Скачать презентацию Phil Rodrigues Sr Network Security Analyst NYU ITS Скачать презентацию Phil Rodrigues Sr Network Security Analyst NYU ITS

fca467cb34aa4ef58656a5e7ebb6c4f4.ppt

  • Количество слайдов: 26

Phil Rodrigues, Sr Network Security Analyst, NYU ITS Automated Policy Enforcement November 12, 2004 Phil Rodrigues, Sr Network Security Analyst, NYU ITS Automated Policy Enforcement November 12, 2004 1

Automated Policy Enforcement Net. Reg Scan at UConn Net. Auth Working Group NYU’s Safety. Automated Policy Enforcement Net. Reg Scan at UConn Net. Auth Working Group NYU’s Safety. Net 2

Automated Policy Enforcement Net. Reg Scan at UConn 3 Automated Policy Enforcement Net. Reg Scan at UConn 3

UConn: Prelude • During Def. Con hundreds of Stealther • Blaster and Welchia stressed UConn: Prelude • During Def. Con hundreds of Stealther • Blaster and Welchia stressed the need • Late August move-in 4

UConn: rpcscan • • Nessus was too slow, nasl did not exist? Developed by UConn: rpcscan • • Nessus was too slow, nasl did not exist? Developed by Keith Bessette and others Based on exploit code Fast scanner for one or many computers 5

UConn: Net. Reg Scan • Developed by Mike Lang and others • Forced rpcscan UConn: Net. Reg Scan • Developed by Mike Lang and others • Forced rpcscan before it allowed access to Net. Reg • If client failed, redirected to patch website 6

UConn: Lessons Learned • • Existing Net. Reg system was critical Ability to create UConn: Lessons Learned • • Existing Net. Reg system was critical Ability to create code was essential (c, perl) Making a scanner is hard, use someone else’s Good communication made for good neighbors 7

Automated Policy Enforcement Net. Auth Working Group 8 Automated Policy Enforcement Net. Auth Working Group 8

Net. Auth: Brief History • Educause / Internet 2 Security Task Force • Working Net. Auth: Brief History • Educause / Internet 2 Security Task Force • Working group started in May 2004 • Draft whitepaper August 2004, me and Eric Gauthier (BU) • “Strategies for Automating Network Policy Enforcement” 9

Net. Auth: Common Classification • • Registration Detection Isolation Remediation 10 Net. Auth: Common Classification • • Registration Detection Isolation Remediation 10

Net. Auth: Registration • Must have it! 11 Net. Auth: Registration • Must have it! 11

Net. Auth: Detection • • Active (nessus) Passive (netflow) Agent (commercial or home-grown) Interval Net. Auth: Detection • • Active (nessus) Passive (netflow) Agent (commercial or home-grown) Interval (once vs on-going) 12

Net. Auth: Isolation • VLAN (homogenous) • IP (heterogenous) • Gateway (inline device) 13 Net. Auth: Isolation • VLAN (homogenous) • IP (heterogenous) • Gateway (inline device) 13

Net. Auth: Remediation • Local Static (website) Dymanic (SUS) • External (Windows Update) Proxy Net. Auth: Remediation • Local Static (website) Dymanic (SUS) • External (Windows Update) Proxy (remember SSL) Translation (routing issues) Split-DNS (domain list) 14

Net. Auth: Effective Practices Guide • Looking for working examples of each category Home-grown Net. Auth: Effective Practices Guide • Looking for working examples of each category Home-grown agent VLAN isolation Perfigo / Cisco Bradford IPS etc 15

Automated Policy Enforcement NYU’s Safety. Net 16 Automated Policy Enforcement NYU’s Safety. Net 16

Safety. Net: High Level Goals • • Base it on successful systems Fairly self-sustaining Safety. Net: High Level Goals • • Base it on successful systems Fairly self-sustaining Scalable for 11, 000+ Res. Net, and more! Practical implementation of Net. Auth classification 17

Safety. Net: Initially Staff Intensive • Security Analyst (did not do much…) • Network Safety. Net: Initially Staff Intensive • Security Analyst (did not do much…) • Network Services management and staff (5 people) • Consultant (scanning cluster and perl glue) • Client Services and Publications • NYU specific, but basic strategy should be portable 18

Safety. Net: Pre-Existing Structure • • Pre-existing Res. Net registration system (1997!) BIND and Safety. Net: Pre-Existing Structure • • Pre-existing Res. Net registration system (1997!) BIND and ISC DHCPD v 3 Static assignment DHCP infrastructure perl glue 19

Safety. Net: Registration • • Client authentication against netid Housing lookup for room assignment Safety. Net: Registration • • Client authentication against netid Housing lookup for room assignment SNMP verification of location If all that succeeds, start detection 20

Safety. Net: Detection • Initial active external detection • nmap and nessus / scanlite Safety. Net: Detection • Initial active external detection • nmap and nessus / scanlite • Limited plugin set rpc-dcom / rpcss messenger lsass • Perl glue to return consistent results 21

Safety. Net: Isolation • • IP DHCP-based isolation Had: Home-grown host management system Needed: Safety. Net: Isolation • • IP DHCP-based isolation Had: Home-grown host management system Needed: Conversion to DHCPD v 3 Too many vendors and vintages for VLAN 22

Safety. Net: Remediation • External dynamic NAT/Split-DNS remediation • Based on Fairfield University’s system Safety. Net: Remediation • External dynamic NAT/Split-DNS remediation • Based on Fairfield University’s system • Private IP -> Split-DNS -> Cisco PBR -> PIX NAT • Detailed support website • Windows Update, Symantec Live. Update • Self re-scan. If pass, assigned public IP 23

Safety. Net: Metrics • • • 9, 500 students through Res. Net registration 1, Safety. Net: Metrics • • • 9, 500 students through Res. Net registration 1, 000 found to be vulnerable (10%) 200 called Client Services (20%) (800 did not? ) Order of magnitude rule 100 slipped through the cracks (1%) Less than 50 vulnerable at any time (0. 5%) 24

Conclusions • Well? 25 Conclusions • Well? 25

Links http: //www. security. uconn. edu/old_site/netregscan/ http: //www. security. uconn. edu/old_site/uconn_response. html http: //security. Links http: //www. security. uconn. edu/old_site/netregscan/ http: //www. security. uconn. edu/old_site/uconn_response. html http: //security. internet 2. edu/netauth/docs/draft-internet 2 -salsa-netauthsummary-02. html 26