Network Security

Information Security
Unit 5:
Network Security
Slide Credits: Sunil Paudel
Protocol Encapsulation
Encapsulation
Process of wrapping data before sending to next protocol in the stack
Layering
Key concept is to separate function of each layer
SMTP/Telnet/FTP Packet
TCP Packet
Header
IP Packet
Header
Ethernet Packet
Header
Trailer
TCP/IP vs. OSI Model
OSI Model
A
TCP/IP Suite
B
TCP/IP Layers
7 Application
Layers
6 Presentation
WinSock
Application
FTP
NetBIOS
HTTP SMTP APPC
TFTP Telnet SNMP FTAM
5
Session
4
Transport
Host-to-Host
3
Network
Internet
2
Data Link
1
Physical
Network Access
TCP
UDP
DHCP
IP
ICMP
LLC
ARP
MAC
RARP
Physical Layer : Threats
Attacking:
 Once the physical layer is breached, it is very difficult
for other access control to prevent access.
 Copper wire can be attacked by cutting, tapping etc.
 Optical fiber cabling can be attacked by cutting, and tapping.
 Both wired and wireless technologies are susceptible to sniffing
(the collection of signals).
 Wireless can be attacked by jamming, interception, or other
forms of resource (e.g., bandwidth) exhaustion.
 Equipment can be attacked because of weak
authentication, by shutting down, or disturbing/degrading
the signal, by reprogramming, and by tapping.
Physical Layer : Control
 Controls over Physical wiring include:
 Shielding
 Using conduit to reduce the threat of cutting, or using
pressurized conduit to detect a breach.
 A Faraday cage (named for physicist Michael Faraday) is a
device used to block or contain radio and electromagnetic
signals. It generally consists of a thin sheet or mesh of
conducting material enclosing a particular space.

Wireless signal Controls include
 Encryption and
 Authentication.
 Equipment should be placed behind locked doors,
enclosed in cabinets, and shielded.
Data Link Layer : Threats
 An attacker with access to the link may carry out a number of attacks,
including those on:
 Confidentiality - An attacker may:
• Try to discover user identities by sniffing authentication traffic.
• Attempt to recover the pass-phrase by mounting an offline dictionary or
brute force attack.
• Be an employee who installs unapproved (rogue), open wireless access
points that do not conform to the security policy. Employee laptops may
also be configured to allow file sharing or unauthenticated sessions.
 Integrity - An attacker may try to:
• Modify or spoof packets
• Convince the peer to connect to an untrusted network by mounting a
man-in-the-middle attack.
• Disrupt the authentication negotiation in order to force the selection of a
weak authentication method.
 Availability - An attacker may:
• Launch denial of service attacks
Data Link Layer : Controls
 Control mechanism consists of:




Encryption
Authentication
Tunneling
RF Management
 Authentication, Tunneling and Radio Frequency
Management assume that:





Identities are managed properly.
Authentication tokens are created, issued, and revoked properly.
The wired infrastructure is already adequately secure.
Intrusion detection is in place.
Policies are in place and auditing takes place to ensure that policies
are complied with.
Wireless Encryption
 Encrypted transmission is a key building block in WLAN security.
 While it is not uncommon to use VPN connections over WLAN, the
WLAN should provide its own, native protection of content from
eavesdroppers.
 Characteristics of wireless encryption methods:
Network Layer : Threats
 When IP was conceived, there was no need for complex
authentication mechanisms and the security and encryption
technology that we now require was not even available.
 Today’s challenges are not the result of shortcomings in the
architecture, but of a system whose intended use has grown
beyond all original expectations.
 Key shortcomings in IP is its lack of authentication, allowing
spoofing-based attacks.
 IP also has to deal with shortcomings in implementations
that allow attacks based on deliberate misuse of the
protocol.
Internet Protocol (IP)
Allows transmission over long distances
Transfers messages between hosts on
physically different networks
Unreliable
Connectionless
Messages “packetized” into IP datagrams
User Datagram Protocol (UDP)
 Uses “ports” to define ultimate endpoint on machine
 Connectionless
 No retransmission
 No guarantee of delivery
 UDP User Datagram Format:
UDP Source Port
UDP Message Length
UDP Destination Port
UDP Checksum
Data
...
Transmission Control Protocol
(TCP)
 Reliable
 End-to-end connection
(“virtual circuit” )
• Opens a “pipe” between two hosts
• Both systems must agree to communicate
• Guaranteed delivery
TCP/UDP “Ports”
 Allow multiple connections to a machine
 “Well-known” services are assigned ports
 For example, mail is 25, WWW/HTTP is 80
 Usually corresponds to server
 Some ports are assigned dynamically
 “Client” ports
 Certain services
 Some ports are “reserved”
 Other well known services are defined in RFC 1700
LAN Security
 Local area networks facilitate the storage and retrieval of
programs and data used by a group of people. LAN
software and practices also need to provide for the
security of these programs and data.


LAN risk and issues
Dial-up access controls
14
Security Issues in the TCP/IP
Protocol Suite
 Eavesdropping
 IP address spoofing
 Source routing
 ICMP redirects
 TCP connection spoofing
 Connection hijacking
 Protocol spoofing
Eavesdropping
 Traditional Ethernet is a “broadcast” medium implemented with hubs
 All machines will “see” traffic destined for anywhere on the LAN
A
B
X
16
IP Source Address Spoofing
 Example  “A” (10.0.0.1) sends packet to “C” (10.0.0.3),
pretending to be “B” (10.0.0.2)
 Any machine
can make up
 But “B” receives replies
an IP address
Vers
Hlen
Service Type
Total Length
Identification
Time to Live
Flags
Protocol
Fragment Offset
Header Checksum
10.0.0.2
10.0.0.3
IP Options (if any)
Padding
Data
...
17
Source Routing
IP lets source specify exact route to destination
Destination will use same static route to reply
Attacker X can insert:
 Source address of Y
 Source route from X
Packet will go directly to X, not Y
Source routing can lead to IP spoofing
18
Connection Impersonation
Machine X
Machine B
SYN(A,SEQ) A
ACK(B,SEQ) B
ACK(A,SEQ) X
SYN(B,SEQ) B
SYN(C,SEQ) C
Machine A
Connection Hijacking
11
12
73
74
13
14
13
14
Machine A
X can eavesdrop
X has context
No need to predict sequence numbers
X can impersonate A effectively
If X’s packets get to B before
A’s, X will have a connection
Machine X
20
75
Machine B
Countermeasures
TCP connection spoofing
 Packet filters and firewalls
 Lack of trust between systems
Connection hijacking
 Session encryption
• (ssh, vpn, ssl, ipsec)
 Network-level authentication
 Periodic re-authentication of users
21
Protocol Spoofing
DNS (Domain Name System)
 Forge translation between names and addresses
 Resolvers blindly accept name mapping results from
name servers
NIS (Network Information Service)
 Anyone can be an NIS server
 Anyone can query NIS server
• Obtain NIS information (password files, host names)
• Can be done across networks
Protocol Spoofing
 SNMP (Simple Network Mgmt Protocol)
 Relies on “community strings” - simple passwords
 Defaults are “public” and “private” - often not changed
 Anyone can issue an SNMP command
 Routing Protocols (RIP, OSPF, IGRP, EIGRP, BGP4)
 Can be exploited to change the path over which communication
occurs
Major Internet Layer Protocol
 Address Resolution Protocol –
 Matches IP address to Mac address
 Reverse Address Resolution Protocol
 Mac to IP address
 Internet Control Message Protocol (ICMP)
 Is a management protocol
 FTP,TFTP, NFS, SMTP, LPD, X-windows, SNMP
Typical Network Architecture
e-mail,
DNS
Internal
Network
Firewall
www
Router
25
Internet Internet
What Is a Firewall?
A hardware/software system that securely
regulates communication between networks
Typical components of a strong perimeter
defense:





Packet filter
Proxy servers
Screening routers
Secure bastion hosts
Authentication server
26
What Firewalls Can Do
 Provide focused security
 Centralized administration, configuring, logging, auditing
 Focused points of control
 Provide a secure network perimeter
 Separate sensitive portions of the intranet
 Build Virtual Private Networks (VPNs)
 Extensions to the network
What Firewalls Can’t Do
Provide complete confidentiality
 Eavesdropping is still possible
 Firewalls are evolving in this area with VPNs
Provide integrity
 No assurances of traffic content
 Packets can still be tampered with along the way
 Virus checking only beginning to catch on
Prevent packet forgery
 No end-to-end controls
Principles of Firewalls
“That which is not explicitly denied, is allowed”
“That which is not explicitly allowed, is denied”
Firewall building blocks:
 Packet Filters
 Proxy Servers
 Screening Routers
 Secure Bastion Hosts
 Authentication Server
Packet Filter
Router-based or host-based
Access control rules are generally specified by:
 Interface
 Direction
 IP source/destination address
 TCP/UDP source/destination port
 Protocol
 Customized filters
Packet Filter
“telnet mail.COMP.com”
mail.COMP.com
192.193.249.8
shell.COMP.com
163.39.250.195
31
Router-Based Packet Filters
Pros:
 Inexpensive - you need a router anyway
Cons:




Some well-known limitations (e.g., UDP, RPC)
No authentication
Inadequate logging
Difficult configuration
• Order matters
• Syntax is complicated
Network Address Translation
Some sites use unregistered IP addresses
Want to hide bogus addresses and use real
ones
Solution - Network Address Translation
 Described in RFCs 1597 and 1918
There are three ways to translate
 Single External Address
 One-to-one mapping
 Dynamically Allocated Address
Proxy Servers
Internet
Internal Network
External
Router
Bastion Host
Proxy Servers
 Modified server software acts as user “proxy”
 May require modification of client software
 User connects to proxy software but doesn’t access firewall
operating system
 User interacts with proxy; proxy interacts with server
 User and server may not know proxy exists
 Session continues transparently after initial connection
 Generally application specific
Firewall Trends - Doing More
 Firewalls are incorporating more and more technologies
(like UTMS)




Web servers, mail servers, and DNS
Virus checking
Authentication
Encryption
 Increases usefulness
 Increases complexity
 Complexity can be the enemy of security
40
Bastion Host
Machine that is visible to the outside world
 Potential target for attacks
Securing bastion host
 Monitor closely
 Disable all unnecessary services
 Remove other programs (compilers, interpreters,
etc.)
 Turn off “IP forwarding”
 Protect existing services with wrappers
 Use static routes
41
Secure Configuration of Routers
Access should be limited
 Attach a terminal
 Limit access to a few sites (internally)
User/password combination
 Not supported by most routers
Authentication
 TACACS
Routing
 Don’t accept RIP updates
 Static route to service provider
 Turn off source routing
42
 Firewall Security Systems
 Examples of firewall implementations
 Screened-host firewall
 Dual-homed firewall
 Demilitarized zone (DMZ)
 Firewall Security Systems
 Firewall Platforms
 Using hardware or software
 appliances versus normal servers
43
Network Infrastructure Security
 Firewall Security Systems
 Firewall issues
 A false sense of security
 The circumvention of firewall
 Misconfigured firewalls
 What constitutes a firewall
 Monitoring activities may not occur on a regular basis
 Firewall policies
44
Architectures
#1 Bare Bones
 Just A Router with Access Control Lists
 Very Scaled down
 Acceptable, if you are able to control the security on all
hosts of internal network
Internal
Network
Router
45
Internet
Bare Bones Architecture
All your eggs are in the router basket
If the router fails, or if a new attack is devised,
you are vulnerable
Not a fine-level of control, logging, management
Not realistic for significantly sized user base
46
#2 Router and Host Based
Firewall
 Recommend that filtering be done at both router
and firewall
• Extra management, but it’s worth it
Internal
Network
Firewall
Router
47
Internet
Router and Host Firewall
Architecture
Concern about where to put servers
 WWW, DNS, e-mail
Locate them on firewall
 Concerns! If one of the services has a vulnerability,
compromise of the entire firewall is possible
 Add a DMZ could help alleviate concern
48
#3 Router and Host Based
with DMZ
 Add a DeMilitarized Zone (DMZ) for additional services
 DMZ aka “perimeter network”
e-mail,
DNS
Internal
Network
Firewall
www
Router
49
Internet Internet
Router & Host with DMZ
 Keep filtering at both router and firewall
 Concern - if one of the servers on the DMZ fails, other
servers can be taken over
 Attacker grabs the www server and installs a sniffer
 Attacker gets passwords for all other machines
 To minimize this possibility:
 Use a switching hub on the DMZ
 Use encryption where possible
 Another concern - outside systems only protected by router
50
#4 Tri-homed Firewall Host
 Variation of # 3:
 Tri-homed firewall
– All logging, suspicious activity
detection, etc. of the firewall is
available
e-mail,
DNS
www
Internet
Internal
Network
Router
Firewall
51
Tri-homed Firewall Host
Provides greater protection of DMZ servers
 Firewall’s resources can protect and log
 Can control at a greater level of detail all accesses to
servers on DMZ
Single point to administer protection
Single point of failure
52
Accessing Internal Hosts from
the Internet
 Giving access to the public or semi-public to databases
inside the corporation
 Over the Internet!
 Potential for cost-savings is large
 On-Line banking, trading, and Insurance applications
 For any of the following approaches, use encrypted
session (SSL) for transport across Internet
53
Accessing Internal Hosts from
the Internet
 Approach A - Replicate
www DB
Customer
DB
Internet
Firewall
Router
 Somewhat secure, but non-interactive
 Providing update access may be required
54
Internal
Network
Accessing Internal Hosts from
the Internet


Approach B
Use database Replication
www DB
Customer
DB
Internet
Firewall
Router
– Be careful punching holes through the firewall
– Encrypt if possible
– Use switching hub on DMZ
55
Internal
Network
Accessing Internal Hosts from
the Internet
Approach C
www
Customer
Internet
DB
Router
Firewall
Internal
Network
 Very Bad - This bypasses the firewall
 Web server provides potential exposure
network
to the internal
Accessing Internal Hosts from
the Internet
 Approach D
www
Customer
DB
Internet
Router
Firewall
Internal
Network
 WWW server accesses database by going through firewall
 Safer than A, with respect to confidentiality because firewall can more
tightly control access
 Concerns about snooping and hijacking
Firewall Protocol Policy
 Maintain “protocol policy” - identify what is permitted
and what is not
 Easy to update/maintain lists
 Some connections allowed with
security in place:
 Strong authentication
 Access control
 Encryption
 This should be reflected in policy
Firewall Comparison
PROS
CONS
Packet
Filters
• Application Independent
• High Performance
• Scalable
• Low Security
• No Protection Above
Network Layer
ApplicationProxy
Gateways
• Good Security
• Fully Aware of Application
Layer
• Poor Performance
• Limited Application Support
• Poor Scalability
• Good Security
• High Performance
• Scalable
• Fully Aware of Application
Layer
• Extensible
• More Expensive
Stateful
Inspection
59
Sample Protocol Policy
Service
FTP IN
Policy
Justification
Allowed to DMZ server
Public documents need to be available
Allowed using strong
authentication to
specific destinations
Remote users and business partners need
to access information, applications
Telnet
OUT
Allowed by all full-time
employees
Users need to access external information
FTP OUT
Allowed to all users
Users need to access external information
HTTP IN
Allowed to DMZ server
Public documents need to be available
HTTP OUT
Allowed to all users
Users need to access external information
Telnet IN
Remote Management of
Firewalls
Many firewalls support secured remote
management
Or use some form of strong authentication
 One-time passwords
 Cryptographic authentication
SSH (Secure Shell)
 Allows remote login to machine from specific hosts
 All traffic encrypted
 Knowledge of key is necessary to connect
Remote Access Security
Management
 Dialup
 DSL,ISDN, Wireless computing and Cable modems
 Securing Enterprise & Telecommuting Remote
Connectivity
 Securing external connectivity using SSL, VPN and SSH
 Remote Access Authentication systems (TACACS, RADIUS
etc.)
 Authentication Security protocols (PAP), CHAP etc.
 Remote User Management Issues
 User support and inventory magement
Methods of Remote Access
Terminal emulation - single window connects to
remote system
 Such as vt100, other terminal windows
Remote control - direct connection to “captive”
remote host
 Such as pcAnywhere, Citrix, etc.
Remote node - places remote system on local
network
 Such as NT/RAS, PPP, NetWare Connect, VPN,
PPTP
63
Remote Access Architectures
 Local modems - used for remote control or terminal
emulation
 Discouraged - difficult to control and monitor
 Modem pools - provide centralized dial-in access
 Easy to add security/authentication mechanisms
 Dial on demand routing
 Common with ISDN access
 Only connects when traffic is detected
 Access servers
 Centralized access point - similar to a
firewall or router
64
Remote Access Security
 Dialback
 Local authentication
 Authentication servers
 Password authentication
 One-time passwords/tokens
 Authentication protocols




PPP authentication protocols (PAP, CHAP)
PPTP / L2TP
IPSec
Authentication protocols (TACACS, RADIUS, TACACS+)
65
Other Access Methods
 Cable Modems
 Digital Subsciber Loop (DSL)
 Both provide high bandwidth to home users
• “Always on”
• Leads to increased targeting of home systems
• Also enables widespread attacks
 Personal IDS / Firewall systems
• Provide localized protection from remote packets
 Use a secure VPN for remote access
66
IPSec Security Architecture
 Detailed in RFCs 2411
 Two parts:
• Authentication Header (AH)
• Encapsulated Security Payload (ESP)
 Security Parameters Index (SPI)
• Security “associations”
• Pre-negotiated keys, algorithms, Initialization
Vectors (IVs), etc.
VPN Connectivity Models
Lan-2-Lan
Computer
Resource
Laser printer
VPN
Tun
Corporate Network
nel
Computer
Resource
INTERNET
VPN Tunnel
Application
Server
Laser printer
Remote Access
e
Tunn
VPN
Computer
Resource
Laser printer
Computer
Resource
B-2-B
l
Computer
Resource
VPN Benefits & Needs
 VPN is a communication method to leverage the
flexibility and cost advantage of the internet.
 A VPN allows an enterprise to reduce its dependencies
on expensive, leased-line networks and troublesome
remote-access solutions, by establishing virtual
connections across shared-IP networks.
 Internet Service Providers benefit from VPNs by
offering multi-tiered VPN services to their customers.
VPN Connectivity Models (Cont)
Connectivity
Model
Trust
Business
Application
Requirements
Lan-2-Lan/
Intranet
Trusted
Branch to HQ
Transparency
Performance
Availability
Remote
Access
Trusted/
Not-trusted
Telecommuters Connectivity
and mobile
employees
B-2-B/
Extranet
Not-trusted
B-2-B/
Partners
Security
Minimum
Impact on
environment
VPN Types
Firewall-to-Firewall

Data is encrypted when it leaves Firewall #1 and crosses the Internet

The data is authenticated and decrypted when it reaches Firewall #2.
Firewall
Module
#2
Firewall
Module
#1
Payroll
Not Encrypted
PRIVATE
Encrypted
PUBLIC
Not Encrypted
PRIVATE
Sales
VPN Types
Client-to-Firewall
Firewall or Gateway
With Encryption module
Client with
Encryption package installed
Connectivity Fundamentals
 VPN connectivity models rely on creating a Secure
Virtual Tunnel between the access points and the
enterprise networks.
 Tunneling is a protocol that encapsulates various
communication protocols in an IP envelop in order to
fulfill secure communications requirements.
 Most of the current implemented Tunneling protocols
are in layer 2 (Data Link), Layer 3 ( Network) and Layer
5 (Session) of the OSI model.
Point-2-Point Tunneling Protocol
• PPTP is a tunneling protocol that encapsulates network protocol datagrams within
an IP tunnel. This means that any network equipment that treats IP will be able to
route this protocol.
Dial-up/Remote Access
RAS/PPTP enabled
ISP
Resource
INTERNET
E N C R Y P T E D
• Revolves around Remote Access Services -RAS- for windows (i.e. Network must support
a RAS PPTP enabled server and network equipment that support PPTP).
74
IP Security Protocol (IPSec)
An IETF sponsored protocol that addresses the lack of
security in the existing IP infrastructure.
 All devices must share a common key

LAN-2-LAN
INTERNET
E N C R Y P T E D
• Works with the existing IP infrastructure via encapsulation.
• It secures a packet of data by packaging it inside another packet that is then
sent over the Internet.
IPSec Modes
Transport Mode – protects only the payload
portion of sent IP packet (I.e. not the header)
Tunnel Mode – protects the entire header and
payload of the packet
76
VPN Assessment
 Security Considerations.
 Scalability Considerations.
 Support & Management Considerations.
 Cost Considerations.
Security Considerations
 Several machines are NOT under control of the
corporation (e.g. Internet routers, ISP access box and
client workstation).
 Security gateways (firewall, routers) that are on the
boundary between internal segment and external
segment.
 Internal segments that contain fixed hosts and other
routers.
 An external segment (Internet) that carries all types of
traffic.
Scalability Considerations
 With the explosion of the Internet, there is a demand
increase for a VPN infrastructure that can grow rapidly.
 The VPN selected must be able to quickly, and in a cost
effective manner, support large scale proliferation of users.
 Solutions must be scalable from the perspective of
performance, availability, manageability and security.
Support & Management
Considerations
 A VPN solution must be
• easy to use for end users
• centrally operated
• transparent to the user (minimal level of sophistication,
plug and play, support popular platforms, etc.)
• able to take minimum time and effort to modify
business applications to support solution
• able to support Information Security & Audit
requirements
• interoperable with marketplace authentication and
encryption solutions
Cost Considerations
 The objective of a VPN implementation is to increase
connectivity and performance while reducing cost
 Infrastructure Cost
•
•
•
•
•
•
•
•
Network/ Support/ Administration support
Interoperability (routers & firewalls)
Internet Service Providers (ISP)
Security
–Scalability
Business Application Cost
Desktop Client Support (installation, help desk, security..)
Application support
Retrofitting to legacy systems