packetfence …because good fences make good neighbors

27
PacketFence PacketFence …because good fences make good neighbors …because good fences make good neighbors Michael Garofano, Director of IT, Harvard KSG Michael Garofano, Director of IT, Harvard KSG Kevin Amorin, Sr. Security & Systems Engineer, Kevin Amorin, Sr. Security & Systems Engineer, Harvard KSG Harvard KSG David LaPorte, Manager Network Security, Harvard (not David LaPorte, Manager Network Security, Harvard (not present today) present today) [email protected] [email protected] [email protected] [email protected] [email protected] [email protected]

Upload: harrison-barton

Post on 30-Dec-2015

80 views

Category:

Documents


14 download

DESCRIPTION

PacketFence …because good fences make good neighbors. Michael Garofano, Director of IT, Harvard KSG Kevin Amorin, Sr. Security & Systems Engineer, Harvard KSG David LaPorte, Manager Network Security, Harvard (not present today) [email protected] [email protected] - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: PacketFence …because good fences make good neighbors

PacketFencePacketFence…because good fences make good neighbors…because good fences make good neighbors

Michael Garofano, Director of IT, Harvard KSGMichael Garofano, Director of IT, Harvard KSGKevin Amorin, Sr. Security & Systems Engineer, Harvard KSG Kevin Amorin, Sr. Security & Systems Engineer, Harvard KSG

David LaPorte, Manager Network Security, Harvard (not present today)David LaPorte, Manager Network Security, Harvard (not present today)

[email protected]@[email protected]@ksg.harvard.edu

[email protected][email protected]

Page 2: PacketFence …because good fences make good neighbors

22

AgendaAgenda

Academic IssuesAcademic Issues

Perimeter & Internal SecurityPerimeter & Internal Security

PacketFence featuresPacketFence features

Inline vs. Passive (out of line)Inline vs. Passive (out of line)

Page 3: PacketFence …because good fences make good neighbors

33

Academic Issues Academic Issues

Help Desk SupportHelp Desk Support– Limit spread of WormsLimit spread of Worms– Identify infected userIdentify infected user

DMCA (movie/music download violations)DMCA (movie/music download violations)– IP to user mappingIP to user mapping

Page 4: PacketFence …because good fences make good neighbors

44

Academic Issues Academic Issues

InventoryInventory– List of MAC’s and ownersList of MAC’s and owners

Gather StatisticsGather Statistics– Get the more money!Get the more money!– Number of IP’s, infections, helpdesk time, etc, Number of IP’s, infections, helpdesk time, etc,

active nodes,active nodes,

Page 5: PacketFence …because good fences make good neighbors

55

Academic Issues Academic Issues

Open vs. closed environmentOpen vs. closed environment– Professors and students want unfettered Professors and students want unfettered

access to the internetaccess to the internet

You can take your FIREWALL and put it…You can take your FIREWALL and put it…– Some things break:Some things break:

Videoconferencing (H.323), Games (UDP non-Videoconferencing (H.323), Games (UDP non-statefull firewall), P2P, IM etc…statefull firewall), P2P, IM etc…

Page 6: PacketFence …because good fences make good neighbors

66

Average Network SecurityAverage Network Security

Perimeter securityPerimeter security– Firewalls, IDS, IPS, Router ACLsFirewalls, IDS, IPS, Router ACLs

Current architectureCurrent architecture– ““Hard on the outside soft on the inside”Hard on the outside soft on the inside”

Hard to protect the “inside”Hard to protect the “inside”

60-80% of attacks originate from 60-80% of attacks originate from systems on the internal network systems on the internal network (behind the firewall)(behind the firewall)

Page 7: PacketFence …because good fences make good neighbors

77

Worms wreak havocWorms wreak havoc

August 11, 2003 Blaster and Welchia/NachiAugust 11, 2003 Blaster and Welchia/Nachi

How did the worms get in? We block all How did the worms get in? We block all types of traffic from the internet? types of traffic from the internet? (especially RPC) LAPTOPS!!!!(especially RPC) LAPTOPS!!!!

Backdoors bypass perimeter defenses:Backdoors bypass perimeter defenses:– Roaming usersRoaming users– VPNVPN– WirelessWireless– DialupDialup

Page 8: PacketFence …because good fences make good neighbors

88

Internal Network Internal Network Protection/ControlProtection/Control

Mirage Networks (ARP)Mirage Networks (ARP)

qRadar (ARP)qRadar (ARP)

Wholepoint (ARP)Wholepoint (ARP)

RNA networks (ARP)RNA networks (ARP)

Tipping Point (inline)Tipping Point (inline)Etc..Etc..

Cisco (NAC)Cisco (NAC)

Trend Micro (NAC)Trend Micro (NAC)

Symantec (NAC)Symantec (NAC)

Microsoft (NAP Q2-2005)Microsoft (NAP Q2-2005)

Juniper (TNC)Juniper (TNC)

Foundry Networks (TCC)Foundry Networks (TCC)

Etc..Etc..

Internal Network Security Funding 2004Internal Network Security Funding 2004– More then $80M ($13M Sept)More then $80M ($13M Sept)

Page 9: PacketFence …because good fences make good neighbors

99

What is PacketFenceWhat is PacketFence

Open-source network registration and Open-source network registration and worm mitigation solutionworm mitigation solution– Co-developed by Kevin Amorin andCo-developed by Kevin Amorin and

David LaPorteDavid LaPorte– Captive portalCaptive portal

Intercepts HTTP sessions and forces client to view contentIntercepts HTTP sessions and forces client to view content

Similar to NoCatAuth, BluesocketSimilar to NoCatAuth, Bluesocket

– Based on un-modified open-source Based on un-modified open-source componentscomponents

Page 10: PacketFence …because good fences make good neighbors

1010

FeaturesFeatures

Network registrationNetwork registration– Register systems to an authenticated userRegister systems to an authenticated user

LDAP, RADIUS, POP, IMAP…anything Apache supportsLDAP, RADIUS, POP, IMAP…anything Apache supports

– Force AUP acceptanceForce AUP acceptance– Stores assorted system informationStores assorted system information

NetBIOS computer name & Web browser user-agent stringNetBIOS computer name & Web browser user-agent string

Presence of some NAT device Presence of some NAT device

– Stores no personal informationStores no personal informationID->MAC mapping onlyID->MAC mapping only

– Above data can provide a rough system inventoryAbove data can provide a rough system inventory– Vulnerability scans at registrationVulnerability scans at registration

Page 11: PacketFence …because good fences make good neighbors

1111

FeaturesFeatures

Worm mitigationWorm mitigation– Signature and anomaly based detectionSignature and anomaly based detection– Action based responseAction based response

Optional isolation of infected nodesOptional isolation of infected nodes

– Content specific information Content specific information Empower usersEmpower usersProvides remediation instruction specific to Provides remediation instruction specific to infectioninfection

Network scansNetwork scans– Preemptively detect and trap vulnerable hostsPreemptively detect and trap vulnerable hosts

Page 12: PacketFence …because good fences make good neighbors

1212

FeaturesFeatures

RemediationRemediation– Redirection to the captive portalRedirection to the captive portal– Requires signature-based detectRequires signature-based detect– Provides user context-specific remediation Provides user context-specific remediation

instructionsinstructionsProxyProxy

Firewall pass-throughFirewall pass-through

– Helpdesk support number if all else failsHelpdesk support number if all else fails

Page 13: PacketFence …because good fences make good neighbors

1313

InlineInline

Security bottleneckSecurity bottleneck– immune to subversionimmune to subversion

Fail-closedFail-closed

Performance bottleneckPerformance bottleneck

Single point of failureSingle point of failure

Page 14: PacketFence …because good fences make good neighbors

1414

PassivePassive

Fail-open solutionFail-open solution– Preferable in academic environmentPreferable in academic environment

No bandwidth bottlenecksNo bandwidth bottlenecks

Network visibilityNetwork visibility– Hub, monitor port, tapHub, monitor port, tap

Easy integrating – no changes to Easy integrating – no changes to infrastructureinfrastructure– plug and play (pray?)plug and play (pray?)

Manipulates client ARP cacheManipulates client ARP cache– ““Virtually” in-lineVirtually” in-line

Page 15: PacketFence …because good fences make good neighbors

1515

Passive ArchitecturePassive Architecture

Internet

User

Router

`

Host

DB

PacketFence

Page 16: PacketFence …because good fences make good neighbors

1616

Why ARP?Why ARP?

TrustingTrusting– Easy to manipulateEasy to manipulate

RFC826 1982RFC826 1982

OS independentOS independent– Windows 95,98,ME,2k,xp,mac both type Windows 95,98,ME,2k,xp,mac both type

1 & 21 & 2– Linux only type 1Linux only type 1– Solaris ICMP & type 2 or 1Solaris ICMP & type 2 or 1

Page 17: PacketFence …because good fences make good neighbors

1717

Methods of IsolationMethods of Isolation

ARPARP– Change the router’s ARP entry on the local system to Change the router’s ARP entry on the local system to

enforcement pointenforcement point

DHCPDHCP– Change DHCP scope (reserved IP with enforcer gateway)Change DHCP scope (reserved IP with enforcer gateway)– or Change DNS server to resolve all IP’s to Enforceror Change DNS server to resolve all IP’s to Enforcer

VLAN switchVLAN switch– Switch host to an isolation network with enforcer as the Switch host to an isolation network with enforcer as the

gatewaygateway

If all else fails… BlackholeIf all else fails… Blackhole– Router dynamic updateRouter dynamic update– Firewall/ACL updateFirewall/ACL update– Disable switch portDisable switch port

Page 18: PacketFence …because good fences make good neighbors

1818

ARP ManipulationARP Manipulation

All Traffic

`

Host User

PacketFence

Switch

Internet

Router

Switch

Page 19: PacketFence …because good fences make good neighbors

1919

VLAN Change (Futures)VLAN Change (Futures)

User

Internet

Router

Switch

`

Host User

`

Host

Enforcement Point

Switch

Page 20: PacketFence …because good fences make good neighbors

2020

DNS DNS (Futures)(Futures)

`

Host User

Switch

Internet

Router

DNS Requests

Switch

DHCP

Enforcement Point &DNS

Page 21: PacketFence …because good fences make good neighbors

2121

DHCP DHCP (Futures)(Futures)

`

Host User

Enforcement Point & DNS/DHCP Server

Switch

Internet

Router

DHCP & DNS Requests

Switch

Page 22: PacketFence …because good fences make good neighbors

2222

Blackhole Injection (risky)Blackhole Injection (risky)

User

Internet

Router

Switch

`

HostUser

Router

Switch

`

Host

Page 23: PacketFence …because good fences make good neighbors

2323

Page 24: PacketFence …because good fences make good neighbors

2424

Page 25: PacketFence …because good fences make good neighbors

2525

ImplementationsImplementations

All current deployments are “passive” modeAll current deployments are “passive” mode

Several residential networks and 2 schoolsSeveral residential networks and 2 schools– ~4500 users~4500 users– 3781 registrations3781 registrations– ~125 violations~125 violations

Nachi / Sasser,Agobot,Gaobot,etc / IRC botsNachi / Sasser,Agobot,Gaobot,etc / IRC bots

Page 26: PacketFence …because good fences make good neighbors

2626

Thanks!!!Thanks!!!

Hot “fun” topic!Hot “fun” topic!

Questions?Questions?

Software available at:Software available at:http://www.packetfence.orghttp://www.packetfence.org

Page 27: PacketFence …because good fences make good neighbors

2727

ReferencesReferences

http://http://www.ece.cmu.edu/~lbauer/papers/policytrwww.ece.cmu.edu/~lbauer/papers/policytr.pdf.pdfftp://www6.software.ibm.com/software/devftp://www6.software.ibm.com/software/developer/library/ws-policy.pdfeloper/library/ws-policy.pdfhttp://www9.org/w9cdrom/345/345.htmlhttp://www9.org/w9cdrom/345/345.htmlhttp://www.sans.org/resources/policies/Polihttp://www.sans.org/resources/policies/Policy_Primer.pdfcy_Primer.pdfhttp://www.cs.sjsu.edu/faculty/stamp/studhttp://www.cs.sjsu.edu/faculty/stamp/students/Silky_report.pdfents/Silky_report.pdfHarvard University network security Best Harvard University network security Best practices – Scott Bradnerpractices – Scott Bradner