08 Common Network Services: SE 4C03 Winter 2003
08 Common Network Services: SE 4C03 Winter 2003
Instructor: W. M. Farmer
1
Client-Server Model
• Servers provide services over a network
– Usually listen at a particular reserved TCP and/or
UDP port
– May participate in more than one TCP connection at
the same time
– Servers are often called daemons and are then given
a name that ends with d (e.g., httpd)
– A server may be organized as a group of processes or
threads
1. Communication protocol
3
Simple Mail Transport Protocol (SMTP)
• SMTP enables mail to be transferred between hosts
– SMTP servers listen at TCP port 25
– The source of mail delivered using SMTP may be
spoofed
4
Telnet
• Allows one to remotely log into a host
– Telnet servers listen at TCP port 23
– Telnet clients can connect to other TCP ports
5
File Transfer Protocol (FTP)
6
FTP Operation Modes
7
Anonymous FTP
• The user can log in as anonymous, guest, or ftp and does
not have to provide a password
9
Domain Name System (DNS)
• Purposes:
– Provides a hierarchical scheme for naming hosts and
collections of hosts
– Maps host names to IP addresses
– Maps IP addresses to host names
– Host names may be assigned aliases
– Stores information about hosts and collections of hosts
10
Domain Names
11
Domain Names (cont.)
• DNS may be used with any set of domain names but the
Internet’s DNS currently uses a set of official top-level
domain names of two kinds:
– Organizational domains (edu, com, gov, int, net, mil,
org)
– Country domains (e.g., ca, de, uk, and us)
12
DNS Security Concerns
• Authentication based on the domain name of the source
host alone is much weaker than authentication based on
the IP address alone
– Host names are easily spoofed
13
Rlogin and Rsh
• Allows one to remotely log into another host and
remotely execute a command, respectively, without
providing a password
– Useful for implementing universal login privileges
– Servers listen at TCP ports 513 and 514, respectively
14
Rlogin and Rsh Security Concerns
• Trust is transitive
– Access to one host gives access to all of its trusted
partners
– Attackers will try to deposit an appropriate entry into
/etc/hosts.equiv or some user’s .rhosts file
15
X Windows
16
X Windows Security Mechanisms
17
Secure Shell (SSH)
• SSH provides a secure remote shell
– Secure communication
– Strong authentication
– TCP forwarding
– Secure X communications
• Protects against:
– Source address, route, and DNS spoofing
– Password interception
– Session hijacking
– Disclosure and modification of transmitted data
20
RPC-Based Services
• Remote Procedure Call (RPC)
– Protocol is used by a variety of services
– There are more possible services than port numbers
– Works with either TCP or UDP
22
NFS Security Concerns
23
Web Service
• Web servers usually listen at TCP port 80, but may listen
at many other TCP ports (e.g., 81, 8000, 8080, 8888,
etc.)
24
Web Service Security Concerns
25
Network Time Protocol (NTP)
27