Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Firewalls and Intrusion Detection Systems
Internet Control Message Protocol (ICMP)
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Cryptography and Network Security
1 CCNA 2 v3.1 Module 8. 2 TCP/IP Suite Error and Control Messages CCNA 2 Module 8.
1 Internet Control Message Protocol (ICMP) RIZWAN REHMAN CCS, DU.
Petrozavodsk State University, Alex Moschevikin, 2003NET TECHNOLOGIES Internet Control Message Protocol ICMP author -- J. Postel, September The purpose.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
ICMP (Internet Control Message Protocol) Computer Networks By: Saeedeh Zahmatkesh spring.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 24 November 11, 2004.
IP (Internet Protocol) –the network level protocol in the Internet. –Philosophy – minimum functionality in IP, smartness at the end system. –What does.
1 Version 3.1 modified by Brierley Module 8 TCP/IP Suite Error and Control Messages.
Page 19/13/2015 Chapter 8 Some conditions that must be met for host to host communication over an internetwork: a default gateway must be properly configured.
Internet Control Message Protocol (ICMP). Objective l IP and ICMP l Why need ICMP? l ICMP Message Format l ICMP fields l Examples: »Ping »Traceroute.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
© 2002, Cisco Systems, Inc. All rights reserved..
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Network Security Fundamentals Chapter 6: Securing Network Transmission.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 4 Internet Control Message Protocol (ICMP)
Karlstad University IP security Ge Zhang
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Error and Control An IP datagram travels from node to node on the way to its destination Each router operates autonomously Failures or problems may occur.
Network Security1 Secure Routing Source: Ch. 4 of Malik. Network Security Principles and Practices (CCIE Professional Development). Pearson Education.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Protocol Headers 0x0800 Internet Protocol, Version 4 (IPv4) 0x0806 Address Resolution Protocol (ARP) 0x8100 IEEE 802.1Q-tagged frame 0x86DD Internet Protocol,
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
1 An Error Reporting Mechanism (ICMP). 2 IP Semantics IP is best-effort Datagrams can be –Lost –Delayed –Duplicated –Delivered out of order –Corrupted.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
TCP Security Vulnerabilities Phil Cayton CSE
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
Securing Network Communications Using IPSec Chapter Twelve.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
ICMPv6 Error Message Types Informational Message Types.
1 Chapter 14-16a Internet Routing Review. Chapter 14-16: Internet Routing Review 2 Introduction Motivation: Router performance is critical to overall.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
K. Salah1 Security Protocols in the Internet IPSec.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
1 Chapter 23 Internetworking Part 3 (Control Messages, Error Handling, ICMP)
IP Security
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Internet Control Message Protocol (ICMP)
21-2 ICMP(Internet control message protocol)
ICMP ICMP – Internet Control Message Protocol
Internet Control Message Protocol
Error and Control Messages in the Internet Protocol
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
دیواره ی آتش.
Overview The Internet (IP) Protocol Datagram format IP fragmentation
Presentation transcript:

Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di Torino (Italy) presented by: Madalina Baltatu

Internet = “Insecurity” n TCP/IP protocols lack for security n control and routing protocols have minimal or non-existent authentication n TCP/IP flaws used to construct serious attacks at the network infrastructure n... example: hosts/routers rely on IP source address for authentication n... which can be easily spoofed n TCP/IP protocols lack for security n control and routing protocols have minimal or non-existent authentication n TCP/IP flaws used to construct serious attacks at the network infrastructure n... example: hosts/routers rely on IP source address for authentication n... which can be easily spoofed

ICMP n Internet Control Message Protocol n ICMP vital because IP is a “best-effort” service n ICMP used by IP nodes: n to report errors encountered while processing IP datagrams n to perform other network layer functions, such as diagnostics and monitoring n ICMP messages are encapsulated inside IP n Internet Control Message Protocol n ICMP vital because IP is a “best-effort” service n ICMP used by IP nodes: n to report errors encountered while processing IP datagrams n to perform other network layer functions, such as diagnostics and monitoring n ICMP messages are encapsulated inside IP

Denial of Service Internet spoofed ICMP “port unreachable” server client attacker Denial of Service

Redirect source host destination host PGSG spoofed TCP open spoofed ICMP “redirect” response TCP open subverted traffic from T to D change routing table NET1 NET2 T D attacker subverted

Internet target host attacker’s network intermediary (broadcast) network “Smurf” attack spoofed ICMP “echo request” storm of ICMP “echo replies” IP broadcast to layer 2 broadcast

Internet victim’s network attacker’s network intermediary (broadcast) network Source address “filtering” IP source address filtering at one of the ISP router interfaces (RFC 2267)

Simple defence against ICMP attacks n Does an incoming ICMP error message really refer to a particular active traffic flow ? IP header type code checksum unused IP header and 64 bits of the original offending datagram careful checks

Authenticated ICMP messages n IP source address of ICMP messages should be cryptographically authenticated n IPsec offers authentication services at the network layer; ICMP could use it n ICMP messages should be sent on IPsec SAs n problems: n SA negotiation overhead may be un-acceptable n ICMP traffic may not travel end-to-end n the intermediate systems involved may have prohibitive admission policies n IPsec SA granularity (type & code not supported) n IP source address of ICMP messages should be cryptographically authenticated n IPsec offers authentication services at the network layer; ICMP could use it n ICMP messages should be sent on IPsec SAs n problems: n SA negotiation overhead may be un-acceptable n ICMP traffic may not travel end-to-end n the intermediate systems involved may have prohibitive admission policies n IPsec SA granularity (type & code not supported)

IPsec protection for ICMP broken link destination Internet sourceG1 G2 explicit SA for ICMP type 3, code 0 SA used by the offending IP traffic IKE Notify message

Security for intra-domain routing n routing security critical for the entire networking infrastructure n authentication mechanisms for RIP and OSPF n RIP is based on the distance vector algorithm (routing tables periodically exchanged between neighbour routers) n OSPF implements the shortest path algorithm (link state info is periodically distributed to all the routers of the AS via flooding) n routing security critical for the entire networking infrastructure n authentication mechanisms for RIP and OSPF n RIP is based on the distance vector algorithm (routing tables periodically exchanged between neighbour routers) n OSPF implements the shortest path algorithm (link state info is periodically distributed to all the routers of the AS via flooding)

Security threats for routing protocols n outsider attacks: an intruder masquerading as a router distributing incorrect routing info n insider attacks: mounted by a subverted or compromised router n consequences: n compromised routing tables n DoS on hosts which trust the affected routers n outsider attacks: an intruder masquerading as a router distributing incorrect routing info n insider attacks: mounted by a subverted or compromised router n consequences: n compromised routing tables n DoS on hosts which trust the affected routers

Protection n cryptographic checksums n against tampering with routing information n against generation of fraudulent routing information n sequence numbers and timestamps n against re-ordering and delaying genuine routing information n strong origin authentication n protection against intruders impersonating routers n confidentiality is typically not considered a primary requirement in routing security n cryptographic checksums n against tampering with routing information n against generation of fraudulent routing information n sequence numbers and timestamps n against re-ordering and delaying genuine routing information n strong origin authentication n protection against intruders impersonating routers n confidentiality is typically not considered a primary requirement in routing security

Routing security - general considerations n shared key-based cryptography (e.g., RIP-2): n significant amount of shared keys n manual key management can be a significant burden n automated key management not yet integrated with the forthcoming secure routing architecture n public key-based cryptography (e.g., OSPF): n comes at a high price n requests the set up of a PKI n shared key-based cryptography (e.g., RIP-2): n significant amount of shared keys n manual key management can be a significant burden n automated key management not yet integrated with the forthcoming secure routing architecture n public key-based cryptography (e.g., OSPF): n comes at a high price n requests the set up of a PKI

Conclusions n very serious attacks with ICMP and against routing protocols Solutions exists but are not applied! n strict traffic filtering against IP source address spoofing (RFC 2267) n education of the network managers n cryptography: key management protocols not generally adopted; standard PKI not yet agreed upon n very serious attacks with ICMP and against routing protocols Solutions exists but are not applied! n strict traffic filtering against IP source address spoofing (RFC 2267) n education of the network managers n cryptography: key management protocols not generally adopted; standard PKI not yet agreed upon