CSCE 465 Lecture 17

From Notes
Jump to navigation Jump to search

« previous | Thursday, March 21, 2013 | next »


Honors project progress report due next Wednesday.
Homework 4 is out

Vulnerability Analysis

ARP Cache Poisoning

ARP translates hardware (MAC) address to IP address

What if attacker tells all computers on the network that it is the router? (Man-in-Middle attack)

TCP SYN Flooding

Open a lot of conncetions to a server and leave them open.

Remedy: stateless design using SYN cookie:

  • send number in ACK response package that represents session


Firewall

  • Originally a wall constructed to prevent the spread of fire.
  • More similar to a moat around a castle
  • Device that provides secure connectivity between networks (internal/external; varying levels of trust among machines/users)
  • Implement and enforce security policy for communication between networks.

Capabilities:

  • Restrict incoming/outgoing traffic by IP address, ports, or users
  • Block invalid packets

Convenience:

  • Give insight into traffic mix via logging
  • Network Address Translation
  • Encryption

Potential Vulnerabilities

  • Doesn't protect traffic that doesn't cross it (routing around; internal traffic)
  • Must be configured correctly


Filtering Firewall

packet filtering
Checks and blocks individual packets that are not allowed by policy
Can be very slow
Look at only first packet in session; allow/deny further communication based on response to first
Decisions made on a per-packet basis
No state information saved
Ports above 1024 left open
session filtering
Dynamic Packet Filtering
Stateful Inspection
Context-Based

FTP Example

FTP Active Mode

  • Client opens command channel (port 20) to server
  • Server acknowledges and opens connection to client's second (data) port
  • Client acknowledges

FTP Passive Mode

  • Client opens connection (port 20) to server
  • Server opens port for passive data transport
  • Client connects to open port
  • Server acknowledges

FTP Packet Filter:

access-list 100 permit tcp any gt 1023 host 173.168.10.12 eq 21
access-list 100 permit tcp any gt 1023 host 173.168.10.12 eq 20
   ! allows packets sent from any client to the FTP control and data groups
access-list 101 permit tcp host 172.168.10.12 eq 21 any gt 1023
access-list 101 permit tcp host 172.168.10.12 eq 20 any gt 1023
   ! allows FTP server to send packets back to any

Proxy Firewall

Proxy "man-in-middle" to relay connections between client and server

Application Gateways

Understands specific application protocols.

  • Limited proxies available
  • Proxy impersonates both sides of connection
  • Resource-intensive (process per connection)
  • HTTP proxies may cache web pages

More appropriate for TCP protocols (ICMP is difficult)

Implicitly (by design) blocks all unless specifically allowed

Circuit-Level Gateways

Support more services than Gatweay, but less control over data.

  • Difficult to handle protocols like FTP
  • Clients must be aware of circuit-levil gateway

Example: SOCKS

  • Actually supports UDP


Comparison

Security Performance Service Support Modify Client App ICMP Fragmentation
Packet Filter 3 1 No dynamic w/o holes No YES
Session Filter 2 2 No YES
Circuit GW Socks v5
App GW
Edit.png

Page Under Construction
This page still needs revision. Please edit this page to finish it.

Network Address Translation (NAT)

Often attached to Firewalls (but not required) since they are an "inline" device

  • Useful if organization does not have enough real IP addresses
  • Extra security measure if internal hosts do not have valid IP addresses (harder to trick firewall)
  • Only really need real (external) IP address for services that outside networks will open connections to


Many-to-One
Many machines appear as one IP address on Internet (like proxies)
One-to-One
Each machine acts as itself on the external network

Encryption

  • Allows trusted users to access sensitive information while traversing untrusted networks
  • Useful for remote users/sites
  • Encryption called IPsec