abilene transit security policy joint techs summer ’05 vancouver, bc, ca steve cotter director,...

11
Abilene Transit Security Policy Joint Techs Summer ’05 Vancouver, BC, CA Steve Cotter Director, Network Services [email protected]

Upload: logan-curtis

Post on 17-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Abilene Transit Security PolicyJoint Techs Summer ’05Vancouver, BC, CA

Abilene Transit Security PolicyJoint Techs Summer ’05Vancouver, BC, CASteve Cotter

Director, Network Services

[email protected]

Steve Cotter

Director, Network Services

[email protected]

2

Basic PremiseBasic Premise

Policy determined by basic properties of a IP network• Control is at the edge

• Hosts determine when and where to send packets and initiate flows

• This control often leads to vulnerabilities• Hosts can become compromised• Hosts may be used to compromise other hosts• Can lead to large amounts of traffic sent to other hosts

As a backbone network, we view Abilene as a ‘pipe’ and not a controlling entity

3

Network ControlNetwork Control

The Abilene backbone does have the means to apply some control across the network:• Possible to block traffic on some ports• Possible to block all traffic from a particular IP addresses

Security Policy #1: Abilene does not unilaterally filter traffic on a network wide basis unless the network itself is under attack.

Scenario: Compromised hosts use port 135 to propagate a virus to infect other hosts.• Abilene would not unilateral block that port• That function handled more efficiently at the edge• Had the routers or switches themselves been under attack,

would have blocked that traffic immediately

4

Filtering TrafficFiltering Traffic

The Abilene backbone will filter traffic in some situations:• If one or more hosts on a connector or peer were under attack• If requested by an institution, peer or connector

([email protected], 317-278-6622)

Security Policy #2: Abilene will filter traffic to a connector or peer if requested by that particular connector or peer network, filtering the appropriate traffic through the connection in question.

• Abilene will make every possible attempt to authenticate those making requests for traffic filtering through interconnection points.

• Abilene’s method for blocking this traffic is our BGP Discard Routing procedure

5

Filtering TrafficFiltering Traffic

Abilene reserves the right to protect itself and its connectors / peers from other connectors and peers.• If a threat to the network exists through a particular

connector, Abilene reserves the right to filter that traffic• Ultimately, Abilene could disconnect the offending connector

or peer

Security Policy #3: Abilene reserves the right to filter all traffic or terminate any connection if it is under attack.

• Every attempt will be made to contact the network in question to discuss various options and alternatives.

6

Research and Education Information Sharing Analysis Center (REN-ISAC)Research and Education Information Sharing Analysis Center (REN-ISAC)

The REN-ISAC supports higher education and the research community by:• Provides advanced security services to national supporting

networks• Supports efforts to protect the national cyberinfrastructure by

participating in the formal sector ISAC infrastructure

Security Policy #4: Abilene will report all known incidents of security threats to the REN-ISAC

• Determining what traffic is a security threat is a

network research problem. A measurement infrastructure is part of Abilene’s network operations (Abilene Observatory).

7

Data CollectionData Collection

Abilene collects flow statistics on a sampling basis that potentially could identify source and destination addresses and ports• This data is anonomyzed (11 lower order bits of all IP

addresses are zeroed out) before it is saved to disk • For privacy reasons: Abilene does not collect data pertaining

to communications between identifiable hosts• However, this information could identify compromised hosts

Security Policy #4: During times of security attacks, the REN-ISAC can unanonomyze data, but only that data related to the attack itself. The resulting data is anonomyzed as soon as possible after the attack is understood.

8

Data AnalysisData Analysis

Information derived from analysis of the flow data that identifies specific institutions or hosts is treated as confidential information.

Security Policy #5: Institutions may request specific sources of cyber security attacks located on their respective networks. Only security related information we be reported to the institutions.

Abilene data is meant to supplement, not replace, data collected by individual institutions or connectors. Internet2 strongly encourages institutions to collect their own data, potentially providing a greater degree of specificity to particular security problems.

9

BGP Discard RoutingBGP Discard Routing

Connectors can advertise routes to Abilene via BGP for which all traffic to those routes will be discarded by the Abilene routers. This is useful during a DoS attack because the traffic can be dropped before it crosses the link to the connector.

Here are a few important points: • Discard routes will NOT be accepted for routes larger than a /24 • There is no way to place a limit on the number of discard routes

a connector can advertise. The limit on the total number of routes a Connector can advertise is currently 3,000.

• Abilene's default policy is to not accept routes smaller than a /27. There have been some exceptions made to this policy. For those /28 and smaller routes, it will not be possible to announce more specific discard routes.

10

Abilene InformationAbilene Information

• For more Information:• http://abilene.internet2.edu• http://abilene.internet2.edu/observatory/ • http://abilene.internet2.edu/security/

• Or contact us at:• [email protected][email protected][email protected]

11