Security Problems in the TCP/IP Protocol Suite S.M. Bellovin Presented By, Sammer Zai 23-09-2014 Computer Vision and Pattern Recognition Laboratory, Hanyang.

Slides:



Advertisements
Similar presentations
CCNA1 v3 Module 9 v3 CCNA 1 Module 9 JEOPARDY K. Martin Galo Valencia.
Advertisements

Computer Security and Penetration Testing
CCNA – Network Fundamentals
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
1 Reading Log Files. 2 Segment Format
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Web Server Administration TEC 236 Securing the Web Environment.
Controlling access with packet filters and firewalls.
Security Problems in the TCP/IP Protocol Suite S.M. Bellovin Computer Communications Review; April 1989.
© Wiley Inc All Rights Reserved. CCNA: Cisco Certified Network Associate Study Guide CHAPTER 2: Internet Protocols.
Oct 21, 2004CS573: Network Protocols and Standards1 IP: Addressing, ARP, Routing Network Protocols and Standards Autumn
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Subnetting.
1 Version 3.0 Module 9 TCP/IP Protocol and IP Addressing.
COEN 252: Computer Forensics Router Investigation.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
SSH Secure Login Connections over the Internet
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
A Brief Taxonomy of Firewalls
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
OSI Model Routing Connection-oriented/Connectionless Network Services.
CCNA Guide to Cisco Networking Fundamentals Fourth Edition
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
IIT Indore © Neminath Hubballi
Computer Security and Penetration Testing
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
1 Chapter Overview TCP/IP DoD model. 2 Network Layer Protocols Responsible for end-to-end communications on an internetwork Contrast with data-link layer.
Original Paper: Security Problems In The TCP/IP Protocol Suite
Security Problems in the TCP/IP Protocol Suite Presented by: Sandra Daniels, José Nieves, Debbie Rasnick, Gary Tusing.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
1 Version 3.0 Module 11 TCP Application and Transport.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Sublayers Under the Network Layer: BOOTP & DHCP
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
TCP/IP Vulnerabilities
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
CHAPTER 9 Sniffing.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
TCP Security Vulnerabilities Phil Cayton CSE
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Chapter 38 Initialization & Configuration. Bootstrapping occurs during boot up to obtain boot program which may then load operating system may use network.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
1 K. Salah Module 5.1: Internet Protocol TCP/IP Suite IP Addressing ARP RARP DHCP.
Computer Network Security Dr. X. OSI stack… again.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Presentation on ip spoofing BY
1 Lecture A.2: Security Problems in TCP/IP r Reference: Security Problems in the TCP/IP Protocol Suite : by Steve Bellovin r R-services r Source-routing.
An Introduction To ARP Spoofing & Other Attacks
CompTIA Security+ Study Guide (SY0-401)
IP: Addressing, ARP, Routing
Working at a Small-to-Medium Business or ISP – Chapter 7
CompTIA Security+ Study Guide (SY0-401)
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
دیواره ی آتش.
Lecture 2: Overview of TCP/IP protocol
Presentation transcript:

Security Problems in the TCP/IP Protocol Suite S.M. Bellovin Presented By, Sammer Zai Computer Vision and Pattern Recognition Laboratory, Hanyang University

Overview TCP/IP and their associated protocols were designed without any security consideration in mind. This paper was written in It gave the security perspective on TCP/IP protocols in the early days. It acted as a wake up call for network researchers, listing many security vulnerabilities.

Overview Bellovin takes a critical look at each of the components of the TCP/IP protocol suite. From the network layer (e.g. routing) to the application layer. He discusses (potentially) exploitable flaws in each, and – where possible – defenses against them.

TCP Sequence Number Prediction Initially described by Morris in Exploits predictability in ISN generation as a “foot in the door.”

SYNs ACKs and ISN’s TCP sessions are established with a three-way handshake. C -> S: SYN(ISN C ) S -> C: SYN(ISN S ), ACK(ISN C ) C -> S: ACK(ISN S ) If the ISNs generated by a host are predictable, the other end- point need not see the SYN response to successfully establish a TCP session. If an adversary can establish a TCP session without seeing the response packets, they can “fly blind”.

Proposed Defense If an attacker can accurately measure and predict the round-trip time, any scheme that increments linearly can be compromised with some effort. So, the ISN should be randomized. Bellovin suggests using DES in ECB mode, encrypting the value of a simple counter. An additional defense involves good logging and alerting mechanism. Timing measurement techniques would involve attempted TCP connections. Spoofing an active host will eventually generate unusual types of RST packets.

Source Routing Giving a packet an explicit path to follow to a destination. If the target uses the inverse of the supplied route as the return path, it permits address spoofing. Note that even if the target ignores the inverse path, if you can predict an ISN, you can still address spoof.

Proposed Defense Bellovin suggests that “the best idea would be for gateways into the local net to reject external packets that claim to be from the local net.” But points out that sometimes this is not practical for arbitrary wide-area topologies. He then suggests that such topologies should be avoided.

RIP RIP (Routing Information Protocol) is a broadcast based routing protocol – used to propagate routing information on local networks. Typically, the information received is unchecked.

Poisoning Routing Tables: RIP Two attack modes are discussed: Host impersonation – this would cause all the packets destined for that host to be sent to intruder’s machine. “Man-In-The-Middle” – diverting packets for inspection and forwarding them on via source-routing.

Proposed Defense Bellovin suggests two approaches: Skepticism In most scenarios, it is useful to “be strict about what you generate and be lenient about what you accept”. Cryptographic Authentication For a broadcast protocol like RIP, this requires pervasive PKI.

Proposed Defense Bellovin makes an interesting aside: “Good log generation would help, but it is hard to distinguish a genuine intrusion from the routing instability that can accompany a gateway crash.” This is a hard problem in general – and the focus of modern IDS systems.

Authentication Server Many hosts run an authentication server – which will, given a port, return the effective user id of the process attached to that port. This request involves a second TCP connection – so it can help prevent ISN and source routing attacks.

Who Do You Trust? The trouble is that you still need to trust the information coming back from identd if the host is compromised or untrustworthy, this “authentication” is meaningless. Risks: All hosts are not competent to run authentication servers. Authentication message itself can be compromised by routing table attacks. If the target host is down, a variant on the TCP sequence number attack may be used.

Proposed Defense TCP itself is not adequate. User should use a more secure means of validation, such as Needham Schroeder algorithm.

Application Protocols Bellovin also enumerates issues with several “standard” services: DNS FTP Authentication Anonymous FTP Remote Boot

DNS DNS provides for a distributed database mapping host names to IP addresses. Interference with the proper operation of DNS can mount a variety of attacks such as denial of service and password collection. A combined attack on the domain system and the routing mechanism can be a great damage.

Domain servers should only run on highly secure machines. Authentication techniques on domain server must be used. Proposed Defense

FTP Like nearly all protocols of it’s day, FTP transmits authentication secrets in plaintext over an insecure channel. Bellovin mentions one-time passwords: A user was issued a device/program for generating the next password given a challenge.

Anonymous FTP Bellovin said that; “Some implementations of FTP require creation of a partial replica of the directory tree” The idea was to put anonymous FTP in a restricted environment. Unfortunately, often administrators mis- configured the system, causing information leaks.

Remote Boot Booting up a client machine from the server. “thin clients” – they were diskless, and so needed to load their kernel over the network during bootstrap. Two schemes were common: RARP with TFTP BOOTP with TFTP

RARP/TFTP RARP = ARP (Address Resolution Protocol) run in reverse. Rather than asking what MAC address maps to IP address xxx.xxx.xxx.xxx, it asked: what IP address maps to MAC address xx:xx:xx:xx:xx:xx TFTP allowed file transfer without authentication.

The Trust of a Child The potential for misadventure should be obvious. If I can compromise the boot process, I can install my own kernel.

BOOTP BOOTP is a protocol that gives the information to a diskless device. It uses UDP protocol. BOOT adds a “random” transaction ID to prevent an attacker from blindly replying to a booting machine. Trouble is – it’s hard to be random when the machine is booting – it’s a very deterministic process.

Comprehensive Defenses Authentication Encryption

Authentication Needham Schroeder – which requires that each participating host share a key with an authentication server. DNS provides an ideal base for authentication system.

Encryption Bellovin discussed both link-level and end-to-end encryption. Link-level encryption End-to-end encryption

Conclusions Relying on the IP source address for authentication is extremely dangerous. Hosts should not give away knowledge gratuitously. Network control mechanisms are dangerous and must be guarded.