38
uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

  • View
    214

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

uw network security2003

Terry Gray

University of Washington

Computing & Communications

17 October 2003

Page 2: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

UW campus network (backbone)

borderrouter

borderrouter

backbone switches

~ 30 level one routers

subnets (733 total; 150 c&c); over 60,000 live devices

Page 3: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

UW campus network (typical subnet)

Level One Router

Aggregation Switch

Edge Switch Edge Switch Edge Switch

campus subnets are a mixture of• shared 10Mbps• switched 10Mbps• switched 10/100Mbps

Page 4: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

network facilities

Page 5: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

typical core routers

Page 6: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

campus network traffic

Page 7: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

Pacific Northwest Gigapop

The PNW’s access point to next generation Internets, including Internet2, high performance USA Federal Networks, and high speed commodity Internet

A high speed peering point for regional and international networks

R&D testbed inviting national and international experimentation with advanced Internet-based applications

Page 8: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003
Page 9: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

Pacific Northwest Gigapop

uwborder

uwborder

3 diverse network providersInternet2national & internat’nl nets

•Internet2 2.5Gbps (10Gbps upgrade underway)•Three different 1Gbps connections to the Internet•Multiple gigabits of connections to other networks

30+ networkcustomers

Page 10: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

K-12 (307)

Community/Technical College (73)

Public Baccalaureate (50)

Library (65 in process)Independent Colleges (9 approved)

K20 Network Sites

Page 11: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

seven security axioms Network security is maximized when we assume there is no such

thing. Large security perimeters mean large vulnerability zones. Firewalls are such a good idea, every computer should have one.

Seriously. Remote access is fraught with peril, just like local access. One person's security perimeter is another's broken network. Isolation strategies are limited by how many PCs you want on your

desk. Network security is about psychology as much as technology

. Bonus: never forget that computer ownership is not for the feint-hearted.

Page 12: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

credo

focus first on the edge(perimeter protection paradox)

add defense in depth as needed keep it manageable provide for local policy choice... avoid one-size-fits-all

Page 13: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

gray’s defense-in-depth conjecture

MTTE (exploit) = k * N**2 MTTI (innovation) = k * N**2 MTTR (repair) = k * N**2

where N = number of layers

Page 14: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

C&C security activities logical firewalls project 172 network infrastructure protection reverse IDS (local infection detection) auto-block; self-reenable traffic monitoring tools who/where traceability tools nebula proactive probing honeypots security operations training; consulting

Page 15: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

security in the post-Internet era:the needs of the many

the needs of the few

Terry Gray

University of Washington

Fall Internet2 Meeting

16 October 2003

Page 16: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

2003: security ”annus horribilis”SlammerBlasterSobig.F

increasing spyware threatattackers discover encryptionhints of more “advanced” attacks

and let’s not even talk about spam…

Page 17: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

2003: security-related trends

RIAA subpoenasgrowing wireless useVoIP over 802.11 pilotsmore mobile devicesmore critical application roll-outsfaster networks“personal lambda” networksSEC filings on security?class action lawsuits?

Page 18: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

impactend of an era… say farewell to

the open Internetautonomous unmanaged PCsfull digital convergence?

say hello toone-size-fits-all (OSFA) solutionsconflict... everyone wants security and

max availability, speed, autonomy, flexibilitymin hassle, cost

the needs of the many trump the needs of the few (but at what cost?)

Page 19: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

consequencesmore closed nets (bug or feature?)more VPNs (bug or feature?)more tunneling -“firewall friendly” appsmore encryption (thanks to RIAA)more collateral harm -attack + remedyworse MTTR (complexity, broken tools)constrained innovationcost shifted from “guilty” to “innocent”pressure to fix problem at borderpressure for private nets

Page 20: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

revelationssystem administrators (2 kinds…)

want total local autonomy… orwant someone else to solve the problemoften unaware of cost impact on others

users (2 kinds: happy & unhappy)want “unlisted numbers”need “openness” defined by apps

feedback loop: closed nets encourage constrained appsconstrained apps encourage closed nets

Page 21: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

perimeter defense tradeoffsborder

biggest vulnerability zonebiggest policy vs. performance concern

subnetdoesn’t match org boundariesworst case for NetOps debuggingconsider also: sub-subnet LFWs, etc.

hostoptimal security perimeterhardest to implement

Page 22: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

never say die

goal: simple core, local policy choicehow to avoid OSFA closed net future?

design net for choice of open or closedpervasive IPsec

combine with “point response”won’t reverse trend to closed nets,

but may avoid bad cost shiftsalternative: only closed nets, policy wars

Page 23: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

questions? comments?

Page 24: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

outline

thesismetamorphosisgrief counselingwhat we losthow we lost itconsequencescritical questions

Page 25: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

thesis

the Open Internet is history--”get over it“

cheer up, things could be worse--and will be if we aren’t careful

we can still make good decisions--to avoid even worse outcomes

S@LS goal: evaluate alternative futures

Page 26: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

metamorphosis: Internet paradigm

1969: “one network”1982: “network of networks”199x: balkanization begins2003: balkanization complete2004: paradigm lost?

Page 27: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

metamorphosis: workshop goal

2000: “network security credo”2001: “my first NAT”

2002: “uncle ken calls” > quest 2003: “slammer” > intervention 2003: “dcom/rpc” > wake

Page 28: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

metamorphosis: success metrics

nirvana then open Internet / network utility model successful end-point security

nirvana now? operational simplicity admin-controlled security user-controlled connectivity

Page 29: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

grief counseling

denialangerbargainingdepressionacceptance

--simultaneously!

Page 30: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

what we lost: network utility model

the network utility model is dead--long live the NUM

all ports once behaved the same simple easy to debug

now they don’t: bandwidth management polices security policies

Page 31: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

what we lost: operational integrity

lost: network simplicity, leading to lower MTBF higher MTTR higher costs

lost: full connectivity, leading to less innovation? frustration, inconvenience sometimes less security (faith, backdoors)

Page 32: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

how we lost it: inevitable trainwreck?

fundamental contradiction networking is about connectivity security is about isolation

conflicting roles: strained bedfellows the networking guy the security guy the sys admin oh yeah… and the user

insecurity = liability liability trumps innovation liability trumps operator concerns liability trumps user concerns

Page 33: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

how we lost it: firewall allure?

firewalls = “packet disrupting devices”perimeter protection paradoxeslarge-perimeter FWs benefit:

SysAd, SecOps, maybe user at expense of NetOps

the best is the enemy of the good microsoft rpc exploit has guaranteed that the

firewall industry has a bright future

Page 34: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

how we lost it: disconnects

failure of “computer security” vendors gave customers what they wanted, not

what they needed responsibility/authority disconnects guarantee

failure

failure of networkers to understand what others wanted not a completely open Internet! importance of “unlisted numbers”

Page 35: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

consequences (1)

mindset: “computer security” failed, so “network security” must be the answer

extreme pressure to make network topology match organization boundaries

”network of networks” evolution 1982: minimum impedance between nets 2003: maximum impedance between nets

Heisen/stein networking: uncertain and relativistic connectivity

Page 36: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

consequences (2)

more self-imposed denial-of-service firewalls everywhere uphill battle for p2p more tunneled traffic over fewer ports one FTE per border --with or without firewall troubleshooting will be harder NAT survives unless/until a better “unlisted number”

mechanism takes hold security/liability will continue to trump

innovation/philosophy/ops costs

Page 37: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

critical questions

should we build net topologies that match organizational boundaries?

will end-point security improve enough that perimeter defense will be secondary?

is it too late to try to offer users a choice of open or closed nets?

is the trend toward a single-port tunneled Internet good, bad, or indifferent?

is there any chance IPS or DEN will make it all better?

what’s the best way to implement an “unlisted number” semantic?

Page 38: Uw network security 2003 Terry Gray University of Washington Computing & Communications 17 October 2003

discussion!

how do we redefine the Internet, going forward?

I.e. how do we “reconnect”?