sane: a protection architecture for enterprise networks

29
2005 Stanford and ICSI Martin Casado (Stanford) Tal Garfinkel (Stanford) Aditya Akella (CMU/Stanford) Dan Boneh (Stanford) Nick McKeown (Stanford) Scott Shenker (ICSI/Berkeley) SANE: A Protection Architecture for Enterprise Networks

Upload: ownah

Post on 21-Jan-2016

25 views

Category:

Documents


0 download

DESCRIPTION

Martin Casado (Stanford) Tal Garfinkel (Stanford) Aditya Akella (CMU/Stanford) Dan Boneh (Stanford) Nick McKeown (Stanford) Scott Shenker (ICSI/Berkeley). SANE: A Protection Architecture for Enterprise Networks. Enterprise Security is Important. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Martin Casado (Stanford)

Tal Garfinkel (Stanford)

Aditya Akella

(CMU/Stanford)

Dan Boneh (Stanford)

Nick McKeown (Stanford)

Scott Shenker (ICSI/Berkeley)

SANE: A Protection Architecture for Enterprise Networks

Page 2: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Enterprise Security is Important

$8.7 billion information security industry (US alone)

Intellectual Property Protection(Valve code leak)

Downtimes are costly(Disney)

User-information leaks are bad(California bill number: SB 1386)

Regulatory Compliance HIPAA Sarbanes Oxley

Page 3: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

A Quick Look at IP

Default on: everyone can talk to everyone

Trusted end-hosts, “stupid network” Decentralized (trust)

Loosely bound end-points

No hiding of information Communicating end points topology

Worms are a testimony to the success of IP!

Page 4: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

IP and Security

Default ON overly permissive (“every psychopath is your next-door neighbor” – Geer)

trusted end-points powerful users/attackers

Stupid network no defense in depth Proliferation of TCB 1 router is enough weak end-points useless for

discrimination No hiding of info reconnaissance is easy

Page 5: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Retrofitting Security onto IP

Designed for Security Firewalls, Router ACLS Port Security IDS/NDS/IPS

(scan detection, anomaly detection, signature detection)

VLANs

Pushed Into Service Ethernet Switches NATs, Proxies Physical

Datalink

Network

Transport

Application

Page 6: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Policies and Protection in Enterprises

Connectivity is difficult to reason about

Network config = sum of router and end-host configs

Hard to express meaningful policies

Enterprise networks are brittle Difficult to deploy new protocols, define

new policies Easy to break existing policies

Yet, existing mechanisms don’t provide adequate security!!

Page 7: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Short Recap

IP networks Default on No support in network Decentralized trust Loosely bound end-points Proliferation of information

Exisiting enterprise security technologies Many Complex Can’t declare policy simply

Page 8: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Our Approach: SANE(Security Architecture for the Networked Enterprise)

Take an extreme point in design space…

Default on Default offDecentralized trust centralizedNo network enforcement enforced per

hopMeaningless IPs Tightly bound end-

pointsTransparent information restricted

Page 9: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

When Does this make sense?

Security is paramountPractical deployment strategy

Fork-lift upgradesNew networks created often

Centralized administrationNotion of principles (e.g. users)Structured communication

Page 10: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Provide Isolation Layer

PhysicalDatalinkNetwork

Transport

Application

Introduce layer 2.5Isolation Layer

Ethernet SANE IP ..

Strictly defines connectivity

Page 11: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

SANE:

Action Sequence!Publishmartin.friends.ambient-streamsallow tal, sundar, adityaAuthenticatehi, I’m martin, my password is

Authenticatehi, I’m tal, my password is

martin.friends.ambient-streamsRequest

martin.friends.ambient-streams

1

4

34

4 13

1

2

2

Ambient streams

1 3 1 2 2 Client port

1 4 3 4 4 Ambient streams

1 3 1 2 2 Client port4 3 4 4 Ambient streams

1 3 1 2 2 Client port

3 4 4 Ambient streams

1 3 1 2 2 Client port

4 4 Ambient streams

1 3 1 2 2 Client port

1 3 1 2 2 Client port

4 Ambient streams

Page 12: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

SANE:

OverviewDomain Controller

Switches

End-Hosts

•Authenticates switches/end-hosts•Established secret with each switch•Contains network topology•Hosts services (by name)•Manages permission checking•Creates and issues capabilities

•Send link state information to the DC•Provide default connectivity to the DC•Validate capabilities•Forward packets base on capability•Enforce revocations

•Publish services at the DC•Specify access controls(export streams.ambient allow tal)•Request access to services•Use appropriate capability for each packet

Page 13: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Default off (capabilities provide all connectivity)(failsafe defaults, least privilege)

Single, simple mechanism (economy of mechanism)

Capability checked at every step(complete mediation)

Capabilities bind end-hosts to location High level policy declaration

Fine-grained policies(psychological acceptability)

Don’t reveal (sender, packet path, topology)(least knowledge)

Immutable transport address allows fine grained access controls

Security Properties (Saltzer and Schroeder)

Page 14: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

How is connectivity to the DC provided? How are keys established? How does the DC get the topology?

SANE Details

Page 15: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Connectivity to the DC

Switches construct spanning tree Rooted at DC Switches don’t learn topology

(just neighbors) Provides basic datagram service to DC

Page 16: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Establishing Shared Keys

Switches authenticate with DCand establish symmetric key

Ike2 for key establishment All subsequent packets to DC

have “authentication header”(similar to ipsec esp header)

Ksw1

Ksw2

Ksw3

Ksw4

Ksw1

Ksw3Ksw4

Ksw2

Page 17: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Return Capabilities

Added to all packets to DC Each switch adds a “layer” Look the same as DC issued

capabilities Used by the DC to determine the Exact location of the sender

payload

payload

payload

Page 18: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Establishing Topology

Switches generate neighbor listsduring MST algorithm

Send encrypted neighbor-listto DC

DC aggregates to full topology No switch knows full topology

Ksw1

Ksw2

Ksw3

Ksw4

Ksw1

Ksw3Ksw4

Ksw2

Page 19: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Summary of mechanism

Default connectivity to DC (via MST) All principles authenticate (switches,

users) Users publish/request services from DC DC returns encrypted source route

Provides all host-to-host connectivity Opaque Non-composable Include transport address (fine-grained)

Page 20: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Fault Tolerance“You’re not SANE you’re INSANE” Central control! Loss of adaptive routing!

Attack resistance Data integrity Revocation

Wide area issues

Additional Considerations

Page 21: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Fault Tolerance:

Adaptive Routing On failure, end-hosts must refresh

capabilities Timeouts to detect failures

Can result in “request storm” at DC Issue multiple capabilities

(hand out n of the k shortest paths)

More switch level redundancy(doesn’t undermine security!)

Path load balancing(randomly choose one of the k shortest paths)

Page 22: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Fault Tolerance: DC: Single Point of Failure?

Exists today (DNS) Capability generation is fast

(crummy implementation = 20k – 40k per second)

Replicate DC Computationally (multiple servers) Topologically (multiple servers in multiple

places)

Page 23: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Attack Resistance

Capabilities Onion-encrypted source routes Encryption means, encrypt + MAC Each “layer” using a secret key

shared by the DC and the switch 10 hops = 164 byte header Contain

path information Expiration Unique ID

1 3

1

22

1,4 3,2

4

2,1 Service portMAC MAC MAC MAC

Esw1

Esw2

SW1

SW2

CAP-ID Expiration

Page 24: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Attack Resistance:

And More Security! Intermediary data integrity checks Hiding switch IDs in authentication header Handling growth of trusted computing base

usingthreshold crypto(n of k DCs must be compromised to generate capabilities)

Page 25: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Attack Resistance: Revocation

Request from DC sent back along incoming path Switches maintain small CAMs If CAMs fill, switches generate new keys too many revocations = loose privileges

payload

Page 26: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Wide Area Issues IP Is used for

Wide area routing Common framing (compatibility between end

hosts) In Enterprise Doesn’t provide

Identification Location Local connectivity

Internet connectivity provided by gateway (similar to NAT)

Page 27: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Implementation All components implemented in software Integrated with 9 workstations Managed our group’s traffic for a couple of

weeks

Page 28: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Future Work Research connectivity in the enterprise Real implementation with hardware

switches Extend to multiple domain case Plug into existing directory services (AD,

LDAP) Use DC as a KDC (a la kerberos)

Page 29: SANE: A Protection Architecture for Enterprise Networks

2005 Stanford and ICSI

Questions?