[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: draft-ietf-opsec-infrastructure-security-01 additional comments
A few comments marked with DJS>
I will provide a small snippet of the original text and my
recommendations.
Some are just grammar type issues.
2.3. Infrastructure Hiding
Hiding the infrastructure of the network provides an elegant
mechanism for protecting the network infrastructure. If the
destination of an attack is to an infrastructure address that is
unreachable, attacks become far more difficult. Infrastructure
hiding can be achieved in several ways: i) MPLS techniques ii) IGP
configuration iii) Route advertisement control. Section 6 addresses
these infrastructure hiding techniques in detail.
DJS> untargetable or not directly targetable not unreachable
3.1
2. Determine what traffic must be destined to the core devices from
outside the AS.
DJS> and from which network addresses.
4. Optionally, prior to implementing the deny action for all traffic
destined to the core address block, a log action may be used and
the results of the deny actions evaluated.
DJS> Log or count man be used instead of deny to evaluate what or how
much would have been dropped.
3.3
The potential impact on the device's performance must be taken into
consideration when deploying EIACLs.
DJS> Which impacts? Cpu, memory and IO... Latency and jitter? % of line
rate?
5.5
This reduces the device's profile.
DJS> reduces the device's exposure.
5.2.1. IP Fragments
Traffic destined to a router is not typically fragmented. Use of
mechanisms to deny fragments to the device are recommended.
DJS> or rate limit. Also non-initial fragments should be dropped
automatically if the initial fragment was not received prior to any
non-initial frag.
5.2.3. Access Control Implementation Guide
Implementing a complex set of access controls for all traffic going
to and from a router is non trivial. The following is a recommended
set of steps that has been used successfully by many carriers.
1. Develop list of required protocols.
DJS> ports, icmp type/code and protocols.
2. Develop source address requirements: Determine destination
interface on router Does the protocol access a single interface?
Does the protocol access many interfaces? Does the protocol
access a virtual or physical interfaces?
DJS> Says source address requirement but talks to destination address.
3. Prior to implementing with a deny, it is recommended to test the
behavior with the action of "log" and observe the results
4. Deployment should be an iterative process: Start with relatively
open lists then tighten as needed
DJS> Continuous/regular monitoring/evaluation required as things like
BGP announced routes have increased 2x in the last year or so. So what
was reasonable last year may be too restrictive next.
6. Infrastructure Hiding
Hiding the infrastructure of the network provides one layer of
protection to the devices that make up the network core. By hiding
those devices (making them unreachable)
DJS> unaddressable externally or not directly targetable. If the packets
run through it then it is reachable.
6.2. MPLS Techniques
While it may not be feasible to hide the entire infrastructure of
large networks, it is certainly possible to reduce exposure of
critical core infrastructure by hiding the existence and complexity
of that infrastructure using an MPLS mesh where TTL is not
decremented as packets pass through it as described in RFC 3443
[RFC3443]. In this manner the number, addresses, and even existence
of intermediary devices can be hidden from traffic as it passes
through the core. As pointed out by RFC 4381 [RFC4381], not only can
this method hide the structure, it simplifies access restrictions to
DJS> infrastructure
core devices. e.g. Core equipment addresses are inaccessible from
the "Public Internet" VPN. The fact that this technique is
transparent from a layer-3 viewpoint recommends it to providers of
DJS> makes it attractive to (instead of recommends it to)
public services. Because basic external troubleshooting and presents
to all external views a simplified network structure with few
potential target addresses exposed it offers a better balance of
security against effort than most techniques for public networks.
DJS> Basic external troubleshooting and all other external views are
presented with a
DJS> simplified network structure with fewer potentially targetable
addresses exposed
DJS> it offers a better balance of security verses effort then most
infrastructure hiding
DJS> techniques.
6.4.1. Route Announcement Filtering
Inasmuch as it is unavoidable that some network elements must be
DJS> In as much
configured with IP addresses, it may be possible to assign these
address out of netblocks for which the routing advertisement can be
DJS> no routing is not advertised external to the AS.
filtered out, thereby limiting possible sources of traffic to core
netblocks down to customers for whom you provide a default route, or
direct peers who would make the effort to create a static route for
your core netblock into your AS. By assigning address for network
infrastructure out of a limited number of address blocks which are
well known to internal network administrators, the operator can
greatly simplify EIACL configuration. This can also minimize the
frequency with which ACLs need to be updated based on changes in the
network. This can also have performance implications, especially for
DJS> This approach can also improve performance, especially for
equipment
DJS> where ACL's length is very limited.
6.4.2. Address Core Out of RFC 1918 Space
In addition to filtering the visibility of core addresses to the
wider Internet, it may be possible to use private RFC 1918 [RFC1918]
netblocks for numbering infrastructure when IP addresses are required
(eg, loopbacks). This added level of obscurity takes prevention of
wide distribution of your infrastructure address space one step
further.
DJS> This addition level of obscurity makes targeting your
infrastructure
DJS> even more difficult.
7. IPv6
IPv6 Networks contain the same infrastructure security risks as IPv4.
DJS> Plus others that are IPv6 specific.
10. Acknowledgements
Don Smith provided invaluable comments and suggestions. Pat Cain,
Ross Callon, Vince Fuller, Barry Greene, George Jones, David Meyer,
Peka Savola reviewed this document and provided feedback.
DJS> David Meyer and Peka Savola reviewed ...
if( sent(protocol= 1, type=8) &&
!((received()=(protocol=1,type=0))))
then plz reping.
Donald.Smith@qwest.com giac
This communication is the property of Qwest and may contain confidential or
privileged information. Unauthorized use of this communication is strictly
prohibited and may be unlawful. If you have received this communication
in error, please immediately notify the sender by reply e-mail and destroy
all copies of the communication and any attachments.