COMP3371 Cyber Security Richard Henson University of Worcester November 2015.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
Enabling Secure Internet Access with ISA Server
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Internet Protocol Security (IPSec)
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
Course 201 – Administration, Content Inspection and SSL VPN
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 6: Packet Filtering
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
COMP3123 Internet Security Richard Henson University of Worcester November 2010.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
The Intranet.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
COMP1321 Digital Infrastructure Richard Henson March 2016.
Defining Network Infrastructure and Network Security Lesson 8.
COMP3123 Internet Security Richard Henson University of Worcester November 2011.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
IPSec Detailed Description and VPN
Virtual Private Networks
Remote Access Lecture 2.
Richard Henson University of Worcester November 2016
Networking for Home and Small Businesses – Chapter 6
Richard Henson University of Worcester November 2017
Goals Introduce the Windows Server 2003 family of operating systems
Cengage Learning: Computer Networking from LANs to WANs
Richard Henson University of Worcester October 2018
Virtual Private Network zswu
Presentation transcript:

COMP3371 Cyber Security Richard Henson University of Worcester November 2015

Week 6: Securing LAN–LAN data using Firewalls, VPNs, etc. n Objectives:  Relate Internet security to the TCP/IP protocol stack  Explain principles of firewalling  Explain what a Proxy Service is, and why it can be a more flexible solution than a firewall  Explain Internet security solutions that use the principles of a VPN

Security and the OSI layers n Simplified TCP/IP n Leaves out level 1 (physical) level 2 (data link), and combines levels 5/6/7) TELNETFTP NFSDNS SNMP TCP UDP IP (network) SMTP

TCP/IP and the Seven Layers n TCP (Transport Control Protocol) and IP (Internet Protocol) only make up part (layers 3 & 4) of the seven layers  upper layers interface with TCP to produce the screen display  lower layers required to interface with IP to create/convert electrical signals n Each layer interface represents a potential security problem (!) IP hardware screen TCP

Intranet n Misunderstood term  achieved by organisations using http to share data internally in a www-compatible format  Many still call a protected file structure on its own an Intranet… (technically incorrect!)  uses secure user authentication  uses secure data transmission system n Implemented as EITHER:  single LAN (domain) with a web server  several interconnected LANs (trusted domains) »cover a larger geographic area

Extranet n An extension of the Intranet to cover selected trusted “links”  e.g. for an organisation the “trusted” links might be to customers and business partners  uses the public Internet as its transmission system  requires authentication to gain access n Can provide TCP/IP access to:  paid research  current inventories  internal databases  OR virtually any information that is private and not published for everyone

Issues in creating an Extranet n Public networks…  Security handled through appropriate use of secure authentication & transmission technologies… n If using the Internet…  client-server web applications across different sites  BUT security issues need resolving n Private leased lines between sites do not need to use http, etc.  more secure, but expensive (BALANCE)

Securing Authentication through Extranets n Kerberos and trusted domains…  Windows networks… n BUT…  several TCP ports used for authentication when establishing a session… n Solution:  firewall configured to allow relevant ports to be opened only for “trusted” hosts

Securing Sharing of Data through Extranets n Extranet client uses the web server & browser for user interaction  standard http protocol to display html data n Raw HTML data will pass through the firewall (port 80) to the Internet  could be “sensitive data” for the organisation… n Under IETF guidance, Netscape ~ SSL with secure version of http…  standardised as http-s (secure http) on port 443

The Internet generally uses IP - HOW can data be secured? 2015: more than a billion hosts!

Securing the Extranet n Problem:  IP protocol sends packets off in different directions according to: »destination IP address »routing data  packets can be intercepted/redirected n One solution: »secure level 7 application layer www protocols developed n https: ensure that pages are only available to authenticated users n ssh : secure download of files »secure level 4 transport (TLS) protocol to restrict use of IP navigation to only include secure sites n What about penetration through other protocols, working at different OSI layers?

Other Secure level 7 protocols n Telnet and FTP:  can use authentication  BUT DO NOT use encrypted text… n SSH (Secure Shell)  SSH , University of Helsinki, secure file transfer »uses TCP port 22 »runs on a variety of platforms  Enhanced version SSH-2 »using the PKI »including digital certificates »RFC 4252 – recent, 2006

... ROUTER – no packet filtering INTERNET/EXTERNAL NETWORK Internal Network Unsecured LAN-Internet Connection: Router Only

An Unsecured LAN-Internet Connection via Router router Layer 3 Layer 1 Layer 2 Layer 3 Layer 2 Layer 1 Data through unchanged

Lower OSI layers security (Stage 1) n Simple Firewall…  use packet filtering  IP address-based »Fooled by “IP spoofing”

Creating a “Secure Site”? n To put it bluntly…  secure site is a LAN that provides formidable obstacles to potential hackers  keeps a physical barrier between local server and the internet n Physical barrier linked through an intermediate computer called a Firewall or Proxy Server  may place unnecessary restrictions on access  security could be provided at one of the seven layers of the TCP/IP stack

... FIREWALL – packet filtering INTERNET/EXTERNAL NETWORK Internal Network Unsecured LAN-Internet Connection: Firewall

An Unsecured LAN-Internet Connection via Firewall n IP filtering will slow down packet flow… n Also…  request by a LAN client for Internet data across a router reveals the client IP address »generally a desired effect…. n “local” IP address must be recorded on the remote server n picks up required data & returns it via the router and server to the local IP address »problem – could be intercepted, and future data to that IP address may not be so harmless…

An Unsecured LAN-Internet Connection via Router n Another problem: wrath of IANA  IP address awarding & controlling body  big penalties if ANY internal LAN IP address conflicts with an existing Internet IP address they allocated… n Safeguard:  use DHCP (dynamic host configuration protocol)  allocate client IP from within a fixed range allocated to that domain by IANA

... GATEWAY – packet conversion INTERNET/EXTERNAL NETWORK Internal Network A LAN-Internet connection via Gateway e.g. TCP/IP local protocol

A LAN-Internet connection via Gateway n At a gateway, processing can be at higher OSI levels:  >= level 4 n Local packets converted into other formats…  remote network does not have direct access to the local machine  IP packets only recreated at the desktop  local client IP addresses therefore do not need to comply with IANA allocations

... Proxy Server – local IP addresses INTERNET/EXTERNAL NETWORK Internal Network A LAN-Internet connection via Proxy Server e.g. TCP/IP local protocol

The Proxy Server n Acts like a Gateway in some respects:  provides physical block between external and internal networks n But can still use the same protocol (e.g. TCP/IP), and can cache web pages for improved performance

Firewall Configuration n Blocks data via TCP port (logical)  used by each application protocol connects to TCP  all ports blocked… no data gets through n Configuration  includes which ports to block as well as which IP addresses to block…  Includes auditing of packets

VPNs: OSI levels 1-3: restricted use of the Physical Internet VPN shown in green

VPNs (Virtual Private Networks) n Two pronged defence:  physically keeping the data away from unsecured servers… »several protocols available for sending packets along a pre-defined route  data encapsulated and encrypted so it appears to travel as if on a point-point link but is still secure even if intercepted n Whichever protocol is used, the result is a secure system with pre-determined pathways for all packets

Principles of VPN protocols n The tunnel the private data is encapsulated n The tunnel - where the private data is encapsulated n The VPN connection - where the private data is encrypted

Principles of VPN protocols n To emulate a point-to-point link:  data encapsulated, or wrapped, with a header »provides routing information »allows packets to traverse the shared public network to its endpoint n To emulate a private link:  data encrypted for confidentiality n Any packets intercepted on the shared public network are indecipherable without the encryption keys…

Potential weakness of the VPN n Once the data is encrypted and in the tunnel it is very secure n BUT  to be secure, it MUST be encrypted and tunnelled throughout its whole journey  if any part of that journey is outside the tunnel… »e.g. network path to an outsourced VPN provider »obvious scope for security breaches

Using a VPN as part of an Extranet

Using a VPN for point-to-point

Using a VPN to connect a remote computer to a Secured Network

VPN-related protocols offering even greater Internet security n Two possibilities are available for creating a secure VPN:  Layer 3: »IPsec – fixed point routing protocol  Layer 2 “tunnelling” protocols »encapsulate the data within other data before converting it to binary data: n PPTP (Point-point tunnelling protocol) n L2TP (Layer 2 tunnelling protocol)

IPsec n First VPN system  defined by IETF RFC 2401  uses ESP (encapsulating security protocol) at the IP packet level n IPsec provides security services at the IP layer by:  enabling a system to select required security protocols (ESP possible with a number of encryption protocols)  determining the algorithm(s) to use for the chosen service(s)  putting in place any cryptographic keys required to provide the requested services

More about IPSec in practice n Depends on PKI for authentication  both ends must be IPSec compliant, but not the various network systems that may be between them… n Can therefore be used to protect paths between  a pair of hosts  a pair of security gateways  a security gateway and a host n Can work with IPv4 and IPv6

Layer 2 Security: L2TP n Microsoft hybrid of:  their own PPTP  CISCO’s L2F (layer 2 forwarding) n With L2TP, IPSec is optional:  like PPTP: »it can use PPP authentication and access controls (PAP and CHAP!) »It uses NCP to handle remote address assignment of remote client  as no IPSec, no overhead of reliance on PKI