peer to peer networking, the security...

58
1 © 2002, Cisco Systems, Inc. All rights reserved. Peer to Peer Networking, the security perspective Eric Vyncke Cisco Systems Distinguished Engineer [email protected]

Upload: others

Post on 26-Mar-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

1© 2002, Cisco Systems, Inc. All rights reserved.

Peer to Peer Networking, the security perspective

Eric Vyncke

Cisco Systems

Distinguished Engineer

[email protected]

Page 2: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

222© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Agenda

•• Introduction to peer to peer networkingIntroduction to peer to peer networking

• Protocols description

• The threats

• Mitigation at the Desktop

• Blocking peer to peer networking

Page 3: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

333© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Usual information sharing

Centralized information repository

Server

Client A

Client B

Here is file X

I want file X

Client C

Here is file X I want file X

Thanks

Here is file X

X

X

Page 4: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

444© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Information sharing in a peer to peer

No centralized information repository

Client A

Client B

Client C

X

I want file X

Here is file X

Page 5: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

555© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Data is “vectorized” and sent to clients for ad hoc processing

Clients process in the background or when client is idle

Cycle-Sharing(example: SETI@home)

Client AComputing

Client BComputing

Task Master

Raw chunk A

Processedchunk A

Send/receive tasksAggregates results

Client CComputing

Rawchunk C

Processedchunk C

Rawchunk B

Processedchunk B

Page 6: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

666© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Cycle Sharing: the Grid

• Named after the electrical power grid

• More than 10 years old

• Single application on geographically distributed, large parallel computers

• Security built-in

SSH, SSL, …

X.509 authentication, …

Page 7: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

777© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Large technology companies are fully involved

• IBM (Global Grid Forum)

• Intel (P2P Forum)

• Sun (JXTA/JINI)

• Microsoft (.Net)

• Cisco is member of Global Grid and P2P

Page 8: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

888© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Who is writing P2P ?

• Some are free

• Most contain spyware/adware

Part of the P2P code is used to display advertisments

Some install browser plug-in to track the visited URL

Remove with http://www.lavasoft.de (after removing the P2P does not work anymore ;-) )

Page 9: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

999© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Agenda

• Introduction to peer to peer networking

•• Protocols descriptionProtocols description

• The threats

• Mitigation at the Desktop

• Blocking peer to peer networking

Page 10: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

101010© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Architecture

• Mosts of the protocols are using a three tiers architecture

Seed hostsSeed hosts with static IP address/FQDN: give a couple of peers/servers dynamic addresses

ServersServers with a file database: mainly for file search operation

PeersPeers

Page 11: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

111111© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Usual peer operations

•• SeedSeed: connect to a well known host to learn about other peers

•• RegisterRegister node to the seed

•• ConnectConnect to a server or peer

•• PublishPublish the locally shared files to the server

•• SearchSearch on remote peers for a file

•• RetrieveRetrieve a file from multiple peers (to go faster!)

Page 12: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

121212© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

The most decentralized: Gnutella

• The most interesting because it is the only peer to peer

Nodes are called either gnodes or servents (from servserver-clientent)

• Open specificationExtensions are in progress: IPv6, more security

Projects to publish as IETF draft

• Multiple implementation: Limewire, Bearshare, Gnut, … on Windows, Linux, …

Page 13: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

131313© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella v0.4: Seed, Registration

• Seed is either:manual entry of other servents IP addresses

Or use of gwebcache

•Used for both seed and registration

•Only gives 20 servents randomly

•Refreshed every 60 minutes

•Contains both servents IP addresses/TCP port and gwebcache URL

• Every node computes its own ClientID (randomly or based on Windows GUID)

Page 14: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

141414© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella: Connection to the network

• Connection is a simple TCP connection to some peers (called servents – servservers-clientsents)

New servent with a unique & persistent ID

Page 15: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

151515© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella messages

• Only 5 messages are defined

PING: same as a broadcast ICMP ping

PONG: same as a ICMP ECHO_REPLY

QUERY: broacast a file search

QUERYHIT: response of a file search hit

PUSH: to bypass NAT/firewall

Page 16: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

161616© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella: communication is a learning bridge !

• Every message has a unique message ID

• Every servent maintains a table ID/TCP connection

• Packets with unknown message ID are flooded

• Exactly like an Ethernet switch MAC/port table !

Sending message ID 123

Msg 123M

sg 123Msg

123

Msg 123

Msg 12

3

Msg 12

3

Msg 123

Msg 123Msg 123

Page 17: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

171717© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella: preventing loops

• Two mechanisms are used

TTL: like in IP but any servent can also lower TTL if too high (typical value is 5)

Hop Count: always increasing (could also be used to remove looping packets)

• BTW, privacy is enforced as there is neither source or destination ID in most messages

Only when hop count = 0, then the source is known

Page 18: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

181818© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella: search queries and results

• Search queries are flooded until TTL is 0

• Only positive results, QueryHits, are sent back

Q 123Q 123

Q 123

Q 123

Q 123

Q 123

Q 123

Q 123Q 123

QH 123

QH

123

QH 123

Page 19: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

191919© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

QueryHit

• QueryHit replies contain more information

IP address, TCP port of the file owner

Servent ID of the file owner

Page 20: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

202020© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella: simple fetch

• Consumer servent opens a HTTP connection to remote servent

GET /get/123/Cisco_song.mp3 HTTP/1.0

Range: bytes=0-100000

User-Agent: limewire

Works only if file owner is not behind NAT or firewall

Page 21: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

212121© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella: when simple fetch fails

• Consumer peer sends a ‘PUSH file to my IP’ on the Gnutella network to the remote servent ID

• Works even if one peer is firewalled or NATed

ID = 123IP 1.2.3.4

To 456: Push to 1.2.3.4

To 4

56: P

ush

to 1

.2.3

.4

Page 22: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

222222© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella: next version 0.6

• Already deployed

• Concepts of two level of networksPure leaf servent: low bandwidth

Connect only to ultra-peers

Publish their files to ultra-peers

Ultra-Peer: high bandwidth

Connect to other ultra-peers & leaves

Execute queries in proxy of leaves

Page 23: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

232323© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

eDonkey: more centralized

• Two kinds of peers:Servers: store the list of files shared by clients

Clients: with a single TCP connection to one server (to publish file and retrieve the server list) and multiple UDP ‘connections’ to all servers (for search)

• The clients & servers are different programs

• The seed is purely manual

• Same concept of push as in Gnutella

• The UDP extended search is heavy as all clients are spraying search packets to all servers

Page 24: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

242424© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

The proprietary one: Kazaa

• Protocol is proprietary ! And encrypted

• Protocol implementation is licensed by Sharmann Ltd (Netherlands – New Zealand)

• Also known as Fast Track

• Implementation: Morpheus (but has since diverged), KaZaa, …

• Two kinds of nodes: super-nodes and leaves

Page 25: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

252525© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Agenda

• Introduction to peer to peer networking

• Protocols description

•• The threatsThe threats

• Mitigation at the Desktop

• Blocking peer to peer networking

Page 26: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

262626© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Content security: Sharing /1

• Possible copyright violations

Music

Movie

• What about an organization liability if its network is used for P2P?

What about child pornography ?

Page 27: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

272727© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Content security: Sharing /2

• Sharing more files than expected

Sharing the whole C:\

Bug in P2P client. E.g. Bearshare (Gnutella)

http://xxx:6346/get/123/%5c..%5c..%5c..%5cwindows%5cwin.ini

http://xxx:6346/get/123/%5c..%5c..%5c..%5cwindows%5cwin%2Eini

Both retrieve C:\WINDOWS\WIN.INI without explicit sharing

Page 28: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

282828© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Content Security: Retrieving /1

• Retrieving executable content

Possible virus vector

Possible trojan/backdoor install

• Worse: P2P provides anonimoty on purpose => ideal vector

• NB: also used as honey pots to attrack/log P2P users looking for illegal contents

Page 29: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

292929© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Content security: Retrieving /2

• Retrieving executable content

Even .ASF or .MWF movie files can open URL… containing hostile code

See http://www.pc-radio.com/gimp.mp3

Page 30: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

303030© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Worms in P2P

• Running worm will publish itself as:Star_wars.exe

Quake_2.exe

• Naive users will download & execute

• Speading the worm further!

• See also:Worm.Kazaa.Benjamin

Gnutella.Mandragore

Page 31: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

313131© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Gnutella.Mandragore

An infected host always replies to any queries with

an .EXE result…

Page 32: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

323232© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Bandwidth…

• The most visible sign: upstream is utilized 100% even during nights

• Waste of money

• Can be too much for some non software IDS

• Content is random (compressed movie), can also trigger false positive on dumb IDS

Page 33: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

333333© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Real life example of bandwidth

Probably P2P:-more upload than download- unusual pattern- night traffic

Data collected on a European NRN site in May 2002

Page 34: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

343434© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Protocol Utilization on the InternetHTTP11%

IPSec+GRE3%

Games2%

KaZaa9%

Napster9%

eDonkey10%

Gnutella12%

Others44%

Peering traffic data collected 9th of July 2002 in a large European ISP

P2P = 40%

Page 35: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

353535© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Buffer overflow

• Peers are listening on a couple of UDP or TCP ports

• This may open a door to a buffer overflow attack

• Quite possible because a lot of code is not public

• Attractive target:Million of peers

Always connected

Page 36: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

363636© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Is this a Threat ?

• http://isc.sans.org/ on April 25, 2003Top Attacked Ports netbios-ns 137

Www 80

ms-sql-m 1434

microsoft-ds 445Smtp 25

Ident 113

--- 3136

netbios-ssn 139gnutella-svc 6346

eDonkey2000 4662

Page 37: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

373737© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Attack on the protocol

• Most P2P protocols do not have authentication because authentication requires some form of centralization and trust…

• It should be easy to write a pseudo peer or server program

To bring part of the P2P network down

To log all search and push requests (for statistics, for caching, for logging or simply for law enforcement!)

Page 38: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

383838© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Attack on the P2P Network

• As all peers are connected to multiple peers, the resiliency to failure is very high:

Gnutella can sustain 70% of nodes failure

Really needed because most peers stay connected for 1 hour

Page 39: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

393939© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Remote DoS

• The ‘push’ operations could be diverted to launch DoS attack on a victim (but without an amplification) even behing a firewall

• Registrating victims as peers will force other peers to try to connect

• The eDonkey extended search could also be diverted to spray a host with 1000’s of UDP packets (with amplification)

It requires the hacker to publish the victim IP address as new server

Page 40: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

404040© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Auto-update

• Kazaa (and perhaps others) can use the P2P network in order to automatically install the next version

• This mechanism could be used to install thousands of Trojan…

Page 41: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

414141© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Adware & Spyware

• The goal of those adware is to have the user to click on a banner

Yet another lost of time & ressource

Yet another door to hostile code on the clicked URL

Yet another piece of software to be trusted

Page 42: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

424242© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Agenda

• Introduction to peer to peer networking

• Protocols description

• The threats

•• Mitigation at the DesktopMitigation at the Desktop

• Blocking peer to peer networking

Page 43: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

434343© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Mitigation at the Desktop

• Most of the attacks

Worms & virus

Unexpected file access

Buffer overflow

• Can be detected by Host Intrusion Detection System

Actually an intrusion prevention

Page 44: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

444444© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Host Intrusion Detection System

• Specific application hooking between kernel and other applications

Intercept all system calls

Check against rules

Valid file access? C:\WINNT\SYSTEM32\CMD.EXE

Valid network access? Initiates TCP connections ?

Can also detect buffer overflow

• => Behavior based no need for signatures

• => Efficient against known and unknown viruses, worms, …

Page 45: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

454545© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Agenda

• Introduction to peer to peer networking

• Protocols description

• The threats

• Mitigation at the Desktop

•• Blocking peer to peer networkingBlocking peer to peer networking

Page 46: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

464646© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Block or throttle ?

• BlockingAttempt to block all P2P traffic

Is difficult: using well known ports, encrypted traffic, …

Can be bypassed: changing ports

• ThrottleThrottle the available bandwidth of P2P traffic in the network

As P2P is working, users will not try to evade

better logging

better forensics if required

Page 47: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

474747© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

How to Recognize P2P ?

• Currently

By the default TCP/UDP ports used

By the fixed seed/registation access

• Area of research

Use knowledge in network devices to detect P2P applications

Lot of long lasting flows

Page 48: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

484848© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Block Napster

• Probably mostly unused nowadays

• Block TCP 6699/8888

Page 49: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

494949© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Blocking Gnutella

• Difficult, Gnutella uses TCP 6346 per default but the port can be changed

• Seed is using multiple hosts

• => not easy to block

Page 50: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

505050© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Blocking Kazaa

• Kazaa uses UDP/TCP ports

• block all UDP/TCP traffic on port 1214 (default port but can also use port 80)

• Try to block the seed hosts: 213.248.112.0/24(not tested)

Page 51: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

515151© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Blocking eDonkey2000

• Seed: manual process initiated by web or IRC => difficult to block

• Traffic blocking: peers and servers can change the ports EXCEPT for the extended search

Peer to peer: TCP 4661

Peer to server: TCP 4662

Extended search: UDP 4665

Page 52: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

525252© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Blocking AudioGalaxy

• Seed and registration based on a DNS lookup (for load balancing) then a query using TCP port 21 (the FTP port !) => difficult to block !

• Try to poison your DNS cache with wrong data likegarlic.audiogalaxy.com 999999 IN A 127.0.0.1

• Transfer ports are TCP and dynamic in 41000-50000 => difficult to block !

• Try to block the seed hosts: 64.245.58.0/23 (not tested

Page 53: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

535353© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Blocking iMesh

• Block TCP ports 5000 (register/search) and 4000-4999 (for transfer)

• Blocking port 5000 should be enough

• Try to block the seed hosts: 216.35.208.0/24(not tested)

Page 54: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

545454© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Blocking WinMX ?

• Block UDP 6257 and TCP 6699 (but the user can change the ports…..)

• Try to block the seed hosts: 209.61.186.0/24 and 64.49.201.0/24 (not tested)

Page 55: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

555555© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Blocking the next one ?

• Fighting against P2P is a never ending story…

•• Instead of blocking specific ports, rather Instead of blocking specific ports, rather permit only a couple of ports !permit only a couple of ports !

Page 56: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

565656© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

Conclusion

• P2P Networking:

Powerful concept (adhoc networking)

Currently misused

Existing and potential security vulnerabilities

Difficult but possible to mitigate at the network

Easier to mitigate at the desktop

User education !

Page 57: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

575757© 2003, Cisco Systems, Inc. All rights reserved.Evyncke p2p security

References

• http://testweb.oofle.com/filesharing/index.htm (more information on how to block)

• http://www.clip2.com/GnutellaProtocol04.pdf

• http://opennap.sourceforge.net/napster.txt

• http://homepage.mac.com/macdomeeu/dev/current/openag/agprotocol.html

• http://www.icir.org/vern/papers/cdc-usenix-sec02/index.html

Page 58: Peer to Peer Networking, the security perspectivespi.unob.cz/old/last/ostatni/2003/Invited/Vyncke.pdf© 2002, Cisco Systems, Inc. All rights reserved. 1 Peer to Peer Networking, the

585858