Download presentation
Presentation is loading. Please wait.
Published byIlene Bond Modified over 9 years ago
1
TERENA Networking Conference, 2003©The JNT Association, 2003 Designing Manageable Protocols Andrew Cormack Chief Security Adviser UKERNA
2
TERENA Networking Conference, 2003©The JNT Association, 2003 Why Manage Networks? Networks have production uses Teaching, assessment, administration, video conferencing, … Time-critical, bandwidth-criticial, reliability-critical Bandwidth is finite Some things are more important than others Different priorities in different organisations Important things should have priority Helps if priorities are written down!
3
TERENA Networking Conference, 2003©The JNT Association, 2003 Management Tools? Manager told – “Service X is important” Manager sees – IP packets Packets have Source & destination address Source & destination port Initial TCP packet has a direction How to map packets to services? Need help from protocol design
4
TERENA Networking Conference, 2003©The JNT Association, 2003 Management Requirements Identifiable Services give rise to recognisable network flows Controllable Services can be permitted on some network segments Services can be denied from some network segments Non-hazardous My use of a service must not be a hazard to others My use of a service should not be a hazard to me
5
TERENA Networking Conference, 2003©The JNT Association, 2003 Management Assumptions Least-worst assumptions Port number identifies service E.g. port 80 = web IP address(es) identify location on network Source is client; destination is server [TCP only] Dangerous assumptions IP address identifies person Port <1024 means trusted
6
TERENA Networking Conference, 2003©The JNT Association, 2003 Case Studies – HTTP www.site ? 80? I [ C [ H ? I [ C [ H [
7
TERENA Networking Conference, 2003©The JNT Association, 2003 Case Studies – FTP ftp.site ? 21??20 I [ C [ H ? I ? C [ H x
8
TERENA Networking Conference, 2003©The JNT Association, 2003 Case Studies – passive FTP ftp.site ? 21??? I x C x H x I x C x H [
9
TERENA Networking Conference, 2003©The JNT Association, 2003 6697-6701 + more Variable UDP ports Case Studies – P2P (Napster) 64.124.41/24 ?? 4444-8888 I x C x H x
10
TERENA Networking Conference, 2003©The JNT Association, 2003 Future developments Dynamic address allocation DHCP or NAT Must align address allocation with managed groups IP version 6 Little change to manageability Port numbers may be buried in a chain of headers Encryption may make application layer invisible Mobility is extreme dynamic address allocation
11
TERENA Networking Conference, 2003©The JNT Association, 2003 Conclusion: Protocols need Identifiable traffic flows Well defined, appropriate use of reserved ports Clarity over relationship between hosts Direction of initiation must be apparent Support for layered protection Expect to meet firewalls; work with proxies Application proxies may be only option
12
TERENA Networking Conference, 2003©The JNT Association, 2003 Give managers options YES/NO is not enough
13
TERENA Networking Conference, 2003©The JNT Association, 2003
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.