Top Banner
ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies
21

ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Dec 17, 2015

Download

Documents

Frank Atkinson
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

ISP Working Group Internet Vulnerability

Summary & Discussion

Avi Freedman

Akamai Technologies

Page 2: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

ISPWG: Background (1)

• In Jan 2002, Dick Clarke called a meeting of industry and government to cover Internet vulnerabilities in the hope of starting a process that would lead to identification of vulnerabilities and that would lead to recommendations for the cyberdefense plan.

• Clarke’s group works for/with both the National Security Council and the Homeland Defense groups.

Page 3: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

ISPWG: Background (2)• From Feb-Apr, different groups formed and had

teleconference and list discussions of the following issues:– BGP & DNS– Hardening the peering & router infrastructure– Network ops & management– Disaster recovery– Inter-provider coordination– Enforcement nad privacy

• The process was shepherded by Marj Gilbert from Dick Clarke’s staff (the PCIPB) and by Marty Lindner from CERT.

Page 4: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

ISPWG: Background (3)

• The following assumptions were made:– Poor software quality is a problem that must be

addressed separately (not everyone agrees that this can be easily dismissed)

– Domestic vs. international issues are not easy to solve, so focus on domestic US first

– Information sharing (vulnerabilities, network data, etc) need to be protected from FOIA/kept proprietary.

Page 5: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Key Recommendations (1)

• Establish ISP best practices– Address accountability– Filtering– Access control and authentication– Change control– Personnel policies and procedures– Standardized training– Refer to NRIC & other processes

Page 6: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Key Recommendations (2)

• Establish secure, real-time, crisis-available ISP/Vendor/Gov’t channels

• Establish policy-based network management capabilities

• Have a master study to analyze and identify single points of failure (buildings, logical infrastructure, fiber) domestically and internationally

• Review law enforcement procedures; amend FOIA/anti-trust, and provide immunity to ISPs for emergency disclosures and data submission, and to allow govt and industry to exchange info

• Create national Internet disaster management team

Page 7: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Personal Summary

• The “barreling down the road” issues for providers to (finally) achieve proactive progress on are:– Address accountability– Filtering– BGP vulnerabilities

• These are critical because there could be a move to regulate, legislate, or fund less than wise solutions.

Page 8: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Working Group Summaries

• The following slides present VERY excerpted summaries of the groups’ reccomendations, mostly intended to cover the critical issues and provide flavor.

• One key question is how the NANOG community becomes involved and sanity-checks. Unclear that IETF-ers are the right crowd for consensus – perhaps that concept needs to find tha NANOG crowd and then interact with the gov’t.

Page 9: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

BGP & DNS WG (1)

• Leader – Steve Blumenthal, Genuity

• Recommend (DNS):– Best practices for DNS (not all on one /24, etc)– Source address (packet) + ingress (route) filtering to

prevent spoofing– DNS server software, network, and geo diversity– Finishing and implementing DNSSEC (+funding)

Page 10: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

BGP & DNS WG (2)

• Recommend (ctd):– Best practices (max-prefix, dampening, etc)– Explore IPSEC to sign & auth BGP routing data– Complete Secure BGP & test in an operational

environment– Investigate feasibility of egress route filtering at peering

points– Design routers to better withstand DoS attacks– Greater diversity of peering interconnection– MD5 on BGP4 connections (help with RST attacks)– Improve authentication of routing info

Page 11: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Hardening WG (1)

• Leader - Avi Freedman, Akamai

• Recommendations (short-term):– Education & training on default initial configs– Security at common facilities– Filtering access to management & control planes– Out-of-band access– Investigate interconnection infrastructure diversity &

options (NOT regulation)– Login authentication– Investigate insider-threat issues

Page 12: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Hardening WG (2)

• Recommendations (long-term):– Router protection: Architecture & Configuration– Continued investigation of diversity of interconnection

infrastructure– Continued work on better OOB deployment– Awareness of data center devices & overlay networks– Criticality of solving source address filtering– Continued work on best practices

Page 13: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Net Ops WG (1)

• Leader – Art Deacon, AT&T• Recommendations (short-term):

– Network management should use one-time keys, crypto sums on software upgrades, strong AAA methods, avoid static passwords, and use encrypted management traffic with strong authentication

– Repetitive tasks should be automated and APIs such as SNMP/XML for configuration should be available

– Protection of management flows via ACLs etc; logged and auditable management traffic/sessions

– Documented network access policy

Page 14: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Net Ops WG (2)

• Recommendations (long-term):– Continue work on policy-based network management

capabilities– IETF should work on requirement and standards for

interoperability– Address accountability is essential– Migrate from SNMPv1 to SNMPv3– Need to improve incident disclosure to help operators

and vendors

Page 15: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Disaster Recovery WG (1)

• Leader – Surprise surprise (Sean Donelan, SBC)

• Recommendations:– Set criteria for gov’t invovement– Work on simulation & modeling– Deal with vulnerabilities proactively– Perform vulnerability assessments– Work with NSTAC/NRIC– Share information– Define and practice the “Plan”

Page 16: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Disaster Recovery WG (2)

• Recommendations (ctd):– Define skill sets needed– Create “contact list” and methods– Establish 24x7 Internet emergency management office– Get ISPs involved with emergency preparedness– Funding is needed

• Undecided issues:– Priority communications for key individuals– Restoration priorities– Load shedding during periods of capacity shortages

Page 17: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Coordination WG (1)

• Leader – Kelly Cooper, Genuity

• Recommendations:– Major: Establish and standardize communication

channels between Internet-supporting sectors– ISPs: Inter-ISP real-time communications, contact info,

best practices forum, collect/maintain info (?ISP-ISAC, ?NCC-ISAC, ?NIST)

– Gov’t: Single focal point, contact info across ISPs and vendors, long-term plans, info-sharing network, continuity of operations (?IRC, ?NCC/NCS)

Page 18: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Coordination WG (2)

• Recommendations (ctd):– Vendors (equipment): Single forum, operational best

practices, reporting standards, common feature sets, timely communicaftions, training (NCC-ISAC, IT-ISAC)

• Independents– Disseminate best practices, provide advance notice of

issues, pass vulnerability info, establish trusted ISP and “correct sector” contacts

Page 19: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Enforcement & Privacy WG (1)

• Leader – John Ryan, AOL• Recommendations:

– Meaningful info sharing is critical for dealing with any widespread threats, but legal impediments must be resolved:

• FOIA & Sunshine Laws

• Discovery provisions

• Lack of immunity for emergency disclosures & voluntary surveillance under USA/Patriot Act

• Statutory environments do not limit liability

• Coordination may require central training, investigative unit, access to states of resources, and simulation and cyber gaming

Page 20: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Summary• A lot of government interest in Internet infrastructure

vulnerabilities.• Awareness of BGP limitations and of issues with lack of

filtering.• Please get involved and seek info/provide input.• It’s critical that we as a community address filtering

(packet & route) and route authentication before solutions are imposed in some way (i.e. government requiring solution from all vendors). In particular, is there a lightweight in-addr based method that could be set up for describing authorized origin AS(s) for prefixes? Other lightweight solutions?

Page 21: ISP Working Group Internet Vulnerability Summary & Discussion Avi Freedman Akamai Technologies.

Personal Summary (Revisit)

• Real IGP work done to prevent BGPOSPF leading to catastrophe would be a great step.

• Having community support for assembling a ‘net-wide Origin-AS Prefix mapping database is key to any route/packet filtering work. Real progress here could help stave off a S-BGP “before its time” push.– NOT talking about SWIP-type info– NOR about IRR-type policy info?– Store in in-addr?– Something good enough to start is key.