SlideShare une entreprise Scribd logo
1  sur  47
2017#apricot2017
Forensic Tracing in the Internet:
An Update
Geoff Huston
Chief Scientist
APNIC
2017#apricot2017
The story so far…
• The status of the transition to IPv6 is not going according to the original plan:
• We have exhausted the remaining pools of IPv4 addresses in all regions except Africa - this was never
meant to have happened
• We we meant to have IPv6 fully deployed by now
• What we are seeing is the pervasive use of Carrier Grade NATs as a means of
extending the useable life of the IPv4 Internet
• Around 10% of users use both IPv6 and IPv4 – the other 90% are IPv4 only
• It appears that most IPv4 use today uses NATs in the path
• This has some major implications for LEA functions, principally in traceback and
metadata record keeping
2
2017#apricot2017
Traceback – Version 1
3
A: 192.0.2.1
Ftp Server
Internet
Lets start by looking way back to the
Internet of the 1980’s
ftpserver.net 192.0.2.1 [31/Aug/2013:00:00:08 +0000]
Ftp Server Log
$ whois 192.0.2.1
NetRange: 192.0.2.0 - 192.0.2.255
NetName: TEST-NET-1
Contact: User Contact Details There was a rudimentary whois service
and it listed all end users!
2017#apricot2017
Assumptions:
• Each end site used a stable IP address range
• Each address range was recorded in a registry, together with the end
user data
• Each end device was manually configured with a stable IP address
• Traceback was keyed from the IP address
4
2017#apricot2017
Assumptions:
• Each end site used a stable IP address range
• Each address range was recorded in a registry, together with the end
user data
• Each end device was manually configured with a stable IP address
• Traceback is keyed from the IP address
5
2017#apricot2017
+ NATs
6
A: 10.0.0.1
B: 10.0.0.2
C: 10.0.0.3
CPE NAT/
DHCP Server
192.0.2.1 ISP
2017#apricot2017
Traceback – Version 2
7
A: 10.0.0.1
Web Server
ISP
webserver.net 192.0.2.1 [31/Aug/2013:00:00:08 +0000] "GET /1x1.png HTTP/1.1" 200
Web Server Log
$ whois 192.0.2.1
NetRange: 192.0.2.0 - 192.0.2.255
CIDR: 192.0.2.0/24
OriginAS:
NetName: TEST-NET-1
NetHandle: NET-192-0-2-0-1
Parent: NET-192-0-0-0-0
NetType: IANA Special Use
CPE NAT/
DHCP Server
192.0.2.1
ISP RADIUS Log
15/Aug/2013:18:01:02: user XXX IP: 192.0.2.1
2017#apricot2017
Assumptions
• The ISP operates an address pool
• Each end site is dynamically assigned a single IP address upon login
(AAA)
• The site is dynamically addressed using a private address range and
a DHCP server
• The single public address is shared by the private devices through a
CPE NAT
8
2017#apricot2017
Changes
• Traceback to an end site is keyed by an IP address and a
date/time
• Requires access to WHOIS records to identify the ISP and the
ISP’s AAA logs to identify the end site
• No traceback to an individual device – the trace stops at the
edge NAT
9
2017#apricot2017
IPv4 Address Exhaustion
10
What have ISP’s done in response?
• It’s still not viable to switch over to all-IPv6 yet
• The supply of further IPv4 addresses to fuel service platform
growth has dried up
• How do ISPs continue to offer IPv4 services to customers in the
interim?
• By sharing addresses across customers
2017#apricot2017
Carrier Grade NATs
11
By	sharing	public	IPv4	addresses	across	multiple	customers!
2017#apricot2017
Traceback – Version 3
12
A: 10.0.0.1
B: 10.0.0.2
C: 10.0.0.3
CPE NAT/
DHCP Server
ISP CGN
192.0.2.0/24
Web Server
Internet
webserver.net [192.0.2.1]::45800 [31/Aug/2013:00:00:08
+0000] "GET /1x1.png HTTP/1.1" 200
Web Server Log
$ whois 192.0.2.1
NetRange: 192.0.2.0 - 192.0.2.255
CIDR: 192.0.2.0/24
OriginAS:
NetName: TEST-NET-1
NetHandle: NET-192-0-2-0-1
Parent: NET-192-0-0-0-0
NetType: IANA Special Use
ISP CGN Log
31/Aug/2013:00:00:02
172.16.5.6:34233 128.66.0.0:80 -> 192.0.2.1:45800 128.66.0.0:80
ISP RADIUS Log
15/Aug/2013:18:01:02: user XXX IP: 172.16.5.6:34000-40000
172.16.5.6
2017#apricot2017
Assumptions
• The ISP operates a public address pool and a private address pool
• The access into the public address pool is via an ISP-operated NAT (CGN)
• Each end site is dynamically assigned a single private IP address upon login
(AAA)
• The site is dynamically addressed using a private address range and a DHCP
server
• The single public address is shared by the private devices through a CPE NAT
13
2017#apricot2017
Assumptions
• Traceback to an end site is keyed by a source IP address and a
source port address, and a date/time
• Requires access to
• WHOIS records to identify the ISP,
• The ISP’s CGN logs to identify the ISP’s private address and
• The ISP’s AAA logs to identify the end site
14
2017#apricot2017
ISP CGN Logging
CGN bindings are formed for EVERY unique TCP and UDP session
That can be a LOT of data to retain…
15http://www.nanog.org/meetings/nanog54/presentations/Tuesday/GrundemannLT.pdf
2017#apricot2017
It could be better than this…
• Use Port Blocks per customer
or
• Use a mix of Port Blocks and Shared Port Pool overflow
and
• Compress the log data (which will reduce storage but may increase search
overhead)
16
2017#apricot2017
Or it could be worse…
17
2017#apricot2017
18
We are going to see a LOT of transition
middleware being deployed!
2017#apricot2017
19
And we are going to see a significant diversity in
what that transition middleware does
We are going to see a LOT of transition
middleware being deployed!
2017#apricot2017
What does this mean for
Forensic tracing?
20
LEAs	have	traditionally	focused	on	the	NETWORK	as	
the	point	of	interception	and	tracing
They	are	used	to	a	consistent	model	to	trace	activity:
• get	an	IP	address	and	a	time	range
• trace	back	based	on	these	two	values	to	uncover	a	
set	of	network	transactions
2017#apricot2017
What does this mean for
Forensic tracing?
21
In	a	world	of	densely	deployed	CGNs	and	ALGs	the	IP	
address	loses	coherent	meaning	in	terms	of	end	party	
identification.
2017#apricot2017
What does this mean for
Forensic tracing?
22
And	instead	of	shifting	to	a	single	“new”	model	of	IP	address	use,	we	are	
going	to	see	widespread	diversity	in	the	use	of	transition	mechanisms	and	
NATs	in	carrier	networks
Which	implies	that	there	will	no	longer	be	a	useful	single	model	of	how	to	
perform	traceback on	the	network
Or	even	a	single	coherent	model	of	“what	is	an	IP	address”	in	the	network
2017#apricot2017
Variants of NAT CGN Technologies
23
Variant:
CGN with per user port blocks
CGN with per user port blocks + pooled overflow
CGN with pooled ports
CGN with 5-tuple binding maps
Address Compression
Ratio
10:1
100:1
1,000:1
>>10,000:1
The same public address and port is used
simultaneously by multiple different internal
users
ISP Internet
CGN
Source: 192.0.2.1:1234
Dest: 128.66.0.0:80
Source: 192.0.2.1:1234
Dest: 128.66.2.2:80
Customer A
Customer B
2017#apricot2017
Adding IPv6 to the CGN Mix
• The space is not exclusively an IPv4 space.
• While CGNs using all-IPv4 technologies are common today, we are
also looking at how to use CGN variants with a mix of IPv6 and IPv4
For example: Dual-Stack Light connects IPv4 end users to the IPv4 Internet across an IPv6
ISP infrastructure.
• We see many more variants of ISP’s address transforming
middleware when they IPv6 into the mix
24
2017#apricot2017
++IPv6:
Transition Technologies
25
Randy Bush, APPRICOT 2012: http://meetings.apnic.net/__data/assets/pdf_file/0016/45241/120229.apops-v4-life-extension.pdf
2017#apricot2017
Transition Technologies Example:
464XLAT
26Masataka Mawatari, Apricot 2012, http://meetings.apnic.net/__data/assets/pdf_file/0020/45542/jpix_464xlat_apricot2012_for_web.pdf
2017#apricot2017
What does this mean for
Forensic tracing?
27
There	is	no	single	consistent	model	of	how	an	IP	network	
manages	IPv4	and	IPv6	addresses
There	is	no	fixed	relationship	between	IPv4	and	IPv6	addresses
What	you	see	in	terms	of	network	trace	information	is	strongly	
dependent	on	where the	trace	data	is	collected
2017#apricot2017
What does this mean for
LEAs?
28
What’s	the	likely	response	from	LEAs	and	regulators?
One	likely	response	is	to	augment	the	record	keeping	
rules	for	ISPs
2017#apricot2017
What does this mean for
ISPs and LEAs?
29
But	what	are	the	new	record	keeping	rules?
In	order	to	map	a	“external”	IP	address	and	time	to	a	
subscriber	as	part	of	a	traceback exercise	then:
for	every active	middleware	element	you	now	need	to	hold	
the	precise time	and	the	precise transforms	that	were	applied	
to	a	packet	flow
and	you	need	to	be	able	to	cross-match these	records	
accurately
2017#apricot2017
What does this mean for
ISPs and LEAs?
30
But	what	are	the	new	record	keeping	rules?
In	order	to	map	a	“external”	IP	address	and	time	to	a	
subscriber	as	part	of	a	traceback exercise	then:
for	every active	middleware	element	you	now	need	to	hold	
the	precise time	and	the	precise transforms	that	were	applied	
to	a	packet	flow
and	you	need	to	be	able	to	cross-match these	records	
accurately
2017#apricot2017
What does this mean for
ISPs and LEAs?
31
How	many	different	sets	of	record	keeping	rules	are	required	for	each	CGN	/	
dual	stack	transition	model	being	used?
And	are	these	record	keeping	practices	affordable?
(granularity	of	the	records	is	shifting	from	“session”	records	to	“transition”	and	
even	individual	packet	records	in	this	diverse	model)
Are	they	even	practical	within	today’s	technology	capability?
Is	this	scaleable?
Is	it	even	useful	any	more?
2017#apricot2017
Making it hard...
32
The	V6	transition	was	challenging	enough
The	combination	of	V4	exhaustion	and	V6	transition	is	far	harder
The	combination	of	varying	exhaustion	times,	widespread	
confusion,	diverse	agendas,	diverse	pressures,	V4	exhaustion	and	
V6	transition	is	now	amazingly	challenging
2017#apricot2017
Making it very hard...
The	problem	we	are	facing	is	that	we	are	heading	away	from	a	single	service	
architecture	in	our	IP	networks
Different	providers	are	seeing	different	pressures	and	opportunities,	and	are	using	
different	technology	solutions	in	their	networks
And	the	longer	we	sit	in	this	“exhaustion	+	transitioning”	world,	the	greater	the	
diversity	and	internal	complexity	of	service	networks	that	will	be	deployed
33
2017#apricot2017
34
Does it ever get easier?
Is there light at the end of this tunnel?
2017#apricot2017
That was then
The material so far refers to the Internet of late 2013
Three years later, has it got any easier?
Or has it just got harder?
35
2017#apricot2017
Sessions are the Key
We	assumed	that	there	is	a	“session”	that	maps	between	a	service	and	a	client,	and	this	
session	is	visible	in	some	manner	to	the	network
The	forensic	task	was	to	take	a	partial	record	of	a	“session”	and	identify	the	other	party	to	
the	session	by	using	ancilliary information	(whois registries,	web	logs,	metadata	data	sets,	
etc)
But	maybe	the	entire	concept	of	a	“session”	no	longer	exists!	Do	we	still	use	“sessions”	in	
applications?
What	is	changing?
36
2017#apricot2017
37
2017#apricot2017
The new Paranoid Internet Service
Architecture
The entire concept of open network transactions is now over
We are shifting into an environment where user information is deliberately withheld
from the network, withheld from the platform and even withheld from other applications
We circulate large self-contained applications that attempt to insulate themselves
completely from the host platform
Application Service Providers see the platform provider as representing a competitive
interest in the user, and they want to prevent information leakage from their application
to the platform
Application Service Providers see other applications as as representing a competitive
interest in the user, and they want to prevent information leakage from their application
to other applications in the same platform
38
2017#apricot2017
39
2017#apricot2017
40
These technologies are already deployed, and
enjoy significant use in today’s network
They break down the concept of a “session” and
splay the encrypted traffic across multiple
networks, and even multiple protocols
They use opportunistic encryption to limit third
party access to information about users’ actions
The result is that only the endpoints see the
entirety of a session, while individual networks see
disparate fragments of pseudo-sessions
2017#apricot2017
41
2017#apricot2017
The Bottom Line
It’s	no	longer	just	an	issue	with	IPv4	and	NATs	and	a	visible	reluctance	to	shift	to	IPv6
Networks,	platforms	and	applications	now	regard	each	other	with	mutual	suspicion
Platforms	seek	to	hide	users’	activities	from	the	network
Applications	seek	to	hide	their	information	from	the	platform	and	from	other	applications
The	DNS	is	sealing	itself	into	private	tunnels	that	resist	external	examination,	intervention	
and	intervention
“Sessions”	are	being	deconstructed	into	opaque	fragments
Opportunistic	encryption	is	being	applied	ubiquitously
42
2017#apricot2017
Its not just “the IPv6
transition” any more
These are not just temporary steps to make IPv4 last longer for the
transition to IPv6
Even if we complete the transition to an all-IPv6 Internet, this paranoia,
complexity and deliberate obfuscation will not go away
This is now the Internet we have to live with
43
2017#apricot2017
We are never coming back from here – this is the
new “ground state” for the Internet!
44
2017#apricot2017
45
Does it ever get easier?
Is there light at the end of this tunnel?
2017#apricot2017
46
No!
2017#apricot2017
Thank You!
Me: gih@apnic.net

Contenu connexe

Tendances

Internet Noise (A Story About Two Little Subnets - Tom Paseka
Internet Noise (A Story About Two Little Subnets - Tom PasekaInternet Noise (A Story About Two Little Subnets - Tom Paseka
Internet Noise (A Story About Two Little Subnets - Tom PasekaMyNOG
 
IPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksIPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksAPNIC
 
HKNOG 1.0 - DDoS attacks in an IPv6 World
HKNOG 1.0 -  DDoS attacks in an IPv6 WorldHKNOG 1.0 -  DDoS attacks in an IPv6 World
HKNOG 1.0 - DDoS attacks in an IPv6 WorldTom Paseka
 
OARC 26: Scoring the Root Server System
OARC 26: Scoring the Root Server SystemOARC 26: Scoring the Root Server System
OARC 26: Scoring the Root Server SystemAPNIC
 
CommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTCommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTAPNIC
 
28th TWNIC OPM and TWNOG 2017: Security best practices for network operators
28th TWNIC OPM and TWNOG 2017: Security best practices for network operators28th TWNIC OPM and TWNOG 2017: Security best practices for network operators
28th TWNIC OPM and TWNOG 2017: Security best practices for network operatorsAPNIC
 
Welcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, MongoliaWelcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, MongoliaAPNIC
 
NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016NetBeez, Inc.
 
Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodAPNIC
 
Tutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerTutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
 
TLD Anycast DNS servers to ISPs
TLD Anycast DNS servers to ISPsTLD Anycast DNS servers to ISPs
TLD Anycast DNS servers to ISPsAPNIC
 
The New Root Zone DNSSEC KSK
The New Root Zone DNSSEC KSKThe New Root Zone DNSSEC KSK
The New Root Zone DNSSEC KSKAPNIC
 
Building CloudScale Networks - AWS Summit Sydney 2018
Building CloudScale Networks - AWS Summit Sydney 2018Building CloudScale Networks - AWS Summit Sydney 2018
Building CloudScale Networks - AWS Summit Sydney 2018Amazon Web Services
 
APNIC IPv6 Deployment
APNIC IPv6 DeploymentAPNIC IPv6 Deployment
APNIC IPv6 DeploymentAPNIC
 
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиМобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиPositive Hack Days
 
npNOG 2: APNIC IPv6 deployment
npNOG 2: APNIC IPv6 deploymentnpNOG 2: APNIC IPv6 deployment
npNOG 2: APNIC IPv6 deploymentAPNIC
 
Security in an IPv6 World - Myth & Reality
Security in an IPv6 World - Myth & RealitySecurity in an IPv6 World - Myth & Reality
Security in an IPv6 World - Myth & RealityChris Grundemann
 

Tendances (20)

Secured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRRSecured Internet Gateway for ISP with pfsense & FRR
Secured Internet Gateway for ISP with pfsense & FRR
 
Internet Noise (A Story About Two Little Subnets - Tom Paseka
Internet Noise (A Story About Two Little Subnets - Tom PasekaInternet Noise (A Story About Two Little Subnets - Tom Paseka
Internet Noise (A Story About Two Little Subnets - Tom Paseka
 
IPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access NetworksIPv6 Deployment Architecture for Broadband Access Networks
IPv6 Deployment Architecture for Broadband Access Networks
 
HKNOG 1.0 - DDoS attacks in an IPv6 World
HKNOG 1.0 -  DDoS attacks in an IPv6 WorldHKNOG 1.0 -  DDoS attacks in an IPv6 World
HKNOG 1.0 - DDoS attacks in an IPv6 World
 
MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12MANRS for Network Operators - bdNOG12
MANRS for Network Operators - bdNOG12
 
OARC 26: Scoring the Root Server System
OARC 26: Scoring the Root Server SystemOARC 26: Scoring the Root Server System
OARC 26: Scoring the Root Server System
 
CommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoTCommunicAsia 2017: IPv6 deployment architecture for IoT
CommunicAsia 2017: IPv6 deployment architecture for IoT
 
28th TWNIC OPM and TWNOG 2017: Security best practices for network operators
28th TWNIC OPM and TWNOG 2017: Security best practices for network operators28th TWNIC OPM and TWNOG 2017: Security best practices for network operators
28th TWNIC OPM and TWNOG 2017: Security best practices for network operators
 
Welcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, MongoliaWelcome to the APNIC Member Gathering, Mongolia
Welcome to the APNIC Member Gathering, Mongolia
 
NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016NetBeez - IEEE IRI 2016
NetBeez - IEEE IRI 2016
 
Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long Period
 
Tutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerTutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting router
 
Core Bluetooth on iOS
Core Bluetooth on iOSCore Bluetooth on iOS
Core Bluetooth on iOS
 
TLD Anycast DNS servers to ISPs
TLD Anycast DNS servers to ISPsTLD Anycast DNS servers to ISPs
TLD Anycast DNS servers to ISPs
 
The New Root Zone DNSSEC KSK
The New Root Zone DNSSEC KSKThe New Root Zone DNSSEC KSK
The New Root Zone DNSSEC KSK
 
Building CloudScale Networks - AWS Summit Sydney 2018
Building CloudScale Networks - AWS Summit Sydney 2018Building CloudScale Networks - AWS Summit Sydney 2018
Building CloudScale Networks - AWS Summit Sydney 2018
 
APNIC IPv6 Deployment
APNIC IPv6 DeploymentAPNIC IPv6 Deployment
APNIC IPv6 Deployment
 
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактамиМобильная связь небезопасна. Аргументы, подкрепленные фактами
Мобильная связь небезопасна. Аргументы, подкрепленные фактами
 
npNOG 2: APNIC IPv6 deployment
npNOG 2: APNIC IPv6 deploymentnpNOG 2: APNIC IPv6 deployment
npNOG 2: APNIC IPv6 deployment
 
Security in an IPv6 World - Myth & Reality
Security in an IPv6 World - Myth & RealitySecurity in an IPv6 World - Myth & Reality
Security in an IPv6 World - Myth & Reality
 

En vedette

História e a evolução do Computador
 História e a evolução do Computador História e a evolução do Computador
História e a evolução do ComputadorANDRÉA LEMOS
 
Arquitetura pentium
Arquitetura pentiumArquitetura pentium
Arquitetura pentiumTiago
 
A contribution to new material standards for Ductile Ironsand Austempered Duc...
A contribution to new material standards for Ductile Ironsand Austempered Duc...A contribution to new material standards for Ductile Ironsand Austempered Duc...
A contribution to new material standards for Ductile Ironsand Austempered Duc...Franco Zanardi
 
Taller 1 cristhian pozo, paola cruz
Taller 1 cristhian pozo, paola cruzTaller 1 cristhian pozo, paola cruz
Taller 1 cristhian pozo, paola cruzpaoc1204
 
MBA Internship Presentation - Customer Awareness and Market potential of geo...
MBA Internship Presentation -  Customer Awareness and Market potential of geo...MBA Internship Presentation -  Customer Awareness and Market potential of geo...
MBA Internship Presentation - Customer Awareness and Market potential of geo...Santanu Das
 
THE IMPACT OF ICT IN QUANTITY SURVEYING
THE IMPACT OF ICT IN QUANTITY SURVEYINGTHE IMPACT OF ICT IN QUANTITY SURVEYING
THE IMPACT OF ICT IN QUANTITY SURVEYINGSolomon Rex Borchers
 
Smart 看 tv!
Smart 看 tv!Smart 看 tv!
Smart 看 tv!Becker Lai
 
Stephen J. Gould - Scientific Author of The Measure of a Man
Stephen J. Gould - Scientific Author of The Measure of a ManStephen J. Gould - Scientific Author of The Measure of a Man
Stephen J. Gould - Scientific Author of The Measure of a ManKarolina Dziunikowska
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Manoj Kumar
 
Pulso, presión arterial, pulso venoso.
Pulso, presión arterial, pulso venoso. Pulso, presión arterial, pulso venoso.
Pulso, presión arterial, pulso venoso. eguer5
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Kuniyasu Suzaki
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloudAzure Group
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 

En vedette (20)

História e a evolução do Computador
 História e a evolução do Computador História e a evolução do Computador
História e a evolução do Computador
 
Arquitetura pentium
Arquitetura pentiumArquitetura pentium
Arquitetura pentium
 
La dama del alba (refranes)
La dama del alba (refranes)La dama del alba (refranes)
La dama del alba (refranes)
 
A contribution to new material standards for Ductile Ironsand Austempered Duc...
A contribution to new material standards for Ductile Ironsand Austempered Duc...A contribution to new material standards for Ductile Ironsand Austempered Duc...
A contribution to new material standards for Ductile Ironsand Austempered Duc...
 
Transporte
TransporteTransporte
Transporte
 
Resultados
ResultadosResultados
Resultados
 
Taller 1 cristhian pozo, paola cruz
Taller 1 cristhian pozo, paola cruzTaller 1 cristhian pozo, paola cruz
Taller 1 cristhian pozo, paola cruz
 
Operaciones
OperacionesOperaciones
Operaciones
 
MBA Internship Presentation - Customer Awareness and Market potential of geo...
MBA Internship Presentation -  Customer Awareness and Market potential of geo...MBA Internship Presentation -  Customer Awareness and Market potential of geo...
MBA Internship Presentation - Customer Awareness and Market potential of geo...
 
THE IMPACT OF ICT IN QUANTITY SURVEYING
THE IMPACT OF ICT IN QUANTITY SURVEYINGTHE IMPACT OF ICT IN QUANTITY SURVEYING
THE IMPACT OF ICT IN QUANTITY SURVEYING
 
Smart 看 tv!
Smart 看 tv!Smart 看 tv!
Smart 看 tv!
 
Stephen J. Gould - Scientific Author of The Measure of a Man
Stephen J. Gould - Scientific Author of The Measure of a ManStephen J. Gould - Scientific Author of The Measure of a Man
Stephen J. Gould - Scientific Author of The Measure of a Man
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
Cloud Computing – Opportunities, Definitions, Options, and Risks (Part-1)
 
The Cloud: Privacy and Forensics
The Cloud: Privacy and ForensicsThe Cloud: Privacy and Forensics
The Cloud: Privacy and Forensics
 
Pulso, presión arterial, pulso venoso.
Pulso, presión arterial, pulso venoso. Pulso, presión arterial, pulso venoso.
Pulso, presión arterial, pulso venoso.
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
Security on cloud storage and IaaS (NSC: Taiwan - JST: Japan workshop)
 
The security of SAAS and private cloud
The security of SAAS and private cloudThe security of SAAS and private cloud
The security of SAAS and private cloud
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 

Similaire à 2017 03-01-forensics 1488330715

The End of IPv4: What It Means for Incident Responders
The End of IPv4: What It Means for Incident RespondersThe End of IPv4: What It Means for Incident Responders
The End of IPv4: What It Means for Incident RespondersCarlos Martinez Cagnazzo
 
Apnic V6 Tutorial Distribution
Apnic V6 Tutorial DistributionApnic V6 Tutorial Distribution
Apnic V6 Tutorial DistributionAli_Ahmad
 
Panel with IPv6 CE Vendors
Panel with IPv6 CE VendorsPanel with IPv6 CE Vendors
Panel with IPv6 CE VendorsAPNIC
 
How to Ingest 16 Billion Records Per Day into your Hadoop Environment
How to Ingest 16 Billion Records Per Day into your Hadoop EnvironmentHow to Ingest 16 Billion Records Per Day into your Hadoop Environment
How to Ingest 16 Billion Records Per Day into your Hadoop EnvironmentDataWorks Summit
 
RIPE NCC Operations and Analysis Tools
RIPE NCC Operations and Analysis ToolsRIPE NCC Operations and Analysis Tools
RIPE NCC Operations and Analysis ToolsRIPE NCC
 
IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013Shumon Huque
 
Building and operating a global DNS content delivery anycast network
Building and operating a global DNS content delivery anycast networkBuilding and operating a global DNS content delivery anycast network
Building and operating a global DNS content delivery anycast networkAPNIC
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPROIDEA
 
PhNOG 2020: Securing your resources with RPKI and IRT
PhNOG 2020: Securing your resources with RPKI and IRTPhNOG 2020: Securing your resources with RPKI and IRT
PhNOG 2020: Securing your resources with RPKI and IRTAPNIC
 
Leveraging Network Offload to Accelerate SDN and NFV Deployments
Leveraging Network Offload to Accelerate SDN and NFV DeploymentsLeveraging Network Offload to Accelerate SDN and NFV Deployments
Leveraging Network Offload to Accelerate SDN and NFV DeploymentsNetronome
 
Openconfig
OpenconfigOpenconfig
OpenconfigAPNIC
 
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]APNIC
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowCisco DevNet
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challengesIvan Pepelnjak
 
.NET Core Today and Tomorrow
.NET Core Today and Tomorrow.NET Core Today and Tomorrow
.NET Core Today and TomorrowJon Galloway
 
Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]
Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]
Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]APNIC
 

Similaire à 2017 03-01-forensics 1488330715 (20)

The End of IPv4: What It Means for Incident Responders
The End of IPv4: What It Means for Incident RespondersThe End of IPv4: What It Means for Incident Responders
The End of IPv4: What It Means for Incident Responders
 
Apnic V6 Tutorial Distribution
Apnic V6 Tutorial DistributionApnic V6 Tutorial Distribution
Apnic V6 Tutorial Distribution
 
Panel with IPv6 CE Vendors
Panel with IPv6 CE VendorsPanel with IPv6 CE Vendors
Panel with IPv6 CE Vendors
 
How to Ingest 16 Billion Records Per Day into your Hadoop Environment
How to Ingest 16 Billion Records Per Day into your Hadoop EnvironmentHow to Ingest 16 Billion Records Per Day into your Hadoop Environment
How to Ingest 16 Billion Records Per Day into your Hadoop Environment
 
RIPE NCC Operations and Analysis Tools
RIPE NCC Operations and Analysis ToolsRIPE NCC Operations and Analysis Tools
RIPE NCC Operations and Analysis Tools
 
IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013IPv6 Tutorial; USENIX LISA 2013
IPv6 Tutorial; USENIX LISA 2013
 
Computer Network
Computer Network Computer Network
Computer Network
 
Building and operating a global DNS content delivery anycast network
Building and operating a global DNS content delivery anycast networkBuilding and operating a global DNS content delivery anycast network
Building and operating a global DNS content delivery anycast network
 
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpecPLNOG 13: Krzysztof Mazepa: BGP FlowSpec
PLNOG 13: Krzysztof Mazepa: BGP FlowSpec
 
PhNOG 2020: Securing your resources with RPKI and IRT
PhNOG 2020: Securing your resources with RPKI and IRTPhNOG 2020: Securing your resources with RPKI and IRT
PhNOG 2020: Securing your resources with RPKI and IRT
 
IPv4 adressing
IPv4 adressingIPv4 adressing
IPv4 adressing
 
Leveraging Network Offload to Accelerate SDN and NFV Deployments
Leveraging Network Offload to Accelerate SDN and NFV DeploymentsLeveraging Network Offload to Accelerate SDN and NFV Deployments
Leveraging Network Offload to Accelerate SDN and NFV Deployments
 
SDN and metrics from the SDOs
SDN and metrics from the SDOsSDN and metrics from the SDOs
SDN and metrics from the SDOs
 
Openconfig
OpenconfigOpenconfig
Openconfig
 
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
Who's Watching, by Geoff Huston [APNIC 38 / Technical Keynote]
 
SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1SDI to IP 2110 Transition Part 1
SDI to IP 2110 Transition Part 1
 
Application Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible NetflowApplication Visibility and Experience through Flexible Netflow
Application Visibility and Experience through Flexible Netflow
 
Upcoming internet challenges
Upcoming internet challengesUpcoming internet challenges
Upcoming internet challenges
 
.NET Core Today and Tomorrow
.NET Core Today and Tomorrow.NET Core Today and Tomorrow
.NET Core Today and Tomorrow
 
Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]
Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]
Whats so special about 512?, by Geoff Huston [APNIC 38 / APOPS 3]
 

Plus de APNIC

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 

Plus de APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Dernier

Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...roncy bisnoi
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls DubaiEscorts Call Girls
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 

Dernier (20)

Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 

2017 03-01-forensics 1488330715

  • 1. 2017#apricot2017 Forensic Tracing in the Internet: An Update Geoff Huston Chief Scientist APNIC
  • 2. 2017#apricot2017 The story so far… • The status of the transition to IPv6 is not going according to the original plan: • We have exhausted the remaining pools of IPv4 addresses in all regions except Africa - this was never meant to have happened • We we meant to have IPv6 fully deployed by now • What we are seeing is the pervasive use of Carrier Grade NATs as a means of extending the useable life of the IPv4 Internet • Around 10% of users use both IPv6 and IPv4 – the other 90% are IPv4 only • It appears that most IPv4 use today uses NATs in the path • This has some major implications for LEA functions, principally in traceback and metadata record keeping 2
  • 3. 2017#apricot2017 Traceback – Version 1 3 A: 192.0.2.1 Ftp Server Internet Lets start by looking way back to the Internet of the 1980’s ftpserver.net 192.0.2.1 [31/Aug/2013:00:00:08 +0000] Ftp Server Log $ whois 192.0.2.1 NetRange: 192.0.2.0 - 192.0.2.255 NetName: TEST-NET-1 Contact: User Contact Details There was a rudimentary whois service and it listed all end users!
  • 4. 2017#apricot2017 Assumptions: • Each end site used a stable IP address range • Each address range was recorded in a registry, together with the end user data • Each end device was manually configured with a stable IP address • Traceback was keyed from the IP address 4
  • 5. 2017#apricot2017 Assumptions: • Each end site used a stable IP address range • Each address range was recorded in a registry, together with the end user data • Each end device was manually configured with a stable IP address • Traceback is keyed from the IP address 5
  • 6. 2017#apricot2017 + NATs 6 A: 10.0.0.1 B: 10.0.0.2 C: 10.0.0.3 CPE NAT/ DHCP Server 192.0.2.1 ISP
  • 7. 2017#apricot2017 Traceback – Version 2 7 A: 10.0.0.1 Web Server ISP webserver.net 192.0.2.1 [31/Aug/2013:00:00:08 +0000] "GET /1x1.png HTTP/1.1" 200 Web Server Log $ whois 192.0.2.1 NetRange: 192.0.2.0 - 192.0.2.255 CIDR: 192.0.2.0/24 OriginAS: NetName: TEST-NET-1 NetHandle: NET-192-0-2-0-1 Parent: NET-192-0-0-0-0 NetType: IANA Special Use CPE NAT/ DHCP Server 192.0.2.1 ISP RADIUS Log 15/Aug/2013:18:01:02: user XXX IP: 192.0.2.1
  • 8. 2017#apricot2017 Assumptions • The ISP operates an address pool • Each end site is dynamically assigned a single IP address upon login (AAA) • The site is dynamically addressed using a private address range and a DHCP server • The single public address is shared by the private devices through a CPE NAT 8
  • 9. 2017#apricot2017 Changes • Traceback to an end site is keyed by an IP address and a date/time • Requires access to WHOIS records to identify the ISP and the ISP’s AAA logs to identify the end site • No traceback to an individual device – the trace stops at the edge NAT 9
  • 10. 2017#apricot2017 IPv4 Address Exhaustion 10 What have ISP’s done in response? • It’s still not viable to switch over to all-IPv6 yet • The supply of further IPv4 addresses to fuel service platform growth has dried up • How do ISPs continue to offer IPv4 services to customers in the interim? • By sharing addresses across customers
  • 12. 2017#apricot2017 Traceback – Version 3 12 A: 10.0.0.1 B: 10.0.0.2 C: 10.0.0.3 CPE NAT/ DHCP Server ISP CGN 192.0.2.0/24 Web Server Internet webserver.net [192.0.2.1]::45800 [31/Aug/2013:00:00:08 +0000] "GET /1x1.png HTTP/1.1" 200 Web Server Log $ whois 192.0.2.1 NetRange: 192.0.2.0 - 192.0.2.255 CIDR: 192.0.2.0/24 OriginAS: NetName: TEST-NET-1 NetHandle: NET-192-0-2-0-1 Parent: NET-192-0-0-0-0 NetType: IANA Special Use ISP CGN Log 31/Aug/2013:00:00:02 172.16.5.6:34233 128.66.0.0:80 -> 192.0.2.1:45800 128.66.0.0:80 ISP RADIUS Log 15/Aug/2013:18:01:02: user XXX IP: 172.16.5.6:34000-40000 172.16.5.6
  • 13. 2017#apricot2017 Assumptions • The ISP operates a public address pool and a private address pool • The access into the public address pool is via an ISP-operated NAT (CGN) • Each end site is dynamically assigned a single private IP address upon login (AAA) • The site is dynamically addressed using a private address range and a DHCP server • The single public address is shared by the private devices through a CPE NAT 13
  • 14. 2017#apricot2017 Assumptions • Traceback to an end site is keyed by a source IP address and a source port address, and a date/time • Requires access to • WHOIS records to identify the ISP, • The ISP’s CGN logs to identify the ISP’s private address and • The ISP’s AAA logs to identify the end site 14
  • 15. 2017#apricot2017 ISP CGN Logging CGN bindings are formed for EVERY unique TCP and UDP session That can be a LOT of data to retain… 15http://www.nanog.org/meetings/nanog54/presentations/Tuesday/GrundemannLT.pdf
  • 16. 2017#apricot2017 It could be better than this… • Use Port Blocks per customer or • Use a mix of Port Blocks and Shared Port Pool overflow and • Compress the log data (which will reduce storage but may increase search overhead) 16
  • 18. 2017#apricot2017 18 We are going to see a LOT of transition middleware being deployed!
  • 19. 2017#apricot2017 19 And we are going to see a significant diversity in what that transition middleware does We are going to see a LOT of transition middleware being deployed!
  • 20. 2017#apricot2017 What does this mean for Forensic tracing? 20 LEAs have traditionally focused on the NETWORK as the point of interception and tracing They are used to a consistent model to trace activity: • get an IP address and a time range • trace back based on these two values to uncover a set of network transactions
  • 21. 2017#apricot2017 What does this mean for Forensic tracing? 21 In a world of densely deployed CGNs and ALGs the IP address loses coherent meaning in terms of end party identification.
  • 22. 2017#apricot2017 What does this mean for Forensic tracing? 22 And instead of shifting to a single “new” model of IP address use, we are going to see widespread diversity in the use of transition mechanisms and NATs in carrier networks Which implies that there will no longer be a useful single model of how to perform traceback on the network Or even a single coherent model of “what is an IP address” in the network
  • 23. 2017#apricot2017 Variants of NAT CGN Technologies 23 Variant: CGN with per user port blocks CGN with per user port blocks + pooled overflow CGN with pooled ports CGN with 5-tuple binding maps Address Compression Ratio 10:1 100:1 1,000:1 >>10,000:1 The same public address and port is used simultaneously by multiple different internal users ISP Internet CGN Source: 192.0.2.1:1234 Dest: 128.66.0.0:80 Source: 192.0.2.1:1234 Dest: 128.66.2.2:80 Customer A Customer B
  • 24. 2017#apricot2017 Adding IPv6 to the CGN Mix • The space is not exclusively an IPv4 space. • While CGNs using all-IPv4 technologies are common today, we are also looking at how to use CGN variants with a mix of IPv6 and IPv4 For example: Dual-Stack Light connects IPv4 end users to the IPv4 Internet across an IPv6 ISP infrastructure. • We see many more variants of ISP’s address transforming middleware when they IPv6 into the mix 24
  • 25. 2017#apricot2017 ++IPv6: Transition Technologies 25 Randy Bush, APPRICOT 2012: http://meetings.apnic.net/__data/assets/pdf_file/0016/45241/120229.apops-v4-life-extension.pdf
  • 26. 2017#apricot2017 Transition Technologies Example: 464XLAT 26Masataka Mawatari, Apricot 2012, http://meetings.apnic.net/__data/assets/pdf_file/0020/45542/jpix_464xlat_apricot2012_for_web.pdf
  • 27. 2017#apricot2017 What does this mean for Forensic tracing? 27 There is no single consistent model of how an IP network manages IPv4 and IPv6 addresses There is no fixed relationship between IPv4 and IPv6 addresses What you see in terms of network trace information is strongly dependent on where the trace data is collected
  • 28. 2017#apricot2017 What does this mean for LEAs? 28 What’s the likely response from LEAs and regulators? One likely response is to augment the record keeping rules for ISPs
  • 29. 2017#apricot2017 What does this mean for ISPs and LEAs? 29 But what are the new record keeping rules? In order to map a “external” IP address and time to a subscriber as part of a traceback exercise then: for every active middleware element you now need to hold the precise time and the precise transforms that were applied to a packet flow and you need to be able to cross-match these records accurately
  • 30. 2017#apricot2017 What does this mean for ISPs and LEAs? 30 But what are the new record keeping rules? In order to map a “external” IP address and time to a subscriber as part of a traceback exercise then: for every active middleware element you now need to hold the precise time and the precise transforms that were applied to a packet flow and you need to be able to cross-match these records accurately
  • 31. 2017#apricot2017 What does this mean for ISPs and LEAs? 31 How many different sets of record keeping rules are required for each CGN / dual stack transition model being used? And are these record keeping practices affordable? (granularity of the records is shifting from “session” records to “transition” and even individual packet records in this diverse model) Are they even practical within today’s technology capability? Is this scaleable? Is it even useful any more?
  • 33. 2017#apricot2017 Making it very hard... The problem we are facing is that we are heading away from a single service architecture in our IP networks Different providers are seeing different pressures and opportunities, and are using different technology solutions in their networks And the longer we sit in this “exhaustion + transitioning” world, the greater the diversity and internal complexity of service networks that will be deployed 33
  • 34. 2017#apricot2017 34 Does it ever get easier? Is there light at the end of this tunnel?
  • 35. 2017#apricot2017 That was then The material so far refers to the Internet of late 2013 Three years later, has it got any easier? Or has it just got harder? 35
  • 36. 2017#apricot2017 Sessions are the Key We assumed that there is a “session” that maps between a service and a client, and this session is visible in some manner to the network The forensic task was to take a partial record of a “session” and identify the other party to the session by using ancilliary information (whois registries, web logs, metadata data sets, etc) But maybe the entire concept of a “session” no longer exists! Do we still use “sessions” in applications? What is changing? 36
  • 38. 2017#apricot2017 The new Paranoid Internet Service Architecture The entire concept of open network transactions is now over We are shifting into an environment where user information is deliberately withheld from the network, withheld from the platform and even withheld from other applications We circulate large self-contained applications that attempt to insulate themselves completely from the host platform Application Service Providers see the platform provider as representing a competitive interest in the user, and they want to prevent information leakage from their application to the platform Application Service Providers see other applications as as representing a competitive interest in the user, and they want to prevent information leakage from their application to other applications in the same platform 38
  • 40. 2017#apricot2017 40 These technologies are already deployed, and enjoy significant use in today’s network They break down the concept of a “session” and splay the encrypted traffic across multiple networks, and even multiple protocols They use opportunistic encryption to limit third party access to information about users’ actions The result is that only the endpoints see the entirety of a session, while individual networks see disparate fragments of pseudo-sessions
  • 43. 2017#apricot2017 Its not just “the IPv6 transition” any more These are not just temporary steps to make IPv4 last longer for the transition to IPv6 Even if we complete the transition to an all-IPv6 Internet, this paranoia, complexity and deliberate obfuscation will not go away This is now the Internet we have to live with 43
  • 44. 2017#apricot2017 We are never coming back from here – this is the new “ground state” for the Internet! 44
  • 45. 2017#apricot2017 45 Does it ever get easier? Is there light at the end of this tunnel?