Upgrade to Pro — share decks privately, control downloads, hide ads and more …

CSCD27 Network security

ThierrySans
October 20, 2016
540

CSCD27 Network security

ThierrySans

October 20, 2016
Tweet

Transcript

  1. The Protocol Stack Ethernet WiFi … ICMP IPv4 UDP …

    SMTP DNS BGP HTTP Application Transport Network Link ARP IPv6 TCP
  2. The attacker is capable of … Scanning - survey the

    network and its hosts Eavesdropping - read messages Spoofing - forge illegitimate messages DOS (Denial of Service) - disrupt the communications ➡ The attacker can target any layer in the network stack confidentiality integrity availability
  3. Ethernet WiFi … ICMP IPv4 UDP … SMTP DNS BGP

    HTTP ARP IPv6 TCP Packet Sniffing (eavesdropping)
  4. Ethernet WiFi … ICMP IPv4 UDP … SMTP DNS BGP

    HTTP ARP IPv6 TCP ARP-cache poisoning (spoofing)
  5. Ethernet WiFi … ICMP IPv4 UDP … SMTP DNS BGP

    HTTP ARP IPv6 TCP • Host discovery (scanning) • IP forgery (spoofing) • ICMP Ping flooding (DOS)
  6. Ethernet WiFi … ICMP IPv4 UDP … SMTP DNS BGP

    HTTP ARP IPv6 TCP • Port scanning (scanning) • TCP forgery (spoofing, DOS) • TCP-syn flooding (DOS) • UDP flooding (DOS)
  7. Ethernet WiFi … ICMP IPv4 UDP … SMTP DNS BGP

    HTTP ARP IPv6 TCP • Route Hijacking
 (spoofing, DOS) • DNS-cache poisoning (spoofing, DOS)
  8. TLS - Tranport Layer Protection ➡ Transport Layer Security (a.k.a

    SSL v3) provides • integrity: authentication handshake • confidentiality: end-to-end secure channel ✓ Prevents all kinds of eavesdropping and spoofing 
 for application protocols e.g HTTP + TLS = HTTPS ๏ 2-10 times slower than an insecure TCP connection ๏ Not used in practice to secure DNS and BGP
  9. Specific attacks of HTTPS Webpages can be delivered either with

    HTTPS or HTTP ➡ The browser can automatically switch between HTTP and HTTPS Sometime within the same webpage (mixed-content)
 e.g the main page loads over HTTPS 
 but images, scripts or css load with HTTP An attacker can do a MitM attack and remove the SSL protection ➡ SSLStripping attack (lab 05)
  10. Preventing packet sniffing over Ethernet Hub : broadcast all messages

    on all ports Switch : (smart HUB) forward messages on specific port based on their MAC addresses ➡ isolate Ethernet traffics (no straightforward packet sniffing) ≈
  11. Packet sniffing over a wireless network ➡ Encrypt message before

    sending them over the air Wireless Security WEP WPA WPA2 Personal Enterprise Authentication Shared Key Shared Key Shared Key RADIUS
 Server Cryptography RC4 TKIP and RC4 CCMP and AES Security Broken Broken External attackers only Good
  12. Preventing ARP-cache poisoning • Authenticating ARP messages has been proposed

    (research) but never implemented • Static ARP tables (not practical in dynamic environment) • Detection and correction tools
  13. Preventing IP forgery IPsec - Internet Protocol Security provides authentication

    (and optionally encryption) of IP traffic ➡ Uses SHA2 and AES (previously SHA1 and 3DES) ✓ Used usually between routers (link and network layers only) ๏ However IPsec is rarely deployed in practice m IP header m IP header m IP header IPsec header IPsec encapsulation IPsec secure channel router 1 router 2
  14. Preventing DNS spoofing DNSSEC - Domain Name System Security Extensions


    provides authentication (but not encryption) between DNS servers ๏ Not widely deployed yet
  15. Preventing DOS and DDOS attacks in general Network Ingress Filtering

    (a.k.a BCP 38) Best Current Practice to limit the impact of DOS and DDOS 1. Deny access to network traffic with spoofed addresses 2. Ensure that traffic is traceable to its correct source network ➡ Implemented by ISPs (Internet Service Providers)
  16. Preventing host discovery and port-scanning Host discovery uses ICMP ping

    echo message ➡ ICMP can be disabled or reserved to hosts 
 on the same network Port Scanning uses TCP-syn messages ➡ TCP connections can be rejected if a source attempts to initiate multiple connections on multiple ports simultaneously ➡ Packet filtering can prevent these two scanning techniques
  17. Limitation of a host-by-host packet filtering solution How to enable

    packet filtering on every host on the network? 1. Each host needs to have packet filtering capability 
 across different hardware, OS and versions 2. The admin needs to have administrative privilege on every host to push the packet filtering policy ➡ Impossible in practice
  18. Network Firewall A firewall defines a logical defense parameter 


    and acts an access control between two networks ➡ Packet filtering based on IP addresses (TCP filtering) • inbound traffic from the Internet trying to get into the protected network • outbound traffic going the other way ✓ For the most part, we trust the outbound 
 but not the inbound
  19. Widely used in practice Assuming the attacks comes from outside,

    a firewall can prevent • Most scanning attacks • Some spoofing attacks • Some flooding attacks (as long as it can handle the load) • Anomalous messages e.g smurf attack • and others ➡ But more generally, it can restrict access to protected hosts
  20. Two type of firewalls Stateless packet filtering is purely based

    on the IP address and the port Stateful packet filtering tracks the status of every connection (TCP 3 way handshake)
  21. Example of a stateful firewall policy ACL - Access Control

    Lists action protocol IP src port dst IP dst port dst state allow TCP 222.22/16 >1023 ! 222.22/16 80 any allow TCP ! 222.22/16 80 222.22/16 >1023 ack allow UDP 222.22/16 >1023 ! 222.22/16 53 - allow UDP ! 222.22/16 53 222.22/16 >1023 - deny all all all all all all
  22. Concept of DMZ DMZ - DeMilitarized Zone isolates exposed public

    servers 
 e.g web, mail, database and so on Internal Network Internet DMZ Protected Network
  23. Two approaches to build an IDS Signature-based IDS Have pre-defined

    malicious message pattern ➡ Relies on a signature database Heuristic-based Builds a model of acceptable message exchange patterns ➡ Relies on machine learning
  24. (Network) Intrusion Detection Systems IDS - Intrusion detection systems performs

    deep packet inspection • Looks at the headers • Look at packet contents (payload) • Looks at the packet fragmentation
  25. IDS in the protected network ➡ IDSs often operate in

    stealth mode Protected Network Internet IDS
  26. IPS - Intrusion Prevention system IPS = IDS + Firewall

    ➡ IP addresses sending malicious packets can be filtered
  27. VPN - Virtual Private Network VPN protected nomad hosts outside

    the protected network Protected Network Internet VPN server
  28. Tunneling protocol 1. Alice’s message is encapsulated and sent to

    the VPN server 2. The VPN extract this traffic and send it to the destination 3. Same thing on the way back ➡ Provides anonymity (from the IP perspective at least) m TCP header m TCP header TCP header TCP secure channel VPN server
  29. Different type of VPNs VPN can be built using different

    technology e.g. • IPsec • TLS (e.g openVPN) • SSH
  30. VPN to enforce security … or evade it :) ➡

    Evade censorship and geo-restrictions 
 by masking the real IP address