Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Government Security The Internet News

US Government to Have Only 50 Gateways 150

Narrative Fallacy brings us a story about the US government's plan to reduce the roughly 4,000 active internet connections used by its civilian agencies to a mere 50 highly secure gateways. This comes as part of the government's response to a rise in attacks on its networks. "Most security professionals agreed that the TIC security improvements and similar measures are long overdue. 'We should have done this five years ago, but there wasn't the heart or the will then like there is now,' said Howard Schmidt, a former White House cyber security adviser. 'The timetable is aggressive,' he said, but now there is a sense of urgency behind the program. Small agencies that won't qualify for their own connections under TIC must subcontract their Internet services to larger agencies."
This discussion has been archived. No new comments can be posted.

US Government to Have Only 50 Gateways

Comments Filter:
  • DoS??? (Score:5, Interesting)

    by DNAGuy ( 131264 ) <brent.brentrockwood@org> on Sunday April 20, 2008 @09:42AM (#23134182) Homepage
    Wouldn't this make DoS easier, not harder?
  • Re:DoS??? (Score:3, Interesting)

    by MiniMike ( 234881 ) on Sunday April 20, 2008 @09:58AM (#23134258)
    With all of the traffic that's going to be funneled through them, would a DoS be necessary?
  • by Cheerio Boy ( 82178 ) * on Sunday April 20, 2008 @10:24AM (#23134390) Homepage Journal
    Hmm...TFA says it's obviously only for the government networks but quite honestly what's going to stop them form going farther?

    After they do a project this large for their own network they'll have the experience necessary to do this across the board.

    If they do that at the major trunks running in/out of the US that pretty much would be the end of unmonitored access for anybody on the 'net in the US. (Not like ISPs in a lot cases aren't logging stuff now but there's a big difference between that and a government run filter.)

    Regardless it certainly bears keeping an eye on this to make sure it doesn't show signs of creep or expansion beyond government use.
  • by Necroman ( 61604 ) on Sunday April 20, 2008 @10:29AM (#23134410)
    I do have to say I like your idea of Tigerboxes to keep people out of network, but it makes me think of Ghost in the Shell TV series. In that series they had a concept called an "Attack Barrier" that would attack anyone that dived too deep into something they weren't supposed to be in. It could do anything from kill their connection to killing the person doing the dive.
  • Re:DoS??? (Score:5, Interesting)

    by v1 ( 525388 ) on Sunday April 20, 2008 @10:31AM (#23134418) Homepage Journal
    It would certainly reduce the number of machines to target, but if 50 machines are to cover the duties of 4,000, you know they will have some horsepower. The obvious reality is it will be a distributed load system, so each of those 50 gateways will be an entire building of machines.

    Nothing new here really. Most of those 4,000 gateways are already at least several racks of hardware. I doubt that the vulnerability to distributed attacks will go up as a result of lowering the number of vectors. If anything, having 50 standardized and more carefully monitored gateways will probably further harden them against attacks. (is YOUR gateway patched?)

    Of course the other viewpoint is if all 50 of them are being administrated by the same group or a group under central control, when a vulnerability DOES surface, (and they alway so) they will probably ALL be vulnerable since they are standardized.

    Assuming they have their heads screwed on straight, they will at least be using somewhat of a variation of several hardware and software vendors to prevent this. As it is now, if a serious problem is discovered in a high end bit of router hardware, it may force downtime on maybe 300 gateways while traffic routes around them. If all 50 are using the same, what do you do then? Flip the kill switch and take down the entire country's internet whilst you fix it?

    I want to hear that phonecall. "Hello, Cisco. We're calling in regard to this morning's zero-day bug 433-86b in regard to your model 822 enterprise gateways. We're down, we need a fix now. No, DOWN. The entire country. Yes, really."

    I'd be interested to know how China handles their great firewall. Are there details posted anywhere? Somehow I don't think they'd terribly mind taking down the entire country's internet for a day or two for national security though. (and "for reasons of national security" is very loosely interpreted in China it would seem)
  • by OeLeWaPpErKe ( 412765 ) on Sunday April 20, 2008 @10:38AM (#23134442) Homepage
    No this really helps. This will *really* help a lot with dumb bad guys on the outside (like, say the storm botnet).

    If the connections between different departments are also forced to go through only these 50 departments, that would ensure a further layer of protection.

    It is *much* easier to defend a centralized infrastructure (like this) then to defend something random.

    This is the same like in real life. Defending a castle is much simpler than defending the village. Yes castle failures are more spectacular and do more damage, but they occur so much less that it's worth to build them anyway. Breaches in the security of a "village" are constant, unfollowable and you cannot prevent them.

    So from security standpoint ... good move !
  • by the_raptor ( 652941 ) on Sunday April 20, 2008 @12:02PM (#23134858)
    And you think they aren't monitoring the international connections already? ECHELON has been around for years. Just because they can tap something doesn't mean the computing and storage power exists to do anything useful with that data. And this project doesn't change that at all.

    My country (Australia) has only a handful of international links (I think it is around five), and it is still improbable that a Government could monitor all that data. They can filter out everything but "persons of interest", but that is just as easy with a local tap.

    Monitoring the internal US net would be far more interesting to the authorities, but that is already largely multiplexed at the backbone links. Haven't you read the stories of whole regions of the US having no/poor net connection because one backbone went down and the secondary (and maybe tertiary) got saturated?

    Again this project has no application. The Internet is not some ubiquitous cloud, it still largely follows the highly structured trunk and root system of telephony.
  • by mbone ( 558574 ) on Sunday April 20, 2008 @12:47PM (#23135096)
    I see lots of waivers coming out of this. Let me guess - no additional funding will be provided to the "Small agencies that won't qualify for their own connection". Let me also guess - certain well connected companies will be doing the 50 gateways !

    When the DOD did this, no new money was provided for the switch, vendor "H" was the only source of outside assistance, at their usual outrageous prices, and everyone who could waivered out.
  • by Anonymous Coward on Sunday April 20, 2008 @01:28PM (#23135298)
    We don't log our dhcp services. We allow tor. We host tons of medical, legal, and financial information on you and other americans. The federal IT director doesn't want to change it due to 'budget constraints'. Your government at work, people.
  • by Wavebreak ( 1256876 ) on Sunday April 20, 2008 @03:34PM (#23136052)
    Actually, AFAIK (i.e. read it somewhere, not even remotely sure if it's true, but does make sense) the Great Wall was in fact meant to do neither; or rather, a bit of both. It kept the invaders in. Sure, they'd get over it pretty easily on their way in, and it was impossible to keep constant watch over in any case, but once they'd done their raiding and whatnot they'd have soldiers after them and wouldn't be able to get back over the wall fast enough to escape them, thus discouraging invasions by making it pretty much impossible to get away with your loot and your life.

No man is an island if he's on at least one mailing list.

Working...