IS3440 Linux Security Unit 6 Using Layered Security for Access Control

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Linux+ Guide to Linux Certification, Second Edition Chapter 15 Configuring Network Services and Security.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Lesson 19: Configuring Windows Firewall
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
1 Enabling Secure Internet Access with ISA Server.
1 Guide to Network Defense and Countermeasures Chapter 6.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Chapter 13 – Network Security
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 11: Remote Access Fundamentals
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NETWORK SECURITY USING IPTABLES. TOPICS OF DISCUSSION NETWORK TRAFFIC IN PRESENT SCENARIO !! WHY WE NEED SECURITY ? T TYPE OF ATTACKS & WAYS TO TACKLE.
Advanced Unix Chapter 14. Network Tools There are many, many network tools that come with a standard Linux installation. There are many, many network.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Unit - III. Providing a Caching Proxy Server (1) A caching proxy server is software that stores (caches) frequently requested internet objects such as.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Chapter 4: Implementing Firewall Technologies
Firewalls2 By using a firewall: We can disable a service by throwing out packets whose source or destination port is the port number for that service.
Quiz 2 -> Exam Topics Fall Chapter 10a - Firewalls Simple Firewall - drops packets based on IP, port Stateful - Keeps track of connections, set.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
LINUX® Netfilter The Linux Firewall Engine. Overview LINUX® Netfilter is a firewall engine built into the Linux kernel Sometimes called “iptables” for.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
PRESENTED BY ALI NASIR BITF13M040 AMMAR HAIDER BITF13M016 SHOIAB BAJWA BITF13M040 AKHTAR YOUNAS BITF13M019.
NAT、DHCP、Firewall、FTP、Proxy
Module 3: Enabling Access to Internet Resources
Instructor Materials Chapter 7: Access Control Lists
Introduction to Operating Systems
Firewalls Dr. X (Derived from slides by Prof. William Enck, NCSU)
FIREWALL configuration in linux
Enabling Secure Internet Access with TMG
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
FTP - File Transfer Protocol
IS3440 Linux Security Unit 3 User Account Management
Introducing ACL Operation
Chapter 4: Access Control Lists (ACLs)
Unit 27: Network Operating Systems
IIS.
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
IS3440 Linux Security Unit 4 Securing the Linux Filesystem
IS4680 Security Auditing for Compliance
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
IS3440 Linux Security Unit 2 Securing a Linux Platform―Core Components
Setting Up Firewall using Netfilter and Iptables
IS3440 Linux Security Unit 7 Securing the Linux Kernel
Configuring Internet-related services
OPS235: Configuring a Network Using Virtual Machines – Part 2
COP 4343 Unix System Administration
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Securing Windows 7 Lesson 10.
Presentation transcript:

IS3440 Linux Security Unit 6 Using Layered Security for Access Control

Class Agenda 4/20/16 Covers Chapter 7 Learning Objectives Discussion on Lab Activities. Lab will be perform in class. Break Times as per School Regulations.

Learning Objective Assess how firewall, Transmission Control Protocol (TCP) Wrappers, and Security Enhanced Linux (SELinux) complement one another to secure network applications.

Key Concepts Basic layered security concepts of a Linux infrastructure Firewall with iptables Application layer security with TCP Wrappers Benefits of mandatory access control (MAC) with SELinux

EXPLORE: CONCEPTS

SELinux Security-Enhanced Linux (SELinux) is a mandatory access control (MAC) security mechanism implemented in the kernel SELinux follows the model of least-privilege more closely

Modes of SELinux SELinux has three basic modes of operation Disabled: 9/20/2018 Modes of SELinux SELinux has three basic modes of operation Disabled: SELinux is turned off Permissive: SELinux is enabled but will not enforce the security policy, only warn and log actions. For troubleshooting Enforcing The default mode which will enable and enforce the SELinux security policy on the system. To temporarily turn off SELinux for troubleshooting, issue the “setenforce 0” command. To turn on SELinux, issue the “setenforce 1” command. (c) ITT Educational Services, Inc.

Common SELinux Commands chcon: For changing the security context of a file or files Id -Z: To show the current user context ls -Z: To show the context of a file or files Refer to Table 7-2 on pages 203–204 of the textbook for other SELinux commands.

EXPLORE: PROCESSES

Network services Security Controlling access to network services is one of the most important security tasks facing a server administrator The iptables-based firewall filters out unwelcome network packets TCP Wrappers add an additional layer of protection by defining which hosts are or are not allowed to connect to "wrapped" network services

IPTables Advanced tools for network packet filtering Kernel versions prior to 2.4 relied on ipchains for packet filtering The 2.4 kernel introduced iptables (also called netfilter) Iptables is administration tool for IPv4 packet filtering and NAT

Designing a Firewall Turn on the Firewall. Check if rules that should be cleared are in place ? Yes Flush the current rules using the iptables –F command. List current rules using the iptables –L command . No Write firewall rules for INPUT, OUPUT, and FORWARD chains. Save the new rules using the iptables-save command.

Aadvantages over other network service control techniques: TCP Wrappers package The TCP Wrappers package (tcp_wrappers) is installed by default and provides host-based access control to network services Aadvantages over other network service control techniques: Transparency to both the client and the wrapped network service Centralized management of multiple protocols

TCP Wrappers Configuration Files To determine if a client is allowed to connect to a service, TCP Wrappers reference the following two files, which are commonly referred to as hosts access files: /etc/hosts.allow /etc/hosts.deny

Creating TCP Wrapper Rules The TCP Wrapper rules on the next two slides are created to allow Secure Shell (SSH) access to the fictitious site is418.com. These rules are also used to log all access with a message and date while denying access to all other users.

Creating TCP Wrapper Rules (Continued) Step 1 Open the /etc/hosts.allow file using a text editor. Step 2 Type the following rule to allow and log access from the is418.com domain: ssh:.is418.com:spawn /bin/echo `/bin/date` ssh access granted >> /var/log/sshd.log Step 3 Save and exit.

Creating TCP Wrapper Rules (Continued) Step 4 Open the /etc/hosts.deny file using a text editor. Step 5 Type the following rule to deny everyone else: sshd:ALL Step 6 Save and exit.

EXPLORE: ROLES

Firewall and TCP Wrappers Add, remove, and edit rules to a packet filter ruleset List and flush the rules to a packet filter ruleset List counters of matched packets to rules Iptables Provides iptables packet filter in the kernel Performs stateless and stateful packet filtering Provides network address translation Netfilter Allow or deny access to an application based on an Internet Protocol (IP) Address or hostname Allow or deny access to an application based on time TCP Wrappers

EXPLORE: CONTEXTS

Layered Security for FTP Access Firewall TCP Wrapper SELinux Protects against unauthorized traffic Performs specific actions based on a network service running under the xinetd super server Protects the network service from unauthorized access based on the subject, such as users, applications, or files Allows access to FTP from local traffic only Sends an e-mail to the administrator when access is granted during nonbusiness hours Denies access to home directories to logged-in users

xinetd xinetd (extended Internet daemon) is an open-source super-server daemon which runs on many Unix-like systems and manages Internet-based connectivity.

EXPLORE: RATIONALE

Importance of Firewalls Can be enabled on bastion hosts in addition to existing network firewalls Provide a layer of security at the network layer to restrict unauthorized traffic Can protect bastion hosts from malicious local network traffic

Importance of TCP Wrappers Adds a layer of security in addition to firewalls Can allow and restrict access to an application based on domain name and time of the day Can spawn processes such as e-mail and logging

Summary In this presentation, the following concepts were covered: SELinux and its commands Firewall and TCP Wrappers and their importance Process of designing a firewall by using iptables and creating TCP Wrapper rules Layered security for FTP access

Assignment Discussion 6.1 Determining Firewall Rules Lab 6.2 Apply Hardened Security for Controlling Access