MPLS/VPN Security Threats and Defensive Techniques (provider provision) Speaker : JET 3,1’2004.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Network Security Essentials Chapter 11
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Internet Protocol Security (IPSec)
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Network based IP VPN Architecture using Virtual Routers Jessica Yu CoSine Communications, Inc. Feb. 19 th, 2001.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Intranet, Extranet, Firewall. Intranet and Extranet.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Chapter 13 – Network Security
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Discovery 2 Internetworking Module 8 JEOPARDY K. Martin.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internet Security and Firewall Design Chapter 32.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
11 Softwire Security Analysis and Guidance for Mesh Shu Yamamoto Carl Williams Florent Parent Hidetoshi Yokota draft-ietf-softwire-security-requirements-XX.txt.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
UNIT 7 SEMINAR Unit 7 Chapter 9, plus Lab 13 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours: Tuesday.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
CompTIA Security+ Study Guide (SY0-401)
Chapter 18 IP Security  IP Security (IPSec)
Computer Data Security & Privacy
CompTIA Security+ Study Guide (SY0-401)
VPN: Virtual Private Network
دیواره ی آتش.
Introduction to Network Security
Presentation transcript:

MPLS/VPN Security Threats and Defensive Techniques (provider provision) Speaker : JET 3,1’2004

Introduction From BTexact Technologies

What is Threats ? Observation, modification, or deletion of PPVPN user data Replay of MPLS/VPN user data Injection of non-authentic data into a MPLS/VPN Traffic pattern analysis on MPLS/VPN traffic Disruption of MPLS/VPN connectivity Degradation of MPLS/VPN service quality

Threats sources The MPLSVPN service provider or persons working for it Other persons who obtain physical access to a service provider site Persons within the organization which is the MPLS/VPN user with respect to a particular MPLS/VPN Persons within an organization that is a separate MPLS/VPN user of the same service provider Others i.e. attackers from the Internet at large.

Security Threats - Data Plane MPLS/VPN Spoofing and Replay Unauthorized Observation/Modification/Deletion DoS Traffic Pattern Analysis Impersonation

Insertion of Non-Authentic Data Traffic: Spoofing and Replay Spoofing : insertion into the VPN of packets that do not belong there Replay : copies of once-legitimate packets that have been recorded and replayed

Denial of Service Attacks on the MPLS/VPN Monopolize network resources and thus prevent other PPVPNs from accessing those resources Inserting an overwhelming quantity of non- authentic data Overwhelming the service provider's general (MPLS/VPN-independent) infrastructure with traffic Interfering with its operation

Unauthorized Observation/Modification/Deletion of Data Traffic “Sniffing" VPN packets Examining their contents Modifying the contents of packets in flight Causing packets in flight to be discarded Would typically occur on links in a compromised node

Traffic Pattern Analysis “Sniffing" VPN packets and examining aspects or meta-aspects of them Even are encrypted gain useful information the amount and timing of traffic packet sizes source and destination addresses etc.

Impersonation Disguises itself to appear as a legitimate entity

Security Threats - Control Plane SP’s Equipment Cross-connection of Traffic Between MPLS-VPNs DoS Routing Protocols Route Separation MPLS/VPN Address Space Separation

Denial of Service Attacks on the Network Infrastructure Against the mechanisms the service provider uses to provide MPLS/VPNs MPLS, LDP/BGP, IPsec, etc., Against the general infrastructure of the service provider Core routers Deny the otherwise-legitimate activities of another MPLS/VPN user

Attacks on the Service Provider Equipment Via Management Interfaces Reconfigure the equipment extract information (statistics, topology, etc.) Malicious entering of the systems Inadvertently as a consequence of inadequate inter-VPN isolation in a MPLS/VPN user self-management interface

Cross-connection of Traffic Between MPLS/VPNs This refers to the event where expected isolation between separate PPVPNs is breached This includes cases such as A site being connected into the "wrong" VPN Two or more VPNs being improperly merged together A point-to-point VPN connecting the wrong two points Any packet or frame being improperly delivered outside the VPN it is sent in Likelihood of being the result of service provider or equipment vendor error

Attacks Against MPLS/VPN Routing Protocols Routing protocols that are run by the service provider - LDP / BGP In layer 3 VPNs with dynamic routing this would typically relate to the distribution of per- VPN routes as well as backbone routes In layer 2 VPNs this would typically relate only to the distribution of backbone routes

Attacks on Route Separation keeping the per-VPN topology and reachability information for each PPVPN separate from, and unavailable to, any other PPVPN Reveal topology Addressing information about a MPLS/VPN Cause black hole routing or unintended cross-connection between MPLS/VPNs

Attacks on Address Space Separation In Layer 3 VPNs, the IP address spaces of different VPNs need to be kept separate In Layer 2 VPNs, the MAC address and VLAN spaces of different VPNs need to be kept separate Result in cross-connection between VPNs.

Defensive Techniques Cryptographic techniques Authentication Access Control techniques Use of Isolated Infrastructure Use of Aggregated Infrastructure Service Provider Quality Control Processes Deployment of Testable MPLS/VPN Service

Defense Philosophy Security threats can be addressed Provider's specific service offerings MPLS/VPN user should assess the value which these techniques add to the user's VPN requirements Nothing is ever 100% secure - most likely to occur and/or that have the most dire consequences To make the cost of a successful attack greater than what the adversary will be willing to expend

Cryptographic techniques Privacy traffic separation encryption Authentication Integrality Drawback Computational burden Complexity of the device configuration Incremental labor cost Packet lengths are typically increased traffic load fragmentation Other Devices

IPsec in MPLS/VPNs PE to PE (can’t be employed ) PE to CE - weaker links (pass the Internet) CE-to-CE (only use tunnel mode) Service Level Agreement (SLA) rather than analyzing the specific encryption techniques \

Encryption for device configuration and management Secure Shell (SSH) offers protection for TELNET [STD-8] or terminal-like connections to allow device configuration SNMP v3 [STD62] also provides encrypted and authenticated protection for SNMP- managed devices Transport Layer Security (TLS) (also known as Secure Sockets Layer or SSL) [RFC-2246]

Authentication Prevent Denial -of-Service attacks Malicious misconfiguration Cryptographic techniques – Cryptographic techniques shared secret keys one-time keys generated by accessory devices or software user-ID and password pairs public-private key systems do not protect against some types of denial of service attacks

Authentication issues VPN Member Authentication Management System Authentication auto- discovery Peer-to-peer Authentication

Access Control techniques packet-by-packet packet-flow-by-packet-flow Filtering Firewalls

Filtering Common for routers Filter Characteristics Stateless (In most cases ) Stateful (commonly done in firewalls ) Actions based on Filter Results Discard Set CoS Count packets and/or bytes Rate Limit - MPLS EXP field Forward and Copy

Firewalls passing between different trusted zones SP to SP, PE to CE passing between trusted zone and an untrusted zone Services threshold-driven denial-of-service attack protection virus scanning acting as a TCP connection proxy Advantage understanding of the topologies understanding of the threat model

Firewalls (conf) Within the MPLS/VPN framework, traffic typically is not allowed to pass between the various user VPNs Extranets - provide the services required for secure extranet implementation Protect the user VPNs and core network from the public Internet

vpn 2 My LAB Environment isp A isp B P router Linux MPLS Daemon vpn 1 HOST Linux For API WinXP For Microcode CE router Linux PE router Linux MPLS Daemon ixp1200 Frmo EE ixp1200

Next Presentation (3,8 ’ 2004) IXP1200 Linux How To MPLS for Linux Development