SlideShare a Scribd company logo
1 of 39
Download to read offline
Software
Defined
Networking
Security
Outline
● Introduction
● What is SDN?
● SDN attack surface
● Recent vulnerabilities
● Security response
● Defensive technologies
● Next steps
Introduction
● Security nerd, recovering climatologist
● Managed Red Hat's Java middleware security team
● Now manager of product security for Console, and
founder of the ODL and ONOS security teams
● Open source SDN is hot, with development being
driven by a wide range of commercial and non-
profit entities
● 2015 is emerging as the year when SDN starts to
move from the lab to widespread deployment for
production networks (Google, Pacnet, etc.)
● Is it secure?
What is SDN?
“SDN is an approach to computer
networking that allows network
administrators to manage network services
through abstraction of higher-level
functionality. This is done by decoupling the
system that makes decisions about where
traffic is sent (the control plane) from the
underlying systems that forward traffic to
the selected destination (the data plane).”
- The Wikipedia hive mind
SDN attack surface
SDN Attack Surface
● Traditional networks conflate the control and data
planes on a physical device
● Software-defined networks factor the control plane
out to a SDN controller.
● The controller uses a protocol such as OpenFlow to
control switches, which are now only responsible
for handling the data plane
● Advantage: easily segregate the control plane
network from the production data network
● Disadvantage: the SDN controller's ability to control
an entire network makes it a very high value target
SDN Attack Surface
SDN Attack Surface
● SDN controllers are also exposed via the data plane
● When an OpenFlow switch encounters a packet that
does not match any forwarding rules, it passes this
packet to the controller for advice.
● As a result, it is possible for an attacker who is
simply able to send data through an SDN switch to
exploit a vulnerability on the controller.
● Switches out of scope for this presentation. See
Gregory Pickett's BH 2015 talk if you're interested.
SDN Attack Surface
Recent SDN vulnerabilities
SDN Controller Vulns
● There are many competing SDN controller
implementations
● The two most prominent ones are open source,
written in Java/OSGi, and backed by many large
vendors
● OpenDaylight/ODL (Linux Foundation)
● ONOS (lots of Chinese backing: telcos, Huawei,
etc.)
Netconf CVE-2014-5035
● ODL Netconf API processes user-supplied XML (also
restconf)
● Example vuln code: controller / opendaylight/netconf/netconf-
util/src/main/java/org/opendaylight/controller/netconf/util/xml/XmlUtil.java
● Demo...
Topology spoofing via host
tracking CVE-2015-1611
● Most SDN controllers include host tracking, allowing
hosts to migrate between different physical
locations in the network.
● Host tracking is based on monitoring of Packet-In
messages, and does not require any validation,
authentication, or authorization.
● An attacker can impersonate a host and make the
SDN controller believe it has migrated to a physical
network location controlled by the attacker.
Topology spoofing via host
tracking CVE-2015-1611
● For an attacker to exploit this flaw, they only need
to be able to send malicious messages through a
switch controlled by an SDN controller (i.e. data
plane)
● The only pre-requisite is that the attacker must
know the MAC address of the target host. For more
details on this flaw, see:
http://www.internetsociety.org/sites/default/files/10
_4_2.pdf
DoS in ONOS packet
deserializer CVE-2015-1166
● When an OpenFlow switch encounters a packet that
does not match any forwarding rules, it passes this
packet to the controller for advice.
● It was found that the packet deserializers in ONOS
would throw exceptions when handling malformed,
truncated, or maliciously-crafted packets.
● The exceptions were not caught and handled,
which would result in the relevant switch being
disconnected because an exception occurred in an
I/O thread.
● Demo...
Defensive technologies
Topoguard
● The same research team that reported the topology
spoofing flaw developed topoguard to mitigate it
● Verifies the conditions of a host migration.
● A legitimate host migration would involve a Port
Down signal before the host migration finishes. It
would also mean that the host would be
unreachable at its old physical network location
after the migration is complete.
● Currently tightly coupled to the Floodlight controller
Security-mode ONOS
● A new feature targeting the upcoming ONOS
'Cardinal' release.
● Effectively a mandatory access control (MAC)
implementation for ONOS applications
● Applications can be constrained by a policy
dictating which actions they are permitted to
perform.
● A vulnerability in an ONOS application could not be
exploited to perform actions that are not permitted
by security-mode ONOS. This is similar to the
protection SELinux provides for applications
running on Linux systems.
Security response best practices
Open Source Security Response
● All information public
● Not just source code: bug trackers, mailing lists,
etc.
● Security requires the opposite approach:
information must be kept private until patches are
available
● How do you handle this in the context of an open
source project?
● A dedicated security team with a documented
process
Open Source Security Response
● Dedicated mechanism for reporting security issues,
separate to normal bugs
● Dedicated team with a documented process for
responding to these reports
● Ability to quickly build a patch asynchronous to
normal release schedules
● Clear documentation of the issue in an advisory,
including references to patch commits (advantage
of open source)
● More transparent than proprietary vendors
(FireEye, Oracle...)
Secure engineering best practices
Open Source Secure Engineering
● No well established best practices
● Few good examples in the open source world.
Proprietary software currently does this better, e.g./
microsoft's SDLC.
● OpenStack is one good example
● Separate VMT and OSSG teams
Open Source Secure Engineering
Open Source Secure Engineering
● Secure development guidelines (relies on
developers to implement)
● Developer training (I just did this for everyone in
the room, but it is“expensive” and difficult to roll
out in a virtual environment)
● Automated QE/CI jobs to catch issues and enforce
standards, e.g. via static analysis
● Static analysis with 56 bug patterns
● http://h3xstream.github.io/find-sec-bugs/
ODL: Current security status
ODL: Security Response
● Security reporting mechanism
● Dedicated team with a private mailing list and
basic process for handling issues
● Security advisories page
ODL: Secure Engineering
● Great analysis performed in May 2014, but no
action on fixing things. Cue the ODL summer
internship program.
ODL: Security vision
ODL: Security Vision
● Industry leading secure engineering function
● Security docs (e.g. best practice install guide)
● Developer training as part of committer onboarding
● Automated QE/CI jobs to catch issues and
regressions
● No reliance on documented secure coding standard
(automate any standards in QE/CI jobs)
Next steps
Next Steps
● More research into data plane → control plane
attacks
● Greater focus from the offensive security
community as a whole – so far only Pickett and I
seem to be looking
● Can we get a decent implementation not written in
Java?
● Big vendors: please give at least one single fuck!
Questions?

More Related Content

What's hot

SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3Wen-Pai Lu
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?Sophos Benelux
 
Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingPriyanka Aash
 
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...Open Networking Perú (Opennetsoft)
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)Ameer Sameer
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking playersAmeer Sameer
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Siyabonga Masuku
 
OpenFlow Controllers and Tools
OpenFlow Controllers and ToolsOpenFlow Controllers and Tools
OpenFlow Controllers and Toolsrjain51
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)rjain51
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)Ahmed Ayman
 
Incident Response in Cyber-Relevant Time - OpenC2
Incident Response in Cyber-Relevant Time - OpenC2Incident Response in Cyber-Relevant Time - OpenC2
Incident Response in Cyber-Relevant Time - OpenC2Vasileios Mavroeidis
 
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...journalBEEI
 
Sdn presentation
Sdn presentation Sdn presentation
Sdn presentation Frikha Nour
 
Why sdn
Why sdnWhy sdn
Why sdnlz1dsb
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDxCentral
 
A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineKaspersky
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSebastien Gioria
 

What's hot (20)

Sdn&security
Sdn&securitySdn&security
Sdn&security
 
SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3SDN Security Talk - (ISC)2_3
SDN Security Talk - (ISC)2_3
 
SDN - a new security paradigm?
SDN - a new security paradigm?SDN - a new security paradigm?
SDN - a new security paradigm?
 
Attacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networkingAttacking SDN infrastructure: Are we ready for the next gen networking
Attacking SDN infrastructure: Are we ready for the next gen networking
 
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
IntelFlow: Toward adding Cyber Threat Intelligence to Software Defined Networ...
 
Security of software defined networking (sdn) and cognitive radio network (crn)
Security of software defined networking (sdn) and  cognitive radio network (crn)Security of software defined networking (sdn) and  cognitive radio network (crn)
Security of software defined networking (sdn) and cognitive radio network (crn)
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
Software defined networking players
Software defined networking playersSoftware defined networking players
Software defined networking players
 
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
Evaluation of Authentication Mechanisms in Control Plane Applications for Sof...
 
OpenFlow Controllers and Tools
OpenFlow Controllers and ToolsOpenFlow Controllers and Tools
OpenFlow Controllers and Tools
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
 
Incident Response in Cyber-Relevant Time - OpenC2
Incident Response in Cyber-Relevant Time - OpenC2Incident Response in Cyber-Relevant Time - OpenC2
Incident Response in Cyber-Relevant Time - OpenC2
 
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
 
Sdn presentation
Sdn presentation Sdn presentation
Sdn presentation
 
Why sdn
Why sdnWhy sdn
Why sdn
 
Certificate Management Protocols for 1609.2 Certificates
Certificate Management Protocols for 1609.2 CertificatesCertificate Management Protocols for 1609.2 Certificates
Certificate Management Protocols for 1609.2 Certificates
 
SDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined NetworkingSDN Basics – What You Need to Know about Software-Defined Networking
SDN Basics – What You Need to Know about Software-Defined Networking
 
A look at current cyberattacks in Ukraine
A look at current cyberattacks in UkraineA look at current cyberattacks in Ukraine
A look at current cyberattacks in Ukraine
 
Secure Coding for Java - An Introduction
Secure Coding for Java - An IntroductionSecure Coding for Java - An Introduction
Secure Coding for Java - An Introduction
 

Similar to Secure Your SDN with Defensive Technologies

OpenDaylight Brisbane User Group - OpenDaylight Security
OpenDaylight Brisbane User Group - OpenDaylight SecurityOpenDaylight Brisbane User Group - OpenDaylight Security
OpenDaylight Brisbane User Group - OpenDaylight SecurityDavid Jorm
 
Building world-class security response and secure development processes
Building world-class security response and secure development processesBuilding world-class security response and secure development processes
Building world-class security response and secure development processesDavid Jorm
 
Security of OpenDaylight platform
Security of OpenDaylight platformSecurity of OpenDaylight platform
Security of OpenDaylight platformOpenDaylight
 
The State of the Veil Framework
The State of the Veil FrameworkThe State of the Veil Framework
The State of the Veil FrameworkVeilFramework
 
Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source B.A.
 
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFIRTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFIGerardo Pardo-Castellote
 
Deepfence.pdf
Deepfence.pdfDeepfence.pdf
Deepfence.pdfVishwas N
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...University of Technology - Iraq
 
WebGoat.SDWAN.Net in Depth
WebGoat.SDWAN.Net in DepthWebGoat.SDWAN.Net in Depth
WebGoat.SDWAN.Net in Depthyalegko
 
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment Sergey Gordeychik
 
software defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllerssoftware defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllersIsaku Yamahata
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsJay Bryant
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...APNIC
 
SDN: Network Agility in the Cloud
SDN: Network Agility in the CloudSDN: Network Agility in the Cloud
SDN: Network Agility in the CloudSebastien Goasguen
 
Iot development from prototype to production
Iot development from prototype to productionIot development from prototype to production
Iot development from prototype to productionMender.io
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldDevOps.com
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksVaidas Brundza
 

Similar to Secure Your SDN with Defensive Technologies (20)

OpenDaylight Brisbane User Group - OpenDaylight Security
OpenDaylight Brisbane User Group - OpenDaylight SecurityOpenDaylight Brisbane User Group - OpenDaylight Security
OpenDaylight Brisbane User Group - OpenDaylight Security
 
Building world-class security response and secure development processes
Building world-class security response and secure development processesBuilding world-class security response and secure development processes
Building world-class security response and secure development processes
 
Security of OpenDaylight platform
Security of OpenDaylight platformSecurity of OpenDaylight platform
Security of OpenDaylight platform
 
The State of the Veil Framework
The State of the Veil FrameworkThe State of the Veil Framework
The State of the Veil Framework
 
Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source Proactive monitoring tools or services - Open Source
Proactive monitoring tools or services - Open Source
 
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFIRTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
RTI/Cisco response to the Software Defined Networks (SDN) OMG RFI
 
Deepfence.pdf
Deepfence.pdfDeepfence.pdf
Deepfence.pdf
 
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
Performance Evaluation for Software Defined Networking (SDN) Based on Adaptiv...
 
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
 
WebGoat.SDWAN.Net in Depth
WebGoat.SDWAN.Net in DepthWebGoat.SDWAN.Net in Depth
WebGoat.SDWAN.Net in Depth
 
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
 
Nareshkumar_CV
Nareshkumar_CVNareshkumar_CV
Nareshkumar_CV
 
software defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllerssoftware defined network, openflow protocol and its controllers
software defined network, openflow protocol and its controllers
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
Introduction to Software Defined Networking (SDN) presentation by Warren Finc...
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
SDN: Network Agility in the Cloud
SDN: Network Agility in the CloudSDN: Network Agility in the Cloud
SDN: Network Agility in the Cloud
 
Iot development from prototype to production
Iot development from prototype to productionIot development from prototype to production
Iot development from prototype to production
 
The Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote WorldThe Future of Security and Productivity in Our Newly Remote World
The Future of Security and Productivity in Our Newly Remote World
 
Object Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area NetworksObject Broker Infrastructure for Wide Area Networks
Object Broker Infrastructure for Wide Area Networks
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Secure Your SDN with Defensive Technologies

  • 2. Outline ● Introduction ● What is SDN? ● SDN attack surface ● Recent vulnerabilities ● Security response ● Defensive technologies ● Next steps
  • 3. Introduction ● Security nerd, recovering climatologist ● Managed Red Hat's Java middleware security team ● Now manager of product security for Console, and founder of the ODL and ONOS security teams ● Open source SDN is hot, with development being driven by a wide range of commercial and non- profit entities ● 2015 is emerging as the year when SDN starts to move from the lab to widespread deployment for production networks (Google, Pacnet, etc.) ● Is it secure?
  • 5. “SDN is an approach to computer networking that allows network administrators to manage network services through abstraction of higher-level functionality. This is done by decoupling the system that makes decisions about where traffic is sent (the control plane) from the underlying systems that forward traffic to the selected destination (the data plane).” - The Wikipedia hive mind
  • 6.
  • 7.
  • 8.
  • 10. SDN Attack Surface ● Traditional networks conflate the control and data planes on a physical device ● Software-defined networks factor the control plane out to a SDN controller. ● The controller uses a protocol such as OpenFlow to control switches, which are now only responsible for handling the data plane ● Advantage: easily segregate the control plane network from the production data network ● Disadvantage: the SDN controller's ability to control an entire network makes it a very high value target
  • 12. SDN Attack Surface ● SDN controllers are also exposed via the data plane ● When an OpenFlow switch encounters a packet that does not match any forwarding rules, it passes this packet to the controller for advice. ● As a result, it is possible for an attacker who is simply able to send data through an SDN switch to exploit a vulnerability on the controller. ● Switches out of scope for this presentation. See Gregory Pickett's BH 2015 talk if you're interested.
  • 15. SDN Controller Vulns ● There are many competing SDN controller implementations ● The two most prominent ones are open source, written in Java/OSGi, and backed by many large vendors ● OpenDaylight/ODL (Linux Foundation) ● ONOS (lots of Chinese backing: telcos, Huawei, etc.)
  • 16. Netconf CVE-2014-5035 ● ODL Netconf API processes user-supplied XML (also restconf) ● Example vuln code: controller / opendaylight/netconf/netconf- util/src/main/java/org/opendaylight/controller/netconf/util/xml/XmlUtil.java ● Demo...
  • 17. Topology spoofing via host tracking CVE-2015-1611 ● Most SDN controllers include host tracking, allowing hosts to migrate between different physical locations in the network. ● Host tracking is based on monitoring of Packet-In messages, and does not require any validation, authentication, or authorization. ● An attacker can impersonate a host and make the SDN controller believe it has migrated to a physical network location controlled by the attacker.
  • 18. Topology spoofing via host tracking CVE-2015-1611 ● For an attacker to exploit this flaw, they only need to be able to send malicious messages through a switch controlled by an SDN controller (i.e. data plane) ● The only pre-requisite is that the attacker must know the MAC address of the target host. For more details on this flaw, see: http://www.internetsociety.org/sites/default/files/10 _4_2.pdf
  • 19. DoS in ONOS packet deserializer CVE-2015-1166 ● When an OpenFlow switch encounters a packet that does not match any forwarding rules, it passes this packet to the controller for advice. ● It was found that the packet deserializers in ONOS would throw exceptions when handling malformed, truncated, or maliciously-crafted packets. ● The exceptions were not caught and handled, which would result in the relevant switch being disconnected because an exception occurred in an I/O thread. ● Demo...
  • 21. Topoguard ● The same research team that reported the topology spoofing flaw developed topoguard to mitigate it ● Verifies the conditions of a host migration. ● A legitimate host migration would involve a Port Down signal before the host migration finishes. It would also mean that the host would be unreachable at its old physical network location after the migration is complete. ● Currently tightly coupled to the Floodlight controller
  • 22. Security-mode ONOS ● A new feature targeting the upcoming ONOS 'Cardinal' release. ● Effectively a mandatory access control (MAC) implementation for ONOS applications ● Applications can be constrained by a policy dictating which actions they are permitted to perform. ● A vulnerability in an ONOS application could not be exploited to perform actions that are not permitted by security-mode ONOS. This is similar to the protection SELinux provides for applications running on Linux systems.
  • 24. Open Source Security Response ● All information public ● Not just source code: bug trackers, mailing lists, etc. ● Security requires the opposite approach: information must be kept private until patches are available ● How do you handle this in the context of an open source project? ● A dedicated security team with a documented process
  • 25. Open Source Security Response ● Dedicated mechanism for reporting security issues, separate to normal bugs ● Dedicated team with a documented process for responding to these reports ● Ability to quickly build a patch asynchronous to normal release schedules ● Clear documentation of the issue in an advisory, including references to patch commits (advantage of open source) ● More transparent than proprietary vendors (FireEye, Oracle...)
  • 27. Open Source Secure Engineering ● No well established best practices ● Few good examples in the open source world. Proprietary software currently does this better, e.g./ microsoft's SDLC. ● OpenStack is one good example ● Separate VMT and OSSG teams
  • 28. Open Source Secure Engineering
  • 29. Open Source Secure Engineering ● Secure development guidelines (relies on developers to implement) ● Developer training (I just did this for everyone in the room, but it is“expensive” and difficult to roll out in a virtual environment) ● Automated QE/CI jobs to catch issues and enforce standards, e.g. via static analysis ● Static analysis with 56 bug patterns ● http://h3xstream.github.io/find-sec-bugs/
  • 31. ODL: Security Response ● Security reporting mechanism ● Dedicated team with a private mailing list and basic process for handling issues ● Security advisories page
  • 32.
  • 33. ODL: Secure Engineering ● Great analysis performed in May 2014, but no action on fixing things. Cue the ODL summer internship program.
  • 35. ODL: Security Vision ● Industry leading secure engineering function ● Security docs (e.g. best practice install guide) ● Developer training as part of committer onboarding ● Automated QE/CI jobs to catch issues and regressions ● No reliance on documented secure coding standard (automate any standards in QE/CI jobs)
  • 36.
  • 38. Next Steps ● More research into data plane → control plane attacks ● Greater focus from the offensive security community as a whole – so far only Pickett and I seem to be looking ● Can we get a decent implementation not written in Java? ● Big vendors: please give at least one single fuck!