55
Network Security Workshop 29-31 May 2017 Phnom Penh, Cambodia Network Infra Security (Filtering at the border)

Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Network Security Workshop

29-31 May 2017

Phnom Penh, Cambodia

Network Infra Security (Filtering at the border)

Page 2: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

What is in the network?

• Routers• Switches

• CPE (ADSL Router / WiFi Router)• Servers

• PC/Laptop• Smart Phone

Page 3: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

SecuringTheDevice(Hardening)

3

Page 4: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Think of ALL Devices

• The following problem was recently reported and affects low-end CPEs (ADSL connections only)– Admin password exposed via web interface– Allow WAN management (this means anyone on Internet)– Bug fixed and reintroduced depending on the firmware version

• The bug is quite a number of years old

Page 5: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Password Visible via Web Interface

Page 6: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Magnitude of Problem

• 4.5 Million CPEs (ADSL Modems) using a unique malicious DNS

• In early 2012 more than 300,000 CPEs still infected• 40 malicious DNS servers found

Page 7: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Allow remote access

Page 8: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Implication of CPEs Exploited

Scan Find vulnerable CPE Change password

Change CPE DNSDNS incorrectly resolves names for high profile sites

Redirect to a page with links to a malware that disables

banking protections

Once the protection is disabled, DNS incorrectly

resolves names for several banks

Page 9: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Finding out open IPcam!!!

Page 10: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Internet of Things” (IoT) botnet

10

https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack/

Page 11: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Could device hardening have made a difference?

Agenda Item

Page 12: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Physical access control• Lockuptheserverroom.Equipmentkeptinhighlyrestrictiveenvironments

• Setupsurveillance• Makesurethemostvulnerabledevicesareinthatlockedroom• Keepintrudersfromopeningthecase• Protecttheportables.Packupthebackups• Disablethedrives• Socialengineeringtrainingandawareness• Consoleaccess

– passwordprotected– accessviaOOB(Out-of-band)management– configuretimeouts

Page 13: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Device Access Control

• Set passwords to something not easily guessed• Use single-user passwords (avoid group passwords)

• Encrypt the passwords in the configuration files• Use different passwords for different privilege levels

• Use different passwords for different modes of access• IF AVAILABLE – use digital certificate based authentication

mechanisms instead of passwords

Page 14: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Securing Management Plane

• AuthenticateAccess

• DefineExplicitAccessTo/FromManagementStations– SNMP– Syslog– TFTP– NTP– AAAProtocols– SSH,Telnet,etc.

Page 15: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Secure Access with Passwords and Logout Timers

line console 0

login

password console-pw

exec-timeout 1 30 !min sec

line vty 0 4

login

password vty-pw

exec-timeout 5 00

enable secret enable-secret

username bob secret bob-secret !SHA256

service password-encryption

security passwords min-length <length>

Securing Local Access

Securing Remote Access

Securing Privileged mode

Encrypting passwords

Enforce password length

Page 16: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Securing SNMP

access-list 99 permit 192.168.1.250

access-list 99 permit 192.168.1.240

snmp-server community N3T-manag3m3nt ro 99

Page 17: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Securing SSHipv6 access-list AUTHORIZED_IPV6_HOST

permit ipv6 host <source> any

deny ipv6 any any log

!

ip access-list extended AUTHORIZED_IPV4_HOST

permit tcp host <source> any eq 22

deny tcp any any log

!

line vty 0 4

access-class AUTHORIZED_IPV4_HOST in

ipv6 access-class AUTHORIZED_IPV6_HOST in

Page 18: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Authenticate Individual Users

username <mike> secret <mike-secret>

username <john> secret <john-secret>

!

username staff secret group-secret

Page 19: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Centralized Authentication (AAA)

• Enable AAA• Configure Radius server details

• Configure Radius server-group if more than one• Enforce login authentication to use AAA – specify

authentication method and server group• Good idea to fall back to local database if not reachable• Apply the authentication method list to VTY lines

Page 20: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Centralized Authentication (AAA)(config) #aaa new-model

#radius-server <SERVER-NAME>

(config-radius-server)#address [ipv4/ipv6] <SERVER-IP> auth-port <1812> acct-port <1813>

(config-radius-server)#key <SHARED-SECRET>

(config) #aaa authentication login <default> group <radius> local

#aaa authorization exec <default> group <radius> local

(config)#line vty 0 4

(config-line)#login authentication <default>

Page 21: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Telnet using SSH ‘Jumphost’

21

Page 22: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Banner – Legal Notification

banner login ^$

You should not be on this device.

Please Get Off My Router!!

^$

Page 23: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

More Appropriate Banner

!!!! WARNING !!!!

You have accessed a restricted device. All access is being logged.

Disconnect immediately if you are not an authorized user.

Any unauthorized access will be prosecuted to the full extent of the law.

Page 24: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Centralized Log (syslog - UDP 514)(config)# logging host <server-IP>

(config)# logging trap <3|errors>

(config)# logging alarm <notifications>

(config)# logging facility syslog

Page 25: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Configuration change loggingRouter# configure terminal

Router(config)# archive

Router(config-archive)# log config

Router(config-archive-log-config)# logging enable

Router(config-archive-log-config)# logging size 200

Router(config-archive-log-config)# hidekeys

Router(config-archive-log-config)# notify syslog

768962: Feb 1 20:59:45.081 UTC: %PARSER-5-CFGLOG_LOGGEDCMD: User:tashilogged command:!exec: enable

768963: Feb 1 21:03:17.160 UTC: %PARSER-5-CFGLOG_LOGGEDCMD: User:tashilogged command:no ipv6 prefix-list dhakacom_AS23956_IN_IPv6 description

768965: Feb 1 21:03:19.182 UTC: %SYS-5-CONFIG_I: Configured from console by tashi on vty0 (2405:7600:0:6::250)

Page 26: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Turn Off Unused ServicesFeature Description Default Recommendation Command

CDP Proprietary layer 2 protocol between Cisco devices

Enabled no cdp run

TCP small servers

Standard TCP network services: echo, chargen, etc

11.3: disabled 11.2: enabled

This is a legacy feature, disable it explicitly

no servicetcp-small-servers

UDP small servers

Standard UDP network services: echo, discard, etc

11.3: disabled 11.2: enabled

This is a legacy feature, disable it explicitly

no serviceudp-small-servers

Finger Unix user lookup service, allows remote listing of logged in users.

Enabled Unauthorized persons don’t need to know this, disable it.

no service finger

HTTP server Some Cisco IOS devices offer web-based configuration

Varies by device

If not in use, explicitly disable, otherwise restrict access

no ip http server

Bootp server Service to allow other routers to boot from this one

Enabled This is rarely needed and may open a security hole, disable it

no ip bootpserver

Page 27: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Turn Off Unused ServicesFeature Description Default Recommendation Command

PAD Service Router will support X.25 packet assembler service

Enabled Disable if not explicitly needed

no service pad

IP source routing

Feature that allows a packet to specify its own route

Enabled Can be helpful in attacks, disable it

no ip source-route

Proxy ARP Router will act as a proxy for layer 2 address resolution

Enabled Disable this service unless the router is serving as a LAN bridge

no ip proxy-arp

IP directed broadcast

Packets can identify a target LAN for broadcasts

Enabled (11.3 & earlier)

Directed broadcast can be used for attacks, disable it

no ip directed-broadcast

Page 28: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Configuration (Templates)! turn off unnecessary services (interface)interface GigabitEthernet0/0no ip redirectsno ip directed-broadcastno ip proxy arpno cdp enable

! Turn off unnecessary service (global)no ip domain-lookupno cdp runno ip http serverno ip source-routeno service finerno ip bootp serverno service udp-small-serversno service tcp-small-server

Page 29: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Fundamental Device Protection Summary • Secure logical access to routers with passwords and timeouts• Never leave passwords in clear-text • Authenticate individual users• Restrict logical access to specified trusted hosts• Allow remote vty access only through ssh• Disable device access methods that are not used • Protect SNMP if used• Shut down unused interfaces• Shut down unneeded services• Ensure accurate timestamps for all logging• Create appropriate banners• Test device integrity on a regular basis

Page 30: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

SecuringTheDataPath

30

Page 31: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Securing The Data Path

• Filtering and rate limiting are primary mitigation techniques

• Edge filter guidelines for ingress filtering (BCP38/BCP84)

• Null-route and black-hole any detected malicious traffic

• Netflow is primary method used for tracking traffic flows

• Logging of Exceptions

Page 32: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Data Plane (Packet) Filters

• Most common problems– Poorly-constructed filters– Ordering matters in some devices

• Scaling and maintainability issues with filters are commonplace

• Make your filters as modular and simple as possible• Take into consideration alternate routes

– Backdoor paths due to network failures

Page 33: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Filtering Deployment Considerations

• How does the filter load into the router? • Does it interrupt packet flow?• How many filters can be supported in hardware? • How many filters can be supported in software?• How does filter depth impact performance?• How do multiple concurrent features affect performance?• Do I need a standalone firewall?

Page 34: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

General Filtering Best Practices

• Explicitly deny all traffic and only allow what you need • The default policy should be that if the firewall doesn't know

what to do with the packet, deny/drop it • Don't rely only on your firewall for all protection of your

network • Implement multiple layers of network protection • Make sure all of the network traffic passes through the

firewall • Log all firewall exceptions (if possible)

Page 35: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Filtering Recommendations

• Log filter port messages properly• Allow only internal addresses to enter the router from the

internal interface• Block packets from outside (untrusted) that are obviously

fake or commonly used for attacks• Block packets that claim to have a source address of any

internal (trusted) network.

Page 36: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Filtering Recommendations

• Block RFC 1918 networks (incoming)– 127.0.0.0– 10.0.0.0 – 10.255.255.255– 172.16.0.0 – 172.31.0.0– 192.168.0.0 – 192.168.255.255

• Block multicast packets (if NOT using multicast)• Block broadcast packets (careful of DHCP & BOOTP users)• Block incoming packets that claim to have same destination

and source address• Block incoming packets claiming to be from your own

address space

Page 37: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Filtering : IPv4 prefixes

37

no ip prefix-list in-filterip prefix-list in-filter deny 0.0.0.0/0 ! Defaultip prefix-list in-filter deny 0.0.0.0/8 le 32 ! Network Zeroip prefix-list in-filter deny 10.0.0.0/8 le 32 ! RFC1918ip prefix-list in-filter deny 100.64.0.0/10 le 32 ! RFC6598 shared addressip prefix-list in-filter deny <your prefix>/19 le 32! Your address spaceip prefix-list in-filter deny 127.0.0.0/8 le 32 ! Loopbackip prefix-list in-filter deny 169.254.0.0/16 le 32 ! APIPAip prefix-list in-filter deny 172.16.0.0/12 le 32 ! RFC1918ip prefix-list in-filter deny 192.0.2.0/24 le 32 ! TEST1ip prefix-list in-filter deny 192.168.0.0/16 le 32 ! RFC1918ip prefix-list in-filter deny 198.18.0.0/15 le 32 ! Benchmarkingip prefix-list in-filter deny 198.51.100.0/24 le 32 ! TEST2ip prefix-list in-filter deny 203.0.113.0/24 le 32 ! TEST3ip prefix-list in-filter deny 224.0.0.0/3 le 32 ! Multicastip prefix-list in-filter deny 0.0.0.0/0 ge 25 ! Prefixes >/24ip prefix-list in-filter permit 0.0.0.0/0 le 32

Page 38: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Filtering : IPv6

38

no ipv6 prefix-list v6in-filteripv6 prefix-list v6in-filter permit 2001::/32 ! Teredoipv6 prefix-list v6in-filter deny 2001::/32 le 128 ! Teredo subnetsipv6 prefix-list v6in-filter deny 2001:db8::/32 le 128 ! Documentationipv6 prefix-list v6in-filter permit 2002::/16 ! 6to4ipv6 prefix-list v6in-filter deny 2002::/16 le 128 ! 6to4 subnetsipv6 prefix-list v6in-filter deny <your::/32> le 128 ! Your prefixipv6 prefix-list v6in-filter deny 3ffe::/16 le 128 ! Old 6boneipv6 prefix-list v6in-filter permit 2000::/3 le 48 ! Global Unicastipv6 prefix-list v6in-filter deny ::/0 le 128

Page 39: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Bogon Filters

• Bogon and fullbogon peering use different ASNs• Advertise all fullbogons (IPv4 and IPv6) over a single BGP

peering session (iBGP peers!!)• For details: http://www.team-

cymru.org/Services/Bogons/bgp.html

Page 40: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Bogon Filter : Configuration IPv4router bgp 17821neighbor 38.229.xxx.xxx remote-as 65332neighbor 38.229.xxx.xxx description CYMRUBOGONSneighbor 38.229.xxx.xxx ebgp-multihop 255neighbor 38.229.xxx.xxx password 7 070C134D575F0A5116neighbor 38.229.xxx.xxx update-source Loopback0!address-family ipv4neighbor 38.229.xxx.xxx activateneighbor 38.229.xxx.xxx soft-reconfiguration inboundneighbor 38.229.xxx.xxx prefix-list CYMRU-OUT-V4 outneighbor 38.229.xxx.xxx route-map CYMRUBOGONS-V4 in!!configure community list to accept the bogon prefixes into the route-mapip community-list 100 permit 65332:17821!!configure route-map. Remember to apply it to the proper peering sessions.route-map CYMRUBOGONS-V4 permit 10description IPv4 Filter bogons learned from cymru.com bogon route-serversmatch community 100set ip next-hop 192.0.2.1!!set a bogon next-hop on all routers that receive the bogonsip route 192.0.2.1 255.255.255.255 Null0!ip prefix-list CYMRU-OUT-V4 seq 5 deny 0.0.0.0/0 le 32

40

Page 41: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Bogon Filter : Configuration IPv6router bgp 17821neighbor 2620:0:6B0::xxxx:xxxx remote-as 65332neighbor 2620:0:6B0::xxxx:xxxx description CYMRUBOGONSneighbor 2620:0:6B0::xxxx:xxxx ebgp-multihop 255neighbor 2620:0:6B0::xxxx:xxxx password 7 0458390716775F1A08neighbor 2620:0:6B0::xxxx:xxxx update-source Loopback0!address-family ipv6neighbor 2620:0:6B0::xxxx:xxxx activateneighbor 2620:0:6B0::xxxx:xxxx soft-reconfiguration inboundneighbor 2620:0:6B0::xxxx:xxxx prefix-list CYMRU-OUT-V6 outneighbor 2620:0:6B0::xxxx:xxxx route-map CYMRUBOGONS-V6 in

!!configure community list to accept the bogon prefixes into the route-mapip community-list 100 permit 65332:17821!!configure route-map. Remember to apply it to the proper peering sessions.route-map CYMRUBOGONS-V6 permit 10description IPv6 Filter bogons learned from cymru.com bogon route-serversmatch community 100set ipv6 next-hop 2001:DB8:0:DEAD:BEEF::1!!set a bogon next-hop on all routers that receive the bogonsipv6 route 2001:DB8:0:DEAD:BEEF::1/128 Null0!ipv6 prefix-list CYMRU-OUT-V6 seq 5 deny ::/0 le 128

41

Page 42: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

RFC2827 (BCP38) – Ingress Filtering

• If an ISP is aggregating routing announcements for multiple downstream networks, strict traffic filtering should be used to prohibit traffic which claims to have originated from outside of these aggregated announcements.

• The ONLY valid source IP address for packets originating from a customer network is the one assigned by the ISP (whether statically or dynamically assigned).

• An edge router could check every packet on ingress to ensure the user is not spoofing the source address on the packets which he is originating.

Page 43: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Guideline for BCP38

• Networks connecting to the Internet– Must use inbound and outbound packet filters to protect

network• Configuration example

– Outbound—only allow my network source addresses out– Inbound—only allow specific ports to specific destinations

in

Page 44: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Techniques for BCP 38

• Static ACLs on the edge of the network • Unicast RPF strict mode

Page 45: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Example Edge Packet Filters access-list 121 permit ip <my-subnet> <wild-card> any

access-list 121 deny ip any any log

!

access-list 200 permit ip <your-cust-subnet> <wild-card> any

access-list 200 deny ip any any log

!

interface Te0/0/0

description Link to Upstream

ip access-group 121 out

!

interface Gig0/0

description link to customer A

ip access-group 200 in

Page 46: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Unicast RPF

• To counter spoofed source address– Requires the source addresses to be in the CEF table and are

reachable– If source addresses not valid, drop packet!

– Strict mode: packet must be received on the same interface the router would use for return packet• Will drop legitimate packets too if asymmetric routing paths exists

– Loose mode: source IP only required to exist in the routing table

46

Page 47: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Configuring uRPF

• CEF must be configured first• Enabled on per interface basis

47

(config-if)#ip verify unicast source reachable via [rx|any] [allow-default]

Page 48: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Infrastructure Filters

• Permit only required protocols and deny ALL others to infrastructure space– Filters now need to be IPv4 and IPv6!– Applied inbound on ingress interfaces

• Basic premise: filter traffic destined TO your core routers• Develop list of required protocols that are sourced from

outside your AS and access core routers– Example: eBGP peering, GRE, IPSec, etc.

• Identify core address block(s)- This is the protected address space- Summarization is critical for simpler and shorter filters

Page 49: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

References

• Articles, documents and templates from Team CYMRU http://www.team-cymru.org/ReadingRoom/

• Google for the information specifics from the vendors you use: “<vendor> security template”

Page 50: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

BGP Flowspecs• RFC 5575• Layer 3 & Layer 4 filters are distributed via BGP using a dedicated NLRI

– allows to construct instructions to match a particular flow with source, destination, L4 ports and packet specifics such as length, fragment

• Match– src/dst prefix & port– ICMP type/code– Packet size– TCP/UDP protocols– TCP flags

• Actions– Discard– Rate Limit– Redirect– Accept

50

Page 51: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Configuration and Archiving

51

Page 52: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Device OOB Management

52

• Out-of-band device management should be used to ensure DoSattacks do not hinder getting access to critical infrastructure devices

• Dial-back encrypted modems are sometimes still used as backup

Page 53: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

System Images and Configuration Files• Careful of sending configurations where people can snoop

the wire– CRC or MD5 validation– Sanitize configuration files

• SCP should be used to copy files– TFTP and FTP should be avoided

• Use tools like ‘rancid’ or ‘oxidized’ to periodically check them against modified configuration files

Page 54: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Software and ConfigurationUpgrade / Integrity• Files stored on specific systems with limited access• All access to these systems are authenticated and audited

• SCP is used where possible; FTP is NEVER used; TFTP still used

• Configuration files are polled and compared on an hourly basis (RANCID)Filters limit uploading / downloading of files to specific systems

• Many system binaries use MD-5 checks for integrity• Configuration files are stored with obfuscated passwords

54

Page 55: Network Infra Security - start [APNIC TRAINING WIKI] · Network Infra Security (Filtering at the border) What is in the network? •Routers ... •Edge filter guidelines for ingress

Questions?

55