Security for 802 Access Networks: A Problem Statement



Similar documents
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Post-Class Quiz: Telecommunication & Network Security Domain

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

CS5008: Internet Computing

CSCI 362 Computer and Network Security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

9 Simple steps to secure your Wi-Fi Network.

COMPUTER NETWORK TECHNOLOGY (300)

Ethernet Passive Optical Networks EPON

EPON Technology White Paper

SSVVP SIP School VVoIP Professional Certification

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Link Layer and Network Layer Security for Wireless Networks

Networking Basics and Network Security

Chapter 5. Data Communication And Internet Technology

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Wi-Fi and security Wireless Networking and Security by Alain RASSEL

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Topics in Network Security

Networking 4 Voice and Video over IP (VVoIP)

Link Layer and Network Layer Security for Wireless Networks

Local Area Networks. LAN Security and local attacks. TDC 363 Winter 2008 John Kristoff - DePaul University 1

VPN. Date: 4/15/2004 By: Heena Patel

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Networking Devices. Lesson 6

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

A 1 Security Architecture for 802 Networks?

Security in Wireless Local Area Network

Chapter 4 Connecting to the Internet through an ISP

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Wholesale IP Bitstream on a Cable HFC infrastructure

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Wireless Networks. Welcome to Wireless

Universal Network Access Policy

Chapter 2 Configuring Your Wireless Network and Security Settings

Technical Support Information Belkin internal use only

Network Access Security. Lesson 10

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

SSVP SIP School VoIP Professional Certification

Security Awareness. Wireless Network Security

Wireless Encryption Protection

Wireless Sensor Networks Chapter 14: Security in WSNs

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Network Virtualization Network Admission Control Deployment Guide

High Performance VPN Solutions Over Satellite Networks

ehealth Ontario EMR Connectivity Guidelines

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

Security Design.

WAN and VPN Solutions:

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Application Note. Onsight TeamLink And Firewall Detect v6.3

WIRELESS NETWORKING SECURITY

The OSI and TCP/IP Models. Lesson 2

The Hidden Dangers of Public WiFi

Building Secure Network Infrastructure For LANs

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Client Server Registration Protocol

Firewalls, Tunnels, and Network Intrusion Detection

Securing end devices

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Based on Computer Networking, 4 th Edition by Kurose and Ross

Network Security: Introduction

Logical & Physical Security

Lecture 17 - Network Security

How To Understand And Understand The Security Of A Key Infrastructure

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP


Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Tech-Note Bridges Vs Routers Version /06/2009. Bridges Vs Routers

Introduction To Computer Networking

Intrusion Detection, Packet Sniffing

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Lab VI Capturing and monitoring the network traffic

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Chap. 1: Introduction

MPLS and IPSec A Misunderstood Relationship

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Local-Area Network -LAN

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

The next generation of knowledge and expertise Wireless Security Basics

11/22/

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Chapter 10 Security Protocols of the Data Link Layer

Security Technology White Paper

How Virtual Private Networks Work

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

T.38 fax transmission over Internet Security FAQ

White Paper Testing Ethernet Passive Optical Networks

Chapter 1 Instructor Version

Villains and Voice Over IP

m-trilogix White Paper on Security in Wireless Networks

Endpoint Based Policy Management: The Road Ahead

Transcription:

Security for 802 Access Networks: A Problem Statement Norman Finn, Cisco Systems Session Number 1

Why bother with Link Layer security? Why not just use IPSEC? There are many protocols that are not securable via Layer 3: NetBEUI, Spanning Tree, Link Aggregation, GxRP, DHCP, ARP, IPX, The organization legally or practically responsible for the solution may not have Layer 3 access to the endpoints. An L2 secure link is lighter, i.e. involves fewer protocol elements, than an L3 secure link. Security provides value-add for Layer 2 carriers. 2

Layer 2 vs. Layer 3 vs. Layer 7 Security home workplace firewall router, bridge, or cable modem ISP1 ISP1 Metro Ethernet provider one L2 secure link another L2 secure link Top-tier Internet carrier L7 secure http L3 VPN (IPSEC) ISP2 ISP3 and content server 3

There is no one answer to all security problems. Why, today, do I run https over VPN/IPSEC over secure Docsis? https protects my credit card number across the big-i Internet. VPN/IPSEC connects my PC to a point behind my company firewall. Docsis prevents my neighbors from stealing my cable bandwidth. Three different scopes of responsibility, three different sets of requirements: a triply-encrypted packet. 4

Many groups perceive a need for Layer 2 security 802.11 Wireless Access. 802.3ah Ethernet in the First Mile Point-to- Multipoint. 802.15 Personal wireless networking 802.16 Wireless Broadband Access. 802.17 Resilient Packet Ring. 802.3 CSMA/CD network access using 802.1X. 802.1 Metro Ethernet Service Providers 5

Example: 802.11 Everyone hears everything bridged network wireless hubs Broadcast media are open to attack Intruder(s) 6

802.11: Closing the gate bridged network Encryption +.1X overlay broadcast medium with point-to-point connections to foil intruders. wireless hubs Intruder(s) 7

802.11 Felt the first need, generated the first answer. Leveraged 802.1X to prevent unauthorized use of an access point. Separated the data streams of the authorized users of a single hub. Used encryption to create point-to-point connections. Found that authorization and secure session setup was vulnerable to attack. Is developing a new solution, 802.11i. 8

802.3ah Ethernet Passive Optical Network: EPON leafward OLT rootward Leafward traffic is seen by all ONUs, and normally, filtered by the ONU-ID In the preamble. Rootward traffic is seen only by the OLT, assuming that the fiber is not tapped. ONUs are Time Division Multiplexed. ONU ONU ONU ONU 9

802.3ah Protecting leafward traffic OLT Encrypting all traffic ensures that attacker can neither eavesdrop nor masquerade as another ONU (or OLT!). Link operation traffic, e.g. time slot allocation, must be protected. Any new link level management, e.g. OAM, must be protected. ONU ONU ONU ONU 10

802.3ah EPON summary All leafward traffic is seen by all leaves. Rootward traffic is invisible to other leaves. Needs are similar to 802.11, threats are perhaps a subset. 11

802.17 Is a double fiber packet ring. Would like to allow different customers equipment onto a ring. Ring relay function allows others to see your data. Thus, has similar eavesdropping and replay threats to 802.11. Introduces man-in-the-middle threats: attacker can receive your packet and modify it before relaying it. 12

Other dot.groups 802.15 Similar needs to 802.11. Much less power transmitted, lower range. Much tighter constraints on complexity. Has addressed the problem. 802.16 Similar needs to 802.11. Higher power, more range, more directional. Has addressed the problem. 13

802.3 hubs and 802.1X 802.1X assumes point-to-point connections, and explicitly does not address shared media, hubs, or bridges which do not run spanning tree. A bridge port attached to a hub is actually similar to an 802.11 access point, from a security standpoint. Everyone sees everything. It is easier in 802.3 than in 802.11 for a man-inthe-middle to insert a 2-port PC on any line, then eavesdrop, replay, modify, or insert data. Using bits in the preamble (as does 802.11) to solve the problem would greatly reduce the appeal of any solution. 14

General 802.3 solution bridged network Encryption +.1X overlay broadcast medium with point-to-point connections to foil intruders. wired hubs Intruder(s) 15

Many facets to a secure, interoperable solution Threat analysis: What, explicitly, are you defending against? Accidents? Maliciousness? How much money must an attacker spend in order to defeat your security? Physical security: Can you prevent physical tampering? Discover it? Do you care? Authentication: Are you who you say you are? Authorization: Should you be here at all? Key establishment: How do you exchange secret keys over an insecure link? Data exchange: Can you run at wire speed? 16

Points of attack Man-in-the-middle: A device with two ports is interposed between two devices which believe they are connected by a point-topoint connection. Snooper: A device can inspect, but not interfere with the transmission of, network traffic. Intruder: Unauthorized attachment to network. If one can intrude twice, one can become a man-in-themiddle to the larger network. 17

Basic operations of attackers Inspect and record sensitive data. Inject frames that do not belong in the network: new frames; previously inspected and recorded frames; legitimate or modified frames from another part of the network. Prevent the transmission of legitimate frames. Modify the contents of otherwise legitimate frames. 18

Multicast is an issue For many to receive an encrypted packet sent once, all must have the same key. This is, perhaps, a more tractable problem at Layer 2 than at Layer 3. The connection is more reliable. The number of receivers is smaller. And, perhaps, more important at L2 than at L3. At Layer 3, replicator is often sending to multiple links. At Layer 2, there is usually no box between sender and receivers to replicate the data. 19

High-level similarities One thread common to (at least) 802.11, 802.3ah, 802.16, and 802.3 hubs: transform a shared medium into a bundle of (tens of) secure pointto-point links. Point-to-point physical links are merely a special case. (And are not always what they seem.) Add the man-in-the-middle and you cover all of the dot groups. 20

High-level similarities Authorization and key exchange are the critical points, because they involve trading information securely across an insecure medium. We may suppose that 802.11i will provide, at least, a good starting point for a common effort. 21

Low level differences You may be able to use bits to the preamble to secure the MAC addresses in some dot groups. You cannot do that on existing Ethernet links. There are potential tricks to encrypt MAC addresses without involving the preamble. One must be very careful with encrypted MAC addresses: a bridged network might melt down if encrypted packets escape and reach an encryption-unaware device. If not adding to preamble, must either extend frame size, fragment/reassemble, or lower MTU. 22

Summary We need one 802 group to solve today s linklayer security problems and those to come. 802.11i will likely provide the basis for the solution(s). The new group must be responsive to the various media groups needs. It is not clear whether preamble bits are required to encrypt MAC addresses. We need the solution yesterday. But, we need a good solution. 23