Security fundamentals Topic 7 Securing network communications.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Guide to Network Defense and Countermeasures Second Edition
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Virtual Private Networks
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Windows Server 2008 Chapter 9 Last Update
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
Remote Access Chapter 4. IEEE 802.1x An internet standard created to perform authentication services for remote access to a central LAN. An internet standard.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Microsoft Windows NT 4.0 Authentication Protocols
Radius, LDAP, Radius used in Authenticating Users
Virtual Private Networks (VPN)
Presentation transcript:

Security fundamentals Topic 7 Securing network communications

Agenda Remote access Remote authentication RADIUS and TACACS VPNs and tunnelling Terminal sessions Wireless network security IPSec

Remote access Additional security challenges with RAS networks Traditional: remote access by dialling into modems at corporate office VPNs use existing internet connections – no control over how packets flow

Dial-up connections Bank of modems connected to remote access server RAS server authenticates the user RAS server routes packets between remote computer and corporate network Uses PPP (Point-to-Point) or SLIP (Serial Line Internet Protocol) SLIP does not support encryption and transmits passwords in clear text Connection level security from RAS server: CBCP (Call-Back Control Protocol) – either end calls back on a supplied number or prearranged number (access only from specific location) – Accepts or reject calls based on caller ID or automatic number identification

Dial-up connections Advantages: – Limited access for attackers (long distance rates) – Low likelihood of eavesdropping (requires access to telephone lines/exchange) Disadvantages: – Cost – equipment, line rental, call charges – Low productivity – limited connection speed – War dialling – dialling numbers to determine if modem attached

Virtual Private Networks – Both sides establish an encrypted session with each other over the internet – Connection is assigned IP addresses and uses a virtual adapter VPN tunnel – a secure connection through the internet

Virtual Private Networks Advantages: – Low costs: modems are not required, local call to ISP – High productivity: Broadband connection at remote users end means faster connection speed – Fewer external connection points: A single device (firewall) to handle multiple client connections – limits the attack surface – only one connection point Disadvantages: – Risk of attack: potential attacks from Internet to compromise RAS server – Risk of eavesdropping: potential to intercept traffic and decrypt it – High exposure to attackers: if remote user’s computer is not secure there is a risk to the corporate network

Remote connection requirements Common protocols at physical and data link layers Secure communications RAS - authenticate remote user Common data-link layer protocols: – Point-to-point connections: PPP or SLIP – Network and transport protocols: TCP/IP – Remote computer is assigned an IP address and other parameters for virtual adapter – generally DHCP Host and remote software: – Remote user requires a VPN client program – Host or server requires VPN server service Security: – Control access to resources – only authenticated and authorised users – Limit access of remote users to only those resources required

Authentication methods PAP: (Password Authentication Protocol) – password sent in clear text SPAP: (Shiva Password Authentication Protocol) – a reversible encryption mechanism more secure but does not prevent attacker impersonating a legitimate RAS server CHAP: (Microsoft® Challenge Handshake Authentication Protocol) – uses MD5 hashing algorithm – Server sends session ID and random value (challenge) to client – client creates a hash from session ID, challenge and password and sends to server. Password is never sent.

Authentication methods MS-CHAP: (Microsoft® Challenge Handshake Authentication Protocol) support domain login capabilities – MD4 hash comprising challenge string, session ID and password MS-CHAPv2: – Version 2, larger initial encryption key and support for bidirectional challenge so that client also sends a challenge to the server to authenticate itself EAP: (Extensible Authentication Protocol) – Supports multitude of authentication mechanisms: passwords, tokens, Kerberos and smart cards – Highly secure and flexible

Centralised authentication RAS authenticates users against a user accounts database such as ADS RAS forwards the authentication messages to a central server that authenticates the user against a central database

Centralised authentication Steps: 1.RAS queries the user for credentials 2.Client sends authentication information 3.RAS forwards authentication information to a central authentication server 4.Central server checks users credentials against user account database: ADS, Novell e-directory, Unix NIS 5.Authentication server returns success or failure to RAS 6.If success, RAS allows client onto the network RAS servers contain no user account data – less risk of compromise Protocols: – RADIUS: Remote Authentication Dial-In User Service – TACACS+: Terminal Access Controller Access Control Service

RADIUS Provides AAA – authentication, authorisation and accounting for RAS servers RADIUS protocol used to establish connection from RAS to authentication server or RADIUS Server Separation of remote access and user authentication to allow: RADIUS client (RAS server) and Server can use different OS and hardware architectures – different vendor implementation of RADIUS work with each other RADIUS client and server can be geographically separated User accounts are secure because they are located on internal corporate network Authentication traffic between RADIUS client and server can be encrypted Can outsource RAS servers to third party organisation

RADIUS RADIUS separates authentication from remote access functions: – Can use variety of authentication protocols: CHAP, MS-CHAP – Encrypt with variety of algorithms: MPPE, DES – Create connections with a variety of protocols: TCP/IP, IPX/SPX – Allow connections by using a variety of technologies: dialup, DSL, ISDN RADIUS servers can maintain remote access policies, inform users of such and enforce policies: – Includes protocols the user is allowed to use – Length of time that the user can be connected – Operating system that the user can use Case-sensitive shared secret password is set on RADIUS Server and RADIUS Client – never sent over the network – hashing algorithm used to verify shared secret, to authenticate RADIUS server and client and to encrypt authentication information.

RADIUS accounting Tracks the following: – Length of time the remote user is connected – Remote user authentication success or failure – Situation when the RADIUS server cannot authenticate a RADIUS client ISPs use RADIUS to bill customers

RADIUS authentication 1.RAS receives a connection request from remote access client 2.RAS configured as RADIUS client, creates an Access-Request message and sends it to the RADIUS server 3.RADIUS server processes message If required RADIUS Server sends an Access-Challenge to RAS RAS server or remote access client process challenge and sends a new Access- Request to RADIUS server User credentials are verified – connection to ADS or user accounts DB Remote access policies are evaluated – is client allowed access to network 4.If connection is authenticated and authorised, RADIUS server sends an Access- Accept message to remote access server or sends Access-Reject message 5.RAS server receives Access-Accept message – sends an accounting request message to RADIUS server 6.RADIUS server processes accounting request message and sends an accounting response message to RAS (RADIUS client) 7.Client connection is completed

TACACS and TACACS+ Cisco AAA protocol Standard method to manage dissimilar NAS network access servers NAS provides connections to single user, network or interconnected networks TACACS+ has replaced TACACS – not compatible

TACACS and TACACS+ Supports: – Authentication: forwards username and password in these formats: ARA (Apple Remote Access), SLIP, PAP, CHAP, telnet, KCHAP (Kerberos CHAP) Authentication data hashed with MD5 Supports multiple challenge and responses as required for token based authentication (OTP password) – Authorisation: Mechanism to give an access server a pointer to an ACL associated with a user. ACL specifies which resources can be accessed once authenticated – Accounting: Accounting protocol part of TACACS+ contains network address of user, username, service attempted, protocol used, time and date and packet filter – all logged Auditing information includes commands and arguments used and the connection associated with it. Protocol can provide intruder detection routines, reporting statistics, number of packets and number of bytes

RADIUS and TACACS differences RADIUS runs over UDP, TACACS+ runs over TCP RADIUS provides a user profile with authentication that defines user specific parameters, TACACS+ separates the authentication and authorisation functions TACACS+ typically used for network devices such as routers and switches RADIUS used for computers and network devices

Virtual Private Networks Protocols used to establish VPN tunnel: – PPTP: Point-to-Point Tunnelling Protocol – L2TP: Layer 2 Tunnelling Protocol – IPSec: Internet Protocol Security: architecture, protocol and IKE (Internet Key Exchange) protocol

PPTP Point-to-Point Tunnelling Protocol PPTP client computer establishes a control connection to server using TCP port 1723 > PPTP tunnel is established GRE (Generic Routing Encapsulation) protocol used to send data Characteristics: – Layer 2 protocol encapsulates PPP frames in IP datagrams – PPTP uses PAP, CHAP, MS-CHAP for authentication – Requires an IP based network and does not support header compression – provide encryption – IP packet is encapsulation into a PPP frame which is encapsulated into a VPN IP packet – All data sent through the tunnel is encrypted – PPTP supports many protocols and multicast – can be established across networks that use NAT

L2TP IETF standard L2TP encapsulates PPP frames for sending over IP, X.25, frame relay or ATM networks L2TP over IP uses UDP port 1701 and includes control messages for tunnel maintenance Encapsulated frames can be encrypted or compressed however L2TP has no mechanism for encryption or authentication – use with another protocol - IPSec L2TP over IPSec: L2TP provides encapsulation and IPSec in transport mode provides strong integrity, replay, authenticity and privacy protection Authentication options: CHAP, MSCHAP, MSCHAPv2, EAP Some NAT implementations cannot use IPSec tunnel mode, use NAT-T transversal technology to encapsulate IPSec in UDP

Comparing VPN solutions L2TP/IPSec: – Multivendor interoperability – Client to gateway and gateway to gateway – IPSec may have issues with NAT PPTP: – Early implementations have lower security – Security of PPTP depends on strength of users password – No NAT limitations

Securing VPN connections Choose a protocol that provides a secure authentication method and encrypts the data Monitor traffic that originates from VPNs after it has been decrypted on RAS Require multifactor authentication – such as smart card Ensure computers connecting with VPN meet corporate security policies (antivirus, quarantine if configuration not sufficient) Ensure that after VPN is established, no routes to internet exist in client computer that bypass your network – hacker may gain access via VPN

Terminal sessions Remotely access a single computer: all processes run on remote computer but session takes input from another computer and redirects output to that computer: terminal services, remote desktop and VNC Terminal services also allows multiple users to simultaneously establish sessions and run programs on a single computer. Provide an alternative to remote access connections Useful administrator tool however also create security risks Use strong encryption for the terminal session and prevent users from accessing other users data

Secure shell protocol SSH lets users log onto a remote computer, execute commands and moves files from one computer to another Provides strong authentication and secure communications over unsecured channels SSH2 is a replacement for FTP Encrypts passwords and data, host and user authentication, data compression, data confidentiality, strong encryption, host authentication and integrity protection

SSH 3 major components: – Transport layer SSH-TRANS secure authentications, confidentiality and network integrity – encryption is an option – typically runs over TCP/IP but can be used over any reliable data stream – User authentication protocol SSH-USERAUTH – authenticates the user at the client computer to the server – Connection protocol SSH-CONN multiplexes the encrypted tunnel into several logical channels SSH uses PKI- public key encryption for user authentication, however older methods may be used PKI ensures that users cant access a host for which they do not have a public key SSH also provides protection from packet spoofing, IP/Host spoofing, password sniffing and eavesdropping

Wireless threats Data can be intercepted without requiring physical access Common risks: – Theft of service: free access to internet – Eavesdropping: intercepted traffic – Unauthorised access: to corporate information Basic defences: – Limit the range of transmissions – do a site survey periodically to detect signal strength and unauthorised APs – Don't broadcast the SSID – harder for a hacker to determine existence of WLAN – Restrict access based on MAC address (MAC addresses can be spoofed by hacker) – Put all APs in a separate network segment and limit the type of traffic allowed from network into corporate network

Wireless security WEP (Wired Equivalency Protocol) WPA (Wi-Fi Protected Access) 802.1x WAP (Wireless Application Protocol)

IPSec Layer 3 protocol that provides authentication and encryption for IP traffic Situations for implementation: – End- to end security for IP unicast traffic – transport mode – Remote access VPN client to gateway – L2TP and IPSec transport mode – Site-to-site VPNs using L2TP/IPSec or IPSec tunnel mode Open protocol and interoperable Windows has built in support for IPSec clients Transparent protection for layer 3 and above protocols: IPSec policy defines the types of traffic that require encryption and/or digital signing

IPSec features ESP and AH – ESP: provides encryption and signing – AH: signs traffic but does not encrypt Tunnel and transport modes – Transport mode – end to end security – protects entire data path between sender and receiver – Tunnel mode – secures the channel between the VPN gateways Protection from: – Man-in-the-middle attacks – both parties authenticate – Spoofing – digital signing to verify integrity – Replay attacks – sequence numbers

IPSec features Before communication both parties negotiate a SA (Security Association) – determines what authentication and encryption methods will be used IPSec uses IKE (Internet Key Exchange) for authentication VPN devices. IKE uses: – Kerberos – Certificates – Password pre-shared authentication keys

Lesson summary Methods and security aspects of remote access and authentication How RADIUS and TACACS are used to provide AAA The security benefits and types of tunnelling and VPNs The security of terminal sessions, wireless networks and the uses and details of IPSec