0% found this document useful (0 votes)
62 views28 pages

Network Security 1

Uploaded by

irshad hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views28 pages

Network Security 1

Uploaded by

irshad hussain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 28

Network Security

Asstt. Professor
Dr. Tauqeer Safdar
Outline
 Architecture
 Physical and link layer
 Network layer
 Transport layer
 Application layer: DNS, RPC, NFS
 Application layer: Routing
 Wireless networks
 More secure protocols: DNSSEC, IPSEC, IPv6
Why study computer security?
► (1) Computer security is fundamental to individual privacy.
► Many of us keep personal data on our accounts: emails,
bookmarks, coursework.
► Many of us use the network to send personal data or
retrieve personal data.
► Many remote computers keep personal data for us:
financial data and accounts, medical history.
► We want to protect these resources.
Why study computer security?
► (2) Our society is increasingly reliant on the proper operation of
networked computer systems, and integrity of their data.
 Financial and commercial operations, medical operations,
meteorological, government, social welfare, and so one. (not to
mention the Internet itself.)
► The protection of these systems is as vital as our dependence on the
services they provide.
► An understanding to their limitations is vital.
► Exploited systems have resulted in people’s deaths. (Unavailable
forecasts have caused a ship at sea to be lost.)
Network Security
► Most Computers require some kind of
information sharing.
► Common mode of information sharing with
other computers vary from Sneaker Nets to
High Speed Networks.
► In order to secure individual computers,
Network Security is the essential part.
Network Layer Vulnerabilities
►We'll discuss IPv4, although other protocols can be used at this level
►IP features
Network addresses
IP spoofing
Fragmentation
►IP Components:
ICMP
►Transport layer components dependent on IP:
UDP
TCP
IP Addresses
►Format "A.B.C.D" where each letter is a byte
►Class A network : A.0.0.0
Zeroes are used to indicate that any number could be in that position
►Class B network: A.B.0.0
►Class C network: A.B.C.0
►Broadcast addresses:
255.255.255.255
A.B.C.255
►Special case
0.0.0.0 and A.B.C.0 can be either treated as a broadcast or discarded
Other IP Addresses
► Multicast (class D)
 224.0.0.0 to 239.255.255.255
► Class E (experimental, reserved, i.e., wasted)
 240.0.0.0 to 254.255.255.255
Junctions
►Router (gateway)
Works at the network layer (e.g., IP)
Joins subnets
Tries to send packets on the best route
►Performs routing
►Firewall
Packet filter that enforces policies (through its filtering)
►Can be transparent and non-addressable
A firewall is not necessarily used as a router (might have only two
interfaces), but it may
A router is not necessarily a firewall
Some configurations have firewalls behind routers
Special Networks
►Private non-routable networks
192.168.0.0
172.16.0.0
10.0.0.0
►Loopback network
127.0.0.0
Typically only 127.0.0.1 is used
CIDR Addresses
►Classless Inter-Domain Routing
Classes A, B, C too rigid
Add flexibility on a bit level instead of byte level
►W.X.Y.Z/B
B is the number of bits that constitute the network
address
/8 is class A
/16 is class B
/24 is class C
IP Packet
►Source IP
►Destination IP
►Checksum
IP Spoofing
►Any station can send packets pretending to be from any IP address
►Replies will be routed to the appropriate subnet
Route asymmetry
So, attacker might not get replies if spoofing a host on a different subnet
►For some attacks this is not important
►Analogy
Nothing prevents you from physically mailing a letter with an invalid return address,
or someone else’s, or your own.
Likewise, packets can be inserted in the network with invalid or other IP addresses.
IP Spoofing with Amplification
►Use broadcasts pretending to originate from victim
►All replies go back to victim
►This may use any IP protocol (ICMP, TCP, UDP)
Any application or service that replies using these protocols
Famous attack: Smurf (using ICMP) DoS
►CERT® Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks
►Many others
►Smurf Amplifier Registry: http://www.powertech.no/smurf/
ICMP
►Internet Control Message Protocol (IP management)
►Error handling and debugging protocol
►Not authenticated!
►Encapsulated inside an IP header
►Message types:
40 assigned
255 possible
about two dozen in use
►References:
Network Intrusion Detection,
http://www.iana.org/assignments/icmp-parameters
Basic ICMP Message Types
►0 Echo Reply
►3 Destination Unreachable
►4 Source Quench
►5 Redirect
►8 Echo
►11 Time Exceeded
►12 Parameter Problem
►13 Timestamp
►14 Timestamp Reply
►15 Information Request
►16 Information Reply
ICMP Echo
►a.k.a.Ping
►Destination replies (using the "source IP" of the original message) with "echo reply"
►Data received in the echo message must be returned in the echo reply
►How can this be abused?
Scans and Recon
►If an attacker wants to map your network, the trivial way is
to ping all the IP addresses in your network...
►Therefore, if you allow pings, your network is exposed.
Smurf Attack
►Ping a broadcast address, with the (spoofed) IP of a victim as source
address
►All hosts on the network respond to the victim
►The victim is overwhelmed
►Keys: Amplification and IP spoofing
►Protocol vulnerability; implementation can be “patched” by violating the
protocol specification, to ignore pings to broadcast addresses
►ICMP echo just used for convenience
All ICMP messages can be abused this way
"Fraggle" is the equivalent, using UDP instead of ICMP
Defending Against IP spoofing
►Ingress filtering
Forbid inbound broadcasts from the internet into your networks
Forbid inbound packets from non-routable networks
►Egress filtering
Prevent stations in networks you control from spoofing IPs from
other networks by dropping their outbound packets
►Make your network a less attractive and useful target for attackers
that want to launch other attacks
►Be a good internet citizen (reputation is important)

Drop outbound broadcasts


References
►RFC 2267 - "Network Ingress Filtering:
Defeating Denial of Service Attacks which
Employ IP Source Address Spoofing".
Discussion
►What do you think of authentication mechanisms based on
IP addresses?
Examples:
►Tivoli Access Manager
►"FilterPlus" (Dundas)
►Apache .htaccess mechanism
►Web page tutorials
►Publishers (e.g., for university access)
►Games
►New Hampshire State Library
►TCP wrappers
Question
►Egress filtering is useful for:
a) stopping outbound IP spoofing
b) stopping inbound IP spoofing
c) preventing Smurf attacks
d) preventing ARP cache poisoning
e) all of the above
Answer
►Egress filtering prevents part of outbound IP
spoofing. A host can still spoof the IP
address of another host on the same network,
because it’s a valid IP address.
Other Ping Abuse
►Tribe, a.k.a. The "Tribe Flood Network" distributed denial of
service attack tool
►Use ICMP echo request and reply as a secret
communication channel to issue commands to infected
computers
Attackers reversed the normal usage of reply and request messages
►Reply messages used to issue commands and bypass firewalls
►http://staff.washington.edu/dittrich/misc/tfn.analysis
Why Do You Need Pings?
►To troubleshoot when something doesn’t work
►=> if everything works then you don’t need pings,
especially pings from outside your network...
►CAN-1999-0523 (under review)
ICMP echo (ping) is allowed from arbitrary hosts.
About These Slides
► You are free to copy, distribute, display, and perform the work; and to
make derivative works, under the following conditions.
 You must give the original author and other contributors credit
 The work will be used for personal or non-commercial educational uses
only, and not for commercial activities and purposes
 For any reuse or distribution, you must make clear to others the terms of
use for this work
 Derivative works must retain and be subject to the same conditions, and
contain a note identifying the new contributor(s) and date of modification
► Thanks to the support of Symantec Corporation
Questions

???????????????
???????????????
????

You might also like