[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Comments on: draft-ietf-opsec-current-practices-03.txt




On Jun 14, 2006, at 10:37 AM, Merike Kaeo wrote:

Thanks and yes, if you have time to continue I'd appreciate it. All comments are welcome and you are finding quite a few things I should fix. The more complete and the less spelling errors the better for this next version :) (here's hoping you have another boring meeting soon)

Nice to see that someone profits from my pain.... :-)

Here are some more thoughts / comments....

-----------------------------------------------------------------------
Notes on: draft-ietf-opsec-current-practices-03.txt (Part 2)

General:

I may have missed it, but I saw no mention of route databases (eg RADB) -- some people use this for building filters.

I may have missed it, but perhaps mention could be made that ISPs have no desire to be the great Internet firewall -- if a worm comes out that runs over port X, the correct response is NOT to filter X -- if a specific customer requests filters, their connection can be filtered, but applying L4 filters on a backbone is not (nor should be) an ISPs job.


Section 2.2.2:
"In some deployments, The AAA servers used for in-band management" -- spelling: the

Section 2.2.4:
"Some providers feel that this operational impact exceeds the security necessary and instead use Telnet from trusted inside hosts (called 'jumphosts') to manage those devices." -- "or bastion hosts". Possibly also mention that this is inherently less secure (snooping is not possible). Many providers also only allow SSH from bastions.

Section 2.3.2:
"Dial-in access is deployed as a backup if the network
is not available." -- this is often a weak point in security -- many providers use dial-back, encrypting and / or OTP modems.

Section 2.4.2:
"Most ISPs consider layer 4 filtering useful but it is only
implemented if there is no performance limitations on the devices." -- this is very vague -- most ISPs will only deploy layer 4 filtering if no other options exists (it is a admin nightmare). Also, perhaps "if there is no performance limitations on the devices" can be reworded to "if possible" (nit-picking here, but if a device can L4 filter @ 100Mbps but the traffic is only 1Mbps, the device has "performance limitations", but they are not applicable!) Perhaps could be modified to "if performance limitations allow"."

Section 2.4.4:
"Rate limiting is used by some ISPs although other ISPs believe it is
not really useful since attackers are not well behaved and it doesn't provide any operational benefit over the complexity." -- rate- limiting can also make an attacker's job easier. I have seen GE links that have 20Mbps rate-limits "for security" -- now the attacker only has to generate 1/50th as much traffic to starve legitimate traffic....

Section 2.6.7:
"All TFTP and SCP access is
   username/password authenticated and in most environments scripts are
used for maintaining a large number of routers." -- unfortunately there is no username or password for TFTP.

Section 2.8.2:
"This type of traffic is currently filtered per interface" -- some devices support a receive ACL or loopback interface ACL, so the management filters are applied to the device instead of per interface.

Section 2.8.3.  Routing Control Plane Filtering
"Any announcement received
that is longer than a /48 for IPv6 routing and a /24 for IPv4 routing
   is discarded on EBGP." -- 2 points:
a: "discarded on EBGP" doesn't sound right -- "discarded by eBGP"?, "filtered out of eBGP"? b: Most ISPs will accept ANY length prefix from customers. (Many will accept ANY PREFIX as well, but that it an unrelated issue!) Possibly mention could be made that ISPs only accept agreed upon prefixes (I thought I saw this somewhere in the doc, but have now lost it.)

Section 2.9:
"At last count the number of hosts making up large distributed DoS BOTnets exceeded 1 million hosts." -- spelling: botnets


Section 2.9.1.  Sink Hole Routing
"redirected to a valid subnet or specific IP address where it can be
analyzed." -- possibly change to device or system. Also, some ISPs provide services to try scrub attack traffic out of attacks.


Section 2.9.2.  Black-Hole Triggered Routing
Can you cite something here?
Also, BHTR doesn't really propagate static routes (well, kinda!)
Could you flush this section out more?

Section 2.9.4:
"Although this technique does not stop an
attack, it can lessen the damage and impact on a specific service." -- it can also make the impact much worse (if my device can suck up 500k SYNs per second and a ratelimit is put in to limit SYNs to 100kpps, an attacker now has a much easier job (ratelimits throw away the good with the bad.)) While this should be obvious, I have seen many cases where people get DoSed and make the problem worse by ratelimiting legitimate traffic!




- merike

On Jun 14, 2006, at 9:52 AM, Warren Kumari wrote:

Hi,

I have some feedback on the draft. It is looking really good, most of the comments are for really minor items....

Warren.


-------------------------------------------------------------------
Notes on: draft-ietf-opsec-current-practices-03.txt

Section 1.2:
"Man-In-The-Middle: An attack where a malicious user impersonates
either the sender or recipient of a communication stream." -- To my mind a MIM attack is more of an active attack where the malicious user impersonates party A to B (and possibly B to A) while inserting, modifying or dropping certain traffic. The original definition also covers things like phishing, session hijacks, etc (unless this class of attacks is excluded by the use of the phrase "communication stream"?).

Section 2.1:
"Message Insertion: This can be a valid message (which could be a
reply attack,, which is a scenario where a message is captured and
resent at later time)." -- double commas.

Section 2.1:
"A denial of service is a consequence of an attack and
can be the result of too much traffic (i.e. flooding), or exploting
protocol expoitation or inserting/ deleting/ diverting/ midifying
messages." -- spelling: exploiting, exploitation, modifying.

Section 2.1.4.  Additional Considerations
"The physical and logical authentication and logging systems should be
run independently of each other and reside in different physical
locations." -- possibly you could mention that these systems also need to be secured. I have seen cases where the proximity card admin system is unsecured (it was in an unlocked closet off the lobby!)

Section 2.2.1.5.  Man-In-The-Middle
Yay! That description explains MIM better than the definition in 1.2 :-)

Section 2.2.2.
"If SNMP is used for in-band management, it is for read queries only
and restricted to specific hosts." -- if possible the view is also restricted to only what the management station needs (some devices will expose their config file with the read-only SNMP community -- views can limit what they will send).

Section 2.2.3:
"Using SSH for device access ensures that noone can spoof the traffic during the SSH session." -- spelling: no one (or no-one)


Section 2.2.3:
Perhaps you could mention something about securing access to the AAA server. I have seen 2 cases where this bit someone: 1: The AAA server was compromised and a slew of things happened -- dictionary attacks were carried out against the password file, an existing username was changed and the a new user was added.

2: An individual was let go and his TACACS account was yanked, but the TACACS shared secret was not changed. He was able to get access to a workstation on the network, spin up a TACACS server (with himself as the only account and using the unchanged shared secret) on that workstation. He then announced a /32 (using zebra) for the primary TACACS server into network and was able to access devices.


Section 2.5.8:
"Data Origin Authentication - By using MD5 authentication and/or
the TTL-hack a routing peer can be reasonably certain that traffic
originated from a valid peer."  -- cite the TTL Security hack.

Section 2.5.9:
"Although MD-5 routing protocol
extensions have been implemented which can provide both services,
they are not consistently deployed amongst ISPs." -- Spelling: MD5


Thats all I have for now (AKA: My boring meeting has just ended -- let me know if you want any more feedback.)

Warren.