mapping the internet and intranets

70
Mapping the Internet and intranets Steve Branigan Hal Burch Bill Cheswick Bell Labs, Lucent Tech.

Upload: libby

Post on 16-Jan-2016

58 views

Category:

Documents


1 download

DESCRIPTION

Mapping the Internet and intranets. Steve Branigan Hal Burch Bill Cheswick Bell Labs, Lucent Tech. Motivations. Work on DOS anonymous packet trace back - Internet tomography. Highlands “day after” scenario Curiosity about size and growth of the Internet - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Mapping the Internet and intranets

Mapping the Internet and intranets

Steve BraniganHal Burch

Bill Cheswick

Bell Labs, Lucent Tech.

Page 2: Mapping the Internet and intranets

Motivations

• Work on DOS anonymous packet trace back - Internet tomography.

• Highlands “day after” scenario• Curiosity about size and growth of

the Internet• Same tools are useful for

understanding any large network, including intranets

Page 3: Mapping the Internet and intranets

The Project• Long term reliable

collection of Internet and Lucent connectivity information– without annoying too

many people

• Attempt some simple visualizations of the data

– movie of Internet growth!

• Develop tools to probe intranets

• Extended database for researchers

Page 4: Mapping the Internet and intranets

Uses for the Internet data

• topography studies• long-term routing studies• publicly available database (“open

source”) for spooks• interesting database for graph

theorists• combine with other mappers to make

an actual map of the Internet

Page 5: Mapping the Internet and intranets

Uses for intranet data

• Map “inside” the security perimeter• Take a census of Lucent hosts• Discover hosts that have

unauthorized access to both the intranet and the Internet– illegal connections– miss-configured firewalls– maybe miss-configured telecommuters

Page 6: Mapping the Internet and intranets
Page 7: Mapping the Internet and intranets
Page 8: Mapping the Internet and intranets

Network scanning

• Custom program• Concurrently scans towards 500

nets at once• Throttled to 100 packets/sec: can

do much faster• Slow daily scan for host on

destination network

Page 9: Mapping the Internet and intranets

Limitations

• My view of the Internet, not yours– radical shifts when our ISP situation

changes

• Outgoing paths only• Takes a while to collect alternating

paths• Gentle mapping means missed

endpoints– good v. evil

Page 10: Mapping the Internet and intranets

Data collection complaints

• Australian parliament was the first to complain

• List of whiners (25 nets)• Military noticed immediately

– Steve Northcutt– arrangements/warnings to DISA and

CERT

Page 11: Mapping the Internet and intranets

Visualization goals

• make a map– show interesting features– debug our database and collection

methods– hard to fold up

• geography doesn’t matter• use colors to show further meaning

Page 12: Mapping the Internet and intranets

Early layouts

• Interesting art• tantalizing edges• interior shows ISPs (colored by IP

address!)• can’t trace routes• can’t even find the probe host

Page 13: Mapping the Internet and intranets
Page 14: Mapping the Internet and intranets

When data is inconvenient, throw some

away• minimum distance spanning tree• connectivity, not actual paths• we get more information out of it• add other paths to show further

information

Page 15: Mapping the Internet and intranets
Page 16: Mapping the Internet and intranets

What kind of maps canwe make?

Page 17: Mapping the Internet and intranets

Current map coloring

• distance from test host• IP address

– shows communities

• Geographical (by TLD)• ISPs• future

– timing, firewalls, LSRR blocks

Page 18: Mapping the Internet and intranets

By ISP

Page 19: Mapping the Internet and intranets

By top level domain

Page 20: Mapping the Internet and intranets
Page 21: Mapping the Internet and intranets
Page 22: Mapping the Internet and intranets

Yugoslavia

Serbia and Bosnia

Page 23: Mapping the Internet and intranets
Page 24: Mapping the Internet and intranets
Page 25: Mapping the Internet and intranets

Results - Internet database

• 100,000 of the world’s most important routers

• >150 routes to one destination!• Yugoslavia bombing of power

infrastructure is apparent• Offers for other scan points

– how to pick them?

Page 26: Mapping the Internet and intranets

05 October, 1998 23

0

2000

4000

6000

8000

10000

12000

Number of paths to a target

Page 27: Mapping the Internet and intranets
Page 28: Mapping the Internet and intranets

Distribution of path lengths

0

1000

2000

3000

4000

5000

6000

7000

8000

Path length

Num

ber

of

nets

Reached Not reached

Page 29: Mapping the Internet and intranets
Page 30: Mapping the Internet and intranets

Recipe for good intranet security

• Know what you have.• Then secure it.

Page 31: Mapping the Internet and intranets

Some basic questions…

• How large is the network address space for your network?

• How many system are actually active on the network?

• How much does the network change?

Page 32: Mapping the Internet and intranets

What is an intranet

• any network too large to control• hosts residing inside a firewall

perimeter• business partner connections• corporate hosts outside of the

firewall• DMZs

Page 33: Mapping the Internet and intranets
Page 34: Mapping the Internet and intranets
Page 35: Mapping the Internet and intranets
Page 36: Mapping the Internet and intranets
Page 37: Mapping the Internet and intranets
Page 38: Mapping the Internet and intranets
Page 39: Mapping the Internet and intranets
Page 40: Mapping the Internet and intranets
Page 41: Mapping the Internet and intranets
Page 42: Mapping the Internet and intranets
Page 43: Mapping the Internet and intranets
Page 44: Mapping the Internet and intranets
Page 45: Mapping the Internet and intranets
Page 46: Mapping the Internet and intranets
Page 47: Mapping the Internet and intranets
Page 48: Mapping the Internet and intranets
Page 49: Mapping the Internet and intranets
Page 50: Mapping the Internet and intranets
Page 51: Mapping the Internet and intranets

Intranet mapping work

• Apply the technology of Internet mapping to the intranet

• See how far the network reaches.• Surprises?

Page 52: Mapping the Internet and intranets

Firewall bypass case #1

Burouter

Corp.Firewall

Internet

Intranet

ISP AISP B

Page 53: Mapping the Internet and intranets
Page 54: Mapping the Internet and intranets

Our host census attempt

• 266,000 hosts• complaints from business partners!

Page 55: Mapping the Internet and intranets

Multi-home hosts

• hosts having multiple network connections

• dangerous when one is connected to the intranet, and the other is connected to the Internet

Page 56: Mapping the Internet and intranets

Firewall bypass case #2

Specialsystem

Corp.Firewall

Internet

Intranet

Page 57: Mapping the Internet and intranets

Hard to find today.

• Vulnerability scanners are not finding these vulnerabilities.

Page 58: Mapping the Internet and intranets

New products

• list of web servers• list of mail servers

Page 59: Mapping the Internet and intranets

Results: New Products!

• Route rationalization (“routerat”)– discover network routes (user

supplied?)– run frequently

Page 60: Mapping the Internet and intranets

More new products!

• Topology scan: traceroute scan information and analysis

• Host census• Scan for perimeter violations.

– spoofed through inside to outside– spoofed outside through inside

Page 61: Mapping the Internet and intranets

New Products

• List of web and mail servers• Detect route squatters• Networks susceptible to broadcast

storms• Find unauthorized firewalls and

internet connections• Miss-configured telecommuting and

branch office hosts.

Page 62: Mapping the Internet and intranets

New Products

• Private address space use• Connections with business

partners• Due diligence tool for joint

ventures, mergers, divestitures, etc.

Page 63: Mapping the Internet and intranets

Walking the perimeter

• There is a large potential market for this

• New tool to gain some control over an extensive network

• Fits with a number of companies’ product lines

• new Lucent venture

Page 64: Mapping the Internet and intranets

How we scan

• Via dialup, using RAS servers• Secure tunnel, if you prefer

– IP/SEC– PPTP– others?

Page 65: Mapping the Internet and intranets
Page 66: Mapping the Internet and intranets
Page 67: Mapping the Internet and intranets
Page 68: Mapping the Internet and intranets
Page 69: Mapping the Internet and intranets

Auditing Firewall Rules

a

b

d

allow web to aallow web to b

allow web to d

Over time, systems change but firewall rules may not...

Oops! Legacy rules can create today’s security holes.

Internet

c

allow web to callow web to c

allow mail to c

c

Page 70: Mapping the Internet and intranets

How Firewall Auditor Works

Input

Analysis

Output

Intranet definition ++ Query list of services

Query: Internet-> Inside : http

Internet -> ecnes01 (ecnes01.inet.lucent.com) : http [Rule: 2 ]Internet -> ecnes02 (ecnes02.inet.lucent.com) : http [Rule: 4 ]bcs-test (sapient2-bh.sapient.com) -> galileo (oh0012espweb1.inet.lucent.com) : http [Rule: 7 ]bcs-test (sapient2-bh.sapient.com) -> voyager (voyager.inet.lucent.com) : http [Rule: 9 ]

nameif ethernet0 outside security0nameif ethernet1 inside security100hostname pix1fixup protocol ftp 21fixup protocol http 80nat (inside) 0 0 0static (inside, outside) 135.104.45.176 135.104.45.176 netmask 255.255.255.240 outbound 1 deny 0 0apply (inside) 1 outgoing_dest: RULE : OUT PASS http mh zeroconduit permit tcp host 135.104.45.180 eq 80 135.104.0.0 255.255.224.0 conduit permit tcp host 135.104.45.180 eq 80 135.104.32.0 255.255.248.0

Sample firewall rules

What service traffic from the Internet can get through the firewall rules to which intranet addresses?