1 / 26

The Fermilab Network, Computer Security, and you….

The Fermilab Network, Computer Security, and you…. Phil DeMar / Donna Lamore Computer Security Awareness Day March 8, 2005. Fermilab Network Overview. ~10,000 systems Organized on model of work group LANs Organizational: AD, CD, PPD, TD, BSS, DIR, ESH, FESS, LSS

valerian
Download Presentation

The Fermilab Network, Computer Security, and you….

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Fermilab Network, Computer Security, and you…. Phil DeMar / Donna Lamore Computer Security Awareness Day March 8, 2005

  2. Fermilab Network Overview • ~10,000 systems • Organized on model of work group LANs • Organizational: AD, CD, PPD, TD, BSS, DIR, ESH, FESS, LSS • Experiment: CDF, D0, CMS, MINOS, mBoone, SDSS • Geographical: Fixed Target, Site 38, Village • Work groups supported on switches that connect to the core network

  3. Core Network Facilities & Essential Network Services • Core network facilities: • FCC core router • WH core router • Border router • Essential network services: • Name service • Dynamic address allocation service • Time service

  4. Off-site Network Access • Off-site traffic traverses border router: • Delineation point between onsite & offsite • Our 1st line of defense against the Internet • Flow data collected on border router: • Logs all off-site network connections • Source/destination IP addresses & ports • Flow timestamp & duration, bytes/packets sent & received • Useful for detecting infected systems & investigating computer security incidents • We are also collecting flow data on internal routers

  5. Off-site Network Access (II) • Current site perimeter access policy: • Open inbound access with a few protections • Open outbound access with minimal restrictions • Changes to default inbound openness under discussion: • Likely a multi-level security zone architecture • Green zone = default inbound allow • Yellow zone = default inbound deny • Openness for open science collaboration is recognized as a requirement

  6. Off-site Network Access (III) • An alternate very high bandwidth offsite path now in place: • Via dark fiber connection to StarLight • Intended use – high impact scientific data movement

  7. Restrictions on Network Facilities & Services at Fermilab • The network is a restricted central service • Per the Fermilab Policy on Computing • http://computing.fnal.gov/cd/policy/cpolicy.pdf • Prohibited activities include: • Routing & bridging (switching…) on systems attached to the campus network • Using IP addresses not assigned to you • Offering DNS, DHCP, or NTP services

  8. Routing/Bridging Restrictions: • Applies to systems directly or indirectly attached to the facility network • Backend networks with dual-homed (gateway) systems are allowed, but • No forwarding of traffic through the gateway system • No use of Network Address translation (NAT) • Use Fermilab-assigned (RFC1918) address blocks • Private hardwire networks with no direct or indirect connection to the facility network is OK • Sorry, no private wireless networks…

  9. Accessing the Fermilab Network • System registration is required to be granted a usable address on the facility network • Two types of network addresses are allocated: • DHCP – dynamic, but temporary IP address • Useful for mobile systems • Convenient for proper network configuration on a system • Static – fixed, but constant IP address • Immobile; address is bound to a specific subnet • Necessary for systems offering services

  10. Static IP address registration • Static IP address : • Requested via MISCOMP • https://fncdug1.fnal.gov/misnet/ • MAC address(es) required to receive an IP address • Additional necessary information: • Sysadmin • Location • Hardware information • Plan to require static IP renewal once a year

  11. DHCP address registration • Two Types of DHCP address registration • Permanently registered DHCP (Normal) • Register via MISCOMP (https://fncdug1.fnal.gov/misnet/) • MAC address(es) must be registered • Same sysadmin, location, & hardware info as for static IP • Yearly renewal will become necessary soon • Temporary – Cinderella Registration • Initial browser access forces Web Registration page • Registration info: name, e-mail addr., contact info • IP address good till midnight; then you must re-register • Maximum 5 Cinderella leases per 30 days

  12. Wired Connection to Site LAN • DHCP supported on most subnets: • Plug in & registered systems are on the network • Static IP address requires proper configuration for the local subnet • Contact local support person for assistance • Helpdesk – 2345 to report problems

  13. Accessing the Wireless Network • DHCP support only • Wireless LAN support covers most of the site • 802.11B – 11 Mbs • Beginning to deploy 802.11G – 54 Mbs • Authentication: • Currently no authentication for wireless access • SSID is broadcast • Likely to change in the future

  14. Wireless Network No-No’s • You can’t install your own Access Points (AP): • See Fermilab Policy on Computing – a restricted central service • Or enable any AP capability on your notebook • Developing automated rogue AP detection tool • Bridging must be turned OFF on user devices • A known problem with Windows XP • Switches set to shutdown ports on systems with bridging enabled

  15. Remote Access – Dial-up • Dial-up: • Now uses Radius authentication • V.34 – typically 28.8kbps • No plans for further upgrades • If the obsolete, out of warranty modem pool dies, no replacement… • Limited to on-site access only • Last resort ? • Dial-up ISDN phased out completely

  16. Remote Access – VPN • VPN • Provides encrypted tunnel through internet • Assigns virtual local Fermilab address • Allows access to Fermilab machines restricted from offsite • Allows access to protocols blocked at Border • Must use Cisco VPN client & FNAL-provided profile • Yearly renewal necessary: • Involves updating FNAL-provided VPN profile • Request account at: • https://www-dcn.fnal.gov/vpn/vpn_reg.cgi • Need ID number, Associated Workgroup

  17. Appropriate Use • From the Fermilab Policy on Computing: “ Fermilab encourages effective use of computing technologies in all aspects of its activities. Fermilab maintains an open scientific environment where the free exchange of ideas is encouraged and protected. We permit a wide range of computer activities including incidental use for private purposes. We encourage use of the Web and other Internet communication channels. With this comes the responsibility for every Fermilab employee and user to exercise common sense and good judgment. “

  18. Appropriate Use (cont.) • Network Appropriate Use primary concerns: • Potential public embarrassment to the Laboratory • Consuming Significant Resources (excessive use) • Examples of traffic where common sense and good judgment should come into play : • Acting as a server for P2P distributed file systems • Kazaa, eDonkey, Gnutella, NAPster, Skype, etc… • Game Sites • Auctions

  19. Traffic monitoring thru the border router • Flow data generates daily & hourly Top 20 reports on: • Top talkers, top listeners, top conversations • Breakouts by number of flows, bytes, or packets • Primarily checking for: • Unusual consumption of network resources • Unusual traffic patterns • Large numbers of offsite hosts contacted • Large amounts of data transferred

  20. Border Router Network Blocks • Border Router static blocks: • Exceptions to inbound default-allow • Netbios • IRC • Web Servers require exception • Autoblocker: • Based on quasi-realtime flow record analysis • Blocks “greedy” users (perceived as scanners…) • Automated unblocked after behavior stops • Occasionally blocks “greedy”, but real applications • New version should minimize those disruptions

  21. Internal Network Blocks • DHCP service: • When requested by Computer Security Team (CST) • Typically to isolate a vulnerable or infected system • Unblocked only upon approval from CST • For network Infractions – excessive use, restricted central service • Unblocked when corrected • Static IP address internal block: • Normally at the request of CST • Unblocked only after approval from CST

  22. Internal Network Blocks (cont) • MAC address black-hole • Implemented on local switch • At request of FCIRT – during an incident • Unblocked at request of FCIRT • Network Infractions – illegal IP address use, excessive use, restricted central service • Unblocked when corrected • Switch port block • Occasionally used for expedient network disconnect • Too easy to get around • Can affect other users/systems on same switch port

  23. Helpful Links • Network info available on Data Comm web site • http://www-dcn.fnal.gov/ • Network Stats: • http://fndcg0.fnal.gov/~netadmin/onsite/stats.html • Node Locator: to find point-of-attachment & associated switch traffic graphs • NDT Tester: useful in testing for connectivity/duplex problems • Trouble Reporting – x2345 – helpdesk

  24. Questions… ?

More Related