15-744: Computer Networking L-23 Security. L -23; 4-17-02© Srinivasan Seshan, 20022 Security Denial of service IPSec Firewalls Assigned reading [SWKA00]

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

IPSec.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Chapter 5 Network Security Protocols in Practice Part I
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Firewalls and Intrusion Detection Systems
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
15-441: Computer Networking Lecture 26: Networking Future.
IPv6 Mobility David Bush. Correspondent Node Operation DEF: Correspondent node is any node that is trying to communicate with a mobile node. This node.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Gursharan Singh Tatla Transport Layer 16-May
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Chapter 6: Packet Filtering
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
TCP/IP Essentials A Lab-Based Approach Shivendra Panwar, Shiwen Mao Jeong-dong Ryoo, and Yihan Li Chapter 5 UDP and Its Applications.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
TCP/IP Protocols Contains Five Layers
1 Internet Control Message Protocol (ICMP) Used to send error and control messages. It is a necessary part of the TCP/IP suite. It is above the IP module.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Internet Security and Firewall Design Chapter 32.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
15-744: Computer Networking L-17 Security. L -17; © Srinivasan Seshan, Security Denial of service IPSec Firewalls Assigned reading [SWKA00]
Computer Networking Other Transport Issues, Attacks and Security Threats, Firewalls.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
IP Protocol CSE TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
© 2002, Cisco Systems, Inc. All rights reserved..
K. Salah1 Security Protocols in the Internet IPSec.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Chapter 9 The Transport Layer The Internet Protocol has three main protocols that run on top of IP: two are for data, one for control.
IPSec Detailed Description and VPN
IPSecurity.
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
15-744: Computer Networking
Virtual Private Networks (VPNs)
Advanced Computer Networks
Presentation transcript:

15-744: Computer Networking L-23 Security

L -23; © Srinivasan Seshan, Security Denial of service IPSec Firewalls Assigned reading [SWKA00] Practical Network Support for IP Traceback [B89] Security Problems in the TCP/IP Protocol Suite

L -23; © Srinivasan Seshan, Overview Security holes Firewalls Denial of service traceback Authentication

L -23; © Srinivasan Seshan, Basic IP End hosts create IP packets and routers process them purely based on destination address alone (not quite in reality) Problem – End host may lie about other fields and not affect delivery Source address – host may trick destination into believing that packet is from trusted source Many applications use IP address as a simple authentication method Solution – reverse path forwarding checks, better authentication Fragmentation – can consume memory resources or otherwise trick destination/firewalls Solution – disallow fragments

L -23; © Srinivasan Seshan, Routing Source routing Destinations are expected to reverse source route for replies Problem – Can force packets to be routed through convenient monitoring point Solution – Disallow source routing – doesn’t work well anyway! Routing protocol Malicious hosts may advertise routes into network Problem – Bogus routes may enable host to monitor traffic or deny service to others Solutions Use policy mechanisms to only accept routes from or to certain networks/entities In link state routing, can use something like source routing to force packets onto valid route

L -23; © Srinivasan Seshan, ICMP Reports errors and other conditions from network to end hosts End hosts take actions to respond to error Problem An entity can easily forge a variety of ICMP error messages Redirect – informs end-hosts that it should be using different first hop route Fragmentation – can confuse path MTU discovery Destination unreachable – can cause transport connections to be dropped

L -23; © Srinivasan Seshan, TCP Each TCP connection has an agreed upon/negotiated set of associated state Starting sequence numbers, port numbers Knowing these parameters is sometimes used to provide some sense of security Problem Easy to guess these values Listening ports #’s are well known and connecting port #’s are typically allocated sequentially Starting sequence number are chosen in predictable way Solution – make sequence number selection more random

L -23; © Srinivasan Seshan, Sequence Number Guessing Attack Attacker  Victim: SYN(ISN x ), SRC=Trusted Host Victim  Trusted Host: SYN(ISN s ), ACK(ISN x ) Attacker  Victim: ACK(ISN guess of s ), SRC=Trusted Host Attacker  Victim: ACK(ISN guess of s ), SRC=T, data = “rm -r /” Attacker must also make sure that Trusted Host does not respond to SYNACK Can repeat until guess is accurate

L -23; © Srinivasan Seshan, TCP TCP senders assume that receivers behave in certain ways (e.g. when they send acks, etc.) Congestion control is typically done on a “packet” basis while the rest of TCP is based on bytes Problem – misbehaving receiver can trick sender into ignoring congestion control Ack every byte in packet! Send extra duplicate acks Ack before the data is received (needs some application level retransmission – e.g. HTTP 1.1 range requests) Solutions Make congestion control byte oriented Add nonces to packets – acks return nonce to truly indicate reception

L -23; © Srinivasan Seshan, DNS Users/hosts typically trust the host-address mapping provided by DNS Problems Zone transfers can provide useful list of target hosts Interception of requests or comprise of DNS servers can result in bogus responses Solution – authenticated requests/responses

L -23; © Srinivasan Seshan, Overview Security holes Firewalls Denial of service traceback Authentication

L -23; © Srinivasan Seshan, Firewalls Basic problem – many network applications and protocols have security problems that are fixed over time Difficult for users to keep up with changes and keep host secure Solution Administrators limit access to end hosts by using a firewall Firewall and limited number of machines at site are kept up-to-date by administrators

L -23; © Srinivasan Seshan, Typical Firewall Topology Intranet DMZ Internet Firewall Web server, server, web proxy, etc

L -23; © Srinivasan Seshan, Types of Firewalls Proxy End host connects to proxy and asks it to perform actions on its behalf Policy determines if action is secure or insecure Transport level relays (SOCKS) Ask proxy to create, accept TCP (or UDP) connection Cannot secure against insecure application Application level relays (e.g. HTTP, FTP, telnet, etc.) Ask proxy to perform application action (e.g. HTTP Get, FTP transfer) Can use application action to determine security Requires applications (or dynamically linked libraries) to be modified to use the proxy Considered to be the most secure since it has most information to make decision

L -23; © Srinivasan Seshan, Types of Firewalls Packet filters Set of filters and associated actions that are used on a packet by packet basis Filters specify fields, masks and values to match against packet contents, input and output interface Actions are typically forward or discard Such systems have difficulty with things like fragments and a variety of attacks Typically a difficult balance between the access given and the ability to run applications E.g. FTP often needs inbound connections on arbitrary port numbers – either make it difficult to use FTP or limit its use

L -23; © Srinivasan Seshan, Types of Firewalls Stateful packet filters Typically allow richer parsing of each packet (variable length fields, application headers, etc.) Actions can include the addition of new rules and the creation of state to process future packets Often have to parse application payload to determine “intent” and determine security considerations Rules can be based on packet contents and state created by past packets Provides many of the security benefits of proxies but without having to modify applications

L -23; © Srinivasan Seshan, Overview Security holes Firewalls Denial of service traceback Authentication

L -23; © Srinivasan Seshan, Denial of Service Objective of attack: make a service unusable, usually by overloading the server or network Example: SYN flooding attack Send SYN packets with bogus source address Server responds with SYNACK keeps state about TCP half-open connection Eventually server memory is exhausted with this state Solution: SYN cookies – make the SYNACK contents purely a function of SYN contents, therefore, it can be recomputed on reception of next ACK More recent attacks have used bandwidth floods How do we stop these?

L -23; © Srinivasan Seshan, Bandwidth DOS Attacks Possible solutions Ingress filtering – examine packets to identify bogus source addresses Link testing – how routers either explicitly identify which hops are involved in attack or use controlled flooding and a network map to perturb attack traffic Logging – log packets at key routers and post-process to identify attacker’s path ICMP traceback – sample occasional packets and copy path info into special ICMP messages IP traceback

L -23; © Srinivasan Seshan, IP Traceback Node append (record route) – high computation and space overhead Node sampling – each router marks its IP address with some probability p P(receiving mark from router d hops away) = p(1 – p) d-1 p > 0.5 prevents any attacker from inserting false router Must infer distance by marking rate  relatively slow Doesn’t work well with multiple routers at same distance  I.e. multiple attackers

L -23; © Srinivasan Seshan, IP Traceback Edge sampling Solve node sampling problems by encoding edges & distance from victim in messages Start router sets “start” field with probability p and sets distance to 0 If distance is 0, router sets “end” field All routers increment distance As before, P(receiving mark from router d hops away) = p(1 – p) d-1 Multiple attackers can be identified since edge identifies splits in reverse path

L -23; © Srinivasan Seshan, Edge Sampling Major problem – need to add about 72bits (2 address + hop count) of info into packets Solution Encode edge as xor of nodes  reduce 64 bits to 32 bits Ship only 8bits at a time and 3bits to indicate offset  32 bits to 11bits Use only 5 bit for distance  8bits to 5bits Use IP fragment field to store 16 bits Some backward compatibility issues Fragmentation is rare so not a big problem

L -23; © Srinivasan Seshan, Overview Security holes Firewalls Denial of service traceback Authentication

L -23; © Srinivasan Seshan, Kerberos Objective: provide a way for services to authenticate clients A client must present a ticket to use service Ticket is obtained from Kerberos system Contains client ID, session key Ticket is encrypted using service’s private key known only to service and Kerberos Ensures that only Kerberos could have created ticket Client uses authenticator to prevent replay of tickets Contains client ID, network address, time of day Encrypted using session key Only if recent and Ids match is ticket valid Forces time to be synchronized within few minutes

L -23; © Srinivasan Seshan, Kerberos Obtaining tickets Client sends message to Kerberos Contains service ID, client ID, time of day Response encrypted with client’s private key Contains ticket, session key and timestamp First ticket gotten is for Kerberos Ticket Granting Service All other requests sent to the TGS using the TGS session key Avoids having to provide passwd for each ticket

L -23; © Srinivasan Seshan, Kerberos To get the TGS ticket, the client contacts the KDS User  workstation (WS): N client WS  Key Distribution Service (KDS): {N client, N TGS, T current } Ticket TGS = {K session,N client, N TGS, T current, WS, Lifetime}K TGS KDS  WS: {K session, N TGS, Lifetime, T current, Ticket TGS }K client Above message is subject to know plaintext attack! User  WS: password  used to decrypt previous message To use a service, client creates authenticator: Authenticator = {N client, T current, WS}K session WS  service: {Authenticator, Ticket} Further exchanges are similar to KDS exchange but with TGS using K session instead of K client

L -23; © Srinivasan Seshan, Certification Authorities Certification authority (CA) binds public key to particular entity Entity (person, router, etc.) can register its public key with CA Entity provides “proof of identity” to CA CA creates certificate binding entity to public key Certificate digitally signed by CA When Alice wants Bob’s public key: Gets Bob’s certificate (from Bob or elsewhere). Applies CA’s public key to Bob’s certificate, get Bob’s public key

L -23; © Srinivasan Seshan, Overview End2end security

L -23; © Srinivasan Seshan, IPsec Basic idea – add security at the IP layer for use by any upper layer protocol Two basic security protocols Identified in IP protocol field Authentication Header (AH) Provides connectionless integrity, data origin authentication, and an optional anti-replay service Encapsulating Security Payload (ESP) Adds confidentiality (encryption) to AH Security association (SA) A simplex “connection” between IPsec endpoints Identifies keying info, destination, protocol info Specifies Security Parameters Index (SPI) that is carried in packets

L -23; © Srinivasan Seshan, Operating Modes Two basic operating modes Transport mode A transport mode security protocol header appears immediately after the IP header and any options, and before any higher layer protocols (e.g., TCP or UDP) Tunnel mode An "outer" IP header specifies the IPsec processing destination, plus an "inner" IP header specifies the (apparently) ultimate destination for the packet Often used to communicate between gateways to create a virtual private network

L -23; © Srinivasan Seshan, Packet Contents (AH) Next header – protocol number of contents Authentication payload length – length of authentication data SPI – Security Parameters Index used to lookup security association Sequence number – used for anti-replay Authentication data – data used to authenticate packet ESP is similar

L -23; © Srinivasan Seshan, Modular Design Basic protocol to setup security associations Internet Security Association and Key Management Protocol (ISAKMP) Many different key exchange protocols, encryption methods and authentication methods

L -23; © Srinivasan Seshan, SSL Basic idea – add security at the transport layer for use by any application Needs a reliable transport (TCP) Handshake Exchange data to determine the strongest shared encryption algorithm Server presents SSL certificate + public key Client checks was issued by a certificate authority trusted by the browser, is not expired, is for the appropriate server Authenticates the server Used to setup key for connection – expensive operation Symmetric key used for encryption Can be used across connections to reduce connection setup cost

L -23; © Srinivasan Seshan, Next Lecture: Network Measurements How is the Internet holding up? Assigned reading [Pax97] End-to-End Internet Packet Dynamics