Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998.

Slides:



Advertisements
Similar presentations
SSH Operation and Techniques - © William Stearns 1 SSH Operation and Techniques The Swiss Army Knife of encryption tools…
Advertisements

1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Hacking Linux Based on Hacking Linux Exposed Hatch, Lee, and Kurtz ISBN
Linux’ Security Haifa Linux Club Orr Dunkelman.
System and Network Security Practices COEN 351 E-Commerce Security.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
Linux+ Guide to Linux Certification, Second Edition Chapter 15 Configuring Network Services and Security.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Tools CS-480b Dick Steflik. CACLS Windows NT, W2000, XP Displays or modifies access control lists (ACLs) of files.
TCP/IP - Security Perspective Upper Layers CS-431 Dick Steflik.
Beyond Security Ltd. Port Knocking Beyond Security Noam Rathaus CTO Sunday, July 11, 2004 Presentation on.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Firewalls, Perimeter Protection, and VPNs - SANS © SSH Operation The Swiss Army Knife of encryption tools…
Ssh: secure shell. overview Purpose Protocol specifics Configuration Security considerations Other uses.
SSH Secure Login Connections over the Internet
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 10 Manage Remote Access.
Switch Concepts and Configuration and Configuration Part II Advanced Computer Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
The Saigon CTT Chapter 16 Remote Connectivity. The Saigon CTT  Objectives  Explain : telnet rsh ssh  Configure FTP.
Honeypot and Intrusion Detection System
Secure Shell for Computer Science Nick Czebiniak Sung-Ho Maeung.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Bugs SATAN scans for It is interesting to look at the bugs SATAN scans for. They are easily detected by the scanners and therefore do not pose a threat.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Single Sign-on with Kerberos 1 Chris Eberle Ryan Thomas RC Johnson Kim-Lan Tran CS-591 Fall 2008.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Network Monitoring System for the UNIX Lab Bradley Kita Capstone Project Mentor: Dr C. David Shaffer Fall 2004/Spring 2005.
CSCE 815 Network Security Lecture 26 SSH and SSH Implementation April 24, 2003.
Linux Networking and Security
CS 6401 Secure Shell & Denial of Service Attacks Outline Secure Shell Overview Authentication Practical issues Denial of Service Attacks Definition Examples.
Firewalls and Info Services Prevent unathorized access between nets Most of the protection is based upon examination of the IP packets There is always.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
CHAPTER 9 Sniffing.
SSH Operation The Swiss Army Knife of encryption tools…
Cracking Techniques Onno W. Purbo
CIS 192B – Lesson 3 Network Information Services.
Other useful commands netstat ps tail kill. netstat Print network connections, routing tables, interface statistics, masquerade connections, and multicast.
1 Linux Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise.
ORAFACT The Secure Shell. ORAFACT Secure Shell Replaces unencrypted utilities rlogin and telnet rsh rcp Automates X11 authentication Supports tunneling.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
Phil Hurvitz Securing UNIX Servers with the Secure.
SSH Tricks for CSF Slide 1 NEbraskaCERT SSH Tricks Matthew G. Marsh 05/21/03.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Server Hardening Moses Ike and Paul Murley TexSAW 2015 Credit to Daniel Waymel and Corrin Thompson.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Power of OSSEC By Donovan Thorpe CS 5910 Fall 2010.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Role Of Network IDS in Network Perimeter Defense.
SECURE SHELL MONIKA GUPTA COT OUTLINE What is SSH ? What is SSH ? History History Functions of Secure Shell ? Functions of Secure Shell ? Elements.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
OpenSSH – Public Key Authentication ● Jonathan Schipp ● Dubois County Linux User Group ● Nov 7 th 2010 ● jonschipp (at) gmail.com.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Secure services Unit-IV CHAP-1
Chapter 5 Linux Services
SECURE SHELL MONIKA GUPTA COT 4810.
Chapter 27: System Security
Haifa Linux Club Orr Dunkelman
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
Operating System Security
Linux Security.
6. Application Software Security
Presentation transcript:

Linux Networking Security Sunil Manhapra & Ling Wang Project Report for CS691X July 15, 1998

Approaches for Networking security n configure secure kernel n always send password, sensitive data…encrypted over the network n provide only necessary system services n verify DNS information n Firewalls n monitor the network carefully n backups (backup all the important information in case of intrusion).

Project Outline n SATAN n Logcheck n Sentry n SSH

SATAN n SATAN is a port scanner with a web interface n SATAN recognizes and reports several common network- related security problems, though it doesn’t attempt to solve them. n SATAN can be configured to do light, medium, or strong checks on a machine or network of machines. n Example problems SATAN can report: –NFS file systems exported to arbitrary hosts or to unprivileged programs –Writable anonymous FTP home directory –NIS password file access from arbitrary hosts n SATAN does NOT work on Red Hat 5.1

Logcheck n Log files aren’t frequently checked and mostly contain unimportant information n Automatically runs and checks system log files,filters them,and reports security violations and unusual activities via n It allows you to specify what kind of violations should be reported to you n 00,15,30,45 * * * * /usr/local/etc/logcheck.sh

Sentry n To monitor a particular port/ports against probes n Sentry can detect and react –indicate via system log –host is dropped(entry in /etc/hosts.deny) –reconfigure to route traffic to a dead host –reconfigure to drop packets n sentry -tcp (basic port bound TCP mode) n sentry -stcp(stealth TCP scan detection) n sentry -atcp(advanced TCP stealth scan detection) n same applies for UDP also

SSH (Secure Shell) n SSH is a suite of programs used as secure replacement for rlogin, rsh and rcp to allow user to login to remote system with encrypted connection. n SSH prevents man-in-the-middle attacks and DNS spoofing. n SSH can be subverted by attackers who have root access or have access to your home directory.

SSH Components n Server daemon: sshd n r-Program replacements: –ssh: rlogin replacement –scp: rcp replacement n key management programs: –ssh-keygen: create authentication keys –ssh-agent: authentication agent, holds RSA authentication keys –ssh-add: register new keys with the agent n make-ssh-known-hosts: script to probe hosts on network for their public keys

Tips from our Experiences n Never run any program without specifying the path n Before installing any software,which should according to the creator,work on your system, search some relative mailing lists to find out what the problems other users had n It will never be a waste of time to read all documents before actually doing anything n Many problems can be understood and solved by looking into source code