Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Slides:



Advertisements
Similar presentations
AmeriCorps is introducing a new online payment system for the processing of AmeriCorps forms
Advertisements

IUT– Network Security Course 1 Network Security Firewalls.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Sponsored by the National Science Foundation Campus Policies for the GENI Clearinghouse and Portal Sarah Edwards, GPO March 20, 2013.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
Mr C Johnston ICT Teacher
Module 5: Configuring Access for Remote Clients and Networks.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Northwestern University Information Technology UNITS Quarterly Meeting April 29, 2004 Network Security Roger Safian
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Individual User Logins
Firewalls and the Campus Grid: an Overview Bruce Beckles University of Cambridge Computing Service.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Module 7: Configuring TCP/IP Addressing and Name Resolution.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
MDECA SECURITY UPDATES Update & Review for Security Changes!
Supporting Student Employability Online Damian McGivern Ron Laird June 2007.
Enforcing Concurrent Logon Policies with UserLock.
SOS EGEE ‘06 GGF Security Auditing Service: Draft Architecture Brian Tierney Dan Gunter Lawrence Berkeley National Laboratory Marty Humphrey University.
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Vantage Report 3.0 Product Sales Guide
Troubleshooting Windows Vista Security Chapter 4.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Security at NCAR David Mitchell February 20th, 2007.
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Graphing and statistics with Cacti AfNOG 11, Kigali/Rwanda.
Department of Psychology Experiment Management System Experimenter Tutorial Stony Brook University Subject Pool Office
Mr C Johnston ICT Teacher BTEC IT Unit 05 - Lesson 12 Network Security Policy.
WISER: Remote access to databases and datasets This session will help you to set up access to Oxford online resources from your home computer. The session.
Security CS Introduction to Operating Systems.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
Module 10: Windows Firewall and Caching Fundamentals.
Role Of Network IDS in Network Perimeter Defense.
1 Network Quarantine At Cornell University Steve Schuster Director, Information Security Office.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Computer Security Sample security policy Dr Alexei Vernitski.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Community Sign-On and BEN. Table of Contents  What is community sign-on?  Benefits  How it works (Shibboleth)  Shibboleth components  CSO workflow.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Security Benefits of Firewall Protection
Switchvox SMB 4.6 for your peace of mind
Architecture Review 10/11/2004
Configuring ALSMS Remote Navigation
Instructor Materials Chapter 7 Network Security
Introduction to Networking
Introduction to Networking
Multi-Factor Authentication (MFA)
OMNIXX to OPENFOX CONVERSION LESSONS LEARNED
Securing web applications Externally
Presentation transcript:

Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess

Worm slide Remind people of large scale worm attacks

State of the UMBC Network in 2007 Porous firewall - All traffic allowed in/out with very few exceptions – Most restrictions were from various worms and high risk ports Public IP addresses for all machines, everything was reachable Most machines did not have host based firewalls enabled

Campus Network Architecture

Common Network Security Problems Before Default Deny Every new attack compromised large quantities of machines Insufficient staff to chase down and triage compromised machines Massive disruptions to faculty and researchers due to attacks and crippled machines Campus business functionality was being impacted since entire departments could be infected by a new virus/worm

Jack CIO- what I needed in a solution to sell to the campus.

Needs of our Solution Maintaining all internet facing campus services without interruption or significant impact to users Developing a system that would not hinder our faculty or researchers accessing their resources from home or working with other institutions Allowing exemptions in real time so the researchers and staff did not have to wait on the IT department for changes Trying not to create a two-port model with all services forced over port 80 and 443 Avoiding so many exemptions that the policy was there in name only Residential access to gaming services were difficult to support. We also were adding a gaming track in CS.

Our Solution Communicate with the campus to explain the importance and determine what level of access was needed from the internet Create a website to allow faculty and staff to create exemptions for individual ports of a specific IP address – Very low risk to open single ports – Allows users to add or remove services as needed in real time – Empower faculty and researcher to control access into their machines and really think about security

Our Solution (Cont’d) Develop an administrative interface that can be used by campus IT admins to control large quantities of exemptions Use IP addresses as the identifier for all rules and only allow machines on subnets with static addressing to be exempted Leverage our campus identity management and WebISO systems to provide the authentication mechanism for all users All changes logged and weekly reports sent to the network administrators for review Design scripting to be scalable to large number of subnets and firewalls as needed

User Interface Easy to use interface to allow faculty or staff members to exempt specific ports for a given IP from the firewall Initial registration must be done from the IP address being exempted to ensure access to the machine being exempted Most standard ports can be added to the firewall in real-time, specialty requests must be processed by a staff member Access into the interface uses our standard campus sign on page, no additional user information or passwords are kept in this system

Demo of User Interface

IT Admin Interface Designed to allow central campus IT staff to manage all the exemptions needed for campus services Initial registration can be done from any machine by entering the IP address Standard ports are exempted in real time, specialty requests still require a staff member to process Access into the interface uses our standard campus sign on page, no additional user information or passwords are kept in this system

Demo of IT Interface

Modifying the Firewalls in Real-Time Done with Juniper SSG Netscreen firewalls Used SSH keys to avoid sending username/password information to the firewalls Script keeps list of which subnets are handled by which firewall so it only has to update a single firewall Created an IP group for each port or group of ports Each group had a firewall rule defined for its ports

Modifying the Firewall in Real-Time (cont’d) IPs can be added or removed from a group through a simple commands with almost no impact to the firewall No firewall rules were being added or removed during the addition/deletion process – The only change is an IP being added/removed from a group – Very low CPU hit on firewall since no rules being changed – Low risk even if something went wrong with the script since no rules being changed

Exemption Modifications Only the user who registered an IP can modify that IP – Group access coming in the next version Modification can be done through the site from any machine on campus or if the user is logged in through our VPN Most modifications can be done in real time IP addresses can be deactivated or reactivated as needed Provides a great deal of flexibility to the user

Website Coding The website is programmed in PHP Scripts to access the firewall are all PERL based The PERL code uses several modules including a module to simulate the Expect programming language to simplify sending commands to the firewall

Renewal Process – Audit Requirements Developed to prevent stale exemptions from existing years after they are no longer needed Yearly process that every rule is subjected to Can be done in a few clicks through the site If a user forgets to renew in time, the machine is simply deactivated, and can be reactivated through the site Automatic Scripts that determine if the registered owner of an exemption is no longer employed at the university – Scripts query each exemption for the user, then query current affiliations in LDAP to verify employment – In this case the department head is contacted to determine what should be done with the exemption

Demo of Renewal Process

Statistics of System Usage There are currently 73 users and 367 IP addresses with exemptions – In the first year we had around 55 users and 280 exemptions Currently over 20 faculty/staff outside of the central IT staff with exemptions – At launch we only had less than 10 users outside of central IT with exemptions Most exemptions are renewed but about 10% age out of the system Each year we have seen about 15% growth in the system

Lessons learned after Implementation Very hard to convey that only inbound connections were being blocked Don’t use the word Deny, it panicked people into thinking we were taking their internet access away Several researchers needed assistance determining what ports their services used and many did not come forward until the days before the go-live date Less exemptions needed than we originally thought Might have been able to cut down further on exemptions through centralization of services

Results of Implementing Default Deny Drastically reduced the rate machines were being compromised Increased use of the campus VPN services

Default Deny Implications for Residential Students Several games require multiple inbound ports or large ranges of inbound ports to function properly Several legitimate applications students wanted to work with required inbound connectivity

Residential Solution Webpage linked to our ResNet login page Allows a user to exempt their IP address on all ports for the length of their login Uses captcha software to prevent students from setting up auto-login bots Done in real-time and requires no interaction from IT staff Exemption is removed as soon as user logs off of the ResNet system

Demo of ResNet Solution

Future Plans for a Host to Host Exemption Will allow a faculty member to create an exemption that opens all ports from another host Leverage the Incommon authentication system to achieve this Allow the exemption to be triggered at a specific time or by a specific action

Federated – Goto My PC Number one reason people exempt their machine is to connect back from home. Could we have a federated approach where we grant a remote user the ability to have their current machine be granted access to a umbc internal machine.