Supporting A Laptop Environment Erick Engelke Faculty of Engineering University of Waterloo

Slides:



Advertisements
Similar presentations
Anders Vinger, University of Oslo Personal Data Recovery The pain of laptops.
Advertisements

Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Barracuda Web Application Firewall
Wireless.ubc.ca Balancing security and usability on the world’s largest Wi-Fi campus network Jonn Martell Wireless Project Manager, UBC
Defending Laptops with MinUWet By Erick Engelke. Laptops and our future? laptops now outsell desktops laptops now outsell desktops we expect continued.
System and Network Security Practices COEN 351 E-Commerce Security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicPresentation_ID 1 Justin Rowling – Systems Engineer Protecting your network with Network Admission.
Lecture 6 Networked Application Security IT 202—Internet Applications Based on notes developed by Morgan Benton.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
IT:Network:Apps.  Security Options  Group Policy  AppLocker  ACL.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
PresentPC August 2009 Erick Engelke Engineering Computing.
Macintosh Configuration Management Will Jorgensen 1.
Dynamics AX Technical Overview Application Architecture Dynamics AX Technical Overview.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Course 201 – Administration, Content Inspection and SSL VPN
P2P File Sharing Systems
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
Eucalyptus Virtual Machines Running Maven, Tomcat, and Mysql.
Lecture 7 Page 1 CS 236 Online Password Management Limit login attempts Encrypt your passwords Protecting the password file Forgotten passwords Generating.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
1 Technology Coordinator Meeting Humanities 019 Friday, March 29, 2002.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
How to create DNS rule that allow internal network clients DNS access Right click on Firewall Policy ->New- >Access Rule Right click on Firewall.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Overview Managing a DHCP Database Monitoring DHCP
12 Steps to Cloud Security A guide to securing your Cloud Deployment Vishnu Vettrivel Principal Engineering Lead,
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Living Next to the Anarchists By Erick Engelke. Anarchists? Anarchy is (various definitions) - lawlessness or disorder when there is a lack of governance.
The Next Generation Wireless Yuri Kolomiyets Network Services Information Systems and Technology.
Defending Laptops with MinUWet By Erick Engelke. Laptops and our future? laptops now outsell desktops laptops now outsell desktops we expect continued.
NetTech Solutions Protecting the Computer Lesson 10.
Defending Laptops with MinUWet By Erick Engelke. Laptops and our future? laptops now outsell desktops laptops now outsell desktops we expect continued.
What’s New in Fireware v WatchGuard Training.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Tuque Automated Software Distribution System By Erick Engelke.
Copyright ©2016 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Fireware v
Technology Requirements for Online Testing Training Module Please refer to the revision log on the last slide of this presentation, updated August.
IT06 – HAVE YOUR OWN DYNAMICS NAV TEST ENVIRONMENT IN 90 MINUTES
Hybrid Cloud Web Filtering Platform
Web Application Protection Against Hackers and Vulnerabilities
Password Management Limit login attempts Encrypt your passwords
Cisco Real Exam Dumps IT-Dumps
Migration Strategies – Business Desktop Deployment (BDD) Overview
Nessus Vulnerability Scanning
Chapter 5: CPU Scheduling
Design Unit 26 Design a small or home office network
Connecting Remotely Winter 2014.
Software System Testing
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

Supporting A Laptop Environment Erick Engelke Faculty of Engineering University of Waterloo

Initial Requirements check client identity check client identity userid/password to authenticate, authorize and log usage userid/password to authenticate, authorize and log usage password verification (Active Directory) password verification (Active Directory) many similar solutions available (now) many similar solutions available (now) uncertain of other needs at that time uncertain of other needs at that time

Network Authentication Appliance homegrown box (FreeBSD) to: homegrown box (FreeBSD) to: authenticate against either of 2 Active Directories authenticate against either of 2 Active Directories authorize access authorize access log usage log usage act as router/firewall act as router/firewall

Observations laptops outsell desktops laptops outsell desktops expect continued growth of laptop usage expect continued growth of laptop usage new learning opportunities with laptops, but also new challenges for staff new learning opportunities with laptops, but also new challenges for staff chasing security and bandwidth issues is time- consuming for staff chasing security and bandwidth issues is time- consuming for staff

Part 1 Bandwidth Management (thanks to Bruce Campbell)

Bandwidth Problem laptops consistently became highest bandwidth consumers laptops consistently became highest bandwidth consumers chasing people for bandwidth usage is time consuming chasing people for bandwidth usage is time consuming is it possible to classify bandwidth as good/academic versus evil or recreational? is it possible to classify bandwidth as good/academic versus evil or recreational?

Good Versus Bad are their good and bad protocols? are their good and bad protocols? KAZAA, SKYPE are bad! KAZAA, SKYPE are bad! SSH is good! SSH is good! except except SKYPE for collaboration is good SKYPE for collaboration is good SSH used to tunnel bad protocols is bad SSH used to tunnel bad protocols is bad

What are we trying to solve? If the issue is excessive bandwidth consumption, we are trying to reduce unnecessary bandwidth!

Traffic Shaping flat rate shaping is common flat rate shaping is common to constrict to 2 GB/day: 20 kB/s yikes! Interactive web sites and good browsing are hindered to constrict to 2 GB/day: 20 kB/s yikes! Interactive web sites and good browsing are hindered 100 kB/s yields 2 DVD downloads per day using bittorrent, but still feels slow (30 seconds) downloading a 3 MB powerpoint slide 100 kB/s yields 2 DVD downloads per day using bittorrent, but still feels slow (30 seconds) downloading a 3 MB powerpoint slide

Analyze Typical Traffic Patterns consistent low traffic volume is fine sustained high volume is bad bursts of high traffic is typical web browsing, page editing, book reading, etc.

Traffic Shaping Summary fancy shaping algorithms like RED, WFQ, etc. are very coarse tools for bandwidth management fancy shaping algorithms like RED, WFQ, etc. are very coarse tools for bandwidth management they only measure what is going through the pipe, not what has gone through the pipe they only measure what is going through the pipe, not what has gone through the pipe we want a feedback loop! we want a feedback loop!

Toilet Tank Traffic Shaper emulate a toilet emulate a toilet resevoir of bandwidth resevoir of bandwidth high output flow high output flow small input flow small input flow users can enjoy a burst of bandwidth, but it slows to a trickle if you hold the lever users can enjoy a burst of bandwidth, but it slows to a trickle if you hold the lever release the lever and the reservoir refills, ready for the next download release the lever and the reservoir refills, ready for the next download

TTTS Settings tank size tank size maximum output rate maximum output rate maximum input rate maximum input rate minimum time to empty minimum time to empty causes output rate to decrease exponentially causes output rate to decrease exponentially full percent full percent level at which full output rate is available level at which full output rate is available

How It Works Internally uses FreeBSD’s flat rate traffic shaping uses FreeBSD’s flat rate traffic shaping cron job every minute cron job every minute looks at past traffic looks at past traffic ‘pipes’ are resized according to formula ‘pipes’ are resized according to formula high volume users see gradual slowing high volume users see gradual slowing when they stop, the speed increases when they stop, the speed increases “doctor it hurts when I do this” … “well stop doing that!” “doctor it hurts when I do this” … “well stop doing that!”

TTTS Settings at UW tank size: 200 MB tank size: 200 MB max bandwidth: unlimited max bandwidth: unlimited min bandwidth: 40 kB/s min bandwidth: 40 kB/s min empty time: 5 minutes min empty time: 5 minutes full percent: 80% full percent: 80% separate upload/download queues separate upload/download queues negligable effect on 95% of users negligable effect on 95% of users as if there were no rate limiting at all! as if there were no rate limiting at all! heavy bandwidth users not possible heavy bandwidth users not possible

Part 2 Client Admission Control MinUWet

Goal We want a strategy which encourages responsible client laptop management… antivirus installed, receiving windows updates

How to Encourage Security educate educate reward reward remind nag embarrass punish or

How to Encourage Security educate ? educate ? reward reward remind nag embarrass punish or

How to Encourage Security educate educate reward reward remind nag embarrass punish or

detect and zero in on problem OS’s detect and zero in on problem OS’s for Windows for Windows need Antivirus, Updates need Antivirus, Updates other OS’s must not be hinderred other OS’s must not be hinderred Goals

MinUWet NAA detects OS at login time NAA detects OS at login time vulnerable OS’s vulnerable OS’s placed into restricted mode, just HTTP access placed into restricted mode, just HTTP access that’s enough to get latest updates, definitions that’s enough to get latest updates, definitions Must run/pass our client validation tool (MinUWet) to get additional network protocols Must run/pass our client validation tool (MinUWet) to get additional network protocols other OS’s are not affected other OS’s are not affected

Not Entirely Original similar to Cisco’s Network Admission Control and MS Network Access Protection similar to Cisco’s Network Admission Control and MS Network Access Protection Cisco and MS systems are stronger, but less flexible and require big investment or waiting for release Cisco and MS systems are stronger, but less flexible and require big investment or waiting for release MinUWet doesn’t have to be perfect, just better than previous mess MinUWet doesn’t have to be perfect, just better than previous mess MinUWet can be retired upon better options MinUWet can be retired upon better options

Statistics from Two Week Trial just Faculty of Engineering just Faculty of Engineering 6486 wireless Windows users 6486 wireless Windows users ¼ of them failed MinUWet initially ¼ of them failed MinUWet initially ½ of failures were then fixed by users and staff ½ of failures were then fixed by users and staff Zero observed security threats (snort) Zero observed security threats (snort)

Campus-wide Deployment day 1 day 1 informed IT helpdesk staff informed IT helpdesk staff day 2 day 2 message in daily bulletin message in daily bulletin brief message at every wireless login brief message at every wireless login users may choose to test their systems users may choose to test their systems day 14 day 14 system goes live campus-wide in enforce mode system goes live campus-wide in enforce mode

Observations great for IT staff, no chasing people great for IT staff, no chasing people users of poorly managed systems informed users of poorly managed systems informed fast, takes only seconds fast, takes only seconds people don’t like running it every time people don’t like running it every time

MinUWet Memory Added laptops now validate only once per week laptops now validate only once per week 2/3 rd ’s of laptops are pre-approved 2/3 rd ’s of laptops are pre-approved still frequent enough to catch computers which fall out-of-scope of AV or patches still frequent enough to catch computers which fall out-of-scope of AV or patches

What We Learned client validation works, every school will get it eventually client validation works, every school will get it eventually some users know they will fail, so they live with HTTP- only access some users know they will fail, so they live with HTTP- only access IT support made more scalable IT support made more scalable may be a good idea for grad student wired computers, residences may be a good idea for grad student wired computers, residences

Wireless Needs (Revised) identity (auth/access/logging) identity (auth/access/logging) bandwidth management bandwidth management admission control admission control data encryption (VPN, 802.1X) data encryption (VPN, 802.1X) roaming – variety of options roaming – variety of options

Thank You