mpls security considerations · © 2003 cisco systems, inc. all rights reserved. 5 mpls japan 2004...

75
1 © 2003 Cisco Systems, Inc. All rights reserved. MPLS JAPAN 2004 © 2001, Cisco Systems, Inc. All rights reserved. MPLS Security Considerations Monique J. Morrow, Cisco Systems [email protected] November 1 2004

Upload: others

Post on 13-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

1© 2003 Cisco Systems, Inc. All rights reserved.

MPLS JAPAN 2004

© 2001, Cisco Systems, Inc. All rights reserved.

MPLS Security Considerations

Monique J. Morrow, Cisco [email protected] 1 2004

Page 2: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

222© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 2

Acknowledgments

• Michael Behringer, Cisco Systems

Page 3: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

333© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 3

Why is MPLS Security Important?

• Customer buys “Internet Service”:Packets from SP are not trusted

Perception: Need for firewalls, etc.

• Customer buys a “VPN Service”:Packets from SP are trusted

Perception: No further security required

SP Must Ensure Secure MPLS Operations

Page 4: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

444© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 4

Security Relies on Three Pillars

Security

Arc

hite

ctur

e/A

lgor

ithm

Impl

emen

tatio

n

Ope

ratio

nBreak One, and All Security Is Gone!

Page 5: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

555© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 5

True, but Same on ATM/FR

PEs Can Be Secured, as

Internet Routers

Engineering/QoS

Basic 2547 Security: Today’s Arguments

• Can be misconfigured (operation)

• Routers can have bugs (implementation)

• PEs can be accessed from Internet, thus intrinsicly insecure

• Floods over Internet can impact VPN traffic

Page 6: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

666© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 6

1. The MPLS Architecture is secure (can be operated securely)

2. Implementation/operation issues may exist, like in any other technology

Correct Security Analysis

• Security has to be analyzed on three levels:Architecture/algorithmImplementationOperation

• Applied to MPLS/VPN:

Page 7: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

777© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 7

Still “Open”: RoutingProtocol

Only Attack Vector: Transit

Traffic

Now Only Insider Attacks

Possible

Avoid Insider Attacks

Protecting an MPLS/VPN Core—Overview

1. Don’t let packets into (!) the coreNo way to attack core, except through routing, thus:

2. Secure the routing protocolNeighbor authentication, maximum routes, dampening, …

3. Design for transit trafficQoS to give VPN priority over InternetChoose correct router for bandwidthSeparate PEs where necessary

4. Operate Securely

Page 8: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

888© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 8

Agenda

• Analysis of MPLS/VPN Security• Security Recommendations• Secure MPLS VPN Design

Internet Access

• Secure Operations• Attacking an MPLS Network• IPsec and MPLS• Summary

Page 9: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

999© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 9

General VPN Security Requirements

• Address Space and Routing Separation• Hiding of the MPLS Core Structure• Resistance to Attacks• Impossibility of VPN Spoofing

Working assumption: The core (PE+P) is secure

Page 10: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

101010© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 10

Visible Address Space

Hiding of the MPLS Core Structure

• VRF contains MPLS IPv4 addresses• Only peering Interface (on PE) exposed (-> CE)!

-> ACL or unnumbered

PEMPLS core

IP(PE; l0) P

CE2IP(CE2) IP(PE; fa1) VRF CE2

CE1IP(CE1) IP(PE; fa0) VRF CE1

P

P P

Page 11: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

111111© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 11

Resistance to Attacks:Where and How?

• Where can you attack?Address and Routing Separation, thus:Only Attack point: peering PE

• How?- Intrusions

(telnet, SNMP, …, routing protocol)- DoS

Secure with ACLs

Secure with MD5

See ISP Essentials

Page 12: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

121212© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 12

Label Spoofing

• PE router expects IP packet from CE• Labelled packets will be dropped• Thus no spoofing possible

Page 13: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

131313© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 13

Comparison with ATM / FR

ATM/FR MPLSAddress space separation yes yes Routing separation yes yes Resistance to attacks yes yes Resistance to Label Spoofing

yes yes

Direct CE-CE Authentication (layer 3)

yes with IPsec

Page 14: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

141414© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 14

Agenda

• Analysis of MPLS/VPN Security• Security Recommendations• Secure MPLS VPN Design

Internet Access

• Secure Operations• Attacking an MPLS Network• IPsec and MPLS• Summary

Page 15: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

151515© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 15

Security Recommendations for ISPs

• Secure devices (PE, P): They are trusted!• Core (PE+P): Secure with ACLs on all interfaces

Ideal: deny ip any <core-networks>

• Static PE-CE routing where possible• If routing: Use authentication (MD5)• Separation of CE-PE links where possible

(Internet / VPN)• LDP authentication (MD5)• VRF: Define maximum number of routes• Note: Overall security depends on weakest link!

Page 16: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

161616© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 16

In order of security preference: 1. Static: If no dynamic routing required

(no security implications)2. BGP: For redundancy and dynamic updates

(many security features)3. IGPs: If BGP not supported

(limited security features)

PE-CE Routing Security

Page 17: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

171717© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 17

ACL and secure routing

Securing the MPLS CoreMPLS core

Internet

VPNVPN PE

CE

CE

CE

CE

CE CE

PE

PEPE

PE

P

P

P

VPN

VPN

VPN

BGP Route Reflector

BGP peering with MD5 authentic.

LDP with MD5

Page 18: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

181818© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 18

Address Planes: True Separation!

core address space0.0.0.0 – 255.255.255.255

VPN2 address space0.0.0.0 – 255.255.255.255

VPN1 address space0.0.0.0 – 255.255.255.255

CE

PE

CE

CE

CE

mbehring

PEP

PE-CE interfaces

belong to VPN.Only attack

point!!control plane

several data planes

Page 19: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

191919© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 19

Securing the Core: Infrastructure ACLs

• On PE: “deny ip any <PE VRF address space>”Exception: Routing protocol from host to host

• Idea: No traffic to PE/P you can’t attack• Prevents intrusions 100%• DoS: Very hard, but traffic over router theoretically

enables DoS.

CE PEVPN

Easy with MPLS!

In MPLS: VRF belongs to

customer VPN!

Page 20: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

202020© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 20

Securing the Core: Infrastructure ACLs

• Example: deny ip any 1.1.1.0 0.0.0.255permit ip any any

• Caution: This also blocks packets to the CE’s!Alternatives: List all PE i/f in ACL, or use secondary i/f on CE

CE PEVPN

CE PEVPN

PEVPN

PEVPN

CE

CE

1.1.1.0/30

1.1.1.4/30

1.1.1.8/30

1.1.1.12/30.1

.1

.1

.1.2

.2

.2

.2

This is VPN address space, not core!

Page 21: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

212121© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 21

Best Practice Security Overview

• Secure devices (PE, P): They are trusted• PEs: Secure with ACLs on all interfaces• Static PE-CE routing where possible• If routing: Use authentication (MD5) • Maximum number of routes per peer (only BGP)• Separation of CE-PE links where possible

(Internet/VPN)• LDP authentication (MD5)• VRF: Define maximum number of routesNote: Overall security depends on weakest link

Page 22: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

222222© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 22

Agenda

• Analysis of MPLS/VPN Security• Security Recommendations• Secure MPLS VPN Design

Internet Access

• Secure Operations• Attacking an MPLS Network• IPsec and MPLS• Summary

Page 23: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

232323© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 23

MPLS Internet Architectures: Principles

• Core supports VPNs and Internet• VPNs remain separated• Internet as an option for a VPN• Essential: Firewalling

Page 24: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

242424© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 24

MPLS VPNs Are Quite Secure

• Perfect separation of VPNsNo intrusions possible

• Perfect separation of the core from VPNsAgain, no intrusions possible

BUT THERE IS ONE REMAINING ISSUE…

Page 25: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

252525© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 25

Customer VPN

The Key Issue: DoS through a Shared PE Might Affect VPN Customer

PEMPLS Core

PVPN Customer

P

P

PInternet Customer

• PE has shared CPU / memory / bandwidth:Traffic could affect VPN customer

(However, risk probably acceptable)

DoS AttackInternet

VRF

VRF CE1

P

Page 26: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

262626© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 26

Today’s Best Practice:MPLS VPN Security Recommendation:

• PE routers should contain only VRFs of the same security level. Example:

Level 0: InternetLevel 1: VPN customers(Level 2: Mission critical infrastructure)

Note: This is negotiable: Shared Internet/VPN PE may be acceptable if price and conditions are right.

PE1

CE2

CE1

PE2

To Internet

To VPN

VRF Internet

VRF VPN

cust

omer

netw

ork

Page 27: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

272727© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 27

Separate VPN and Internet Access

• Separation: +++• DoS resistance: +++ • Cost: $$$ (Two lines and two PEs: Expensive!)

PE1

MPLS core

P

CE2

CE1

PE2

Customer LAN

Firewall / NAT

To Internet

To VPN

VRF Internet

VRF VPN

IDS

Page 28: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

282828© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 28

Separate Access Lines + CEs, one PE

PE1

MPLS core

P

CE2

CE1

Customer LAN

Firewall / NAT

To Internet

To VPN

VRF Internet

VRF VPN

• Separation: +++• DoS resistance: ++ (DoS might impact VPN on PE)

• Cost: $$ (Two lines, but only one PE)

IDS

Page 29: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

292929© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 29

Using a Single Access Line

Requirements to share a line:• PE requires separate sub-interfaces• CE requires separate sub-interfaces• CE side requires separate routing

Page 30: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

303030© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 30

Shared Access Line, Frame Relay

PE1

MPLS core

P

VPN CE

Internet CE

Customer LAN

Firewall / NAT

FR logical links

VRF Internet

VRF VPN

• Separation: +++• DoS resistance: + (DoS might affect VPN on PE, line, CE)

• Cost: $

IDS

FR switching

Page 31: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

313131© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 31

mbehring

PE1

MPLS core

VPN CE

InternetCE

PE2

Hub Site

FirewallNAT

VRF Internet

Hub-and-Spoke VPN with Internet Access

Internet

Spoke 1 Spoke 2 Spoke 3

VPN VPN

To VPN

VPN

VRF VPN

PEs

CEs

To Internet -->

IDS

Page 32: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

323232© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 32

Alternative Topologies

• Full VPN mesh, one Internet Access• Internet access at several sites

-> Several firewalls needed-> More complex

• Internet Access from all sites-> Complex, one firewall per site

Page 33: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

333333© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 33

From RFC2547bis: Data Plane Protection

• Inter-AS should only be provisioned over secure, private peerings

• Specifically NOT: Internet Exchange Points (anyone could send labelled packets!! No filtering possible!!)

1. a backbone router does not accept labeled packets over a particular data link, unless it is known that that data link attaches only to trusted systems, or unless it is known that such packets will leave the backbone before the IP header or any labels lower in the stack will be inspected, and …

Page 34: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

343434© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 34

From RFC2547bis: Control Plane Protection

2. labeled VPN-IPv4 routes are not accepted from untrusted or unreliable routing peers,

• Accept routes with labels only from trusted peers

• Plus usual BGP filtering (see ISP Essentials*)

Page 35: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

353535© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 35

mbehring

Inter-AS: Case 10.a)VRF-VRF back-to-back

• Control plane: No signalling, no labels• Data plane: IPv4 only, no labels accepted• Security: as in 2547• Customer must trust both SPs

Cust. Cust.AS 1 AS 2CE CE

PE ASBR PEASBR

IP dataLSP LSP

Page 36: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

363636© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 36

Security of Inter-AS 10.a)

• Static mappingSP1 does not “see” SP2’s networkAnd does not run routing with SP2, except within the VPNs.

Quite secure

• Potential issues: SP 1 can connect VPN connection wrongly(like in ATM/FR)

Page 37: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

373737© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 37

mbehring

Inter-AS: Case 10.b)ASBR exchange labelled VPNv4 routes

• Control plane: MP-BGP, labels• Data plane: Packets with one label• AS1 can insert traffic into any shared VPN of AS2 • Customer must trust both SPs

Cust. Cust.AS 1 AS 2CE CE

PE ASBR PEASBR

VPN label IP data

MP-BGP+labels

LSP LSP

Page 38: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

383838© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 38

Security of Inter-AS 10.b)

• ASBR1 does signalling with ASBR2MP-BGP: has to be secured, dampening etcOtherwise no visibility of the other AS (ASBR1 – ASBR2 is the only interface between the SPs.)

• Potential Issues:SP1 can bring wrong CEs into any shared VPNSP1 can send packets into any shared VPN (not into VPNsthat are not shared, since label is checked);

SP can make any shared VPN insecure

Page 39: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

393939© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 39

mbehring

Inter-AS: Case 10.c)ASBRs exchange PE loopbacks

• Control plane: ASBR: just PE loopback + labels; PE/RR: VPNv4 routes + labels

• Data plane: PE label + VPN label• AS1 can insert traffic into VPNs in AS2• Customer must trust both SPs

Cust. Cust.AS 1 AS 2CE CE

PE ASBR PEASBR

LSP

PE loopb+labels

VPN IP dataPE label

VPNv4 routes + labels

Page 40: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

404040© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 40

Security of Inter-AS 10.c)

• ASBR-ASBR signalling (BGP)RR-RR signalling (MP-BGP)

Much more “open” than 10.a) and 10.b)LSPs between PEs, BGP between RR, ASBR

• Potential Issues:SP1 can bring a CE into any VPN on “shared” PEsSP1 can intrude into any VPN on “shared” PEs

• Very open architectureprobably only applicable for ASes controlled by the same SP.

Page 41: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

414141© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 41

Inter-AS Summary and Recommendation

• Three different models for Inter-ASDifferent security propertiesMost secure: Static VRF connections (10.a), but least scalable

• Basically the SPs have to trust each otherHard / impossible to secure against other SP in this model

• Okay if all ASes in control of one SP• Current Recommendation: Use 10.a)

Page 42: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

424242© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 42

Inter-AS Recommendation

• Start with 10.a) (static VPN connections)Not many Inter-AS customers yet anyway Easy start

• Maybe at some point (when many Inter-AS customers), move to 10.b) (ease of provisioning)

• 10.c) felt by most SPs as too open. Current recommendation: Only when both ASes under one common control

Page 43: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

434343© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 43

Carrier’s Carrier

• Same principles as in normal MPLS• Customer trusts carrier who trusts carrier

Carrier’sCarrierCust. Cust.Carrier Carrier

CE CEPE

PE

PE

PEPE PE

IP

label

label

data

IP data

label IP data

label IP data

IP data

Page 44: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

444444© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 44

Carrier’s Carrier: The Interface

• Control Plane:PE1 assigns label to PE2

• Data Plane: PE1 only accepts packets with this label on this i/f

PE1 controls data planeNo label spoofing possible

Carrier’sCarrierCarrier

PE2 PE1

Page 45: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

454545© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 45

Carrier’s Carrier: Summary

• Can be secured wellCarrier has VPN on Carrier’s Carrier MPLS cloudCarrier cannot intrude into other VPNs.Carrier can mess up his own VPN (VPNs he offers to his customers)

• End customer must trust both SPs.

Page 46: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

464646© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 46

Agenda

• Analysis of MPLS/VPN Security• Security Recommendations• Secure MPLS VPN Design

Internet Access

• Secure Operations• Attacking an MPLS Network• IPsec and MPLS• Summary

Page 47: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

474747© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 47

• What happens if a single PE in the core gets compromised?

Intruder has access to all VPNs; GRE tunnel to “his” CE in the Internet, bring that CE into any VPN. That VPN might not even notice…Worst Case!

• Therefore: PE SECURITY IS PARAMOUNT!• Therefore: No PE on customer premises!

(Think about console access, password recovery…)

Key: PE Security

Page 48: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

484848© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 48

Solution: Operational Security

• Security depends on SP! Employee can make mistake, or malicious misconfiguration

• Potential Security hole:If PE compromised, VPNs might be insecure

• Cannot *prevent* all misconfigsNeed to operationally control this

Page 49: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

494949© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 49

Operational Security

• Logging config changesDual Control: Network operators must have no access to logging facilityOtherwise they can hack the network, and delete the logs

• AAA for access• AAA for command authorization

Keep logs in a secure place(Malicious employee might change logs too)

• Tight control• No service password-recovery where available

Secure Operations is Hard!!!

Page 50: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

505050© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 50

Agenda

• Analysis of MPLS/VPN Security• Security Recommendations• Secure MPLS VPN Design

Internet Access

• Secure Operations• Attacking an MPLS Network• IPsec and MPLS• Summary

Page 51: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

515151© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 51

Ways to Attack

• “Intrusion”: Get un-authorized accessTheory: Not possible (as shown before)Practice: Depends on:

- Vendor implementation- Correct config and management

• “Denial-of-Service”: Deny access of othersMuch more interesting…

No Trust?

Use IPsecbetween CEs!

Page 52: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

525252© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 52

• DoS is about Resource Starvation, one of:BandwidthCPUMemory (buffers, routing tables…)

• In MPLS, we have to examine:

• Rest is the same as in other networks

CE PE

DoS Against MPLS

Page 53: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

535353© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 53

Attacking a CE from MPLS (other VPN)

• Is the CE reachable from the MPLS side?-> only if this is an Internet CE, otherwise not!

(CE-PE addressing is part of VPN!)

• For Internet CEs: Same security rules apply as for any other access router.

MPLS hides VPN-CEs: Secure! Internet CEs: Same as in other networks

Page 54: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

545454© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 54

Attacking a CE-PE Line

• Also depends on reachability of CE or the VPN behind it

• Only an issue for Lines to Internet-CEs Same considerations as in normal networks

• If CE-PE line shared (VPN and Internet):DoS on Internet may influence VPN! Use CAR!

MPLS hides VPN-CEs: Secure! Internet CEs: Same as in other networks

Page 55: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

555555© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 55

Attacking a PE Router

Only visible: “your” interfaceand interfaces of Internet CEs

PEIP(PE; l0) IP(P)

CE2IP(CE2) IP(PE; fa1) VRF CE2

CE1IP(CE1) IP(PE; fa0)

VRF CE1

VRF InternetAttack points

Page 56: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

565656© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 56

DoS Attacks to PE Can Come from…

• Other VPN, connected to same PE• Internet, if PE carries Internet VRFPossible Attacks:• Resource starvation on PE

Too many routing updates, too many SNMP requests, small servers…

Has to Be Securedand Can Be Secured!

Page 57: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

575757© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 57

Agenda

• Analysis of MPLS/VPN Security• Security Recommendations• Secure MPLS VPN Design

Internet Access

• Secure Operations• Attacking an MPLS Network• IPsec and MPLS• Summary

Page 58: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

585858© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 58

Use IPsec if you need:

• Encryption of traffic• Direct authentication of CEs• Integrity of traffic • Replay detection

• Or: If you don’t want to trust your ISP for traffic separation!

Page 59: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

595959© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 59

CE PE PE CE

IPSec CE-CE

IPSec PE-PE

IPSec CE-PE

Application: VPN Security

Application: Special Cases

(see later)

Application: Remote Access into VPN

Where to Apply IPSec

Page 60: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

606060© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 60

PE-PE IPSec Internet Draft

• “Use of PE-PE IPSec in RFC2547 VPNs” (E. Rosen et al)draft-ietf-l3vpn-ipsec-2547-02.txt

• IPSec instead of LSP inside 2547bis core• Does not define IPSec specific mechanism

Key exchange, SA scalability, …

Page 61: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

616161© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 61

Applications of PE-PE IPSec

• If core is not pure MPLS, but IP basedStandard 2547bis requires MPLS core, PE-PE IPSecdoes not Alternative: MPLS in IP/GRE/L2TPv3, but with PE-PE IPSec spoofing impossible

• Protect against misbehaving transit nodes• Protection against sniffing on core lines

Page 62: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

626262© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 62

Non-Application: Customer Security

Hacker wants to … IPSec IPSecCE-CE PE-PE

Protects Fully

Doesn’t Protect

Protects Partially

Protects Fully

Protects Fully

Protects Partially

Doesn’t Protect

Doesn’t Protect

… read VPN traffic

… insert traffic into VPN

… join a VPN

… DoS a VPN / the core

Page 63: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

636363© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 63

Non-Application: Customer Security

“IPSec Security Associations that associate ingress PE routes with egress PE routers do not ensure privacy for VPN data. The data is exposed on the PE-CE access links, and is exposed in the PErouters themselves.”

draft-ietf-l3vpn-ipsec-2547-02.txt

CE PE PE CEIPSec

Unsecured Unsecured

Page 64: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

646464© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 64

( )

PE-PE IPSec: Encapsulation(draft-ietf-l3vpn-ipsec-2547-02.txt)

IP Header DataVPN Label

IP Header DataVPN LabelIP Header GRE

IP Header DataVPN LabelGREESP/AHIP Header

1. Pre-pend the VPN label, as in normal MPLS

2. Encapsulate: MPLS in GRE or IP (tunnel between PEs)

3. Apply IPsec transport mode

IPSec Transport Header

Normal MPLS: IP Header DataVPN LabelPE Label

Protected

Page 65: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

656565© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 65

PE-PE IPSec: How It Works

• Not defined in draft: How to establish IPSec tunnel

PE PEIPSec

1. Egress PE Signals IPSecPolicy Per VPN Prefix

BGP + Ext. Community

VPN VPN

2. Inress PEs Establish IPSec Tunnel for Prefix

Page 66: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

666666© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 66

Agenda

• Analysis of MPLS/VPN Security• Security Recommendations• Secure MPLS VPN Design

Internet Access

• Secure Operations• Attacking an MPLS Network• IPsec and MPLS• Summary

Page 67: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

676767© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 67

MPLS Doesn’t Provide…

• Protection against misconfigurations in the core• Protection against attacks from within the core• Confidentiality, authentication, integrity, anti-replay

Use IPSec if required

• Customer network security

Page 68: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

686868© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 68

MPLS Security Overview

1. Don’t let packets into (!) the coreNo way to attack core, except through routing, thus:

2. Secure the routing protocolNeighbor authentication, maximum routes, dampening, …

3. Design for transit trafficQoS to give VPN priority over InternetChoose correct router for bandwidthSeparate PEs where necessary

4. Operate Securely

Still “Open”: RoutingProtocol

Only Attack Vector: Transit

Traffic

Now Only Insider Attacks

Possible

Avoid Insider Attacks

Page 69: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

696969© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 69

Summary

• MPLS VPNs can be secured as well as ATM/FR VPNs

• Security depends on correct operation and implementation

• MPLS backbones can be more secure than “normal” IP backbones

Core not accessible from outsideSeparate control and data plane

• Key: PE securityAdvantage: Only PE-CE interfaces accessible from outsideMakes security easier than in “normal” networks

Page 70: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

707070© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 70

References

• RFC2082 – RIP-2 MD5 Authentication• RFC2154 – OSPF with Digital Signatures• RFC2385 – Protection of BGP Sessions via the TCP MD5 Signature Option• RFC3013 – Recommended Internet Service Provider Security Services and

Procedures• RFC2196 – Site Security Handbook• MPLS and VPN Architectures – ISBN 1-58705-002-1• Cisco ISP Essentials – ISBN 1-58705-041-2 (http://www.ispbook.com/)• http://www.cisco.com/public/cons/isp/documents/IOSEssentialsPDF.zip• General Information on Securing Cisco Routers• http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0

080120f48.shtml• Cisco Secure Virtual Private Networks - ISBN 1-58705-033-1

Page 71: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

Q and A

717171© 2003 Cisco Systems, Inc. All rights reserved.Presentation_ID

Page 72: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

72Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved.

Page 73: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

73© 2003 Cisco Systems, Inc. All rights reserved.

MPLS JAPAN 2004

© 2001, Cisco Systems, Inc. All rights reserved.

Backup Material

Page 74: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

747474© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 74

Non-IP networks: Not 100% secure!!Example: Telephone Network

“I had access to most, if not all, of the switches in Las Vegas,” testified Mitnick, at a hearing of Nevada's Public Utilities Commission (PUC). “I had the same privileges as a Northern Telecom technician.”Source: http://online.securityfocus.com/news/497

Page 75: MPLS Security Considerations · © 2003 Cisco Systems, Inc. All rights reserved. 5 MPLS Japan 2004 © 2001, Cisco Systems, Inc. All rights reserved. True, but Same on ATM/FR PEs Can

757575© 2003 Cisco Systems, Inc. All rights reserved.

MPLS Japan 2004

© 2001, Cisco Systems, Inc. All rights reserved. 75

Non-IP networks: Not 100% secure!!Example: ATM Switch

“a single 'land' packet sent to the telnet port (23) of either the inband or out-of-band interface will cause the device to stop responding to ip traffic. Over the course of 6-1/2 minutes, all CPU will be consumed and device reboots.”Source: Bugtraq, 15 June 2002: “Fore/Marconi ATM Switch 'land' vulnerability”, by [email protected];