Science DMZ Security

Similar documents
Optimizing Data Management at the Advanced Light Source with a Science DMZ

Achieving the Science DMZ

The Science DMZ and the CIO: Data Intensive Science and the Enterprise

The Science DMZ. Eli Dart, Network Engineer Joe Metzger, Network Engineer ESnet Engineering Group. LHCOPN / LHCONE meeting. Internet2, Washington DC

SDN for Science Networks

Science DMZs Understanding their role in high-performance data transfers

Campus Network Design Science DMZ

perfsonar Overview Jason Zurawski, ESnet Southern Partnerships for Advanced Networking November 3 rd 2015

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

allow all such packets? While outgoing communications request information from a

Globus Research Data Management: Endpoint Configuration and Deployment. Steve Tuecke Vas Vasiliadis

SwitchOn Workshop São Paulo October 15-16, 2015

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Fundamentals of Data Movement Hardware

LHCONE Site Connections

8. Firewall Design & Implementation

Secure Networks for Process Control

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

EMERGING AND ENABLING GLOBAL, NATIONAL, AND REGIONAL NETWORK INFRASTRUCTURE TO SUPPORT RESEARCH & EDUCATION

Security Technology: Firewalls and VPNs

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Cisco SR 520-T1 Secure Router

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

The Science DMZ: Introduction & Architecture

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

AppDirector Load balancing IBM Websphere and AppXcel

co Characterizing and Tracing Packet Floods Using Cisco R

athenahealth Interface Connectivity SSH Implementation Guide

Data Center SDN. ONF SDN Solutions Showcase Theme Demonstrations SDN SOLUTIONS SHOWCASE

Large Scale Science, The Science DMZ, SDN/OpenFlow, Security and Cyberinfrastructure Architectures

INTRODUCTION TO FIREWALL SECURITY

BROCADE NETWORKING: EXPLORING SOFTWARE-DEFINED NETWORK. Gustavo Barros Systems Engineer Brocade Brasil

ΕΠΛ 674: Εργαστήριο 5 Firewalls

CTS2134 Introduction to Networking. Module Network Security

GlobalSCAPE DMZ Gateway, v1. User Guide

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Basic Network Configuration

Network Segmentation

Network Defense Tools

Figure 41-1 IP Filter Rules

Recommended IP Telephony Architecture

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Lab Developing ACLs to Implement Firewall Rule Sets

Network Security Guidelines. e-governance

A Model Design of Network Security for Private and Public Data Transmission

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

A Possible Approach for Big Data Access to Support Climate Science

OPTIMIZING THE NETWORK FOR APPLICATIONS

Cost Effective Deployment of VoIP Recording

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Environments. Name

SDN and NFV in the WAN

7.1. Remote Access Connection

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

IP Telephony Management

A Look at the New Converged Data Center

CMPT 471 Networking II

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Avaya G700 Media Gateway Security - Issue 1.0

IBM. Vulnerability scanning and best practices

CSCE 465 Computer & Network Security

Small Business Server Part 2

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Virtualization, SDN and NFV

Leveraging SDN and NFV in the WAN

VPN. Date: 4/15/2004 By: Heena Patel

Evaluation guide. Vyatta Quick Evaluation Guide

- Introduction to PIX/ASA Firewalls -

Firewalls. Ahmad Almulhem March 10, 2012

Certes Networks Layer 4 Encryption. Network Services Impact Test Results

The Science DMZ: A Network Design Pattern for Data-Intensive Science

Introduction. The Inherent Unpredictability of IP Networks # $# #

Firewalls and Network Defence

Access control policy: Role-based access

Using a Firewall General Configuration Guide

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

Network Security. Chapter 9 Integrating Security Services into Communication Architectures

Cisco Application Networking for BEA WebLogic

SE 4C03 Winter 2005 An Introduction of Firewall Architectures and Functions. Kevin Law 26 th March,

Configuring an efficient QoS Map

Cisco Application Networking for IBM WebSphere

Chapter 1 The Principles of Auditing 1

Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic

White Paper. Intrusion Detection Deploying the Shomiti Century Tap

Enhanced Research Data Management and Publication with Globus

Injazat s Managed Services Portfolio

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

E-Guide. Sponsored By:

CIT 480: Securing Computer Systems. Firewalls

VPN Lesson 2: VPN Implementation. Summary

Architecture Overview

How To Understand and Configure Your Network for IntraVUE

Avaya TM G700 Media Gateway Security. White Paper

Network Monitoring and Security Measures in Campus Networks

Transcription:

Science DMZ Security Eli Dart, Network Engineer ESnet Network Engineering Group Joint Techs, Winter 2013 Honolulu, HI January 15, 2013

Outline Quick background Firewall issues Non-firewall security options Touch on organizational structures

Science DMZ Background The data mobility performance requirements for data intensive science are beyond what can typically be achieved using traditional methods Default host configurations (TCP, filesystems, NICs) Converged network architectures designed for commodity traffic Conventional security tools and policies Legacy data transfer tools (e.g. SCP) Wait-for-trouble-ticket operational models for network performance The Science DMZ model describes a performance-based approach Dedicated infrastructure for wide-area data transfer Well-configured data transfer hosts with modern tools Capable network devices High-performance data path which does not traverse commodity LAN Proactive operational models that enable performance Well-deployed test and measurement tools (perfsonar) Periodic testing to locate issues instead of waiting for users to complain Security posture well-matched to high-performance science applications

Science DMZ Simple Abstract Cartoon Border Router Enterprise Border Router/Firewall WAN 10G perfsonar Clean, High-bandwidth WAN path Site / Campus access to Science DMZ resources Science DMZ Switch/Router Site / Campus LAN High performance Data Transfer Node with high-speed storage Per-service security policy control points perfsonar 1/14/13 4

Science DMZ With Virtual Circuits/Openflow WAN 10G Routed Border Router Enterprise Border Router/Firewall perfsonar Dedicated path for virtual circuit traffic Clean, High-bandwidth path to/from WAN 10G Virtual Circuit Site / Campus access to Science DMZ resources Science DMZ Switch/Router Site / Campus LAN Per-service security policy control points Nx perfsonar High performance Data Transfer Node with high-speed storage Site/Campus Virtual Circuits 1/14/13 5

Science DMZ Supporting Multiple Projects Border Router Enterprise Border Router/Firewall WAN 10G perfsonar Clean, High-bandwidth WAN path Site / Campus access to Science DMZ resources Science DMZ Switch/Router Site / Campus LAN Project A DTN Project B DTN perfsonar Per-project security policy control points Project C DTN 1/14/13 6

Science DMZ Security Model Goal disentangle security policy and enforcement for science flows from security for business systems Rationale Science flows are relatively simple from a security perspective Narrow application set on Science DMZ Data transfer, data streaming packages No printers, document readers, web browsers, building control systems, staff desktops, etc. Security controls that are typically implemented to protect business resources often cause performance problems

Performance Is A Core Requirement Core information security principles Confidentiality, Integrity, Availability (CIA) These apply to systems as well as to information, and have farreaching effects Credentials for privileged access must typically be kept confidential Systems that are faulty or unreliable are not useful scientific tools Data access is sometimes restricted, e.g. embargo before publication Some data (e.g. medical data) has stringent requirements In data-intensive science, performance is an additional core mission requirement CIA principles are important, but if the performance isn t there the science mission fails This isn t about how much security you have, but how the security is implemented We need to be able to appropriately secure systems in a way that does not compromise performance or hinder the adoption of advanced services

Placement Outside the Firewall The Science DMZ resources are placed outside the enterprise firewall for performance reasons The meaning of this is specific Science DMZ traffic does not traverse the firewall data plane This has nothing to do with whether packet filtering is part of the security enforcement toolkit Lots of heartburn over this, especially from the perspective of a conventional firewall manager Lots of organizational policy directives mandating firewalls Firewalls are designed to protect converged enterprise networks Why would you put critical assets outside the firewall??? The answer is that firewalls are typically a poor fit for highperformance science applications 1/14/13 9

Let s Talk About Firewalls A firewall s job is to enhance security by blocking activity that might compromise security This means that a firewall s job is to prevent things from happening Traditional firewall policy doctrine dictates a default-deny policy Find out what business you need to do Block everything else Firewalls are typically designed for commodity or enterprise environments This makes sense from the firewall designer s perspective lots of IT spending in commodity environments Firewall design choices are well-matched to commodity traffic profile High device count, high user count, high concurrent flow count Low per-flow bandwidth Highly capable inspection and analysis of business applications 1/14/13 10

Thought Experiment We re going to do a thought experiment Consider a network between three buildings A, B, and C This is supposedly a 10Gbps network end to end (look at the links on the buildings) Building A houses the border router not much goes on there except the external connectivity Lots of work happens in building B so much so that the processing is done with multiple processors to spread the load in an affordable way, and aggregate the results after Building C is where we branch out to other buildings Every link between buildings is 10Gbps this is a 10Gbps network, right??? 1/14/13 11

Notional 10G Network Between Buildings Building B WAN perfsonar Building A Building Layout To Other Buildings Building C 1/14/13 12

Clearly Not A 10Gbps Network If you look at the inside of Building B, it is obvious from a network engineering perspective that this is not a 10Gbps network Clearly the maximum per-flow data rate is bps, not 10Gbps However, if you convert the buildings into network elements while keeping their internals intact, you get routers and firewalls What firewall did the organization buy? What s inside it? Those little switches are firewall processors This parallel firewall architecture has been in use for years Slower processors are cheaper Typically fine for a commodity traffic load Therefore, this design is cost competitive and common 1/14/13 13

Notional 10G Network Between Devices Firewall WAN perfsonar Border Router Device Layout To Other Buildings Internal Router 1/14/13 14

Notional Network Logical Diagram Border Router Border Firewall WAN perfsonar Internal Router 1/14/13 15

What s Inside Your Firewall? But wait we don t do this anymore! It is true that vendors are working toward line-rate 10G firewalls, and some may even have them now has been deployed in science environments for over 10 years Firewall internals have only recently started to catch up with the 10G world 100GE is being deployed now, 40Gbps host interfaces are available now Firewalls are behind again In general, IT shops want to get 5+ years out of a firewall purchase This often means that the firewall is years behind the technology curve Whatever you deploy now, that s the hardware feature set you get When a new science project tries to deploy data-intensive resources, they get whatever feature set was purchased several years ago 1/14/13 16

The Firewall State Table Many firewalls use a state table to improve performance State table lookup is fast No need to process entire ruleset for every packet Also allows session tracking (e.g. TCP sequence numbers) State table built dynamically Incoming packets are matched against the state table If no state table entry, go to the ruleset If permitted by ruleset, create state table entry Remove state table entry after observing connection teardown Semantically similar to punt-and-switch model of traffic forwarding used on many older routers 1/14/13 17

State Table Issues If the state table is not pruned, it will overflow Not all connections close cleanly I shut my laptop and go to a meeting Software crashes happen Some attacks try to fill state tables Solution: put a timer on state table entries When a packet matches the state table entry, update the timer If the timer expires, delete the state table entry What if I just pause for a few minutes? This turns out to be a problem state table timers are typically in the 5-15 minute range, while host keepalive timers are 2 hours If a connection pauses (e.g. to wait for a large transfer), the firewall will delete the state table entry from under it connection hangs I have seen this in production environments 1/14/13 18

Firewall Capabilities and Science Traffic Firewalls have a lot of sophistication in an enterprise setting Application layer protocol analysis (HTTP, POP, MSRPC, etc.) Built-in VPN servers User awareness Data-intensive science flows don t match this profile Common case data on filesystem A needs to be on filesystem Z Data transfer tool verifies credentials over an encrypted channel Then open a socket or set of sockets, and send data until done (1TB, 10TB, 100TB, ) One workflow can use 10% to 50% or more of a 10G network link Do we have to use a firewall? 1/14/13 19

Firewalls As Access Lists When you ask a firewall administrator to allow data transfers through the firewall, what do they ask for? IP address of your host IP address of the remote host Port range That looks like an ACL to me! No special config for advanced protocol analysis just address/port Router ACLs are better than firewalls at address/port filtering ACL capabilities are typically built into the router Router ACLs typically do not drop traffic permitted by policy 1/14/13 20

Security Without Firewalls Data intensive science traffic interacts poorly with firewalls Does this mean we ignore security? NO! We must protect our systems We just need to find a way to do security that does not prevent us from getting the science done Key point security policies and mechanisms that protect the Science DMZ should be implemented so that they do not compromise performance 1/14/13 21

If Not Firewalls, Then What? Remember the goal is to protect systems in a way that allows the science mission to succeed I like something I heard at NERSC paraphrasing: Security controls should enhance the utility of science infrastructure. There are multiple ways to solve this some are technical, and some are organizational/sociological I m not going to lie to you this is harder than just putting up a firewall and closing your eyes 1/14/13 22

Other Technical Capabilities Intrusion Detection Systems (IDS) One example is Bro http://bro-ids.org/ Bro is high-performance and battle-tested Bro protects several high-performance national assets Bro can be scaled with clustering: http://www.bro-ids.org/documentation/cluster.html Other IDS solutions are available also Netflow and IPFIX can provide intelligence, but not filtering Openflow and SDN Using Openflow to control access to a network-based service seems pretty obvious There is clearly a hole in the ecosystem with the label Openflow Firewall I really hope someone is working on this (it appears so) This could significantly reduce the attack surface for any authenticated network service This would only work if the Openflow device had a robust data plane 1/14/13 23

Other Technical Capabilities (2) Aggressive access lists More useful with project-specific DTNs If the purpose of the DTN is to exchange data with a small set of remote collaborators, the ACL is pretty easy to write Large-scale data distribution servers are hard to handle this way (but then, the firewall ruleset for such a service would be pretty open too) Limitation of the application set One of the reasons to limit the application set in the Science DMZ is to make it easier to protect Keep desktop applications off the DTN (and watch for them anyway using logging, netflow, etc take violations seriously) This requires collaboration between people networking, security, systems, and scientists 1/14/13 24

Collaboration Within The Organization All stakeholders should collaborate on Science DMZ design, policy, and enforcement The security people have to be on board Remember: security people already have political cover it s called the firewall If a host gets compromised, the security officer can say they did their due diligence because there was a firewall in place If the deployment of a Science DMZ is going to jeopardize the job of the security officer, expect pushback The Science DMZ is a strategic asset, and should be understood by the strategic thinkers in the organization Changes in security models Changes in operational models Enhanced ability to compete for funding Increased institutional capability greater science output 1/14/13 25

Questions? Thanks! Eli Dart - dart@es.net http://www.es.net/ http://fasterdata.es.net/