evaluating network security using internet measurements
play

Evaluating Network Security using Internet Measurements Oliver - PowerPoint PPT Presentation

Chair of Network Architectures and Services Department of Informatics Technical University of Munich Evaluating Network Security using Internet Measurements Oliver Gasser Tuesday 23 rd May, 2017 Chair of Network Architectures and Services


  1. Chair of Network Architectures and Services Department of Informatics Technical University of Munich Evaluating Network Security using Internet Measurements Oliver Gasser Tuesday 23 rd May, 2017 Chair of Network Architectures and Services Department of Informatics Technical University of Munich

  2. Chair of Network Architectures and Services Department of Informatics Technical University of Munich About me • Scientific researcher / PhD candidate • Chair of Network Architectures and Services • Technical University of Munich (Germany) • Co-leader of the Global Internet Observatory project • Research interests • Security protocols (TLS, SSH,. . . ) • Amplification attacks • IPv6 scanning O. Gasser — Evaluating Network Security using Internet Measurements 2

  3. Chair of Network Architectures and Services Department of Informatics Technical University of Munich What will this talk be about? • Internet-wide measurements • SSH • BACnet • IPv6 scanning O. Gasser — Evaluating Network Security using Internet Measurements 3

  4. Chair of Network Architectures and Services Department of Informatics Technical University of Munich Internet measurements • Useful tool • Various techniques • Focus on empirical security measurements O. Gasser — Evaluating Network Security using Internet Measurements 4

  5. Chair of Network Architectures and Services Department of Informatics Technical University of Munich SSH • Secure Shell protocol • Provides encrypted & authenticated remote shell access • Mostly used on servers and routers to provide administrative ac- cess • Security critical protocol → evaluate SSH’s security O. Gasser — Evaluating Network Security using Internet Measurements 5

  6. Chair of Network Architectures and Services Department of Informatics Technical University of Munich SSH measurements • Internet-wide SSH scans 1 • Found ≈ 15 M servers • 42 k servers offer SSH 1 only • Downloaded > 25 M SSH host keys • Host keys identify a server similar to a certificate in TLS • Co-prime weak keys found (0.015 %, 2.4 % for SSH1) • Debian-weak keys found (0.05 %) • Man-in-the-Middle attack possible with weak keys 1 Gasser et al.: “A deeper understanding of SSH: results from Internet-wide scans”, NOMS’14. O. Gasser — Evaluating Network Security using Internet Measurements 6

  7. Chair of Network Architectures and Services Department of Informatics Technical University of Munich SSH: Duplicate keys 1.0 DE 0.5 TW1 • Same key on multiple servers US/JP US SG 0.1 • Similar threat of MitM attacks • Heavily clustered based on Pr[ #hosts > X ] 0.01 Autonomous Systems 1e−3 • Web-hosting providers deploy systems with pre- 1e−4 generated keys • SSH gateways 1 100 10,000 100,000 Number of hosts per key =: X O. Gasser — Evaluating Network Security using Internet Measurements 7

  8. Chair of Network Architectures and Services Department of Informatics Technical University of Munich SSH: Lessons learned • Weak keys • Duplicate keys • Man-in-the-Middle attacks possible • Use public key authentication to thwart MitM • Take cautionary measures before conducting SSH scans ¨ ⌣ O. Gasser — Evaluating Network Security using Internet Measurements 8

  9. Chair of Network Architectures and Services Department of Informatics Technical University of Munich The Internet? O. Gasser — Evaluating Network Security using Internet Measurements 9

  10. Chair of Network Architectures and Services Department of Informatics Technical University of Munich The Internet O. Gasser — Evaluating Network Security using Internet Measurements 10

  11. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet • Building Automation and Control Networks • Used to control • Heating • Solar panels • Ventilation • . . . • Unsolicited access can have real-world consequences • Presence detection → Break into home • Manipulate heating, water flow,. . . • Security & safety critical protocol → evaluate BACnet ’s security O. Gasser — Evaluating Network Security using Internet Measurements 11

  12. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet measurements • Internet-wide BACnet scans 2 • UDP-based request-response protocol • Retrieve and set properties • No security built in • More than 16k devices found 2 Gasser et al.: “Security Implications of Publicly Reachable Building Automation Systems”, WTMC’17. O. Gasser — Evaluating Network Security using Internet Measurements 12

  13. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet: Deployment → Heavily clustered in countries and ASes O. Gasser — Evaluating Network Security using Internet Measurements 13

  14. Chair of Network Architectures and Services Department of Informatics Technical University of Munich Amplification attacks Amplifier Amplifier Network Network Small Large requests response with spoofed to victim IP address Victim Victim Attacker Attacker O. Gasser — Evaluating Network Security using Internet Measurements 14

  15. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet + Amplification attacks? • Connectionless: O. Gasser — Evaluating Network Security using Internet Measurements 15

  16. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet + Amplification attacks? • Connectionless: BACnet → UDP-based � O. Gasser — Evaluating Network Security using Internet Measurements 15

  17. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet + Amplification attacks? • Connectionless: BACnet → UDP-based � • No authentication: O. Gasser — Evaluating Network Security using Internet Measurements 15

  18. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet + Amplification attacks? • Connectionless: BACnet → UDP-based � • No authentication: BACnet → No handshake necessary � O. Gasser — Evaluating Network Security using Internet Measurements 15

  19. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet + Amplification attacks? • Connectionless: BACnet → UDP-based � • No authentication: BACnet → No handshake necessary � • Amplification: O. Gasser — Evaluating Network Security using Internet Measurements 15

  20. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet + Amplification attacks? • Connectionless: BACnet → UDP-based � • No authentication: BACnet → No handshake necessary � • Amplification: BACnet → ? O. Gasser — Evaluating Network Security using Internet Measurements 15

  21. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet: Amplification factor • About 14k BACnet devices misusable as amplifier • Request same property multiple times within one request • Amplification factor similar to DNS Open Resolver • Operators write really detailed location information into BACnet devices O. Gasser — Evaluating Network Security using Internet Measurements 16

  22. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet: Amplification factor • About 14k BACnet devices misusable as amplifier • Request same property multiple times within one request • Amplification factor similar to DNS Open Resolver • Operators write really detailed location information into BACnet devices • Hwy 57; Located in the silver box on the electrical pole in front of Grove Primary Care Clinic. Pole 123 O. Gasser — Evaluating Network Security using Internet Measurements 16

  23. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet + Amplification attacks! • Connectionless: BACnet → UDP-based � • No authentication: BACnet → No handshake necessary � • Amplification: O. Gasser — Evaluating Network Security using Internet Measurements 17

  24. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet + Amplification attacks! • Connectionless: BACnet → UDP-based � • No authentication: BACnet → No handshake necessary � • Amplification: BACnet → Freely choose combination of requested properties � O. Gasser — Evaluating Network Security using Internet Measurements 17

  25. Chair of Network Architectures and Services Department of Informatics Technical University of Munich BACnet: Lessons learned • Never attach your BACnet device to the public Internet • Direct threats: Information leakage, surveillance,. . . • Indirect threats: Misused as amplifier • Notify affected parties via CERTs O. Gasser — Evaluating Network Security using Internet Measurements 18

  26. Chair of Network Architectures and Services Department of Informatics Technical University of Munich IPv6 measurements • IPv6 adoption 3 ≈ 15% • Vast address space • Brute-force scanning approach infeasible • Smart address selection needed 3 https://www.google.com/intl/en/ipv6/statistics.html O. Gasser — Evaluating Network Security using Internet Measurements 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend