Traceability - LINX Best Current Practice Keith Mitchell Executive Chairman, London Internet Exchange UBM Conference, London 8th Sep 1998.

Slides:



Advertisements
Similar presentations
Eloqua Providing Industry-Leading Management Tools.
Advertisements

The leader in session border control for trusted, first class interactive communications.
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Securing the Border Gateway Protocol (S-BGP) Dr. Stephen Kent Chief Scientist - Information Security.
1 November 1999 The Internet in the UK Keith Mitchell Executive Chairman
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition Chapter 9 Network Services.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Sonia Jahid University of Illinois Fall 2007.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
Router Hardening Nancy Grover, CISSP ISC2/ISSA Security Conference November 2004.
Copyright © 2000, ZipLink Inc. Patent Pending 1 Mail Message Metering or, how to block outbound spam Robert D. Haskins.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
FIREWALL Mạng máy tính nâng cao-V1.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Policy Proposal 109 Standardize IP Reassignment Registration Requirements ARIN XXV 18 April, 2010 – Toronto, Ontario Chris Grundemann.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
1 NGN Issues - Numbering and Addressing Peter Darling ACIF NGN FOG No. 3.
© British Telecommunications plc Network Filtering.
RIPE34 Meeting EIX Working Group London Internet Exchange Ltd. Keith Mitchell 22 September 1999 London Internet Exchange Keith Mitchell Executive Chairman.
Can the Internet Remain Self-Governing ? Keith Mitchell Executive Chairman, London Internet Exchange Re-Engineering the Internet, 26th Jan.
COEN 252 Computer Forensics Collecting Network-based Evidence.
October 8, 2015 University of Tulsa - Center for Information Security Microsoft Windows 2000 DNS October 8, 2015.
Draft Policy Standardize IP Reassignment Registration Requirements ARIN XXVI 6 October, 2010 – Atlanta, Georgia Chris Grundemann.
1 February 2000 London Internet Exchange Point Update Keith Mitchell Executive Chairman NANOG18 Meeting San Jose.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Reinventing Digital Identity Design Goals Product Overview Technology & Cryptography Overview Question & Answer.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
CS460 Final Project Service Provider Scenario David Bergman Dong Jin Richard Bae Scott Greene Suraj Nellikar Wee Hong Yeo Virtual Customer: Mark Scifres.
Managing Networks and Network Devices
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Module 10: Windows Firewall and Caching Fundamentals.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
Role Of Network IDS in Network Perimeter Defense.
K. Salah1 Security Protocols in the Internet IPSec.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Cryptography and Network Security
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
Working at a Small-to-Medium Business or ISP – Chapter 8
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Presentation transcript:

Traceability - LINX Best Current Practice Keith Mitchell Executive Chairman, London Internet Exchange UBM Conference, London 8th Sep 1998

Overview Background, History, Motivation Principles IP addresses Dial-up users Applications DNS

LINX Experiences LINX is UK national Internet Exchange Point (IXP) Represents 55 largest UK/EU ISPs 4 “non-core” activities include: –Content Regulation –UBM (“spam”) Regulation

LINX & Regulation Funding, and policy & management oversight of IWF Defines “good practice” (BCP), but only mandatory requirements concern IXP Becoming involved in network abuse –UBM, resource theft Traceability BCP has been work in progress for over a year –8 authors so far –nearly finished !

Internet Watch Foundation Voluntary funding from large ISPs directly, and small/medium via associations Operates hot-line for reporting illegal material Working on content rating schemes (INCORE project, ICRA)

Key IWF Principle UK ISPs supporting IWF are not held responsible for illegal content on their systems, provided: –it was placed there by customers –they have no prior knowledge of it –they take appropriate action when they do learn of it n.b This is an informal agreement, not upheld by UK law

Traceability Principle of who did what & when on the Internet Key element of making individuals responsible for their actions Rest of talk outlines contents of LINX “Best Common Practice” draft document for ISP industry

Uses of Traceability Finding out sources of: –Illegal content (e.g. paedophile material) –Denial of Service attacks –Unsolicited Bulk Messaging (“spam”) –Hacking, fraudulent access

Traceability in Practice Complete knowledge is 100% possible in theory but practice will fall short of this BCP document will define how to make practice closer to theory Traceability is currently exception –ideally the norm –legitimate anonymity an exception

Traceability Obstacles Vendor support Passing information between ISPs and carriers, e.g. –across national borders –caller id Unregistered trial etc accounts 3rd party relaying ( )

IP Addresses All Internet activity has to come from some IP address –Starting point of any tracing exercise Need to map from this through: –domain name system –one or more ISPs –authentication system –PSTN to user

IP Address Spoofing Need to ensure traffic is coming from where its source address claims - easy to fake Most applications require duplex communication, so spoof abuse scope limited: –Denial of Service attacks –“Single shot” attacks –TCP sequence number interpolation

Spoof Prevention Static packet filters: –between backbone and “edge” routers in ISP’s backbone –performance impact –hard to scale elsewhere, e.g. between providers Dynamic filters: –per-user per dial-in session More info in RFC 2267

Dial-up Users Use of per-session dynamic IP address allocation is efficient but makes traceability harder User accounts and access numbers common to many dial-in routers Need to reliably map from: –(IP address, time) to (user)

Dial-in Authentication RADIUS authentication logs usually have info required, but: –need time synchronisation (NTP) –records can be lost (UDP) –vendor record format variations Alternatives include: –syslog, dynamic DNS, finger/telnet, SNMP

Unregistered Users e.g. –free trials –“pay as you go” services –public access terminals Pose particular traceability problems but there are ways to offer these services with safeguards

De-Anonymising Users Credit card check Voice phone call back Fax phone call back Avoid shared accounts Digital certificates Caller Id or CLI

Caller Id (CLI) Ideally phone number being used to make modem call passes through PSTN carriers and dial-in router to ISP’s logfiles Some issues in practice: –carriers –router vendors –users

Caller Id Issues Not all carriers present full CLI –regulatory intervention needed ? Not all dial-in routers: –accept or log CLI –differentiate withheld vs unavailable ISPs who are not carriers get user (possibly modified) CLI rather than network CLI

“Pay as you go” Services e.g. BTclick, FreeServe, C&W Need to be able to: –require and log CLI –block payphone, international, prepaid calls –maintain frequent abuser phone number blacklist –identify IP address ranges used for this

Traceability Very easy to make untraceable via fake headers Default config of many MTAs dumb in this respect Some routine precautions can tackle this Modern MTAs which are wise to this are available

MTA Config Make sure actual IP addresses are stamped on headers Disable 3rd-party relaying ! Consider using SMAP, Exim MTAs Source filter which IP addresses can connect to SMTP port DNS verification –valid ? –forward/reverse match ?

USENET News Servers Always add X-NNTP-Posting-Host: header Restrict posting from customer addresses only Heavily restrict use of mail2news –Always add X-Mail2news: header Importance of synchronised & verified time/date stamping

Domain Name Servers in-addr address to name mapping critical when tracing important to ensure server security in theory dynamic DNS update could insert user name into reverse lookup for session duration - hard in practice

BCP Status Currently in final draft form Limited distribution for consultation to interested parties Contributions still welcome ! Full publication end Nov –via

Work to be done New Sections: –Logging –Inter-provider issues –IRC & “chat” More details on: –Domain name service –IP spoofing, filtering –“pay as you go” services Corrections, improvements

Conclusions You can’t solve the whole problem..but straightforward measures can make a big difference Legal protection of legitimate users’ privacy must be addressed The industry can take a responsible lead through co-operation