Insecure network services



Similar documents
Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

CS5008: Internet Computing

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Protocol Security Where?

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

21.4 Network Address Translation (NAT) NAT concept

IPsec Details 1 / 43. IPsec Details

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Chapter 8 Security Pt 2

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Firewalls. Ahmad Almulhem March 10, 2012

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Firewalls, Tunnels, and Network Intrusion Detection

Secure Sockets Layer

Introduction to Computer Security

Cornerstones of Security

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Solution of Exercise Sheet 5

Linux Network Security

Network Access Security. Lesson 10

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Topics in Network Security

Firewalls. Chapter 3

Firewalls, IDS and IPS

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Security vulnerabilities in the Internet and possible solutions

IPv6 Firewalls. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok. Last updated 17 th May 2016

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

ETSF10 Part 3 Lect 2

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

OS/390 Firewall Technology Overview

Chapter 7 Transport-Level Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Introduction to Computer Security

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Security Technology: Firewalls and VPNs

Proxy Server, Network Address Translator, Firewall. Proxy Server

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Network Security Part II: Standards

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Computer Networks. Secure Systems

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

CS 4803 Computer and Network Security

CMPT 471 Networking II

Firewall Design Principles Firewall Characteristics Types of Firewalls

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Firewalls (IPTABLES)

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Internet Protocol: IP packet headers. vendredi 18 octobre 13

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Network Security. Chapter 13. Internet Firewalls. Network Security (WS 07/08): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

FIREWALLS & CBAC. philip.heimer@hh.se

Chapter 9 Firewalls and Intrusion Prevention Systems

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

SSL VPN Technology White Paper

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Computer and Network Security Exercise no. 4

Network Security Fundamentals

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

General Network Security

Networking for Caribbean Development

Cryptography and network security

z/os Firewall Technology Overview

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Network Security - ISA 656 Application Firewalls

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

A S B

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

Cisco Secure PIX Firewall with Two Routers Configuration Example

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

How To Protect Your Network From Attack From Outside From Inside And Outside

Network Defense Tools

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Transcription:

NFS (port 2049) Insecure network services - Read/write entire FS as any non-root user given a dir. handle - Many OSes make handles easy to guess Portmap (port 111) - Relays RPC requests, making them seem to come from localhost - E.g., old versions would relay NFS mount requests FTP (port 21) server connects back to client - Client can specify third machine for bounce attack YP/NIS serves password file, other info A host of services have histories of vulnerabilities - DNS (53), rlogin (513), rsh (514), NTP (123), lpd (515),... - Many on by default compromised before OS fully installed

Firewalls Separate local area net from Internet - Prevent bad guys from interacting w. insecure services - Perimeter-based security

Two separable topics Arrangement of firewall and routers - Separate internal LAN from external Internet - Wall off subnetwork within an organization - Intermediate zone between firewall and rest of network (called demilitarized zone or DMZ ) - Personal firewall on end-user machine How the firewall processes data - Packet filtering router - Application-level gateway Proxy for protocols such as ftp, smtp, http, etc. - Personal firewall E.g., disallow telnet connection from email client

Packet filtering Filter packets using transport layer information - Examine IP, and ICMP/TCP/UDP header of each packet - IP Source, Destination address - Protocol - TCP/UDP source & destination ports - TCP flags - ICMP message type Example: coping with vulnerability in lpd - Block any TCP packets with destination port 515 - Outsiders shouldn t be printing from outside net anyway

Example: blocking forgeries Should block incoming packets from your net Egress filtering: block forged outgoing packets

Example: blocking outgoing mail At Stanford, all mail goes out through main servers - Result of Sircam worm... infected & mailed users files around as attachments - Could have disclosed sensitive information - Mail servers now scan attachments for worms - Also reduces threat of Stanford being used to spam How to enforce? Block outgoing TCP packets - If destination port is 25 (SMTP mail protocol) - And if source IP address is not a Stanford mail server

Blocking by default Often don t know what people run on their machines In many environments better to be safe: - Block all incoming TCP connections - Explicitly allow incoming connections to particular hosts E.g., port 80 on web server, port 25 on mail server,... - But still must allow outgoing TCP connections (users will revolt if they can t surf the web) How to enforce? - Recall all but first packet in TCP flow has ACK flag set - Block incoming TCP packets w. SYN flag but not ACK flag

Fragmentation Recall IP fragmentation Why might this complicate firewalls?

Abnormal fragmentation

Fragmentation attack Say firewall requires ACK in incoming TCP segments First packet - Fragmentation Offset = 0. - DF (Don t fragment) = 0, MF (More Fragments) = 1 - Set ACK bit Second packet - Frag. Offset = 1: (overwrites all but 8 bytes of first pkt) - DF (Don t fragment) = 0, MF (More Fragments) = 0 - Set SYN and clear ACK in flags Host reassembles packets into valid SYN segment

Blocking UDP traffic Some sites block most UDP traffic - UDP sometimes viewed as more dangerous - Easier to spoof source address - Used by insecure LAN protocols such as NFS Often more convenient to block only incoming UDP - E.g., allow internal machines to query external NTP servers - Don t let external actors to exploit bugs in local NTP software (unless client specifically contacts bad/spoofed server) Must keep state in firewall like a NAT - Remember local IP, local port, remote IP, remote port for each outgoing UDP packet - Allow incoming packets that match saved flow - Time out flows that have not been recently used

Network intrusion detection Many holes exploited over the network - Buffer overruns in servers - Servers with bad implementations ( login -froot, telnet w. LD LIBRARY PATH) Want to detect people exploiting such bugs Want to detect activities performed by people who ve penetrated server - Setting up IRC bot - Running particular commands, etc. Do so with network-based intrusion-detection system (IDS)

Detect in network monitor Attach IDS machine to DMZ Sniff all packets in and out of the network Process packets to identify possible intruders - Secret, per-network rules identify possible attacks - Is it a good idea to keep rules secret? React to any threats - Alert administrators of problems in real time - Switch on logging to enable later analysis of potential attack - Take action against attackers E.g., filter all packets from host that seems to be attacking

Deep packet inspection May want to block attacks as they are happening - E.g., Stanford can detect your broken software, but can t force you to patch it - But if your PC joins a botnet, it s Stanford s problem - Best to block attacks as they happen Many attacks require particular fingerprints - E.g., attack packet may include copy of a worm Can amass database of bad fingerprints to block - Manually or semi-manually widely done, but slow to adapt to new attacks - Heuristics can catch attacks as they happen... But if such countermeasures were uniformly and widely deployed, attackers would defeat them

Virtual Private Networks (VPNs) VPN gateway Internet (traffic is cryptographically protected) VPN gateway 1 2 3 4 5 6 West branch East branch What if firewall must protect more than one office Extend perimeter w. Virtual Private Networks (VPNs) Two popular VPN protocols: - IPsec encrypts at IP layer (bad for NATs) - OpenVPN tunnels IP inside SSL (inside TCP)

MACed data IPsec ESP protocol ver IPsec ESP packet packet len ver Encrypted data Cleartext IP packet packet len prot=esp source IP address dest IP address security param index (SPI) protocol hdr checksum sequence number source IP address dest IP address packet payload padding pad len next hdr integrity tag 32 bits 32 bits

ESP high-level view Encapsulates one IP packet inside another Each endpoint has Security Association DB (SAD) - Is a table of Security Associations (SAs) - Each SA has 32-bit Security Parameters Index (SPI) - Also, source/destination IP addresses, crypto algorithm, keys Packets processed based on SPI, src/dest IP address - Usually have one SA for each direction betw. two points SAD managed semi-manually - Manually set key - Or negotiate it using IKE protocol

Must avoid replays ESP details - Keep counter for 64-bit sequence number - Receiver must accept some packets out of order (e.g., up to 32) - Only low 32 bits of sequence number in actual packet (would be bad if you lost 4 billion packets) Support for traffic flow confidentiality (TFC) - Can pad packets to fixed length - Can send dummy packets Support for encryption without MAC... Bummer! - Rationale: App might be SSL, which has MAC-only mode - But then attacker can mess with destination address!

SSL/TLS [RFC 5246] Overview SSL offers security for HTTP protocol - That s what the padlock means in your web browser Authentication of server to client Optional authentication of client to server - Incompatibly implemented in different browsers - CA infrastructure not in widespread use Confidentiality of communications Integrity protection of communications

Ciphersuites: Negotiating ciphers Server authentication algorithm (RSA, DSS) Key exchange algorithm (RSA, DHE) Symmetric cipher for confidentiality (RC4, DES, AES) MAC (HMAC-MD5, HMAC-SHA)

Overview of SSL Handshake Client Server Supported ciphers, client random Chosen cipher, server random, certificate Encrypted pre master secret Compute keys Compute keys MAC of handshake messages MAC of handshake messages From SSL and TLS by Eric Rescorla

SSL Handshake Client and server negotiate on cipher selection Cooperatively establish session keys Use session keys for secure communication Details - Multiple messages per stage - Get an idea of protocol in action: openssl s_client -connect www.paypal.com:443

Establishing a Session Key Server and client both contribute randomness. Client sends server a pre-master secret encrypted with server s public key Use randomness and pre-master secret to create session keys: - Client MAC - Server MAC - Client Write - Server Write - Client IV - Server IV

Establishing a Session Key Client random Pre master secret Server random Master secret Key block Server IV Client IV Server write key Client write key Server MAC key Client MAC key From SSL and TLS by Eric Rescorla

Session Resumption Problem: Public key crypto expensive New TCP connection, reuse master secret. - Avoids unnecessary public key cryptography. Combines cached master secret with new randomness to generate new session keys. Works even when the client IP changes (servers cache on session ID, clients cache on server hostname).

What does CA mean by certificate? That a public key belongs to someone authorized to represent a hostname? That a public key belongs to someone who is associated in some way with a hostname? That a public key belongs to someone who has lots of paper trails associated to a company related to a hostname? That the CA has no liability, or $100,000, or $250,00? >100-page Certification Practice Statement (CPS)

So many CAs...

CA Convenience vs. Security How convenient is a Verisign certificate? - Need fee + cooperation from Stanford IT to get one here - Good for credit cards, but shuts out many other people How trustworthy is a Verisign certificate? - In mid-march 2001, VeriSign, Inc., advised Microsoft that on January 29 and 30, 2001, it issued two... [fraudulent] certificates.... The common name assigned to both certificates is Microsoft Corporation. VeriSign has revoked the certificates.... However... it is not possible for any browser s CRL-checking mechanism to locate and use the VeriSign CRL. Microsoft Security Bulletin MS01-017

2-minute stretch