3 Telecom+Network Part2
3 Telecom+Network Part2
CISSP Common Body of Knowledge Review by Alfred Ouyang is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA.
Question:
-3-
Question:
-4-
Topics
VPN NAS
-5-
Security Operations
DEFENSE-IN-DEPTH
OSI Reference Model Internet Protocol Suite Information Assurance Technical Framework (IATF) Defense Information Infrastructure (DII) & Security Mechanisms
Application
NFS FTP, Telnet, SMTP, HTTP, SNMP etc. Defending the Computing Environment
Technical Countermeasures
Presentation
XDR
Session
Transport
TCP
Domain Controller + Active Directory Service + DIICOE APM (+ Directory Services + X.509-based PKI/KMI/ CA) Firewall + Network-based IDS + Switchs
Network
Routing Protocols
IP
Routers + KGs
Physical Sec.
Physical
-6-
Topics
Telecommunications & Network Security Domain Part 2 Security Countermeasures and Controls
Physical Layer Data-Link Layer IP Network Layer Transport Layer Application Layer
OSI Reference Model TCP/IP Protocol Architecture
Memorization
Application
Presentation
Application Layer
Session
Transport
VPN NAS
Network
Data-Link
Physical
-7-
Application
Presentation
Application Layer
Session
Transport
Network
Data-Link
Light
LAN: Infrared WAN: LASER (medium: fiber, air)
Physical
-8-
Transport Media
-9-
Transport Media
Transient. Disturbance of power traveling across transport medium Attenuation. Loss of signal strength over distance
- 10 -
- 11 -
Network Equipment
Enable service password-encryption on all routers. Use enable secret command and not with the enable password command Each router shall have different enable and user password Access routers only from secured or trusted server or console Reconfigure the connect, telnet, rlogin, show ip access-lists, and show logging command to privilege level 15 (secret) Add Warning Banner
Questions:
Why household microwave oven may interfere with your Wi-Fi (IEEE 802.11b/g)?
- 13 -
Answers:
Why household microwave oven may interfere with your Wi-Fi (IEEE 802.11b/g)?
The microwave oven operates in 2.45GHz and Wi-Fi operates in 2.4GHz
- 14 -
Topics
Telecommunications & Network Security Domain Part 2 Security Countermeasures and Controls
Physical Layer Data-Link Layer IP Network Layer Transport Layer Application Layer
Memorization
OSI Reference Model TCP/IP Protocol Architecture
Application
Presentation
Application Layer
Session
Transport
VPN NAS
Network
Data-Link
Physical
- 15 -
Data-Link Layer
MAC (LAN & WAN) LLC (LAN)
OSI Reference Model TCP/IP Protocol Architecture Application
Presentation
Application Layer
Session
Transport
Network
Data-Link
Physical
- 16 -
Confidentiality and Integrity of Data-Link Layer SLIP (Serial Line Internet Protocol) PPP (Point-to-Point Protocol) L2TP (Layer 2 Tunnel Protocol) Link Encryption (i.e. Link / Bulk Encryptor) : ISDN, Frame Relay, ATM RF:
LAN: WEP (Wired Equivalent Privacy), EAP (Extensible Authentication Protocol), IEEE 802.1X WAN: AN/PSC-5 Radio (w/ embedded encryption for SATCOM, DAMA, LOS communications), TADIL-J (Link-16) (w/ embedded encryption for LOS communications)
- 17 -
SLIP (Serial Line Internet Protocol) is a packet framing protocol that encapsulates IP packets on a serial line Runs over variety of network media:
LAN: Ethernet, Token Ring WAN: X.25, Satellite links, and serial lines
- 18 -
PPP (Point-to-Point Protocol) is a encapsulation mechanism for transporting multi-protocol packets across Layer 2 point-to-point links. (RFC 1661)
ISDN, Frame Relay, ATM, etc.
Security features:
PAP (Password Authentication Protocol) CHAP (Challenge Handshake Authentication Protocol) EAP (Extensible Authentication Protocol)
- 19 -
CHAP (Challenge Handshake Authentication Protocol) (RFC 1994, replaces RFC 1334)
Protection against playback attack by using 3-way handshake:
1. After link established, authenticator sends a challenge message to the peer 2. Peer response with a value calculated using a one-way hash 3. Authenticator calculate the expected hash value and match against the response
CHAP requires that the secret key be available in plaintext form. But the secret key is NOT send over the link
- 20 -
EAP (Extensible Authentication Protocol) (RFC 2284) supports multiple authentication mechanisms:
MD5-Challenge One-Time Password (OTP) Generic Token Card
- 21 -
L2TP (Layer 2 Tunnel Protocol) (RFC 2661) extends the PPP model by allowing the L2 and PPP endpoints to reside on different devices (e.g. workstation to router) interconnected by a packetswitched network
PPP Frames L2TP Data Message L2TP Data Channel (unreliable) L2TP Control Message L2TP Control Channel (reliable)
- 22 -
Mitigation:
IPsec over 802.11 IEEE 802.11i and IEEE 802.1X
Reference: http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy - 23 -
IEEE 802.1X
Reference: http://standards.ieee.org/getieee802/download/802.1X-2004.pdf.
- 24 -
IEEE 802.11i
Client Workstation (STA) AP sends a single use random numeric value (Nonce) to STA ANonce
Uses IEEE 802.1X (i.e. EAP) for authentication. Uses 4-way handshake. Uses AES-based CCMP (Counter-mode Cipherblock-chaining Message authentication code Protocol).
STA returns a single use nonce along with Message Integrity Code (MIC) SNonce + MIC
AP returns a Group Temporal Key (GTK) along with MIC to STA GTK + MIC STA send an acknowledgement to AP ACK
AP constructs a PTK*
* As soon as the PTK is obtained it is divided into 3 separate keys: EAP-KCK (Extended Authentication Protocol-Key Confirmation Key) EAP-KEK (Key Encryption Key) TK (Temporal Key) The key used to encrypt the wireless traffic.
Reference: - Q&A, Wi-Fi Protected Access, WPA2 and IEEE 802.11i, Cisco Systems - http://en.wikipedia.org/wiki/IEEE_802.11i
- 25 -
ARP (Address Resolution Protocol) maps MAC addresses (physical addresses) to IP addresses (logical addresses) RARP (Reverse ARP), opposite of ARP, maps IP addresses to MAC addresses Preserving integrity of ARP table is the key to security of switching topology.
- 26 -
- 28 -
Questions:
Why Point-to-point protocol (PPP) is better than Serial Line Internet Protocol (SLIP)?
Both Challenge handshake authentication protocol (CHAP) and Extensible authentication protocol (EAP) uses 3-way handshake. What is the advantage using EAP instead of CHAP?
- 29 -
Answers:
Why Point-to-point protocol (PPP) is better than Serial Line Internet Protocol (SLIP)?
PPP supports multiple internetworking protocols in a session SLIP has no security feature
Both Challenge handshake authentication protocol (CHAP) and Extensible authentication protocol (EAP) uses 3-way handshake. What is the advantage using EAP instead of CHAP?
EAP supports multiple authentication mechanisms: MD5, One-time password (OTP), and Token card.
- 30 -
Questions:
What is the size of the shared static symmetric key for 128-bit Wired Equivalent Privacy (WEP)?
- 31 -
Answers:
What is the size of the shared static symmetric key for 128-bit Wired Equivalent Privacy (WEP)?
104-bit. 24-bit of Initialization vector (IV)
Topics
Telecommunications & Network Security Domain Part 2 Security Countermeasures and Controls
Physical Layer Data-Link Layer IP Network Layer Transport Layer Application Layer
OSI Reference Model TCP/IP Protocol Architecture
Memorization
Application
Presentation
Application Layer
Session
Transport
VPN NAS
Network
Data-Link
Physical
- 33 -
Logical Addressing (IP address) Controls: ICMP, ARP, RARP Routing: Static, Dynamic Routing Protocols:
Interior Gateway Protocols (IGPs)
Distance Vector Routing Protocols Link State Routing Protocols
Application
Presentation
Application Layer
Session
Transport
Network
Data-Link
Physical
- 34 -
NAT (Network Address Translation) is a method of connecting multiple computers to the Internet (or any other IP network) using one IP address. The increased use of NAT comes from several factors: Shortage of IP addresses Security needs Ease and flexibility of network administration RFC 1918 reserves the following private IP addresses for NAT Class A: 10.0.0.0 10.255.255.255 Class B: 172.16.0.0 172.31.255.255 Class C: 192.168.0.0 192.168.255.255
Reference: http://www.ietf.org/rfc/rfc1918.txt - 35 -
VIP (Virtual IP Address) is a method that maps a virtual internetworking entity into many computing hosts. One-to-Many:
Used for Load-Balance / Sharing Used limit exposure of multiple IP addresses or multiple network I/Fs. (one-to-many)
Many-to-one:
One network I/F to many IP addresses. Used for Application sharing
- 36 -
Preserving integrity of route table is the key to security of routing topology. Static routing is the most secure routing configuration. However, scalability is a major drawback.
Static Route Table, no automatic updates.
Dynamic routing is scalable, but need to establish security policy to preserve integrity of route table
Automatic updates. Need to set thresholds. Authenticate neighbors and peers.
- 37 -
Dynamic Routing
There are two types of routing protocols: Interior Gateway Protocols (IGPs)
Routing Information Protocols (RIP) Interior Gateway Routing Protocol (IGRP) Enhanced IGRP (EIGRP, Cisco proprietary) Open Shortest Path First (OSPF) Intermediate System to Intermediate System (IS-IS)
- 38 -
Router uses distance vector routing protocols mathematically compare routes using some measurement of distance (or # of hops) and send all or a portion of route table in a routing update message at regular intervals to each of neighbor routers.
RIP (Routing Information Protocol) IGRP (Interior Gateway Routing Protocol) EIGRP (Enhanced IGRP, Cisco proprietary)
Security issues:
Integrity of routing tables: Automatic distribution of route table updates. Operational stability: The routing updates create chainreaction of route table recalculations to every neighbor routers.
Reference: Routing TCP/IP Volume I, by J. Doyle, et. al., Cisco Press - 39 -
To preserve integrity of route table: Use MD-5 authentication between neighbor routers.
Do not use RIPv1, because it does not support MD-5 authentication.
- 40 -
Router uses link-state routing protocols sends only link-state advertisements (LSAs) to each of its neighbor routers.
OSPF (Open Shortest Path First) IS-IS (Integrated intermediate system-to-intermediate system)
Security issues:
Integrity of routing tables: Automatic distribution of LSAs. Operational stability: After the adjacencies are established, the router may begin sending out LSAs. the LSAs create chain-reaction of recalculations of route paths to every neighbor routers (i.e. Link-state Flooding).
- 41 -
To preserve integrity of route table: Use MD-5 authentication between neighbor routers. To improve operational stability of routers running link-state IGPs:
Set sequence number for each link-state advertisement (LSA). The sequence numbers are stored along with the LSAs, so when a router receives the same LSA that is already in the database and the sequence number is the same, the received information is discarded.
- 42 -
Exterior gateway protocols are design for routing between multiple AS (Autonomous Systems).
EGP (Exterior Gateway Protocol). BGP (Border Gateway Protocol). BGP is THE routing protocol for Internet. BGP peers exchange full routing information when a new peer is introduced, then send only updates for route change. BGP is a path vector routing protocol, because the router does its own path calculation, and advertises only the optimal path to a destination network.
Security issues:
Integrity of routing tables: Automatic distribution of route table updates. Operational stability: The router running BGP is vulnerable to route-flap. Where a unstable routing path to an unreachable network may cause dynamic updates to all peering routers and this impacts performance of entire Internet!
- 43 -
To preserve integrity of route table: Use MD-5 authentication between peering routers. To preserve operational stability of edge routers running BGP:
Enable BGP route-flap damping on all edge routers. For example: Prefix length: /24 /19 /16 Suppress time: 3hr. 45-60min. <30min. Set ACL to deny all Bogon IP addresses. For Edge routers peering on Internet.
Note: Bogon IP addresses are the un-used or not been assigned IP addresses on the Internet. The list can be obtained at http://www.cymru.com/Documents/bogon-list.html.
- 44 -
Packet-filtering Firewall
Router ACLs = Packet-filtering firewall Firewall Policy: Deny by default, Permit by exception.
Understand the data-flow (i.e. source, destination, protocols, and routing methods), so the security engineer knows how to apply IP filtering. Knows the specific inbound and outbound I/Fs Disable all un-necessary protocols & services.
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Network
Data-Link
Data-Link
Data-Link
Physical
Physical
Physical
Source
Destination
- 45 -
Packet-filtering Firewall
Use distribute-list <ACL> out to control outbound routing information. Use distribute-list <ACL> in to control inbound routing information. Global Filtering:
1. Create ACLs that defines what network information is allowed in/out. 2. Configure distribute-list in the appropriate direction under the routers routing protocol configuration.
Application
Presentation
Session
Transport
Network
Data-Link
Per-interface Filtering:
Apply distribute-list <ACL> <in/out> to a <specific interface>
Physical
- 46 -
- 47 -
Time synchronization
Use multiple time sources. Use NTP for all Layer 3 equipment to synchronize their time. Use NTP authentication between clients, servers, and peers to ensure that time is synchronized to approved servers only.
Event Logging
Configure key ACLs to record access violations. Example: Anti-spoofing violations, VTY access attempts, Router filter violations, ICMP, HTTP, SNMPetc.
- 48 -
Questions:
What are the two primary security issues associated with the use of dynamic routing protocols?
What is the difference between Interior gateway protocols (IGPs) and Exterior gateway protocols (EGPs)?
- 49 -
Answers:
What are the two primary security issues associated with the use of dynamic routing protocols?
Integrity of routing tables Operational stability
What is the difference between Interior gateway protocols (IGPs) and Exterior gateway protocols (EGPs)?
IGPs are used within autonomous systems. EGPs are used between autonomous systems
- 50 -
Topics
Telecommunications & Network Security Domain Part 2 Security Countermeasures and Controls
Physical Layer Data-Link Layer IP Network Layer Transport Layer Application Layer
Memorization
OSI Reference Model TCP/IP Protocol Architecture
Application
Presentation
Application Layer
Session
Transport
VPN NAS
Network
Data-Link
Physical
- 51 -
Firewalls
Proxy firewall
It supports selected IP protocols (I.e. DNS, Finger, FTP, HTTP, LDAP, NNTP, SMTP, Telnet). For multicast protocols (PIM, IGMPetc) must be TUNNEL through the firewall
- 52 -
Firewalls
- 53 -
Packet-filtering firewalls
Router ACLs ~ Packet-filter firewall Firewall Policy: Deny by default, Permit by exception
Understand the data-flow (i.e. source, destination, protocols, and routing methods), so the security engineer knows how to apply IP filtering Knows the specific inbound and outbound I/Fs Disable all un-necessary protocols & services
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Network
Data-Link
Data-Link
Data-Link
Physical
Physical
Physical
Source
Destination
- 54 -
Proxy firewalls
Do not allow any direct connections between internal and external computing hosts Able to analyze application commands inside the payload (datagram) Supports user-level authentications. Able to keep a comprehensive logs of traffic and specific user activities
Presentation
Presentation
Application
Application
Application
Presentation
Session
Session
Session
Transport
Transport
Transport
Network
Network
Network
Data-Link
Data-Link
Data-Link
Physical
Physical
Physical
Source
Firewall
Destination
- 55 -
Stateful inspection firewalls Supports all TCP/IP-based services, including UDP (by some) Inspects TCP/IP packets and keep track of states of each packets. Low overhead and high throughput Allows direct TCP/IP sessions between internal computing hosts and external clients Offers no user authentication
Application
Application
Application
Presentation
Presentation
Presentation
Session
Session
Stateful Inspection
Session
Transport
Transport
Transport
Network
Network
Network
Data-Link
Data-Link
Data-Link
Physical
Physical
Physical
Source
Firewall
Destination
- 56 -
Firewall Policy
In principal, firewall performs three actions: Accept: where the firewall passes the IP packets through the firewall as matched by the specific rule Deny: where the firewall drops the IP packets when not matched by the specific rule and return an error message to the source system. (log entries are generated) Discard: where the firewall drops the IP packets, and not return an error message to the source system. (i.e., Like a black hole)
Application
Presentation
Session
Transport
Network
Data-Link
Physical
- 57 -
`
VPN or dedicated circuit
DMZ External DNS Business Specific VLAN External DNS Business Specific VLAN
DMZ
FTP Srvr.
Web Srvrs
Web Srvrs
FTP Srvr.
Primary
Backup
- 58 -
- 59 -
N-IDS (and Host-IDS) use knowledge-based (a.k.a. signature-based) methodology to detect intrusions
Uses a database of known attacks and vulnerabilities called signatures Only as good as the last signature update Can be difficult to tune false positives, acceptable behavior.
- 60 -
Listening I/F
Listening I/F
N-IDS Sensor
N-IDS Sensor
Reporting I/F
Reporting I/F
- 61 -
N-IPS Exterior Firewalls Multi-Service Switches Content Switch for load balacing
DMZ
DMZ
Primary
Backup
- 62 -
Questions:
- 63 -
Answers:
- 64 -
Questions:
If 3 is a switch, 5 is a N-IDS, and 6 is a computing platform. What does one have to do to the switch ports to 5 and 6?
- 65 -
Answers:
Firewall
If 3 is a switch, 5 is a N-IDS, and 6 is a computing platform. What does one have to do to the switch ports to 5 and 6?
Provision a port span
- 66 -
Topics
Telecommunications & Network Security Domain Part 2 Security Countermeasures and Controls
Physical Layer Data-Link Layer IP Network Layer Transport Layer Application Layer
Memorization
OSI Reference Model TCP/IP Protocol Architecture
Application
Presentation
Application Layer
Session
Transport
VPN NAS
Network
Data-Link
Physical
- 67 -
S-HTTP (Secure HTTP) (RFC 2660) is an experimental protocol designed for use in conjunction with HTTP
S-HTTP is a Message-oriented secure communication protocol
- 68 -
Secure Electronic Transaction (SET) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by MasterCard, Visa, Microsoft, Netscape, and others A user is given an electronic wallet (digital certificate) and a transaction is conducted and verified using a combination of digital certificates and digital signature among the purchaser, a merchant, and the purchaser's bank in a way that ensures privacy and confidentiality SET uses Netscape's SSL, Microsoft's STT (Secure Transaction Technology), and Terisa System's SHTTP SET uses some but not all aspects of a PKI
- 69 -
Domain Name System (DNS) translates hostnames to IP addresses. BIND (Berkeley Internet Name Domain) is the most commonly used DNS server on the Internet
DNS server. It supplies domain name to IP address conversion DNS resolver. When it can not resolve DNS request. It send a DNS query to another known DNS server
Countermeasures:
Forbid recursive queries to prevent spoofing Setup multiple DNS servers (External, internal) Keep your BIND up to date
Reference: http://en.wikipedia.org/wiki/Domain_name_system - 70 -
Install Host-IDS
Enforce CM and Change Control
Install Anti-Virus Disable all processes/services not in use Enforce strict access control
Network I/Fs OS / Applications
- 71 -
Security Services
Availability Confidentiality, Integrity Access Control Access Control, Integrity Access Control Integrity Access Control, Integrity Access Control, Integrity Confidentiality: Access Control, Identification, Authentication, Integrity, NonRepudiation
Security Services Spectrum: Access Control Confidentiality Integrity Availability Non-Repudiation
Reference & Guidelines: Information Assurance Technical Framework (IATF), Release 3.1 DoDI 8500.2 Information Assurance (IA) Implementation
- 72 -
Topics
VPN NAS
- 73 -
Tunneling is used to package/encapsulate packets and transport them INSIDE of another packets from one internetworking domain to another. VPN enables the shared internetworking resources to be used as private or dedicated circuits. (i.e. Access Control)
Types of VPN:
LAN-to-LAN Remote Client Access Client-less Remote Access
Example:
PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) MPLS (Multi-Protocol Label Switching) GRE (Generic Routing Encapsulation) IPsec (Internet Protocol Security) SSH (Secure Shell)
- 74 -
PPTP (Point-to-Point Tunneling Protocol) operates at Layer 2. (RFC 2637) A protocol which allows PPP (Point-to-Point Protocol) to be tunneled through an IP-based network.
PPTP packages data within PPP packets, then encapsulates the PPP packets within IP packets for transmission through an Internet-based VPN tunnel
PPTP supports data encryption and compression PPTP also uses a form of GRE to get data to and from its final destination
- 75 -
L2TP (Layer 2 Tunneling Protocol) operates at Layer 2. (RFC 2661) A protocol which allows PPP (Point-to-Point Protocol) to be tunneled through an IP-based network. It is a hybrid of PPTP and L2F can support multiple protocols Often combined with IPsec for security
- 76 -
MPLS (Multi-Protocol Label Switching) (a.k.a. Tag Switching), operates at Layer 2 a data-carrying mechanism, operating at data-link layer. It was designed to provide a unified datacarrying service for both circuit-based clients and packet-switching clients which provide a datagram service model It can be used to carry many different kinds of traffic, including both voice telephone traffic and IP packets. It does not rely on encapsulation and encryption to maintain high-level of security
- 77 -
GRE (Generic Routing Encapsulation) (RFC 2784) GRE is a Network Layer tunnel that allows any network protocol to be transmitted over a network running some other protocol such as:
Transmitting multicast datagrams over a unicast network. Transmitting non-TCP/IP routing protocols such as: AppleTalk, IPX, etc.
GRE can be a security issue (i.e. packet-filtering), so recommended that GRE be created in front of a firewall.
- 78 -
IPsec (1/6)
Application Layer
Security Association (SA)
IPSP
IPSP
Transport Layer
- 79 -
IPsec (2/6)
0 1
4 Next Header
12
16
20
24 Reserved
28
31
Payload Length
Words
2 3 4
- 80 -
IPsec (3/6)
Words
3 4 5
- 81 -
IPsec (4/6)
IPsec Architecture
AH Protocol
Key Management
Reference: http://tools.ietf.org/html/rfc2411
- 82 -
IPsec (5/6)
Tunnel mode:
The payload and header are protected (i.e., encryption & hash) Used for network-to-network, host-to-network, and host-to-host communications
Reference: http://en.wikipedia.org/wiki/IPsec - 83 -
IPsec... (6/6)
Host-to-Network
L2TP/IPsec in established Layer 2 tunnel via VPN client on remote client (i.e. your laptop or PC) IPsec tunnel between VPN client to security gateway
Host-to-Host
IPsec in transport mode or tunnel mode between two computing machines
Reference: http://en.wikipedia.org/wiki/IPsec http://en.wikipedia.org/wiki/L2TP http://www.cisco.com/en/US/tech/tk583/tk372/tech_configuration_examples_list.html http://www.cisco.com/univercd/cc/td/doc/product/software/ios120/12cgcr/secur_c/scprt4/scipsec.htm RFC 4301, Security Architecture for the Internet Protocol (http://tools.ietf.org/html/rfc4301) - 84 -
SSL (Secure Sockets Layer) Runs between the Application Layer (HTTP, SMTP, NNTP, etc) and Transport Layer (TCP) Supports client/servers negotiation of cryptographic algorithms:
Public-key cryptography: RSA, DiffieHellman, DSA or Fortezza Symmetric ciphers: RC2, IDEA, DES, 3DES or AES One-way hash functions: MD5 or SHA
Client
client hello
Server
server hello certificate server key exchange Request for clients certificate server hello done
certificate client key exchange certificate verification change cipher specification finished
Application Data...
Reference: http://wp.netscape.com/eng/ssl3/
- 85 -
Remote Client
Client Application (with embedded support for SSL/TLS) SSLv3/TLSv1
Server
Server Application (with embedded support for SSL/TLS) SSLv3/TLSv1
TCP/IP stack
TCP/IP stack
Data-Link Layer SSL/TLS encrypted payload using e.g. 2048 RSA, 3DES
Data-Link Layer
TCP/IP stack
TCP/IP stack
TCP/IP stack
TCP/IP stack
Data-Link Layer Proprietary transparent SSL/ TLS encrypted VPN tunnel using e.g. 2048 RSA, 3DES
Data-Link Layer
- 86 -
TLS 1.0 (Transport Layer Security) (RFC 2246) is defined base on SSL 3.0 TLS and SSL protocols are not interchangeable. (during a client/server session) The selection of TLS or SSL is negotiated between client/server at the hello.
Client
client hello
Server
server hello certificate server key exchange Request for clients certificate server hello done
certificate client key exchange certificate verification change cipher specification finished
Application Data...
Reference: http://www.ietf.org/rfc/rfc2246.txt
- 87 -
SSH (Secure Shell) is a secure replacement for the r* programs (rlogin, rsh, rcp, rexec, etc.) SSH uses public-key to authenticate users, and supports variety of cryptography algorithms: Blowfish, 3DES, IDEA, etc. SSH protects:
Host
Application Client
SSH Client
Eavesdropping of data transmitted over the network. Manipulation of data at intermediate elements in the network (e.g. routers). IP address spoofing where an attack hosts pretends to be a trusted host by sending packets with the source address of the trusted host. DNS spoofing of trusted host names/IP addresses. IP source routing
Application Server
SSH Server
Reference: http://www.ietf.org/rfc/rfc4251.txt
- 88 -
Questions:
- 89 -
Answers:
- 90 -
Questions:
- 91 -
Answers:
- 92 -
Topics
VPN NAS
- 93 -
NAS (Network Access Server) provides centralized Access Control of AAA (Authentication, Authorization, Accounting) services
A distributed (client/server) security model Authenticated transactions Flexible authentication mechanisms
Versions of NAS:
TACACS+ (Terminal Access Controller Access Control System) (Cisco proprietary). RADIUS (Remote Authentication Dial-In User Service) (Open source). DIAMETER.
- 94 -
TACACS (Terminal Access Controller Access Control System) (RFC 1492) TACACS+ is a significant improvement of old version. Unlike RADIUS, TACACS is stateful, TCP-based. TACACS is not supported by all vendors. In addition, TACACS protocol does not support authentication proxies, which means user authentication can only be stored centrally in a Cisco ACS. (However, Cisco ACS does support authentication proxy to both UNIX and Windows servers.) Unlike RADIUS, TACACS encrypts entire TCP packet, not just the authentication messages.
Reference: http://www.cisco.com/warp/public/480/10.html http://www.cisco.com/en/US/products/sw/secursw/ps1018/products_tech_note09186a0080094eb0.shtml - 95 -
RADIUS (Remote Authentication Dial-In User Service) RADIUS Server stores UserID, Password, and Authorization parameter (ACL) centrally. Unlike TACACS, RADIUS does support authentication proxies, so the user authentication information or schema is scale able. Uses CHAP (Challenge Handshake Authentication Protocol) to authenticate user. Client/Server uses shared secret stored in configuration file for encryption and decryption of CHAP, but not data packets. Uses a single UDP packet design for speed and performance.
Reference: RADIUS: http://www.ietf.org/rfc/rfc3579.txt DIAMETER: http://www.ietf.org/rfc/rfc4005.txt
- 96 -
Diameter (RFC 3588) is designed based on RADIUS that supports Mobile-IP services. Diameter protocol supports NAS, Mobile-IP, ROAMOPS (Roaming Operations), and EAP. Operates peer-to-peer (instead of client/server), supports multiple authentication proxy and broker models. Diameter supports both IPsec (mandatory) and TLS (optional).
- 97 -
Validation Time
- 98 -
- 99 -
Please provide examples of network-based perimeter security controls and provide rationale:
For boundary protection at the edge? For DMZ? For enclave protection at the core (/ interior)?
- 100 -