26
1 Phil Rodrigues, Sr Network Security Analyst, NYU ITS Automated Policy Enforcement November 12, 2004

Phil Rodrigues, Sr Network Security Analyst, NYU ITS

  • Upload
    platt

  • View
    33

  • Download
    1

Embed Size (px)

DESCRIPTION

Phil Rodrigues, Sr Network Security Analyst, NYU ITS. Automated Policy Enforcement November 12, 2004. Automated Policy Enforcement. NetReg Scan at UConn NetAuth Working Group NYU’s SafetyNet. Automated Policy Enforcement. NetReg Scan at UConn. UConn: Prelude. - PowerPoint PPT Presentation

Citation preview

Page 1: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

1

Phil Rodrigues, Sr Network Security Analyst, NYU ITS

Automated Policy Enforcement

November 12, 2004

Page 2: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

2

Automated Policy Enforcement

NetReg Scan at UConn

NetAuth Working Group

NYU’s SafetyNet

Page 3: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

3

Automated Policy Enforcement

NetReg Scan at UConn

Page 4: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

4

UConn: Prelude

• During DefCon hundreds of Stealther

• Blaster and Welchia stressed the need

• Late August move-in

Page 5: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

5

UConn: rpcscan

• Nessus was too slow, nasl did not exist?

• Developed by Keith Bessette and others

• Based on exploit code

• Fast scanner for one or many computers

Page 6: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

6

UConn: NetReg Scan

• Developed by Mike Lang and others

• Forced rpcscan before it allowed access to NetReg

• If client failed, redirected to patch website

Page 7: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

7

UConn: Lessons Learned

• Existing NetReg system was critical

• Ability to create code was essential (c, perl)

• Making a scanner is hard, use someone else’s

• Good communication made for good neighbors

Page 8: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

8

Automated Policy Enforcement

NetAuth Working Group

Page 9: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

9

NetAuth: Brief History

• Educause / Internet2 Security Task Force

• Working group started in May 2004

• Draft whitepaper August 2004, me and Eric Gauthier (BU)

• “Strategies for Automating Network Policy Enforcement”

Page 10: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

10

NetAuth: Common Classification

• Registration

• Detection

• Isolation

• Remediation

Page 11: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

11

NetAuth: Registration

• Must have it!

Page 12: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

12

NetAuth: Detection

• Active (nessus)

• Passive (netflow)

• Agent (commercial or home-grown)

• Interval (once vs on-going)

Page 13: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

13

NetAuth: Isolation

• VLAN (homogenous)

• IP (heterogenous)

• Gateway (inline device)

Page 14: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

14

NetAuth: Remediation

• LocalStatic (website)Dymanic (SUS)

• External (Windows Update)Proxy (remember SSL)Translation (routing issues)Split-DNS (domain list)

Page 15: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

15

NetAuth: Effective Practices Guide

• Looking for working examples of each categoryHome-grown agent

VLAN isolation

Perfigo / Cisco

Bradford

IPS

etc

Page 16: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

16

Automated Policy Enforcement

NYU’s SafetyNet

Page 17: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

17

SafetyNet: High Level Goals

• Base it on successful systems

• Fairly self-sustaining

• Scalable for 11,000+ ResNet, and more!

• Practical implementation of NetAuth classification

Page 18: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

18

SafetyNet: Initially Staff Intensive

• Security Analyst (did not do much…)

• Network Services management and staff (5 people)

• Consultant (scanning cluster and perl glue)

• Client Services and Publications

• NYU specific, but basic strategy should be portable

Page 19: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

19

SafetyNet: Pre-Existing Structure

• Pre-existing ResNet registration system (1997!)

• BIND and ISC DHCPD v3

• Static assignment DHCP infrastructure

• perl glue

Page 20: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

20

SafetyNet: Registration

• Client authentication against netid

• Housing lookup for room assignment

• SNMP verification of location

• If all that succeeds, start detection

Page 21: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

21

SafetyNet: Detection

• Initial active external detection

• nmap and nessus / scanlite

• Limited plugin setrpc-dcom / rpcss

messenger

lsass

• Perl glue to return consistent results

Page 22: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

22

SafetyNet: Isolation

• IP DHCP-based isolation

• Had: Home-grown host management system

• Needed: Conversion to DHCPD v3

• Too many vendors and vintages for VLAN

Page 23: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

23

SafetyNet: Remediation

• External dynamic NAT/Split-DNS remediation

• Based on Fairfield University’s system

• Private IP -> Split-DNS -> Cisco PBR -> PIX NAT

• Detailed support website

• Windows Update, Symantec LiveUpdate

• Self re-scan. If pass, assigned public IP

Page 24: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

24

SafetyNet: Metrics

• 9,500 students through ResNet registration

• 1,000 found to be vulnerable (10%)

• 200 called Client Services (20%) (800 did not?)

• Order of magnitude rule

• 100 slipped through the cracks (1%)

• Less than 50 vulnerable at any time (0.5%)

Page 25: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

25

Conclusions

• Well?

Page 26: Phil Rodrigues, Sr Network Security Analyst, NYU ITS

26

Links

http://www.security.uconn.edu/old_site/netregscan/

http://www.security.uconn.edu/old_site/uconn_response.html

http://security.internet2.edu/netauth/

http://security.internet2.edu/netauth/docs/draft-internet2-salsa-netauth-summary-02.html