Top Banner
MPLS/VPN Security Threats and Defensive Techniques (provider provision) Speaker JET 3,1’2004
30

MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Jan 18, 2016

Download

Documents

Artie

MPLS/VPN Security Threats and Defensive Techniques (provider provision). Speaker : JET 3,1’2004. Introduction. From BTexact Technologies. What is Threats ?. Observation, modification, or deletion of PPVPN user data Replay of MPLS/VPN user data - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Speaker: JET

3,1’2004

Page 2: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Introduction

From BTexact Technologies

Page 3: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

What is Threats ?

Observation, modification, or deletion of PPVPN user data

Replay of MPLS/VPN user data Injection of non-authentic data into a

MPLS/VPN Traffic pattern analysis on MPLS/VPN traffic Disruption of MPLS/VPN connectivity Degradation of MPLS/VPN service quality

Page 4: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Threats sources

The MPLSVPN service provider or persons working for it

Other persons who obtain physical access to a service provider site

Persons within the organization which is the MPLS/VPN user with respect to a particular MPLS/VPN

Persons within an organization that is a separate MPLS/VPN user of the same service provider

Others i.e. attackers from the Internet at large.

Page 5: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Security Threats - Data Plane

MPLS/VPN

Spoofing and Replay

Unauthorized Observation/Modification/Deletion

DoS

Traffic Pattern Analysis

Impersonation

Page 6: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Insertion of Non-Authentic Data Traffic: Spoofing and Replay Spoofing : insertion into the VPN of packets

that do not belong there Replay : copies of once-legitimate packets

that have been recorded and replayed

Page 7: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Denial of Service Attacks on the MPLS/VPN Monopolize network resources and thus prev

ent other PPVPNs from accessing those resources

Inserting an overwhelming quantity of non-authentic data

Overwhelming the service provider's general (MPLS/VPN-independent) infrastructure with traffic

Interfering with its operation

Page 8: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Unauthorized Observation/Modification/Deletion of Data Traffic

“Sniffing" VPN packets Examining their contents Modifying the contents of packets in flight Causing packets in flight to be discarded Would typically occur

on links in a compromised node

Page 9: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Traffic Pattern Analysis

“Sniffing" VPN packets and examining aspects or meta-aspects of them Even are encrypted

gain useful information the amount and timing of traffic packet sizes source and destination addresses etc.

Page 10: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Impersonation

Disguises itself to appear as a legitimate entity

Page 11: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Security Threats - Control Plane

SP’s Equipment

Cross-connection of Traffic

Between MPLS-VPNs

DoSRouting Protocols

Route Separation

MPLS/VPN

Address Space

Separation

Page 12: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Denial of Service Attacks on the Network Infrastructure Against the mechanisms the service provider

uses to provide MPLS/VPNs MPLS , LDP/BGP , IPsec , etc.,

Against the general infrastructure of the service provider Core routers

Deny the otherwise-legitimate activities of another MPLS/VPN user

Page 13: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Attacks on the Service Provider Equipment Via Management Interfaces

Reconfigure the equipment extract information (statistics, topology, etc.)

Malicious entering of the systems Inadvertently as a consequence of

inadequate inter-VPN isolation in a MPLS/VPN user self-management interface

Page 14: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Cross-connection of Traffic Between MPLS/VPNs This refers to the event where expected isolation bet

ween separate PPVPNs is breached This includes cases such as

A site being connected into the "wrong" VPN Two or more VPNs being improperly merged together A point-to-point VPN connecting the wrong two points Any packet or frame being improperly delivered outside

the VPN it is sent in Likelihood of being the result of service provider or eq

uipment vendor error

Page 15: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Attacks Against MPLS/VPN Routing Protocols Routing protocols that are run by the service

provider - LDP / BGP In layer 3 VPNs with dynamic routing this wou

ld typically relate to the distribution of per-VPN routes as well as backbone routes

In layer 2 VPNs this would typically relate only to the distribution of backbone routes

Page 16: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Attacks on Route Separation

keeping the per-VPN topology and reachability information for each PPVPN separate from, and unavailable to, any other PPVPN

Reveal topology Addressing information about a MPLS/VPN Cause black hole routing or unintended cros

s-connection between MPLS/VPNs

Page 17: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Attacks on Address Space Separation

In Layer 3 VPNs, the IP address spaces of different VPNs need to be kept separate

In Layer 2 VPNs, the MAC address and VLAN spaces of different VPNs need to be kept separate

Result in cross-connection between VPNs.

Page 18: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Defensive Techniques

Cryptographic techniques Authentication Access Control techniques Use of Isolated Infrastructure Use of Aggregated Infrastructure Service Provider Quality Control Processes Deployment of Testable MPLS/VPN Service

Page 19: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Defense Philosophy

Security threats can be addressed Provider's specific service offerings MPLS/VPN user should assess the value which these

techniques add to the user's VPN requirements Nothing is ever 100% secure - most likely to occur

and/or that have the most dire consequences To make the cost of a successful attack greater than

what the adversary will be willing to expend

Page 20: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Cryptographic techniques

Privacy traffic separation encryption

Authentication Integrality Drawback

Computational burden Complexity of the device configuration Incremental labor cost Packet lengths are typically increased

traffic load fragmentation

Other Devices

Page 21: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

IPsec in MPLS/VPNs

PE to PE (can’t be employed ) PE to CE - weaker links (pass the Internet) CE-to-CE (only use tunnel mode)

Service Level Agreement (SLA) rather than analyzing the specific encryption techniques \

Page 22: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Encryption for device configuration and management Secure Shell (SSH) offers protection for

TELNET [STD-8] or terminal-like connections to allow device configuration

SNMP v3 [STD62] also provides encrypted and authenticated protection for SNMP-managed devices

Transport Layer Security (TLS) (also known as Secure Sockets Layer or SSL) [RFC-2246]

Page 23: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Authentication

Prevent Denial -of-Service attacks Malicious misconfiguration

Cryptographic techniques – Cryptographic techniques

shared secret keys one-time keys generated by accessory devices or soft

ware user-ID and password pairs public-private key systems do not protect against some types of denial of service a

ttacks

Page 24: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Authentication issues

VPN Member Authentication Management System Authentication

auto- discovery Peer-to-peer Authentication

Page 25: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Access Control techniques

packet-by-packet packet-flow-by-packet-flow Filtering Firewalls

Page 26: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Filtering

Common for routers Filter Characteristics

Stateless (In most cases ) Stateful (commonly done in firewalls )

Actions based on Filter Results Discard Set CoS Count packets and/or bytes Rate Limit - MPLS EXP field Forward and Copy

Page 27: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Firewalls

passing between different trusted zones SP to SP , PE to CE

passing between trusted zone and an untrusted zone Services

threshold-driven denial-of-service attack protection virus scanning acting as a TCP connection proxy

Advantage understanding of the topologies understanding of the threat model

Page 28: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Firewalls (conf)

Within the MPLS/VPN framework, traffic typically is not allowed to pass between the various user VPNs

Extranets - provide the services required for secure extranet implementation

Protect the user VPNs and core network from the public Internet

Page 29: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

vpn 2

My LAB Environment

isp A

isp B

P routerLinux

MPLS Daemon

vpn 1

HOSTLinux

For API

WinXPFor Microcode

CE routerLinux

PE routerLinux

MPLS Daemon

ixp1200

Frmo EE

ixp1200

ixp1200

ixp1200

Page 30: MPLS/VPN Security Threats and Defensive Techniques (provider provision)

Next Presentation (3,8’2004)

IXP1200 Linux How To MPLS for Linux Development