virtual directories: attack models and prevention

26
Virtual Directories: Attack Models and Prevention June 2 nd , 2009 Bill Claycomb Systems Analyst Sandia National Laboratories Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.

Upload: more

Post on 23-Feb-2016

46 views

Category:

Documents


0 download

DESCRIPTION

Virtual Directories: Attack Models and Prevention. June 2 nd , 2009 Bill Claycomb Systems Analyst Sandia National Laboratories. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Virtual Directories: Attack Models and Prevention

Virtual Directories:Attack Models and Prevention

June 2nd, 2009

Bill ClaycombSystems Analyst

Sandia National Laboratories

Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company,for the United States Department of Energy’s National Nuclear Security Administration

under contract DE-AC04-94AL85000.

Page 2: Virtual Directories: Attack Models and Prevention

Agenda

•Directory services and virtual directories•Threats to directory services•Attack models for directory services

–Preventing attacks on directory services•Protecting information in directory services•Future directions

Page 3: Virtual Directories: Attack Models and Prevention

Directory Services

• Localized data store containing information about objects– Users– Computers– Contacts, etc.

• Provide information to applications– Authentication and access control – Contact information– Group membership

• Use LDAP Communication Protocol– Lightweight Directory Access Protocol

Page 4: Virtual Directories: Attack Models and Prevention

Directory Services Data

dn: cn=Joe User,dc=somedomain,dc=comcn: Joe UsergivenName: Joesn: UsertelephoneNumber: 1 505 555 1212postalAddress: 123 Main St.mail: [email protected]: inetOrgPersonobjectClass: organizationalPersonobjectClass: personobjectClass: top

Object

Attribute

Page 5: Virtual Directories: Attack Models and Prevention

Directory Services

• Popular Directory Services Implementations– Windows Server Active Directory – IBM Tivoli – Apple Open Directory– OpenLDAP– Fedora Directory Server– Sun JAVA System Directory Server

Page 6: Virtual Directories: Attack Models and Prevention

Virtual Directories

Directory Servers

Virtual Directory Server

Client

Page 7: Virtual Directories: Attack Models and Prevention

Virtual Directories

Directory Servers

Virtual Directory Server

Data Stores

Synchronization

Page 8: Virtual Directories: Attack Models and Prevention

Threats to Sensitive Directory Information

• “Insider Threat Study: Illicit Cyber Activity in the Government Sector”, a study conducted by U.S. Secret Service and CERT (2008) found: – Most of the insiders had authorized access at the

time of their malicious activities– Access control gaps facilitated most of the insider

incidents, including:• The ability of an insider to use technical methods to

override access controls without detection• System vulnerabilities that allowed technical insiders

to use their specialized skills to override access controls without detection

Page 9: Virtual Directories: Attack Models and Prevention

Attack Models on Virtual Directories

•Authentication Attacks•Cache Attacks•Data Transformation Attacks•Network Attacks•Data Source Attacks

Page 10: Virtual Directories: Attack Models and Prevention

Authentication Attacks

Destination Servers

Virtual Directory Server

Stored

Credentials

StoredCredentials

StoredCredentials

UserCredentials

Page 11: Virtual Directories: Attack Models and Prevention

Preventing Authentication Attacks

• Require pass-through authentication– Use a surrogate pass-through directory if

necessary• User restricted accounts when stored credentials

are required

Page 12: Virtual Directories: Attack Models and Prevention

Cache Attacks

Directory Servers

Virtual Directory Server

HighSpeedCache

Client

Page 13: Virtual Directories: Attack Models and Prevention

Preventing Cache Attacks

• Do not use cache for high-risk information• Require frequent consistency checks• Require datastore connectivity before returning

any data• Protect cache on directory server

Page 14: Virtual Directories: Attack Models and Prevention

Data Transformation Attacks

Directory Servers

Virtual Directory Server

Client

Data Transformation

505-555-1212(505) 555-1212

US Citizen: NUS Citizen: Y

Page 15: Virtual Directories: Attack Models and Prevention

Preventing Data Transformation Attacks

• Protect transformation scripts on virtual directory server

• Do not allow transformation of sensitive data• Double-check sensitive data sent to client

machines• Establish consistency checking on

transformation scripts– Monitor for changes

Page 16: Virtual Directories: Attack Models and Prevention

Network Attacks

Directory Server

Virtual Directory Server

Change Detected:Disable Account X

Accounts:XYZ

Page 17: Virtual Directories: Attack Models and Prevention

Network Attacks

Directory Server

Virtual Directory Server

Change Detected:Disable Account X

Accounts:XYZ

Page 18: Virtual Directories: Attack Models and Prevention

Preventing Network Attacks

• Detect inconsistencies in data stores• Require consistency checking at standard

intervals• Require consistency checking after network

disruption• Require transactions to be atomic and durable

Page 19: Virtual Directories: Attack Models and Prevention

Data Source Attacks

Authoritative Data Store

Virtual Directory Server

Account Store

Accounts EnabledX Y

Y Y

Z N

Accounts EnabledX Y

Y Y

Z Y

Accounts EnabledX Y

Y Y

Z N

Accounts EnabledX Y

Y Y

Z Y

Synchronization

Page 20: Virtual Directories: Attack Models and Prevention

Preventing Data Source Attacks

• Protect authoritative data sources• Monitor sensitive data modifications• Protect sensitive data

Page 21: Virtual Directories: Attack Models and Prevention

Protecting Sensitive Directory Information

Personal Virtual Directory Service

Page 22: Virtual Directories: Attack Models and Prevention

Protecting and Delegating Access•New Approach

•S – symmetric data encryption key•Krw / K’rw – public/private key pair for signing data•Kux – data user public key•Ko / K’o – data owner public/private key pair• IDo – data owner identifier

...||,||,||,||||||21

'''

uuoo'rw KKrwKrwoKrwKS SKSKSIDKdata

Page 23: Virtual Directories: Attack Models and Prevention

Personal Virtual Directory Service Components

Page 24: Virtual Directories: Attack Models and Prevention

Advantages of PVDS

•Uses existing key management infrastructure•Little client modification•No user-based key protection•Directory independent

– Can be extended to protect databases as well•Performance impact largely confined to clients utilizing PVDS capabilities

Page 25: Virtual Directories: Attack Models and Prevention

Future Directions

• Implement attack models to determine feasibility• Explore attacks on various VDS implementations• Identify additional attacks on virtual directory

servers• PVDS

– Reduce the impact of working with encrypted attributes

– Analyze impact to different types of data sources– Consider how security policies may conflict with

using a virtual directory to manage security– Usability studies

Page 26: Virtual Directories: Attack Models and Prevention

Questions

http://www.sandia.gov

[email protected]