How to Finally Secure your Network Storage Himanshu Dwivedi Managing Security Inc.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
IP –Based SAN extensions and Performance Thao Pham CS 622 Fall 07.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Internet Protocol Security (IPSec)
Agenda CS C446 Data Storage Technologies & Networks
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 9 TCP/IP Protocol Suite and IP Addressing.
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 9 TCP/IP Layers and Vulnerabilities  MModified by :Ahmad Al Ghoul  PPhiladelphia.
OSI Model Routing Connection-oriented/Connectionless Network Services.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
Storage Security and Management: Security Framework
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 13 – Network Security
Common Devices Used In Computer Networks
– Chapter 5 – Secure LAN Switching
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Chapter 8: Virtual LAN (VLAN)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
CHAPTER 9 Sniffing.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
An Analysis of IPv6 Security CmpE-209: Team Research Paper Presentation CmpE-209 / Spring Presented by: Dedicated Instructor: Hiteshkumar Thakker.
Lecture 24 Wireless Network Security
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
STORE AND FORWARD & CUT THROUGH FORWARD Switches can use different forwarding techniques— two of these are store-and-forward switching and cut-through.
Security fundamentals Topic 10 Securing the network perimeter.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Internet Protocol Storage Area Networks (IP SAN)
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
© 2007 EMC Corporation. All rights reserved. Internet Protocol Storage Area Networks (IP SAN) Module 3.4.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Securing Access to Data Using IPsec Josh Jones Cosc352.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Network Devices and Firewalls Lesson 14. It applies to our class…
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
An Introduction To ARP Spoofing & Other Attacks
SECURITY ZONES.
IT443 – Network Security Administration Instructor: Bo Sheng
Secure Sockets Layer (SSL)
– Chapter 5 – Secure LAN Switching
Introduction to Networks
Virtual LANs.
Introduction to Network Security
Presentation transcript:

How to Finally Secure your Network Storage Himanshu Dwivedi Managing Security Inc.

Why is SAN Security Needed Information –Unauthorized access or unintentional damage Protection –Internal and External Threats Competitors, ex-employees, future ex-employees, etc. Connectivity –SANs include all types of servers (Application, Web, FTP, etc) that are attached to the Ethernet and the existing storage network –A single compromised server may open the gateway to the SAN

Importance of SAN Security Importance –What we see: Clients dedicating large budgets to SANs Protect intellectual property SANs typically contain the keys to the kingdom –What we know: Attacks rarely change, they get modified Management methods/networks are the primary target IP attacks will be used for Fibre Channel –What vendors know: “Many SANs are only as secure as the hosts and clients attached to the storage network” --Scott Robinson, CTO, Datalink Corp

Example SAN

Common Problems - Authentication Limited access control –Limited concept of multi-user administration Management tools do not provide a variety of security profiles Authentication Vulnerabilities –Username/Password is not enough! –Cisco Vulnerability: It is possible to read stored configuration files from the Storage Router without any authorization

Common Problems – Clear-text Fibre Channel management –SCSI Enclosure Services (SES) SES provides no extra security besides username/password –FC-SNMP SNMP is clear-text and provides no extra security besides community strings –Browser-Based Management HTTP, SNMP, SES may be managed via a browser Username and password (pass in the clear), is the only security provided Again….Username/Password is not enough!!

Fibre Channel Layers

Attack Vector: FC - Layer 2

Weaknesses - Sequence ID SEQ_CNT and SEQ_ID –A Fibre Channel Sequence is a series of one or more related frames transmitted unidirectionally from one port to another. –All frames must be part of a Sequence. Frames within the same Sequence have the same SEQ_ID field in the header. For each frame transmitted in a Sequence, SEQ_CNT is incremented by 1. –This is similar to what? – ISN in TCP/IP –Attacker can guess the SEQ_ID and attempt to hijack the session

Weakness - Joining the Fabric Pollute SNS when joining the fabric –N_Port send a Fabric login (FLOGI) to the well know address of xFFFFFE (broadcast). –The switch receives the frame at xFFFFFE and returning an accept frame (ACC). Service information is exchange –Knowing there is no validation required to receive an accept frame (ACC), an attacker could send a modified 24-bit address to xFFFFFE in an attempt to corrupt the SNS information As soon as ACC is received, attacker knows that SNS has been modified

Weakness - Flow control Disruption of Flow Control –A device can transmit frames to another device only when the other device is ready to accept them. Before the devices can send data to each other, they must login to each other and establish credit. –Credit Credit refers to the number of frames a device can receive at a time. This value is exchanged with another device during login, so each knows how many frames the other can receive. –Disruption of Flow control Injecting a high or low credit value disrupts the service

Weakness - Switches Cut-through switching –A switch only looks at the D_ID (24-bit Destination address) to route the frame –Increases performance by reducing the time required to make a routing decision –However, there is no verification of the S_ID (Source address) and the frame is passed

Weakness - Simple Name Server Simple Name Server –Simple Name Servers maps the 24-bit fabric address and the 64-bit World Wide Name IP Attack: Polluting the ARP tables Fibre Channel Attack: Polluting the SNS

Weakness - HBA World Wide Names –WWNs can be easily changed on an HBA –WWNs are used as unique identifiers that do not get authenticated –WWNs can be spoofed to access different zones

LUN Masking and Zoning Switch Features –LUNs Masking and Zoning LUN masking creates subsets of storage within the SAN virtual pool and allows only designated servers to access the storage subsets. Zoning restricts access to specific physical devices such as RAID arrays or individual disks (Equivalent to VLANs in the Ethernet world). –LUN masking and Zoning are NOT considered security tools, but rather efficiency tools

LUN Masking Types of LUN Masking –Server configuration –Host level drivers on HBA –Storage controllers are configured Must be supported by the storage vendor –Storage Virtualization – LUN Masking device Works with any server and any HBA, added overhead and performance issues

LUN Masking Strengths –Provides segregation Weaknesses –Design for segmentation, not security –Modifications at HBA are granted –LUNs “broadcasting” is built to be highly available

Zoning Zoning is separation –A method for separating fabric connected devices in group over the same physical fabric –Similar to VLANs in the Ethernet world Types of Zoning –Hard, Soft, and combination –Hard Physical port address – static fabrics –Soft Node WWN and Port WWN – dynamic fabrics

Hard Zoning

Soft Zoning

Future Problems Ethernet attack techniques will soon be used for FC –Man-in-the-Middle* –Replay –Spoofing* –Malformed Packets –Zone Hopping (VLAN hopping) –Cache Poisoning –Hijacked sessions* –Sniffing –Denial of Service * Example to Follow

Future Attacks - MITM Man-in-the-Middle –A attacker sends out a modified frame to xFFFFFE with the 24-bit address of the legitimate switch. The fabric assumes that the attacker is the legitimate fibre channel switch –All frames destined for the real switch are passed to the attacker first, then to the legitimate switch. However, tools need to be written to to pass the traffic to the switch, otherwise the attack will not work.

Future Attacks - MITM Man-in-the-Middle

Future Attacks - Spoofing Spoofing –A server is strictly given rights to zones from the switch An attacker changes (spoofs) its WWN to the WWN of the server The switch grants access rights to certain zones because it is recognizes the WWN

Future Attacks - Spoofing Spoofing

Future Attacks – Session Hijacking Session Hijacking –FC session hijacking could be conducted if a third party takes control of an existing session between two trusted machines by predicting the Sequence ID (SEQ_CNT field) in FC-2 In FC-2, the SEQ_CNT field identifies individual frames within a Sequence. For each frame transmitted in a Sequence, SEQ_CNT is incremented by 1.

Future Attacks – Session Hijacking Session Hijacking

Future Attacks – Switch Attacks Switch Attacks –E-port to E-port replication!

Short Term Solutions Segmentation –Logical segmentation of management traffic from data traffic –FC for data –Ethernet of FC-IP for management (with IPSec) –Create a separate SAN management network, segmented from corporate/data network Traffic segmentation will limit exposure of other network segments in the event that a segment is compromised. It ensures individuals who require access to one network segment (e.g. management) cannot access other segments (e.g. data); thus limiting access to business need.

Short Term Solutions Switch Configurations –Simple Name Server (soft) Zoning and Hard Zoning Regular zoning, both hard zoning and simple name server (soft) zoning, will be required on all switches. This will add a layer of security for WWNs on all appropriate physical ports –Port Binding (locking) Physical Port Binding enables only authorized WWNs to access a particular port on each front-end switch and the secure fibre switch. Fabric Membership Authorization –Port-type Controls Port-type Controls will lock each port to a G-port, F-port, or E- port, according to their appropriate specifications.

Fibre Channel Solutions Fibre Channel Security –Andiamo Systems, Cisco, EMC, Qlogic, VERITAS Requirements –Authentication (e.g. switch to switch) –Integrity (e.g. data integrity) –Encryption (e.g. ESP payload)

Fibre Channel Solutions –FCSec –Authentication and Encryption at the FC-2 Layer –Provides: Switch to Switch Authentication Node to Switch Authentication Node to Node Secure Channel –Defends: Spoofing Session Hijacking Man-in-the-Middle –Monkey-in-the-Middle?

Fibre Channel Solutions FCSec –AH and ESP over FC-2 –Authentication with AH will be once in a while, meaning that overhead should be relatively low –What are the bandwidth concerns?

Fibre Channel Solutions FCSec –Switch to Switch Authentication After keys have been exchanged, frames exchanged between the switches, will be authenticated to ensure data integrity –SLAP (Switch Layer Authentication Protocol) –SA is inserted in E_Port Frames –Node to Switch Authentication After key exchange, two nodes can exchange frames to ensure integrity –Node to Node Secure Channel After key exchange, FC-2 frames can be encrypted with ESP

Fibre Channel Solutions Switch Solutions SLAP –Switch Layer Authentication Protocol Security Associations between two E_Ports Provides Authentication Provides non-repudiation –Developed by Brocade Currently in beta

Long Term Solutions Switch Configurations –SLAP Switch Layer Authentication Protocol. Switch to switch authentication via digital certificates and unique private keys –Fabric Membership Authorization Fabric Membership Authorization incorporates an internal database on each switch with a list of authorized WWNs that may join the fabric. –Fabric Configuration Servers This switch is the only device allowed to manage the other switches. It uses its own database for authentication, rather than SNMP or regular username/password combination.

Long Term Solutions Encryption of data in transit and in storage –Encryption will facilitate data integrity and confidentiality –FCSec (Fibre Channel Security) –Both Data and Management encrypted Authentication –Certificate based authentication to fabric Switch to Switch and HBA to Switch

Conclusion What does it all mean? –KNOW YOUR RISKS Acceptable amount of risk + Different functionality = Secure SANs

Questions Himanshu Dwivedi