Survey of Information Assurance Review of TCP/IP.

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
1 Internet Protocol Version 6 (IPv6) What the caterpillar calls the end of the world, nature calls a butterfly. - Anonymous.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
Introduction1-1 message segment datagram frame source application transport network link physical HtHt HnHn HlHl M HtHt HnHn M HtHt M M destination application.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
CSE551: Computer Network Review r Network Layers r TCP/UDP r IP.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Instructor: Sam Nanavaty TCP/IP protocol. Instructor: Sam Nanavaty Version – Allows for the evolution of the protocol IHL (Internet header length) – Length.
1 Chapter 3 TCP and IP. Chapter 3 TCP and IP 2 Introduction Transmission Control Protocol (TCP) Transmission Control Protocol (TCP) User Datagram Protocol.
CP476 Internet Computing TCP/IP 1 Lecture 3. TCP / IP Objective: A in-step look at TCP/IP Purposes and operations Header specifications Implementations.
CS3505 The Internet and Info Hiway transport layer protocols : TCP/UDP.
Transport Layer – TCP (Part1) Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 7: Objectives Part 1
Chapter 7 – Transport Layer Protocols
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 32 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 5-1 Internet Protocol (IP): Packet Format, Fragmentation, Options Shivkumar Kalyanaraman Rensselaer.
Network Layer Packet Forwarding IS250 Spring 2010
Internet Control Message Protocol (ICMP). Introduction The Internet Protocol (IP) is used for host-to-host datagram service in a system of interconnected.
IP Protocol. The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing information and some control information that enables.
CSEE W4140 Networking Laboratory Lecture 6: TCP and UDP Jong Yul Kim
Oct 19, 2004CS573: Network Protocols and Standards1 IP: Datagram and Addressing Network Protocols and Standards Autumn
Transport Layer TCP and UDP IS250 Spring 2010
Gursharan Singh Tatla Transport Layer 16-May
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Network Layer ICMP and fragmentation.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
1 Chapter 1 OSI Architecture The OSI 7-layer Model OSI – Open Systems Interconnection.
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
TCP/IP Basic Theory V1.2. Course Outline OSI model and layer function TCP/IP protocol suite Transfer Control Protocol Internet Protocol Address Resolution.
10/13/20151 TCP/IP Transmission Control Protocol Internet Protocol.
The Saigon CTT Semester 1 CHAPTER 10 Le Chi Trung.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
TCP : Transmission Control Protocol Computer Network System Sirak Kaewjamnong.
University of the Western Cape Chapter 12: The Transport Layer.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals.
Copyright 2002, S.D. Personick. All Rights Reserved.1 Telecommunications Networking II Topic 20 Transmission Control Protocol (TCP) Ref: Tanenbaum pp:
© Introduction to Internetworking – Alex Kooijman 04/04/2000 Introduction to internetworking Part Two.
TCOM 515 IP Routing. Syllabus Objectives IP header IP addresses, classes and subnetting Routing tables Routing decisions Directly connected routes Static.
Review the key networking concepts –TCP/IP reference model –Ethernet –Switched Ethernet –IP, ARP –TCP –DNS.
Chapter 81 Internet Protocol (IP) Our greatest glory is not in never failing, but in rising up every time we fail. - Ralph Waldo Emerson.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Layer 3: Internet Protocol.  Content IP Address within the IP Header. IP Address Classes. Subnetting and Creating a Subnet. Network Layer and Path Determination.
Internet Protocols (chapter 18) CSE 3213 Fall 2011.
Lecture 4 Overview. Ethernet Data Link Layer protocol Ethernet (IEEE 802.3) is widely used Supported by a variety of physical layer implementations Multi-access.
CSC 600 Internetworking with TCP/IP Unit 5: IP, IP Routing, and ICMP (ch. 7, ch. 8, ch. 9, ch. 10) Dr. Cheer-Sun Yang Spring 2001.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
1 CSE 5346 Spring Network Simulator Project.
01_NF_Ch04 – OSI Transport Layer ( 傳輸層 ) Source: CCNA Exploration.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
Data Communications and Networks Chapter 6 – IP, UDP and TCP ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
2016/3/16 1 Network Layer. 2016/3/ Layer 3 Functionalities The Network layer provides services to exchange the individual pieces of data over the.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
Packet Switch Network Server client IP Ether IPTCPData.
Lecture 13 IP V4 & IP V6. Figure Protocols at network layer.
Network Layer/IP Protocols 1. Outline IP Datagram (IPv4) NAT Connection less and connection oriented service 2.
Introduction To TCP/IP Networking Mr. Zeeshan Ali, Asst. Professor
Introduction to TCP/IP networking
Network Layer Protocols
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Internetworking Outline Best Effort Service Model
Net 323 D: Networks Protocols
Chapter 15. Internet Protocol
Introduction to Networks
NET 323D: Networks Protocols
Transport Layer 9/22/2019.
Presentation transcript:

Survey of Information Assurance Review of TCP/IP

Agenda Brief review of TCP/IP Protocol stack and TCP/IP hierarchal model Detailed discussion of Transport Control Protocol Detailed discussion of Internet Protocol Discussion on limitations of TCP/IP and possible solutions.

Scope of Discussions The following are not covered in today’s presentation:  Implementation details/flaws of TCP/IP protocol stack for generic or specific systems  Detailed discussion on EACH of protocols treated as a part of TCP/IP Protocol Suite  Detailed discussion on earlier versions  Detailed discussion on IPv6

Introduction to TCP/IP History Origin of the term “IPv4” Standards: RFC 793 – TCP and RFC 791 – IP Extensions: IPv6 Deployment: Worldwide!!! Functionality Supported:  Connection oriented data delivery  Fragmentation Support  Addressing and Routing  Congestion Control etc.

TCP/IP Model vs. OSI Model REF: content/uploads/2007/10/TCP__OSI___Stelios/1_ TCPIP_and_OSI_models.jpg content/uploads/2007/10/TCP__OSI___Stelios/1_ TCPIP_and_OSI_models.jpg

REF: content/uploads/2007/10/TCP__OSI___Stelios/2_TCPIP_Protocol_Suite.jpghttp:// content/uploads/2007/10/TCP__OSI___Stelios/2_TCPIP_Protocol_Suite.jpg

TCP Standards: RFC 793 – TCP Later Versions: NONE!!! Alternative technologies: UDP History:  Advanced Research projects Agency (ARPA) Research. Provides following services:  Network Technology Independence  Universal interconnection  Reliable Stream Transport Service  Congestion Control  End-to-end Acknowledgement

TCP Header REF:

TCP Header Description Source port (16-bit) and Destination port (16 bit) Sequence number (32-bit) Acknowledgement number (32-bit) Header Length (4 bit) Reserved (6 bit) Control bits (8 bits)  Urgent pointer (URG) if this bit field is set the receiving TCP should interpret the urgent pointer field.  Acknowledgement (ACK) this field is set to acknowledge the field entered is valid  Push function (PSH) if this bit field is set the receiver should deliver this segment to receiving application as soon as possible.

TCP Header Description (2)  Reset the connection (RST) if this bit is present, it is the receiver that sender is aborting the connection and all queued data and allocated buffers and connection can be freely relinquished.  Synchronize (SYN) this specifies that the bit field signifies that a sender to synchronize sequence numbers this is used to establish connection between the sender and receiver. Window (16-bit) Receiver side capacity to accept data Checksum (16 bit) Urgent Pointer (16 bit) Options: Variable, but cannot be larger than 40 bytes. The header length field is 4 bit. They are often used for various flow control and congestion Padding: The optional header may vary in size it may be necessary to pad the TCP header to align to 32-bit word boundary. Data: Application data

TCP – Reliable Stream Transport Connection Establishment and Termination Three way Handshake REF:

TCP-Flow control REF:

IP Overview Standards: RFC 791 – IP (viz. IPv4) Later Versions: IPv6 Alternative technologies: IPX Functionality Supported:  Addressing and Routing  Fragmentation Support  Type of Service  Loose/Strict Source and Record Route

IP Header REF:

IP Header Description Version (4 bits) describes header format. Version may be 4 for IPv4 or 6 for IPv6. IHL (Internet header length – 4 bits) is the length of IP header in 32- bit words. Thus, actual length is 32*IHL-value bits or 4*IHL-value bytes. TOS (Type of Service – 8 bits) allows setting desired service-quality parameters. Total Length (16 bits) is length of entire datagram. Identification (16 bits), Flags (3 bits) and Fragment Offset (13bits) are used for fragmentation and reassembly of datagram(s). TTL (Time to Live 8 bits) is the maximum time a datagram is allowed to remain in the internetwork. Each device decrements this value when the datagram is processed and drops it if the value is zero.

IP Header Description (2) Protocol (8 bits) indicates the type of higher layer protocol that follows after IP header. Header Checksum (16 bits) is checksum on header only. SA (Source address 32 bits) and DA (Destination address 32 bits) are source and destination IP addresses. Options (variable length) may or may not be used.

IP Addressing IP Address is 32 bit field. (~4.29 billion addresses) The IP address consists of a Network Part and a Host Part Need for larger addressing space – Division of address space into private and public addresses. The IANA (Internet Assigned Numbers Authority) has reserved the three blocks of the IP address space for private internets:  (10/8 prefix)  (172.16/12 prefix)  ( /16 prefix)

IP Addressing (2) The IP Addressing is classful by design: These classful networks may be further divided by using subnetting A set of contiguous networks may also be “supernetted” ClassFirst OctetRangeNetwork BitsComments Class A0xxx xxxx1.x.x.x – 126.x.x.x [1] Bits 2 nd – 8 th 126classes, 16.7 m hosts Class B10xx xxxx128.x.x.x – 191.x.x.xBits 3 rd – 16 th 16.3k classes, 65.5 k hosts Class C110x xxxx192.x.x.x – 223.x.x.xBits 4 th – 24 th 2.09m classes, 254 hosts Class D1110 xxxx224.x.x.x – 247.x.x.xBits 5 th – 32 nd Multicast Class E1111 xxxx248.x.x.x – 255.x.x.xBits 5 th – 32 nd Research use [1] The network is default route and is universal loopback address. REF :

IP Addressing (3) - Subnetting Consider a Class A network: Hosts : 16,777,214 Consider borrowing 16 bits from host address to form “subnets” 5.x.x.0 –> sub-networks Hosts : 254 for each subnet -> 16,646,144

IP Addressing (4) - Supernetting Consider a set of Class C networks: – Networks: 256  256 routes to distinct networks. Consider borrowing 16 bits from network address to form a “supernet” x.0/16 is 1 supernet  1 route to gateway for given network. Networks need to be contiguous to form supernet.

IP Fragmentation IP may fragment a PDU based on the maximum transmission unit (MTU) of the link or Path MTU (PMTU). Higher layers may request DF (Don’t fragment) bit = 1; i.e. the PDU must not be fragmented. If DF = 1 and PDU size exceeds link MTU, the router will drop the PDU and send ICMP error to sender. PMTU – D : Path MTU Discovery

IP Fragmentation (2) IF DF = 0, PDU may be fragmented if needed. For each fragment of PDU, the Identification value is identical and allows for reassembly for out-of-order fragments at receiver. The MF (More Fragments) bit is set for all but last fragment of a PDU. The Fragment Offset value defines the location of given piece of data in the original PDU, it is used for reassembly.

IP Type of Service This is an 8-bit field  Bits 0-2: Precedence  Bits 3-5: Delay Throughput and Reliability (respectively) [Value: 0  Normal and 1  High]  Bits 6-7: Reserved Precedence: 111 – N/W control110 – Internetwork control 101 – CRITIC/ECP100 – Flash override Flash010 - Immediate001 - Priority000 - Routine

TCP/IP – Issues Faced 1.Security TCP/IP was not designed for security, TCP/IP based communication relies on IP address to identify peer. This IP address and very easily be spoofed and modified. Typical Attacks:  IP address spoofing a) DNS spoofing – Create spoofed DNS response packet for a DNS query b) ARP spoofing – Also called ARP Cache poisoning, allows a malicious host to cause all traffic to be redirected to self  Ping of Death – Uses oversized ping packet (usually >65535 bytes) as fragments and cause buffer-overflows

TCP/IP – Issues Faced (2)  TCP DoS Attack – excessive SYN requests to a server may use up all CPU cycles preventing it from actively provide services like FTP, Radius Authentication, DNS, DHCP etc… allowing for more complicated impersonation or simple denial of service.  TCP Sequence Number prediction – to create one-sided TCP connection (Berkeley implementation of SN generation): a) Impersonate an alive host and connect to server b) Impersonate a down host by using netstat service  Routing Based Attacks – a) Poison RIP Routing information as it is received unchecked by routers b) ICMP Redirect for an open connection c) ICMP “Destination Unreachable” and “TTL exceeded”

TCP/IP – Issues Faced (3) 2.Limited Address Space IPv4 supports slightly over 4.29 billion addresses. This is highly insufficient address space. 3.Connection Delay There is an inherent delay involved in session establishment and overhead involved with processing information contained in TCP header.

Possible Solutions Security:  Narrow spectrum technologies – Firewalls, DHCP Snooping  Broad Spectrum technologies – Encryption Address Space limitation:  NAT – introduces other issues (still widely deployed)  IPv6 – has not yet had widespread acceptance Delay and overhead of connection:  UDP

References RFC 791 – Internet Protocol RFC 791 RFC 793 – Transport Control Protocol RFC 793 By Douglas Komer