Security in Network Management



Similar documents
(In)Security in Network Management

SNMP Simple Network Management Protocol

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

SNMPV3: A SECURITY ENHANCEMENT FOR SNMP

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

Chapter 38 Simple Network Management Protocol (SNMP)

A Guide to Understanding SNMP

SNMP and Network Management

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Chapter 12: Network Management

Comparison of SNMP. Versions 1, 2 and 3

Operations Manager: Network Monitoring

Simple Network Management Pwnd. Information Data Leakage Attacks Against SNMP

Simple Network Management Protocol

SNMP Basics BUPT/QMUL

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras

Network Monitoring & Management Introduction to SNMP

ITEC310 Computer Networks II

Configuring SNMP Monitoring

SNMP JManager: An Open Source Didactic Application for Teaching and Learning SNMP v1/2c/3 with Support for IPv4 and IPv6

VULNERABILITIES IN SNMPV3

Brocade Product Training

SNMP Extensions for a Self Healing Network

Network Monitoring Using SNMP

SNMP SECURITY A CLOSER LOOK JEFFERY E. HAMMONDS EAST CAROLINA UNIVERSITY ICTN 6865

SNMP -overview. Based on: W.Stallings Data and Computer Communications

SNMP Network Management Concepts

This watermark does not appear in the registered version - SNMP and OpenNMS. Part 1 SNMP.

SNMP....Simple Network Management Protocol...

TELE 301 Network Management

Configuring Simple Network Management Protocol (SNMP)

Network Management: - SNMP - Software Defined networking

Network Management - SNMP

Simple Network Management Protocol

Introduction to Simple Network Management Protocol (SNMP)

Simple Network Management Protocol

Know the signs of potential problems. Prevent problems before they occur. This unit contains the following three lessons:

Presented by Aurang Zeb 14CS-03. Network Management System

SNMP Version 3. Finding Feature Information. Information About SNMP Version 3. Security Features in SNMP Version 3

Tech Note Cisco IOS SNMP Traps Supported and How to Conf

This Lecture. NWEN 403 Advanced Network Engineering. Network Management. Outline. Network management. Qiang Fu

Vanguard Applications Ware Basic Protocols. SNMP/MIB Management

Simple Network Management Protocol

Hands-On SNMPv3 Tutorial & Demo Manual

Network Management & Monitoring Introduction to SNMP

Configuration Commands. SNMP System Commands. engineid XRS System Management Guide Page 303 SNMP. Syntax [no] engineid engine-id

Simple Network Management Protocol

Simple Network Management Protocol

SECURITY ADVISORY FROM PATTON ELECTRONICS

Simple Network Management Protocol (SNMP) Primer

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

Secure SNMP-Based Network Management in Low Bandwidth Networks. H. Erik Hia. Master of Science in Computer Engineering

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

SNMP Reference Manual

(Refer Slide Time: 1:17-1:40 min)

Network Management. What is network management?

Outline of the SNMP Framework

How To Understand and Configure Your Network for IntraVUE

APC by Schneider Electric Release Notes AP9537 Network Management Card. APC part number: Released: 26 October 2012

securitymodel who securityname com2sec secname ipsource community default group groupname model secname v1 v2c usm

Configuring SNMP CHAPTER7

Network Security Technology Network Management

Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Text Book: Computer Networking: A Top Down Approach Featuring the Internet 3rd edition, by Jim Kurose and Keith Ross, Addison-Wesley

PA160: Net-Centric Computing II. Network Management

Chapter 9 Network Management

Simple Network Management Protocol

Authentication requirement Authentication function MAC Hash function Security of

What is Web Security? Motivation

Simulation of an SNMP Agent: Operations, Analysis and Results

Cisco CMTS Router MIB Overview

NETWORK MANAGEMENT CHAPTER 20-1

Simple Network Management Protocol SNMP

Client Server Registration Protocol

A Novel Technique for SNMP Bandwidth Reduction: Simulation and Evaluation

L2 / L3 Switches. Simple Network Management Protocol (SNMP) Configuration Guide

For the protocol access paths listed in the following table, the Sentry firmware actively listens on server ports to provide security for the CDU.

Network Management & Monitoring Introduction to SNMP

Chapter 15. Network management

Security vulnerabilities in the Internet and possible solutions

CS5008: Internet Computing

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Chapter 9 Network Management

IPsec Details 1 / 43. IPsec Details

Chapter 8 Network Management. Chapter 8 outline. What is network management? Chapter 8: Network Management

Network Management (NETW-1001)

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

A Summary of Network Traffic Monitoring and Analysis Techniques

Training Course on Network Administration

SNMP and SNMPv2: The Infrastructure for Network Management

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide

Network Monitoring with SNMP

SNMP. Simple Network Management Protocol

Transcription:

Security in Network Management Security in distributed and remote network management protocols Jeremy Rauch <jrauch@cadre.org>

Network Management What is it? Why do we need it? What are our options with regard to selecting a network management scheme? What are the security flaws it can introduce What can be done to minimize the risk of these security flaws?

Network Management: What is it? Hardware Switches, routers, firewalls, WAP s, hosts, printers Just about anything on the network Software Protocols Allows for remote management of the network from convenient, centralized sites

Network Management: Why is it needed? Lowers costs by eliminating the need for many administrators at multiple locations performing the same function Makes network administration and monitoring easier and more convenient Coherent presentation of data

Major NM Options SNMPv1 SNMPv2c SNMPv3 Vendor proprietary solutions Quite a few options that never panned out DCE REAL SNMPv2 CMIP

SNMP Flaws The Protocols SNMPv1 SNMPv2 SNMPv2c SNMPv3 RMON/RMON2 The Implementations Default communities Buffer overflows Design + Logic errors Miscellaneous

SNMPv1 History Why was it created? RFC 1157, 1990: A Simple Network Management Protocol (SNMP) RFC 1067, 1988 RFC 1155, 1158, 1990: Original specification of the MIBII

SNMPv1 Overview Information to be stored laid out in the Management Information Base (MIB) Specification of fields to be collected, data types, formatting, access controls Written in ASN.1 Easy to read Not so fun to write Basically akin to a Db schema Data encoded using BER

SNMP sample output [1:38pm manager] snmpwalk agent public system system.sysdescr.0 = Sun SNMP Agent, SPARCstation-20 system.sysobjectid.0 = OID: enterprises.42.2.1.1 system.sysuptime.0 = Timeticks: (619954285) 71 days, 18:05:42.85 system.syscontact.0 = manager@cadre.org system.sysname.0 = agent system.syslocation.0 = Under my desk system.sysservices.0 = 72 [1:39 manager ] snmpwalk agent public.1.3.6.1.2.1.4.22.1.4 ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.1.10.1.98.1 = other(1) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.1.10.1.98.2 = dynamic(3) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.2.10.1.98.36 = dynamic(3) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.2.10.1.98.37 = other(1) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.3.10.1.97.1 = other(1) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.3.10.1.97.101 = other(1) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.3.10.1.97.254 = dynamic(3) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.4.10.1.98.41 = dynamic(3) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.4.10.1.98.45 = other(1) ip.ipnettomediatable.ipnettomediaentry.ipnettomediatype.7.10.1.96.1 = other(1

SNMPv1 Protocol Five Simple Messages: get-request get-next-request get-response set-request trap

SNMPv1 Protocol continued... get_request get_response port 161 get_next_request get_response port 161 Manager set_request get_response port 161 Agent port 162 trap port 161

SNMPv1 Protocol continued... UDP Transport Mechanism Community: Shared password between agent and manager PDU: Specifies request type Request ID Error Status Error Index

SNMPv1 Packet Format UDP Header Version Community PDU Type Request ID Error Status Error Index name value name...

SNMPv1 Security Flaws Transport Mechanism Data manipulation Denial of Service Replay Authentication Host Based Community Based Information Disclosure

SNMPv1 Transport Mechanism Flaws UDP Based Unreliable - packets may or may not be received Easily forged - trivial to forge source of packets

SNMPv1Authentication Flaws Host Based Fails due to UDP transport DNS cache poisoning Community Based Cleartext community Community name prediction/brute forcing Default communities

SNMPv1 Information Disclosure Routing tables Network topology Network traffic patterns Filter rules Vendor proprietary information + invocation Execute arbitrary programs, etc

SNMPv1Security Flaw Implications Altering/Manipulation of network by unauthorized individuals Denial of Service on whole networks Modification of ACL s & configurations Clear topology of network behind router Makes creation of more sophisticated host based attacks easier

SNMPv2 History RFC 1441, 1993: Introduction to version 2 of the Internet-standard Network Management Framework RFC 1446, 1993: Security Protocols for version 2 of the Simple Network Management Protocol Written to address security and feature deficiencies in SNMPv1

SNMPv2 Protocol Extension to SNMPv1 Provided security model 2 new commands get-bulk-request inform-request Acknowledged trap A big, big failure

SNMPv2 Protocol continued... privdst authinfo dstparty srcparty context PDU General Format privdst 0-length OCTET STRING dstparty srcparty context PDU Nonsecure Message privdst digest dsttime srctime dstparty srcparty context PDU Authenticated, not encrypted privdst 0-length OCTET STRING dstparty srcparty context PDU Private, not authenticated privdst digest dsttime srctime dstparty srcparty context PDU Private and authenticated

SNMPv2 Security Flaws Replay 4 types of time error conditions manager s version of agent s clock greater than agent s actual clock Collect packets for future replay to agent manager s clock greater then agent s version of manager s clock agent s clock greater than manager s version of agent s clock agent s version of manager s clock greater than the manager s version of the manager s clock No unique nonce to prevent replay within window

SNMPv2 Security flaws... Replay attacks possible via complex clock attacks Clock sync is NOT part of SNMPv2 Dependence on external protocols opens vulnerabilities (NTP) Behavior for clock skew forward + back is ill defined

SNMPv2 Security Flaws Attacks against DES Duplication of privdst in dstpty allows for known plaintext attacks 16 character, user defined DES pass phrase Allows easy dictionary attacks

SNMPv2 Security Flaws MD5 attacks Again, user defined 16 character secret Dictionary attackable

SNMPv2 Security Still uses UDP transport SNMPv1 Compatibility can compromise security Default DES and MD5 phrases Does not prevent D.O.S or traffic analysis

SNMPv2 Downfall Marginal security Complex implementation Devices were a whole lot slower and lacking in ram

SNMPv2C What is it? Why does it exist

SNMPv2C Protocol SNMPv2 additional PDU types SNMPv1 Community based authentication UDP transport All the features of SNMPv2 with the security of SNMPv1

SNMPv3 History RFC 3410, 2002: Introduction and Applicability Statements for Internet Standard Management Framework RFC 3411, 2002: An Architecture for Describing SNMP Management Frameworks RFC 3412, 2002: Message Processing and Dispatching RFC 3413, 2002: SNMP Applications RFC 3414, 2002: User-based Security Model RFC 3415, 2002: View-based Access Control Model RFC 3416, 2002: Version 2 of SNMP Protocol Operations RFC 3417, 2002: Transport Mappings RFC 3418, 2002: Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) RFC 2576, 2578, 2579, 2580 Written to address the failures of the original SNMPv2 security model

Protocol Designed to be implementable and secure Based on the original SNMPv2 work (SNMPv2u and SNMPv2*) Uses SNMPv2 PDU format + types No new PDU types specified UDP transport Strong (enough) encryption and authentication New User-based Security Model New View-based Access Control (enhanced MIB view concept) Starting to catch on (kinda sorta)

Packet Format msgversion msgid msgmaxsize msgflags msgsecuritymodel msgsecurityparameters contextengineid contextname PDU Encrypted Authenticated Reference: SNMP,SNMPv2, SNMPv3 and RMON 1 and 2, 3rd Edition, William Stallings, 1998

Packet Format: User-Based Security Model msgversion msgid msgmaxsize msgflags msgsecuritymodel msgsecurityparameters contextengineid contextname msgauthoritativeengineid msgauthoratativeengineboots msgauthoritativeenginetime msgusername msgauthparams msgprivacyparams PDU Encrypted Authenticated Reference: SNMP,SNMPv2, SNMPv3 and RMON 1 and 2, 3rd Edition, William Stallings, 1998

SNMPv3 User-based Control Model Encryption DES CBC mode Authentication HMAC SHA-1 MD5 Timeliness mechanism

SNMPv3 Flaws Encryption CBC mode depends on 64 bit IV IV is created by taking last 8 octets of 16 octet privkey (pre-iv) 8 octet salt value is xored with the pre-iv to create the IV Only the salt value is transmitted, in msgprivacyparameters field Problem: Salt generation is left as an exercise to the implementor Brute force of bad passwords Slowed by password to key mechanism

SNMPv3 Flaws Authentication Handled via HMAC-{SHA-1, MD5} Output truncated to 12 octets MD5 16 octet auth key SHA-1 20 octet auth key Stored in msgauthparameters Actually, HMAC is an excellent authentication mechanism Short auth password can be brute forced Password to key mechanism slows down attack Harder due to collisions due to truncated output

SNMPv3 Flaws Timeliness mechanism Uses boot count + time since last reboot of agent Transmitted via a 2-step synch mechanism + stored snmpengineboots snmpenginetime latestreceivedenginetime Can prevent replay attacks within window 150 second skew allowed Skew depends on authoritative v. non-authoritative recipient

SNMPv3 Realized Pretty cool protocol Still susceptible to denial of service But what isn t? Forgery possible, but difficult to use Brute forcing possible, but tough + slow Time based attacks may be possible Immediate replay of packets MAY allow action invocation attacks Traffic analysis

RMON and RMON2 Security SNMP s flaws additional hazards by introducing action invocation objects collects extensive info on subnet packet captures

Implementation Vulns Defaults MIB designs Buffer Overflows + parsing Design + logic errors Miscellaneous

Default Communities public private write "all private" (sun) monitor (3com) manager (3com) security (3com) OrigEquipMfr (brocade) "Secret C0de" (brocade) secret cable-docsis xyzzy, agent_steal, freekevin, and fubar (?!) admin default password tivoli openview community snmp snmpd system (aix, others) And so on

Hidden Communities An obscene percentage of managed devices contain hidden communities Often fully read/write privileged for I in `dz < xxx.bin strings` do echo $I;snmpget -c $I host system.sysdescr.0 Done

MIB Designs Too much info! D-Link password disclosure enterprises.937.2.1.2.2.0 Similar problems affect all toy routers Cisco VACM community disclosure snmpvacmmib.vacmmibobjects.vacmaccesstable A quick perusal of interesting keywords at www.mibdepot.com reveals hundreds of potential vulns

Buffer Overflows + Parsing OULU PROTOS evaluation Identified hundreds of test cases for evaluating SNMP protocol implementations Invalid BER length fields Long strings Format strings Found dozens of implementation flaws Most implementations derived from CMU/UCD/Net-SNMP Real world examples abound IRIX snmpd overflow

Misc All sorts of conveniences Cisco CONFIG-COPY.mib & CISCO-FLASH.mib http://www.cisco.com/warp/public/477/snmp/copy_configs_s nmp.shtml Management stations not without own problems Tivoli Netview - execute arbitrary commands with a well formed trap under custom configs net-snmp has had client tool + agent flaws Most recent one patched about 3 weeks ago

Securing existing implementations Risk assessment Minimization of use Allow get-* s only, no remote setting Eliminate defaults Filtering EVERYWHERE Marginally useful at best Management network

Sources you need to check out Multiple SNMP RFC s (mentioned throughout talk) SNMP, SNMPv2, SNMPv3 and RMON 1 and 2, William Stallings (ISBN 0-201-4834-6) TCP/IP Illustrated Volume 1, Richard Stevens (ISBN www.mibdepot.com Simple Times (www.simple-times.org) OULU PROTOS (http://www.ee.oulu.fi/research/ouspg/protos/index.html) www.securityfocus.com Vulnerability DB Bugtraq Net-snmp (www.net-snmp.org)

Questions?