Title: The Protection Problem in Enterprise Networks
1The Protection Problem in EnterpriseNetworks
Martin Casado PhD Student in Computer Science,
Stanford University casado_at_cs.stanford.edu http/
/www.stanford.edu/casado
2Talk Focus
- Negative affects of protection measures on edge
networks - Motivated by anecdotes from real networks
- Introduce Ethane
3Network Examples
- National Lab, Small-moderate size business,
academic, hospital - Security sensitive
- More LAN than large routable network
4Problems Areas
- Inflexibility
- Loss of Redundancy
- Filtering woes
5Problems
- Inflexibility
- Loss of Redundancy
- Filtering Woes
6Inflexibility
Firewall Router
L2 Switch
- If one is compromised, cant sniff traffic
of others - Cant enumerate how many hosts on network
- Can only get out through proxy
- Prevent rogue connections
7Inflexibility
Firewall rulesACCEPT 192.168.1.20
Firewall Router
L2 Switch
- If one is compromised, cant sniff traffic
of others - Cant enumerate how many hosts on network
- Can only get out through proxy
- Prevent rogue connections
8Inflexibility
Firewall rulesACCEPT 192.168.1.20
- Turn of ARP
- Static ARP cache cafedeadbeef
192.168.1.20
Firewall Router
L2 Switch
- Turn of ARP
- Static ARP cache
- Cafed0d0 192.168.1.1
9Inflexibility
- No DHCP
- Also insecure
- Might undermine firewall rules
- Might undermine static ARP cache
Firewall rulesACCEPT 192.168.1.20
- Turn of ARP
- Static ARP cache cafedeadbeef
192.168.1.20
Firewall Router
- Turn of ARP
- Static ARP cache
- Cafed0d0 192.168.1.1
10Inflexibility
- No DHCP
- Might undermine firewall rules
- Might undermine static ARP cache
Firewall rulesACCEPT 192.168.1.20
- Turn of ARP
- Static ARP cache cafedeadbeef
192.168.1.20
Firewall Router
- Port Security
- Tie MAC address to Port cafedeadbeef
192.168.1.20
L2 Switch
- Turn of ARP
- Static ARP cache
- Cafed0d0 192.168.1.1
11Inflexibility
- Topology (ports, interfaces) and addresses
sprinkled throughout configuration state - No distributed maintenance like routing tables
- Difficult to move machines
- Moving machines can be bad
- Indirection points (e.g. ARP, DHCP) insecure(..
often removed) - MAC addresses everywhere
- Chew up memory
- No aggregation ?
12Problems
- Inflexibility
- Loss of Redundancy
- Filtering Woes
13Loss of Redundancy
14Loss of Redundancy
- Easier to reason about/verify
- Proxies are a catalyst
- Distributed firewalls are not the solution
- Lack of good support for L5 routing (does anyone
have this turned on?) - Existing solutions exacerbate the problem
- do everything proxies
- Single bridge NACs
15Problems
- Inflexibility
- Loss of Redundancy
- Filtering Woes
16Filtering Woes
- Filtering done on the datapath today
- Generally limited filtering state (so can have
large forwarding tables) - Common problem is running out of ACLs
- MAC addresses everywhere
- Chew up memory
- No aggregation ?
- In some networks, forwarding tables filters
doesnt make sense ..
17Ethane Towards a Solution
- Centrally declare network policy
- Authenticated end-hosts
- Central-arbiter grants permission to connect on
a per flow basis - Central-arbiter has fine grained control of
routes
18Ethane
martin.friends.ambient-streams
Publishmartin.friends.ambient-streamsallow tal,
sundar, aditya
Authenticatehi, Im tal, my password is
First packet tomartin.friends.ambient-streams
Authenticatehi, Im martin, my password is
Global Network Policy (allow all martin using
rtp)
19Ethane Properties
- Flexibility
- Dynamic bindings are secure(movement is easy)
- Security policy independent of topology
- Redundancy
- More switches ! more configuration state
- Fine grained control of routes allows L5 routing
- Permission checks done on connection setup(taken
off data path)
20Thanks!
21Isolation
- Networks exist today with differing levels of
sensitivity - Casino
- Financial
- Medical
- Government/Military
- Want reasonable Isolation
- No DDoS from less secure to more
- No data exfiltration from more secure to less
- Note, VLANs generally insufficient
This is not solely a governmentnetwork problem
22Todays Solution
(really) heavyweight,application
proxy(cannonicalization fuzzy timers)
OR
23Isolation Cont
- Obviously suboptimal
- Management
- Number of components (MTTF)
- Could use same components, separate queues, TDM
- Consolidation on the road-map for some very large
networks