Network Security (part 3). In our simple topologies from yesterday (generally built with hubs), there is nothing preventing a host from sniffing traffic.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module VII Sniffers.
Advertisements

Computer networks Fundamentals of Information Technology Session 6.
DMZ (De-Militarized Zone)
Network Security Essentials Chapter 11
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Web Server Administration TEC 236 Securing the Web Environment.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewall Configuration Strategies
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Firewalls and Intrusion Detection Systems
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Guide to Computer Network Security
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Computer Security and Penetration Testing
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Chapter 13 – Network Security
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CMPT 471 Networking II Address Resolution IPv4 ARP RARP 1© Janice Regan, 2012.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CHAPTER 9 Sniffing.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
CSIT 220 (Blum)1 ARP Based on Computer Networks and Internets (Comer)
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
1 Firewalls - Introduction l What is a firewall? –Firewalls are frequently thought of as a very complex system that is some sort of magical, mystical..
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
IP: Addressing, ARP, Routing
Intro to Networks (part 1)
Wireless Network Security
Net 323: NETWORK Protocols
Guide to Computer Network Security
* Essential Network Security Book Slides.
Chapter 27: System Security
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
Firewalls Routers, Switches, Hubs VPNs
Presentation transcript:

Network Security (part 3)

In our simple topologies from yesterday (generally built with hubs), there is nothing preventing a host from sniffing traffic intending for someone else.

We need to examine the link layer in order to better understand how to prevent eavesdropping. At the top end of the link layer, we can examine how machines address each other physically.

MAC addresses The MAC header contains the MAC address of the source and destination machine. (MAC address and ethernet address are interchangeable here.) They look like: – BB, or – 00:40:33:25:85:BB

So, when a packet is translated from the internet (network) layer to the link layer, the machine must translate the destination IP address to a destination physical ethernet address.

ARP: Address Resolution Protocol This translation process is done via ARP. Each node in memory has an ARP table, which looks something like this:

Viewing ARP data On most systems (windows, linux, or mac), type “arp –a”: Example (on my laptop): Macintosh:~ echambe5$ arp -a setup.ampedwireless.com;setup.ampedwireless.net ( ) at f8:78:8c:0:1a:e6 on en0 ifscope [ethernet] ? ( ) at 0:23:31:ee:37:56 on en0 ifscope [ethernet] ? ( ) at 64:f:28:66:fc:c1 on en0 ifscope [ethernet] ? ( ) at ff:ff:ff:ff:ff:ff on en0 ifscope [ethernet]

ARP Example First example: Host 1 transmits to host 2 No entry in the table. Host 1 broadcasts an ARP request on LAN 1. Essentially: “If your IP is , then reply with your IP.”

ARP Example First example: Host 2 then replies with AB-49-9B-66-B2-69. The entry is added to ARP table, and transmission proceeds.

ARP Example Second example: Host 1 transmits to host 2 again. Entry is in the ARP table, so we use it. (If entry has changed, communication will fail and host 1 will try another ARP request.)

ARP Example Third example: Host 1 transmits to host 3 No entry in ARP table. Host 1 broadcasts an ARP request on LAN 1: “if you IP is , then reply with your MAC address.”

ARP Example Third example: Host 1 transmits to host 3 No reply is received. Host 1 then transmits a frame with destination IP address and a destination MAC address of AB-49-9B- 25-B1-CA

ARP Example Third example: Host 1 transmits to host 3 The 2 port router gets the frame and sees the destination IP. Either it is in its ARP table, or it sends an ARP request on all ports.

Network devices Hubs, switches, and routers are all types of packet forwarding devices. A hub is a layer-1 device. That means it only has knowledge of the physical layer, so it sends all frames to all hosts. In essence, this means security is impossible.

Network devices Switches are layer-2 devices, so they live on the link level. This means they know about MAC addresses! So they can extract MAC addresses and only send the data to the target. Inherently more secure, since harder to “sniff” for traffic on the local network.

Network devices Routers live on layer 3, the actual network layer. They can: – Perform like switches – Forward frames across different kinds of networks – Utilize NAT to hide IP addresses – Forward frames across networks with different Net IDs. (Recall our IPv4 discussion last time.)

An attacker’s goal Given that switchers and routers provide much more secure transmission, an attackers goal is essentially to get these to behave more like hubs. We’ll talk about a few common types of network attacks that essentially do this.

ARP Poisoing The goal is to convince the other computer that you are another IP (generally the default gateway), so that all traffic gets sent to you. Step 1: Send unsolicited ARP replies to fill up another machine’s ARP table (so that it has to send ARP requests of its own) Step 2: Reply to those ARP requests with your own MAC.

ARP Poisoning There is no solid defense here, since ARP is inherently flexible. Possibilities: – Extra software to check for possible spoofs – Hard coded entries (but difficult to update) – OS level guards (timeouts, ignore unsolicited ARPS, etc.) Note that there are legitimate uses! Page redirects, setting up redundancy, etc.

Implementing ARP Poisoning ARP Poisoning sets the network up for a man- in-the-middle attack: once you have everyone talking to your computer, you can intercept and modify traffic at will This will be the basis of the next lab Tools: Here, we will use tcpdump to monitor traffic and ettercap to sniff and filter content from the network

Tcpdump Free linux command line tool that dumps all traffic from a network interface. – Other tools do exist. Wireshark, for example, is a free graphics based client much like tcpdump. Must be run as root (or admin privileges). With a hub (or wireless network), will see all traffic; on a switched network, will see all traffic routed to your machine Good tutorial:

Tcpdump example

Huh? (Look closer)

And here:

Ettercap Multipurpose sniffer and content filter for “network management” (i.e. man-in-the- middle attacks). See You can use ettercap simply to sniff, but also to automatically apply filters to content being sent.

Ettercap example 1: Observe traffic between two machines

Ettercap example 2: Alter web traffic Step 1: write a filter and compile it.

Ettercap example 2: Alter web traffic Step 2: run ettercap

Beyond ARP poisoning Once you have the basic setup, still need to conduct man-in-the- middle attack ARP poisoning lets you eavesdrop, but what if the traffic is encrypted?

Recall: Key exchanges Simple protocol: – Alice sends her public key to Bob. – Bob sends his public key to Alice. – Alice encrypts message with Bob’s public key, so Bob can decrypt with his private key. – Bob encrypts with Alice’s public key, and she can then decrypt with her own private key.

Recall: Key exchanges Exploiting the simple protocol: – When Alice sends her public key to Bob, Eve intercepts and sends along her own public instead. – (Likewise for Bob’s public key.) – When Alice sends a message to Bob, Eve is able to decrypt it. She can then send it along to Bob (encrypted with her own key, which Bob thinks is Alice’s), or can replace it with a new one. – (Likewise for a message from Bob to Alice.)

Avoiding this attack Simple key exchange: “A common cryptographic technique is to encrypt each individual conversation with a session key.” --Applied Cryptography by Schneier – Alice gets Bob’s public key from a distribution center – Alice generates a random session key, encrypts it with Bob’s public key, and sends it. – Bob decrypts Alice’s message using his private key – Both can then use the session key to encrypt.

Example: TSL (in web apps)

Note: still not foolproof! At Black Hat DC 2009, for example, Moxie Marlinspike announced a security hold in one kind of certificate used I the SSL and TSL protocols. His attack adds a null string character to a certificate field, which tricks the programs into recognizing a domain (incorrectly).

SSLstrip He developed and now distributes a tool called SSL strip – essentially a simple python script to install the tool. See the download page for details: p/ p/ Given this (and other known issues), many think SSL has deep flaws in its structure, although it continues to be the industry leader.

Network Design: A Case Study Independent of all these low level (and important issues), it may still be up to you to design a network for a corporation. Infrastructure requirements and goals are a key point of the design: – Data should be confidential, and internal plans kept secret. – Releasing sensitive data should require approval.

Policy Design and Development Goal is to develop security policies Examine: – Internal organizations – Data classes – User classes – Infrastructure options or limitations

First principles: Principle of Least Privilege: A subject should be given only those privileges that it needs to complete its task. Principle of Open Design: The security of a mechanism should not depend on the secrecy of its design or implementation.

First principles: Principle of Separation of Priviledge; The system should not grant permission based on a single condition. Principle of Fail-Safe Defaults: Unless a subject is given explicit access to an object, it should be denied access.

Example : a (fake) company

Fake Company (cont.)

Network Design Fundamentals Most large scale networks have a “Demilitarized Zone” (DMZ): – A separate network between the purely internal network and the actual external internet – Two firewalls (one on each end), each with different sets of rules – Very few machines present; this is a place for services that need external access regularly, but actual workstations don’t fall into this category

Possible design for our company

A few things to note:

The outer firewall Goals of the outer firewall: “No read up”: restrict public access to the corporate network, which has sensitive data they do not have rights to access. “No write down”: Restrict Dribble employee’s access to the internet, so that they cannot share sensitive data outside the company.

The outer firewall Here, the company has decided that the outside network only needs access to the web server and the mail server.

The inner firewall This firewall will block ALL traffic except: – SMTP connections (although all electronic mail goes through DMZ server) – System admins may access the DMZ computers from a trusted server only

Administrator connection Uses SSH protocol Inner firewall ensures that SSH can only go to the DMZ servers SSH is set up at a trusted machine, so that we can ensure strong cryptographic authentication at both endpoints

DMZ Servers

DMZ Mail Server Performs all checks and sanitization of , and so removes burden for this from the firewall. – Reassembles messages – Scans letters and attachments – Destination addresses are rewritten to route mail to the internal mail server. Also runs SSH server for admin access.

DMZ Web Server Accepts and services requests and orders from the internet – When consumer data is entered, it is checked and then encoded immediately, and the original file is deleted. – Only the public key is on the web server. – No customer data is stored in clear text. Also runs SSH server for admin connection.

DMZ DNS Server Has domain name service information for any hosts that the DMZ computers must know – DMZ mail, web, and log server – Internal trusted admin host – Outer firewall – Inner firewall Does NOT know others (e.g. internal mail server)

DMZ log server Performs administrative logging of network traffic or server info Logs help to track data in case of attacks (although logs can be deleted) Placed in the DMZ to limit its access Accepts SSH connections from trusted admin host

Server Summary In a nutshell, each server will have the minimum knowledge of the network necessary to perform its task Operating systems for servers are kept very small, with only necessary services running

Internal networks Each internal network has its own firewall

A few notes This network is highly restrictive: note that NO internet connections other than and customer web traffic is allowed to the internal network. Note also that internal networks may have their own intranet services, such as chat servers, internal webpages, etc.

Additional DMZ services Most DMZs incorporate intrusion detection systems to track connections In addition, most companies have a web proxy server with caching in the DMZ to monitor, block, and speed up web browsing. VPNs often also require a connection to the outside world, so support for these connections would reside in a DMZ