900 likes | 1.02k Views
Internet & Web Security. Overview. Encryption and authentication ... Communication and data-sharing applications ... Web security and firewalls. Encryption and authentication. Foundations of Internet security Data confidentiality and integrity Authentication Example systems.
E N D
Overview • Encryption and authentication ... • Communication and data-sharing applications ... • Web security and firewalls ...
Encryption and authentication ... • Foundations of Internet security • Data confidentiality and integrity • Authentication • Example systems
Communication and data-sharing applications ... • Mail and news • Virtual terminal services • File sharing • Example systems
Web security and firewalls ... • WWW security • Network security issues • SATAN • Useful tools
Foundations of Internet security ... • Internet security ... • Layered protocol models ... • Security and Layered Internet Protocols ...
Internet security ... • Authentication ... • Access control ... • Integrity ... • Confidentiality ...
Authentication ... • Something you are (SYA) • Something you know (SYK) • Something you have (SYH)
Access control ... • Who gets access to what • Authentication, rights, privileges
Integrity ... • Current vs. original (pure) condition of data
Confidentiality ... • E-mail "like postcards" • FTP, WWW
Layered protocol models ... • Protocol message contents ... • Identities • Sender, receiver • Message length • Message data • Layered protocols ... • Protocol enveloping ... • OSI reference model ... • Internet TCP/IP model ... • Protocol enveloping in TCP/IP ...
Layered protocols ... • N layers
OSI reference model ... • Open Systems Interconnection abstract model • Does not define: PL bindings, OS bindings, API issues, UI issues • Defines: 7 protocol layers ...
Defines: 7 protocol layers ... • Physical ... • Data link ... • Network ... • Transport ... • Session ... • Presentation ... • Application ...
Physical ... • Network transmission medium • E.g., coaxial, twisted-pair, fiber-optic • Raw bit-stream service • Responsible only for writing / reading bits to / from physical medium
Data link ... • Group bits into frames • Goal: reliable delivery mechanism • Error detection • Noise, interference • Collisions • Flow control • Avoid unnecessary frame loss • Saturated buffers
Network ... • Extend data link layer • From local to neighboring / distant networks • E.g., Ethernet, Token Ring • Incompatible physical and link layers • ==> Internetworks (networks of networks) • Topology: routers • Two network layer services ...
Two network layer services ... • connection-oriented (CO) • "reliable" / "virtual-circuit" • well ordered data stream • guarantee lost, order, duplicate • connectionless (CL) • "unreliable" / "datagram" • no guarantees
Transport ... • higher-level tasks (not end-to-end delivery) • multiplexing • OSI: 5 incompatible transport protocols • CL, w/ CL network • CL, w/ CO network • CO, w/ CO network • CO, w/ CL network • highest network aware
Session ... • how data exchanged in dialog • two-way simultaneous (full-duplex) • two-way alternate (half-duplex) • one-way (simplex) • checkpointing • synch points in data stream • resume aborted transfer at last encountered synch point
Presentation ... • hide diff in data rep'n • e.g., ASCII vs. EBCDIC • generic rep’n w/ ISO ASN.) spec ...
generic rep'n w/ ISO ASN. spec ... • (Abstract Syntax Notation One) • Boolean • Integer (arb. length) • Real (arb. length & prec.) • Enumerated (days of week, months of year, etc.) • Bit string (arb. length) • Octet (byte) string (arb. length) • Null (any undef'd value)
Application ... • service consumer • via APIs
Internet TCP/IP model ... • 5 layers • physical, data link, network, transport, application • session, presentation • by application, w/ assistance of API • Network layer: IP ... • Transport layer: TCP & UDP ... • Application layer ...
Network layer: IP ... • move data between endpoints • if not on same host ==> routing • IP protocol • IP datagram (packet)
Transport layer: TCP & UDP ... • Transmission Control Protocol (TCP) • connection-oriented • User Datagram Protocol (UDP) • connectionless
Application layer ... • FTP • SMTP: Simple Mail Transfer Protocol • NNTP: Network News • HTTP
Protocol enveloping in TCP/IP ... • Application data --> TCP segment --> IP datagram --> Ethernet frame
Security and Layered Internet Protocols ... • Physical and link layer ... • Security at the IP layer ... • TCP/UDP layer ... • Application layer ...
Physical and link layer ... • physical transmission medium • access control • confidentiality
Security at the IP layer ... • network snooping (sniffing) ... • Message replay ... • Message alteration ... • Message delay and denial ... • Authentication issues ... • Unauthorized access ... • Routing attacks ...
network snooping (sniffing) ... • abuse of tools for debugging / network problems ... • network interface into promiscuous mode ... • solution: encrypt
abuse of tools for debugging / network problems ... • e.g., Network General's Expert Sniffer • etherfind (SunOS) • tcpdump (free on Internet) • Sniffer FAQ • comp.security, news.answers • ftp://ftp.iss.net/pub/faq/sniff • http://www.iss.net/iss/sniff.html
network interface into promiscuous mode ... • report all packets to sniffer • display / record • analyze • super user on unix / VMS • remote also possible
Message replay ... • snoop & record conversation between systems A & B • play back messages from A to B • replay, as if A • e.g., restore earlier password file (and account)
Message alteration ... • modify contents • modify checksomes to cover alterations • solution: encrypt for data integrity
Message delay and denial ... • delay: datagrams held indefinitely • unauthorized control of router • authenticate to prevent • denial: datagrams discarded before delivery • overwhelm router / other comm. end system • datagram overflow ==> lost
Authentication issues ... • address masquerading ... • address spoofing ...
Address masquerading ... • configure network interface w/ other system's IP address • NFS: access solely based on IP address • one system down, another can masquerade
Address spoofing ... • aka TCP sequence number attack • exploits weakness of TCP • net effect at IP layer • How ... • Defense ...
How ... • Legitimate 3-way handshake A <--> B ... • C impersonates A ...
Legitimate 3-way handshake A <--> B ... • A --> B: SYN + ISN(A) (initial sequence number) • A <-- B: SYN + ISN(B) + ACK(ISN(A)) • A --> B: ACK(ISN(B)) • A <--> B: application data
C impersonates A ... • C --> B: counterfeit IP datagram SYN + ISN(C) • A <-- B: SYN + ISN(B) + ACK(ISN(C)) • A down; doesn't know • C --> B: ACK(ISN(B)) • C predicts ISN(B) • TCP ISN generator: 32-bit clock (w/ time) • C --> B: rsh command
Defense ... • 1. no address-based auhentication • 2. screening router • filter packets based on configurable rules • inbound attacks from outside • outbound attacks from inside
Unauthorized access ... • Packet filtering • Screeing router • Firewall
Routing attacks ... • normally: dynamic routing • instead: source routing (legit for tests) • use to bypass filter • or, pass through attacking location • alteration, delay, denial • ICMP (Internet Control Message Protocol) redirects
TCP/UDP layer ... • Some of same problems as at IP layer • No guarantee of confidentiality • packet filtering • hijacking • modify controls through "hijacked" privileges • e.g., steal telnet session
Application layer ... • Application gateways ... • APIs ...