[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Ever onward



Hi,


Some form of authentication where the identity can be stolen, yes.
user/passwords are one example of that.  Operators actually want
usernames/passwords it seems.  Certainly, I'd always encourage people
to use public/private keys for reasons like this.  Unfortunately, as
much as public/private technologies have been around for years real
people aren't using them much yet.  passwords are still prevalent
(see also: radius, ...)

I agree. However, there are two types of accesses contemplated. An operator running a script or a program, and a provisioning/management system. I expect that the authentication for each could be handled somewhat differently. Let's first consider the operator. One can ameliorate the attack with several approaches. The first is use of OTPs and physical keys, such as SecurID or DES Gold/Platinum cards. It doesn't make the attack impossible, but it does make it difficult.


The second way to ameliorate the attack is by disabling the offending account in the T+/Radius server. This may not do anything for systems that are already compromised, but through the log you will at least know which systems are impacted.

A third approach is to use out of band management, and control access into that portion of the network. If an attack ensues, you determine the offending account, disable it at the firewall, and if necessary bounce connections, which would blow away all the locks in the protocol.

In the case of an element manager, a way to avoid the attack vector entirely is to have the element connect to the EMS. This opens up potential attacks on the EMS, of course.


Margaret> (2) That access to managed devices from outside the network Margaret> via the NETCONF (or the underlying protocol) is not blocked Margaret> by the site's firewalls and that the firewalls could not Margaret> be easily configured to block this traffic. So, the only Margaret> recourse would be to got to every device and remove the Margaret> compromised user.

As currently designed the netconf protocol transports will operate
over existing ports thus completely preventing firewalls from blocking
configuration ports at the border.

I disagree and agree ;-) NETCONF will use a unique port # for the BEEP mapping. All that having been said, I think if you have to put management filters in place at your borders, you've lost.


I've brought this up multiple
times during meetings and argued that a default different port should
be created for each transports which differs from the standard one,
and the populace has always said "we should just make sure it *can* be
configured to be on a different port".  So, by default out of the box
netconf boxes are supposed to accept netconf/ssh over ssh until an
operator configures it differently.  Thus, a border firewall can't be
configured to disallow management traffic to the network assuming that
legitimate ssh connections should be allowed through (which is
most commonly the case).

Great argument for NETCONF/BEEP.



Margaret> (2) Why do you assume that the way to fight this attack would Margaret> be to go to every device and remove the compromised Margaret> userid/password? Wouldn't the first step be to block Margaret> incoming traffic from the attacking system? Then, of course, Margaret> you'd want to clean up the compromised authentication Margaret> information.

You make the assumption that the attack can be easily blocked because
it's coming from a single point of origin.  Unwise considering todays
attack techniques, which are almost always distributed.

Agree.


Eliot


-- to unsubscribe send a message to netconf-request@ops.ietf.org with the word 'unsubscribe' in a single line as the message text body. archive: <http://ops.ietf.org/lists/netconf/>