130 likes | 257 Views
The latest announcements from the TSAG meeting on February 13, 2003, include the rollout of a self-service account utility, disaster recovery testing on February 18-19, and important updates on email infrastructure and security enhancements. The meeting covered vital topics such as Microsoft licensing changes, cyber-attack response strategies, and infrastructure updates for various campus services. Additionally, the schedule for the mainframe migration and project timelines was discussed, as well as the implementation of security standards to protect campus systems.
E N D
Technology Update TSAG Meeting 2/13/03
Announcements: • Self-Service Account Utility Available http://www.csun.edu/account • Disaster Recovery Test: • (2/18-19) Networking Infrastructure: DNS, DHCP, Authentication (Radius & Directory) • (3/?) E-mail Infrastructure: • SIMSR Security Enhancement (2/18) VPN required for off-campus desktops • Directory Authentication for Peoplesoft HR/FN (1/13 => 2/19) • Campus UID, E-mail Address, or Peoplesoft Operator ID • Password resets handled by University Helpdesk and PS Helpdesk • SMTP Authentication (3/1) • Disk (Email and Data) Quotas (4/15) • Voice/IP Change Over (1/18-20 => 3/29-31) • Mainframe Shutdown (6/30)
Agenda • CATS Conference (Gail Johnson) • Voice/IP Update (Greg Nicols) • TII Update (Bonnie Davis) • Mainframe Status (Don Foster) • Microsoft Licensing Changes (Kurt Webb) • IDS (Greg Duhon [Out Sick]) • Discussion on Slammer and Securing the Campus (Staff) • Presentation by Epson vendor (Charles Barnston)
Call Accounting 911 Server
Call Accounting 911 Server
TII Update (Stage 2) • Stage 2: replacement of network electronics • Project/schedule negotiated between CO and SBC • Currently, all work is to be performed between 6:00am and 6:00pm • Little wiggle room exists in the schedule • Schedule Overview: • Core is complete • Building start: March 2002 (Sequoia, Sierra, Manz., ArtDesign) • Building stop: Dec 2002 • Local meetings will be held ~1 month before start of deployment
Mainframe Status • Approximately, 50% of the applications have been migrated off. • 2000 user accounts 50-100 daily users • 134 remaining apps 16 appear active • All apps must be removed by June 30 • Local units are responsible to identify and to migrated their applications off • More info is needed: • A meeting can be arranged to work out details • Contact point: Don (x 5215)
Microsoft Licensing Changes • New contract CSU-wide contract (effective 1/1/03) • Information on the processes, etc., is still being ferreted out • Four separate processes and licensing categories: • On Campus installations: should be performed via TSAG members or ITR/TES via a TSR • Home installations or the WAH (Work At Home) provision: software purchased via “ASAP” • Students: software purchased at Bookstore • Server Software: obtained via CSU ITAC members (for our campus it’s the CIO) • Stay tuned for Keys, CDs, and more information
Cyber Attack: SQL Slammer • Primary Application Affected: MS SQL Server • Three Vulnerabilities: • Buffer overruns (stack and heap), and • DoS (keep alive packet exchange) • Server Resolution Service (port1434/UDP) (Port 1433/TCP is the default server port) • Affected Campus Servers: 6 (1+5) • Local Resource Costs: • Loss of Services • Campus Network [~3 days] • Functionality of several servers • Time of Campus IT Staff http://www.microsoft.com/technet/
Discussion on Slammer (I) • Could we (the Campus) have avoided this attack from affecting on-campus systems or services? • Could we have minimized the affects of this attack on the Campus? • Could we have eliminated CSUN's participation in the attack? • Could we have recovered more quickly from this attack?
Discussion on Slammer (II) • What controls/standards should have been in place prior to the attack? • What are the precursory steps that should have been taken in preparation for the attack? • What immediate steps should we taken to react to an attack?
Desktop/OS/Application Standards • Why Standards? • To reduce the complexity of the system • To ensure the Campus community uses the appropriate technology to support the work of the students, faculty, and staff via a secure, reliable method. • To educate the faculty and administration on the rational of the standards and gain support • To develop transition plans (locally and campus-wide) to adopt new and phase-out old technology • TSAG’s task/role? • Develop and recommend standards and best practices • One size will not fit all! • How does TSAG want to self-organize its structure
Next Round of ACLs • Block all outbound “Well Known Ports” (0 - 1024) • except: ftp(20,21[989,990]), ssh(22), telnet(23,[992]),http(80[443]) • Block all inbound to subnets 128-255 • except for registered Internet Servers • affected areas: • Sierra Tower, Jerome Richfield • DMJM Trailers, Student Services Bldg • University Student Union Sagebrush Hall • H-Complex Bank Building • PE, Athletics, Bldgs T, S, & O • Oviatt Library Science Buildings • Retain blocks on 1433 and 1434 • We routinely block attacking Class C networks