![]() |
||||||||||
|
|
||||||||||
Instant
Messaging: How Secure Is It? Instant Messaging has become an extremely popular method of communication, especially among home internet users. It is rapidly making headway in the business sector as well. Many business users are putting messaging clients on their individual machines without company approval, causing companies to rush to add their own systems and attempt to maintain some semblance of control. However, before jumping on the instant message bandwagon, there are some security issues that should be considered. First, some background on the technology. What is Instant Messaging? Instant Messaging can be considered a hybrid of email and chat. Email allows one user to communicate with another (or several others) whether the recipient is currently on-line or not. Mail is stored in the recipients mail box on his mail server until he retrieves it. The mail can include attached files and links to URLs. Chat, on the other hand, is a real-time communication medium and is dependent on both parties being on-line at the same time. This communication does not include file transfer capabilities. Instant messaging offers the best of both worlds. It allows for real-time communication and file sharing. There are two different perspectives: file transfer oriented with messaging capabilities such as the troubled Napster, and message oriented with file transfer capabilities such as AOLs AIM (Seifried). Standards There has been an ongoing standards war for control of the customer base. At one time the main players were AIM and ICQ. AIM is an AOL proprietary system. ICQ was an independent system. ICQ (and many others) tried, unsuccessfully, to make their systems interoperable with AIM. Each time, the systems would work together for only a matter of weeks before AOL would block access. "Odigo make its software interoperable with AOLs AIM and ICQ messaging services last year only to have AOL block Odigo users after a couple of weeks" (Vance). AOL cites privacy and security concerns for its unwillingness to embrace an interoperable standard. Many vendors doubt this claim, and feel that the real issue is access to AOLs large customer base. A common viewpoint is that AOL will lose its market share as IM becomes more popular. This is already starting to happen. Currently the main players are AOL and MSN Messenger, Microsofts entry into the proprietary messaging game. While ICQ does still exist, it has been bought by AOL. Where AIM and ICQ once held about 80% of users (Vance), AOL now controls 52% of consumers and 40% of business users. MSN is rapidly gaining ground, and controls 36% of consumers and 40% of business users (Perera). In the mean time, several vendors have banded together to develop a standard for interoperability called IMUnified. As of yet, they have not been able to get AOL to cooperate with them. How does Instant Messaging work? Instant messaging requires the user to logon to the IM server when he goes on-line. This logon can be done automatically whenever the user establishes an internet connection. This logon sends user information to the IM server, including the users IP address and port. After logon, his presence is announced to anyone who is interested. He is also alerted as people on his buddy list sign on or off. He can then initiate conversations with anyone on his list. Because the server knows the IP address and port of each user, the conversation is done directly between the user machines, without any server involvement. What are the dangers of Instant Messaging? There are several issues of concern when using Instant Messaging.
Probably one of the more worrying aspects of IM is that it announces the users actual IP address along with the port it is using. "It [ICQ] sort of hides the IP address of the remote user, but since you char directly with them you can get the IP address by simply running netstat or a related utility" (Seifried). If the user is connected via an "always on" method such as DSL, the IP address is assigned to that user rather than coming from a large pool as in a dial-up connection. This opens up the machine to potential targeting. To be fair, IM providers have thought about this, and are taking steps to minimize this problem. Spam may be considered to be more of an annoyance than a danger. However, it can cause a loss of productivity, especially in a business setting, and there is really no way to completely block these types of messages. This issue is another carryover from e-mail. As people are copying files from machine to machine, any virus that theyve picked up along the way can propagate. "Microsoft recently warned MSN Messenger users that a strain of the W32 virus was being distributed using the chat clients file transfer feature" (Spring). This is something that is much more likely with the IM services that are file based, such as the old Napster and the newer Morpheus, but it still occurs on the chat based services as well. This causes not only privacy issues, but bandwidth issues as well, especially when using a service like Morpheus. If the service discovers that your machine has a lot of disk space and a large amount of bandwidth, you could end up not only downloading a file you wanted, but also then becoming the server for others who want to download that file. This is not such a risk on a home machine, but if a user sets up an unauthorized IM service on his business network, it could impact the network services of his whole company, by using both space and throughput. Even AOL Instant Messenger, which is chat based rather than file based, gives you the option to become a file server and contains a directory that is shared by default. As already pointed out, this can be a big problem when office users set up accounts with services such as Morpheus which are used primarily for file sharing. All of the above problems are concerns with a business network. While the administrator thinks that he is safe (or at least relatively so) by setting up firewalls and intrusion detection, the user has initiated a connection that will get through the firewall, and allow not only conversation, but also file movement. Suddenly there is a large gap that potentially harmful traffic can flow through. "Workers sometimes tap IM for corporate business, thus using the Internet to chat with someone down the hall, maybe sending company secrets across public networks. Its uncontrolled and making a lot of managers very nervous, says Louis Latham of Gartner Group, a market-research firm" (LaGesse).
How can these dangers be countered? One thing to realize up front is that Instant Messaging is not secure. "Messages and connection information are maintained on servers controlled by the provider of the IM utility that you use. Most utilities do provide a certain level of encryption, but they are not so secure that you should send any confidential information through the system. There have been reported cases of IM user logs being captured and used by nefarious sorts" (Tyson, 3). Any communication requiring secure connections simply cannot be handled using this medium. Having said that, it is possible to reduce some of the more glaring risks by careful configuration.
Users should not use the automatic connection option that is available with most IM services. Instead, try to minimize connection time by using the service only when necessary. Many users will log on to their computers, and then stay logged on for the day, just locking the terminal when away from their desk. During these idle times, the connection should be logged off. "For example, AOL limits the amount of text you can send through your chat client within a given time period. MSN Messenger requires you to first request a dialog in order to initiate a chat session, so that the person at the other end can decline the virtual confab" (Spring). The text limitation will at least make it more difficult for a sender to send messages to large numbers of people at once. AOL also allows you to control who you receive messages from. When you receive a message, you can add the sender to your "block" list. "Blocking the other user prevents both of you from seeing each other in your Buddy Lists, and it also prevents both of you from sending each other any more messages" (AOL-FAQ). First, know who youre getting files from. You must make sure theyre from a reliable source. This will reduce your risk, but even more importantly, you must run anti-virus software and keep it current. Viruses appear and mutate at an alarming rate, and regular updates of your anti-virus software is essential to keeping yourself protected. Finally, and most importantly, make regular backups. With all the care in the world, you could still be hit by a virus. If you cant restore your files, you turn what could have been an annoyance into a disaster. " firewalling them is very difficult, short of using non-routed IP addresses and using proxy servers and NAT at the gateways to the Internet you cant block it. Probably the simplest is to monitor network traffic going/coming from workstations and then zero in on the top 10, 20, 100, or whatever and talk to the users. Scanning your network regularly with tools like nmap and strobe will alert you to open ports" (Seifried). In order to block, or at least slow down, usage of Instant Messaging services, there are certain ports that can be closed off. ICQ gets its user list from its server by using TCP port 4000. The actual chat addresses and ports will be different, so its pretty much impossible to completely block, but closing off access to the server will slow things down (Seifried). "AIM uses port 5190 to talk to the server, and from there to other people making it hard to figure out who you are talking to, but very easy to block it (unlike ICQ)" (Seifried). Aside from trying to block IM services, companies need to make sure that their security policies address them. There need to be some rules in place governing what types of software users can put on their machines, and what kind of discipline they can expect to receive if those rules are broken.
Is Instant Messaging worth the risk? Instant Messaging, like e-mail before it, is poised to dramatically change the way that people communicate (and, indeed, this change has already begun). For business use, Im not sure that its benefits outweigh its risks. The more users there are, the more chances for security holes. It is very difficult to control access and block ports, when they are constantly changing. "The potential for abuse, wasted time and bandwidth, as well as potential legal issues probably outweigh any benefit that might be received from them. They are not oriented to team work in the sense of groupware such as Lotus Notes or Novell Groupwise" (Seifried). For home use, the risks are lessened. Home machines dont usually have the disk space or the bandwidth to make them the most attractive targets for being used as servers. Also, with a limited number of users, its much easier to control the things that are being accessed. The only real issue here is that the home user must be savvy enough to be able to make the right configuration choices and maintain the machine through anti-virus updates, patches and backups, which is something that the average home user is not always consistent about doing. All in all, Instant Messaging programs are very risky and should be avoided if possible. There are risks of exploitation through data, bandwidth, and disk space as well as questions about privacy, legal issues and liabilities. References AOL Instant Messenger Frequently Asked Questions - Warnings. URL: http://www.aol.com/aim/faq/warnings.html - warnme Hu, Jim; Konrad, Rachel (June 20, 2001). IM chats dont fade from PCs memories. URL: http://news.cnet.com/news/0-1005-200-6333967.html LaGesse, David (March 5, 2001). Instant Message phenom is, like, way beyond E-mail. URL: http://www.usnews.com/usnews/issue/010305/nycu/im.htm Perera, Rick (May 3, 2001). Instant Messaging Wars Could be Short, Nasty. URL: http://www.pcworld.com/resource/article/0,aid,49124,00.asp Seifried, Kurt (April 19, 2000). Instant Messenger, or Instant Security Risk? Spring, Tom (May 24, 2001). Whos Reading Your Instant Messages? URL: http://www.pcworld.com/resource/article/0,aid,50984,00.asp Tyson, Jeff (unknown). How Instant Message Works. URL: http://www.howstuffworks.com/instant-messaging.htm Vance, Ashlee (February 7, 2001). Instant Messaging Interoperability Nears. URL: http://www.pcworld.com/resource/article/0,aid,40823,00.asp |
||||||||||
|
to top of page | to Threats & Vulnerabilities | to Reading Room Home
|
||||||||||
![]() |
||||||||||