Staying Persistent in Software Defined Networks



Similar documents
Staying Persistent in Software Defined Networks

Pluribus Netvisor Solution Brief

OPENFLOW, SDN, OPEN SOURCE AND BARE METAL SWITCHES. Guido Appenzeller (Not representing Anyone)

Open Network Install Environment

PARALLELS SERVER 4 BARE METAL README

Open Network Install Environment (ONIE) LinuxCon North America 2015

PARALLELS SERVER BARE METAL 5.0 README

Virtualization System Security

NOC PS manual. Copyright Maxnet All rights reserved. Page 1/45 NOC-PS Manuel EN version 1.3

Building A Secure Microsoft Exchange Continuity Appliance

SDN AND BARE METAL SWITCHES ARE LIKE PEANUT BUTTER AND JELLY: TWO GOOD THINGS THAT ARE GREAT TOGETHER!

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu LTS)

Acano solution. Security Considerations. August E

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Linux Operating System Security

UNCLASSIFIED Version 1.0 May 2012

Passing PCI Compliance How to Address the Application Security Mandates

Parallels Cloud Server 6.0 Readme

REDUCE RISK WITH ORACLE SOLARIS 11

Parallels Cloud Server 6.0

How To Switch A Layer 1 Matrix Switch On A Network On A Cloud (Network) On A Microsoft Network (Network On A Server) On An Openflow (Network-1) On The Network (Netscout) On Your Network (

Recommended IP Telephony Architecture

IT6204 Systems & Network Administration. (Optional)

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Using BroadSAFE TM Technology 07/18/05

The Trivial Cisco IP Phones Compromise

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Feeling Vulnerable? Jamie S. Herman, C CISO, CISM, CISSP Balazs Bucsay, OSCE, OSCP, GIAC, GPEN

SERENA SOFTWARE Serena Service Manager Security

State of Security. Top Five Critical Issues Affecting Servers. Decisive Security Intelligence You Can Use. Read Our Predictions for 2013 and Beyond

SANS Institute First Five Quick Wins

Securing SDN deployments right from the start.

An overwhelming majority of IaaS clouds leverage virtualization for their foundation.

LINUX / INFORMATION SECURITY

What is included in the ATRC server support

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

F-Secure Internet Gatekeeper Virtual Appliance

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

Mobile Admin Architecture

Post-Access Cyber Defense

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 Part Number: E April 2016

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

SDN and Open Ethernet Switches Empower Modern Data Center Networks

Security Advice for Instances in the HP Cloud

CloudPassage Halo Technical Overview

Apple Server Diagnostics User Guide. For Version 3X106

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Cisco Application Networking Manager Version 2.0

Spikes Security Isla Browser Isolation System. Prepared for Spikes Security

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

CloudPassage Halo Technical Overview

Hacking Database for Owning your Data

Penetration Testing Report Client: Business Solutions June 15 th 2015

Designing and Deploying Connected Device Solutions for Small and Medium Business

That Point of Sale is a PoS

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

What s New in Centrify Server Suite 2014

Dell Fabric Manager Installation Guide 1.0.0

Netwrix Auditor for Active Directory

Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

How To Achieve Pca Compliance With Redhat Enterprise Linux

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations

Red Hat Enterprprise Linux - Renewals DETAILS SUPPORTED ARCHITECTURE

SSL VPN User Guide Access Manager 3.1 SP5 January 2013

TUTORIAL: WHITE BOX/BARE METAL SWITCHES. Rob Sherwood CTO, Big Switch Networks Open Network User s Group: May, 2014

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

What s New in Centrify Server Suite 2013 Update 2

An Oracle Technical White Paper January How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

Privileged Account Management Mar3n Cannard, Security Solu3ons Architect

Network Security. Network Packet Analysis

Transition Networks White Paper. Network Security. Why Authentication Matters YOUR NETWORK. OUR CONNECTION.

QuickStart Guide for Managing Computers. Version 9.2

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

THE REVOLUTION TOWARDS SOFTWARE- DEFINED NETWORKING

Virtualization Case Study

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Information Security Services

Using NetBooting on the Mac OS X Server for delivery of mass client deployment

Frontiers in Cyber Security: Beyond the OS

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Viking VPN Guide Linux/UNIX

基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

Revolution in Data Centers: Cloud Impact on Data Center Network

Virtualization of Linux based computers: the Linux-VServer project

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review

Transcription:

Staying Persistent in Software Defined Networks

Hellfire Security Gregory Pickett, CISSP, GCIA, GPEN Chicago, Illinois gregory.pickett@hellfiresecurity.com

Overview White Box Ethernet Stupid Is As Stupid Does! Exploiting it! Moving Forward Wrapping Up

What Is Whitebox Ethernet? Standard Hardware ( Blank Slate) Running Merchant Silicon Trident and Broadcom Chipsets Intel, AMD, and PowerPC processors Open Operating System (Often Linux-Based) Critical for Software Defined Networking Can Be Used Without It!

Why Do It? Reduced Cost Increased Flexibility Gain More Control Traditional DevOps Software Defined Networking

Open Network Install Environment (ONIE) Firmware for bare metal network switches Boot Loader for Network Operating Systems (NOS) Grub/U-Boot Underneath Facilitates Installation and Removal of NOS Comes Pre-Installed Automates Switch Deployment

White Box Ethernet and ONIE What Could Go Wrong?

Weaknesses (Operating System) Privileged Account No Root Password Doesn t Force You To Change It! Management Services Uses Telnet SSH Installation Mode (18-bits Entropy) Recovery Mode (26-bits Entropy)

Weaknesses (Installer) Predictable URLS Exact URLs from DHCPv4 Inexact URLs based on DHCP Response IPv6 Neighbors TFTP Waterfall Predictable File Name Search Order No Encryption or Authentication for Installs

Weaknesses (Implementation) Exposed Partition No Secure Boot

What Does This Mean? Lot s Of Opportunities to Blow It Up!

Here s How Compromise It (Directly) Direct Entry Sniffing/MiTM (Telnet or SSH) Compromise It s Installations Via Rogue DHCP Server Via IPv6 Neighbor Via Spoofed TFTP

Even Better Compromise It (Indirectly) Get Past Network Operating System Modify ONIE Exposed Partition No Secure Boot Now You re In the Firmware Now You re There Forever!

Network Operating Systems (NOS) Gets Installed By ONIE Operates the Switch ONIE-Compatible Distributions Open Network Linux Switch Light Cumulus Linux MLNX-OS

Open Network Linux Linux distribution for "bare metal" switches Based On Debian Linux Bare-Bones with No Features Development Platform Only Maintained by Open Compute Project

Switch Light (v2.6.0) Linux distribution for "bare metal" switches Packaged Open Network Linux Indigo Openflow Agent Extension of Big Cloud Fabric (SDN) Maintained by Big Switch Networks

Cumulus Linux (v2.5.3) Linux distribution for "bare metal" switches Based On Debian Linux Puppet/Chef/Ansible Agent Network Automation and Orchestration (DevOps) Maintained by Cumulus Networks

MLNX-OS (v3.3.4) Linux distribution for "bare metal" switches Based On Enterprise Linux 5 (Red Hat Enterprise Linux 5) Puppet/Chef/Ansible/eSwitch Agent Network Automation and Orchestration (DevOps) or Controller (SDN) Maintained by Mellanox

Weaknesses (Agent) No Encryption and No Authentication Switch Light (Indigo) MLNX-OS (eswitch) Out-Dated OpenSSL Switch Light (Actually No SSL Used! WTF?) Cumulus Linux (OpenSSL 1.0.1e Puppet) MLNX-OS (OpenSSL 0.9.8e-fips-rhel5)

Could Lead To Topology, Flow, and Message Modification through Unauthorized Access Add Access Remove Access Hide Traffic Change Traffic Switch Light (Indigo) MLNX-OS (eswitch)

Weaknesses (Operating System) Default (and Fixed) Accounts Switch Light admin root (hidden/disabled) Cumulus Linux cumulus root (disabled) MLNX-OS admin root (hidden/disabled)

Weaknesses (Operating System) Easy Escape to Shell Switch Light (enable, debug bash) Cumulus Linux (N/A) MLNX-OS (puppet) Instant Elevation Switch Light (N/A) Cumulus Linux (sudo) MLNX-OS (N/A)

Could Lead To Full Control of Your Network through Unauthorized Access Switch Light Add Access Cumulus Linux Remove Access MLNX-OS Hide Traffic Change Traffic Compromise of Firmware through Unauthorized MLNX-OS Access Switch Light Cumulus Linux

This Means Is One Key Logger Away!

Big Cloud Fabric (Controller)

Switch Light admin:x:0:0::/root:/usr/bin/pcli

Switch Light (Exposed ONIE Partition)

Cumulus (sudo)

MLNX-OS (Backdoor)

And Now Some Pwnage Sorry Cumulus Linux!

Zero-Day Exploit Cumulus Linux Has Several Command-Line Tools cl-bgp, cl-ospf, cl-ospf6, cl-ra, and cl-rctl Meant To Be Used By Low Privilege admin Commands Processed By clcmd_server.py On Unix Sockets Command Injection Issues! Boom Goes CLCMD_SERVER And it runs as Root

CLCMD-SERVER Running On A Switch

Demonstration

Exposed ONIE Partition

Exposed ONIE Partition

Demonstration (Scenario)

Demonstration (Scenario) Key Logger 3 Big Brother Windows System Secondary Infection 4 Little Brother ONIE (Firmware) Plant 5 Linux Switch

Demonstration (Scenario) Pivot 7 Big Brother Windows System Backdoor 6 Little Brother Linux Switch

Demonstration (Execution)

Available Solutions Hardware Install Environment Network Operating Systems Agents Enterprise Architecture

Hardware Trusted Platform Module (TPM) Rob Sherwood Had These Put In for Most x86-based Switches Let s Add Them to the PowerPC Switches Then, Let s Use Them!

Install Environment Remove Telnet Increase Key Entropy Force Password Change Remove IPv6 and TFTP Waterfall Sign the Installations

Operating Systems Changeable Names uid 0 accounts reduced privilege accounts Force Password Change Remove uid 0 from admin Tighten Shell Access Switch Light (OTP) Cumulus Linux (Wrapper, OTP) MLNX (Remove socat)

Agents Use TLS Add Encryption and Authentication Use DevOps or SDN to Coordinate Certificate and Key Distribution

Enterprise Architecture Isolate Management Plane Rarely Done What s wrong with Jump Boxes? Audit Switches Password Changes ONIE Partition Hashes

Racing Ahead Impact On Security Keeping Pressure On Developers (Scaring Them) Making The Difference

Impact On Security Getting Products/Features To Market Is Important I get it. We all get it. But You're Not Learning Desktop Operating Systems Server Operating Systems These Are Not New Wake Up!

Scaring Developers! So Begins The Spinning of the Merry-Go-Round We Hack It You Fix It Let The Clean-Up Begin Is It So Hard To Hire Someone for Security I thought fixing It later was more expensive? Security Can Be A Feature Too

Making The Difference Learn From Desktop and Server Operating Systems Leverage Management Platforms (DevOps) or Controllers (SDN) Security Reference Audit Capability (Reconciliation) Logging Logic Probes

Final Thoughts Security of the Network Operating System is critical However, that security has been neglected Companies believe that the switches are safe Single piece of malware could easily make the cross-over from Windows-based systems to these Linux-based switches Leaving you with a persistent presense on your network

Links http://etherealmind.com/network-dictionary-whitebrand-ethernet/ https://github.com/opencomputeproject/onie/wiki/quick-start-guide https://github.com/opencomputeproject/onie/wiki/cli-reference http://opennetlinux.org/docs/build http://opennetlinux.org/docs/deploy http://www.bigswitch.com/sdn-products/big-cloud-fabrictm http://www.bigswitch.com/products/switch-light http://labs.bigswitch.com https://github.com/floodlight/indigo https://github.com/floodlight/ivs http://docs.cumulusnetworks.com/ http://cumulusnetworks.com/get-started/test-drive-open-networking/ https://puppetlabs.com/blog/puppet-cumulus-linux

Links https://github.com/puppetlabs/puppet http://www.mellanox.com/page/mlnx_os http://h20564.www2.hp.com/hpsc/swd/public/detail?switemid=m TX_8adfcbf6e0834d5a82564b4825 https://github.com/mellanox-openstack/mellanox-eswitchd http://zeromq.org/intro:read-the-manual