Standards Issues Open Security Holes

Network-access control technologies are vulnerable to attack, according to a presentation at the Black Hat security conference.
Author:
Publish date:
Social count:
0

Courtesy of InformationWeek While there's a strong agreement that network-access control should be a part of any organizational security strategy, all agreement ends when it comes to defining what exactly NAC is and how different vendors' interpretations of the technology will work together. This confusion has opened up holes in network-access control technologies that can easily be exploited, one security vendor said Wednesday, August 2, at the Black Hat USA 2006 conference. [Disclosure: CMP Media acquired Black Hat last November.] The concept behind NAC is relatively straightforward: don't let any devices connect to your network unless they pass muster by complying with your company's security policies. "It's a valid technology and something you need to consider as part of your network security," said Ofir Arkin, chief technology officer and co-founder of Insightix Ltd., a maker of NAC software used to monitor network traffic and probe devices as they attempt to connect. Yet even though Insightix has a dog in the NAC fight, Arkin's Black Hat presentation focused more on what's lacking in NAC and how these omissions could be very dangerous to organizations deploying the technology. In theory, NAC technology should include the ability to: - detect devices trying to connect to the network; - authenticate the identity of the device's user; - check whether the device has the proper level of antivirus protection and software patches to comply with security policy; - enforce organizational policy by sending the device to a network quarantine for remediation; - and provide continuous monitoring for security problems once the device is connected. Still, there isn't any one NAC provider that offers all of these capabilities, which means organizations must use multiple NAC technologies that aren't necessarily designed to work together. Also, organizations that deploy NAC using a Dynamic Host Configuration Protocol (DHCP) proxy server to assess a device's compliance with its security policies can run into several problems. In particular, only devices that use DHCP to communicate information about their settings and characteristics can be assessed by the DHCP proxy server. Any devices not using DHCP are either blocked or must be added to a list of exceptions that the NAC system will automatically allow onto a network unchecked. A DHCP configuration also cannot be extended to include remote users, Arkin added. NAC vendors also rely on the IPSec and 802.1x protocols, but none accommodate all three. Another NAC shortcoming is that devices afflicted with a zero-day virus or worm with no known fix can't be remediated and allowed onto the network. Arkin also expressed concern that attackers could target systems in quarantine and infect them with malware. Once those systems are given the proper software patch and antivirus updates, they would be allowed onto the network and not re-checked. Some of the major networking and access-control technology makers have taken steps toward compatibility, but don't expect seamless integration anytime soon. Cisco, currently the biggest player in the NAC market, still requires its network-admission control technology work only with Cisco networking equipment. Others are promising to be a bit more flexible. Cisco rival Juniper Networks in May announced that its Unified Access Control technology will support the Trusted Computing Group's Trusted Network Connect, or TNC, open standards, a set of non-proprietary specifications for the application and enforcement of security requirements for endpoints connecting to a network. The TNC specifications are designed to help network administrators enforce security policies for network access in environments that include a variety of devices running a variety of software. Microsoft's Network Access Protection, or NAP, will show up in Windows Vista and in Longhorn server, but customers will have to implement both before they can benefit from the NAP system. On a smaller scale, Lockdown Networks on Monday said its Enforcer NAC appliance will provide endpoint health-check, quarantine, and remediation capabilities that work with the AEP Networks' Netilla Security Platform SSL virtual private network. Until these technologies all get on the same page, however, network-access control software and appliances will stand in their own way of success.

Featured

Related

Security control goes virtual

ForeScout announces that it can now run its CounterACT network access control solution (NAC) as a virtual appliance within the virtual machine.

SECURITY: Step by Step

It's time to begin planning for summer upgrades, and if information security isn't at the top of your list, it should be. Your students continue to learn more about the tools and technology that could be used to circumvent your current security infrastructure. What you need is a security architecture and approach that

TCO and Security: Top Issues

In Technology & Learning's continued spirit of practicality, we bring you this month's cover feature, "Enough to Go Around? Budget and TCO Tool Kit" (page 32) by Todd McIntire. It is truly a sign of the times that funding for technology and related issues is a topic now appropriately addressed in articles on almost

Aerohive Announces Security Solution to Protect Networks from IoT Attacks promo image

Aerohive Announces Security Solution to Protect Networks from IoT Attacks

Aerohive Networks® (NYSE:HIVE) today detailed its Internet of Things (IoT) security solution for Wi-Fi and wired networks. Built on Aerohive’s Software Defined LAN (SD-LAN), Aerohive’s solution helps protect networks from attacks, such as the October 16th Mirai botnet DDoS attack, which recruited over a half-million devices in a coordinated strike that brought down a large swath of popular internet services, including Twitter, Spotify, Airbnb, Netflix and Reddit. Aerohive will be discussing Wi-Fi security on Facebook Live on November 3, 2016.

Secure social networking

The new Saywire network provides secure social networking for K 12 schools, and lets its members share ideas, collaborate on projects, and prepare for competitions in technology. It includes permissions based controls to ensure online safety and features such as

Secure Your Wireless Network

Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture — and at some