Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail



Similar documents
Insecure network services

Cryptography. Recall from last lecture. [Symmetric] Encryption. How Cryptography Helps. One-time pad. Idea: Computational security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

CS5008: Internet Computing

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Internet Worms, Firewalls, and Intrusion Detection Systems

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Chapter 8 Security Pt 2

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Security vulnerabilities in the Internet and possible solutions

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

CS 4803 Computer and Network Security

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Introduction to Computer Security

Cornerstones of Security

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Announcements. Lab 2 now on web site

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewalls, Tunnels, and Network Intrusion Detection

Network Access Security. Lesson 10

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Network Security Part II: Standards

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Network Security. Lecture 3

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Topics in Network Security

Firewalls, IDS and IPS

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls and Network Defence

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Network Security Fundamentals

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Introduction to Computer Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Chapter 7 Transport-Level Security

Lecture 10: Communications Security

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Outline (Network Security Challenge)

Security Technology: Firewalls and VPNs

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Computer and Network Security Exercise no. 4

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls. Chapter 3

Firewall Design Principles Firewall Characteristics Types of Firewalls

OS/390 Firewall Technology Overview

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Computer Networks. Secure Systems

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

CMPT 471 Networking II

Solution of Exercise Sheet 5

Networking for Caribbean Development

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewalls (IPTABLES)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Chapter 9 Firewalls and Intrusion Prevention Systems

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Chapter 32 Internet Security

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

How To Protect Your Network From Attack From Outside From Inside And Outside

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Protocol Rollback and Network Security

Computer Security: Principles and Practice

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Cryptography and network security

OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Transport Level Security

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Basic network security threats

INTRODUCTION TO FIREWALL SECURITY

A S B

Computer Security DD2395

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

Linux Network Security

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

Transcription:

Insecure network services NFS (port 2049) - Read/write entire FS as any non-root user given a dir. handle - Many OSes make handles easy to guess Portmap (port 111) - Relays RPC requests, making them seem to come from localhost - E.g., old versions would relay NFS mount requests FTP (port 21) server connects back to client - Client can specify third machine for bounce attack YP/NIS serves password file, other info A host of services have histories of vulnerabilities - DNS (53), rlogin (513), rsh (514), NTP (123), lpd (515),... - Many on by default compromised before OS fully installed Firewalls Separate local area net from Internet - Prevent bad guys from interacting w. insecure services - Perimeter-based security Two separable topics Arrangement of firewall and routers - Separate internal LAN from external Internet - Wall off subnetwork within an organization - Intermediate zone between firewall and rest of network (called demilitarized zone or DMZ ) - Personal firewall on end-user machine How the firewall processes data - Packet filtering router - Application-level gateway Proxy for protocols such as ftp, smtp, http, etc. - Personal firewall E.g., disallow telnet connection from email client Packet filtering Filter packets using transport layer information - Examine IP, and ICMP/TCP/UDP header of each packet - IP Source, Destination address - Protocol - TCP/UDP source & destination ports - TCP flags - ICMP message type Example: coping with vulnerability in lpd - Block any TCP packets with destination port 515 - Outsiders shouldn t be printing from outside net anyway Example: blocking forgeries Example: blocking outgoing mail Should block incoming packets from your net Egress filtering: block forged outgoing packets At Stanford, all mail goes out through main servers - Result of Sircam worm... infected & mailed users files around as attachments - Could have disclosed sensitive information - Mail servers now scan attachments for worms - Also reduces threat of Stanford being used to spam How to enforce? Block outgoing TCP packets - If destination port is 25 (SMTP mail protocol) - And if source IP address is not a Stanford mail server

Blocking by default Fragmentation Often don t know what people run on their machines In many environments better to be safe: - Block all incoming TCP connections - Explicitly allow incoming connections to particular hosts E.g., port 80 on web server, port 25 on mail server,... - But still must allow outgoing TCP connections (users will revolt if they can t surf the web) How to enforce? - Recall all but first packet in TCP flow has ACK flag set - Block incoming TCP packets w. SYN flag but not ACK flag Recall IP fragmentation Why might this complicate firewalls? Abnormal fragmentation Fragmentation attack Say firewall requires ACK in incoming TCP segments First packet - Fragmentation Offset = 0. - DF (Don t fragment) = 0, MF (More Fragments) = 1 - Set ACK bit Second packet - Frag. Offset = 1: (overwrites all but 8 bytes of first pkt) - DF (Don t fragment) = 0, MF (More Fragments) = 0 - Set SYN and clear ACK in flags Host reassembles packets into valid SYN segment Blocking UDP traffic Some sites block most UDP traffic - UDP sometimes viewed as more dangerous - Easier to spoof source address - Used by insecure LAN protocols such as NFS Often more convenient to block only incoming UDP - E.g., allow internal machines to query external NTP servers - Don t let external actors to exploit bugs in local NTP software (unless client specifically contacts bad/spoofed server) Must keep state in firewall like a NAT - Remember local IP, local port, remote IP, remote port for each outgoing UDP packet - Allow incoming packets that match saved flow - Time out flows that have not been recently used Network intrusion detection Many holes exploited over the network - Buffer overruns in servers - Servers with bad implementations ( login -froot, telnet w. LD LIBRARY PATH) Want to detect people exploiting such bugs Want to detect activities performed by people who ve penetrated server - Setting up IRC bot - Running particular commands, etc. Do so with network-based intrusion-detection system (IDS)

Detect in network monitor Attach IDS machine to DMZ Sniff all packets in and out of the network Process packets to identify possible intruders - Secret, per-network rules identify possible attacks - Is it a good idea to keep rules secret? React to any threats - Alert administrators of problems in real time - Switch on logging to enable later analysis of potential attack - Take action against attackers E.g., filter all packets from host that seems to be attacking Deep packet inspection May want to block attacks as they are happening - E.g., Stanford can detect your broken software, but can t force you to patch it - But if your PC joins a botnet, it s Stanford s problem - Best to block attacks as they happen Many attacks require particular fingerprints - E.g., attack packet may include copy of a worm Can amass database of bad fingerprints to block - Manually or semi-manually widely done, but slow to adapt to new attacks - Heuristics can catch attacks as they happen... But if such countermeasures were uniformly and widely deployed, attackers would defeat them Virtual Private Networks (VPNs) Internet VPN VPN gateway (traffic is gateway cryptographically protected) IPsec ESP protocol IPsec ESP packet MACed data Encrypted data ver packet len prot=esp 1 2 3 4 5 6 West branch East branch ver Cleartext IP packet packet len protocol hdr checksum source IP address dest IP address security param index (SPI) sequence number What if firewall must protect more than one office Extend perimeter w. Virtual Private Networks (VPNs) Two popular VPN protocols: - IPsec encrypts at IP layer (bad for NATs) - OpenVPN tunnels IP inside SSL (inside TCP) source IP address dest IP address payload 32bits padding packet pad len integrity tag 32bits next hdr ESP high-level view ESP details Encapsulates one IP packet inside another Each endpoint has Security Association DB (SAD) - Is a table of Security Associations (SAs) - Each SA has 32-bit Security Parameters Index (SPI) - Also, source/destination IP addresses, crypto algorithm, keys Packets processed based on SPI, src/dest IP address - Usually have one SA for each direction betw. two points SAD managed semi-manually - Manually set key - Or negotiate it using IKE protocol Must avoid replays - Keep counter for 64-bit sequence number - Receiver must accept some packets out of order (e.g., up to 32) - Only low 32 bits of sequence number in actual packet (would be bad if you lost 4 billion packets) Support for traffic flow confidentiality (TFC) - Can pad packets to fixed length - Can send dummy packets Support for encryption without MAC... Bummer! - Rationale: App might be SSL, which has MAC-only mode - But then attacker can mess with destination address!

SSL/TLS [RFC 5246] Overview SSL offers security for HTTP protocol - That s what the padlock means in your web browser Authentication of server to client Optional authentication of client to server - Incompatibly implemented in different browsers - CA infrastructure not in widespread use Confidentiality of communications Integrity protection of communications Ciphersuites: Negotiating ciphers Server authentication algorithm (RSA, DSS) Key exchange algorithm (RSA, DHE) Symmetric cipher for confidentiality (RC4, DES, AES) MAC (HMAC-MD5, HMAC-SHA) Overview of SSL Handshake Compute keys Client Supported ciphers, client random Chosen cipher, server random, certificate Encrypted pre master secret MAC of handshake messages MAC of handshake messages Server Compute keys SSL Handshake Client and server negotiate on cipher selection Cooperatively establish session keys Use session keys for secure communication Details - Multiple messages per stage - Get an idea of protocol in action: openssl s_client -connect www.paypal.com:443 From SSL and TLS by Eric Rescorla Establishing a Session Key Server and client both contribute randomness. Client sends server a pre-master secret encrypted with server s public key Use randomness and pre-master secret to create session keys: - Client MAC - Server MAC - Client Write - Server Write - Client IV - Server IV Establishing a Session Key Client random Pre master secret Server random Master secret Key block Server IV Client IV Server write key Client write key Server MAC key Client MAC key From SSL and TLS by Eric Rescorla

Session Resumption Problem: Public key crypto expensive New TCP connection, reuse master secret. - Avoids unnecessary public key cryptography. Combines cached master secret with new randomness to generate new session keys. Works even when the client IP changes (servers cache on session ID, clients cache on server hostname). What does CA mean by certificate? That a public key belongs to someone authorized to represent a hostname? That a public key belongs to someone who is associated in some way with a hostname? That a public key belongs to someone who has lots of paper trails associated to a company related to a hostname? That the CA has no liability, or $100,000, or $250,00? >100-page Certification Practice Statement (CPS) So many CAs... CA Convenience vs. Security How convenient is a Verisign certificate? - Need fee + cooperation from Stanford IT to get one here - Good for credit cards, but shuts out many other people How trustworthy is a Verisign certificate? - In mid-march 2001, VeriSign, Inc., advised Microsoft that on January 29 and 30, 2001, it issued two... [fraudulent] certificates.... The common name assigned to both certificates is Microsoft Corporation. VeriSign has revoked the certificates.... However... it is not possible for any browser s CRL-checking mechanism to locate and use the VeriSign CRL. Microsoft Security Bulletin MS01-017 2-minute stretch