TCP/IP Security Problems. History that still teaches



Similar documents
A S B

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Linux Network Security

Attack Lab: Attacks on TCP/IP Protocols

8.2 The Internet Protocol

Internet Control Protocols Reading: Chapter 3

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

BASIC ANALYSIS OF TCP/IP NETWORKS

How To Classify A Dnet Attack

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Networks: IP and TCP. Internet Protocol

Unix System Administration

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Technical Support Information Belkin internal use only

Own your LAN with Arp Poison Routing

CCT vs. CCENT Skill Set Comparison

Security Technology White Paper

CSCE 465 Computer & Network Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

CS155: Computer and Network Security

Firewalls. Chapter 3

Security: Attack and Defense

co Characterizing and Tracing Packet Floods Using Cisco R

Cisco Configuring Commonly Used IP ACLs

CSE 127: Computer Security. Network Security. Kirill Levchenko

1. LAB SNIFFING LAB ID: 10

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Network layer: Overview. Network layer functions IP Routing and forwarding

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Lecture Computer Networks

Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Chapter 8 Security Pt 2

Host Fingerprinting and Firewalking With hping

Firewalls. Network Security. Firewalls Defined. Firewalls

Lecture 5: Network Attacks I. Course Admin

LAB THREE STATIC ROUTING

Outline. Network Protocols and Vulnerabilities. Internet Infrastructure. TCP Protocol Stack

A Very Incomplete Diagram of Network Attacks

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Networking Test 4 Study Guide

Ethernet. Ethernet. Network Devices

General Network Security

Lab Organizing CCENT Objectives by OSI Layer

Sniffing in a Switched Network

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

Troubleshooting Tools

Firewall Stateful Inspection of ICMP

Packet Sniffing on Layer 2 Switched Local Area Networks

ICS 351: Today's plan

Network Security TCP/IP Refresher

Chapter 10 Troubleshooting

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Computer Networks I Laboratory Exercise 1

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Packet Sniffer Detection with AntiSniff

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Chapter 13 Internet Protocol (IP)

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Protecting and controlling Virtual LANs by Linux router-firewall

Introduction to computer and network security. Session 2 : Examples of vulnerabilities and attacks pt1

Subnetting,Supernetting, VLSM & CIDR

Firewalls. Chien-Chung Shen

CS 3251: Computer Networking 1 Security Protocols I

- Basic Router Security -

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

CS5008: Internet Computing

IP Routing Features. Contents

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

HOST AUTO CONFIGURATION (BOOTP, DHCP)

Securing Cisco Network Devices (SND)

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Securing end devices

Networking Basics and Network Security

finger, ftp, host, hostname, mesg, rcp, rlogin, rsh, scp, sftp, slogin, ssh, talk, telnet, users, w, walla, who, write,...

Introduction to IP networking

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Chapter 7 Protecting Against Denial of Service Attacks

Sample Configuration Using the ip nat outside source static

Looking for Trouble: ICMP and IP Statistics to Watch

Chapter 8 Phase3: Gaining Access Using Network Attacks

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Scapy. On-the-fly Packet Generation by Dienstag, 10. Januar 12

Hacking The Invisible Network

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

VLAN und MPLS, Firewall und NAT,

Introduction To Computer Networking

My FreeScan Vulnerabilities Report

Chapter 8 Network Security

An Introduction to Nmap with a Focus on Information Gathering. Ionuț Ambrosie

Recent advances in IPv6 insecurities Marc van Hauser Heuse Deepsec 2010, Vienna Marc Heuse

Transcription:

TCP/IP Security Problems History that still teaches 1

remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home directory is an access control list (ACL) red.cs.umass.edu brian Example.rhosts file: blue.cs.umass.edu brian The authentication check in rsh (and the other r-tools) is simply the IP address. Is it hard to spoof a particular IP address? *.cs.umass.edu brian * * These attacks hold for any IP-based authentication 2

IP Stack Reviewed (briefly) 1. Physical 2. Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application 1. Physical security, hubs, wlan 2. Arp attacks, NAT, DHPC 3. Spoofing, routing, etc 4. Hijacking 5. Session stealing 6. ==== (XML?) 7. Web apps, DNS 3

Routing Review Review: When they receive a packet, how do hosts using IP route data? Static routing is largely based on subneting, ARP, and ICMP. IP hosts are always on some specific subnet. They search routing tables looking for longest matching prefix. This means, you find routes in this order: 1. Matching host address (128.119.48.55) 2. Matching subnet address (128.119.48.*) 3. Matching network address (128.119.*) 4. Default route (gateway router) This process tells the host what IP address is the next hop. Now the host must determine the link layer address of the next hop. How is that done in IP? 4

Review: Address Resolution Protocol (ARP) and ICMP ARP is the interface between the Link layer and Network layer. Allows hosts to query who owns an IP address on the same LAN. Owner responds with hardware address. Allows changes to link layer to be independent of IP addressing. That s why we can have IP on everything (wireless, radio waves, buses, etc.) ICMP is used for routing error messages TTL expired (that s how traceroute works) Host unreachable Echo request (that s how the ping program works) 5

On-the-same-LAN routing 1. Route lookup determines it is on the same subnet. 2. Use ARP to determine what link layer address to send it to. 223.1.2.1 223.1.2.9 3. Give it to Link layer. 223.1.3.27 223.1.2.2 Who has 223.1.3.2? LAN I have it. My eth addr is 223.1.3.3 223.1.3.1 223.1.3.2 6

Through-the-gateway Routing 1. Route lookup determines it s on a different subnet. Result: Go through default route. 2. Use ARP to determine link layer address of gateway. I have it. My eth addr is 223.1.2.1 223.1.2.9 3. Give it to Link layer. 223.1.3.27 223.1.2.2 Who has 223.1.3.27? LAN 223.1.3.3 223.1.3.1 223.1.3.2 7

ARP Attacks When a machines sends an ARP request out, attackers can reply, falsely stating they own the address. But this starts a race condition with the real machine. Unfortunately, ARP will just accept replies without requests! Some OS s provide defenses to this Just send a spoofed reply message saying your MAC address owns a certain IP address. Repeat frequently so that cache doesn t timeout Messages are routed through you to sniff or modify. 8

ARP Spoofing - Countermeasures Publish MAC address of router/default gateway and trusted hosts to prevent ARP spoof. Statically define the IP to Ethernet address mapping. ( Publish is a poor term: it s not sent on the network) This prevents someone from fooling the host into sending network traffic to a host masquerading as the router or another host via an ARP spoof. Here s how you do it in linux: arp -s hostname 00:01:02:03:04:ab pub This is generally viewed as unworkable Can we limit who has access to the network? NAC, etc 9

Attacking IP Routing Types of routing: 1. dynamic intranet routing 2. static intranet routing 3. BGP routing 4. Ad hoc wireless network routing Attacker Attacking the routing can cause attacker-in-the middle eavesdropping (passive) attacker-in-the-middle modifications (active) Black holes in routing (DoS) Redirected flooding attacks (DoS) Server Client 10

Dynamic Routing An attacker can falsify routing updates send between routers. Attacker injects a RIP/eIGRP/OSPF update stating she has a path to a particular (unused) host. (any unicast protocol will do) All subsequent packets will be routed to her. She uses rsh to log into the machine. This is also a DOS attack and a traffic redirection attack (for sniffing or modification) Similar attacks exist for inter-domain routing protocols, like BGP. Defense: Requires secure routing protocols to defend against this attack. Routers should accept only authenticated updates. Requires key management and pre-configuration among routers. 11

Normal TCP Three-way Handshake Client SYN_flag, ISN=452 SYN_flag, ACK=453,ISN=34 ACK=35, data Server 12

Blind Spoofing Client Reset! SYN_flag, ACK=902,ISN=137 Server Attacker 13

Blind Spoofing Normal TCP operation from client, C, to server, S. C S: SYN_flag, ISN=x S C: SYN_flag, ISN=y, ACK=x+1 C S: ACK=y+1 Client and Server exchange data Blind spoofing. Find a client machine that s off. Guess the ISN of the server. Usually in regular increments. Use rsh to log in: X(as C) S: SYN_flag, ISN=a [spoofs C] S C: SYN_flag, ISN=b, ACK=a+1 X(as C) S: ACK=b+1 [spoofs C] X(as C) S: [ echo * * >> ~/.rhosts] [spoofs C] X(as C) S: RESET [spoofs C] X now rlogins from anywhere in the world. 14

Blind Spoofing If C is still up, then C will send a reset message to the server thinking it s an error. So, either L use a network address that is not in use. Do a denial of service (DoS) attack on a machine so it can t answer. Morris found that by impersonating a server port on C, and by flooding that port with apparent connection requests, he could generate queue overflows that would make it likely that the S C message would be lost. This is SYN flooding... 15

An aside: SYN Flooding DoS Pick a machine, any machine. Spoof packets to it (so you don t get caught) Each packet is a the first hand of the 3-way handshake of TCP: send a SYN packet. Send lots of SYN packets. Each SYN packet received causes a buffer to be allocated, and the limits of the listen()call to be reached. Morris invented SYN flooding just to launch a blind spoofing attack; later used by others against Yahoo! 16

TCP Session Stealing A.k.a. IP splicing, TCP Hijacking Read a detailed account A Simple Active Attack Against TCP by Laurent Joncheray. In Proceedings of 5th USENIX Unix Security Symposium. June 1995 Running code widely available. Defense: use ssh 17

Desynchronizing the client and server Often during normal TCP operation, the client and server become desynchronized. E.g., sometimes the client will send a retransmission that actually isn t needed by the server. The server will drop the incoming packets. The attack: during a quiet period, the attacker sends a large amount of null data. Specifically, the attacker sends as many bytes as there are in the sender s receive buffer. 18

The Attack If the client receives packets that are a window-of-packets ahead of what it is expecting, the client will drop the unlooked for data. (this is partly due to flow control) Null data desynchronization First, the attacker watches the session without interfering. During a quiet period, the attacker sends a large amount of null data. Specifically, the attacker sends as many bytes as there are in the sender s receive buffer. Each packet contains NOP bytes, normally used to pad the packets for the purposes of checksums. Now, when the client sends data, it is dropped by the server because it s lower than the server s window. The attacker does the same with the client. Attacker is now a woman/man/bot in the middle! 19

Attacker-in-the-Middle Data from the client can be re-packaged into a TCP packet and sent to the server, so there is no noticeable changes. Attacker can insert commands into the remote account. E.g. echo mymachine.umass.edu mitnick >.rhosts However, commands entered by the attacker might appear on a command line history. Defense: ssh connection, or IPsec 20