[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: Comments on draft-ietf-opsec-current-practices-05.txt
A few questions/comments marked with djs>
Protocol Vulnerability Exploitation: An attack which takes advantage
of known protocol deficiencies to cause inappropriate behavior.
djs>Is that protocol definitation vulnerabilities
djs>(ie udp can be trivially spoofed due to its connectionless based
defination)
djs> or is it vulnerablities in implmentation
djs>(ie protos snmp tool found nearly all snmp v1 implementations had
some flaws in them).
2.1.2. Security Practices
For physical device security, equipment is kept in highly restrictive
environments. Only authorized users with card key badges have access
to any of the physical locations that contain critical network
infrastructure devices. These card-key systems keep track of who
accessed which location and at what time.
djs>Most cardkey systems have a fail back "master key"
djs>in case the cardkey system is down for some reason.
djs>Do we need to address limiting the use of the master key
djs>AND logging any time it is uses while the card key system is on
line/funtional?
2.2.1.1. Confidentiality Violations
Confidentiality violations can occur when a miscreant intercepts
confidential data that has been sent in cleartext. This includes
interception of usernames and passwords with which an intruder can
obtain unauthorized access to network devices. It can also include
other information such as logging or configuration information if an
administrator is remotely viewing local logfiles or configuration
information
djs> cleartext or weak encryption.
2.2.3
Data Origin Authentication - Management traffic is strictly
filtered to allow only specific IP addresses to have access to the
infrastructure devices. This does not alleviate risk from spoofed
traffic. Using SSH for device access ensures that noone can spoof
the traffic during the SSH session.
djs> if you combine on system filtering (acls) with bcp38 on the edges
then the risk
djs> of spoofing is mitigated baring a compromised internal system.
2.4.4. Additional Considerations
For layer 2 devices, MAC address filtering and authentication is not
used. This is due to the problems it can cause when troubleshooting
networking issues. Port security becomes unmanageable at a large
scale where 1000s of switches are deployed.
Rate limiting is used by some ISPs although other ISPs believe it is
not really useful since attackers are not well behaved and it doesn't
provide any operational benefit over the complexity. Some ISPs feel
that rate limiting can also make an attacker's job easier by
requiring the attacker to send less traffic to starve legitimate
traffic that is part of a rate limiting scheme. Rate limiting may be
improved by developing flow-based rate-limiting capabilities with
filtering hooks. This would improve the performance as well as the
granularity over current capabilities.
djs> In the case of syn floods ratelimiting done correctly
djs> will limit the effects of the attack.
djs> The flooder will only send SYNs while the
djs> real clients will send syns until they get connected
djs> or quit trying and THEN they will become an estabilished
djs> connection (syn/ack, ack, ack/push, ack/urg ...)
djs> I am not sure how to capture that idea well in a single paragraph:(
Generalized TTL Security Mechanism
djs> Not supported by most commercial network element vendors.
djs> Ask your vendor but I only know of one vendor
djs> that has implemented it and they only support it for bgp.
2.6. Software Upgrades and Configuration Integrity / Validation
djs> Is this intended to be limited to intra-ISP communication.
djs> It doesn't appear to address the actual download from the vendor.
2.6.6. Man-In-The-Middle
A man-in-the-middle attack attacks the identity of a communicating
peer rather than the data stream itself. The attacker intercepts
traffic that is sent between the infrastructure device and the host
used to upload/download the system image or configuration file. He/
she can then act on behalf of one or both of these systems.
If an attacker obtained a copy of the software image being deployed,
he could potentially exploit a known vulnerability and gain access to
the system. From a captured configuration file, he could obtain
confidential network topology information or even more damaging
information if any of the passwords in the configuration file were
not encrypted.
djs> MIM can be used to attack the data stream.
djs> Commands can be inserted that would allow an
djs> attacker to add a local account with any password they choose.
djs> some of the exploit tools for cisco routers change the config to
djs> provide admin access.
djs> if any of the encrypted password can be decrypted (such as cisco
type 7)
2.8.3. Routing Control Plane Filtering
Routing filters are used to control the flow of routing information.
In IPv6 networks, some providers are liberal in accepting /48s due to
the still unresolved multihoming issues. Any announcement received
that is longer than a /48 for IPv6 routing and a /24 for IPv4 routing
is filtered out of eBGP. Note that this is for non-customer traffic.
Most ISPs will accept any agreed upon prefix length from its
customer(s).
djs> I see no mention of COPP/RE ratelimiting
djs> we have tested and implemented some reliable limiting.
djs> without that ratelimiting some very simple attacks can consume
djs> the NE's cpu.
djs> perhaps that is too new or belongs somewhere else?
Our IDS reports a false negative rate of 0 (Dr J).
Donald.Smith@qwest.com giac
> -----Original Message-----
> From: owner-opsec@psg.com [mailto:owner-opsec@psg.com] On
> Behalf Of George Jones
> Sent: Monday, July 10, 2006 8:10 AM
> To: Merike Kaeo
> Cc: opsec@ops.ietf.org
> Subject: Comments on draft-ietf-opsec-current-practices-05.txt
>
> Comments and HTML diffs attached.
>
> For those on the list: Merike submitted -05 after the cutoff.
> You can see the changes
> from -04 in the attached .HTML file.
>
> I think it's pretty well done. Only major thing is add
> citations (CVE, CERT, etc) for attacks
> enumerated.
>
> Good work.
>
> ---George
>
>
>
This communication is the property of Qwest and may contain confidential or
privileged information. Unauthorized use of this communication is strictly
prohibited and may be unlawful. If you have received this communication
in error, please immediately notify the sender by reply e-mail and destroy
all copies of the communication and any attachments.