TCP/IP and Internet Security CSEM02 University of Sunderland Harry R. Erwin, PhD.

Slides:



Advertisements
Similar presentations
Password Cracking, Network Sniffing, Man-in-the-Middle attacks, and Virtual Private Networks Lab 2 – Class Discussion Group 3 Ruhull Alam Bhuiyan Keon.
Advertisements

Cryptography and Network Security Chapter 16
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Computer Security and Penetration Testing
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Upper OSI Layers Lecture 10, May 7, 2003 Mr. Greg Vogl Data Communications and Networks Uganda Martyrs University.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 10.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
SSH Secure Login Connections over the Internet
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
CS 350 Chapter-6. A brief history of TCP/IP 1983 TCP/IP came to ARPAnet ARPAnet and MILNET dissolved in 1990 BSD UNIX.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Hands-On Microsoft Windows Server 2003 Networking Chapter Three TCP/IP Architecture.
Web Server Administration Chapter 10 Securing the Web Environment.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Chapter 6: Packet Filtering
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
Secure Socket Layer (SSL)
1 Defining Network Security Security is prevention of unwanted information transfer What are the components? –...Physical Security –…Operational Security.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Shell Protocols Elly Bornstein Hiral Patel Pranav Patel Priyank Desai Swar Shah.
SSH and SSL CIT304 University of Sunderland Harry R. Erwin, PhD.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
TCP/IP Networking Review Covered Subjects:  Packet Switched Network Structure  Issues of PSNs  Ports & IP Numbers  Delivery Services  Domain Name.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Transport Layer Layer #4 (OSI-RM). Transport Layer Main function of OSI Transport layer: Accept data from the Application layer and prepare it for addressing.
SYSTEM ADMINISTRATION Chapter 7 TCP/IP. Overview (OSI Model Review) The OSI Model is a layered framework that provides structure for data communications.
1 Version 3.0 Module 11 TCP Application and Transport.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 26.
Network Security Essentials Chapter 5
Packet Protocols University of Sunderland CSEM02 Harry R. Erwin, PhD.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Basic IP Protocol Natawut Nupairoj, Ph.D. Department of Computer Engineering Chulalongkorn University.
Cisco 1 - Networking Basics Perrine. J Page 16/5/2016 Chapter 11 At which layer of the TCP/IP model does Telnet operate? 1.application 2.presentation 3.session.
Data Communications and Networks
Protocol Headers 0x0800 Internet Protocol, Version 4 (IPv4) 0x0806 Address Resolution Protocol (ARP) 0x8100 IEEE 802.1Q-tagged frame 0x86DD Internet Protocol,
TCP/IP (Transmission Control Protocol / Internet Protocol)
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Networks Part 2: Infrastructure + Protocols NYU-Poly: HSWP Instructor: Mandy Galante.
Hands-On Ethical Hacking and Network Defense
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Hands-On Ethical Hacking and Network Defense Chapter 2 TCP/IP Concepts Review Last modified
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
TCP/IP PROTOCOL UNIT 6. Overview of TCP/IP Application FTP, Telnet, SMTP, HTTP.. Presentation Session TransportHost-to-HostTCP, UDP NetworkInternetIP,
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
The Transport Layer Implementation Services Functions Protocols
SECURE SHELL MONIKA GUPTA COT 4810.
Network Wiring and Reference
Unit 4: Transport protocols
SSH – The ‘Secure’ Shell
Chapter 4 Core TCP/IP Protocols
Topic 5: Communication and the Internet
SSH – the practical solution
Presentation transcript:

TCP/IP and Internet Security CSEM02 University of Sunderland Harry R. Erwin, PhD

Resources Garfinkel and Spafford, 1996, Practical UNIX and Internet Security, O’Reilly, ISBN: B. Schneier, 2000, Secrets and Lies, Wiley, ISBN: Daniel J. Barrett and Richard E. Silverman, 2001, SSH, the Secure Shell, O’Reilly, ISBN: Eric Rescorla, 2001, SSL and TLS: Designing and Building Secure Systems, Addison-Wesley, ISBN:

TCP/IP The most general packet and message-level protocol in use. Operates on LANs, WANs and other network protocol. We will discuss IPv4 There will be some overlap with lecture 6b.

Internet Addresses Dotted quartile –4 8-bit integers Unique in some sense (except that a local LAN may have only one address visible to the outside) Multiple address classes mean that not all addresses are usable. Classless InterDomain Routing (CIDR) has been introduced to address this.

Routing Routing is transparent Local hosts send packets to their gateway. The gateway is a router and handles matters from that point. The architecture routes around outages and failures.

Hostnames The name of the computer (not its address). Hostname IP Addresses may be many to many! Hostnames begin with an alphanumeric character and may contain letters, numbers, and a few symbols. Case is ignored. Two parts: machine name and domain. The first period is the separator.

Packets and Protocols ICMP—for control TCP—for connection-oriented service UDP—for connectionless service IGMP—for multicasting control

ICMP In-band control of internet operations. Examples: –Echo request and echo reply –Destination unreachable –Source quench –Redirect –Etc…

TCP Reliable, ordered, connection-oriented service. Connects (16 bit) ports at (32 bit) IP addresses. SYN and ACK bits in the packet header are used to negotiate new connections. –SYN set to request the connection –SYN and ACK set to ack the request –ACK set to confirm the connection –Three-way handshake This protocol allows unfriendly outsiders to detect which ports are being listened to.

UDP Unreliable connection-less service 10 times more throughput than TCP 53—dns 69—tftp 111—sunrpc 137—windows blithering 161—snmp

Clients and Services Clients initiate connections to servers. Sometimes this is logically backwards as in X-Windows, where the client is the sender of the information, and the server is the machine requesting the information. Daemons are servers that wait for user requests.

Name Service The conversion from a name to an address is handed by a domain name server (DNS). UDP is used, so a workstation may need to make multiple requests. In UNIX systems, DNS is usually handled by bind. Alternatives: –NIS –NetInfo –DCE

TCP Services 21—ftp 23—telnet 25—smtp 42—nameserver 43—whois 79—finger 80—http 109, 110—pop 113—auth 119—nntp

TCP/IP Security Risks include: –Sniffers –IP spoofing –Connection hijacking –Data spoofing

Causes of Weak Internet Security Underestimation of the hostility of the internet environment Overriding importance of message/packet transfer Evolution

Alternatives Encrypt the link Protect the link Encrypt the packets Encrypt the message Encrypt the session Peter Dunne has discussed this.

Limitations of Encryption Does not protect against deletion Trapdoors may exist in the encryption program Data can be accessed when not encrypted. Encryption can be broken. Keys can be weak.

The Problem IPv4 is insecure. Most TCP/IP services are unencrypted. This allows anyone to monitor and reconstruct connection traffic on the internet. Requirements for the following can be identified: –Encrypted connections between parties known to each other. –Third-party authentication and encrypted connection establishment when parties are not known to each other.

Solutions SSH to support encrypted sessions SSL to provide trusted third-party authentication and to support encrypted sessions.

SSH “Secure shell” Transparent encryption. Modern, secure encryption algorithms Reliable, fast, and effective Client/server interaction Eliminates.rhosts and hosts.equiv

Services Provided Replaces: –rsh and telnet with ssh –rlogin with slogin –rcp with scp –ftp with sftp Protocols –ssh-1 –ssh-2

SSH1 Authentication Mechanisms 1.Kerberos 2.Rhosts (trusted host authentication, insecure) 3.RhostsRSA (trusted host authentication, insecure) 4.Public-key (RSA) 5.TIS 6.Password (various flavors, relatively insecure)

SSH2 Authentication Mechanisms 1.Public-key (DSA, RSA, OpenPGP) 2.Hostbased 3.Password

Ciphers SSH1 –3DES, IDEA, ARCFOUR (alleged RC4), DES SSH2 –3DES, Blowfish, Twofish, CAST-128, IDEA, ARCFOUR

Port Forwarding SSH can forward or tunnel ports, allowing you to run insecure services securely. ssh -L 3002:localhost:119 news.yoyo.com

A Simple Example ssh -l harry harry.sunderland.ac.uk This allows me to log into Another way of doing the same thing is ssh

Using scp scp This transfers myfile from my home directory on harry.sunderland.ac.uk to afile locally. You can also use sftp similarly to ftp.

Threats Countered by SSH Eavesdropping DNS and IP Spoofing Connection Hijacking Man-in-the-Middle Attacks Insertion Attack

SSL Secure Sockets Layer An authentication and encryption technique that provides security services to TCP by a socket- style API. Relies on certificates issued by a trusted third party. Invented by Netscape. Is being replaced by TLS (Transport Layer Security)

Services Provided Secure http pop imap smtp ftp rmi corba iiop telnet ldap

SSL Functions Confidential transmission Message integrity Endpoint authentication

How It Works An understanding of how SSL works is necessary to use it safely. Uses public key cryptography. Trusted third parties (Certificate Authorities) provide the certificates that contain the public keys. Supports many encryption algorithms.

SSL-Enabled UNIX Clients curl, ethereal, ettercap, lynx, stunnel, gabber, links, mutt, xchat, bitchx, lftp, neon, openldap, openslp, pine, various database managers.