[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
draft-ietf-grip-isp-04.txt now available
- To: grip-wg@UU.NET, Barbara Fraser <byf@cert.org>
- Subject: draft-ietf-grip-isp-04.txt now available
- From: Tom Killalea <tomk@nw.verio.net>
- Date: Thu, 12 Mar 1998 13:51:38 -0800
- Comment: grip-wg mailing list add/drop requests to Majordomo@TransSys.COM
I've submitted a very slightly revised draft to Internet-drafts, and I
append it below.
This revision only changes the references to internet-drafts, each of
which is replaced by a reference to 'work in progress'.
So now it's ready for Barbara to submit to the IESG.
Tom.
--
Tom Killalea (425) 649-7417 Verio Northwest
tomk@nw.verio.net
Internet Engineering Task Force Tom Killalea
INTERNET-DRAFT Verio Northwest
Valid for six months March 1998
Security Expectations for Internet Service Providers
<draft-ietf-grip-isp-04.txt>
Status of this Memo
This document is an Internet Draft. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its Areas,
and its Working Groups. Note that other groups may also distribute
working documents as Internet Drafts. This Internet Draft is a
product of the GRIP Working Group of the IETF.
Internet Drafts are draft documents valid for a maximum of six
months. Internet Drafts may be updated, replaced, or obsoleted by
other documents at any time. It is not appropriate to use Internet
Drafts as reference material or to cite them other than as a
To learn the current status of any Internet Draft, please check the
directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),
munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or
ftp.isi.edu (US West Coast).
Copyright Notice
Copyright (C) The Internet Society (1998). All Rights Reserved.
Abstract
The purpose of this document is to express the general Internet
community's expectations of Internet Service Providers (ISPs) with
respect to security.
It is not the intent of this document to define a set of requirements
that would be appropriate for all ISPs, but rather to raise awareness
among ISPs of the community's expectations, and to provide the
community with a framework for discussion of security expectations
with current and prospective service providers.
Killalea [Page 1]
Internet Draft Security Expectations for ISPs 12 March 1998
Table of Contents
1 Introduction
1.1 Conventions Used in this Document
2 Incident Response
2.1 ISPs and Security Incident Response Teams (SIRTs)
2.2 Assistance with Inbound Security Incidents
2.3 Assistance with Outbound or Transit Security Incidents
2.4 Notification of Vulnerabilities and Reporting Incidents
2.5 Contact Information
2.6 Communication and Authentication
3 Appropriate Use Policy
3.1 Announcement of Policy
3.2 Sanctions
4 Protection of the Community
4.1 Cooperation
4.2 Data Protection
4.3 Training
4.4 Registry Data Maintenance
5 Network Infrastructure
5.1 Routers
5.2 Switches, Terminal Servers, Modems and other Network Devices
5.3 Anonymous telnet and other unlogged connections
5.4 The Network Operation Centre (NOC) and Network Management
5.5 Physical Security
5.6 Routing Infrastructure
5.7 Ingress Filtering on Source Address
5.8 Egress Filtering on Source Address
5.9 Route Filtering
5.10 Directed Broadcast
6 Systems Infrastructure
6.1 Policy
6.2 System Management
6.3 Backup
6.4 Software Distribution
7 Domain Name Service (DNS)
7.1 DNS Server Management
7.2 Authoritative Domain Name Service
7.3 Resolution Service
8 Email and Mail Services
8.1 Mail Server Administration
Killalea [Page 2]
Internet Draft Security Expectations for ISPs 12 March 1998
8.2 Secure Mail
8.3 Open Mail Relay
8.4 Message Submission
8.5 POP and IMAP Services
9 News Service (NNTP)
9.1 News Server Administration
9.2 Article Submission
9.3 Control Messages
9.4 Newsfeed Filters
10 Web-related Services
10.1 Webhosting Server Administration
10.2 Server Side Programs
10.3 Data and Databases
10.4 Logs and Statistics Reporting
10.5 Push and Streaming Services
10.6 Commerce
10.7 Content Loading and Distributed Authoring
10.8 Search Engines and other tools
11 References
12 Acknowledgements
13 Security Considerations
14 Author's Address
15 Full Copyright Statement
1 Introduction
The purpose of this document is to express the general Internet
community's expectations of Internet Service Providers (ISPs) with
respect to security.
A goal is that customers could have a framework to facilitate the
discussion of security with prospective service providers;
regrettably, such a discussion rarely takes place today.
Additionally, in informing ISPs of what the community hopes and
expects of them, a further goal is to encourage ISPs to become
proactive in making security not only a priority, but something to
which they point with pride when selling their services.
This document is addressed to Internet service purchasing decision-
Killalea [Page 3]
Internet Draft Security Expectations for ISPs 12 March 1998
makers (customers) and ISPs.
It has been argued that vendors begin to care about security only
when prompted by customers. I hope that this document will encourage
both parties to more readily express how much they care about
security, and that discussion between the community and its ISPs will
be increased.
1.1 Conventions Used in this Document
The key words "REQUIRED", "MUST", "MUST NOT", "SHOULD", "SHOULD NOT",
and "MAY" in this document are to be interpreted as described in "Key
words for use in RFCs to Indicate Requirement Levels" [RFC2119].
2 Incident Response
A Security Incident Response Team (SIRT) is a team that performs,
coordinates, and supports the response to security incidents that
involve sites within a defined constituency. The Internet
community's expectations of SIRTs are described in a work in progress
called "Expectations for Security Incident Response".
2.1 ISPs and Security Incident Response Teams (SIRTs)
Some ISPs have SIRTs. However it should not be assumed that either
the ISP's connectivity customers or a site being attacked by a
customer of that ISP can automatically avail of the services of the
ISP's SIRT. ISP SIRTs are frequently provided as an added-cost
service, with the team defining as their constituency only those who
specifically subscribe to (and perhaps pay for) Incident Response
services.
Thus it's important to determine what incident response and security
resources are available to you, and define your incident response
escalation chain BEFORE an incident occurs.
Customers should find out if their ISP has a SIRT, and if so what the
charter, policies and services of that team are. This information is
best expressed using the SIRT template as shown in Appendix D of the
work in progress called "Expectations for Security Incident
Response". If the ISP doesn't have a SIRT they SHOULD describe what
role if any they will take in incident response, and SHOULD indicate
if there is any SIRT whose constituency would include the customer
and to whom incidents could be reported.
Killalea [Page 4]
Internet Draft Security Expectations for ISPs 12 March 1998
2.2 Assistance with Inbound Security Incidents
When a security incident targeting one of their connectivity
customers occurs ISPs SHOULD inform the customer of the attack, and
provide assistance to
- trace the 'apparent' origin of the attack and attempt to
determine the veracity of each step in the path (keeping in
mind that the source address may be spoofed). In cases where
the source address is spoofed the ISP could trace the point
at which the bogusly addressed traffic entered the ISP's
network.
- obtain contact information for the source of the attack using
whois [RFC1834 and RFC1835], the DNS [RFC1034 and RFC1035] or
relevant common mailbox names [RFC2142].
- collect and protect evidence of the incident and guard against
its destruction or unintentional announcement.
If the event continues then, at the customer's request, ISPs may also
assist by logging in order to further diagnose the problem, or by
filtering certain types of traffic.
2.3 Assistance with Outbound or Transit Security Incidents
In the case where one of their connectivity customers appears to be
the source of a security incident an ISP will frequently be
contacted. Once the ISP is satisfied as to the authenticity of the
report, they should provide contact information so that the
administrators at the source site can be reached by the target site.
An ISP may also be contacted to assist with incidents that traverse
their network but use bogus source addresses, such as SYN flooding
attacks [CA-96.21.tcp_syn_flooding]. Assistance in this case would
consist of using network traces on a hop by hop basis to identify the
point at which the bogusly addressed traffic entered the ISP's
network. In tracing such incidents it's frequently necessary to
coordinating with adjacent ISPs to form a complete chain of response
teams along the path of the attack.
2.4 Notification of Vulnerabilities and Reporting of Incidents
ISPs should be proactive in notifying customers of security
vulnerabilities in the services they provide. In addition, as new
vulnerabilities in systems and software are discovered they should
Killalea [Page 5]
Internet Draft Security Expectations for ISPs 12 March 1998
indicate whether their services are threatened by these risks.
When security incidents occur that affect components of an ISP's
infrastructure the ISP SHOULD promptly report to their customers
- who is coordinating response to the incident
- the vulnerability
- how service was affected
- what is being done to respond to the incident
- whether customer data may have been compromised
- what is being done to eliminate the vulnerability
- the expected schedule for response, assuming it can be
predicted
2.5 Contact Information
[RFC2142] states that sites (including ISPs) must maintain a mailbox
called SECURITY for network security issues, ABUSE for issues
relating to inappropriate public behaviour and NOC for issues
relating to network infrastructure. It also lists additional
mailboxes that are defined for receiving queries and reports relating
to specific services.
ISPs should consider using common URLs for expanded details on the
above (e.g., http://www.ISP-name-here.net/security/).
In addition, ISPs have a duty to make sure that their contact
information, in Whois, in the routing registry [RFC1786] or in any
other repository, is complete, accurate and reachable.
2.6 Communication and Authentication
ISPs SHOULD have clear policies and procedures on the sharing of
information about a security incident with their customers, with
other ISPs or SIRTs, with law enforcement or with the press and
general public.
ISPs SHOULD also be able to conduct such communication over a secure
channel. I recognise that in some jurisdictions secure channels
might not be permitted.
Killalea [Page 6]
Internet Draft Security Expectations for ISPs 12 March 1998
3 Appropriate Use Policy
An Appropriate Use Policy (AUP) SHOULD clearly identify what
customers shall and shall not do on the various components of a
system or network, including the type of traffic allowed on the
networks. The AUP should be as explicit as possible to avoid
ambiguity or misunderstanding.
Whenever an ISP contracts with a customer to provide connectivity to
the Internet that contract SHOULD be governed by an AUP. The AUP
should be reviewed each time the contract is up for renewal, and in
addition the ISP should proactively notify customers as policies are
updated.
3.1 Announcement of Policy
In addition to communicating their AUP to their customers ISPs should
publish their policy in a public place such as their web site so that
the community can be aware of what the ISP considers appropriate and
can know what action to expect in the event of inappropriate
behaviour.
3.2 Sanctions
An AUP should be clear in stating what sanctions will be enforced in
the event of inappropriate behaviour, and ISPs should be forthcoming
in announcing to the community when such sanctions are imposed.
4 Protection of the Community
ISPs play a crucial role in helping to improve the security of the
Internet. This and following sections describe a number of issues
which, should they be addressed by ISPs in a coordinated and timely
way, would have a very positive effect on the security of the
network, and would make it much more difficult for the perpetrators
to cover their tracks.
Later sections cover in some detail issues related to specific
services such as ingress filtering and open mail relays. Such issues,
if addressed by all the ISPs in a concerted way, could have a very
positive effect.
4.1 Cooperation
Killalea [Page 7]
Internet Draft Security Expectations for ISPs 12 March 1998
This section is about protecting the community. This requires that
we as a community work together to that end. It's worth observing
that many of the most significant successes in securing the Internet
could not have been achieved by anyone acting alone.
Cooperation should be put on legal ground. For example prior to
entering into peering agreements ISPs should specify the steps they
will take to cooperatively track security incidents that involve both
peers.
4.2 Data Protection
Many jurisdictions have the good fortune to have Data Protection
Legislation. Where such legislation exists ISPs should consider the
personal data they hold and, if necessary, register themselves as
Data Controllers and be prepared to make data available according to
the terms of the legislation. Given the global nature of the
Internet ISPs that are located where no such legislation exists
should at least familiarise themselves with their responsibilities by
reading a Data Protection Act (e.g., [DPR1984]).
4.3 Training
It's important that all ISP staff be trained to be security-conscious
at all times and to be able to make appropriate use of tools that
enhance security. Some issues that they should be particularly aware
of include the use of secure channels for confidential information,
the risk of attacks that use social engineering, management of data
used for authentication, and so on.
4.4 Registry Data Maintenance
ISPs are commonly responsible for maintaining the data that is stored
in global repositories such as the Internet Routing Registry (IRR)
and the APNIC, InterNIC and RIPE databases. Updates to this data
should only be possible using strong authentication.
5 Network Infrastructure
ISPs are responsible for managing the network infrastructure of the
Internet in such a way that it is
- reasonably resistant to known security vulnerabilities
Killalea [Page 8]
Internet Draft Security Expectations for ISPs 12 March 1998
- not easily hijacked by attackers for use in subsequent attacks
5.1 Routers
Routers are an excellent platform from which to launch a security
attack, as well as being attractive targets of themselves.
Many routers allow an attacker to do dangerous things such as:
- sniff transit traffic
- manipulate routing tables to redirect traffic
- manipulate interface states to disrupt service
- create routing flaps which could potentially cause Denial of
Service for large parts of the Internet
- create packets with spoofed addresses, and with any desired flags
set
- initiate ICMP packet storms and other Denial of Service attacks
- 'black hole' traffic (e.g., by holding a local route to a null or
invalid interface, by holding a local route to an invalid
next-hop (one which does not itself have a corresponding route,
and does not have a default), or worst yet, by using a dynamic
routing protocol to advertise availability of a low-cost route
and thus actively drawing traffic toward the black hole)
- launder connections to third-party destinations, facilitated by
the router's lack of logging
Such threats are amplified because of the central part in the
networking infrastructure that routers occupy, and the large
bandwidth frequently available to them.
So access to routers SHOULD be based on one-time passwords or better
(e.g., Kerberos) and should be as restricted as possible.
Sessions SHOULD be encrypted to prevent sessions or data from being
stolen and to avoid replay attacks.
Routers SHOULD NOT run the 'small services', which are often enabled
by default. These may include bootp, chargen, daytime, discard, echo
and finger.
Killalea [Page 9]
Internet Draft Security Expectations for ISPs 12 March 1998
5.2 Switches, Terminal Servers, Modems and other Network Devices
ISPs should be similarly vigilant in their configuration of other
network devices. Unfortunately many such devices deployed in the
field support only minimal authentication, do authorisation on an
all-or-nothing basis and do little or no logging. In the past ISPs
have been left with no trail to follow after their switches were
reconfigured, their terminal servers were used to launch attacks on
third parties or their Uninterruptable Power Supplies were shut down.
Where possible access to such devices should be restricted only to
legitimate network administrators.
Network infrastructure devices frequently don't support extensive
internal logging because they have no long-term storage, like hosts'
hard drives. Many support syslog or SNMP traps however, or at least
a short internal event log or debugging mode which can be captured
through the console or a remote login session.
Router or switch configurations should always be maintained on a tftp
server, so that they can be restored to previous configuration easily
and quickly. These backup configurations should obviously be
protected so that they cannot be tftp'd by unauthorised parties, or
overwritten with new bogus configurations.
5.3 Anonymous telnet and other unlogged connections
There are many network devices ranging from low-end routers to
printers that accept telnet connections without prompting for a
password. Obviously such devices, many of which don't maintain audit
trails, are very popular among attackers who wish to cover their
tracks.
If ISPs have such devices on their own network they should restrict
access to them. In addition, they should work with their customers
to block access to such devices from outside of the customer's
network.
The use of telnet to manage network elements is strongly discouraged.
5.4 The Network Operation Centre (NOC) and Network Management
A NOC is a crucial part of an ISP's infrastructure, and should be
operated with appropriate regard to security.
A NOC frequently has management control over the configuration
Killalea [Page 10]
Internet Draft Security Expectations for ISPs 12 March 1998
information of network devices, and should be vigilant in restricting
access to that information. Loading of configuration information
into network devices is still frequently done using the TFTP protocol
[RFC1350], which not only lacks authentication and uses an insecure
channel, but calls for great care in configuration at the server end
[CA-91:18.Active.Internet.tftp.Attacks].
A NOC will generally perform a network monitoring function by polling
(e.g., with ICMP Echo) a set of network devices periodically. In
selecting the set of devices to be polled the crucial role of the
devices in 5.2 shouldn't be overlooked.
Beyond simple polling a NOC will also use a network management
protocol such as SNMP to communicate with network devices. Usually
this will be used to 'get' the value of various variables, such as
the number of packets received on a particular interface. However
the protocol can be used to 'set' variables, perhaps with serious
results (e.g., the device can be reconfigured). In any case, SNMPv1
uses only trivial authentication. Where possible SNMP should be used
as a read-only tool to 'get' information from remote devices, and the
information gotten should be treated as confidential.
A further use of SNMP is in trap reporting, whereby a management
station is notified when certain exceptions occur. This information
should also be considered confidential, and the NOC should take care
that such trap reporting cannot of itself become a Denial of Service
attack.
5.5 Physical Security
The physical security of every installation should be given
appropriate consideration. This is particularly so for co-located
facilities to which people from different organisations and with
different security policies have access.
Three types of co-location arrangements are of particular interest:
- customers co-locating equipment at an ISP's facility
- ISPs co-locating equipment at an external facility with
authorised 'remote hands'
- ISPs co-locating equipment at an external facility with no
authorised physical access
The first case is most likely to directly concern the customer. If
an ISP has a co-location facility for the hosting of customer-owned
Killalea [Page 11]
Internet Draft Security Expectations for ISPs 12 March 1998
equipment many issues arise surrounding customer access to their co-
located equipment.
Ideally every customer SHOULD have a fully enclosed locking 'cage',
akin to a small room with walls and ceiling of heavy wire mesh
fencing, containing the racks in which their equipment is mounted.
Customers are allowed access to their own cage under escort by one of
the ISP's employees, or with keys that grant access specifically to
their cage.
This assignment of separate cages is expensive in terms of space
however, so many ISPs compromise by putting all co-located equipment
together in a single machine room, and managing the actions of
escorted customers very closely. However this may be insufficient to
prevent mishaps such as the accidental disconnection of another
customer's equipment. If a single machine room is used then the ISP
SHOULD provide separate locking cabinets for each co-location
customer in preferance to an
A customer SHOULD always be supervised while in the physical presence
of any equipment that is not their own, and SHOULD NOT be allowed to
touch, photograph, or examine equipment belonging to another
customer.
Also of concern is layer 2 security of co-located equipment. Customer
equipment SHOULD NOT be allowed to share a physical network segment
with hosts belonging to anyone else, whether another customer or the
ISP themselves. It's common for crackers to exploit weak security or
unencrypted remote logins on co-located customer-owned equipment to
take control of that equipment and put it into promiscuous listening
mode on the local network segment, thereby potentially compromising
the privacy and security of any other devices on that segment.
When ISPs co-locate network infrastructure components outside of
their own premises, such as at peering points or remote POPs,
security considerations are extremely important. These locations
often play a pivotal role in the network topology, and may be
particular targets for attack or vulnerable to accidents. Equipment
SHOULD ideally be fully enclosed in locking cabinets or cages to
limit physical access. If on-site spares are kept, they should
likewise be protected from tampering. Whenever possible, security
systems and logging card-swipe locks should be employed.
Installations should be inspected periodically for the addition of
unauthorised equipment which might be used to 'tap' a connection. As
with any other facility, hosts SHOULD NOT be attached to transit
segments, and hosts should never have unused physical interfaces
attached to network segments.
Killalea [Page 12]
Internet Draft Security Expectations for ISPs 12 March 1998
5.6 Routing Infrastructure
An ISP's ability to route traffic to the correct destination depends
on routing policy as configured in the routing registries [RFC1786].
ISPs SHOULD ensure that the registry information that they maintain
can only be updated using strong authentication, and that the
authority to make updates is appropriately restricted.
Due care should also be taken in determining in whose routing
announcements you place greater trust when a choice of routes are
available to a destination. In the past bogus announcements have
resulted in traffic being 'black holed', or worse, hijacked. BGP
authentication SHOULD be used with routing peers.
The internal routing protocol that an ISP uses should be chosen with
security in mind. It should not be configured with the assumption
that route recalculations are rare and expensive as this would leave
the way open for a Denial of Service attack. Routing updates should
use the highest level of authentication supported by the internal
routing protocol.
If more specific routes to parts of the ISP's allocated address space
are heard from external peers then the ISP needs to be judicious in
deciding whether to accept the announcement. Only ISPs who have
allowed their CIDR address allocations to become fragmented (by
allowing customers to take addressess with them when they change
providers) have to face this decision.
5.7 Ingress Filtering on Source Address
The direction of such filtering is from the edge site (customer) to
the Internet.
Attackers frequently cover their tracks by using forged source
addresses. To divert attention from their own site the source
address they choose will generally be from an innocent remote site or
indeed from those addresses that are allocated for private Internets
[RFC1918]. In addition, forged source addresses are frequently used
in spoof-based attacks in order to exploit a trust relationship
between hosts.
To reduce the incidence of attacks that rely on forged source
addresses ISPs should do the following. At the boundary router with
each of their customers they SHOULD proactively filter all traffic
coming from the customer that has a source address of something other
than the addresses that have been assigned to that customer. For a
more detailed discussion of this topic see [RFC2267].
Killalea [Page 13]
Internet Draft Security Expectations for ISPs 12 March 1998
There are (rare) circumstances where ingress filtering is not
currently possible, for example on large aggregation routers that
cannot take the additional load of applying packet filters. In
addition, such filtering can cause difficulty for mobile users.
Hence, while the use of this technique to prevent spoofing is
strongly encouraged, I realise that it is not always feasible.
In these rare cases where ingress filtering at the interface between
the customer and the ISP is not possible, the customer should be
encouraged to implement ingress filtering within their networks. In
general filtering should be done as close to the actual hosts as
possible.
5.8 Egress Filtering on Source Address
The direction of such filtering is from the Internet to the edge site
(customer).
There are many applications in widespread use on the Internet today
that grant trust to other hosts based only on ip address (e.g., the
Berkeley 'r' commands). These are susceptible to IP spoofing, as
described in [CA-95.01.IP.spoofing]. In addition, there are
vulnerabilities that depend on the misuse of supposedly locally
addresses, such as 'land' as described in [CA-97.28.Teardrop_Land].
To reduce the exposure of their customers to attacks that rely on
forged source addresses ISPs should do the following. At the
boundary router with each of their customers they SHOULD proactively
filter all traffic going to the customer that has a source address of
any of the addresses that have been assigned to that customer.
The circumstances described in 5.7 in which ingress filtering isn't
feasible similarly apply to egress filtering.
5.9 Route Filtering
Excessive routing updates can be leveraged by an attacker as a base
load on which to build a Denial of Service attack. At the very least
they will result in performance degradation.
ISPs SHOULD filter the routing announcements they hear, for example
to ignore routes to addresses allocated for private Internets, to
avoid bogus routes and to implement route dampening and aggregation
policy.
ISPs SHOULD implement techniques that reduce the risk of putting
Killalea [Page 14]
Internet Draft Security Expectations for ISPs 12 March 1998
excessive load on routing in other parts of the network. These
include 'nailed up' routes, aggressive aggregation and route
dampening, all of which lower the impact on others when your internal
routing changes in a way that isn't relevant to them.
5.10 Directed Broadcast
The IP protocol allows for directed broadcast, the sending of a
packet across the network to be broadcast on to a specific subnet.
Very few practical uses for this feature exist, but several different
security attacks (primarily Denial of Service attacks making use of
the packet multiplication effect of the broadcast) use it.
Therefore, routers connected to a broadcast medium SHOULD NOT be
configured to allow directed broadcasts onto that medium.
If it is a packet to which the router would respond if received as a
unicast, it MAY send a (single) response. If it is not responding
(either because it's not appropriate, or has been configured not to)
it MAY send an ICMP error. It is also appropriate to silently
discard such packets. In any case such packets SHOULD be counted to
detect possible attempts to abuse this feature.
6 Systems Infrastructure
The way an ISP manages their systems is crucial to the security and
reliability of their network. A breach of their systems may
minimally lead to degraded performance or functionality, but could
lead to loss of data or the risk of traffic being eavesdropped (thus
leading to 'man-in-the-middle' attacks).
In general a 'horses for courses' approach to the provision of
systems services should be adopted (i.e., separate systems should be
used to deliver each distinct service). Apart from the benefits that
accrue in terms of easing systems administration it's widely
acknowledged that it's much easier to build secure systems if
different services (such as mail, news and web-hosting) are kept on
separate systems.
6.1 Policy
An ISP's policy with regard to privacy, authentication,
accountability, application of security patches, availability and
violations reporting should all be of interest to their customers,
and should be published in a public place such as the ISP's web site.
Killalea [Page 15]
Internet Draft Security Expectations for ISPs 12 March 1998
A more detailed discussion of Security Policy can be found in the
Site Security Handbook [RFC2196].
6.2 System Management
All systems that perform critical ISP functions such as mail, news
and web-hosting, should be restricted such that access to them is
only available to the administrators of those services. That access
should be granted only following strong authentication, and should
take place over an encrypted link. Only the ports on which those
services listen should be reachable from outside of the ISP's systems
networks.
If the ISP provides login accounts to customers then the systems that
support this service should be isolated from the rest of the ISP's
systems networks.
If applications such as rdist are used for software distribution and
synchronisation then they should be used over a secure channel and
with strong authentication, for example over Secure Shell (ssh)
[SSH1997].
A system SHOULD NOT be attached to transit segments.
If reusable passwords are permitted then users should be educated
about how to choose and care for a password, and proactive password
checks, password aging and password guessers should be employed.
6.3 Backup
The importance of backups need not be stressed here. However backups
can become the weakest link in a system's security if appropriate
care isn't taken of backup media.
If backups are done across the network then a secure channel should
be used. If volumes are dumped to staging disks during the backup
process then access to the images on those staging disks should be as
restricted as possible.
Backups take on additional significance as audit data following a
security incident.
Ageing backup media should be destroyed rather than discarded.
6.4 Software Distribution
Killalea [Page 16]
Internet Draft Security Expectations for ISPs 12 March 1998
ISPs frequently engage in application software distribution. The
integrity of the software should be assured by distributing with it a
checksum that has been produced with a strong digest function such as
SHA-1 [SHA].
7 Domain Name Service (DNS)
The DNS is critical to the daily activities of millions of Internet
users. Regrettably applications have frequently placed blind trust
in the information contained in the DNS, and in the availability of
the DNS. However prior to DNSSEC [RFC2065] the DNS protocol lacked
security, while widely used implementations of the DNS protocol
contain further severe vulnerabilities [VIX1995].
While this section indicates some methods in which the DNS can be
made more trustworthy and reliable it cannot be stressed too strongly
that name based authentication is inherently insecure.
7.1 DNS Server Administration
In addition to issues raised in section 6 ISPs will need to address
the following issues in administering their DNS servers:
- Service Monitoring.
The service availability (ability to answer queries) should be
monitored.
- Clock synchronisation.
Servers should synchronise their clocks using the NTP protocol
[RFC1305] with authentication. At least two NTP servers should
be used.
7.2 Authoritative Domain Name Service
An Authoritative Server is one that knows the content of a DNS zone
from local knowledge, and thus can answer queries about that zone
without needing to query other servers. Customers should consider
[RFC2182] when choosing secondary DNS servers.
ISPs commonly operate as secondary (or slave) servers for their
customers, and these servers may provide service for thousands of
zones. Regardless of the number of zones, administrators of these
servers should be familiar with the Operational Criteria for Root
Name Servers [RFC2010], and in particular should follow these
guidelines:
Killalea [Page 17]
Internet Draft Security Expectations for ISPs 12 March 1998
- Recursion should be disabled for queries.
- Zone transfer should be restricted.
Apart from the significant load presented by zone transfer
with resultant exposure to Denial of Service attacks, ISPs
should recognise that some of their customers will consider the
contents of their zone files to be private.
- Performance Monitoring.
Key variables such as queries per second and average latency
should be monitored.
7.3 Resolution Service
ISPs commonly operate DNS resolution service for their customers. In
this scenario customers configure their DNS resolver (client) to
resolve queries from the ISP's DNS resolution servers. For
resolution servers ISPs should follow these guidelines:
- Recursion must be enabled for queries.
An implication is that ISPs should not use the same servers for
resolution service and authoritative DNS service.
- Zone transfer should be disallowed.
Even though there may be no zones to transfer, allowing zone
transfers would expose the servers to Denial of Service attacks.
- Performance Monitoring.
Key variables such as queries per second and average latency
should be monitored. In addition, the hosts generating the
highest number of requests should be periodically reported.
- Name server software.
A name server package should be run that is not vulnerable to
server cache poisoning where malicious or misleading data
received from a remote name server is cached and is then made
available to resolvers that request the cached data.
8 Email and Mail Services
Email has been the target of some of the most widely reported
security attacks, as well as thousands of juvenile hoaxes and pranks.
ISPs have a major role in protecting the community from abuse and in
educating their customers in appropriate technologies and in
appropriate uses of the technology.
Killalea [Page 18]
Internet Draft Security Expectations for ISPs 12 March 1998
8.1 Mail Server Administration
In configuring mail servers ISPs should follow these guidelines:
- Mail software.
If possible software that uses a separate receiving/sending agent
and a processing agent should be used. A goal is that the
receiving/sending agent, which interfaces with remote mail
servers, can be run with reduced privilege.
- Restrict remote message queue starting.
On-demand queue runs (to facilitate customers who receive mail at
their own domain and don't have permanent connections) should be
restricted, preferably using a strong authentication mechanism.
Remote message queue starting is implemented using a variety of
mechanisms, one of which is the ETRN SMTP service extension as
described in [RFC1985].
- Disable VRFY and EXPN.
No more should be revealed about local users or delivery
mechanisms than is necessary.
- Clock synchronisation.
Servers should synchronise their clocks using the NTP protocol
[RFC1305] with authentication. At least two NTP servers should
be used.
- Exception Reporting.
Exceptional conditions such as repeated authentication failures,
mail loops and abnormal queue length should be trapped and
reported.
- Restrict Access to mail logs.
Mail logs should only be readable by system administrators.
8.2 Secure Mail
As indicated in 2.6, It's critical that ISPs, and in particular their
Security Incident Response personnel, have access to tools that allow
them to exchange email securely.
8.3 Open Mail Relay
An SMTP mail server is said to be running as an 'open' mail relay if
it is willing to accept and relay to non-local destinations mail
messages that do not originate locally (i.e., neither the originator
Killalea [Page 19]
Internet Draft Security Expectations for ISPs 12 March 1998
nor the recipient address is local). Such open relays are frequently
used by 'spammers' to inject their Unsolicited Bulk E-mail (UBE)
while hiding their identity. There are very limited cases in which
an administrator can make a justifiable case for leaving a mail relay
on the Internet completely open.
The processes for restricting relaying are well documented. It's
regrettable that some major software vendors ship their Message
Transfer Agents (MTAs) with relaying open by default.
While this is an issue for the whole community, ISPs SHOULD be
particularly vigilant in disabling open relaying on mail servers that
they manage because their high-bandwidth connectivity makes them the
preferred injection point for UBE.
ISPs SHOULD also strongly encourage their customers to disable open
relaying on their mail servers. Sanctions for running an open mail
relay should be covered in an ISP's AUP.
8.4 Message Submission
To facilitate the enforcement of security policy message submission
should be done through the MAIL SUBMIT port (587) as proposed in the
work in progress called "Message Submission and Relay", rather than
through the SMTP port (25). In addition, message submissions should
be authenticated using the AUTH SMTP service extension as described
in the work in progess called "SMTP Service Extension for
Authentication". In this way the SMTP port (25) can be restricted to
local delivery only.
These two measures not only protect the ISP from serving as a UBE
injection point, but also help in tracking accountability for message
submission in the case where a customer sends UBE. Furthermore,
using the Submit port with SMTP AUTH has additional advantages over
IP address-based submission restrictions in that it gives the ISP's
customers the flexibility of being able to submit mail even when not
connected through the ISP's network (for example, while at work), is
more resistant to spoofing, and can be upgraded to newer
authentication mechanisms as they become available.
The (undocumented) XTND XMIT POP3 extension which allows clients to
send mail through the POP3 session rather than using SMTP may also be
considered. It also provides a way to support mobile users at sites
where open relaying is disabled, and has the benefit of an
authenticated connection and a better audit trail.
Killalea [Page 20]
Internet Draft Security Expectations for ISPs 12 March 1998
8.5 POP and IMAP Services
ISPs who provide POP or IMAP access to mailboxes to their customers
SHOULD, at a minimum, support the CRAM-MD5 [RFC2195] or APOP
[RFC1939] authentication mechanisms. Support for stronger mechanisms
should be considered, as should disabling plaintext (user/password)
authentication.
9 News Service (NNTP)
As in the case of SMTP, the NNTP protocol [RFC977] used by News
suffers from a lack of authentication, and so it's trivial to forge
news postings. Forgeries can bypass the moderation process, cancel
legitimate articles and create havoc for sites that maintain an
active file.
The lack of encryption in the protocol and the manner in which many
news systems are maintained lead to privacy issues in that it's easy
for others to detect what newsgroups and articles you are reading.
9.1 News Server Administration
In configuring news servers ISPs should follow these guidelines:
- News software.
A news software package should be run that is not vulnerable to
maliciously formed news control messages or buffer overflows.
- Disable other services.
Given news' propensity to consume all available disk space and
CPU cycles it's particularly important that news systems do not
perform other services.
- Do not interpret batches.
If incoming batches of articles are supported they should not
be fed to a command interpreter.
- Restrict Access to news logs.
News logs should only be readable by system administrators.
- Authenticate approved headers.
If possible support for cryptographic authentication of approved
messages should be supported, particularly in the case of group
control messages.
Killalea [Page 21]
Internet Draft Security Expectations for ISPs 12 March 1998
9.2 Article Submission
As many of the issues relating to open mail relays (8.3) apply to
news, ISPs should restrict article submission only to approved
customers. Further, the networks from which posting is allowed and
the newsgroups to which posting is allowed should be as restricted as
possible.
9.3 Control Messages
Control messages attempt to cause the news server to take action
beyond filing and passing on the article. Certain control messages,
because of the ease with which they can be forged, should be handled
with care. While it is up to the ISP to decide whether to take
action they must at least propagate control messages even if they do
not understand them.
- 'whogets', 'sendsys', 'version' should be ignored by ISPs.
- While 'cancel' messages must be acted on and propagated their
sheer volume can sometimes swamp service, and the fact that much
of that volume is computer-generated is worrying.
- Systems that require the maintenance of an active file should
exercise extreme caution in choosing which if any group control
messages (checkgroups, newgroup, rmgroup) should result in
action being taken.
9.4 Newsfeed Filters
The most obvious form of security problem with news is 'leakage' of
articles which are intended to have only restricted circulation. The
flooding algorithm is extremely good at finding any path by which
articles can leave a subnet with supposedly restrictive boundaries.
Substantial administrative effort is required to ensure that local
newsgroups remain local [SPE1994].
ISPs who provide customers with the ability to remotely manipulate
their inbound filters should use strong authentication for this
service.
ISPs should not propagate articles that are excessively crossposted.
10 or more cross-postings is widely agreed to be excessive.
ISPs should impose an upper limit on the article size that they will
propagate.
Killalea [Page 22]
Internet Draft Security Expectations for ISPs 12 March 1998
10 Web-hosting Services
Sites frequently choose to out-source the operation and
administration of their site to an ISP, and security is often a
prominent motivator for doing so. The hosting of such sites and
provision of related services is the subject of this section.
Further information on the topic can be found in [GAR1997] and
[HUG1995].
10.1 Webhosting Server Administration
In addition to issues raised in section 6 ISPs will need to address
the following issues in administering their web-hosting servers:
- Service Monitoring.
The service availability (ability to answer HTTP requests) should
be monitored.
- Clock synchronisation.
Servers should synchronise their clocks using the NTP protocol
[RFC1305] with authentication. At least two NTP servers should
be used.
- DNS.
DNS lookups should not be performed on web clients when they
connect because they expose the web servers to DNS-based Denial
of Service attacks, and they adversely affect performance.
- DocumentRoot.
Everything below this directory should be subject to the
strictest scrutiny.
- UserDir.
Users other than administrators should not be permitted on the
server. If users have accounts then the 'UserDir' directive, if
permitted, SHOULD NOT access their private accounts. In
particular, scripts SHOULD NOT be permitted to be run from their
accounts.
- Process User and Group.
The web daemon SHOULD be run as a user and group that is set up
specifically for that purpose, and that user/group should have
minimal privilege. This user should be different from the
maintainers of the web content.
- Partitioning of Virtual Sites.
A single server that hosts multiple sites (virtual domains)
Killalea [Page 23]
Internet Draft Security Expectations for ISPs 12 March 1998
SHOULD be set up such that all data, programs and logs for the
different sites are partitioned from each other such that no
access to the configuration or data of each other's sites is
possible. In addition, it should not be possible to access the
data or programs of one customer's site using a URL that has
the name of another customer's site in it's host part.
- Access Control.
Restricted access to certain parts of a site should be
facilitated using a strong authentication mechanism such as a
certificate or a one-time password device. An alternative is
to use well-chosen passwords in conjunction with SSL which at
least avoids passwords being passed across the network in
plaintext.
- Security Patches.
The stakes in running a web server are particularly high, so
administrators should be particularly vigilant in applying
security patches as they are released.
10.2 Server Side Programs
Server side programs such as those that use the Common Gateway
Interface (CGI) are crucial to the flexibility of the web as a
communications medium. However that flexibility introduces security
risks and a weak program threatens all of the virtual hosts on the
server that runs it. An ISP's policy with regard to what programs it
will allow is a good indicator of security policy in general.
ISPs should follow these guidelines on server side programs and CGIs:
- Security Policy.
ISPs should give their customers clear guidelines about how to
write secure programs for their hosting environment, and give
specific indications about what programming practices will result
in a program being rejected.
- Program Installation.
Customers should never be allowed to install their own programs.
All programs and scripts should be submitted to the ISP first to
be checked for conformance with security policy. The programs
SHOULD be installed such that only the server administrators have
permission to modify them.
- Process User and Group.
Programs SHOULD be run as a user and group that is set up
specifically for that purpose, and that user/group should have
Killalea [Page 24]
Internet Draft Security Expectations for ISPs 12 March 1998
minimal privilege (many sites use 'nobody').
- Display by Browsers.
Programs SHOULD never be allowed to be viewed by browsers. One
implication of that is that they SHOULD NOT be put under the
DocumentRoot.
- Partitioning of Virtual Sites.
Programs SHOULD NOT be accessible through the site of another
customer on the same server, or to the webmaster of that other
customer.
- User Input.
Expressions SHOULD NOT be evaluated based on user input except
when used with the equivalent of Perl's tainting features.
- Processing Limit.
All programs SHOULD have a limit set on real and CPU time, and on
the amount of disk space that they can consume.
- Paths.
All paths SHOULD be full or starting at DocumentRoot, and the
PATH variable should be set by the server administrator.
10.3 Data and Databases
Data that is written by server-side programs such as CGI scripts
should be considered confidential and to prevent them being read by
browsers their permission should be such that they're not readable by
the web daemon process.
If access to a back-end database is provided then programs that
facilitate such access should have the least privilege that is
absolutely necessary.
Data that relates to state management (cookies) that is stored on the
server should be considered confidential and should not be accessible
from browsers.
10.4 Logs and Statistics Reporting
The logs generated by the web daemon process can be useful from the
security viewpoint in providing an audit trail of site activity,
however their more common use is for billing and for market and site
analysis.
Killalea [Page 25]
Internet Draft Security Expectations for ISPs 12 March 1998
These logs should be considered highly confidential.
- The only manipulation of them done by the ISP should be that
which is necessary to generate billing information and
periodically rotate them.
- They should be stored outside of DocumentRoot to prevent access
by a browser to them.
- Access to them, whether in raw or summarised format, should be
provided to the customer over a secure channel.
10.5 Push and Streaming Services
ISPs frequently provide their customers with the ability to deliver
content using protocols other than HTTP. Where such add-on services
are provided, both the customer and the ISP should be aware of the
security implications of providing such services.
10.6 Commerce
Many ISPs set up the means whereby their customers can sell goods and
services through their web-hosted sites. Though a server that can
exchange information with a browser over SSL is sometimes described
as a 'secure server' this term can be misleading, and ISPs that host
commerce applications should consider the following:
- Encrypted Transactions.
Transactions should never be stored on the server in unencrypted
form. Public key cryptography should be used such that only the
customer can decrypt the transactions. Even when transactions
are passed directly to a financial institution and to the
customer some part of the transaction will have to be stored by
the ISP for audit trail purposes.
- Transaction Transfer.
If transactions are not processed immediately but instead are
transferred to the customer in batches then that transfer should
occur over a secure channel such as SSL and only after strong
authentication has taken place. Transaction files should be
carefully rotated so that every transaction occurs exactly once.
- Backups.
If transactions are written to backup media then the physical
security of the backup media should be assured.
Killalea [Page 26]
Internet Draft Security Expectations for ISPs 12 March 1998
10.7 Content Loading and Distributed Authoring
The loading of content onto the ISP's server should happen over a
secure channel.
If server support for Distributed Authoring tools is enabled, then
this should be administered with great care to ensure that strong
authentication takes place and that access is given only to the
customer's virtual site, and only to that customer's content
maintainer.
10.8 Search Engines and other tools
ISPs frequently install tools such as search engines, link checkers
and so on for use by their customers. Many such tools create a very
great processing overhead when run and so running them on-demand
should not be allowed to avoid Denial of Service attacks.
Search engines should be configured so that their searches are
restricted to those parts of a site that are available to all.
The output of link checkers should be considered confidential, and
should only be available to the content maintainer of the customer's
site.
11 References
[CA-91:18.Active.Internet.tftp.Attacks] "Active Internet tftp
Attacks", ftp://info.cert.org/pub/cert_advisories/
[CA-95.01.IP.spoofing] "IP Spoofing Attacks and Hijacked Terminal
Connections", ftp://info.cert.org/pub/cert_advisories/
[CA-96.21.tcp_syn_flooding] "TCP SYN Flooding and IP Spoofing
Attacks", ftp://info.cert.org/pub/cert_advisories/
[CA-97.28.Teardrop_Land] "IP Denial-of-Service Attacks",
ftp://info.cert.org/pub/cert_advisories/
[DPR1984] The UK "Data Protection Act 1984 (c. 35)",
http://www.hmso.gov.uk/acts/acts1984/1984035.htm
[GAR1997] Garfinkel, S., "Web Security and Commerce",
O'Reilly and Associates, Sebastopol, CA, 1997.
[HUG1995] Hughes Jr., L., "Actually Useful Internet Security
Killalea [Page 27]
Internet Draft Security Expectations for ISPs 12 March 1998
Techniques", New Riders Publishing, Indianapolis, IN, 1995.
[RFC977] Kantor, B and P. Lapsley, "Network News Transfer Protocol",
RFC 977, February 1986.
[RFC1350] Sollins, K. R., "The TFTP Protocol (revision 2)", STD 33,
RFC 1350, July 1992.
[RFC1034] Mockapetris, P. V., "Domain names - concepts and
facilities", STD 13, RFC 1034, November 1987.
[RFC1035] Mockapetris, P. V., "Domain names - implementation and
specification", STD 13, RFC 1035, November 1987.
[RFC1305] Mills, D., "Network Time Protocol (Version 3)
Specification, Implementation", RFC 1305, March 1992.
[RFC1786] Bates, T., Gerich, E., Joncheray, L., Jouanigot, J-M.,
Karrenberg, D., Terpstra, M., and J. Yu, "Representation of IP
Routing Policies in a Routing Registry (ripe-81++)", RFC 1786,
March 1995.
[RFC1834] Gargano, J., and K. Weiss, "Whois and Network Information
Lookup Service", RFC 1834, August 1995.
[RFC1835] Deutsch, P., Schoultz, R., Faltstrom, P., and C. Weider,
"Architecture of the WHOIS++ service", RFC 1835, August 1995.
[RFC1918] Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.
J., and E. Lear, "Address Allocation for Private Internets", BCP 5,
RFC 1918, February 1996.
[RFC1939] Myers, J., and M. Rose, "Post Office Protocol - Version
3", RFC 1939, May 1996.
[RFC1985] De Winter, J. "SMTP Service Extension for Remote Message
Queue Starting", RFC 1985, August 1996.
[RFC2010] Manning, B., and P. Vixie, "Operational Criteria for Root
Name Servers", RFC 2010, October 1996.
[RFC2065] Eastlake 3rd, D., and C. Kaufman, "Domain Name System
Security Extensions", RFC 2065, January 1997.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", RFC 2119, March 1997.
[RFC2142] Crocker, D., "Mailbox Names for Common Services, Roles and
Killalea [Page 28]
Internet Draft Security Expectations for ISPs 12 March 1998
Functions", RFC 2142, May 1997.
[RFC2195] Klensin, J., Catoe, R., and P. Krumviede, "IMAP/POP
AUTHorize Extension for Simple Challenge/Response", RFC 2195,
September 1997.
[RFC2196] Fraser, B., "Site Security Handbook", RFC 2196, September
1997.
[RFC2267] Ferguson, P., and D. Senie, "Network Ingress Filtering:
Defeating Denial of Service Attacks which employ IP Source
Address Spoofing", RFC 2267, January 1998.
[SHA] NIST, FIPS PUB 180-1: Secure Hash Standard, April 1995.
[SPE1994] Spencer, H., "News Article Format and Transmission",
ftp://ftp.zoo.toronto.edu/pub/news.txt.Z
[SSH1997] SSH (secure Shell) Remote Login Program,
http://www.cs.hut.fi/ssh/
[VIX1995] Vixie, P., "DNS and BIND Security Issues",
ftp://ftp.vix.com/pri/vixie/bindsec.psf, 1995.
12 Acknowledgements
I gratefully acknowledge the constructive comments received from
Nevil Brownlee, Randy Bush, Bill Cheswick, Barbara Y. Fraser, Randall
Gellens, Erik Guttman, Larry J. Hughes Jr., Klaus-Peter Kossakowski,
Michael A. Patton, Don Stikvoort and Bill Woodcock.
13 Security Considerations
This entire document discusses security issues.
14 Author's Address
Tom Killalea
Verio Northwest
15400 SE 30th Pl., Ste. 202
Bellevue, WA 98007-6546
USA
Phone: +1 425 649-7417
E-Mail: tomk@nw.verio.net
Killalea [Page 29]
Internet Draft Security Expectations for ISPs 12 March 1998
15 Full Copyright Statement
Copyright (C) The Internet Society (1998). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implmentation may be prepared, copied, published and
distributed, in whole or in part, without restriction of any kind,
provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organisations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE."
This document expires Sep 15, 1998.
Killalea [Page 30]