“ Vulnerabilities in SNMP Implementations ” CSCI 5931- Web Security Instructor: Dr. Andrew Yang Presented By: Harini Varatharajan.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
System Security Scanning and Discovery Chapter 14.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
Management Architecture and Standards II IACT 418 IACT 918 Corporate Network Planning Gene Awyzio Spring 2001.
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
Network Management Principles and Protocols
NS-H /11041 SNMP. NS-H /11042 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
1 SNMP Simple Network Management Protocol. 2 SNMP Overview Define mechanism for remote management of network devices (routers, bridges, etc.) Fundamental.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Firewall Vulnerabilities Presented by Vincent J. Ohm.
EE579T/10 #1 Spring 2005 © , Richard A. Stanley EE579T Network Security 10: An Overview of SNMP Prof. Richard A. Stanley.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
Understanding SNMP Vulnerabilities By Latha Sudharshan Vasudha Yaramala.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
COMP4690, by Dr Xiaowen Chu, HKBU
EE579T/9 #1 Spring 2003 © , Richard A. Stanley EE579T Network Security 9: An Overview of SNMP Prof. Richard A. Stanley.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
1 © 2013 Cisco Systems, Inc. All rights reserved. Cisco confidential.Cisco Networking Academy, U.S./Canada Equipping Today’s Instructors for Tomorrow’s.
Introduction to SNMP AfNOG 11, Kigali/Rwanda.
SNMP (Simple Network Management Protocol) Jon Sevy Geometric and Intelligent Computing Laboratory Department of Mathematics and Computer Science Drexel.
1 Network Management Computer Networks. 2 OSI Network Management Model Performance Management e.g. utilization Fault Management e.g. SNMP traps Configuration.
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 23 Simple Network Management Protocol (SNMP)
SNMP ( Simple Network Management Protocol ) based Network Management.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
SNMP: Simple Network Management Protocol
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
SNMP Simple Network Management Protocol Team: Matrix CMPE-208 Fall 2006.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
1 © 1999 BMC SOFTWARE, INC. 2/10/00 SNMP Simple Network Management Protocol.
Communication and Functional Models
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
Software Security Testing Vinay Srinivasan cell:
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
CCNA 4 Module 6 Introduction to network Administration.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Network Management Security
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
POSTECH DP&NM Lab 1 Simple Network Management Protocol (SNMP) Mi-Jung Choi Dept. of Computer Science KNU
Simple Network Management Protocol (SNMP) SNMP v1 (RFC 1157) UDP Port 161 Operation supported by SNMP – Get: retrieves a scalar object value – Set: updates.
CIS 450 – Network Security Chapter 14 – Specific Exploits for UNIX.
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
CITA 440 Week 6 SNMPv1. Internet SNMP Management Internet Engineering Task Force (IETF) –1990SNMPv1 –1996SNMPv2 –1998SNMPv3 Internet documents: –Request.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Network Management Security in distributed and remote network management protocols.
Jaringan Telekomunikasi, Sukiswo ST, MT Sukiswo
Computer and Information Security
Lec 5: SNMP Network Management
Network Management Computer Networks.
Introduction to Internet Network Management
Lec 5: SNMP Network Management
SNMP (Simple Network Management Protocol) based Network Management
Network Management Security
Presentation transcript:

“ Vulnerabilities in SNMP Implementations ” CSCI Web Security Instructor: Dr. Andrew Yang Presented By: Harini Varatharajan

Introduction to SNMP  What is SNMP ?  SNMP Components  Agents ( Managed device)  Managers ( Management Entity)  Network Management System ( NMS)  SNMP Management Information Base

SNMP Architecture

SNMP Communications  Protocol Data Unit (PDU) message type  GetRequest  GetNextRequest  GetResponse  SetRequest  Traps  UDP Port 161 for Gets and Sets  UDP Port 162 for Traps

Why the Concern about vulnerability ?  CERT/CC SNMP Advisory –Issued Feb 12 th, 2002 –Identified multiple vulnerabilities  OUSPG PROTOS Project –Tested HTTP, WAP/WSP, LDAP and SNMP –Additional protocol testing will follow  SNMP is huge target –Nearly every device from every vendor could be affected –Many exploits are theoretically possible –A few exploits work now –More exploits will be developed

SNMP Problems  Community String access modes  READ-ONLY  READ-WRITE  Passed in clear text  Limited error handling  Additional exceptions must be handled by vendor’s implementation –Violations to Basic Encoding Rules of ASN.1 –Invalid variable types

Where the Vulnerabilities are?  Trap handling  Request handling  What makes things worse ?  Insecure settings  Spoofing

Impact  Denial of service attacks  Format String Vulnerability  Unstable behaviors  Unauthorized privileged access  Buffer overflows - Crash SNMP agent - Crash SNMP agent - Reboot device - Reboot device - Overwrite valid SNMP variables - Overwrite valid SNMP variables - Overwrite other applications or OS - Overwrite other applications or OS - Allow unauthorized access - Allow unauthorized access

Solutions  SNMP scanners  SNScan Windows based utility by Foundstone SNScan  CERT Advisory Implications  Apply patch from vendor  Disable SNMP service  Ingress filtering  Egress filtering  Filter SNMP traffic from non-authorized internal hosts  Change default community strings  Update signatures from vendors  Segregate SNMP traffic onto a separate management network network

Solutions  Other Solutions  Protect Network perimeter  Protect Management systems  Manage Community strings  Eliminate or protect other access  Limit Network access  Watch for uncharted access and services  Play it safe with vendors, partners, customers and employees

Will SNMPv3 Help?  Advantages –Improved authentication and access control –Encryption of SNMP packets –Remote management of SNMP agents  Disadvantages –Additional overhead –RFCs have yet to be adopted as a standard –Few vendors have working implementations in their hardware/ software –Existing implementations may still be vulnerable to buffer overflow exploits

The Bottom Line  SNMP exploits are real  Integration of network management and security is imperative  Time to rethink overall network management strategy including architecture, applications and future direction.

References  “CERT Advisory CA : Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP),” 12 Feb. 2002, (current 11 March 2002). CERT Advisory CA CERT Advisory CA  “PROTOS: Security Testing of Protocol Implementations,” 19 July 2001 (current 11 March 2002). PROTOS: Security Testing of Protocol ImplementationsPROTOS: Security Testing of Protocol Implementations  “PROTOS Test-Suite: c06-snmpv1,” 12 Feb (current 11 March 2002). PROTOS Test-Suite: c06-snmpv1PROTOS Test-Suite: c06-snmpv1  “M-042: Multiple Vulnerabilities in Multiple Implementations of SNMP,”12 Feb (current 11 M-042: Multiple Vulnerabilities in Multiple Implementations of SNMPM-042: Multiple Vulnerabilities in Multiple Implementations of SNMP

Questions ?