pondering and patrolling perimeter defenses
play

Pondering and Patrolling Perimeter Defenses Bill Cheswick - PowerPoint PPT Presentation

Pondering and Patrolling Perimeter Defenses Bill Cheswick ches@lumeta.com http://www.lumeta.com 16 June 2005 Pondering Perimeters: DOE 1 of 105 Brief personal history Started at Bell Labs in December 1987 Immediately took over


  1. 51 of 105 The data can go either way D F C Pondering Perimeters: DOE B E 16 June 2005 A

  2. 52 of 105 The data can go either way D F C Pondering Perimeters: DOE B E 16 June 2005 A

  3. But our test packets only go part of the way B C D A E F 16 June 2005 Pondering Perimeters: DOE 53 of 105

  4. 54 of 105 D We record the hop… F C Pondering Perimeters: DOE B E 16 June 2005 A

  5. The next probe happens to go the other way B C D A E F 16 June 2005 Pondering Perimeters: DOE 55 of 105

  6. …and we record the other hop… 56 of 105 D F C Pondering Perimeters: DOE B E 16 June 2005 A

  7. We’ve imputed a link that doesn’t exist B C D A E F 16 June 2005 Pondering Perimeters: DOE 57 of 105

  8. Intranet implications of Internet mapping • High speed technique, able to handle the largest networks • Light touch: “what are you going to do to my intranet?” • Acquire and maintain databases of Internet network assignments and usage 16 June 2005 Pondering Perimeters: DOE 58 of 105

  9. Data collection complaints • Australian parliament was the first to complain • List of whiners (25 nets) • On the Internet, these complaints are mostly a thing of the past – Internet background radiation predominates 16 June 2005 Pondering Perimeters: DOE 59 of 105

  10. Visualization goals • make a map – show interesting features – debug our database and collection methods • geography doesn’t matter • use colors to show further meaning 16 June 2005 Pondering Perimeters: DOE 60 of 105

  11. 16 June 2005 Pondering Perimeters: DOE 61 of 105

  12. Visualization of the layout algorithm Laying out the Internet graph 16 June 2005 Pondering Perimeters: DOE 62 of 105

  13. 16 June 2005 Pondering Perimeters: DOE 63 of 105

  14. 16 June 2005 Pondering Perimeters: DOE 64 of 105

  15. Colored by AS number 16 June 2005 Pondering Perimeters: DOE 65 of 105

  16. Map Coloring • distance from test host • IP address – shows communities • Geographical (by TLD) • ISPs • future – timing, firewalls, LSRR blocks 16 June 2005 Pondering Perimeters: DOE 66 of 105

  17. Colored by IP address! 16 June 2005 Pondering Perimeters: DOE 67 of 105

  18. Colored by geography 16 June 2005 Pondering Perimeters: DOE 68 of 105

  19. Colored by ISP 16 June 2005 Pondering Perimeters: DOE 69 of 105

  20. Colored by distance from scanning host 16 June 2005 Pondering Perimeters: DOE 70 of 105

  21. 16 June 2005 Pondering Perimeters: DOE 71 of 105

  22. 16 June 2005 Pondering Perimeters: DOE 72 of 105

  23. Yugoslavia An unclassified peek at a new battlefield 1999 16 June 2005 Pondering Perimeters: DOE 73 of 105

  24. 16 June 2005 Pondering Perimeters: DOE 74 of 105

  25. 75 of 105 Un film par Steve “Hollywood” Branigan... Pondering Perimeters: DOE 16 June 2005

  26. 16 June 2005 Pondering Perimeters: DOE 76 of 105

  27. 77 of 105 Pondering Perimeters: DOE fin 16 June 2005

  28. 78 of 105 Intranets: the rest of the Pondering Perimeters: DOE Internet 16 June 2005

  29. 16 June 2005 Pondering Perimeters: DOE 79 of 105

  30. 16 June 2005 Pondering Perimeters: DOE 80 of 105

  31. 16 June 2005 Pondering Perimeters: DOE 81 of 105

  32. This was Supposed To be a VPN 16 June 2005 Pondering Perimeters: DOE 82 of 105

  33. 16 June 2005 Pondering Perimeters: DOE 83 of 105

  34. 16 June 2005 Pondering Perimeters: DOE 84 of 105

  35. Detecting perimeter leaks: not all spoofing is evil Lumeta’s Special Sauce 2000 16 June 2005 Pondering Perimeters: DOE 85 of 105

  36. Types of leaks • Routing leaks – Internal routes are announced externally, and the packets are allowed to flow betwixt • Host leaks – Simultaneously connected inside and out, probably without firewall-functionality – Not necessarily a dual-homed host • “Please don’t call them leaks” – They aren’t always a Bad Thing 16 June 2005 Pondering Perimeters: DOE 86 of 105

  37. Routing leaks • Easily seen on maps • Shows up in our reports • Generally easily fixed 16 June 2005 Pondering Perimeters: DOE 87 of 105

  38. Host leak detection • Developed to find hosts that have access to both intranet and Internet • Or across any privilege boundary • Leaking hosts do not route between the networks • Technology didn’t exist to find these 16 June 2005 Pondering Perimeters: DOE 88 of 105

  39. Possible host leaks • Miss-configured telecommuters connecting remotely • VPNs that are broken • DMZ hosts with too much access • Business partner networks • Internet connections by rogue managers • Modem links to ISPs 16 June 2005 Pondering Perimeters: DOE 89 of 105

  40. Leak Detection Prerequisites • List of potential leakers: obtained by census • Access to intranet • Simultaneous availability of a “mitt” 16 June 2005 Pondering Perimeters: DOE 90 of 105

  41. Leak Detection Layout • Mapping host with mitt Mapping host address A is D A connected to the intranet • Mitt with address D Internet intranet has Internet access • Mapping host and mitt are currently the same host, with C B two interfaces Test host 16 June 2005 Pondering Perimeters: DOE 91 of 105

  42. Leak Detection mitt Mapping host • Test host has D A known address B on the intranet • It was found via Internet intranet census • We are testing for unauthorized access to the C B Internet, possibly Test host through a different 16 June 2005 Pondering Perimeters: DOE 92 of 105 address, C

  43. Leak Detection mitt Mapping host • A sends packet to D A B , with spoofed return address of D • If B can, it will reply Internet intranet to D with a response, possibly through a different interface C B Test host 16 June 2005 Pondering Perimeters: DOE 93 of 105

  44. Leak Detection mitt Mapping host • Packet must be crafted D A so the response won’t be permitted through the firewall • A variety of packet Internet intranet types and responses are used • Either inside or outside address may be C B discovered Test host • Packet is labeled so we know where it came 16 June 2005 Pondering Perimeters: DOE 94 of 105 from

  45. Inbound Leak Detection mitt Mapping host • This direction is D A usually more important • It all depends on Internet intranet the site policy… • …so many leaks might be just fine. C B Test host 16 June 2005 Pondering Perimeters: DOE 95 of 105

  46. Inbound Leak Detection mitt Mapping host D A Internet intranet C B Test host 16 June 2005 Pondering Perimeters: DOE 96 of 105

  47. Leak results • Found home web businesses • At least two clients have tapped leaks – One made front page news • From the military: “the republic is a little safer” 16 June 2005 Pondering Perimeters: DOE 97 of 105

  48. Case studies: corp. networks Some intranet statistics Min Max Intranet sizes (devices) 7,900 365,000 Corporate address space 81,000 745,000,000 % devices in unknown address space 0.01% 20.86% % routers responding to "public" 0.14% 75.50% % routers responding to other 0.00% 52.00% Outbound host leaks on network 0 176,000 % devices with outbound ICMP leaks 0% 79% % devices with outbound UDP leaks 0% 82% Inbound UDP host leaks 0 5,800 % devices with inbound ICMP leaks 0% 11% % devices with inbound UDP leaks 0% 12% % hosts running Windows 36% 84% 16 June 2005 Pondering Perimeters: DOE 98 of 105

  49. We developed lot of stuff • Leak detection (that’s the special sauce) • Lots of reports: the hardest part is converting data to information • Route discovery: TTL probes plus SNMP router queries • Host enumeration and identification: ping and xprobe-style host identification • Server discovery: SYN probes of popular TCP ports • Wireless base station discovery: xprobe, SNMP, HTTP • And more…ask the sales people • The “zeroth step in network intelligence” – me 16 June 2005 Pondering Perimeters: DOE 99 of 105

  50. 100 of 105 IP Sonar Pondering Perimeters: DOE 2003 16 June 2005

Recommend


More recommend