Network Security - PowerPoint PPT Presentation

About This Presentation
Title:

Network Security

Description:

Network Security Professor Dr. Adeel Akram – PowerPoint PPT presentation

Number of Views:110
Avg rating:3.0/5.0
Slides: 55
Provided by: Adee156
Category:

less

Transcript and Presenter's Notes

Title: Network Security


1
Network Security
  • Professor
  • Dr. Adeel Akram

2
Firewalls, SSL, VPN and IPSec
3
Outline
  • Types of firewalls
  • Static Packet Filter
  • Dynamic (Stateful) Packet Filters
  • Circuit Level Gateway
  • Application Level Gateway
  • Transport Layer Security / SSL
  • VPN
  • IPSec

4
Network Layers and Firewalls
5
Static Packet Filter
  • The decision to accept or deny a packet is based
    upon an examination of specific fields within the
    packet's IP and protocol headers.
  • source address
  • destination address
  • application or protocol
  • source port number
  • destination port number
  • This decision is made on packet by packet basis
  • Rules are encoded to filter packets.

6
Static Packet Filter
  • A packet filter only examines data in the IP
    header and TCP header it cannot know the
    difference between a real and a forged address.
  • If an address meets the packet filter rules along
    with the other rule criteria, the packet will be
    allowed to pass.

7
IP Address Spoofing
  • Suppose all packets from unknown IP addresses
    are filtered out.
  • If a Hacker can find the IP address of one
    trusted client then the hacker can change the
    source address on the malicious IP packet and use
    the address of the trusted client.

8
Static Packet Filter Considerations
Pros Cons
Low impact on network performance. Operates only at network layer therefore it only examines IP and TCP headers.
Low cost now included with many OSs Unaware of packet payload offers low level of security.
Lacks state awareness may require numerous ports be left open to facilitate services which use dynamically allocated ports.
Susceptible to IP spoofing
Difficult to create rules
Only provides a low level of protection
9
Packet Filtering Firewall Terminology
  • Static (Stateless) Firewall The firewall makes a
    decision on a packet by packet basis.
  • Dynamic (Stateful) Firewall The firewall keeps
    state information about transactions
    (connections).

10
Dynamic (Stateful) Packet Filter
  • A typical dynamic packet filter is "aware" of the
    difference between a new and an established
    connection.
  • Once a connection is established, it is entered
    into a table that typically resides in RAM.
  • Subsequent packets are compared to this table in
    RAM, most often by software running at the
    operating system (OS) kernel level.
  • When the packet is found to be an existing
    connection, it is allowed to pass without any
    further inspection.

11
Dynamic (Stateful) Packet Filter
  • By avoiding having to parse the packet filter
    rule base for each and every packet that enters
    the firewall
  • and by performing this already established
    connection table test at the kernel level in RAM,
  • the dynamic packet filter enables a measurable
    performance increase over a static packet filter.

12
Dynamic (Stateful) Packet Filter
  • State creation must follow the handshake needed
    for connection creation.

13
Dynamic Packet Filter Considerations
Pros Cons
Low impact on network performance. Operates only at network layer therefore it only examines IP and TCP headers.
Low cost now included in some of the OSs Unaware of packet payload offers low level of security.
State awareness provides significant performance benefit Susceptible to IP spoofing
Difficult to create rules
Important to follow the connection creation steps.
Only provides a low level of protection
14
Circuit Level Gateway
  • The decision to accept or deny a packet is based
    upon an examination of specific fields within the
    packet's IP and protocol headers.
  • source address
  • destination address
  • application or protocol
  • source port number
  • destination port number
  • Handshaking and Sequence number

15
Circuit Level Gateway
16
Circuit Level Gateway Considerations
Pros Cons
Low to moderate impact on network performance. Shares many of the same negatives issues associated with packet filters.
Breaks direct connection to server behind the firewall Allows any data to pass through the firewall.
State awareness provides significant performance benefit Only provides a low to moderate level of protection
17
Application Level Proxy
  • An application level gateway intercepts the
    incoming and outgoing packets
  • Run proxies that prevent direct connection
    between a trusted server or client and an
    untrusted host.
  • Proxies examine the entire packet and can filter
    packets at the application layer.
  • Proxies are application specific.

18
Application Level Gateway
  • Current technology application level gateways are
    often referred to as strong application proxies.
  • A strong application proxy extends the level of
    security afforded by the application level
    gateway.
  • Instead of copying the entire datagram on behalf
    of the user, a strong application proxy actually
    creates a brand new empty datagram inside the
    firewall.
  • Only those commands and data found acceptable to
    the strong application proxy are copied from the
    original datagram outside the firewall to the new
    datagram inside the firewall.
  • By employing this methodology the strong
    application proxy can mitigate the risk of an
    entire class of covert channel attacks.

19
Application Level Gateway Considerations
20
Covert Channel Attacks
  • ICMP_ECHO traffic can be used to construct covert
    communications channels through networks.
  • The normal "ping" protocol states that one site
    (the pinger) sends an ICMP_ECHO packet to the
    target (the pingee). The pingee then sends an
    ICMP_ECHOREPLY back.
  • ICMP_ECHO packets have an option to include a
    data section that usually stores timing
    information to determine round-trip packet times.

21
Covert Channel Attacks
  • Firewalls and filtering routers do not check the
    data content, so it is possible to transmit
    malicious information in this packet.
  • This is a covert channel. Most network routers
    pass, drop or return ICMP traffic. Since they
    don't filter the data content, it is possible to
    masquerade Trojan packets as valid ICMP_ECHO
    packets.
  • One example of this type of attack is described
    in Phrack Magazine and is called Project Loki.

22
Transport Layer Security
23
Transport Layer Security
  • Lecture prepared using information from
  • Chapter 7 of Network Security Essentials
    Applications and Standards by Stallings
  • Section 8.3.3 of Computer Networks by Peterson
    and Davie
  • Introduction to SSL.htm
  • Analysis of SSL 3.0 Protocol by Wagner and
    Schneier

24
SSL
  • The Transport Layer Security protocols started
    with the Secure Socket Layer (SSL) protocol

25
SSL
  • So, what is it?
  • Secure Sockets Layer (version 3.0)
  • According to the specification
  • The primary goal of the SSL Protocol is to
    provide privacy and reliability between two
    communicating applications. The protocol allows
    client/server applications to communicate in a
    way that is designed to prevent eavesdropping,
    tampering, or message forgery.

26
SSL
  • Designed with four basic goals
  • Cryptographic security
  • Interoperability
  • Extensibility
  • Relative efficiency

27
SSL
  • SSL has three basic properties
  • The connection is private. Encryption is used
    after an initial handshake to define a secret
    key. Symmetric cryptography is used for data
    encryption (e.g., DES, RC4, etc.)
  • The peer's identity can be authenticated using
    asymmetric, or public key, cryptography (e.g.,
    RSA, DSS, etc.).
  • The connection is reliable. Message transport
    includes a message integrity check using a keyed
    MAC. Secure hash functions (e.g., SHA, MD5, etc.)
    are used for MAC computations.

28
SSL/TLS
  • Well then, what is TLS?
  • Transport Layer Security (version 1.0)
  • SSL was developed by Netscape. The standards
    community wanted their own version free from any
    patents/restrictions
  • Thus was born TLS
  • IETF changed the name to avoid showing bias
  • Well use the two terms interchangeably

29
SSL/TLS
  • Users want to connect to servers without the
    connection being listened to (securely)
  • E.g. Electronic commerce
  • Every server has a certificate
  • Basically a public key
  • Signed by a trusted third party

30
SSL Services
  • SSL server authentication allows a user to
    confirm a servers identity (SSL Certificates).
  • SSL client authentication allows a server to
    confirm a clients identity
  • An encrypted SSL connection allows confidential
    information exchange.

31
SSL/TLS
Application Protocol (e.g. http)
TCP
IP
32
SSL/TLS
  • SSL consists of two protocol layers
  • The Record Layer encapsulates all messages
  • The Handshake protocol negotiates all options of
    the session
  • The Alert protocol indicates errors or other
    caution conditions have occurred in the
    connection
  • The ChangeCipherSpec protocol indicates the
    channel is ready for secure communications

33
SSL/TLS
Application Protocol (e.g. http)
TCP
IP
34
SSL/TLS
  • The SSL Record Layer Provides
  • Confidentiality
  • Authenticity
  • Replay Protection
  • Over a connection oriented reliable transport
    protocol like TCP

35
SSL/TLS
Application Protocol (e.g. http)
TCP
IP
36
SSL/TLS
Application Protocol (e.g. http)
TCP
IP
37
  • The SSL protocol uses a combination of public-key
    and symmetric key encryption.
  • An SSL session always begins with an exchange of
    messages called the SSL handshake.
  • The handshake allows
  • the server to authenticate itself to the client
    using public-key techniques,
  • the client to authenticate itself to the server
    optionally
  • the client and the server to cooperate in the
    creation of symmetric keys used for rapid
    encryption, decryption, and tamper detection
    during the session that follows.

38
SSL Session Negotiation Server Authentication

ServerHello
Certificate
ServerHelloDone



ChangeCipherSpec Finish

ClientHello



ClientKeyExchange
ChangeCipherSpec
Finish


39
SSL Session Negotiation Client and Server
Authentication
ClientHello



Certificate ClientKeyExchange
CertificateVerify ChangeCipherSpec
Finish



ServerHello
Certificate Certificate Request
ServerHelloDone



ChangeCipherSpec Finish

40
SSL/TLS
Application Protocol (e.g. http)
TCP
IP
41
Virtual Private Networks (VPN)
  • What is a VPN?
  • a group of two or more computer systems,
    typically connected to a private network with
    limited public-network access, that communicates
    securely over a public network.
  • A combination of tunneling, encryption,
    authentication and access control technologies
    and services used to carry trusted traffic over
    an Untrusted IP network

42
Virtual Private Networks (VPN)
  • What makes a VPN secure?
  • Encryption
  • Strong authentication of remote users and hosts.
  • Mechanisms for hiding or masking information
    about the private network topology from potential
    attackers

43
VPN
  • If we are going to create a VPN using Internet it
    is tempting to make all IP traffic secure.
  • A VPN may support many different applications
  • Distributed computing resources
  • VoIP
  • SNMP
  • FTP
  • These applications have very different
    requirements.

44
(No Transcript)
45
Outline
  • IP Security Overview
  • IP Security Architecture
  • Authentication Header
  • Encapsulating Security Payload
  • Combinations of Security Associations
  • Key Management

46
IPSEC in a few words
  • IPSec is an IETF standard for real-time
    communication security.
  • In such a protocol, Alice initiates communication
    with a target, Bob.
  • Each side authenticates itself to the other based
    on some key that the other side associates with
    it.
  • Then they establish secret session keys (4 keys,
    one for integrity protection, and one for
    encryption, for each direction).

47
IP Security Overview
  • IPSEC is a framework for security that operates
    at the Network Layer by extending the IP Packet
    Header
  • This gives the ability to encrypt any higher
    layer protocol, including arbitrary TCP and UDP
    sessions.
  • This flexibility comes with complexity.
  • IPSECs complexity has be criticized quite
    severely in the literature.

48
IP Security Scenario
49
IP Security Overview
  • IPSEC is highly modular. It allows users to
    select from
  • a variety of encryption algorithms
  • And specialized security protocols
  • IPSEC allows users to select from a large menu of
    security services including
  • Access control
  • Authentication
  • Confidentiality
  • Protection against replay attacks

50
IP Security Architecture
  • IPSEC has two major components.
  • The first component is a pair of protocols that
    implements security services provided by IPSEC
  • The second component provides support for key
    management

51
IP Security Architecture Security Services
  • In IPSEC security services are provided by a pair
    of protocols
  • The Authentication Header (AH) protocol provides
  • Access control
  • Connectionless message integrity
  • Authentication
  • Anti-replay protection
  • The Encapsulating Security Payload (ESP) protocol
    provides
  • All the services provided by AH
  • Confidentiality

52
IP Security Architecture Key Management
  • Key management is done by a protocol known as
    Internet Security Association and Key Management
    Protocol (ISAKMP)

53
IP Security Architecture
  • IPSec documents
  • RFC 2401 An overview of security architecture
  • RFC 2402 Description of a packet encryption
    extension to IPv4 and IPv6
  • RFC 2406 Description of a packet encryption
    extension to IPv4 and IPv6
  • RFC 2408 Specification of key managament
    capabilities

54
Questions
  • ??????????????????????????????????

adeel.akram_at_gmail.com
Write a Comment
User Comments (0)
About PowerShow.com