.

There are 3 or 4 other known Mac viruses, some of which do have destructive payloads (delete random files, interfere with loading of extensions, etc.) But the rate of infection is very low. If you’re paranoid, which is a good thing, run Norton Antivirus or another AV program. It’s a good idea to boot off the CD and have it scan your system BEFORE you install it, since some viruses try to disable AV programs. Hold down the C key to boot off a CD.

List and description of Mac viruses:

http://www.symantec.com/mac/security/macattack.html


Firewalls

The firewall lecture covers how they work. Mac ones:

• Norton Personal Firewall for Macintosh
• OS X has built-in firewall software

In general, firewall software should:

• Have basic and advanced user modes
• Have good logging and notification options
• Support multiple rule sets
• Be able to export logs in standard formats
• Support multihoming
• Ideally, support egress filtering
The firewall lecture in this class covers what firewalls do and how they work. Norton Personal Firewall for Macintosh is a good choice. (OS X has built-in firewall software, but we’ll get into that later.)

A good firewall should be easy to use, have basic and advanced user modes, and have good logging (and should be able to export logs in standard formats, so you can analyze the logs with another program). It ought to support multihoming (I.e., separate rules for different network interfaces or locations, especially for PowerBook users), and ideally, filtering of outbound traffic (e.g., prevent your credit card number from being sent in a clear text format, or stop traffic destined for known Trojan horse ports.) A decent fw program should also allow you to have multiple sets of rules. You ought to be able to easily create a basic ruleset with high-security rules (the default set, preferably). There should be notification options (for example, Norton can pop up mini-windows telling you about access attempts right as they happen).

Ideally, your fw should have the abilitiy to silently drop OR explicitly reject traffic. And it should be stateful. But these last two features are pretty frequently left out of “personal” firewalls. If you really want to have these features, get a cheap old PC, install two cheap NICs, and put Linux with Netfilter on it for a dedicated, powerful, stateful inspection firewall and put your Mac behind it. :) But that’s kinda overkill.


<<Back | Index | Next >>