Advanced Unix Chapter 14. Network Tools There are many, many network tools that come with a standard Linux installation. There are many, many network.

Slides:



Advertisements
Similar presentations
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
Advertisements

CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Advanced Network Security – Firewall Implementation and Design Term: January 2005 Dana Epp COMP.
Web Server Administration Chapter 10 Securing the Web Environment.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
1 Guide to Network Defense and Countermeasures Chapter 6.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
1 Web Server Administration Chapter 9 Extending the Web Environment.
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
Web Server Administration Chapter 10 Securing the Web Environment.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Advanced Unix Mid-Term Review Part 1 Oct 11, 2005.
CSCE 815 Network Security Lecture 23 Jails and such April 15, 2003.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Review Please turn in any homework/practicals you may have Jobs Job IDs Backgrounding Runlevels HDDs Partitions.
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE.
Firewalling With Netfilter/Iptables. What Is Netfilter/Iptables? Improved successor to ipchains available in linux kernel 2.4/2.6. Netfilter is a set.
IPtables Objectives Contents Practicals Summary
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
1 Quick Overview Overview Network –IPTables –Snort Intrusion Detection –Tripwire –AIDE –Samhain Monitoring & Configuration –Beltaine –Lemon –Prelude Conclusions.
Remote Administration Remote Desktop Remote Desktop Gateway Remote Assistance Windows Remote Management Service Remote Server Administration Tools.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
CSN09101 Networked Services Week 6 : Firewalls + Security Module Leader: Dr Gordon Russell Lecturers: G. Russell.
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
Core System Services. INIT Daemon The init process is the patron of all processes. first process that gets started in any Linux/ UNIX -based system.
Networking in Linux: a brief overview. TCP/IP  TCP/IP concepts we have seen are applicable to Linux (a version of UNIX, where TCP/IP started)  Some.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
CITA 310 Section 9 Securing the Web Environment (Textbook Chapter 10)
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Unix network Services. Configuring a network interface In Unix there are essentially two commands that are used to enable TCP/IP. ifconfig route.
IPTABLES -FIREWALL. IPTABLES IPTABLE BASIC IMPORTANT FILES SIMPLE SECURITY IMPLEMENTATION (GRAPHICAL WAY) IMPLEMENTING FIREWALL RULE WITH EXAMPLE (COMMAND.
Web Server Administration Chapter 10 Securing the Web Environment.
Introduction to Linux Firewall
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
LINUX® Netfilter The Linux Firewall Engine. Overview LINUX® Netfilter is a firewall engine built into the Linux kernel Sometimes called “iptables” for.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Linux Firewall Iptables.
The Perfect Linux Security Firewalls. Introduction of Linux Firewall Security Linux Firewall is very stable, protect our system from malware, system performance.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Basic Linux Desktop Security © Konrad Rosenbaum this presentation is protected by the GNU General Public License version 2 or any newer.
Click to edit Master subtitle style
Firewalls Dr. X (Derived from slides by Prof. William Enck, NCSU)
FIREWALL configuration in linux
Securing services in a unix-based environment
The Linux Operating System
Securing services in a unix-based environment
Securing the Network Perimeter with ISA 2004
Introduction:. Vendor : Cisco Certifications : Next-Generation Firewall Express Security Engineer Exam Name : Cisco ASA Express Security Exam Code :
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Network Services CSCI N321 – System and Network Administration
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Setting Up Firewall using Netfilter and Iptables
OPS235: Configuring a Network Using Virtual Machines – Part 2
COP 4343 Unix System Administration
Firewalls By conventional definition, a firewall is a partition made
Linux and TCP/IP Networking
Presentation transcript:

Advanced Unix Chapter 14

Network Tools There are many, many network tools that come with a standard Linux installation. There are many, many network tools that come with a standard Linux installation. They can be used for network troubleshooting, for cause network trouble and for detecting the same. They can be used for network troubleshooting, for cause network trouble and for detecting the same. Chapter 14 discusses a few of them Chapter 14 discusses a few of them

Network Tools The netstat command is one such tool The netstat command is one such tool It will show you the number of tcp/udp connections and the services that are listening on your system It will show you the number of tcp/udp connections and the services that are listening on your system Demo netstat Demo netstat

Network Tools One tool often overlooked by the book is lsof One tool often overlooked by the book is lsof lsof or "list open files" is one of the systems administrator's number one tools lsof or "list open files" is one of the systems administrator's number one tools You trace what processes are using which services as well as which files are open and by which processes You trace what processes are using which services as well as which files are open and by which processes Demo lsof Demo lsof

Network Tools Many “root kits” deployed by vandals replace the tools an SA would use to detect the attack Many “root kits” deployed by vandals replace the tools an SA would use to detect the attack ps, ls, netstat, lsof, etc.ps, ls, netstat, lsof, etc. Always have original binaries and/or the tool source code available Always have original binaries and/or the tool source code available See lecture I gave to Rose Cyber Security Club: See lecture I gave to Rose Cyber Security Club:

Network Services Each Network Service is a Point of Attack Each Network Service is a Point of Attack Remove/Disable all unneeded services Remove/Disable all unneeded services /etc/services – a text file that relates the ports to the services/etc/services – a text file that relates the ports to the services /etc/init.d/etc/init.d chkconfigchkconfig

TCP Wrappers For the services that you need to have running consider using tcp_wrappers For the services that you need to have running consider using tcp_wrappers Provides for added access controlProvides for added access control /etc/host.allow/etc/host.allow /etc/host.deny/etc/host.deny Note: many services now hav wrapper support programmed into the source codeNote: many services now hav wrapper support programmed into the source code The Super Daemon xinetd now has tcp wrappers built in so any service using xinetd can take advantage of tcp wrappers if it is not already encoded The Super Daemon xinetd now has tcp wrappers built in so any service using xinetd can take advantage of tcp wrappers if it is not already encoded

TCP Wrappers Other services also use tcp wrappers such as “Very Secure FTP” Other services also use tcp wrappers such as “Very Secure FTP” vsftpd FTP servervsftpd FTP server Controlled in the vsftpd configuration fileControlled in the vsftpd configuration file Access to rsync can be controlled by TCP Wrappers via xinetd Access to rsync can be controlled by TCP Wrappers via xinetd

TCP Wrappers Uses two files to define the access to the services Uses two files to define the access to the services /etc/hosts.allow/etc/hosts.allow /etc/hosts.deny/etc/hosts.deny You can create a deny-by-default to all services that use tcp wrappers You can create a deny-by-default to all services that use tcp wrappers Don’t be misled into thinking this can secure you server 100% Don’t be misled into thinking this can secure you server 100% Understand that not all services can or do use tcp wrappersUnderstand that not all services can or do use tcp wrappers tcp wrappers is not a Firewall but an access control processtcp wrappers is not a Firewall but an access control process

TCP Wrappers Good Example in the book Good Example in the book Demo: tcp wrappers Demo: tcp wrappers hosts.allowhosts.allow hosts.denyhosts.deny

Firewalls Several types of Firewalls: Several types of Firewalls: Packet filterPacket filter Iptables – layer 2 network Iptables – layer 2 network Stateful filterStateful filter Cisco PIX – layer 3 and 4 Cisco PIX – layer 3 and 4 Stateful inspectionStateful inspection Checkpoint Firewall-1 Checkpoint Firewall-1 Application proxyApplication proxy Sidewinder – layers 5 thru 7 Sidewinder – layers 5 thru 7 Good reference for firewalls:Good reference for firewalls:

Introduction to iptables 3 rd generation firewall on Linux 3 rd generation firewall on Linux Supports basic packet filtering as well as connection state tracking Supports basic packet filtering as well as connection state tracking For our needs for this course, we will use simple/basic packet filtering For our needs for this course, we will use simple/basic packet filtering

Iptables iptables is a filtering firewall iptables is a filtering firewall Comes standard as part of Linux Comes standard as part of Linux Older versions of Linux have ipchainsOlder versions of Linux have ipchains FC comes with a relatively good initial configuration FC comes with a relatively good initial configuration Use chkconfig check to see if your iptables is configured to start on boot Use chkconfig check to see if your iptables is configured to start on boot chkconfig --list iptables

Iptables If is not then enabled it via the following command: If is not then enabled it via the following command: chkconfig –levels 235 iptables on To start iptables enter: To start iptables enter: /etc/init.d/iptables start Or service iptables start

Introduction to iptables # Sample firewall – incomplete… do not use. For discussion only IPTABLES=/sbin/iptables ANY=“ /0” ETHIP=“ ” ADMINNOC=“ ” # Flush chains $IPTABLES --flush # Set default policies $IPTABLES -P INPUT ACCEPT $IPTABLES -P OUTPUT ACCEPT $IPTABLES -P FORWARD ACCEPT # Allow SSH from admin NOC $IPTABLES -A INPUT -p tcp -s $ADMINNOC --sport 1024: dport 22 -j ACCEPT $IPTABLES -A OUTPUT -p tcp -d $ADMINNOC -sport 22 --dport 1024: j ACCEPT # Allow Web access $IPTABLES -A INPUT -p tcp --dport 80 -j ACCEPT # Allows secure web access $IPTABLES -A INPUT -p tcp --dport 443 -j ACCEPT $IPTABLES -A INPUT -j DROP

Dropping vs Rejecting Packets Rejecting packets COULD resource starve your system Rejecting packets COULD resource starve your system Dropping packets could cause network diagnostic hell for the other end if you don’t respond ‘nicely’ Dropping packets could cause network diagnostic hell for the other end if you don’t respond ‘nicely’ Dana’s Law: It is better to DROP packets and buy your favorite network admin a beer than to REJECT and have alarms go off at 2 in the morning during a DoS, waking you up. Dana’s Law: It is better to DROP packets and buy your favorite network admin a beer than to REJECT and have alarms go off at 2 in the morning during a DoS, waking you up.

Iptables Many ways to implement iptables Many ways to implement iptables Demo ShorewallDemo Shorewall See: See: IPTables Packet Filtering HOWTO: filtering-HOWTO.html IPTables Packet Filtering HOWTO: filtering-HOWTO.html

Good reading Building Internet Firewalls ISBN: Building Internet Firewalls ISBN: Linux Firewalls ISBN: Linux Firewalls ISBN: Threat Modeling ISBN: Threat Modeling ISBN:

Iptables To be continued next class… To be continued next class…