Security components of the CERN farm nodes Vladimír Bahyl CERN - IT/FIO Presented by Thorsten Kleinwort.

Slides:



Advertisements
Similar presentations
Snort: A Network Intrusion Detection Software Matt Gustafson Becky Smith CS691 Semester Project Spring 2003.
Advertisements

Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Intrusion Detection Systems and Practices
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Linux+ Guide to Linux Certification, Second Edition
Lecture 11 Intrusion Detection (cont)
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Windows Server 2008 Chapter 11 Last Update
Security Guidelines and Management
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chapter 7: Using Windows Servers to Share Information.
COEN 252 Computer Forensics
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
1 Network File Sharing. 2 Module - Network File Sharing ♦ Overview This module focuses on configuring Network File System (NFS) for servers and clients.
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
BUSINESS B1 Information Security.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
CERN’s Computer Security Challenge
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Distributed IDS The implementation of a Distributed Intrusion Detection System over a medium scale open network where the focus is availability of services.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.
Linux Networking and Security
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Module 1: Installing Microsoft Windows XP Professional.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
SNORT Biopsy: A Forensic Analysis on Intrusion Detection System By Asif Syed Chowdhury.
1 Periodic Processes and the cron Daemon The cron daemon is where all timed events are initiated. The cron system is serviced by the cron daemon. What.
802.11n Sniffer Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Core System Services. INIT Daemon The init process is the patron of all processes. first process that gets started in any Linux/ UNIX -based system.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
Module 8 : Configuration II Jong S. Bok
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Chapter 9 Intruders.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
RUM Security FAQ “Can RUM meet PCI DSS requirements?” − PCI: Do not use vendor-supplied defaults for system passwords and other security parameter Change.
Chapter 9 Intruders.
Working at a Small-to-Medium Business or ISP – Chapter 8
Nicholas Hsiao Critical Log Review Checklist for Security Incidents – By ArcSight Logger For template guidelines or applying this.
NETWORKS Fall 2010.
Hands-On Microsoft Windows Server 2008
ITIS 3110 IT Infrastructure II
Intrusion Detection Systems (IDS)
Chapter 9 Intruders.
Operating System Security
Presentation transcript:

Security components of the CERN farm nodes Vladimír Bahyl CERN - IT/FIO Presented by Thorsten Kleinwort

Autumn HEPiX 2003, Triumf, Vancouver, Canada 2 Outline Current state – Our typical system – Possible risks Protection methods – Security related – Against denial of service Conclusion

Autumn HEPiX 2003, Triumf, Vancouver, Canada 3 A typical farm node 2 CPUs / 1 GB RAM / 20 GB disk 100 Mbit network CERN RedHat Linux users 70 primary interactive nodes

Autumn HEPiX 2003, Triumf, Vancouver, Canada 4 Risks Security related: – Exploits to the system to get root – Services started on unprivileged ports – System can be used to scan other nodes originate spam Denial of service: – “Heavy” processes started – Disk filled by “runaway” jobs

Autumn HEPiX 2003, Triumf, Vancouver, Canada 5 Our protection methods Keep the system secure and up-to-date (with CDB & SPMA) Log more verbosely than default Collect the logs centrally Scan for certain patterns in the logs Keep the system accounting Provide secure access methods only Transfer sensitive information securely – E.g. password files – but in general anything; use GPG for encryption Monitor the current state – Disk – quota is enabled – CPU usage – beniced daemon Incident reaction – as quick as possible – No later than the next working day – compromised account is blocked

Autumn HEPiX 2003, Triumf, Vancouver, Canada 6 Log more It is always good to have more information to go back to in case of a need Daemons are configured to log as much data as is convenient – portmap -v netlog – the ultimate kernel module – logs TCP activity – outputs a line whenever a listening socket or an incoming or outgoing connection is established – it logs the program concerned, the session id, process id and user id – it also logs connection details (protocol, local/remote addresses and ports – provides extremely useful data in forensic investigation

Autumn HEPiX 2003, Triumf, Vancouver, Canada 7 Netlog example Incoming connections: Oct 14 21:49:43 node kernel: netlog: info: connect start TCP :44073 < : pmg_agent Oct 14 21:49:43 node kernel: netlog: info: connect stop TCP :44073 < : pmg_agent Outgoing connections: Oct 14 18:18:49 node kernel: netlog: info: connect start TCP : > : wget Oct 14 18:18:52 node kernel: netlog: info: connect stop TCP : > : wget

Autumn HEPiX 2003, Triumf, Vancouver, Canada 8 Collect the logs Make sure that all daemons log via the syslog facility Combine the logs in a single file – Option in /etc/syslog.conf Process log files locally on each node – Combine the connection data – Remove uninteresting information E.g. node boot messages – Compress Forward to a central place = Oracle database – Do it in regular intervals to prevent loss of data (~ every hour)

Autumn HEPiX 2003, Triumf, Vancouver, Canada 9 Scan for certain patterns For example: – IRC activity IRC servers violate CERN’s computing rules – SUID ptrace exploit attempts 2003/07/23-13:10:38 Uu ? node.cern.ch[ ] kernel request_module[net-pf-14]: waitpid(28284,...) failed, errno /01/31-01:46:23 Uu ? node.cern.ch[ ] kernel ptrcchk: uid=19201 tried ptrace on suid/sgid file /usr/bin/passwd – Generated by a proprietary kernel module – network sniffer 2003/10/03-17:44:54 Uu ? node.cern.ch[ ] kernel device eth0 entered promiscuous mode – repeated login failures – etc. This data can use used together with network IDS results

Autumn HEPiX 2003, Triumf, Vancouver, Canada 10 Keep system accounting Also very important element in forensics analysis 3 months of raw data on each node – Will soon be centralized Compressed with bzip2 -9 Parsed, summarized and stored centrally for statistical purposes

Autumn HEPiX 2003, Triumf, Vancouver, Canada 11 Conclusion When does it work well ? – Repeated intruder activity When there is a new intrusion pattern we quickly add a new scan pattern – Intruder doesn’t know our infrastructure What are the limits ? – First time when there is a new way to break in we do not know about – Intruder discovers our infrastructure (clusters)

12 Questions ? Contact: Thank you !