Top Banner
National Center for Atmospheric Research 1 NCAR Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999
40

NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

Dec 18, 2015

Download

Documents

Irene Wilcox
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research1NCAR

Security At NCAR

Pete Siemsen

National Center for Atmospheric Research

November 22, 1999

Page 2: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research2NCAR

NCAR’s Environment

• Academic research institution• But no students

• Collaboration with 63 member Universities• ~1500 university (external) users

• Diverse, widespread field projects• ~2500 networked devices internal to NCAR

• ~1500 internal users

Page 3: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research3NCAR

Obstacles to Security

• Security not taken seriously

• Considered low priority (few resources)

• Doesn’t mesh well with NCAR’s goals

• Security is a lose-lose proposition!• Too little security: it’s your fault

· We got hacked, you should’ve done more

• Too much security: it’s your fault· I can’t get my work done, you should do less

• When it works, no one notices

Page 4: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research4NCAR

Motivation to Get SeriousAbout Security

• We experienced increasing malicious attacks• More hackers hacking• Availability of hacker “kits”

· Easy to get· Don’t require network expertise

– (URLs will be shown later ;-)

• We had some strong advocates

Page 5: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research5NCAR

Getting Started

Page 6: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research6NCAR

NCAR Security Committee

• We created a committee to develop policy

• Sysadmins from all NCAR Divisions

• Policy process delivers institutional buy-in

• 2-hour meetings once a month

• Lots of cooperation, little authority

Page 7: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research7NCAR

The Security Policy

• Need a policy that defines• vulnerabilities• how much security is needed• level of inconvenience that is tolerable• solutions

• We recommended a full-time Security Administrator for the institution

• http://www.ncar.ucar.edu/csac

Page 8: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research8NCAR

Define Scope of Problem

• Decide which types of attacks are problems

• Examples:• Hacker spoofing of source IP address • Hacker scanning for weaknesses

· TCP/UDP ports, INETD services

• Hackers sniffing passwords• Hacker exploitation of buggy operating systems

· Inconsistent/tardy OS patching

Page 9: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research9NCAR

Define Scope of Solution

• What we won’t do• Not feasible to secure every computer• Over-reliance on timely OS security fixes• Can’t prohibit internal “personal” modems• Attacks from within aren’t a big problem

• What we will do• Reduce external attacks from the Internet

Page 10: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research10NCAR

Basic Solutions at NCAR

• One-time passwords

• Switched LANs

• Router packet filtering

• Application-proxy gateways

Page 11: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research11NCAR

One-Time Passwords

Page 12: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research12NCAR

One-time Passwords

• A.K.A. Challenge-Response

• Requires little calculator things (~$50/per)

• Prevents password sniffing

• We use it on critical devices• Routers, ATM Switches, Ethernet Switches,

Remote Access Servers, Server hosts (root accounts)

• At the least, do this!

Page 13: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research13NCAR

Switched LANs

Page 14: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research14NCAR

Switched LANs

• Reduces packet eavesdropping

• Get this for “free” with switched network

Page 15: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research15NCAR

Packet Filtering

Page 16: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research16NCAR

Router-Based Filters

• Used to construct router-based firewall around your internal network• (and/or between internal networks)

• Main security implementation tool

• Routers check each inbound packet against filter criteria and accept or reject• Filters reject dangerous packets• Filters accept all useful packets

Page 17: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research17NCAR

Page 18: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research18NCAR

Page 19: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research19NCAR

Packet Filtering At NCAR

• Cisco access-lists filter on• IP address source, destination, ranges• Interfaces: inbound and/or outbound• Protocols, TCP ports, etc.

• We filter only inbound packets

• Performance is an issue• We have Cisco 7507 routers• Using RSP4 CPUs

Page 20: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research20NCAR

Filter Stance: Strong or Weak?

• Strong• Deny everything, except for the good stuff

• Weak• Allow everything, except for the bad stuff

• NCAR chose a Strong stance

Page 21: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research21NCAR

Firewall Flexibility Needed• Some NCAR Divisions wanted...

• All hosts on some subnets to be “outside” firewall

• Just some hosts “outside” firewall in each subnet

• Our solution…• Some whole IP subnets bypassed by firewall

filters• Part of every IP subnet bypassed by firewall

filters

Page 22: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research22NCAR

Firewall Flexibility Needed

• Excluded/bypassed subnets are called exposed subnets; all others are called protected subnets

• Excluded/bypassed hosts are called exposed hosts; all other hosts are called protected hosts

• “protected” means NO connections are allowed from outside the firewall

Page 23: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research23NCAR

Page 24: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research24NCAR

Implementing Flexibility

• Rules to define exposed subnets• Filters bypass all hosts on selected subnets • permit ip any 128.117.1.0 0.0.0.255

• One of these rules for each exposed subnet• This works best when subnets are assigned

according to organizational topology

Page 25: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research25NCAR

Implementing Flexibility

• Rules to define exposed hosts• Bypass a fixed set of hosts on all subnets• permit ip any 128.117.0.0 0.0.255.15

• Divisions had to re-address some hosts before the filter was installed

Page 26: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research26NCAR

Example Filter Statistics

• 41 lines (rules) in NCAR’s access-list

• Hits, 28 days after filter was installed:• 3 MP Denied because of spoofing• 17 MP Denied because of

“catchall”• 71 MP Permitted to exposed

networks• 100MP Permitted to exposed hosts

Page 27: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research27NCAR

Exposed Hosts

• Example: Web servers, data source machines, etc.

• Must meet stringent security standards to avoid being compromised and used as launch pads for attacking protected hosts• OS restricts set of network services allowed• Must keep up with OS patches

Page 28: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research28NCAR

Application-Proxy Gateways

Page 29: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research29NCAR

Page 30: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research30NCAR

What They Are & Do• Provides proxy access to protected

hosts for insecure services like FTP, Telnet, X11

• Central access and monitoring point

• Authenticates users

• OS is kept VERY secure• Patches kept up to date• Unneeded services turned off• No “direct” use by users

Page 31: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research31NCAR

Security Administrator

Page 32: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research32NCAR

Security Administrator• Provides focus for security for the entire

institution

• Helps deal with break-ins• Central point of contact

• Tracks CERT advisories for sysadmins

• Advocates security solutions, like ssh• Scans exposed hosts for standards violations

• Generally helps/educates sysadmins

Page 33: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research33NCAR

Impacts of NCAR’s Security

Page 34: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research34NCAR

Benefits

• >95% of NCAR hosts are protected

• Outbound Telnet, HTTP, etc. still work

• Most users don’t notice any changes

• Relatively cheap and easy

• Dial-in users are “inside”, no changes

Page 35: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research35NCAR

Drawbacks

• UDP is blocked

• Some services are no longer available• Inbound pings are blocked !!!

• To use FTP, must use passive mode, or use an exposed host, or proxy through the Gateway

• DNS and email can get REAL complicated

Page 36: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research36NCAR

Drawbacks (cont.)

• Password sniffing still possible outside of firewall

• Ignores attacks from within

• Modems in offices are a huge hole• Bypasses authentication in our secure

modem pool

Page 37: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research37NCAR

Wrapup

Page 38: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research38NCAR

Security is Never “Done”

• How do you know if you’re being hacked?• “Silent” attacks very hard to detect• “Noisy” attacks hard to distinguish from

other network (or host) problems

• Network keeps changing

• Software keeps changing

• Hackers keep advancing

Page 39: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research39NCAR

Security is Never “Done” (cont.)

• Policy and security mechanisms must keep

• Security committee continues to meet

Page 40: NCAR National Center for Atmospheric Research 1 Security At NCAR Pete Siemsen National Center for Atmospheric Research November 22, 1999.

National Center for Atmospheric Research40NCAR

Conclusion

• NCAR struck a balance between:• Convenience and Security• Politics and Technology• Cost and Quality

• Seems to work for us• Installed it “just in time”

• Filters were installed just as attacks were getting unbearable