260 likes | 389 Vues
This presentation by Bill Claycomb, Systems Analyst at Sandia National Laboratories, explores the vulnerabilities and protection strategies associated with virtual directory services. It delves into various attack models, including authentication, cache, and network attacks, while highlighting preventive measures to safeguard sensitive directory information. The discussion focuses on directory services' critical role in user authentication, access control, and data integrity, providing insights into the future directions of virtual directory security and the challenges it faces.
E N D
Virtual Directories:Attack Models and Prevention June 2nd, 2009 Bill Claycomb Systems Analyst Sandia National Laboratories Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company,for the United States Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000.
Agenda • Directory services and virtual directories • Threats to directory services • Attack models for directory services • Preventing attacks on directory services • Protecting information in directory services • Future directions
Directory Services • Localized data store containing information about objects • Users • Computers • Contacts, etc. • Provide information to applications • Authentication and access control • Contact information • Group membership • Use LDAP Communication Protocol • Lightweight Directory Access Protocol
Directory Services Data dn: cn=Joe User,dc=somedomain,dc=com cn: Joe User givenName: Joe sn: User telephoneNumber: 1 505 555 1212 postalAddress: 123 Main St. mail: juser@somedomain.com objectClass: inetOrgPerson objectClass: organizationalPerson objectClass: person objectClass: top Object Attribute
Directory Services • Popular Directory Services Implementations • Windows Server Active Directory • IBM Tivoli • Apple Open Directory • OpenLDAP • Fedora Directory Server • Sun JAVA System Directory Server
Virtual Directories Virtual Directory Server Client Directory Servers
Virtual Directories Synchronization Virtual Directory Server Data Stores Directory Servers
Threats to Sensitive Directory Information • “Insider Threat Study: Illicit Cyber Activity in the Government Sector”, a study conducted by U.S. Secret Service and CERT (2008) found: • Most of the insiders had authorized access at the time of their malicious activities • Access control gaps facilitated most of the insider incidents, including: • The ability of an insider to use technical methods to override access controls without detection • System vulnerabilities that allowed technical insiders to use their specialized skills to override access controls without detection
Attack Models on Virtual Directories • Authentication Attacks • Cache Attacks • Data Transformation Attacks • Network Attacks • Data Source Attacks
Authentication Attacks Stored Credentials User Credentials Stored Credentials Virtual Directory Server Stored Credentials Destination Servers
Preventing Authentication Attacks • Require pass-through authentication • Use a surrogate pass-through directory if necessary • User restricted accounts when stored credentials are required
Cache Attacks High Speed Cache Client Virtual Directory Server Directory Servers
Preventing Cache Attacks • Do not use cache for high-risk information • Require frequent consistency checks • Require datastore connectivity before returning any data • Protect cache on directory server
Data Transformation Attacks (505) 555-1212 505-555-1212 US Citizen: Y US Citizen: N Data Transformation Virtual Directory Server Client Directory Servers
Preventing Data Transformation Attacks • Protect transformation scripts on virtual directory server • Do not allow transformation of sensitive data • Double-check sensitive data sent to client machines • Establish consistency checking on transformation scripts • Monitor for changes
Network Attacks Accounts: X Y Z Change Detected: Disable Account X Virtual Directory Server Directory Server
Network Attacks Accounts: X Y Z Change Detected: Disable Account X Virtual Directory Server Directory Server
Preventing Network Attacks • Detect inconsistencies in data stores • Require consistency checking at standard intervals • Require consistency checking after network disruption • Require transactions to be atomic and durable
Data Source Attacks Synchronization Virtual Directory Server Authoritative Data Store Account Store
Preventing Data Source Attacks • Protect authoritative data sources • Monitor sensitive data modifications • Protect sensitive data
Protecting Sensitive Directory Information Personal Virtual Directory Service
Protecting and Delegating Access • New Approach • S – symmetric data encryption key • Krw / K’rw– public/private key pair for signing data • Kux – data user public key • Ko/ K’o– data owner public/private key pair • IDo – data owner identifier
Advantages of PVDS • Uses existing key management infrastructure • Little client modification • No user-based key protection • Directory independent • Can be extended to protect databases as well • Performance impact largely confined to clients utilizing PVDS capabilities
Future Directions • Implement attack models to determine feasibility • Explore attacks on various VDS implementations • Identify additional attacks on virtual directory servers • PVDS • Reduce the impact of working with encrypted attributes • Analyze impact to different types of data sources • Consider how security policies may conflict with using a virtual directory to manage security • Usability studies
Questions • http://www.sandia.gov • wrclayc@sandia.gov