Transcript Document

Designing Manageable Protocols
Andrew Cormack
Chief Security Adviser
UKERNA
TERENA Networking Conference, 2003
©The JNT Association, 2003
Why Manage Networks?
Networks have production uses


Teaching, assessment, administration, video conferencing, …
Time-critical, bandwidth-criticial, reliability-critical
Bandwidth is finite
Some things are more important than others

Different priorities in different organisations
Important things should have priority

Helps if priorities are written down!
TERENA Networking Conference, 2003
©The JNT Association, 2003
Management Tools?
Manager told – “Service X is important”
Manager sees – IP packets
Packets have
Source & destination address
 Source & destination port
 Initial TCP packet has a direction

How to map packets to services?

Need help from protocol design
TERENA Networking Conference, 2003
©The JNT Association, 2003
Management Requirements
Identifiable

Services give rise to recognisable network flows
Controllable


Services can be permitted on some network segments
Services can be denied from some network segments
Non-hazardous


My use of a service must not be a hazard to others
My use of a service should not be a hazard to me
TERENA Networking Conference, 2003
©The JNT Association, 2003
Management Assumptions
Least-worst assumptions

Port number identifies service
• E.g. port 80 = web
IP address(es) identify location on network
 Source is client; destination is server [TCP only]

Dangerous assumptions
IP address identifies person
 Port <1024 means trusted

TERENA Networking Conference, 2003
©The JNT Association, 2003
Case Studies – HTTP
I [
C[
H[
I [
C[
H?
?
80
www.site
?
TERENA Networking Conference, 2003
©The JNT Association, 2003
Case Studies – FTP
I [
C[
H?
I ?
C[
Hx
?
21
ftp.site
?
?
TERENA Networking Conference, 2003
20
©The JNT Association, 2003
Case Studies – passive FTP
Ix
Cx
H[
Ix
Cx
Hx
?
21
ftp.site
?
?
TERENA Networking Conference, 2003
?
©The JNT Association, 2003
Case Studies – P2P (Napster)
Ix
Cx
Hx
Ix
Cx
Hx
6697-6701 + more
?
Variable UDP ports
?
4444-8888 64.124.41/24
TERENA Networking Conference, 2003
©The JNT Association, 2003
Future developments
Dynamic address allocation
DHCP or NAT
 Must align address allocation with managed groups

IP version 6
Little change to manageability
 Port numbers may be buried in a chain of headers
 Encryption may make application layer invisible
 Mobility is extreme dynamic address allocation

TERENA Networking Conference, 2003
©The JNT Association, 2003
Conclusion: Protocols need
Identifiable traffic flows

Well defined, appropriate use of reserved ports
Clarity over relationship between hosts

Direction of initiation must be apparent
Support for layered protection
Expect to meet firewalls; work with proxies
 Application proxies may be only option

TERENA Networking Conference, 2003
©The JNT Association, 2003
Give managers options
YES/NO is not enough
TERENA Networking Conference, 2003
©The JNT Association, 2003
TERENA Networking Conference, 2003
©The JNT Association, 2003