Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
Chapter 2 Networking Overview. Figure 2.1 Generic protocol layers move data between systems.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
TCP/IP Basics A review for firewall configuration.
Transport Layer TCP and UDP IS250 Spring 2010
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
ITIS 6167/8167: Network Security Weichao Wang. 2 Contents ICMP protocol and attacks UDP protocol and attacks TCP protocol and attacks.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
Guide to TCP/IP, Third Edition
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Intrusion Detection System (IDS)
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Packet Protocols University of Sunderland CSEM02 Harry R. Erwin, PhD.
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
 network appliances to filter network traffic  filter on header (largely based on layers 3-5) Internet Intranet.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
Protocol Headers 0x0800 Internet Protocol, Version 4 (IPv4) 0x0806 Address Resolution Protocol (ARP) 0x8100 IEEE 802.1Q-tagged frame 0x86DD Internet Protocol,
Networking Basics CCNA 1 Chapter 11.
1 Introduction to TCP/IP. 2 OSI and Protocol Stack OSI: Open Systems Interconnect OSI ModelTCP/IP HierarchyProtocols 7 th Application Layer 6 th Presentation.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 Version 3.1 Module 10 Intermediate TCP/IP (Layer 4)
UDP : User Datagram Protocol 백 일 우
© 2002, Cisco Systems, Inc. All rights reserved..
K. Salah1 Security Protocols in the Internet IPSec.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Packet Switch Network Server client IP Ether IPTCPData.
Internet Control Message Protocol (ICMP)
Chapter 5 Network and Transport Layers
Chapter4 Packet and Protocol.
Internet Control Message Protocol (ICMP)
Introduction To TCP/IP Networking Mr. Zeeshan Ali, Asst. Professor
Introduction to TCP/IP networking
Introduction to TCP/IP
Chapter 5 Network and Transport Layers
Internet Control Message Protocol (ICMP)
TCP/IP Internetworking
TCP/IP Internetworking
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Advanced Computer Networks
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
ITIS 6167/8167: Network and Information Security
Computer Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

Firewalls

Evil Hackers FirewallYour network

Firewalls mitigate risk Block many threats They have vulnerabilities

Firewalls can be your connection to the Internet. As a prerequisite to this course you already know about networking, but it is worthwhile to look at the interface to the Internet with respect to security.

Typical Network Stack Application Layer (FTP, HTTP, SSH, etc.) Transport Layer (TCP, UDP, ICMP) Internet Layer (IP) Network Access Layer (Ethernet, FDDI, etc.) (If you have a Novel or AppleShare network, the IP layer will be different.) (Carrier Pigeon Network Layer: RFC1149 on 1 April 1990 defines the Avian Transport Protocol)

Packet Organization Each layer’s packet organization has a header and data fields. Each layer treats the information it gets from the layer above it as data, i.e. every layer adds a header.

Encapsulation Application (FTP, HTTP, …) Transport (TCP,UDP,…) Internet (IP) Network (Ethernet) Data Header

Ethernet Layer Header: –Packet Type, e.g. IP –Source Address Original source or last router on path –Destination Address Final destination or next router Maybe multicast or broadcast –Addresses are Media Access Control (MAC) Data is an IP packet

IP Layer Header –IP Source Address, e.g –IP Destination Address –IP Protocol Type, e.g. TCP, UDP, ICMP Data: TCP packet (or UDP, etc.) Fragmentation If (network max packet size < IP max size) split data into multiple packets (fragments)

TCP Layer Header –TCP Source Port (2-bytes) –TCP Destination Port –TCP Flags: designates packet type ACK, SYN, etc. Data: application data, e.g. FTP data

Multicast or Broadcast Source Legitimate use: DHCP request uses a broadcast source since it doesn’t have a valid address Illegitimate use: sending a broadcast source to a single destination will prompt a broadcast reply allowing you to use the destination as a broadcast source Since DHCP isn’t external (normally), block broadcast source

IP Fragmentation Prevent fragmentation with path MTU discovery –Maximum Transmission Unit (MTU) –Send message with “don’t fragment” set If (error returned), decrease size else increase size

Packet Filters & Fragmentation Solution: packet filter only first packet and let non-first packets through If you drop the first, a higher level protocol (TCP) will invalidate the rest. Problem #1: destination holds non-first packets waiting for the missing one (until timeout) resulting in Denial of Service!

Packet Filter & Fragmentation Problem #2: attacker carefully constructs overlapping fragments so that non-first packets contain useful information. Overlapping fragments may be reassembled into invalid packets causing the OS to crash.

Packet Filter & Fragmentation Problem #3: Attacker can get information to otherwise blocked ports by having valid TCP packets in non-first fragments which slip through.

Packet Filter & Fragmentation Solutions Fragment reassembly before filtering Time consuming Reject all non-first fragments May reject otherwise good connections, but they will retransmit. Increased use of MTU is reducing fragmentation

TCP TCP is reliable because it guarantees to the application layer: –Provide data in order it was sent –Provide all data sent –Will not provide duplicates It will kill a connection before violating any.

Blocking TCP To block a TCP connection, simply block the first packet. The first packet is unique: ACK is not set –“start-of-connection” packet Can enforce a policy of only allowing connections to external servers, i.e. deny external connection requests to internal servers

TCP Options Common TCP Options: –ACK (acknowledgement) –SYN (synchronize) –RST (reset) –FIN (finish) 3-way handshake uses ACK & SYN RST & FIN are used to close connections

TCP Options Firewalls use ACK and RST –ACK indicates first packet of connection –RST tells people to “shut up” without providing a useful error message

TCP Sequence Numbers Sequence numbers allow reconstruction of correct order of packets Supposed to begin with a random number, but often is not random—vulnerability! How to hijack a TCP connection?

Hijacking a TCP Connection Attackers needs Ability to forge TCP/IP packets. Initial sequence number Knowledge that a TCP connection has started (but not the ability to see it) When the TCP connection started Ability to redirect responses to you OR continue the conversation without responses to you while achieving your goal Thought to be too hard, but exists in the wild.

UDP Since UDP does not guarantee reliability there is no uniquely identifiable first packet

ICMP Examples –Echo Request: send by ping –Echo Response –Time exceeded (really hops exceeded) –Destination unreachable –Redirect (router redirected a packet and is telling the sender that a better way exists)

ICMP “Destination Unreachable” has codes to indicate reason The relevant ones are “Fragmentation Needed” and “Don’t Fragment” used for path MTU discovery Desirable to drop all other “unreachable” replies since they provide useful information to scanners. Most firewalls do not allow discrimination on ICMP reason.

ICMP Attacks ICMP packets should be very small— large one indicate a problem so filter out large ones. For example, echo packets allow padding which could contain data. Not useful for cracking, but could be used to maintain a connection to a compromised site.

IP over IP Encapsulating IP over IP –Encrypted traffic –Mobile IP (movement with fixed IP) –Burying protocol Multicast over non-supporting networks IPv6 over IPv4 –VPN: virtual private networks Problem: cannot see “actual” IP packet (encrypted) or may not look at it

Low-level attacks Port scanning –Send SYN without ACK; receives SYN if open or RST if not –Send FIN “all options on” = Christmas tree (lights it up) “all options off” = null Either can crash a weak TCP/IP stack

Low-level Attacks IP Spoofing: Apparent problem: reply not sent to attacker –Attacker can intercept reply –Attacker doesn’t care to see it (e.g. DoS) –Attacker doesn’t want reply: smurf attack redirects response to attack while multiplying replies with broadcast source

Packet Filtering Pro/Con Pro –One filter can protect an entire network –Simple filtering is efficient –Widely available Con –Not perfect: hard to configure and test –Reduces router performance –Some security policies cannot be enforced, e.g. block a user

Network Address Translation (NAT) (Linux calls it masquerading) Server NAT Client

NAT Pro/Con Pro –Enforces control over outbound connections –Dynamic translation is more restrictive changed mapping increases attack difficulty –Conceals internal configuration Con –Dynamic translation requires maintaining state (how long to keep connection open?) –Interferes with some encryption schemes –Dynamic translation interferes with logging –Dynamic translation of ports can interfere with filtering