ServiceTrak Meets NLOG/NMAP Jon Finke Rensselaer Polytechnic Institute
Objectives l Identify existing security exposures l Identify potential security exposures l Validate meta system configuration l Build on existing work Internal - Simon, ServiceTrak External - NMAP/NLOG
Computing Environment l Computer Center Machines Unix - Centrally administered WinTel - Mixed administration l Departmental Machines Unix Administered by CC Staff Unix Administered by non CC Staff WinTel - Mixed Administration
NLOG/NMAP l NMAP port scans networks Matches TCP/IP Fingerprint for OS Identifies open ports (services) l NLOG Provides some data management Provides a web interface
ServiceTrak l Tracks Services and Servers Web interface to Simon host info
Host Groups lpr_ok pop_ok Public Workstations lpr_Specials pop_Specials Private Workstations Public_AIX Public_Irix Public_Solaris Private_AIX Private_Irix Private_Solaris AIX_Workstations Irix_Workstations Solaris_Workstations All_Workstations
Service “Safety” l My Standards History of attack/exposure - SMTP Encourage Exposure - Telnet Not required for user workstation Specific servers only (ftp, dns, etc) l Set for the needs of my department Your Mileage May Vary
Similar Hosts l Do all hosts offer the SAME services l Do the services make sense for that group? l Is the OS fingerprint correct for each host?
Remote Access Hosts
Ssh (22/tcp) Remote Access NMAP l Safety Level: Safe l Secure Shell l TSV File
Safety Level Breakdown l Special Group of ALL HOSTS Which ones are running unsafe protocols? Do we care?
Protocol Specific Lists l Service specialists interested in their particular service. Hostmaster interested in DNS servers Webmaster interested in WWW servers l Operating system specialists interested in their own OS.
Problems l NLOG can crash some services l Trips scan detectors Irate from other sys admins l False reports from detection tools Back Officer Friendly l Policy Issues
Our Results l Identified some exposures OS upgrade turned some things on l Identified site configuration errors “Trusted” unix host running NT l Integration of NLOG info with existing tools helpful.
Lessons Learned l Host grouping is VERY useful NLOG may be a good approach l OS (via TCP Fingerprint) very handy l Policy Issues Let someone else run it and take the heat…..
ServiceTrak Meets NLOG/NMAP Jon Finke Rensselaer Polytechnic Institute