11 - Implementing Secure Network Protocols
11 - Implementing Secure Network Protocols
Ahmed Sultan
Senior Technical Instructor
ahmedsultan.me/about
1
Outlines
Labs
Lab 16: Implementing Secure Network Addressing Services
Lab 17: Implementing a Virtual Private Network
Lab 18: Implementing a Secure SSH Server
• If a rogue DHCP server is set up, it can perform DoS (as client machines will
obtain an incorrect TCP/IP configuration) or be used to snoop network
information.
• DHCP starvation is a type of DoS attack where a rogue client repeatedly requests
new IP addresses using spoofed MAC addresses, with the aim of exhausting the IP
address pool.
• This makes it more likely that clients seeking an address lease will use the rogue
DHCP server.
• Enabling the DHCP snooping port security feature on a switch can mitigate rogue
DHCP attacks.
• Windows DHCP servers in an AD environment automatically log any traffic
detected from unauthorized DHCP servers.
• More generally, administration of the DHCP server itself must be carefully
controlled and the settings checked regularly.
• If an attacker compromises the DHCP server, he or she could point network
clients to rogue DNS servers and use that as a means to direct users to spoofed
websites.
• Another attack is to redirect traffic through the attacker's machine by changing
the default gateway, enabling the attacker to snoop on all network traffic.
• The Domain Name System (DNS) resolves fully qualified domain names (FQDNs)
to IP addresses.
• It uses a distributed database system that contains information on domains and
hosts within those domains.
• The information is distributed among many name servers, each of which holds
part of the database.
• The name servers work over port 53.
• Domain name resolution is a security-critical service and the target of many
attacks on both local network and the Internet.
• DNS POISONING
✓ DNS poisoning is an attack that compromises the process by which clients query name
servers to locate the IP address for a FQDN.
• There are several ways that a DNS poisoning attack can be perpetrated.
• The foundation of web technology is the Hyper Text Transfer Protocol (HTTP).
• HTTP enables clients (typically web browsers) to request resources from an HTTP server.
• A client connects to the HTTP server using an appropriate TCP port (the default is port
80) and submits a request for a resource, using a uniform resource locator (URL).
• The server acknowledges the request and responds with the data (or an error message).
• The response and request payload formats are defined in an HTTP header.
• The HTTP payload is usually used to serve HTML web pages, which are plaintext files with
coded tags (Hyper Text Markup Language) describing how the page should be formatted.
• A web browser can interpret the tags and display the text and other resources associated
with the page, such as binary picture or sound files linked to the HTML page.
• As with other early TCP/IP application protocols, HTTP communications are not
secured.
• Secure Sockets Layer (SSL) was developed by Netscape in the 1990s to address
the lack of security in HTTP.
• SSL proved very popular with the industry, and it was quickly adopted as a
standard named Transport Layer Security (TLS).
• It is typically used with HTTP (referred to as HTTPS or HTTP Secure) but can also
be used to secure other application protocols and as a virtual private networking
(VPN) solution.
• A File Transfer Protocol (FTP) server is typically configured with several public
directories, hosting files, and user accounts.
• Most HTTP servers also function as FTP servers, and FTP services, accounts, and
directories may be installed and enabled by default when you install a web server.
• FTP is more efficient compared to file attachments or HTTP file transfer, but has
no security mechanisms.
• All authentication and data transfer are communicated as plaintext, meaning that
credentials can easily be picked out of any intercepted FTP traffic.
• SSH FTP (SFTP) addresses the privacy and integrity issues of FTP by encrypting the
authentication and data transfer between client and server.
• In SFTP, a secure link is created between the client and server using Secure Shell
(SSH) over TCP port 22.
• Ordinary FTP commands and data transfer can then be sent over the secure link
without risk of eavesdropping or man-in-the-middle attacks.
• This solution requires an SSH server that supports SFTP and SFTP client software.
• Remote access means that the user's device does not make a direct cabled or
wireless connection to the network.
• The connection occurs over or through an intermediate network.
• Historically, remote access might have used analog modems connecting over the
telephone system or possibly a private link (a leased line).
• These days, most remote access is implemented as a virtual private network
(VPN), running over the Internet.
• Administering remote access involves essentially the same tasks as administering
the local network.
• Only authorized users should be allowed access to local network resources and
communication channels.
• Additional complexity comes about because it can be more difficult to ensure the
security of remote workstations and servers and there is greater opportunity for
remote logins to be exploited.
• With a remote access VPN, clients connect to a VPN gateway on the edge of the
private network.
• Another model for remote networking involves connecting to a host within the
local network over a remote administration protocol.
• A protocol such as Secure Shell (SSH) traditionally provides terminal access, and
there are many tools that can connect to a graphical desktop.
• A GUI remote administration tool sends screen and audio data from the remote
host to the client and transfers mouse and keyboard input from the client to the
remote host.
• Microsoft's Remote Desktop Protocol (RDP) can be used to access a physical
machine on a one-to-one basis.
• Secure Shell (SSH) is the principal means of obtaining secure remote access to a
command line terminal.
• The main uses of SSH are for remote administration and secure file transfer
(SFTP).
• There are numerous commercial and open source SSH products available for all
the major network operating system (NOS) platforms.
• The most widely used is OpenSSH (openssh.com).
• SSH servers are identified by a public/private key pair (the host key).
• A mapping of host names to public keys can be kept manually by each SSH client
or there are various enterprise software products designed for SSH host key
management.
Security+ (SY0-601) © netriders.academy 26
SECURE SHELL