summaryrefslogtreecommitdiff
path: root/TODO
diff options
context:
space:
mode:
Diffstat (limited to 'TODO')
-rw-r--r--TODO122
1 files changed, 122 insertions, 0 deletions
diff --git a/TODO b/TODO
new file mode 100644
index 0000000..c618004
--- /dev/null
+++ b/TODO
@@ -0,0 +1,122 @@
1TODO:
2
3append only files can be achieved by making sure that offsets passed to writefile are not less than the total size of the file
4
5disable all non-TCP/IP / netbios protocols by default (with an additional option to enable)
6(connect to \Device\AFD disable non tcp/ip stuff) (\device\netbios)
7
8svchost.exe needs to be jailed by DLLs... each DLL will have its own policy
9
10policy_include: additional.policy
11
12add ability to deny logons to certain users
13
14add a "signature" rule.. LocalSystem execution of different processes (especially cmd.exe) should be logged and possibly denied?
15
16allow occasional rules to go through w/o logging? especially file & registry?
17
18investigate SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\App Paths\\IEXPLORE.EXE
19
20
21disable execution of certain applications based on their version (i.e. vulnerable IE) (from okena)
22add sniffer & non-ip protocol detection (from okena)
23COM/ActiveX interception
24support for application clauses (chapter 6)
25
26when creating an "exception" rule, MC can/should ask for whether the exception rule should be created on
27the selected agent only, all agents of a certain type or all agents of all types
28
29
30block debuggers
31
32non-GUI/system apps cannot use GUI calls?
33
34
35in server paranoid mode, allow only c:\program files\*.exe and c:\windows\*.exe to execute?
36trusted path execution (execution of binaries from non-trusted directories (i.e world-writable))
37(A trusted path is one that is inside is a root owned directory that is not group or world writable.)
38
39explorer option.. "Run process in a sandbox.." brings up a gui that asks whether to allow file, reg, network access?
40
41port to Itanium/AMD64
42
43see if we can take over the job of a buffer overflow security exception handler
44on win2k3 install custom BO exception handler that terminates a process
45
46need to be able to control access to all device drivers (is this already handled by intercepting createfile?) is there another way to obtain a handle to a kernel driver?
47disable modem access, etc
48
49raw devices of all (mounted?) filesystems should be read-only
50
51copy in all unicode strings, check them and then pass the kernel copies to the kernel to avoid race conditions?
52
53disable our driver if loading using LastKnownGood configuration (notify MC?)
54
55restrict reboot capability and certain programs only to interactive sessions?!
56
57add ability to load what programs are allowed to run? (sha1 hashes, signed binaries)
58
59investigate kernel32!CreateHardLink
60
61dll_all: log will also log all section rules since RULE_DLL will be converted to RULE_SECTION
62
63protect crypto keys
64
65use ZwQueryProcessInfo ProcessVmCounters to keep track of amount of allocated process memory (execution time can be limited using job objects?! memory limit too?)
66(or simply hijack malloc & free)
67
68device naming on terminal servers
69
70have a webpage which lists new vulnerabilities and whether our system would automatically protect against it
71
72deallocate allocated virtual memory that was used by AS randomization once the process is loaded and initialized (what about dynamically loaded DLLs)?
73
74create a policy check tool.. one of the things to lookout for is using "eq" and then specifying regex chars like * or ? in the filename
75
76interactive learning mode
77
78policy_ask user app should not run as an interative service but rather as a separate app running as a particular user
79
80IIS install should scan the registry for any known virtual roots and automatically add them to the policy.. same for other apps
81
82make sure that file-system protection cannot be subverted by accessing files by other means (\\127.0.0.1\share\file)
83
84per-group policy, per-user global policy
85
86
87network connect should be able to specify ports and not just ip addresses
88address eq "127.0.0.1:443" then permit
89address eq "0:443" then deny
90address eq "\\UNCpath\blah" then log
91address eq "www.porn.com:80" then deny
92
93
94new product idea: Solaris BSM-like auditing (http://www.securityfocus.com/infocus/1362) for Windows
95(compare to what audit logs native Windows Group/Security Policies can already generate)
96posix 1003e
97
98
99layers:
100
101desktop
102web server (iis, apache, netscape)
103database server (oracle, MS SQL / access, Sybase, DB2, Informix, Interbase, MySQL)
104terminal server
105mail server
106VPN server / remote access server
107
108dns server
109dhcp server
110wins server
111streaming media server
112domain controller
113file and print server
114(application server – websphere, BEA websphere)
115(collaboration server – IBM Lotus Domino)
116
117
118client policies:
119 email (outlook, outlook express, eudora, netscape)
120 browsers (IE, netscape, opera)
121 IM (aol, yahoo!, msn, icq)
122 others (ms office, napster)