| Network & Academic Computing Services
School Computing Coordinators
May 8, 2002
Agenda:
- NACS Virus scanning on the MTAs
Brian Roode, Keith Chong
- Network security strategies, e.g. port blocking
Garrett Hildebrand, Mike Iglesias
Summary:
Lively discussion centered on network security, with focus on the agenda
items. Group resolutions include:
- SCCs support NACS' plan to throttle down bandwidth consumption by
unknown high bandwidth consumers.
- SCCs support NetBIOS port blocking as a campus network security measure.
The group requests advance warning in order that proper planning can
be done.
- SCCs agree to registration of designated high-bandwidth servers.
- SCCs request NACS assistance in determining VPN solutions.
Attendees:
| Name |
Dept |
E-mail |
Phone |
| 1. ASKREN, Mark S. |
AdCom Services |
maskren@uci.edu |
(949) 824-9060 |
| 2. VALDRY, Jason Gordon |
Arts - Technology Department |
jvaldry@uci.edu |
(949) 824-6691 |
| 3. COLMAN, Richard |
Biological Sciences - Computing Support |
colman@uci.edu |
(949) 824-8955 |
| 4. CLARKE, John S. |
Graduate School of Management |
jsclarke@uci.edu |
(949) 824-6941 |
| 5. ROMINE, John L. |
Henry Samueli School of Engineering |
jromine@uci.edu |
(949) 824-7554 |
| 6. ANSEL, Kevin B. |
Housing |
kbansel@uci.edu |
(949) 824-2581 |
| 7. ROBERGE, Theodore G. |
Housing |
troberge@uci.edu |
(949) 824-3868 |
| 8. COHEN, William D. |
Information & Computer Science |
wdcohen@uci.edu |
(949) 824-1478 |
| 9. BISOM, Diane |
Library |
dbisom@uci.edu |
(949) 824-8939 |
| 10. TALKOVIC, Scott A. |
Library |
satalkov@uci.edu |
(949) 824-2075 |
| 11. KIEHL, Carole A. |
Library |
ckiehl@uci.edu |
(949) 824-7221 |
| 12. IGLESIAS, Mike |
Network & Academic Computing Services |
iglesias@uci.edu |
(949) 824-6926, 6116 |
| 13. MANGRICH, John |
Network & Academic Computing Services |
mangrich@uci.edu |
(949) 824-4100 |
| 14. CHONG, Keith |
Network & Academic Computing Services |
kchong@uci.edu |
(949) 824-8394 |
| 15. HILDEBRAND, Garrett D. |
Network & Academic Computing Services |
gdh@uci.edu |
(949) 824-8913 |
| 16. LAURENCE, Andrew |
Network & Academic Computing Services |
atlauren@uci.edu |
(949) 824-3966 |
| 17. ROODE, Brian G. |
Network & Academic Computing Services |
bgroode@uci.edu |
(949) 824-8350 |
| 18. ACKERMAN, Greg |
Network & Desktop Computing |
gdackerm@uci.edu |
(949) 824-3231 |
| 19. SHEA, David |
Network & Desktop Computing |
dshea2@uci.edu |
(949) 824-7958 |
| 20. GRAZIANO, Ettore Ciro Ii |
Physical Sciences |
graziano@uci.edu |
(949) 824-1380 |
| 21. WIEDEMAN, Dennis H. |
R%amp;GS-Information Systems |
dhwiedem@uci.edu |
(949) 824-2163 |
| 22. BOYD, Robert |
Social Ecology Administration |
rboyd@uci.edu |
(949) 824-5038 |
| 23. KEYS, Jerry D. |
Social Science |
jdkeys@uci.edu |
(949) 824-7720 |
Discussion:
Prior to calling the meeting to order, conversation centered on the issue
of blocking NetBIOS ports at the campus border router. Most in the room
were in favor of the security measure, but worried about unseen negative
impact in the userbase. Jason Valdry said it might cause problems. Kevin
Ansel and Ted Roberge noted that graduate students routinely join campus
domains and mount shares from their homes in graduate housing, for academic
purposes; nearly all of Housings misuse comes from the undergraduate
housing.
Some expressed a desire to proceed with school- or department-based blocking
if campus blocking wasnt feasible.
NACS Virus scanning on the MTAs
Keith Chong, Brian Roode
On Monday May 3, a new MTA (message transport agent) machine was installed,
mta1.service.uci.edu. This MTA scans all mail for known viruses before
delivery. Full details on the virus scanning, including NACS criteria
for scan/clean/delivery/bounce, please see:
http://www.nacs.uci.edu/email/virus-scanning.html
Until now the campus had five MTA machines, none of which scanned for
viruses. As of Monday May 3, the first virus scanning machine was installed.
Over the next several days the five machines will be replaced with three
higher-powered SunFire 280R machines, all of which will include the virus
scanning software. The virus scanning software is Sophos MailScanner
with SAVI engine.
The anti-virus pattern files on the MTAs are updated once per day. We
can update more frequently, and manually if necessary.
Robert Boyd Is there a performance hit affecting the speed
of mail delivery?
A: The addition of scanning and cleaning certainly adds time of processing,
but we hope that the faster machines will negate any delay. Please report
any out-of-ordinary mail delivery delay to nacs@uci.edu.
Jason Valdry Should we block exe & bat extensions as
well
Bill Cohen EXEs are often legitimate, such as drivers and
updates sent by vendors.
Greg Ackerman At the College of Medicine we block all EXEs,
ever since we started virus scanning.
John Clarke We block them at GSM too. One faculty member
challenged this policy, but the resulting judgement was in the policys
favor.
Garrett Hildebrand If there is a question of the UC Computing
Use policy, questions can be referred to Garrett or Mike Iglesias, who
in turn can pass it on to a UC-wide committee of network security personnel,
which includes authors of the UC policy. The committee usually rules in
favor of security.
Kevin Ansel Blocking EXEs could become a problem during
the holidays. Thats when we see a lot of screensavers, backgrounds
and e-cards being sent around.
Andrew Laurence Have any users received a message which
had been cleaned and misinterpreted the resulting this message has
been cleaned text attachment to mean that their computer now has
a virus?
No such instances reported.
Question Will NACS block files with the .vbs extention?
Scott Talkovic Scott suggested disabling the Windows scripting
host via a registry hack, in order to completely remove this vulnerability.
Greg Ackerman What messages, if any are sent to the recipient
and sender if a virus is found?
Keith Chong If we find a virus, we attach a text or html
attachment (depending on the format of the original message) which explains
that a virus was found and removed. Also included is information about
the virus in question.
Diane Bisom Can we see samples of warning messages, in
order to give the users advance warning of what they might see?
NACS will provide samples to the SCC list and post to the NACS web
site.
Ted Roberge Thanks.
Scott Talkovic - Can we use the Sophos SAVI/MailScanner on our
own mail servers?
Bob Hudack Yes.
NACS has purchased a license for the Sophos mail gateway products (SAVI/MailScanner)
which covers every person at UCI. The software can be installed on any
number of mail servers in any department, on any (supported) platform.
It is effectively a site license for mail gateways. This license is
underwritten by NACS for use in your department.
Because all users are already covered for email, the Sophos desktop
products are available as a desktop upgrade for $2.68 per
desktop.
Bob can burn and send copies of SAVI/MailScanner to departments who
request the software.
At request of the group, NACS will schedule a configuration kitchen
for departments who want to install SAVI/Mailscanner on their own mail
servers.
Diane Bisom With email virus removal, will we still need
to license software for the desktops?
Group Discussion: Desktop protection is still the wise course
of action, given that viruses can arrive via disk, file servers, web download,
etc.
Jason Valdry Will we have spam filters?
Answer: Marking or filtering spam is a much trickier issue. Spammers
have gotten very good at masking their trail. While the MTAs used to reject
an enormous amount of mail because of unregistered DNS origination and
the like, today very little mail gets bounced for those reasons. The danger
of a spam filter system is in false positives, where legitimate mail is
wrongly marked as spam.
Andrew Laurence From the first-day sample provided by Brian
Roode and Keith Chong, about 4.5% of all email delivered to uci.edu carries
a virus.
(For the period of Monday 5/6/2002 through Tuesday 5/14/2002, 7.3%
of messages carried a virus.)
Bob Hudack will send a summary of virus software in use by UCI departments
to the SCC list.
Campus Network Security
Garrett Hildebrand, Mike Iglesias
On April 25 2002, Mike Iglesias sent a request for comments to the
UCICSCG mailing list, on the possibility of blocking NetBIOS ports at
the campus border router, as a security measure. In this discussion
we want to examine campus network security in light of the traditional
open educational network. Are we undergoing a sea change?
Mike Iglesias begins with a summary of why port blocking is being discussed.
Mike Iglesias A large number of Windows systems have been,
and are continuing to be hacked from outside UCIs network. The attacks
most often automated attempts to login remotely as the Administrator;
when they succeed they then install warez software or bots which enable
the hacker to utilize the machine for various purposes. These attacks
most often succeed because of weak or no passwords on the Windows system
being attacked.
Dennis Wiedeman I was contacted by John Lenning regarding
a system in our area. Can you illuminate why?
Garrett Hildebrand
We have two network issues under examination, the first is remote hacking
and possible port blocking. Second is the monthly bandwidth fee that
UCI pays for traffic to/from the commercial Internet. This charge has
risen sharply in the last several months, from $8,000/month to a the
most recent $16,000.
NACS Director Dana Roode has directed NACS Network Operations
to determine where the bandwidth is going. For the purposes of this
analysis, a high bandwidth host is defined as using a weekly
average of 0.5 megabits per second (Mbps). Analysis has shown that between
30 and 40 machines utilize about 25% of the total campus usage. Under
the belief that any unexpected high bandwidth hosts are
probably dealing in junk traffic (either via hacking or
deliberate installation of P2P applications), Network Operations has
been directed to contact the local computing personnel to investigate.
Any unexpected high bandwidth host will be limited at the
border router to 0.1Mbps; if such a host is determined to have legitimate
needs for high bandwidth, the limit will be removed.
I suspect John Lennings inquiry to RGS was in this second category,
regarding a high bandwidth host.
Dennis Wiedeman What kind of uses are you seeing on the
ones that arent servers?
Answer Mostly warez, movies and MP3s. A lot of P2P applications
such as Gnutella, KaZaA and Morpheus. Illicit FTP servers, etc.
Garret Hildebrand demonstrated the UCInet Metrics page, which lists
displays snapshots of bandwidth utilization by department. Internet
traffic is on the commercial Internet, for which UCI pays per-bandwidth
usage. Calren traffic is traffic to other educational institutions
on the CALREN and Abiline (Internet2) networks).
The group discussed the practicality of throttling all UCI hosts at
.1Mbps, except for known registered servers. Garrett and
Mike agreed that it was do-able in the practical sense, but would probably
impede academic needs somewhere unforeseen.
Ted Roberge In Residential Housing, we already block all
outbound server traffic.
Garrett Hildebrand In fact, we're not worried about the
typical server. Most campus servers are well below the .5 Mbps mark. Were
not worried about short-term spikes in bandwidth, but long-term high utilization
such as the P2P and warez machines. For example: andromeda.acs.uci.edu
(aka ftp.uci.edu) , which serves a world-readable mirror of Red Hat Linux,
used only 4.3 Mbps during the week of 5/6-5/12/2002.
Mike Iglesias Registering servers might be administratively
difficult. There are over 2000 web servers on campus.
Ted Roberge Weve had great success using a Packeteer
packet shaper to isolate bandwidth flows in undergraduate housing. We
slow the P2P stuff to just a trickle and make sure theres plenty
of bandwidth for web and email.
The worrisome traffic is only in undergrad housing. Graduate housing is
completely different, theyre too busy to bother with that stuff.
Graduate traffic is burstey, like when they download large data sets.
Kevin Ansel If any one is interested, we have an extra
Packeteer we can loan. Just run it in diagnostic mode, and itll
map out where your bandwidth is going. Itll have to be coordinated
with NACS, but were happy to help.
Scott Talkovic Can we block ports only on incoming connections?
So that incoming attempts are rejected, but its possible to originate
a connection from on campus?
Mike Iglesias Yes
Jason Valdry How many PCs are affected by NetBIOS attacks?
Im concerned that were talking about dealing with only a small
symptom of a much larger issue.
Answer Thousands of access attempts occur daily.
John Clarke - Is now the time to start a campuswide VPN? Were
all clearly spending a great deal of support time and money on these issues,
when a broad security measure like port blocking or VPN could solve the
problem. I asked on of our alums who works at Microsoft what he thought
about this, expecting him to say itd be the worst possible thing,
but he was surprised we hadnt done it already. What about internal
attacks?
Garrett Hildebrand Blocking NetBIOS ports at the border
really only addresses a known point of high vulnerability. Security isnt
just one thing, and unfortunately were not a corporation with a
closed network and firewalls. Were finding that UCIs traffic
outstrips the capabilities of the Cisco PIX firewalls, which are rated
for 1 Million connections. Weve seen 1.3 Million.
Andrew Laurence We all know that blocking NetBIOS ports
will cause some amount of disruption in all our organizations. Will it
be catastrophically crippling for anyone?
All agreed that there would be some disruption. No one anticipated
catastrophic results.
John Romine Can NACS help me find these machines? Since
anyone on campus can request an IP number and DNS name, machines get set
up all the time without my knowledge. If a machine in Engineering winds
up in the high bandwidth list, its not likely that Ill
be able to physically find it. Can we have an easy way to register servers?
John Clarke Are we going to force registration of servers?
Answer Were not sure yet. Right now were just
trying to clamp down on the bandwidth abusers.
Diane Bisom Can you give an example of some high bandwidth
machines?
Garrett Hildebrand andromeda.acs.uci.ed u (aka ftp.uci.edu)
is just below the arbitrary threshold of 0.5 Mbps. Neither antpac.lib
nor www.lib are over that threshold.
Greg Ackerman The Windows command line utility nbtstat
a can be very userful for locateing & diagnosing problems
on computers with NetBios enabled. (Use nbtstat /? At Windows command
prompt for help)
John Clarke Well, our primary mission is to facilitate
academic use and academic purposes. If this university resource is being
jeopardized by misuse, we should act to protect the academic mission.
Greg Ackerman I agree.
Ted Roberge Were looking into Ciscos web caching
equipment in order to reduce the amount of web traffic. But analysis will
be needed before this can be done properly to save money.
Garrett Hildebrand KaZaA is a very large consumer of bandwidth,
and its nearly all illicit material. Dana Roode has directed Network
Operations to limit all KaZaA traffic, campus wide, to 10 Mbps, and no
more than 65 kbps per machine. This alone has reduced the campus bandwidth
a great deal.
Ted Roberge KaZaA traffic was overwhelming our Packeteer,
we had to completely block its default port, port 1214. Once we put in
these measures though, students figured out that they could take their
laptops to UCInet Mobile Access at CornerStone or the Library and bypass
Housings Packeteer packet shaping.
Mike Iglesias This traffic is now now blocked on UCInet Mobile
Access.
Andrew Laurence Does the group support the blocking of
NetBIOS ports as a security measure?
SCCs Yes, so long as we have proper notice.
It would be helpful to us if the argument is put forward in budget terms
of opportunity cost for campus support efforts, staff and equipment.
Andrew Laurence – The group seems to be in favor
of registering servers, and throttling of bandwidth abusers. Am I correct
in these observations?
SCCs – Yes.
Diane Bisom How should we register our servers with NACS?
Andrew Laurence At this early stage, NACS will
provide something that resembles a process. If nothing else, youll
be able to tell us what machines to not throttle, if they show up on the
high bandwidth list.
Bill Cohen We should start an initiative for serving our
customers, once port blocking is in place. What alternative methods for
accessing files can we recommend? Are campus or departmental VPNs the
solution?
Scott Talkovic Is internet radio a problem?
Answer Not yet, although broadcast.yahoo.com shows up a
lot. (Streaming of professional sports.)
Meeting Adjourned
Network & Academic Computing
Services
Updated: May 23, 2002
University of California, Irvine |