Review Please turn in any homework/practicals you may have Jobs Job IDs Backgrounding Runlevels HDDs Partitions.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
System Security Scanning and Discovery Chapter 14.
System and Network Security Practices COEN 351 E-Commerce Security.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Access Lists Lists of conditions that control access.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Firewalls: General Principles & Configuration (in Linux)
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
A Brief Taxonomy of Firewalls
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
07/11/ L10/1/63 COM342 Networks and Data Communications Ian McCrumRoom 5B18 Tel: voice.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Review Security Hardening IPTables SELinux. Today Installations and updates – Rpm command and packages Apache “Issue Ownership”
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.
Internet and Intranet Fundamentals Class 9 Session A.
Access Control List (ACL)
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Firewalling With Netfilter/Iptables. What Is Netfilter/Iptables? Improved successor to ipchains available in linux kernel 2.4/2.6. Netfilter is a set.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
CSN09101 Networked Services Week 6 : Firewalls + Security Module Leader: Dr Gordon Russell Lecturers: G. Russell.
Packet Filtering COMP 423. Packets packets datagram To understand how firewalls work, you must first understand packets. Packets are discrete blocks of.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Server Hardening Moses Ike and Paul Murley TexSAW 2015 Credit to Daniel Waymel and Corrin Thompson.
EC week Review. Rules of Engagement Teams selected by instructor Host will read the entire questions. Only after, a team may “buzz” by raise of.
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Role Of Network IDS in Network Perimeter Defense.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
CSC 116 Nov Administrative Required 2 nd exam will be next week on Wed  Nov 18th It will be short (10 questions) It will only cover chapters.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Firewalls Dr. X (Derived from slides by Prof. William Enck, NCSU)
Working at a Small-to-Medium Business or ISP – Chapter 8
FIREWALL configuration in linux
Securing services in a unix-based environment
The Linux Operating System
Securing services in a unix-based environment
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Introduction to Networking
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Chapter 4: Access Control Lists (ACLs)
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Setting Up Firewall using Netfilter and Iptables
OPS235: Configuring a Network Using Virtual Machines – Part 2
Firewalls By conventional definition, a firewall is a partition made
Computer Networks Protocols
6. Application Software Security
Presentation transcript:

Review Please turn in any homework/practicals you may have Jobs Job IDs Backgrounding Runlevels HDDs Partitions

Today My favorite topic Security Corporate vs ‘actual’ Hardening IPTables SELinux

Corporate vs Practical Security Practical security looks at ports, process that opened that port, and known vulnerabilities Port 80 – Internet – well-known, usually masked by network, required for http, etc… This on a web server is not a big deal Port 23 – Telnet – also well known, required for telnet, HUGE DEAL Telnet offers no security, is easily sniffed, has many exploits, offers MITM chances, etc…

Corporate Security Corporate security is bureaucracy Found open telnet port, report goes into writeup Writeup goes to boss Goes to boss’ boss Goes to boss’ boss’ boss Boss’ boss’ boss wants details Comes back to you to say ‘it’s in an audit’ or not VP or Senior Manager will then ‘signoff’ or not ALWAYS KEEP THIS OR DOCUMENT

Security ALWAYS KEEP THAT OR DOCUMENT We will not be talking about intrusions today That is it’s own beast Those interested should look at NIST

Audit Different types of companies have different audits SAS70 – successor to SoX (ish) HIPAA – anything relating to healthcare PCI (not the hardware spec) – Credit card processing systems And more…

Scope Know what is in your environment Keep an inventory of both hardware systems and applications running on those systems Versions are important (Heartbleed) Know how a ‘normal’ system behaves This is a system profile (active processes, logfiles, common errors and system behavior) Actively monitor your logs

System Baseline Don’t install things you don’t need to Our installs contain quite a bit – a ‘best practice’ installation would not include many of these modules (GUI) Set the system to log at an appropriate level (ex. high level is not necessary when application doesn’t log to that level) Send logs to a “SEIM” if appropriate Backup – set the schedule and ensure failed backup attempts run at some point that day

Device ‘Hardening’ Process of making a device more secure ie, those things we just mentioned Best Practice all over the place Reducing ‘attack surface’ and making it less of a target Hackers go after ‘low hanging fruit’ first Script kiddies will give up if they don’t find it If they’re not script kiddies, you’re being targeted and they’re going to get in anyway

IPTables Who liked Vista’s pop-up security notifications? Who likes Windows firewall? Linux has one too – iptables Again, just an application/program running on the system It is a simple software based firewall

Firewall Network security system that controls incoming and outgoing traffic through ‘rules’ Allow web traffic incoming and outgoing Deny telnet either incoming or outgoing Allow outbound SSH connections Can be a program Can be a physical device Best practice is to have your ruleset and then the last one is ‘deny all’ Block all traffic that you aren’t sure of

Firewall – Network vs Personal Network firewall usually sits in between our line in and our gateway out to the internet Literally – there will be a single cable (network cable, coax, fibre) that your ISP will run into the building – this is your ‘line in’ into your company Usually, this plugs into the ISP’s router, but may go directly out to the internet From there, it goes into your network, so frequently it goes into a firewall owned by you That firewall then routes known good traffic to the router

IPTables OSI Model, firewalls are layer 2/3 devices So conceptually think of them as sitting in between the plug on the cord and the computer, but really they’re just in another part of memory Input streams come in/out – a request for a web page, SSH connection, etc… IPTables looks at the connection, checks its rules for this connection type, and acts accordingly Accepts or rejects

Rules IPTables comes with a ‘default’ ruleset Mantra seems to be “we’re better than CentOS5!” Accept or reject – Accept means it allows the connection in and continues with it’s ruleset (may forward as well – you can ‘chain’ iptables rules just like commands) Reject means it drops it, done, no connection allowed We can add rules through the command line

Accessing It Access it through iptables command Show current ruleset

Adding Rules Simple rules – Accept or Reject We want to accept SSH, accept HTTP (so we can SSH, so we can run a web server) We want to reject Telnet and FTP iptables -A INPUT -p tcp --dport 22 -j ACCEPT -A flag = ‘add’ (we can –D to drop rules we want to get rid of) -p flag = protocol (SSH uses TCP protocol) --dport = destination port -j flag = do we accept or drop?

Accept HTTP (port 80, tcp) iptables -A INPUT -p tcp --dport 80 -j ACCEPT So what is the command to deny telnet to port 23 over the tcp protocol?

Best Practice Best practice with firewalls in general is to have the last rule as the ‘paranoid’ rule Theory: don’t let anything in that you haven’t explicitly ok’d iptables -A INPUT -j DROP This at the end of your ruleset means anything that doesn’t match your rules, gets dropped (and rules with OUTPUT and FORWARD)

Questions on iptables? iptables -A INPUT -p tcp --dport 80 -j ACCEPT Find a command similar to your own Validate port, protocol, direction, and what do to with it Is on all Linux systems Best practice is to deny anything unexpected

SELinux Security Enhanced Linux is installed by default Uses mandatory access controls Principle of least privilege Principle of minimal privilege, principle of least authority Breaks down users, policies, and security contexts SELinux users do not always match up 1-to-1 with real users A policy is an explicit list of permissions Context is the ‘labeling’ of what processes can and cannot access

Three Modes Disabled, Permissive, Enforcing Disabled = off Permissive = off, but logs all messages Used with ‘audit2allow’ to build a policy Enforcing = implementing all rules and contexts /etc/selinux/config sestatus command returns current state (no argument)

Implementing SELinux -Z flag shows ‘context’ of running processes ls -Z or ps -Zef USE IT! 75% of all businesses will use Dev/Test/Prod environments The other 25% use small-scale replications of “production” and then test on a live subset Run ‘permissive’ mode in test, enforcing in production

If You’re Interested In Security Corporate security is “white hat” Except for pen-testers, most of whom are GSEC’s Look at Kali Linux & “Metasploitable” Think about CCDC I want to put together a team PS – Byte Club! NIST, SANS GSEC, one specific subject You have to know what you’re breaking into

BTW – ‘Standard Process’ A “req” is needed A good boss shows their resources are over utilized Ideal description is created HR adds description into their “standard” stuff HR filters all applicants This is why certs matter “Finalists” are forwarded on to actual manager Then interviews occur

Own Study Security Corporate vs ‘actual’ Hardening ng%29 ng%29 pamphlet-i731.pdf pamphlet-i731.pdf IPTables SELinux