jeremy rauch network infrastructure insecurity the authentication, management and routing protocols...

66
Jeremy Rauch <[email protected]> Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Upload: devyn-farnham

Post on 31-Mar-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Jeremy Rauch <[email protected]>

Network Infrastructure Insecurity

The authentication, management and routing protocols that run your

network

Page 2: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Topics

Overview Basic protocol flaws Network allocation flaws Routing protocol flaws Authentication flaws Network Management and other fun flaws Application of attacks

Page 3: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

The Network

Router

Printer

Radius Server

Hub

Switch

DMZ

Internet

Host

Host

Host

Host

Host

Firewall

Page 4: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

The Network

Router

Printer

Radius Server

Hub

Switch

DMZHost

Host

Host

Host

Host

Page 5: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

The Network

Router

Printer

Radius Server

Hub

Switch

Host

Host

Host

Host

Host

Page 6: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

The Network

Router

Printer

Radius Server

Hub

Switch

Page 7: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Overview

Network Infrastructure– The building blocks of a network

» basic network protocols

» network management

» authentication

» routing

» other random things switches, hubs printers routers

Page 8: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Overview

Does this stuff matter?– Absolutely - the network depends on these

» Basic protocols - obvious

» network management & allocation simplify network design and machine deployment

» Authentication access control

» Routing Getting from A to B

» Other stuff The network RUNS on these

Page 9: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Overview

Impacts– Attacking protocols can allow for hijacking,

spoofing and impersonation– control network devices– elevate access– change network flow– hide connections– sniffing– …and more

Page 10: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Basic Protocols

Security at the IP layer discussed over and over

Security at the link layer ignored

Page 11: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

ARP

Address Resolution Protocol– Used for mapping network IP addresses to

physical (in the case of ethernet, MAC) interface addresses.

– Broadcast at the link layer.

Page 12: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

ARP Security Flaws

Lack of Authentication Limited Table Entries

– ARP caches can be overpopulated and flushed

Page 13: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

ARP Authentication Flaws

Lack of Authentication– Arp replies are typically accepted and cached

without concern for origin when received.

– No method to distinguish between legitimate and illegitimate messages

Page 14: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

ARP Lack of Authentication

Invalid ARP replies– When an ARP who-is is broadcast on the wire,

anyone can reply and be mapped to the associated network address.

Gratuitous ARP replies– ARP replies without requests can be sent out and

cached, diverting traffic from the compromised network address to the attacker.

Page 15: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

ARP Attacks

Replace entries in arp caches for existing addresses– Denial of Service

– Reply to requests with compromised host adress as router or nameserver.

– Non-blind traffic hijacking

– Exploitation of host-based trusts.

Page 16: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

ARP Attacks

ARP Cache Overpopulation– Sending too many gratuitous ARP replies

flushing the target ARP cache in some implementations.

» Reach cache maximum, can cause devices like switches to re-enter “learning mode”

Page 17: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

DHCP

Dynamic Host Configuration Protocol– Popular amongst pc users for ease of

installation and configuration– UDP transport– To broadcast, from 0.0.0.0

Page 18: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

DHCP Security Problems

Unauthenticated– Anyone can request an address

Undirected– Anyone can respond

Limited ACL capabilities– Limit addresses per mac

Page 19: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

DHCP Attacks

Get all addresses– Denial Of Service– Reply to requests with compromised host set as

router or nameserver Deregister hosts

– hijack ip’s, connections

Page 20: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

DHCP Fixes

Authentication– ISC is adding authentication in their 3.1

implementation– Others have implemented proprietary

authentication mechanisms Don’t allow dynamic assignment of DNS

servers or routers– Statically define these

Page 21: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Gateway Protocols

IGP– RIPv1

– RIPv2

– OSPF

Page 22: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

RIP

Routing Information Protocol– Widely used distance-vector IGP (Interior

Gateway Protocol) within autonomous systems.

– Exists in two forms, Version 1 and the backwards compatible Version 2.

RIPv1 is extremely vulnerable to serious attack.

Page 23: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

RIP Security Flaws

Transport Method Authentication

Page 24: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

RIP Transport Method Flaws

Based on UDP, utilizing port 520 for sending and receiving messages.– UDP is unreliable, no sequencing of packets.

Easy to send arbitrary data to target .

– Since sequencing is not a concern, forging source address can be very effective.

– May be able to receive data from anywhere on the internet.

Page 25: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

RIP Authentication Flaws

Lack of any authentication in RIPv1 Cleartext Authentication recommended in

RFC 2453 RIPv2 Specifications MD5 Key/KeyID Digest Based

Authentication described in RFC 2082.

Page 26: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

RIP Attacks

Forging RIP messages– Spoofing source address and sending invalid

routes, altering traffic flow.

» Traffic Hijacking

» Traffic Monitoring

» Redirecting traffic from trusted to untrusted.

– Obtaining Cleartext RIPv2 "password" when sent across network.

» Using retrieved password to send authenticated updates to RIPv2 routers, altering traffic flow with consequences listed above.

Page 27: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

RIP Solutions

Disabling RIPv1 and using RIPv2 with MD5 authentication.

Enabling MD5 based authentication for RIPv2

Disabling RIP completely and using OSPF with MD5 authentication as interior gateway protocol. OSPF is the suggested IGP.

Page 28: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

OSPF

OSPF - Open Shortest Path First– Link-State Interior Gateway Protocol. In wide

use within autonomous systems.

– OSPF is the recommended IGP, intended as a replacement for RIP.

Page 29: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

OSPF Security Flaws

Authentication

Page 30: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

OSPF Authentication Flaws

Default Lack of Authentication– By default in some implementations, OSPF

authentication may be off.

Cleartext "simple password" Authentication– Commonly a default setting, clear-text password

included in OSPF message used to authenticate peers.

Type of authentication determined by "CODE" field in the OSPF message header.

Page 31: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

OSPF Attacks

Forging OSPF messages – Can be somewhat difficult but theoretically

possible if no authentication required or cleartext password obtained.

Page 32: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

OSPF Solution

Enable MD5 Authentication in OSPF implementation.

Page 33: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Authentication Flaw Overview

Authentication is a means for verification and granting of access

Problems range from denial of service to active and passive attacks leading to total compromise– gain access– elevate access

Page 34: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Authentication Mechanisms

Radius TACACS, XTACACS, TACACS+ NIS/NIS+ LDAP

Page 35: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

RADIUS

Remote Authentication Dial In User Service RFC 2138 & 2139 Used to authenticate users Off-machine/device authentication

– Central authentication server called a NAS– Popular implementations from Livingston and

Merit

Page 36: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Radius Security Model

UDP Based transport Each packet contains an authenticator

– Access-Requests» md5(secret + authenticator) ^ user password

– Access-Reject & Access-Accept» md5(Code + ID + Length + Request-Auth +

Attributes + Secret)

Page 37: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Radius Flaws

Gaining the shared secret– Send Access-Request with all known values

» Authenticator = 0

» User Name/Password = known

» Code = Access-Request (1)

» ID = 0, length = known

» Reply will come back with the following md5(1 + 0 + length + 0 + user name attr + user pass attr +

Secret)

» Dictionary attack for Secret radbrute.tar.gz

Page 38: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Radius Flaws...

Passive attack– Knowledge of a user password will allow attack

if sniffing is possible– Request-Access uses user password +

authenticator + shared secret» md5(authenticator + shared secret) ^ user pass

» obtain md5 by ^ userpass

» brute force dictionary attack with known authenticator

Page 39: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Radius Flaws...

Replay– Radius servers must not reuse authenticator

» if authenticator isn’t cryptographically random, repeat authentications until an authenticator is reused, and replay server Request-Accept

Failure limits and logging limit the effectivity

» Predictable authenticator If authenticator can be predicted, replay attacks become

easier and more effective

Page 40: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

TACACS, XTACACS and TACACS+

Terminal Access Controller Access Control System??– Old protocol developed by BBN for Milnet

Similar in concept to RADIUS– Central authentication server moves

authentication off device or host RFC 1492, Internet Draft “The TACACS+

Protocol”

Page 41: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

TACACS, etc Flaws

TACACS & XTACACS– UDP Transport

» spoof RESPONSE messages from server trivially

– Cleartext authentication normal» User names and password sent exposed

MD5 in newer implementations

– Good way to crack passwords online» Easy, fast way to grind for accounts with bad

passwords

Page 42: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

TACACS+

TCP Transport– Doesn’t suffer from easy spoofing; may be

hijackable Authentication and Encryption

– May be possible to conduct attacks similar to RADIUS

Defaults and failure modes may pose problems– tacacs-server last-resort succeed

Page 43: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

TACACS+ ...

Authentication– No integrity checking– Vulnerable to replay

Encryption– Heavy dependence on session id’s

» may be easy to force collision

» too small

– Lack of padding in critical places

Page 44: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

NIS and NIS+

Network Information Service Originally from Sun Popular scheme for distributing password,

name service, etc RPC based transport

Page 45: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

NIS and NIS+ Flaws

NIS transports in plaintext NIS is only protected by a domainname

– easily guessed Many vulnerabilities in implementations

– quick search for NIS and NIS+ vulnerabilities resulted in over a dozen individual problems

NIS+ is sufficiently complex to install that no one uses it

Page 46: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

NIS and NIS+ Solutions

Run NIS+ if at all possible Investigate alternatives like LDAP

Page 47: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

LDAP

Lightweight Directory Access Protocol Operates on distinguished name (DN) and

attribute pairs or collections

Page 48: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

LDAP Flaws

New and relatively untested Unfamiliar Default ACL’s are typically poor Authentication mechanisms still not fully

implemented– CA based authentication still only part there

DoS attacks– Flood with requests

Page 49: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Network Management and Other Fun Flaws

SNMP printers

Page 50: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

SNMP

Simple Network Management Protocol– The most popular network management

protocol– Hosts, firewalls, routers, switches…UPS,

power strips, ATM cards -- ubiquitous “One of the single biggest security

nightmares on networks today”

Page 51: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

SNMPv1 Security Flaws

Transport Mechanism– Data manipulation– Denial of Service– Replay

Authentication– Host Based– Community Based

Information Disclosure

Page 52: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

SNMPTransport Mechanism Flaws

UDP Based– Unreliable - packets may or may not be

received– Easily forged - trivial to forge source of

packets

Page 53: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

SNMPAuthentication Flaws

Host Based– Fails due to UDP transport– DNS cache poisoning

Community Based– Cleartext community– Community name prediction/brute forcing– Default communities

Page 54: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

SNMP Popular Defaults

Popular defaults– public

– private

– write

– “all private”

– monitor

– manager

– security

– admin

– lan

– default

– password

– tivoli

– openview

– community

– snmp

– snmpd

– system

– and on and on...

Page 55: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

SNMPv1Information Disclosure

Routing tables Network topology Network traffic patterns Filter rules

Page 56: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

RMON and RMON2Security

SNMPv1’s flaws additional hazards by introducing “action

invocation” objects collects extensive info on subnet packet captures

Page 57: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

SNMP Fixes

Disable it ACL It Read-Only

Page 58: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Printers Flaws

Actually a very large potential problem Laundering of hacking spoils bounce attacks Denial of service

Page 59: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Printer flaws...

Many printers have FTP servers– Allow anonymous access

» store as much data as memory or disk space in the printer - great place to store hacking tools, sniffer logs, and other stolen things

– Most are poor implementations» easily used in more complex attacks

ftp bounce Berkeley lpd flaws

Page 60: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Printer flaws...

Denial of Service– Used as a tool to conduct DoS

» most love to respond to broadcast pings smurf

– Service denied» poor tcp/ip implementations

crash easily

» poor service implementation SNMP ftp

Page 61: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Printer fixes?

Disable everything you can

Page 62: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Example applications

Defeat sniffing– Race hosts on ARP replies– reply to ARP’s with broadcast address– overpopulate caches

» some switches will flush their caches

– alter routing on the host you want to sniff

Page 63: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Examples

Defeating things like SSH– Alter routing– Create SSH proxy

» Client will note key mismatch, but who ever pays attention?

Gaining router access– Obtain auth protocol key via brute force– Extract passwords on the wire– Just plain old sniff

Page 64: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

What to do?

Maintain good perimeter defenses– At least you only have to trust your

employees… Use cryptographically secure transports

– Crypto is good» But crypto fails without good policy

Disable unneeded services– Not using SNMP?

Page 65: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

What to do...

Disable things like routed on hosts– 99% of the time, static routes work fine on end

machines Use the strongest authentication methods

possible– Long keys, strong crypto

Page 66: Jeremy Rauch Network Infrastructure Insecurity The authentication, management and routing protocols that run your network

Questions?

Jeremy Rauch <[email protected]>