Copyright © 2003 M. E. Kabay. All rights reserved.

Slides:



Advertisements
Similar presentations
1 Copyright © 2014 M. E. Kabay. All rights reserved. DATACOMM CSH6 Chapter 5 “Data Communications & Information Security” Raymond Panko.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Intermediate TCP/IP TCP Operation.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Lecture # 14 TCP/IP - UDP Computer Communication & Networks.
Chapter 7 – Transport Layer Protocols
Module A.  This is a module that some teachers will cover while others will not  This module is a refresher on networking concepts, which are important.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
Institute of Technology Sligo - Dept of Computing Semester 2 Chapter 9 The TCP/IP Protocol Suite Paul Flynn.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Gursharan Singh Tatla Transport Layer 16-May
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 12 Transmission Control Protocol (TCP) Basics.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
1 LAN Protocols (Week 3, Wednesday 9/10/2003) © Abdou Illia, Fall 2003.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
TCP/IP Transport and Application (Topic 6)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Internet 1) Internet basic concepts 2) The IP protocol stack 3) The IP datagram header (IPv4 and IPv6) 4) Addressing and routing 5) Example: downloading.
Cisco Networking Academy S2 C9 TCP/IP. ensure communication across any set of interconnected networks Stack components such as protocols to support file.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Hands-On Ethical Hacking and Network Defense
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Executive Director and Endowed Chair
Introduction to Networks
Instructor Materials Chapter 5 Providing Network Services
TCP/IP Internetworking
TCP/IP Internetworking
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
TCP/IP Internetworking
TCP Transport layer Er. Vikram Dhiman LPU.
Introduction to Networks
Networking for Home and Small Businesses – Chapter 6
CCNA 2 v3.1 Module 10 Intermediate TCP/IP
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Computer Networking TCP/IP Part 2
Week 5: Network Protocols Part 1
Process-to-Process Delivery:
TCP and UDP Layer 3 of the TCP/IP protocol stack. Transport layer
PART V Transport Layer.
PART 5 Transport Layer.
Networking for Home and Small Businesses – Chapter 6
ITECH1102 Networking and Security
Process-to-Process Delivery: UDP, TCP
Transport Layer 9/22/2019.
Presentation transcript:

Copyright © 2003 M. E. Kabay. All rights reserved. DATACOMM CSH6 Chapter 5 “Data Communications & Information Security” Raymond Panko Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2006 M. E. Kabay. All rights reserved. Topics Sampling of Networks Network Protocols & Vulnerabilities Standards Internet Protocol (IP) Transmission Control Protocol (TCP) User Datagram Protocol (UDP) TCP/IP Supervisory Standards Application Standards Copyright © 2006 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. Sampling of Networks Simple Home Network Copyright © 2003 M. E. Kabay. All rights reserved.

Sampling of Networks (2) Building LAN Copyright © 2003 M. E. Kabay. All rights reserved.

Sampling of Networks (3) WANs Copyright © 2003 M. E. Kabay. All rights reserved.

Sampling of Networks (4) Internet Copyright © 2003 M. E. Kabay. All rights reserved.

Network Protocols & Vulnerabilities nC2 = ½n(n-1) Standards allow interconnection Otherwise we would suffer combinatorial explosion  Security implications of standards Inherent design of the standard itself Degree to which security considerations are built into the standard (or not) Effectiveness of implementation of standards in vendor products Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. Standards Core Layers Layered Standards Architectures Single-Network Standards Internetworking Standards Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. Core Layers Copyright © 2003 M. E. Kabay. All rights reserved.

Layered Standards Architectures Copyright © 2003 M. E. Kabay. All rights reserved.

Single-Network Standards Copyright © 2003 M. E. Kabay. All rights reserved.

Internetworking Standards Copyright © 2003 M. E. Kabay. All rights reserved.

Internet Protocol (IP) Basic functions of IP Organizes packets Determines how routers move packets IPv4 main protocol of today’s Internet Descriptive portion = header Consists of fields Packets can be split into smaller fragments All have same identification field Assigned fragment offset value (sequence #) Reassembled on receiving side Source & destination addresses Running out of IPv4 address space! Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. IPv4 Packet Structure Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. IPv6 Packet Structure IPsec uses a security header to implement security w/ IPv6 Copyright © 2003 M. E. Kabay. All rights reserved.

Transmission Control Protocol (TCP) Connection-Oriented & Reliable Protocol Reliability Flag Fields Octets & Sequence Number Acknowledgement Numbers Window Field Options Port Numbers TCP Security Copyright © 2003 M. E. Kabay. All rights reserved.

Connection-Oriented & Reliable Protocol Connection-oriented protocols Initiate session of continued interaction E.g., telephone call between two people using POTS (plain old telephone system) Protocols for initiating and terminating session (e.g., ringing, “Hello,” “Bye,” hanging up) Connectionless protocols No session initiated Message sent without necessarily having indication of receipt E.g., radio, TV broadcast, Web, & e-mail Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. TCP Session Elements Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. Reliability Unreliable protocol Does not detect or correct errors TCP is reliable protocol TCP checksum field Recipient uses same algorithm to recompute checksum value Discrepancy results in dropping packet Sender waits for ACK After specified wait time, resends same packet Image Copyright © eHow. All rights reserved. URL: http://tinyurl.com/3k86vkj Permission received 2011-09-12 for use of copyrighted material. Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. TCP Segment Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. Flag Fields See “TCP Analysis - Section 4: TCP Flag Options” http://www.firewall.cx/tcp-analysis-section-4.php General term for any single bit variable Bit = 0 → flag is not set Bit = 1 → flag is set 6 flags used by TCP header URG – urgent (e.g., to abort data transfer) ACK – acknowledgement of receipt PSH – push (establish priorities) RST – reset (reject packet / reset connection) SYN – synchronization (request) FIN – finished (last packets – terminate) Copyright © 2003 M. E. Kabay. All rights reserved.

Octets & Sequence Number Sequence number field keeps packets in order TCP counts all octets (bytes) sent 3 different rules for assigning sequence number (seq#) 1st segment receives random initial seq# (ISN) Segment containing data assigned seq# = 1st octet in the data Supervisory packet with no data (e.g., ACK) assigned seq# = 1+seq# of previous packet Session hijacking is MIMA (man-in-the-middle attack) Defeated by ensuring that ISN is random Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. Port Numbers 1st two fields use TCP port numbers (P#) Servers P# specifies service (application) E.g., TCP 80 → HTTP; TCP 25 → SMTP; TCP 20 & 21 → FTP Clients Random ephemeral P# generated when connecting to server Windows uses TCP P#  {1024,4999} IETF standard range is TCP P#  {5000,65534} Difference causes problems for firewalls Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. Sockets Socket = IP address & TCP Port # Written nnn.nnn.nn.nn:nn Socket spoofing Generate packets with socket data matching existing connection Insert spoofed packets into data stream Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. TCP Security TCP originally designed without security And continues without it IPsec center of IETF efforts for Internet security But few users have moved to IPsec Therefore some pairs of users apply electronic signature RFC 2385, “Protection of BGP Sessions via the TCP MD5 Signature Option” Border Gateway Protocol used for exchange among administrative systems Long-term relationships (like leased lines in old days) Viewed as relatively weak security http://tools.ietf.org/html/rfc2385 Copyright © 2003 M. E. Kabay. All rights reserved.

User Datagram Protocol (UDP) Some services do not require reliability VoIP (Voice over IP) SNMP (Simple Network Management Protocol) UDP: connectionless & unreliable – & simple UDP & TCP both use port #s – but are different types of ports So always specify which kind of port # E.g., “TCP port 80” for HTTP UDP even weaker than TCP Copyright © 2003 M. E. Kabay. All rights reserved.

TCP/IP Supervisory Standards ICMP DNS DHCP DRP SNMP Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. ICMP Internet Control Message Protocol E.g., echo & echo reply Check for activity/existence of host Ping is program that “pings” using echo/echo reply sequence Attackers often ping hosts to map network Traceroute (tracert) Also lists routers on path between sender and responder Firewalls often drop echo reply messages ICMP also used for error messages E.g., response to malformed packet Reveals IP address of router – useful for attacker Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. DNS Domain Name System Resolve alphanumeric domain name (e.g., norwich.edu) into numeric address (e.g., 192.149.109.19) Network of DNS root servers exchange info DNS cache poisoning Attacker inserts incorrect data about host name – IP address relation Subsequent users are misdirected to a wrong site DNS security complex & unresolved issue Copyright © 2003 M. E. Kabay. All rights reserved.

IPv4 Address Space Exhaustion (1) IPv4 uses 32 bits  4.29e9 addresses Being eaten up fast by mobile devices IPv6 uses 128 bits  1.70e38 addresses (~1028 times larger) Same ratio as surface of a 1.6” square vs area of solar system Report & graphs http://www.potaroo.net/tools/ipv4/index.html Images on next slides… Copyright © 2003 M. E. Kabay. All rights reserved.

IPv4 Address Space Exhaustion (2) See also RIPE Network Coordination Center reports: http://www.ripe.net/internet-coordination/ipv4-exhaustion

IPv4 Address Space Exhaustion (3)

IPv4 Address Space Exhaustion (4)

IPv4 Address Space Exhaustion (5)

Current Data about Internet (1) Regularly updated data @ http://www.internetworldstats.com/stats.htm

Current Data about Internet (2)

Current Data about Internet (3)

Current Data about Internet (4)

Copyright © 2003 M. E. Kabay. All rights reserved. DHCP Dynamic Host Configuration Protocol Servers have fixed IP addresses Client PCs and other devices on internal networks have dynamic (temporary) addresses on Internet Problems arise because DHCP may assign different IP addresses on subsequent uses P2P (peer-to-peer) applications less secure Need to locate peer despite change of IP address Exploited by P2P software used for illegal file sharing Copyright © 2003 M. E. Kabay. All rights reserved.

Dynamic Routing Protocols Routers exchange information about available routes Traffic data Broken links Many dynamic routing protocols available RIP – Routing Information Protocol OSPF – Open Shortest Path First BGP – Border Gateway Protocol EIGRP® – Cisco Systems’ Enhanced Interior Gateway Routing Protocol Attacker may be able to insert false packets into protocols to misdirect packets Could lead to MIMA Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. SNMP Simple Network Management Protocol Control devices such as routers, switches, gateways, hosts… IETF SNMP allows control of devices May reconfigure devices Attackers can use remote reconfiguration Many system managers disable remote configuration capabilities Copyright © 2003 M. E. Kabay. All rights reserved.

Application Standards Application layer standards have their own security issues – discussed in other chapters HTTP (HyperText Transfer Protocol) & HTML (HyperText Markup Language) E-mail: SMTP (Simple Mail Transfer Protocol), POP (Post Office Protocol), IMAP (Internet Message Access Protocol), MIME (Multipurpose Internet Mail Extensions), S/MIME (Secure MIME) Telnet, FTP (File Transfer Protocol), SSH (Secure Shell) VoIP (Voice over IP), P2P, SOA (Service-Oriented Architecture), Web services Copyright © 2003 M. E. Kabay. All rights reserved.

Copyright © 2003 M. E. Kabay. All rights reserved. Now go and study Copyright © 2003 M. E. Kabay. All rights reserved.