I can recent share BNL experience, but it does *not* include
EPICS per se. Maybe it will be helpful anyway...
The BNL IT division ran network security scans last month (I
*think* NESSUS is the tool of choice). These tests are run from
ITD-managed platforms which are *not* on the "accelerator network".
ITD prefers to use their own platforms for their convenience and
control. This means that we had to agree to support such scans by
"opening up" the "accelerator network" firewall. We would never agree
to such scans during operational periods.
Most of our systems experienced what amounts to a DOS
attack during the scans, but returned to pre-scan behavior once
the scans were over. For instances, while probing TELNET on our
VxWorks (5.5.1) systems, ITD was able to cause TELNET server
tasks to get suspended. However, VxWorks eventually cleanup
those tasks up. However, two classes of systems had lingering
problems:
1) Many of our terminal servers needed to be rebooted to
"free up" TCP/IP ports. I *guess* the TCP/IP connections were formed
using a "SYN attack", or some other pathological protocol. The result
was the terminal servers thought the ports were in use, and would
not allow other users. Even days later the ports were still unavailable.
2) Some of our MV162 VxWorks systems lost network operation,
and needed to be rebooted to restore network operation. This is a bug
which we have seen under "heavy" network load in the past, and which
has been discussed on tech-talk (IIRC). We have learned a distinctive
signature for this situation... It is impossible to "ping" such a
system from elsewhere, and it it impossible to "ping" elsewhere
from an affected system. Using a terminal server (assuming the TS is
working!), systems which are "broken" have a characteristic response to
the "sys596Port" command:
-> sys596Port
sys596Port
interrupt: ei driver: command field frozen
0xfcd894 (tExcTask): 12 messages from interrupt level lost.
value = 0 = 0x0
My personal conclusion is that *if* a determined hacker was
able to penetrate our "accelerator network" firewall, *and* launch a
DOS attack against all network-connected devices, such an attack
would have a crippling effect on accelerator operations. In general,
systems are tuned and configured to assume a certain level of network
availability and functionality, and when that level is compromised,
system performance is compromised. Our approach if a inside-the-firewall
DOS attack is launched is to isolate and eliminate the attack (vs.
trying to design the control system to continue to operate well
during such an attack).
As I said before, ITD network scans require our complicity (to
reconfigure the F/W). Our working assumption is that during such scans,
system performance is not guaranteed. After such scans, we expect to
reboot all terminal servers and all VxWorks systems, just to be safe.
We do not expect to need to reboot any desktop systems.
Finally, we perform periodic "network dependency tests", where
we unplug the "accelerator network" from the rest of the world (by
actually disconnecting a cable from the firewall), to make sure that
the control system continues to operate while completely isolated.
This helps to ensure that the control system is not affected by a DOS a
attack against an "outside" resource that the control system may depend
on.
HTH -- Larry
- References:
- Ioc denial of service attacks Brad Cumbia
- Navigate by Date:
- Prev:
Re: Ioc denial of service attacks Andrew Johnson
- Next:
RE: ASYN/devGPIB/GPIBCVTIO problem Redman, Russell
- Index:
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
<2006>
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
- Navigate by Thread:
- Prev:
Re: Ioc denial of service attacks Andrew Johnson
- Next:
RE: Ioc denial of service attacks Mark Rivers
- Index:
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
<2006>
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
|