Foundations of Network and Computer Security J J ohn Black Lecture #20 Oct 17 th 2007 CSCI 6268/TLEN 5831, Fall 2007.

Slides:



Advertisements
Similar presentations
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
Advertisements

CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Chapter 5 The Network Layer.
Chapter 14 TCP/IP and Routing Part #1 Unix System Administration.
Foundations of Network and Computer Security J J ohn Black Lecture #19 Oct 14 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Foundations of Network and Computer Security J J ohn Black Lecture #11 Sep 28 th 2004 CSCI 6268/TLEN 5831, Fall 2004.
ITIS 6167/8167: Network and Information Security Weichao Wang.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 23 rd 2004 CSCI 6268/TLEN 5831, Fall 2004.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 18 Introduction to Networks and the Internet.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Foundations of Network and Computer Security J J ohn Black Lecture #35 Dec 9 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
CS 356 Systems Security Spring Dr. Indrajit Ray
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
26-Aug-154/598N: Computer Networks Recap SBC UUNET Comcast Sprint End Users Internet First mile problem Last mile problem.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Internetworking. What internetworks are u Start with lots of little networks u Many different types –ethernet, dedicated leased lines, dialup, ATM, Frame.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
1 ECE453 – Introduction to Computer Networks Lecture 12 – Network Layer (IV)
Chapter 9.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
CS 453 Computer Networks Lecture 21 Layer 3 Network Layer Network Layer of the Internet.
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
Internet 1) Internet basic concepts 2) The IP protocol stack 3) The IP datagram header (IPv4 and IPv6) 4) Addressing and routing 5) Example: downloading.
Internet Protocols. Address Resolution IP Addresses are not recognized by hardware. If we know the IP address of a host, how do we find out the hardware.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Data Communications and Networks
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
1. Layered Architecture of Communication Networks: TCP/IP Model
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Lab #2 NET332 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
CPS110: Networks Landon Cox March 25, Network hardware reality  Lots of different network interface cards (NICs)  3Com/Intel, Ethernet/802.11x.
Introduction to Information Security
NAT – Network Address Translation
Introduction to TCP/IP
Scaling the Network: The Internet Protocol
Course Review 2015 Computer networks 赵振刚
MAC Addresses and ARP 32-bit IP address:
ICMP ICMP – Internet Control Message Protocol
Chapter 22 Q and A Victor Norman CS332 Fall 2017.
CS 457 – Lecture 10 Internetworking and IP
Communication Networks NETW 501
Scaling the Network: The Internet Protocol
ITIS 6167/8167: Network and Information Security
Chapter 5: Link Layer 5.1 Introduction and services
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black Lecture #20 Oct 17 th 2007 CSCI 6268/TLEN 5831, Fall 2007

Announcements Project #0 Due on Friday –Hand print-out in, in class –If CAETE mail to Martin (See web page for Martin’s and OH) Martin’s OH, Mondays, 11am, CSEL 122 Friday will be a midterm review session Tomorrow’s Colloquium is my tenure talk –Come if you like… not mandatory

Networking Refresher For some of you this will be boring… sorry The basic model: ISP Backbone (not a single line these days) LAN Eth user1 user2

Basic Networking Suppose user1 sends a UDP packet to user2, what happens? –What’s UDP? User Datagram Protocol Just like IP but with ports –Well, first we need an IP address! What’s an IP address For IPv4, it’s a “dotted quad” of bytes –Ex, –32 bits For IPv6, it’s 128 bits –16 bytes in hex separated by colons

Sending a UDP packet Assume IPv4 –Get IP address via DNS Domain Name Service Distributed database mapping textual names to IP addresses Insecure –DNS spoofing –More on this later –Ok, so we have an IP address –And we presumably have a port #

Pack it Up! Message UDP Header Src IP, Dest IP, Len, Chksm, TTL Src Port, Dest Port, Len, Chksm Eth Header IP Header Src addr, Dest addr, Chksm Ethernet addresses are called “MAC addresses” Ethernet checksum is actually appended to end of packet Ethernet MTU is 1500 bytes

Routing on a Network Usually done via OSPF or LSP for LANs –Open Shortest Path First, Link-State Protocol –These protocols assume “modest sized” networks –A routing protocol decides how to forward packets based on routing tables BGP is used on backbone –Border Gateway Protocol –Routes using incomplete information

Local Routing Table Our local routing table (on host of user1) is not going to have a route to IP of user2 –Routing table will therefore send our packet to the gateway –Gateway is the machine/router on the “edge” of the network responsible for processing all incoming/outgoing traffic from/to the LAN NAT boxing, firewalling, and other stuff is usually done here as well

Getting to the Gateway How to we route to the IP address of the gateway on our local Ethernet? –ARP (Address Resolution Protocol) Translates IP addresses into MAC addresses Caches old lookups, so we probably already have the MAC address of the gateway If not, we send an ARP Request to the LAN, including the IP address whose MAC we seek Owner (ie, the gateway) sends ARP Reply with his MAC address and we cache it –Usually, all other machines who hear the ARP Reply cache it as well –Leads to attacks… more later

Sending to the Gateway Now we have the MAC address of the gateway –Send our packet to the gateway via the Ethernet protocol –This is usually done with a hardware device (network card) which often puts the Eth header on your packet for you, computes checksums, etc. Broadcasts packet, detects collisions Exponential backoff Promiscuous mode – Sniffers use this –Works through hubs, but doesn’t work through switches on a switched Ethernet –You can often fool switches

Gateway Receives Eth Packet Strips Eth header and again tries to route the resulting IP packet –Looks in routing table, sends to ISP –ISP probably routes using BGP –Reaches other ISP Note that we’re using other Ethernets and similar physical-layer protocols for each hop! –Other ISP routes to other LAN’s gateway Gateway sees IP is in its range and does ARP to route to user2

User2 Receives Packet User2 receives the IP packet –Removes IP header No one else (is supposed to) look inside packet until user2 receives it NAT boxes break this rule Firewalls break this rule –See it’s a UDP packet and “sends” to proper port –Ports are mapped to applications via listento() Application receives message and processes it

Other Protocols We didn’t even talk about SLIP or PPP ATM, FDDI, Wireless What about DHCP? –Dynamic IP addresses There is also ICMP –Internet Control Message Protocol –Echo (ping), traceroute Application Layer Protocols –SNMP – Network Management –SMTP – Sendmail –POP/IMAP – Mail protocols

MTU – Maximum Transmission Unit MTU for Ethernet is 1500 bytes –If MTU is exceeded, packet is “fragmented” –IP has support for packet fragmentation and reassembly –A packet is broken into as many pieces as necessary to comply with MTU –Fragments routed as regular IP datagrams, independent of each other –Reassembly done at host only

IP – Best Effort Datagrams IP is “best effort” –There is no tracking of packets –If something is dropped… oh well –If one fragment is dropped, many transport layer protocols (like TCP) will consider the whole thing lost and not ACK –This seems bad, but it’s one of the biggest successes of IP –UDP is IP with ports, so it too is “best effort”

TCP – Transmission Control Protocol Stateful connections –Runs over IP just like UDP, but adds more than just ports –Establish a connection with listen() and connect() IP and UDP were “stateless” protocols –Reliable delivery Unlike best-effort, this protocol guarantees delivery of packets, in proper order Uses sequence numbers, sliding windows, ACKs every transmission

Crypto on a Network How do we do crypto on a network? –We’ve seen application-layer examples SSL/TLS, SSH This is called “end-to-end” cryptography, meaning between hosts The routers don’t care if the innermost part of each packet (the “payload”) is ciphertext or plaintext –IPSec IPSec does crypto at the network layer (the IP layer) Extremely well-engineered; hardly used We won’t study IPSec in this course

Network Security: The Biggest Challenges What are the biggest problems now, today, on the Internet –What are the most common types of attacks? Viruses, worms Break-ins via software vulnerabilities Denial of Service attacks (DoS) –And Distributes Denial of Service (DDoS) –What about keyloggers, spyware, rootkits? Not as relevant to network security More likely to be end-results of other break-ins –A recent virus was found to install a keylogger

Viruses (Worms) Today, most everyone just calls them viruses –Technically most are “worms” –Worm is a self-contained propagating program –Viruses embed in other programs and self- replicate Kind of like viruses in biology

Viruses: History Morris Worm, Nov 2 nd, 1988 –The first worm (I know of) was the Morris worm –Robert T. Morris, Jr. 23 years old Cornell grad student Father worked at the NSA (whoops!) –Wrote a self-propagating program as a “test concept” Exploited Unix vulnerabilities in sendmail and fingerd Released at MIT Bug in the worm caused it to go wild –Probably wouldn’t have caused much damage otherwise!

Morris Worm (cont) Shut down thousands of Unix hosts –But this was 1988… Reactions –People didn’t know what to do, so they panicked Disconnected from net Unable to receive patches! –Morris fined $10k, 3 yrs probation, 400 hrs community service –CERT was created

CERT -- They were first Carnegie mellon Ermergency Response Team –But don’t expand it into an acronym Provide technical advice and coordinate responses to security compromises Identify trends in intruder activity Work with other security experts to identify solutions to security problems Disseminate information to the broad community Analyze product vulnerabilities Publishes technical documents Presents training courses

Modern Viruses Almost all look for Windows hosts –Windows runs on more than 90% of desktops these days –A lot of hosts on cable modems Fast, always on –Destructive payloads Wipe hard disk, eg Some install backdoors for later use –All kinds of weird behaviors though Some innocuous

Viruses: Why? Who writes these things? –Typical profile: male, teenager, geeky, smart –Script Kiddies Don’t really write them, but launch them Sometimes make small mods and call them their own Scariest hackers: beyond the reach of the law Why? –Intellectual challenge (sigh…) –Peer recognition –Bot building (Zombie armies) –Because it’s there?