[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Comments on: draft-ietf-opsec-current-practices-03.txt



Hi,

I have some feedback on the draft. It is looking really good, most of the comments are for really minor items....

Warren.


-------------------------------------------------------------------
Notes on: draft-ietf-opsec-current-practices-03.txt

Section 1.2:
"Man-In-The-Middle: An attack where a malicious user impersonates
either the sender or recipient of a communication stream." -- To my mind a MIM attack is more of an active attack where the malicious user impersonates party A to B (and possibly B to A) while inserting, modifying or dropping certain traffic. The original definition also covers things like phishing, session hijacks, etc (unless this class of attacks is excluded by the use of the phrase "communication stream"?).

Section 2.1:
"Message Insertion: This can be a valid message (which could be a
reply attack,, which is a scenario where a message is captured and
resent at later time)." -- double commas.

Section 2.1:
"A denial of service is a consequence of an attack and
can be the result of too much traffic (i.e. flooding), or exploting
protocol expoitation or inserting/ deleting/ diverting/ midifying
messages." -- spelling: exploiting, exploitation, modifying.

Section 2.1.4.  Additional Considerations
"The physical and logical authentication and logging systems should be
run independently of each other and reside in different physical
locations." -- possibly you could mention that these systems also need to be secured. I have seen cases where the proximity card admin system is unsecured (it was in an unlocked closet off the lobby!)

Section 2.2.1.5.  Man-In-The-Middle
Yay! That description explains MIM better than the definition in 1.2 :-)

Section 2.2.2.
"If SNMP is used for in-band management, it is for read queries only
and restricted to specific hosts." -- if possible the view is also restricted to only what the management station needs (some devices will expose their config file with the read-only SNMP community -- views can limit what they will send).

Section 2.2.3:
"Using SSH for device access ensures that noone can spoof the traffic during the SSH session." -- spelling: no one (or no-one)


Section 2.2.3:
Perhaps you could mention something about securing access to the AAA server. I have seen 2 cases where this bit someone: 1: The AAA server was compromised and a slew of things happened -- dictionary attacks were carried out against the password file, an existing username was changed and the a new user was added.

2: An individual was let go and his TACACS account was yanked, but the TACACS shared secret was not changed. He was able to get access to a workstation on the network, spin up a TACACS server (with himself as the only account and using the unchanged shared secret) on that workstation. He then announced a /32 (using zebra) for the primary TACACS server into network and was able to access devices.


Section 2.5.8:
"Data Origin Authentication - By using MD5 authentication and/or
the TTL-hack a routing peer can be reasonably certain that traffic
originated from a valid peer."  -- cite the TTL Security hack.

Section 2.5.9:
"Although MD-5 routing protocol
extensions have been implemented which can provide both services,
they are not consistently deployed amongst ISPs." -- Spelling: MD5


Thats all I have for now (AKA: My boring meeting has just ended -- let me know if you want any more feedback.)

Warren.