Document 7591136

Download Report

Transcript Document 7591136

University of Washington
Computing & Communications
Open Network Security
or “closed network” insecurity?
Terry Gray
Director, Networks & Distributed Computing
14 March 2002
University of Washington
Computing & Communications
UW Environment
•
•
•
•
•
•
•
•
$1.5 B/yr enterpise (75% research/clinical)
55,000 machines
Infinite variety and vintage of computers
Incredibly complex/diverse org structure
Relatively little centralized desktop mgt
Every dept’s middle name is Autonomous
C&C provides core I.T. infrastructure
Depts responsible for end-system support
University of Washington
Computing & Communications
Conventional Security Wisdom
• Popular Myth:
“The network” caused the problem, so “the
network” should solve it… So good security
depends on:
– border firewalls
– border VPNs
• Unpopular Reality:
In a large, diverse organization such as UW,
security is not achieved by either one.
University of Washington
Computing & Communications
Unconventional Security Wisdom
“If you think technology can solve your
security problems, then you don't
understand the problems and you don't
understand the technology. “
Bruce Schneier
Secrets and Lies
University of Washington
Computing & Communications
Gray’s Network Security Axioms
• Network security is maximized…
when we assume there is no such thing.
• Firewalls are such a good idea…
every host should have one. Seriously.
• Remote access is fraught with peril…
just like local access.
University of Washington
Computing & Communications
Perimeter Protection Paradox
• Firewall “perceived value” is proportional
to number of systems protected.
• Firewall effectiveness is inversely
proportional to number of systems
protected.
– Probability of compromised systems existing inside
– Lowest-common-denominator blocking policy
University of Washington
Computing & Communications
Credo
• Open networks
• Closed servers
• Protected sessions
University of Washington
Computing & Communications
Security Elements
• Architectural
– Authentication & Authorization
– Encryption
– Packet filtering
• Operational
– Prevention
– Detection
– Recovery
• Policy
– Risk Management
– Liability Management
University of Washington
Computing & Communications
Start with a Security Policy
Now there’s an idea...
• Define who can/cannot do what to whom...
• Identify and prioritize threats
• Identify assumptions, e.g.
– Security perimeters
– Trusted systems and infrastructure
– Hardware/software constraints
• Block threats or permit good apps?
• Minimize organizational distance between policy
definition, configuration, and enforcement points
University of Washington
Computing & Communications
Network Risk Profile
(notwithstanding recent SNMP exploits)
University of Washington
Computing & Communications
Heroic (but futile) Endeavors
• Getting anyone to focus on policies first
• Getting any consensus on border blocking
• Patching old end-systems
• Pretending that clients are only clients
• Securing access to older network gear
University of Washington
Computing & Communications
Bad Ideas
• Departmental firewalls within the core.
• VPNs only between institution borders.
• Over-reliance on large-perimeter defenses...
e.g. believing firewalls can substitute for
good host/application administration...
University of Washington
Computing & Communications
Good Ideas
•
•
•
•
•
•
•
•
•
Two-factor authentication
End-to-End encryption: IPSEC
End-to-End encryption: SSH/SSL/K5
Proactive vulnerability probing
Centralized desktop management service
Latest OS versions (w/integral firewalls)
Bulk email virus scanning
Server sanctuaries
Logical firewalls
University of Washington
Computing & Communications
Jury Still Out
• Intrusion Detection Systems
• DDoS trackers
• Thin Clients
University of Washington
Computing & Communications
When do VPNs make sense?
• E2E:
– Whenever config cost is acceptably small
• Non-E2E:
– When legacy apps cannot be accessed via
secure protocols, e.g. SSH, SSL, K5.
and
– When the tunnel end-points are very near the
end-systems.
University of Washington
Computing & Communications
Where do firewalls make sense?
• Pervasively: (But of course we have a firewall…:)
– For blocking spoofed source addresses
• Small perimeter/edge:
– Cluster firewalls, e.g. server sanctuaries, labs
– OS-based and Personal firewalls
• Large perimeter/border:
– Maybe to block an immediate attack?
– Maybe if there is widespread consensus to block
certain ports? (Aye, and there’s the rub…)
– And then again, maybe not...
University of Washington
Computing & Communications
Fundamental Firewall Truths...
• Bad guys aren’t always "outside" the moat
• One person’s security perimeter is another’s
broken network
• Organization boundaries and filtering
requirements constantly change
• Perimeter defenses always have holes
University of Washington
Computing & Communications
The Dark Side of Border Firewalls
It’s not just that they don’t solve the problem very well;
large-perimeter firewalls have serious unintended consequences
• Operational consequences
–
–
–
–
–
Force artificial mapping between biz and net perimeters
Catch 22: more port blocking -> more port 80 tunneling
Cost more than you think to manage; MTTR goes up
May inhibit legitimate activities
Are a performance bottleneck
• Organizational consequences
–
–
–
–
Give a false sense of security
Encourage backdoors
Separate policy configuration from best policy makers
Increase tensions between security, network, and sys admins
University of Washington
Computing & Communications
Mitnick’s Perspective
"It's naive to assume that just installing a
firewall is going to protect you from all
potential security threats. That assumption
creates a false sense of security, and having
a false sense of security is worse than
having no security at all."
Kevin Mitnick
eWeek 28 Sep 00
University of Washington
Computing & Communications
Do You Feel Lucky?
• QUESTION:
If a restrictive border firewall surrounds
your --and 50,000 other-- computers, should
you feel safe?
• ANSWER:
Only if you regularly win the lottery!
University of Washington
Computing & Communications
Distributed Firewall Management
• Given the credo of:
– Open networks
– Closed servers
– Protected sessions
• What about all the desktops?
– Organizations that can tolerate a restrictive border
firewall usually centrally manage desktops
– Thus, they can also centrally configure policybased packet filters on each desktop and don’t
need to suffer the problems of border firewalls
– Centrally managing desktop firewalls possible
even if desktops generally unmanaged
University of Washington
Computing & Communications
UW’s Logical Firewall
• If edge and/or E2E protection isn’t possible,
and the idiots running the net “won’t help”…
• Plugs into any network port
• Departmentally managed
• Opt-in deployment
• Doesn’t interfere with network management
• Uses Network Address Translation (NAT)
• Intended for servers; can be used for clients
• Web-based rules generator
• Gibraltar Linux foundation
University of Washington
Computing & Communications
Server Sanctuaries
• Cluster sensitive/critical servers together…
• But don’t forget geographic-diversity needs
• Then provide additional logical and
physical security
University of Washington
Computing & Communications
Technical Priorities
• Application security (e.g. SSH, SSL, K5)
• Host security (patches, minimum svcs)
• Strong authentication (e.g. SecureID)
• Net security (VPNs, firewalling)
University of Washington
Computing & Communications
Policy & Procedure
•
•
•
•
•
•
•
•
•
•
Policy definition & enforcement structure
Education/awareness: it’s everyone’s job
Standards and documentation
Adequate resources for system administration
High-level support for policies
Pro-active probing
Security consulting services
IDS and forensic services
Virus scanning measures
Acquiring/distributing tools, e.g. SSH
University of Washington
Computing & Communications
Risk & Liability Issues
• Liability over network misuse?
–
–
–
–
Policies define acceptable use
Post-audit strategy for enforcement
Wireless perimeter control?
Are networks an “attractive nuisance”?
• Risk of server compromise?
– Strong preventive stance
– Pre-audit via proactive probing
– Greater sensitivity -> greater security
University of Washington
Computing & Communications
Reality Check
• John Gilmore: “The Internet deals with
censorship as if it were a malfunction and
routes around it”
• Isn’t this also true of other forms of policybased restrictions, including Kazaa clamping
and border port blocking?
University of Washington
Computing & Communications
“Inverted Networks”
•
•
•
•
New trend in big companies (e.g. DuPont)
Ditch the border firewall
Assume LANs are “dirty”
Use VPNs from each workstation to servers
• Hey, an open network, with closed servers
and E2E encryption!
• Why didn’t we think of that? :)
University of Washington
Computing & Communications
Worrisome Trends
• Increasing sophistication of attacks
• Increasing number of attacks
• Tunneling everything thru port 80
• Partially connected Internets
• Increasing complexity and
diagnostic difficulty
University of Washington
Computing & Communications
Encouraging Trends
•
•
•
•
Enterprise decision makers are engaged
Vendors are paying more attention
Software is slowly getting better
?
University of Washington
Computing & Communications
Conclusions
•
•
•
•
•
•
•
•
Central network services: think of as an ISP
Conventional wisdom won’t work in our world
Border firewalls can actually be harmful
We can’t afford to settle for fake security
There are no silver bullets
The hardest problems are non-technical
It’s still going to be a long, up-hill battle
Don’t forget disaster preparedness and recovery
(e.g. High-Availability system design)
University of Washington
Computing & Communications
Resources
• http://staff.washington.edu/gray/papers/credo.html
• http://staff.washington.edu/corey/fw/
• http://staff.washington.edu/dittrich
• http://www.sans.org/