OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services Harden Internetwork Connection Devices Harden DNS and BIND Servers Harden Web Servers Harden File Transfer Protocol (FTP) Servers Harden Network News Transfer Protocol (NNTP) Servers Harden Servers Harden Conferencing and Messaging Servers
OV Copyright © 2005 Element K Content LLC. All rights reserved. Internetwork Devices SwitchesRoutersFirewalls
OV Copyright © 2005 Element K Content LLC. All rights reserved. Unnecessary Network Protocols Transport protocols NetBEUI NWLink AppleTalk Service protocols NNTP FTP Others
OV Copyright © 2005 Element K Content LLC. All rights reserved. Firmware Updates
OV Copyright © 2005 Element K Content LLC. All rights reserved. Internetwork Device Vulnerabilities SNMP Telnet Router configuration Finger Small server IP filter Default ports IP source routing ICMP redirect RIP v1
OV Copyright © 2005 Element K Content LLC. All rights reserved. A DMZ DMZ Web server
OV Copyright © 2005 Element K Content LLC. All rights reserved. An Intranet Employee handbook
OV Copyright © 2005 Element K Content LLC. All rights reserved. An Extranet Company A Company C Company B
OV Copyright © 2005 Element K Content LLC. All rights reserved. A VLAN Point-to-point connection Point-to-point connection Point-to-point connection Point-to-point connection VLAN switch
OV Copyright © 2005 Element K Content LLC. All rights reserved. NAT NAT Server
OV Copyright © 2005 Element K Content LLC. All rights reserved. Network Media Types Coax Twisted pair Fiber-optic
OV Copyright © 2005 Element K Content LLC. All rights reserved. Network Media Vulnerabilities Coax vulnerabilities Twisted-pair vulnerabilities Fiber-optic vulnerabilities General vulnerabilities
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices Protect the devices while maintaining connectivity Follow hardening guidelines Requirements will vary
OV Copyright © 2005 Element K Content LLC. All rights reserved. DNS everythingforcoffee.com com.org
OV Copyright © 2005 Element K Content LLC. All rights reserved. DNS and BIND Vulnerabilities Spoofing Hijacking Cache corruption Input validation Environment variables Zone transfers Rogue client registrations
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening DNS and BIND Protect the zone information while maintaining service availability Follow hardening guidelines Requirements will vary
OV Copyright © 2005 Element K Content LLC. All rights reserved. HTTP Web client Web server
OV Copyright © 2005 Element K Content LLC. All rights reserved. Web Server Authentication Web client Web server
OV Copyright © 2005 Element K Content LLC. All rights reserved. Web Server Authentication Methods Address-based Anonymous Basic Digest Integrated Certificates
OV Copyright © 2005 Element K Content LLC. All rights reserved. Web Server Vulnerabilities Format string Improper input validation CGI scripts Code outside web root Web server applications Weak authentication Clear text transmissions HTML source code Buffer overflows
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Web Servers Protect data and server while maintaining website access Follow hardening guidelines Requirements will vary
OV Copyright © 2005 Element K Content LLC. All rights reserved. FTP FTP client
OV Copyright © 2005 Element K Content LLC. All rights reserved. FTP Vulnerabilities Basic authentication Anonymous and blind FTP Unnecessary services Clear text transmissions Firewall configuration “Glob” “Bounce” File sharing exploitation
OV Copyright © 2005 Element K Content LLC. All rights reserved. SSH Password Password is encrypted Session is secured slogin
OV Copyright © 2005 Element K Content LLC. All rights reserved. SFTP SSH encryption FTP client
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening FTP Servers Protect the server and data while maintaining service Follow hardening guidelines Requirements will vary
OV Copyright © 2005 Element K Content LLC. All rights reserved. NNTP Subscriber
OV Copyright © 2005 Element K Content LLC. All rights reserved. NNTP Vulnerabilities NNTP Anonymous access Password privacy Data privacy integration
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening an NNTP Server Prevent unauthorized postings and data loss while maintaining service Follow hardening guidelines Requirements will vary NNTP
OV Copyright © 2005 Element K Content LLC. All rights reserved. SMTP client server
OV Copyright © 2005 Element K Content LLC. All rights reserved. Vulnerabilities worms Malicious code 8.3 file names Data buffers Spam Hoaxes SMTP relays
OV Copyright © 2005 Element K Content LLC. All rights reserved. PGP Public security Encrypt message contents and encrypt key Digital signing
OV Copyright © 2005 Element K Content LLC. All rights reserved. S/MIME Security for attachments Various attachment file formats Encryption and digital signing
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Servers Protect server and mail data while supporting users Follow hardening guidelines Requirements will vary
OV Copyright © 2005 Element K Content LLC. All rights reserved. Conferencing and Messaging Vulnerabilities Sniffing Eavesdropping Privacy Social engineering
OV Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Conferencing and Messaging Servers Protect server and data, prevent spoofing, maintain service availability Follow hardening guidelines Requirements will vary
OV Copyright © 2005 Element K Content LLC. All rights reserved. Reflective Questions 1.Which internetwork connection device do you think is most important to secure? 2.Which provides a greater security threat to your organization: your border router or your infrastructure?