Overview. Packet filter



Similar documents
Security Type of attacks Firewalls Protocols Packet filter

ΕΠΛ 674: Εργαστήριο 5 Firewalls

CS5008: Internet Computing

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Firewall Firewall August, 2003

Firewalls (IPTABLES)

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Networking Basics and Network Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls. Chapter 3

CMPT 471 Networking II

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Lab Objectives & Turn In

General Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

1. Firewall Configuration

From Network Security To Content Filtering

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Firewalls, IDS and IPS

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Cisco Configuring Commonly Used IP ACLs

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Chapter 8 Security Pt 2

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

10 Configuring Packet Filtering and Routing Rules

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

How To Understand A Firewall

Chapter 7. Firewalls

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Linux MDS Firewall Supplement

12. Firewalls Content

Cryptography and network security

Network Security and Firewall 1

CIT 480: Securing Computer Systems. Firewalls

Chapter 8 Network Security

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Linux Network Security

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Multi-Homing Dual WAN Firewall Router

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Introduction to Network Security Lab 1 - Wireshark

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

How to protect your home/office network?

PROFESSIONAL SECURITY SYSTEMS

Networking for Caribbean Development

Basics of Internet Security

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

CIT 480: Securing Computer Systems. Firewalls

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.

Lecture 23: Firewalls

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Protecting and controlling Virtual LANs by Linux router-firewall

Security Technology White Paper

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Security Technology: Firewalls and VPNs

co Characterizing and Tracing Packet Floods Using Cisco R

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Network Defense Tools

Network Security: Introduction

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Firewalls, Tunnels, and Network Intrusion Detection

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Lab VI Capturing and monitoring the network traffic

Attack Lab: Attacks on TCP/IP Protocols

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Overview. Protocols. VPN and Firewalls

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Norton Personal Firewall for Macintosh

CISCO IOS NETWORK SECURITY (IINS)

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

CSCI Firewalls and Packet Filtering

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Guideline for setting up a functional VPN

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Implementing Secure Converged Wide Area Networks (ISCW)

Load Balance Router R258V

Firewalls Netasq. Security Management by NETASQ

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

Transcription:

Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel

Overview Security Type of attacks Firewalls Protocols Packet filter

Security Security means, protect information (during and after processing) against impairment and loss of confidentiality, integrity and availability. Given by: increasing of availability and storage strategies: Backup, Redundant Systems, Raid-Systems protection against unauthorized access: Firewalls, encryption algorithm, etc.

Security requirements Confidentiality protects confidential information against unintended access. Integrity guarantees that t the data are authentic ti and undamaged. Availability ensures that authorized persons are able to access data and communication services at every time.

CIA Triad

Threats Active attacks Intrusion of unauthorized persons Impairment and disturbance of networking Data modification Passive Attacks Password listening i Data listening Nt Network traffic analysis

Aggresssor Who is aggressive Competitors Hacker/Cracker k (Beginners, Professional) Professional Hacker (industrial espionage) Colleagues (approx. 70% of all attacks come from Colleagues) NSA

Examples By use of so called trojans, hackers got access to passwords of Microsoft employees. So the hackers were able to stole the newest source code release of a Microsoft operation system. Yahoo was a victim of a Denial-Of-Service Attack. The Website of yahoo was more than 3 hours not available. Sony Corp. said hackers may have gained access to personal information (like name, address, country, e- mail address, birthdate, etc.) on the 75 million users of its PlayStation Network.

Kind of attacks Password attack Data attack Malicious Code Scanner Spoofing DOS-Attack

Password attacks 3 Methods Guess on base of known or speculated user accounts (names). Brute force attack on a password file by use of special applications, i.e. Crack. Listening on connections in order to find out user names and their passwords.

Data attack by sniffers Data attack are done by use of so called sniffers. Sniffer respectively network monitoring i tools are applications which are originally used in order to monitor and analyse network traffic. Well known tool = WIRESHARK

Promiscous mode Usually a computer receives via its network interface card only these packages which are destined for itself. But it is possible to get access to all traffic. This could be done when the network interface card is running in a special mode, the promiscuous mode. Extremely dangerous: A sniffer is installed on a central machine which h is accessed by many clients

Malicious Code Malicious Code is unauthorized code (could be in a legal application) doing jobs which are unknown by the user and usually undesired. Examples: Viruses Trojan horses Worms

Scanner Scanner are security tools which are originally used in order to find out some weak points of a system. There are system scanner and network scanner. System scanner: scans its local host in order to find out security gaps or configuration problems. Network scanner: scans computer connected to a network. They check services and ports und deliver therefore information about possible security gaps.

Spoofing Spoofing is used in order to outwit authentication and identification mechanism which are basing on trustworthy addresses and/or hostnames. a distinction is drawn between: IP-Spoofing denotes the corruption of the sender-ip address. DNS-Spoofing means the corruption of entries in DNS-servers.

Dos-Attacks DOS = Denial of Service. Most common attack (simple and fast). Goal is to knock out the attacked system or at least to interfere the access for valid users. Not easy to intercept. Next step: DDOS = Distributed Denial of Service: Several machines start an attack at the same time. Example: TCP-SYN Flooding, PING, MAIL-Bombing

Firewall Basics A Firewall is a hurdle between to nets which must be cleared in order to allow communication from one net to the other. Each communication between the nets must be done over the firewall. Internet private, local net Firewall

Firewall definition A firewall consists of one or more hard- and software components. Afi firewall connects two networks in a way that t all traffic between the networks must pass the firewall. A Firewall implements a security strategy, which realises access restrictions and if required attack recording. A Firewall let only pass those data packages which fulfil the security strategy.

What a firewall can do Restriction of traffic between two networks. Access only to special machines or services. Network monitoring and recording => protocols. Manipulation of network traffic by use of special (i.e. traffic limitation, IP-Address replacement, etc.).

What a firewall can t do Closing security gaps directly. Correction of configuration or installation ti mistakes. Find out viruses or Trojans. Making a network totally secure.

Firewall-concepts Packet filter Filtering on network layer (IP-Addresses and Ports). Proxy-Gateways Circuit Level Gateway Filtering i on transport t layer. Application Level Gateway Filtering on application level (protocol dependent). Graphical Firewall All internet t applications running outside of the protected t network. Only graphical information are delivered

Proxy-Gateway y Proxy=lock keeper A Proxy firewall act as a server for the client and as a client for the server. HTTP Gateway FTP Gateway Internet private, local Net Firewall with application dependent Proxy-Services

Proxy Gateway Offers application specific services for clients. Control and observe functions for a specific application. Example: Avoid that a client uses ftp in order to transfer data in (via put command) to an external ftp-server. Access to special HTTP-Sites is forbidden In opposite to packet filters the connection is really interrupted. IP-Addresses of the internal net are invisible.

Protocols HTTP FTP SMTP Application DNS SNMP RIP Transport TCP UDP Internet t IP Phys. Network Ethernet Token-Ring ATM

IP It carries the transport protocols TCP and UDP. It builds IP-Packages out of the data which have to be transmitted. It adds additional information, the IP-Header. It contains source and destination address.

TCP TCP (Transmission Control Protocol) confirms every received data package. TCP repeats each data package until its receiving is confirmed. TCP is reliable 32 BIT

Port communication TCP/IP operates by IP-Addresses and Ports each IP-Adresse has 2 16 potential ports The ports below 1024 are standardized (standard ports), which are allocated to dedicated services, i.e.: 23 telnet 25 smtp 80 http 443 https 23 25 80 443....... 30000.

Packet filter Filtering of Data packages: Sender/Destination IP-Addresses Sender/ Destination -Ports (Services) Protocols (TCP,UDP, ICMP) Separate Filtering of incoming Packages (INPUT) und outgoing Packages (OUTPUT). Different rules for Input-Filter and Output-Filter. t List of rules are so called chains. A package is checked by one rule after the other until either one rule matches or the end of list is reached.

Packet filter (Policies) Every chain has a default setting for package treatment, the so called policies. The policies come into play after a data package were checked by all rules of a chain. If no rule matches the default policy applies. There are two different strategies: Deny every package. Only well defined kind of packages are allowed. (Better). Allow every package. Only well defined kind of packages are forbidden.

Packet filter (Reject, Drop) Packet filters have two different methods to handle a non accepted package. Rj Reject: The Package will be deleted d and an ICMP-Error message is delivered to the sender. Drop: The Package will be deleted. Drop is the better choice, because: less traffic, the package could be part of a attack, even an error message could be an useful information for an aggressor.

Filtering incoming packets Filtering according to Sender- IP There a some groups of IP-Addresses which could be generally dropped. For example: IP-Addresses of the own Subnet, etc. Filtering according to Destination-IP Only packages addressing the own network are accepted. Filtering according sender/destination Port We have to distinguish between requests of external clients to our own servers and incoming answers of external servers destined for local clients.

Stateful filtering Stateful Filtering means the capability to store the state and contextual information of a TCP connection. =>Dynamic packet filter analyse the state of an TCP- Connection. Connection request of client: SYN Acknowledgement of server: ACK-SYN Acknowledgement of client: ACK Further transfer (from both sides): ACK Packages (containing a ACK-Flag) from outside to inside are only accepted if a package from inside to outside (containing a SYN-Flag) was sent before.

Iptables Iptables (Packet filter under Linux) Three Chains: INPUT, OUTPUT, FORWARD. Routing decides if a package is delivered to the INPUT-Chain or to the FORWARD-Chain.

Input vs. Forward Chain Packages for the machine itself are checked at first by the INPUT-Chain. If the INPUT Chain accepts the packages it reaches the actual machine. Packets for foreign machines (in our local l protected net) are running through the FORWARD-Chain. If the packages is accepted it is delivered to the appropriated network interface.

Chains and routing Routing Drop Forward- Chain Input- Local Output- Chain Processes Chain Drop Drop

IP Tables some commands Delete rules iptables --flush Drop all packages iptables policy INPUT DROP iptables policy OUTPUT DROP iptables policy FORWARD DROP Reject incoming gpackages coming from the IP-Address of our own external interface iptables A input i eth0 s <myipadress> -j DROP

Our netlab firewall Server N incoming eth 0 eth 1 outgoing Switch N outgoing incoming Internet Firewall Client N

How can I protect my own PC Deactivate all services which are not required. Deinstall all programs which are not permanently used. Deinstall all programs with well known security gaps. (even when you need them). Inform yourself about security gaps and use updates. Install a virus scanner (Freeware: AntiVir). Install ore use your personal firewall