The Case For Network Infrastructure Security


"The network is the computer"
---Sun Microsystems, c.a. 1984

"The network is the network, the computer is the computer. Sorry about the confusion."
---Unknown.

George M. Jones
gmj@pobox.com

What Does "Network Security" mean?

What do you mean when you say "Network Security"? Firewalls? Intrusion Detection Systems? Anti-Virus Software? Authentication Systems? System and application hardening? These are all fine and even necessary elements of "current best practice" if you're running a small office network or even a medium-sized corporate intranet.

What if you're running a global Internet backbone with over 4700 routers, announcing over %60 of all routes, and have over 600 routers and switches in 25 hosting data centers? What does "Network Security" mean when you *are* the network and have no perimeter?

Chances are that in your world, you are closer to the first scenario. It is the premise of this article that while many of the solutions for smaller networks don't scale, many of the problems in the larger networks do apply generally, and that ignoring them may result in widespread disruption of service.

What's the Goal?

The main goal for large networks is availability. The bits should keep flowing, preferably to the right place. While integrity and confidentiality are important problems, it is assumed that these are handled "at the end of the pipe" by things such as VPNs, host-based controls, good security policy and practice, etc. Assuring availability is a larger problem than it might at first seem. Let's take a look at some (relatively) recent problems.

Some Real Problems

Hacks *using* the network.

Bugs that enable hacking *of* the network

Here is a sampling of some "recent" bugs that enable hacking of the network infrastructure.

Conflicting Priorities.[footnote2]

Commercial vendors and network operators have conflicting priorities. Vendors are interested in selling new equipment and software. Network operators are interested in operating networks. Vendors tend to focus effort on developing new products (which invariably have new bugs). Network operators focus on operating networks. Vendors tend to view bug fixing as a distraction from new product development and sales. Network operators view bug fixes in existing products as essential to operating networks. Vendors tend to see their job as done when the bug is fixed in the latest release. Network operators see their job as done when the bug fix is deployed across all devices (including old/obsolete ones) in their operating networks.

Operations

Operational realities can adversely affect security, even if technical solutions are known and available.

Configuration

Some Potential Problems

We have seen a sampling of things that are problems today. Now, let's take a look at Network Nightmares, the Next Generation.

So What?

The Big Question

The big question, assuming this assessment of the problem is correct, is whether anything will be done before we have a major network outage. Can we, as a community, proactivly address the issues raised here, or will it take a major disruption of services for "Network Security" to be recognized as an important priority? Time will tell.

References and Resources

References

ahm00
Network Infrastructure Insecurity
Ahmad, Rauch
http://www.blackhat.com/presentations/bh-asia-00/jeremy-dave/jeremy-dave-asia-00-network.ppt
cis00
Cisco Catalyst Memory Leak Vulnerability
Cisco Systems
http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml
cis01
Multiple SSH Vulnerabilities
Cisco Systems
http://www.cisco.com/warp/public/707/catalyst-memleak-pub.shtml
cis02
Cisco Security Advisory: NTP Vulnerability
Cisco Systems
http://www.cisco.com/warp/public/707/NTP-pub.shtml
cer02
Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP)
CERT/CC
http://www.cert.org/advisories/CA-2002-03.html
eff02
EFF Homepage
Electronic Frontier Foundation
http://www.eff.org/
jon02b
Network Security Requirements for Devices Implementing Internet Protocol
George M. Jones, editor.
http://www.port111.com/docs/netsec-reqs.html
lem01
DDoS attacks--one year later
Robert Lemos
http://zdnet.com.com/2100-11-527990.html?legacy=zdnn
sec01
Ntpd Remote Buffer Overflow Vulnerability
SecurityFocus
http://online.securityfocus.com/bid/2540/info/
sta02
How to 0wn the Internet in your Spare Time
Stuart Staniford, Vern Paxon and Nocholas Weaver
http://www.icir.org/vern/papers/cdc-usenix-sec02/
yas01
Latest Hacker Target: Routers
Rutrell Yasin
http://www.internetweek.com/story/INW20011217S0004
yro02
Your Rights Online
Slashdot
http://www.slashdot.org/yro/

Resources For Securing Cisco Routers

aik02a
Hardening Cisco Routers
Thomas Akin
http://www.oreilly.com/catalog/hardcisco/
cis02
Improving Security on Cisco Routers
Cisco Systems
http://www.cisco.com/warp/public/707/21.html

jon02a
The Router Audit Tool and Benchmark
George M. Jones at al./Center for Internet Security
http://www.cisecurity.org
ste02
Securing Cisco Routers Step-by-Step
John Stewart and Joshua Wright
http://www.sansstore.org

Scheduled for publication Fall, '02.
tho02
Rob Thomas' Security Articles
Rob Thomas
http://www.cymru.com/~robt/Docs/Articles/

Articles/Guides to securing IOS, JunOS, BGP, DoS tracking, etc.

Footnotes

footnote1
SNMP has been rumored to stand for 'Security Not My Problem'.
footnote2
The author acknowledges that this may be "unfair" as it portrays the external view of vendors as seen from the engineering/security trenches.
footnote3
Thanks to Pete White for suggesting this survey method.
footnote4
From 1/5/00 to 3/5/02 the number of advertised routes has grown from 76182 to 110842, a %45 increase, even in the face of a down economy. Source: http://www.employees.org/~tbates/cidr-report.html

Thanks

Thanks to the whole UUNET net-sec team (past and present) for feedback.

Copyright (C) 2002, George M. Jones

George M. Jones
Last modified: Fri Jun 7 07:19:17 EDT 2002
$Id: login-2002-infra.html,v 1.4 2002/06/07 22:46:04 george Exp $