Title: Pondering and Patrolling Perimeters
1Pondering and Patrolling Perimeters
- Bill Cheswick
- ches_at_lumeta.com
- http//www.lumeta.com
2Perimeter defenses are a traditional means of
protecting an area without hardening each of the
things in that area
3Why use a perimeter defense?
- It is cheaper
- A mans home is his castle, but most people cant
afford the moat - You can concentrate your equipment and your
expertise in a few areas - It is simpler, and simpler security is usually
better - Easier to understand and audit
- Easier to spot broken parts
4Perimeter Defense of the US Capitol Building
5Flower pots
6(No Transcript)
7Security doesnt have to be ugly
8(No Transcript)
9(No Transcript)
10(No Transcript)
11(No Transcript)
12Delta barriers
13Parliament entrance
14Parliament exit
15Whats wrong with perimeter defenses
- They are useless against insider attacks
16Edinburgh Castle
- fell through a hole in its perimeter
- fell to siege in three years in 16th century
- ran out of food and water
- Unsuccessful attack by Bonnie Prince Charlie in
1745 - Devastated in 1544 by the Earl of Hertford
17Whats wrong with perimeter defenses
- They are useless against insider attacks
- They provide a false sense of security
- You still need to toughen up the inside, at least
some - You need to hire enough defenders
18(No Transcript)
19(No Transcript)
20Whats wrong with perimeter defenses
- They are useless against insider attacks
- They provide a false sense of security
- You still need to toughen up the inside, at least
some - They dont scale well
21The Pretty Good Wall of China
22(No Transcript)
23(No Transcript)
24(No Transcript)
25Can we live without an intranet?
26I can, but you probably cant
- Skinny-dipping on the Internet since the mid
1990s - The exposure focuses one clearly on the threats
and proactive security - Its very convenient, for the services I dare to
use - Many important network services are difficult to
harden
27Skinny dipping rules
- Only minimal services are offered to the general
public - Ssh
- Web server (jailed Apache)
- DNS (self chrooted)
- SMTP (postfix, not sendmail)
- Children (like employees) and MSFT clients are
untrustworthy - Offer hardened local services at home, like SAMBA
(chroot), POP3 (chroot) - Id like to offer other services, but they are
hard to secure
28Skinny dipping requires strong host security
- FreeBSD and Linux machines
- I am told that one can lock down an MSFT host,
but there are hundreds of steps, and I dont know
how to do it. - This isnt just about operating systems the
most popular client applications are, in theory,
very dangerous and, in practice, very dangerous. - Web browsers and mail readers have many dangerous
features
29Lately, I have been cheating
- Backup hosts are unreachable from the Internet
(which is a perimeter defense of sorts), and do
not trust the exposed hosts - Public servers have lower privilege than my crown
jewels - This means I can experiment a bit more with the
exposed hosts
30Skinny dipping flaws
- Less depth to the defense
31(No Transcript)
32Skinny dipping flaws
- Less defense in depth
- No protection from denial-of-service attacks
33Hopes for Microsoft client security?
- Ill talk about it at the end of the talk.
34Intranets
- Networked perimeter defenses
35Anything large enough to be called an intranet
is out of control
36Intranets have been out of control since they
were invented
- This is not the fault of network administrators
- The technology is amenable to abuse
- Decentralization was a design goal of the
Internet - CIO and CSOs want centralized control of their
network - The legacy information is lost with rapid
employee turnover - MA breaks carefully-planned networking
37Perimeter security gives a false sense of security
- Crunchy outside, and a soft, chewy center
- Me
- I think 40 hosts is about the most that I can
control within a perimeter. - Others can probably do better
- Internet worms are pop quizzes on perimeter
security
38Intranets the rest of the Internet
39History of the Project and Lumeta
- Started in August 1998 at Bell Labs
- April-June 1999 Yugoslavia mapping
- July 2000 first customer intranet scanned
- Sept. 2000 spun off Lumeta from Lucent/Bell Labs
- June 2002 B round funding completed
- 2003 sales gt4MM
- After three years of a service offering, we built
IPSonar so you can run it yourself.
40(No Transcript)
41(No Transcript)
42(No Transcript)
43(No Transcript)
44(No Transcript)
45This was Supposed To be a VPN
46(No Transcript)
47(No Transcript)
48This is useful, butcan we find hosts that have
access across the perimeter?
49Leaks
- We call the leaks shown in the maps routing
leaks - Can we find hosts that dont forward packets, but
straddle the perimeter? - Yes we call them host leaks, and detecting
them is Lumetas special sauce
50How to find host leaks
- Run a census with ICMP and/or UDP packets
- Test each machine to see if it can receive a
probe from one network, and reply on another - Not just dual-homed hosts
- DMZ hosts, business partner machines,
misconfigured VPN access
51Leak Detection
Mapping host
mitt
- A sends packet to B, with spoofed return address
of D - If B can, it will reply to D with a response,
possibly through a different interface
A
D
Internet
intranet
C
B
Test host
52Leak Detection
Mapping host
mitt
- Packet must be crafted so the response wont be
permitted through the firewall - A variety of packet types and responses are used
- Either inside or outside address may be
discovered - Packet is labeled so we know where it came from
A
D
Internet
intranet
C
B
Test host
53Leaks are not always bad
- Depends on the network policy
- Often, outgoing leaks are ok
- Sometimes our test packets get through, but not
the services you are worrying about - Please dont call them leaks
- Until this test, there was no way for the CIO to
detect them, good or bad - Patent pending
54We developed lot of stuff
- Leak detection (thats the special sauce)
- Route discovery
- Host enumeration and identification
- Server discovery
- Lots of reportsthe hardest part
- Wireless base station discovery
- And moreask the sales people
- The zeroth step in network intelligence
- me
55Case studies corp. networksSome intranet
statistics
56Some Lumeta lessons
- Reporting is the really hard part
- Converting data to information
- Tell me how we compare to other clients
- Offering a service was good practice, for a while
- We have gt70 Fortune-200 companies and government
agencies as clients - Need-to-have vs. want-to-have
57Defending Your Network Identifying and
Patrolling Your True Network Perimeter
- Bill Cheswick
- Chief Scientist, Lumeta Corp