Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

29
Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess
  • date post

    22-Dec-2015
  • Category

    Documents

  • view

    221
  • download

    0

Transcript of Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Page 1: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Implementing Default-Deny while Enabling End-to-end Performance

Damian Doyle

Jack Suess

Page 2: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Worm Threats

• 2001 – Code Red ( July 24, 2001)• 2003 – Slammer (Feb 5, 2003)• 2004 – MyDoom ( Feb 20, 2004)• 2005 – Zotob (Aug 26, 2005)• 2009 – Conflicker (Feb 13, 2009)

Page 3: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

State of the UMBC Network in 2007

• Porous firewall - All traffic allowed in/out with very few exceptions– Most restrictions were from various worms and high

risk ports

• Public IP addresses for all machines, everything was reachable

• Most machines did not have host based firewalls enabled

Page 4: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Campus Network Architecture

Page 5: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Common Network Security Problems Before Default Deny

• Every new attack compromised large quantities of machines

• Insufficient staff to chase down and triage compromised machines

• Disruptions to faculty and researchers due to attacks and crippled machines

• Campus business functionality was being impacted since entire departments could be infected by a new virus/worm

Page 6: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Gaining Campus Buy In

• Gaining faculty buy in.• CIO held many discussions with faculty.

– Agreed that security problems were impacting researchers.

– Agreed that security solutions can’t get in the way of research.

• Found common ground in providing a simple web-based solution to opt-out.

Page 7: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Needs of our Solution

• Maintaining all internet facing campus services without interruption or significant impact to users

• Developing a system that would not hinder our faculty or researchers accessing their resources from home or working with other institutions

• Allowing exemptions in real time so the researchers and staff did not have to wait on the IT department for changes

• Trying not to create a two-port model with all services forced over port 80 and 443

Page 8: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Needs of our Solution

• Web interface• Integrated with myUMBC login• Meet audit standards for firewall

exemptions.• Not expose campus to undue risk.

Page 9: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Our Solution

• Create a website using myUMBC single sign-on to allow faculty and staff to create exemptions for individual ports of a specific IP address– Very low risk to open single ports– Allows users to add or remove services as needed in

real time– Empower faculty and researcher to control access into

their machines and really think about security

Page 10: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Our Solution (Cont’d)

• Create an interface for system admins to use• Require static IP address for participation• Leverages IDMS and WEB-ISO for login• All changes logged and weekly reports sent to the

network administrators for review• Design scripting to be scalable to large number of

subnets and firewalls as needed

Page 11: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

User Interface

• Easy to use interface to allow faculty or staff members to exempt specific ports for a given IP from the firewall

• Initial registration must be done from the IP address being exempted to ensure access to the machine being exempted

• Most standard ports can be added to the firewall in real-time, specialty requests must be processed by a staff member

Page 12: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Demo of User Interface

Page 13: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

IT Admin Interface

• Designed to allow central campus IT staff to manage all the exemptions needed for campus services

• Initial registration can be done from any machine by entering the IP address

• Standard ports are exempted in real time, specialty requests still require a staff member to process

• Access into the interface uses our standard campus sign on page, no additional user information or passwords are kept in this system

Page 14: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Demo of IT Interface

Page 15: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Modifying the Firewalls in Real-Time

• Done with Juniper SSG Netscreen firewalls• Used SSH keys to avoid sending username/password

information to the firewalls• Script keeps list of which subnets are handled by

which firewall so it only has to update a single firewall

• Created an IP group for each port or group of ports• Each group had a firewall rule defined for its ports

Page 16: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Modifying the Firewall in Real-Time (cont’d)

• IPs can be added or removed from a group through a simple commands with almost no impact to the firewall

• No firewall rules were being added or removed during the addition/deletion process– The only change is an IP being added/removed from a group– Very low CPU hit on firewall since no rules being changed– Low risk even if something went wrong with the script since

no rules being changed

Page 17: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Exemption Modifications

• Only the user who registered an IP can modify that IP– Group access coming in the next version

• Modification can be done through the site from any machine on campus or if the user is logged in through our VPN

• Most modifications can be done in real time• IP addresses can be deactivated or reactivated as

needed• Provides a great deal of flexibility to the user

Page 18: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Website Coding

• The website is programmed in PHP• Scripts to access the firewall are all PERL

based• The PERL code uses several modules

including a module to simulate the Expect programming language to simplify sending commands to the firewall

Page 19: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Renewal Process – Audit Requirements

• Every 365 days the firewall rule must be renewed.• Can be done in a few clicks through the site• If a user forgets to renew in time, the machine is simply

deactivated, and can be reactivated through the site• Automatic Scripts determine if the registered owner of

an exemption is no longer employed at the university– Scripts query each exemption for the user, then query current

affiliations in LDAP to verify employment– In this case the department head is contacted to determine

what should be done with the exemption

Page 20: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Demo of Renewal Process

Page 21: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Statistics of System Usage• Of 2000 faculty/staff and 6000 machines.

– There are currently 73 users and 367 IP addresses with exemptions ( just 6% of the machines)

• Very well liked by central and departmental IT staff who now don’t have to go through networks for simple firewall requests.

• Most exemptions are renewed but about 10% age out of the system

Page 22: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Lessons learned after Implementation

• Very hard to convey that only inbound connections were being blocked

• Don’t use the word Deny, it panicked people into thinking we were taking their internet access away

• Several researchers needed assistance determining what ports their services used and many did not come forward until the days before the go-live date

• Less exemptions needed than we originally thought• Might have been able to cut down further on exemptions

through centralization of services

Page 23: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Results of Implementing Default Deny

• Drastically reduced the rate machines were being compromised

• Increased use of the campus VPN services

Page 24: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Default Deny Implications for Residential Students

• Several games require multiple inbound ports or large ranges of inbound ports to function properly

• Several legitimate applications students wanted to work with required inbound connectivity

Page 25: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Residential Solution

• Webpage linked to our ResNet login page• Allows a user to exempt their IP address on all

ports for the length of their login• Uses captcha software to prevent students from

setting up auto-login bots• Done in real-time and requires no interaction from

IT staff• Exemption is removed as soon as user logs off of

the ResNet system

Page 26: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Demo of ResNet Solution

Page 27: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Future Plans for a Host to Host Exemption

• Develop a “service” that can be connected to from off-campus by leveraging InCommon.

• Entity creates an exception based on principal name (e.g. user@domain) and access rights.Email a url to person, when clicked connect to firewall service, we request back principal name and get IP address from header.

• Use that to provide access for some short duration.

Page 28: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Benefits

• Improved security without impeding research.• Improved service responsiveness for sys admins• Improved auditability, now every exemption

tracks who requested it and why.• Lessened probability of user error in manually

updating firewall rules.

Page 29: Implementing Default-Deny while Enabling End-to-end Performance Damian Doyle Jack Suess.

Questions

• Contact Information– Damian Doyle– [email protected]