




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
AProtectionArchitectureforEnterpriseNetworks
(andcommentsonsecurity-centricnetworkdesign)MartinCasado(Stanford)TalGarfinkel(Stanford)AdityaAkella(CMU/Stanford)MichaelFreedman(NYU)DanBoneh(Stanford)NickMcKeown(Stanford)ScottShenker(ICSI/Berkeley)WhatI’mGoingtoTalkAboutAlotaboutsecurityintheEnterpriseAlittlebitaboutsecurityontheInternetGenerallyexploitthisopportunitytopontificateRemember..thisisCleanSlateMaybealittle“out-there”Maybealittle“wrong”Supposedtofomentideasanddiscussion
(sopleaseinterruptme)Publicvs.PrivateNetworksPublic(google,ebay,etc.)Getaswideexposure(mostly)everyonewelcomeWantsomeprotectionfromevil-doersPrivate(internalcommercial,financialetc.)SpecialpurposeLimiteduserbaseKnowswhat’srunningwhere
Fundamentallydifferent
(butusesametechnologies)AbilitytoidentifyindividualusersAbilitytorevokeaccesstoindividualusers
(stopthemfromusingyournetworkresources)Abilitytodeterminelocationofindividualusers
(regulatorycompliance)
(moreonthislater)InfrastructureSupportforPublicServicesidentifyindividualusersbyuseridrevokeaccesstousersdeterminelocationofindividualusers
andstrictlydefineconnectivitybetweenusers,hosts,services,protocolsandaccesspointscontrolroutesatthesessionlevelcentralizedtrustandcontrolrestrictaccesstoinformationInfrastructureSupportforPrivateNetworksidentifyindividualusersbyuseridrevokeaccesstousersdeterminelocationofindividualusers
andstrictlydefineconnectivitybetweenusers,hosts,services,protocolsandaccesspointscontrolroutesatthesessionlevelCentralizedtrustandcontrolRestrictaccesstoinformationSupportedbyIPMotivationPunchLineAttemptingtodoallthesethingstoday
…butwithoutthesupportofthearchitecture
Resultis:InsecurenetworkInflexiblenetworkHardtomanagenetworkDefiningConnectivityWhy?AttemptatlimitingresourcestothatwhichisneededLimitdamageofinternalmalware,perimeterbreach,orinsider
Today:UselotsoffilteringMAC,IP,transportPhysicalports(VLANs)Deeppacketinspection(e.g.firstdatapacketofaprotocol)FullproxiesAccesscontrollistsonservices
(notnetworkaware…butcouldbe!)DefiningConnectivity(thebad)NetworkonlyreallyawareofaddressesFirewallrulesembedstopologyintoconfigurationstateDifficulttomovemachinesHardtoreadandunderstand
(100klinesofproprietary,differentconfigurations)Forwardingpathunawareoffilteringrules WilltrytocircumventifitcanAddinganewnetworkcomponentnotgood
(hencehave“choked”networks)Higherlevelfilteringcanbeunderminedbylowerlevels
(e.g.permissivelinklayer)ControlOverRoutingWhy?Differentaccesspointshavedifferentsecurityrequirements(e.g.wirelessusersmustgothroughhttpproxy)Differentprotocolshavedifferentsecurityrequirements(e.g.allfilessentoverIMmustbecheckedforviruses)Differentusergroupshavedifferentsecurityrequirements(e.g.logallconnectionsfrommarketing)Today:makeallroutesgothroughthesamepoint(large,expensivedo-it-allproxies)Orusetwo/three/fourseparatenetworksOrapplicationprotocolawarerouting(CiscosOER,applicationawarerouting)CentralizedTrustandControlWhy?LimitednumberoftrustedcomponentsNetworksoftencentrallyadministeredPrettynewarea,butproductsarestartingtopopupConsentryApaniSecurifyNetworksbynaturearedistributedDistributedroutingcomputation(trusteveryrouter)Many(manymany)heavilytrustedcomponents(DNS,DHCPserver,gateway,routers,switches,end-hosts,directoryservices,authenticationservices,proxiesetc.)RestrictAccesstoInformationWhy?(firstresourceavailabletoattacker)Turnoff(normallyfilterathostorperimeterfirewall)RSTICMP(TTLTimeexceeded,echoreply,portunreach)DetectARPscansAutomatedIPscansLimitvisibilitynetworkresourcesVLANNATs,Proxiesetc.Stillreallyhardtodo(e.gTopologyinformationpassedunencryptedinroutingprotocols)No““switch””forauditing(shouldbecontrolledthesameasotherresources)RetrofittingSecurityontoIPDesignedforSecurityFirewalls,RouterACLSPortSecurityIDS/NDS/IPS(scandetection,anomalydetection,signaturedetection)VLANsPushedIntoServiceEthernetSwitchesNATs,ProxiesPhysicalDatalinkNetworkTransportApplicationInflexibleHardtomoveamachine(yetdifficulttoknowifsomeonehasmoved)ReallydifficulttodeployanewprotocolBrittleChangeafirewallrule,breaksecuritypolicyAddaswitch,breaksecuritypolicyConfusingManydisparatepointsolutionsState=abunchofsoftstateHardtostatemeaningfulpoliciesLoseredundancyIntroducechokepointsCan'tmigrateroutesb/cofallthesoftstateCommonSolutions=CrummyNetworks
(andmediocresecurity)ArgumentThusFarEnterprisenetworksuseIP(designforInternet)IPnotdesignedforattackresistancepermissiveUnauthenticatedend-pointsNoknowledgeofapplicationprotocolsHeavilydistributed(proliferationofTCB)NosupportforubiquitousloggingAttemptstoretrofitaccesscontrolshaveresultedinless-than-idealnetworksConfusingBrittleEtc.LetsStartfromScratchLeveragecharacteristicsuniquetoEnterpriseCentrallymanagedKnownusersStructuredconnectivityReducenumberoftrustedcomponentsSimplifypolicydeclarationRetainflexibilityandredundancy(decoupletopologyandsecuritypolicy)InsteadofDefaulton+filterDefaultoff+permissionDistributed,crypticpolicysimpleandcentralizedsecuritychoke-pointfinegrainedcontrolofroutesDistributedtrustcentralizedPermissivelinklayerlowlevelenforcementMomentaryDetourCurrentlytwocompetingapproachestosecuringEnterprise:A)Detectwhenthingsarebadbehaviorally(e.g.anomalydetection)Don’tknownetworkstateHowareyougoingtodefineanewprotocol?Whatifyourheuristicsarebad?B)StrictlydefinewhatispermissibleLimitconnectivitytowhatisneededtogetthejobdoneAssumetrafficusingthatisOKSANEDeclarepolicycentrallyoverusers,protocols,servicesandaccesspointsAllcommunicationsrequirea““capability””fromacentralarbiterCapabilitiesencodetherouteAllswitchesenforcethecapability(itisincludedandenforcedatlayer2)CapabilityProvidesIsolationLayerPhysicalDatalinkNetworkTransportApplicationIntroducelayer2.5IsolationLayerEthernetSANEIP..Contains,encrypted,immutable,route1,43,22,1ServiceportMACMACMACMACEsw1Esw2CAP-IDExpirationSANE:ActionSequence!Publishmartin.friends.ambient-streams
allowtal,sundar,adityaAuthenticatehi,I’mmartin,mypasswordisAuthenticatehi,I’mtal,mypasswordisRequest1434413122Ambientstreams13122Clientport14344Ambientstreams13122Clientport4344Ambientstreams13122Clientport344Ambientstreams13122Clientport44Ambientstreams13122Clientport13122Clientport4AmbientstreamsSANE:OverviewDomainControllerSwitchesEnd-HostsAuthenticatesusersContainsnetworktopologyHostsservices(byname)ManagespermissioncheckingCreatesandissuescapabilitiesSendtopologyinformationtotheDCProvidedefaultconnectivitytotheDCValidatecapabilitiesForwardpacketsbaseoncapabilityEnforcerevocationsPublishservicesattheDCSpecifyaccesscontrols(exportstreams.ambientallowtal)RequestaccesstoservicesUseappropriatecapabilityforeachpacketPermissioncheckbeforeconnectivity(Usersonlyaccessresourcestheyhavepermissionto)PolicyenforcedateveryswitchCentralized,simplypolicydeclaration(topologyindependent)ControlofroutesInformationrestrictedtoadministratorAuthenticatedendhosts(boundtolocation)SecurityPropertiesCentralpointforconnectionlogging(DC)Additionofswitches(redundancy)doesnotunderminesecuritypolicyAnti-mobilityOtherNicePropertiesBut……HowtocommunicatewiththeDC?HowtoprotecttheDC?HowtosecurelygettopologytoDC?GotoDCforeachflow…areyouinSANE?Thisisreally,reallycleanslateForkliftupgradeentirenetworkChangeallend-hoststoworkwithcapabilitiesChangenotionofservicesandnamingSwitchesconstructspanningtreeRootedatDCSwitchesdon’’tlearntopology(justneighbors)ProvidesbasicdatagramservicetoDCConnectivitytotheDCSwitchesauthenticatewithDCandestablishsymmetrickeyIke2forkeyestablishmentAllsubsequentpacketstoDChave“authenticationheader””(similartoipsecespheader)Ksw1Ksw2Ksw3Ksw4Ksw1Ksw3Ksw4Ksw2SwitchAuthenticationEstablishingTopologySwitchesgenerateneighborlistsduringMSTalgorithmSendencryptedneighbor-list
toDCDCaggregatestofulltopologyNoswitchknowsfulltopologyKsw1Ksw2Ksw3Ksw4Ksw1Ksw3Ksw4Ksw2Centralized?(andyoucallyourselfanetworkresearcher)Existstoday..Sortof(DNS)Permissioncheckisfast(andcontrolpath!=datapath)ReplicateDCComputationally(multipleservers)Topologically(multipleserversinmultipleplaces)Loadsaren’tashighasyoumightthinkUsefirstpacketofflowforpermissioncheckPorts,IPaddressesCanguessapplicationtypeInsteadofsourceroutesusevirtualcircuitsInsteadofreplacingswitches,add“bumps”BackwardsCompatibility(Ethane)ConnectionSetupSwitchesdisallowallEthernetbroadcast
(andrespondtoARPforallIPs)FirstpacketofeverynewflowissenttoDCforpermissioncheckDCsetsupflowateachswitchPacketsofestablishedflowsareforwardedusingmulti-layerswitchingDC<src,dst,sprt,dprt><ARP,bob>AliceBob<ARPreply>?<src,dst,sprt,dprt>EasingDeploymentUsetrivial2-portswitches(bumps)Onlinksbetween
EthernetswitchesCanbeenhancedbyusingVLANperportStatusBuiltsoftwareversionSANEAllcomponentsinsoftwareRaningroupnetwork(7hosts)1monthCurrentlyindevelopmentof““Ethane”Switchesinhardware+softwareDCusingstandardPCNetworkSupportforPublicServices?AbilitytoidentifyindividualusersAbilitytorevokeaccesstoindividualusersAbilitytodeterminelocationofindividualusers
(regulatorycompliance)Problem:IdentityFirstlevelofidentityistheIPaddressIsitforged?(maybe)IshalfofThailandbehindit?(maybe)ObviouslyabaddiscriminatorAllow1person,allowhalfofThailand(e.g.IPA)Ban1person,banhalfofThailand(e.g.AOLproxies)Today’ssolution?Usehigh-bandwidthinfrastructureforTCPhandshakeUseseparate,low-functionloginserviceOnlyallow““blessed”sessionstouseservicesIsthissufficient?Tomorrow’ssolution?(hip?Note……IPv6doesnothingtohelpushere)Problem:ProtectingDownstreamBWLotsofsharedqueues(crosstraffic)PacketsmaynotgettodestinationtotriggerfilteringImanuallysetmyTTLIfutzwiththetransportchecksumsoyourproxydropsitSYNpacketsourcemaybeforged(cannotfilter)Note:Overprovisionbymagicalpowerof2notreallyhelpfulToday’’ssolutionsGetfloodedIdentify“aggregates””inthenetworkHiresomeoneelsetofigureoutwhatisgoingonThirdPartyVettingModelLikelyper-flowstateAndotheranomalydetectionvoodoopeerpeerpeerpeerIPsectunnelOrprivatecircuitIsthistherightmodel?Isper-flowstateatafewpointsratherthanthroughoutthenetworkOK?Howabouthavingastatic,layer-2circuittoprotecttrustrelationships(soundsreasonabletome)CanwegeneralizethistoofferandsupportasaservicefromtheInternet?Problem:GeoLocationInformationisn’’treallystoredanywhereRegistriesaren’’taccurateDNSlocisn’twidelyusedPeopleliewhenfillingoutonlineaccountsProxiesandDial-UpsfurthercomplicatethingsTodayssolution?Alotofbadacademictools(e.g.unDNS,netgeo)Afewdecentcommercialofferings(Quova,Akamai)Offering90–95%accuracyatcountrylevelStill,maybebreakingthelaw5%ofthetimeTomorrowssolution?shouldthisevenbeatthenetworklevel?ohno!,whataboutprivacy?SecurityandtheInternetDoesIPprovideadequatesecuritythepublicNetworks?(no,butitsprettyclose..)WillafutureInternetlooksimilartoIP(maybe)Whatistheproblemthen?MalwareSPAMAdmissionControlPhishingetc.Questions?ControlofroutesispowerfulDCcanforceroutesthroughmiddlebox
basedonpolicyE.g.signaturedetectionfor
allflowsfromlaptopsandusersinmarketingSignaturedetectionMiddleboxIntegrationDecouplecontrolanddatapathinswitchesSoftwarecontrolpath(connectionsetup)(slightlyhigherlatency)Simple,fast,hardwareforwardingpath(Gigabits)PerformanceIncidentalattacks(phishing,spam,worms,viruses,kiddies)External,TargetedAttacksCompetitors(e.g.)Idealists(e.g.SCO)Insiders(29%ofallattacks?)EnterpriseThreatEnvironmentIncidentalattacks(worms,viruses,kiddies)ExternalTargetedAttacksMoreaccesstoresourcesAbilitytohireskilledattackerInsiders(29%ofallattacks?)Locality(accesstointernalnetwork)KnowledgeofinternalworkingsEnterpriseThreatEnvironmentExample:ExternalTargetedAttackTarget:Largecompany(B)AttackerProfile:RulesofEngagement:NophysicalaccessCannotlimitavailabilityofnetworkresourcesGoals:MapoutoperationsGainaccesstosensitiveinformationAbilitytodisruptinternalcommunica
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 食品经销商合同5篇
- Unit 5 Dinners ready Part A let's spell(教学设计)-2024-2025学年人教PEP版英语四年级上册
- 住宅老旧电梯更新改造的基本方案
- 2025年度国际集装箱船舶运输代理服务合同
- 科技创新中心项目概述
- 二零二五年度企业员工出差安全培训及应急演练合同
- 2025年全棉染色仿平绒项目投资可行性研究分析报告
- 国际货运代理居间协议
- 2025年度建筑安全监理简易劳动合同
- 2025年度物流仓储合作投资及智能化改造协议
- 浙教版(2023)六上 第15课 人机对话的实现 教案3
- 管理学专业:管理基础知识试题库(附含答案)
- 医疗器械质量安全风险会商管理制度
- 新疆维吾尔自治区2024届高三下学期三模试题 语文试题
- 人教版初中化学实验目录(总表)
- 《我爱上班》朗诵稿
- Q-GDW 11711-2017 电网运行风险预警管控工作规范
- 幼儿园大班下学期数学期末检测试卷第二套
- 2022年4月自考00277行政管理学试题及答案含解析
- 消防设施安全检查表
- 《网络应急响应预案》课件
评论
0/150
提交评论