Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Network.

Slides:



Advertisements
Similar presentations
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 11 Firewalls.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
Lesson 1: Configuring Network Load Balancing
Lesson 19: Configuring Windows Firewall
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Firewall Slides by John Rouda
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
FIREWALL Mạng máy tính nâng cao-V1.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
Common Devices Used In Computer Networks
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
June, 2006 Stanford 2006 Ethane. June, 2006 Stanford 2006 Security and You  What does security mean to you?  Data on personal PC?  Data on family PC?
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security fundamentals Topic 10 Securing the network perimeter.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Module 10: Windows Firewall and Caching Fundamentals.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security fundamentals
Module 3: Enabling Access to Internet Resources
Module Overview Installing and Configuring a Network Policy Server
Computer Data Security & Privacy
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
POOJA Programmer, CSE Department
دیواره ی آتش.
Introduction to Network Security
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Jennifer Rexford Fall 2010 (TTh 1:30-2:50 in COS 302) COS 561: Advanced Computer Networks Network Access Control

What is Access Control? System that enables an authority to control access –By users (subjects) –To system resources (objects) –Based on a security policy (access control matrix) Examples –Lock on a car door or file cabinet –Guest list for entrance to a night club –PIN on an ATM cash machine –Password for logging in to a computer account –Access control list applied at a firewall 2

Access Control in Computer Security Authentication –Confirming identity of the subject –Based on what you know (e.g., PIN, password), what you have (e.g., smart card), what you are (e.g., iris, fingerprint, voice), or where you are (e.g., inside firewall) Authorization –Determining what the subject can do –E.g., read/write/execute, or accept/deny Accountability –Associating a subject with its actions –To detect and/or recreate security violations –E.g., audit trails of failed login attempts or blocked traffic 3

Access Control Matrix Representation of access control policy –Columns: objects (e.g., file, directory, printer, link) –Rows: subjects (e.g., user, process, threads) –Entry: set of access operations A request (o, s, a) is granted if access operation a belongs to the entry for subject s and object o 4 trasha. outallfiles. txt jason {r,w}{r,w}{r,w,x}{r,w,x}{r,w}{r,w} mick {r,x}{r,x}{r}{r} Objects Subjects

Two Implementation Approaches Access-control list –Focuses on the object (i.e., a column in the matrix) –Analogous to a “guest list” of the invited guests Capability list –Focuses on the subject (i.e., a row in the matrix) –Analogous to issuing keys for unlocking a file cabinet 5 trasha. outallfiles. txt jason {r,w}{r,w}{r,w,x}{r,w,x}{r,w}{r,w} mick {r,x}{r,x}{r}{r} Objects Subjects

Access Control Lists: Firewalls 6

Stateless Packet Filters Filter based on information contained in the packet –E.g., IP addresses, protocol, port numbers, … –Well-known TCP/UDP ports for applications Access Control List: rules –Process rules in order till encountering a match –Analogous to the if-elseif-else programming construct 7 Src= , Dest= Deny Dest=1.2.3.*Allow Dest= , Dport!=53Deny Src= , Dport=100Allow Dport=100Deny

Stateful Filters Maintains state for each ongoing connection –IP address, port numbers, sequence numbers, … –And times out after a period of inactivity Avoids repeating lengthy rule processing –CPU-intensive check only for the first packet –Cache of the result for the remaining packets Allows policies based on state of the connection –E.g., only allow incoming packets for established connections (to prevent unsolicited connections) 8

Application-Level Filters Proxies traffic before forwarding to client or server –For particular applications –E.g., Web server, database server, … Understands the applications –Parses message contents –E.g., URL, domain name, SQL query, Google search, … Enabling richer access-control policies –Preventing SQL injection attacks –Blocking access to certain sites or URLs –Blocking searches on particular search terms –Blocking BitTorrent on non-well-known ports 9

Challenges of Firewall Placement Consistency –Ensuring the firewall sees all the packets of a flow –… even if routing changes occur –Hard if the firewall lies in the middle of the network Efficiency –Avoiding wasted bandwidth before traffic reaches firewall –Reduces load on the end-host computers Scalability –Handling the total volume of traffic –Maintaining connection and application state 10

Where Do Firewalls Run? On the end host –Can include information from application system calls –Scalability and customization with a firewall per host Just in front of the host(s) –Share the firewall between a group of related hosts –Reduces traffic and CPU load on the end hosts At the gateway to the Internet –Share the firewall across an entire organization –Avoid wasting resources inside the organization On the router itself –Avoid the cost of buying and supporting another box 11

Intra-Firewall Configuration Errors Shadowing (error) –All packets matching a rule would match an earlier rule –E.g.: rule 4 is shadowed by rule 2 Generalization (warning) –A more-specific earlier rule takes a different action –E.g.: rule 7 is a generalization of rule 4 Correlation (warning) –Partially overlapping rules with different actions –E.g.: rules 2 and deny tcp /25 any 2. accept udp any /24 3. deny tcp /25 any 4. deny udp / /24 5. accept tcp /24 any 6. deny udp / /16 7. accept udp /24 any

Intra-Firewall Inefficiencies Verbosity –A set of rules can be summarized with fewer rules –E.g., rules 5-8 with “deny udp /24 any” Redundancy –Removing a rule does not change any actions –E.g., rule 3 is redundant with rule 2 –E.g., rules 5, 6, 7, and 8 are redundant with rule accept tcp / /32 2. accept tcp /8 any 3. accept tcp /24 any 4. deny tcp any any 5. deny udp /26 any 6. deny udp /26 any 7. deny udp /26 any 8. deny udp /26 any 9. deny udp any Reducing # of rules improves efficiency!

Inter-Firewall Configuration Errors Enterprises often have multiple firewalls –E.g., on most/all of the end hosts –E.g., on many network interfaces –E.g., on multiple firewalls inside the network Together, they should realize a single policy –One high-level policy, with a distributed realization Challenges –Consistent configuration of the many firewalls –Ensuring the system works even when routing changes 14

Dynamic Access Control Policies 15

Beyond Today’s Low-Level Policies Expressed in terms of network identifiers –E.g., MAC and IP addresses, port numbers, … –Should express policies based on names –Example: Ethane Doesn’t capture changes in user’s status –E.g., machines becomes infected… –These changes should affect access control –Example: Resonance Puts policy in the wrong place (i.e., the network) –End-host is a better place to enforce policy –Network should only stop denial-of-service attacks –Examples: cloud ACLs, Microsoft’s Active Directory 16

Host authenticate hi, I’m host B, my password is … Can I have an IP? Send tcp SYN packet to host A port 2525 User Authentication “ hi, I’m martin, my password is” Domain Controller Host A Host Authentication “ hi, I’m host A, my password is … can I have an IP address?” Host B User authentication hi, I’m Nick, my password is ? Permission check Route computation Secure Binding State ICQ → 2525/tcp IP switch3 port 4 Host A IP switch 1 port 2 HostB Network Policy “Nick can access Martin using ICQ” Host A → IP → Martin → Host B → IP → Nick → Ethane Architecture

Resonance: Dynamic Access Control Associate each host with a security class (e.g., guest, student) and state (e.g., see below) Control packet forwarding based on state machine 18 Registration Authenticated Operation Quarantined Successful Authentication Vulnerability detected Clean after update Failed Authentication Infection removed or manually fixed

The Network is the Wrong Place? Network-based access control does not scale –Especially as link speeds continue to grow Volatility of network identifiers –End-host identifiers change as hosts move –Forcing the network to track a lot of churn Poor visibility into application information –Forcing a reliance on TCP/UDP port numbers –Requiring (expensive) deep-packet inspection Limited sphere of influence –Remote users are the norm, not an exception –Often forced through special firewalls, VPNs, … 19

Cloud Access Control 20 Enforce access control

Microsoft’s Active Directory Directory service –Codify the enterprise’s policies –Configure local policies on the end host Trusted end-point agents –Perform authentication of the user and the machine –Install policies at the behest of the directory –E.g., in the operating system of the end host Modified applications –Interact with the trusted agent –Enforce application-specific policies –Single sign-on 21

Alternate Approach: Capabilities Who should be in charge? –Destination knows which traffic is legitimate –Network can shed load before it is excessive Division of labor –Network filtering based on destination control –Explicit authorization that the network can check –Packets carrying “capabilities” Solution –Tokens: short-lived capabilities carried on packets –Servers: grant tokens based on policies –Routers: filter packets lacking the right token 22

Discussion Where should access control be performed? –Host OS, hypervisor switch, network elements, … What should be the “subject” of access control? –The location of the computer –The computer –The person using the computer Access control vs. capabilities? What about interdomain access control? –Use capabilities? –Coordinate ACLs across domains? 23