APNIC Security Tutorial (as part of AFCEA Marianas Technet)

Size: px
Start display at page:

Download "APNIC Security Tutorial (as part of AFCEA Marianas Technet)"

Transcription

1 APNIC Security Tutorial (as part of AFCEA Marianas Technet) Tamuning, Guam 24 April 2014 Proudly Supported by: Presenter Sheryl Hermoso (Shane) Training Officer, APNIC Sheryl has had various roles as a Network and Systems Administrator prior to joining APNIC. Starting her career as a Technical Support Assistant while studying at the University of the Philippines. Sheryl later worked as a Network Engineer, where she managed the DILNET network backbone and wireless infrastructure. Areas of interests: IPv6, DNS/DNSSEC, Network Security, IRM Contact: sheryl@apnic.net 1

2 Overview Introduction to Security Security on Different Layers and Attack Mitigation VPN and IPsec RPKI and Resource Certification How can APNIC help you? Security Management and Practices Intro to Security: Attacks and Trends 2

3 Attack Trends - Breach Sources Aggregation Infiltration Exfiltration Source: Trustwave 2012 Global Security Report Attack Trends Hacktivism and vandalism are the common DDoS attack motivation High-bandwidth DDoS attacks are the new normal First-ever IPv6 DDoS attacks are reported in 2011 Trust issues across geographic boundaries Source: Arbor Networks Worldwide Infrastructure Security Report Volume VIII 3

4 Evolution of Attack Landscape propagation of malicious code stealth /advanced scanning techniques widespread attacks using NNTP to distribute attack DDoS attacks increase in worms sophisticated command & control widespread attacks on DNS infrastructure executable code attacks (against browsers) automated widespread attacks GUI intruder tools hijacking sessions Internet social engineering attacks packet spoofing automated probes/scans widespread denial-of-service attacks techniques to analyze code for vulnerabilities without source code anti-forensic techniques home users targeted distributed attack tools increase in wide-scale Trojan horse distribution Windows-based remote controllable Trojans (Back Orifice) Attack Sophistication Intruder Knowledge Threats, Risk and Vulnerability Threat Any circumstance or event with the potential to cause harm to a networked system Denial of Service / Unauthorized Access / Impersonation / Worms / Viruses Vulnerability A weakness in security procedures, network design, or implementation that can be exploited to violate a corporate security policy Risk The possibility that a particular vulnerability will be exploited Risk analysis: The process of identifying security risks, determining their impact, and identifying areas requiring protection 4

5 Attack Motivation Criminal Criminal who use critical infrastructure as a tools to commit crime Their motivation is money War Fighting/Espionage/Terrorist What most people think of when talking about threats to critical infrastructure Patriotic/Principle Large groups of people motivated by cause - be it national pride or a passion aka Anonymous Attack Motivation Nation States want SECRETS Organized criminals want MONEY Protesters or activists want ATTENTION Hackers and researchers want KNOWLEDGE (copied from NANOG60 keynote presentation by Jeff Moss, Feb 2014) 5

6 Common Types of Attack Ping sweeps and port scans - reconnaissance Sniffing capture packet as they travel through the network Man-in-the-middle attack intercepts messages that are intended for a valid device Spoofing - sets up a fake device and trick others to send messages to it Hijacking take control of a session Denial of Service (DoS) and Distributed DoS (DDoS) Attacks on Different Layers Application Presentation Session Transport Network Data Link Physical OSI Reference Model Layer 5: SMB, NFS, Socks Layer 2: PPTP, Token Ring Application Layer 7: DNS, DHCP, HTTP, FTP, IMAP, LDAP, NTP, Radius, SSH, SMTP, SNMP, Telnet, TFTP DNS Poisoning, Phishing, SQL injection, Spam/Scam Transport Layer 4: TCP, UDP TCP attacks, Routing attack, SYN flooding, Sniffing Layer 3: IPv4, IPv6, ICMP, Internet IPsec Ping/ICMP Flood Network Access (Link floodinglayer) ARP spoofing, MAC TCP/IP Model 6

7 L2 Attacks - ARP Spoofing I want to connect to I don t know the MAC address Wait, I am ! ARP Request BB-BB-BB-BB-BB-BB AA-AA-AA-AA-AA-AA ARP Reply CC-CC-CC-CC-CC-CC ARP Reply Since the client s ARP Cache has already been poisoned, it will communicate directly to the fake Destination. I am This is my MAC address DD-DD-DD-DD-DD- DD L2 Attacks - DHCP DHCP Starvation Attack Broadcasting vast number of DHCP requests with spoofed MAC address simultaneously. DoS attack using DHCP leases Rogue DHCP Server Attacks Server runs out of IP addresses to allocate to valid users Attacker sends many different DHCP requests with many spoofed addresses. 7

8 L3 Attacks - Ping Flood Internet Attacker Victim Other forms of ICMP attack: - Ping of death - ICMP ping flood Broadcas t Enabled Network Routing Attacks Attempt to poison the routing information Distance Vector Routing Announce 0 distance to all other nodes Blackhole traffic Eavesdrop Link State Routing Can drop links randomly Can claim direct link to any other routers A bit harder to attack than DV BGP attacks ASes can announce arbitrary prefix ASes can alter path 8

9 L4 Attacks TCP Flooding Exploits the TCP 3-way handshake Attacker sends a series of SYN packets without replying with the ACK packet Finite queue size for incomplete connections SYN SYN+ACK ACK CONNECTION ESTABLISHED Server TCP Attacks Exploits the TCP 3-way handshake Attacker sends a series of SYN packets without replying with the ACK packet Finite queue size for incomplete connections SYN SYN+ACK Attacker ACK? Server (Victim) OPEN CONNECTIONS 9

10 Attacks on SSL BEAST Attack (2011) Browser Exploit Against SSL/TLS CBC vulnerability discovered in 2002 Fixed in TLS 1.1 CRIME Attack (2012) Compression Ratio Info-leak Made Easy Exploit against HTTP compression fixed by disabling TLS Compression BREACH Attack (2013) Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext Presented at BlackHat 2013 (Aug) Attacks HTTP responses using HTTP Compression 19 Heartbleed OpenSSL Bug (March 2014) Source: 10

11 ios vulnerability (21 Feb 2014) It appears that when using ios's Secure Transport component to establish an encrypted connection using a raw IP address, the system does not check that the "common name" record (a hostname pattern, such as *.hetzner.de) in a server's SSL certificate matches the server's IP address (eg, ) More details at the vulnerability affects both the ios and OS X operating systems Some checks: curl -o blah 1 Application Layer Attacks Applications don t authenticate properly Authentication information in clear FTP, Telnet, POP DNS insecurity DNS poisoning DNS zone transfer Are you sending your data in the clear? 11

12 1 Application Layer Attacks Scripting vulnerabilities Cookie poisoning Buffer overflow Hidden field manipulation Parameter tampering Cross-site scripting SQL injection Application Layer DDoS: Slowloris Incomplete HTTP requests Properties Low bandwidth Keep sockets alive Only affects certain web servers Doesn t work through load balancers Managed to work around accf_http 12

13 DNS Changer Criminals have learned that if they can control a user s DNS servers, they can control what sites the user connects to the Internet. How: infect computers with a malicious software (malware) This malware changes the user s DNS settings with that of the attacker s DNS servers Points the DNS configuration to DNS resolvers in specific address blocks and use it for their criminal enterprise For more: see the NANOG presentation by Merike Rogue DNS Servers through through through through through through If your computer is configured with one of these DNS servers, it is most likely infected with DNSChanger malware Are you using a trusted DNS server? 13

14 DNS Cache Poisoning Caching incorrect resource record that did not originate from authoritative DNS sources. Result: connection (web, , network) is redirected to another target (controlled by the attacker) DNS Cache Poisoning 1 I want to access Client 2 DNS Caching Server QID= QID=64569 QID=64570 QID=64571 match! (pretending to be the authoritative zone) Root/GTLD QID= Webserver ( ) ns.example.com 14

15 DNS Amplification A type of reflection attack combined with amplification Source of attack is reflected off another machine Traffic received is bigger (amplified) than the traffic sent by the attacker UDP packet s source address is spoofed DNS Amplification Attack Queries for Root/GTLD DNS Recursive server Compromised Machines (spoofed IP) ns.example.com Victim Server Attacker 15

16 Open Resolvers DNS servers that answer recursive queries from any host on the Internet Check if you re running open resolvers More statistics at For systems admins: Are you running an open resolver? Open Resolvers As of 13 Apr 2014: 27,429,020 servers responded to udp/53 probe 23,084,156 returned OK Reference: 16

17 Open NTP Project To check if you are running Open NTP ntpdc -n -c monlist ntpq -c rv New effort similar to the OpenResolvers project Wireless Attacks WEP first security mechanism for wireless networks Weaknesses in this protocol were discovered by Fluhrer, Mantin and Shamir, whose attacks became known as FMS attacks Tools were developed to automate WEP cracking Chopping attacks were released to crack WEP more effectively and faster Cloud-based WPA cracker How secure is your wireless connectivity? 17

18 Botnet Collection of compromised computers (or bot ) Computers are targeted by malware (malicious software) Once controlled, an attacker can use the compromised computer via standards-based network protocol such as IRC and HTTP How to become a bot: Drive-by downloads (malware) Go to malicious websites (exploits web browser vulnerabilities) Run malicious programs (Trojan) from websites or as attachment Are you aware if your machine has been compromised? Password Cracking Dictionary attacks Guessing passwords using a file of 1M possible password values Ordinary words and people s names Offline dictionary attack when the entire password file has been attacked Use random characters as password with varying upper and lower case, numbers, and symbols Brute-force attacks Checking all possible values until it has been found The resource needed to perform this attack grows exponentially while increasing the key size Social engineering Do you use secure passwords? 18

19 Pharming and Phishing Phishing victims are redirected to a fake website that looks genuine. When the victim supplies his account and password, this can be used by the attacker to the target site Typically uses fraud s with clickable links to fake websites Pharming redirect a website s traffic to another fake site by changing the victim s DNS settings or hosts file Do you click every link you receive in an ? Questions 19

20 Layered Approach to Security Attack Mitigation Goals of Information Security Confidentiality Integrity Availability prevents unauthorized use or disclosure of information safeguards the accuracy and completeness of information authorized users have reliable and timely access to information SECURITY 20

21 Access Control The ability to permit or deny the use of an object by a subject. It provides 3 essential services: Authentication (who can login) Authorization (what authorized users can do) Accountability (identifies what a user did) Authentication A means to verify or prove a user s identity The term user may refer to: Person Application or process Machine or device Identification comes before authentication Provide username to establish user s identity To prove identity, a user must present either of the following: What you know (passwords, passphrase, PIN) What you have (token, smart cards, passcodes, RFID) Who you are (biometrics such as fingerprints and iris scan, signature or voice) 21

22 Trusted Network Standard defensive-oriented technologies Firewall first line of defense Intrusion Detection second line of defense Build TRUST on top of the TCP/IP infrastructure Strong authentication Two-factor authentication something you have + something you know Public Key Infrastructure (PKI) Two-factor Authentication Requires a user to provide at least two authentication factors to prove his identity something you know Username/userID and password something you have Token using a one-time password (OTP) The OTP is generated using a small electronic device in physical possession of the user Different OTP generated each time and expires after some time An alternative way is through applications installed on your mobile device Multi-factor authentication is also common 22

23 Authorization Defines the user s rights and permissions on a system Typically done after user has been authenticated Grants a user access to a particular resource and what actions he is permitted to perform on that resource Access criteria based on the level of trust: Roles Groups Location Time Transaction type Authentication vs. Authorization Service Authentication Mechanism Authorization Mechanism Client Authentication simply identifies a party, authorization defines whether they can perform certain action RFC

24 Accountability The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity Senders cannot deny sending information Receivers cannot deny receiving it Users cannot deny performing a certain action Supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention and after-action recovery and legal action Source: NIST Risk Management Guide for Information Technology Systems Security on Different Layers Application Presentation Session Transport Network Data Link Physical Layer 7: DNS, DHCP, HTTP, FTP, IMAP, LDAP, NTP, Radius, SSH, SMTP, SNMP, Telnet, TFTP DNS HTTPS, Poisoning, DNSSEC, Phishing, PGP, SQL SMIME injection, Spam/Scam Layer 5: SMB, NFS, Socks TCP attacks, TLS, Routing SSL, SSH attack, SYN flooding, Sniffing Layer 4: TCP, UDP Layer 3: IPv4, IPv6, ICMP, IPsec Ping/ICMP IPsec Flood Layer 2: ARP, Token Ring ARP IEEE spoofing, 802.1X, PPP MAC & flooding PPTP 24

25 VPN Protocols PPTP (Point-to-Point tunneling Protocol) Developed by Microsoft to secure dial-up connections Operates in the data-link layer L2F (Layer 2 Forwarding Protocol) Developed by Cisco Similar as PPTP L2TP (Layer 2 Tunneling Protocol) IETF standard Combines the functionality of PPTP and L2F IPsec (Internet Protocol Security) Open standard for VPN implementation Operates on the network layer Network Layer Security - IPsec Internet! IPSec! IETF standard that enables encrypted communication between peers: Consists of open standards for securing private communications Network layer encryption ensuring data confidentiality, integrity, and authentication Scales from small to very large networks 25

26 Pretty Good IPsec Policy IKE Phase 1 (aka ISAKMP SA or IKE SA or Main Mode) 3DES (AES-192 if both ends support it) Lifetime (8 hours = 480 min = sec) SHA-2 (256 bit keys) DH Group 14 (aka MODP# 14) IKE Phase 2 (aka IPsec SA or Quick Mode) 3DES (AES-192 if both ends support it) Lifetime (1 hour = 60 min = 3600 sec) SHA-2 (256 bit keys) PFS 2 DH Group 14 (aka MODP# 14) 51 Receiving Prefixes There are three scenarios for receiving prefixes from other ASNs Customer talking BGP Peer talking BGP Upstream/Transit talking BGP Each has different filtering requirements and need to be considered separately 26

27 Receiving Prefixes: From Customers ISPs should only accept prefixes which have been assigned or allocated to their downstream customer If ISP has assigned address space to its customer, then the customer IS entitled to announce it back to his ISP If the ISP has NOT assigned address space to its customer, then: Check in the five RIR databases to see if this address space really has been assigned to the customer. Legitimacy of Address (LoA) check The tool: whois h jwhois.apnic.net x.x.x.0/24 (jwhois queries all RIR database) Receiving Prefixes: From Customers Example use of whois to check if customer is entitled to announce address space: $ whois -h whois.apnic.net 2406:6400::/32 Inet6num: 2406:6400::/32 netname: APNIC-AP descr: Asia Pacific Network Information Centre descr: Regional Internet Registry for the Asia-Pacific descr: 6 Cordelia Street descr: South Brisbane, QLD 4101 descr: Australia country: AU Portable means its an admin-c: AIC1-AP tech-c: NO4-AP assignment to the customer, the mnt-by: APNIC-HM customer can announce it to you mnt-irt: IRT-APNIC-AP changed: hm-changed@apnic.net status: ASSIGNED PORTABLE changed: hm-changed@apnic.net source: APNIC 27

28 Receiving Prefixes: From Peers A peer is an ISP with whom you agree to exchange prefixes you originate into the Internet routing table Prefixes you accept from a peer are only those they have indicated they will announce Prefixes you announce to your peer are only those you have indicated you will announce Receiving Prefixes: From Peers Agreeing what each will announce to the other: Exchange of documentation as part of the peering agreement, and then ongoing updates OR Use of the Internet Routing Registry and configuration tools such as the IRRToolSet 28

29 Receiving Prefixes: From Upstream Upstream/Transit Provider is an ISP who you pay to give you transit to the WHOLE Internet Receiving prefixes from them is not desirable unless really necessary Ask upstream/transit provider to either: originate a default-route OR announce one prefix you can use as default SSL/TLS Most widely-used protocol for security Encrypts the segments of network connections above the Transport Layer SSL and TLS SSL v3.0 specified in an I-D in 1996 (draft-freier-ssl-version3-02.txt) TLS v1.0 specified in RFC 2246 in 1999 TLS v1.0 = SSL v3.1 SSL v3.0 TLS v1.1 in 2006 TLS v1.2 in 2008 Goals of protocol Secure communication between applications Data encryption Server authentication Message integrity Client authentication (optional) 29

30 Benefits of TLS Application-layer independent can be implemented with any applications a wide range of applications supporting it SSL makes use of both asymmetric and symmetric key cryptography. performance reasons. Only the initial "client key exchange message" is encrypted with asymmetric encryption. Symmetric encryption is better in terms of performance/speed Uses X.509 certificates Certificates and Public Key Infrastructure SSL protocol layers comes on top of TCP (transport Layer), and is below application layer. no network infrastructure changes are required to deploy SSL Each and every connection that's made, through SSL has got one session information. Session can also be reused or resumed for other connections to the server 59 SSL Protocol Building Blocks SSL is a Combination of a Primary Record Protocol with Four Client Protocols SSL Handshake Protocol SSL Alert Protocol SSL Change Cipher Spec Protocol Application Data Protocol SSL Record Protocol 30

31 Applications Using SSL/TLS Protocol Defined Port Number SSL/TLS Port Number HTTP NNTP LDAP FTP-data FTP-control Telnet IMAP POP SMTP Public Key Infrastructure Combines public key cryptography and digital signatures to ensure confidentiality, integrity, authentication, nonrepudiation, and access control Digital certificate basic element of PKI; secure credential that identifies the owner Basic Components: Certificate Authority (CA) Registration Authority (RA) Repository Archive 31

32 Secure Shell Protocol (SSH) Protocol for secure remote login Provides support for secure remote login, secure file transfer, and secure forwarding of TCP/IP and X Window System traffic Consists of 3 major components: Transport layer protocol (server authentication, confidentiality, integrity) User authentication protocol (authenticates client to the server) Connection protocol (multiplexes the encrypted tunnel into several logical channels) Application Layer Security HTTPS PGP (Pretty Good Privacy) SMIME (Secure Multipurpose Internet Mail Extensions) TSIG and DNSSEC Wireless Encryption - WEP, WPA, WPA2 32

33 HTTPS Hypertext Transfer Protocol Secure Widely-used, message-oriented communications protocol Connectionless oriented protocol Technically not a protocol in itself, but simply layering HTTP on top of the SSL/TLS protocol Encapsulates data after security properties of the session Not to be confused with S-HTTP Note: A website must use HTTPS everywhere, otherwise it is still vulnerable to some attacks Pretty Good Privacy (PGP) Stands for Pretty Good Privacy, developed by Phil Zimmerman in 1995 PGP is a hybrid cryptosystem combines some of the best features of both conventional and public key cryptography Assumptions: All users are using public key cryptography and have generated private/public key pairs (using RSA or El Gamal) All users also use symmetric key system (DES or Rijndael) Offers authentication, confidentiality, compression, compatibility and segmentation 33

34 PGP - Trust Centralized / hierarchal trust where certain globally trusted bodies sign keys for every one else. Decentralized webs of trust where you pick who you trust yourself, and decide if you trust who those people trust in turn. Which works better for what reasons? Key management: Partying Key signing parties are ways to build webs of trust. Each participant carries identification, as well as a copy of their key fingerprint. (maybe some $ as well J ) Each participant decides if they re going to sign another key based on their personal policy. Keys are easiest kept in a keyring on an openpgp keyserver in the aftermath of the party. 34

35 VPN and IPsec Virtual Private Networks Creates a secure tunnel over a public network Any VPN is not automagically secure. You need to add security functionality to create secure VPNs. That means using firewalls for access control and probably IPsec or SSL/TLS for confidentiality and data origin authentication

36 VPN Protocols PPTP (Point-to-Point tunneling Protocol) Developed by Microsoft to secure dial-up connections Operates in the data-link layer L2F (Layer 2 Forwarding Protocol) Developed by Cisco Similar as PPTP L2TP (Layer 2 Tunneling Protocol) IETF standard Combines the functionality of PPTP and L2F IPsec (Internet Protocol Security) Open standard for VPN implementation Operates on the network layer Other VPN Implementations MPLS VPN Used for large and small enterprises Pseudowire, VPLS, VPRN GRE Tunnel Packet encapsulation protocol developed by Cisco Not encrypted Implemented with IPsec L2TP IPsec Uses L2TP protocol Usually implemented along with IPsec IPsec provides the secure channel, while L2TP provides the tunnel 36

37 What is IPSec? Internet! IPSec! IETF standard that enables encrypted communication between peers: Consists of open standards for securing private communications Network layer encryption ensuring data confidentiality, integrity, and authentication Scales from small to very large networks What Does IPsec Provide? Confidentiality.many algorithms to choose from Data integrity and source authentication Data signed by sender and signature verified by the recipient Modification of data can be detected by signature verification Because signature based on a shared secret, it gives source authentication Anti-replay protection Optional : the sender must provide it but the recipient may ignore Key Management IKE session negotiation and establishment Sessions are rekeyed or deleted automatically Secret keys are securely established and authenticated Remote peer is authenticated through varying options 74 37

38 Different Layers of Encryption Application Layer SSL, PGP, SSH, HTTPS Source Destination Network Layer - IPsec Link Layer Encryption Relevant Standard(s) IETF specific rfc2409: IKEv1 rfc4301: IPsec Architecture (updated) rfc4303: IPsec ESP (updated) rfc4306: IKEv2 rfc4718: IKEv2 Clarifications rfc4945: IPsec PKI Profile IPv6 and IPsec rfc4294: IPv6 Node Requirements Rfc4552: Authentication/Confidentiality for OSPFv3 rfc4877: Mobile IPv6 Using IPsec (updated) rfc4891: Using IPsec to secure IPv6-in-IPv4 Tunnels 76 38

39 IPsec Modes Tunnel Mode Entire IP packet is encrypted and becomes the data component of a new (and larger) IP packet. Frequently used in an IPsec site-to-site VPN Transport Mode IPsec header is inserted into the IP packet No new packet is created Works well in networks where increasing a packet s size could cause an issue Frequently used for remote-access VPNs Tunnel vs. Transport Mode IPsec IP Header TCP Header Payload Without IPsec IP Header IPsec Header TCP Header Payload Transport Mode IPsec New IP Header IPsec Header IP Header TCP Header Payload Tunnel Mode IPsec 39

40 Transport vs Tunnel Mode TFTP Routing Update File Transfer File Transfer Transport Mode: End systems are the initiator and recipient of protected traffic Tunnel Mode: Gateways act on behalf of hosts to protect traffic 79 IPsec Architecture AH Authentication Header IPsec Security Policy ESP Encapsulating Security Payload IKE The Internet Key Exchange 40

41 Security Associations (SA) A collection of parameters required to establish a secure session Uniquely identified by three parameters consisting of Security Parameter Index (SPI) IP destination address Security protocol (AH or ESP) identifier An SA is unidirectional Two SAs required for a bidirectional communication A single SA can be used for AH or ESP, but not both must create two (or more) SAs for each direction if using both AH and ESP Authentication Header (AH) Provides source authentication and data integrity Protection against source spoofing and replay attacks Authentication is applied to the entire packet, with the mutable fields in the IP header zeroed out If both AH and ESP are applied to a packet, AH follows ESP Operates on top of IP using protocol 51 In IPv4, AH protects the payload and all header fields except mutable fields and IP options (such as IPsec option) DEPRECATED 41

42 Encapsulating Security Payload (ESP) Uses IP protocol 50 Provides all that is offered by AH, plus data confidentiality It uses symmetric key encryption Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication is applied to data in the IPsec header as well as the data contained as payload IPv4 IPsec AH IPv4 AH Transport Mode: Before applying AH: After applying AH: Original IP Header TCP/UDP Data Original IP Header AH Header TCP/UDP Data Mutable Fields: - ToS - TTL - Hdr Checksum - Offset - Flags Authenticated except for mutable fields in IP header IPv4 AH Tunnel Mode: Before applying AH: After applying AH: Original IP Header TCP/UDP Data New IP Header AH Header Original IP Header Data Mutable Fields: - ToS - TTL - Hdr Checksum - Offset - Flags Authenticated except for mutable fields in new IP header 84 42

43 IPv4 IPsec ESP Before applying ESP: Original IP Header TCP/UDP Data IPv4 ESP Transport Mode: After applying ESP: Original IP Header ESP Header TCP/UDP Data ESP Trailer ESP Auth Encrypted Authenticated IPv4 ESP Tunnel Mode: Before applying ESP: After applying ESP: Original IP Header TCP/UDP Data New IP Header ESP Header Original IP Header TCP/UDP Data ESP Trailer ESP Auth Authenticated Encrypted 85 ESP Header Format ENCRYPTED Security Parameter Index (SPI) Sequence Number Initialization Vector (IV) Payload Data (Variable) Padding (0-255 bytes) Padding Length Next Header Authentication Data (ICV) SPI: Arbitrary 32-bit number that specifies SA to the receiving device Seq #: Start at 1 and must never repeat; receiver may choose to ignore IV: Used to initialize CBC mode of an encryption algorithm Payload Data: Encrypted IP header, TCP or UDP header and data Padding: Used for encryption algorithms which operate in CBC mode Padding Length: Number of bytes added to the data stream (may be 0) Next Header: The type of protocol from the original header which appears in the encrypted part of the packet Auth Data: ICV is a digital signature over the packet and it varies in length depending on the algorithm used (SHA-1, MD5) 86 43

44 Internet Key Exchange (IKE) An IPsec component used for performing mutual authentication and establishing and maintaining Security Associations. (RFC 5996) Typically used for establishing IPsec sessions A key exchange mechanism Five variations of an IKE negotiation: Two modes (aggressive and main modes) Three authentication methods (pre-shared, public key encryption, and public key signature) Uses UDP port 500 IKE Modes Mode Main mode Aggressive Mode Quick Mode Description Three exchanges of information between IPsec peers. Initiator sends one or more proposals to the other peer (responder), responder selects a proposal Diffie-Hellman (DH) key exchange Establish ISAKMP session Achieves same result as main mode using only 3 packets First packet sent by initiator containing all info to establish SA Second packet by responder with all security parameters selected Third packet finalizes authentication of the ISAKMP session Negotiates the parameters for the IPsec session. Entire negotiation occurs within the protection of ISAKMP session 44

45 Internet Key Exchange (IKE) Phase I Establish a secure channel (ISAKMP SA) Using either main mode or aggressive mode Authenticate computer identity using certificates or pre-shared secret Phase II Establishes a secure channel between computers intended for the transmission of data (IPsec SA) Using quick mode IPsec with IKE 1 Traffic which needs to be protected is recognized as requiring IPsec protection IPsec Peer Peers Authenticate using: - Pre-shared key - Digital Certificate 2 IKE Phase 1 Secure communication channel IPsec Peer 3 IKE Phase 2 IPsec Tunnel Secured traffic exchange 4 Secured Communications 90 45

46 IPsec IKE Phase 1 Uses DH Exchange First public key algorithm (1976) Diffie Hellman is a key establishment algorithm Two parties in a DF exchange can generate a shared secret There can even be N-party DF changes where N peers can all establish the same secret key Diffie Hellman can be done over an insecure channel IKE authenticates a Diffie-Hellman exchange Pre-shared secret Nonce (RSA signature) Digital signature 91 IKE Phase 1 Main Mode Initiator 3 Compute DH shared secret and derive keying material Responder Internet 1 Negotiate IKE Policy IKE Message 1 (SA proposal) IKE Message 2 (accepted SA) 2 Authenticated DH Exchange IKE Message 3 (DH public value, nonce) IKE Message 4 (DH public value, nonce) 4 Protect IKE Peer Identity IKE Message 5 (Authentication material, ID) IKE Message 6 (Authentication material, ID) (Encrypted) 92 46

47 IKE Phase 2 Quick Mode 4 Validate message 2 1 Initiator 7 Compute keying material Internet Message 1 (authentication/keying material and SA proposal) Responder 2 Validate message 1 6 Validate message 3 Message 2 (authentication/keying material and accepted SA) 3 5 Message 3 (hash for proof of integrity/authentication) 93 IKE v2: Replacement for Current IKE Specification Feature Preservation Most features and characteristics of baseline IKE v1 protocol are being preserved in v2 Compilation of Features and Extensions Quite a few features that were added on top of the baseline IKE protocol functionality in v1 are being reconciled into the mainline v2 framework Some New Features 47

48 IKE v2: What Is Not Changing Features in v1 that have been debated but are ultimately being preserved in v2 Most payloads reused Use of nonces to ensure uniqueness of keys v1 extensions and enhancements being merged into mainline v2 specification Use of a configuration payload similar to MODECFG for address assignment X-auth type functionality retained through EAP Use of NAT Discovery and NAT Traversal techniques IKE v2: What Is Changing Significant Changes Being to the Baseline Functionality of IKE EAP adopted as the method to provide legacy authentication integration with IKE Adds standard mobility support through MOBIKE Ability to detect whether the tunnel is still alive or not Liveness check Incorporation of NAT traversal DoS attack resilience Check if source actually exists 48

49 How Does IKE v2 Work? IKE_SA_INIT (Two Messages) IKE_SA Authentication Parameters Negotiated IKE_AUTH (Two Messages) IKE Authentication Occurs and One CHILD_SA Created CREATE_CHILD_SA (Two Messages) Second CHILD_SA Created Protected Data Non-Vendor Specific Deployment Issues Historical Perception Configuration nightmare Not interoperable Performance Perception Need empirical data Where is the real performance hit? Standards Need Cohesion 98 49

50 Vendor Specific Deployment Issues Lack of interoperable defaults A default does NOT mandate a specific security policy Defaults can be modified by end users Configuration complexity Too many knobs Vendor-specific terminology Good News: IPv6 support in most current implementations 99 Pretty Good IPsec Policy IKE Phase 1 (aka ISAKMP SA or IKE SA or Main Mode) 3DES (AES-192 if both ends support it) Lifetime (8 hours = 480 min = sec) SHA-2 (256 bit keys) DH Group 14 (aka MODP# 14) IKE Phase 2 (aka IPsec SA or Quick Mode) 3DES (AES-192 if both ends support it) Lifetime (1 hour = 60 min = 3600 sec) SHA-2 (256 bit keys) PFS 2 DH Group 14 (aka MODP# 14)

51 Sample Router Configuration crypto isakmp policy 1 authentication pre-share encryption aes hash sha group 5 crypto isakmp key Training123 address ! crypto ipsec transform-set ESP-AES-SHA esp-aes esp-sha-hmac! crypto map LAB-VPN 10 ipsec-isakmp match address 101 set transform-set ESP-AES-SHA set peer Phase 1 SA Phase 2 SA Encryption and Authentication Sample Router Configuration int fa 0/1 crypto map LAB-VPN Exit! Apply on outbound interface access-list 101 permit ip Define interesting VPN traffic 51

52 Help With Configuring IPsec Documents for Cisco IPsec configuration: technologies_configuration_example09186a f73.shtml technologies_configuration_example09186a f86.shtml Document for Juniper IPsec configuration: Capture: Telnet

53 Capture: Telnet + IPsec 105 Public Key Infrastructure Network Security Workshop 53

54 Public Key Infrastructure Framework that builds the network of trust Combines public key cryptography, digital signatures, to ensure confidentiality, integrity, authentication, nonrepudiation, and access control Protects applications that require high level of security Functions of a PKI Registration Initialization Certification Key pair recovery Key generation Key update Cross-certification Revocation 54

55 Public Key Infrastructure Source: Components of a PKI Certificate authority The trusted third party Trusted by both the owner of the certificate and the party relying upon the certificate. Validation authority Registration authority For big CAs, a separate RA might be necessary to take some work off the CA Identity verification and registration of the entity applying for a certificate Central directory 55

56 Certificates Public key certificates bind public key values to subjects A trusted certificate authority (CA) verifies the subject s identity and digitally sign each certificate Validates Has a limited valid lifetime Can be used using untrusted communications and can be cached in unsecured storage Because client can independently check the certificate s signature Certificate is NOT equal to signature It is implemented using signature Certificates are static If there are changes, it has to be re-issued Digital Certificate Digital certificate basic element of PKI; secure credential that identifies the owner Also called public key certificate Certificate examples: X509 (standard) PGP (Pretty Good Privacy) 56

57 Every certificate contains Body of the certificate Version number, serial number, names of the issuer and subject Public key associated with the subject Expiration date (not before, not after) Extensions for additional tributes Signature algorithm Used by the CA to sign the certificate Signature Created by applying the certificate body as input to a one-way hash function. The output value is encrypted with the CA s private key to form the signature value Digital Certificate Lifecycle Key Pair Generated Certificate Issued Recertify Certificate valid and in use Private Key compromised Certificate Expires Keypair Expired Certificate Revoked

58 Certificate Authority Issuer and signer of the certificate Trusted (Third) Party Based on trust model Who to trust? Types: Enterprise CA Individual CA (PGP) Global CA (such as VeriSign) Functions: Enrolls and Validates Subscribers Issues and Manages Certificates Manages Revocation and Renewal of Certificates Establishes Policies & Procedures Certificate Revocation Lists CA periodically publishes a data structure called a certificate revocation list (CRL). Described in X.509 standard. Each revoked certificate is identified in a CRL by its serial number. CRL might be distributed by posting at known Web URL or from CA s own X.500 directory entry. 58

59 Who Can Be a CA? A CA signs certificates, but which CA? Who picks CAs? Perhaps another CA issues a certificate to other CAs but who picked them? Ultimately, you have to trust someone the trust anchor Modern operating systems and browsers come with a list of built-in CAs You are trusting your vendors; they have decided to trust certain CAs Are these CAs trustworthy? 117 The Browser CA Problem Microsoft trusts over 300 certificate authorities If you delete one, Windows will helpfully reload it for you Mozilla trusts 150 Apple trusts 180 Any CA your browser trusts can issue a certificate for any site at all, even if there is already some other certificate for it If any single CA is compromised, your browser can be fooled This has happened

60 The Diginotar Case Someone penetrated Diginotar (a CA) and stole its private key This key was used to create fake certificates for gmail.com People in Iran who tried to connect securely to gmail instead connected to somewhere else but it looked authentic, because there was a Diginotar-issued certificate for Google Note: Diginotar was not Google s CA Diginotar is (a) no longer trusted by browsers, and (b) out of business 119 RPKI Resource Public Key Infrastructure 60

61 SIDR Working Group Secure Inter-Domain Routing (SIDR) Its purpose is to reduce vulnerabilities to the inter-domain routing system Addresses two vulnerabilities: Is an Autonomous System authorized to originate an IP prefix? Is the AS-Path represented in the route the same as the path through which the NLRI traveled? Projects: PKI, RPKI, BGPsec Source: SIDR WG BGP Security (BGPsec) Extension to BGP that provides improved security for BGP routing Currently an IETF Internet draft Implemented via a new optional non-transitive BGP path attribute that contains a digital signature Two things: BGP Prefix Origin Validation (using RPKI) BGP Path Validation 61

62 Three Pieces RPKI Resource Public Key Infrastructure, the Certificate Infrastructure to Support the other Pieces (deployed at all RIRs) Origin Validation Using the RPKI to detect and prevent mis-originations of someone else s prefixes (in deployment) AS-Path Validation / BGPsec Prevent Path Attacks on BGP (future work) What is RPKI? Resource Public Key Infrastructure (RPKI) A robust security framework for verifying the association between resource holder and their Internet resources Created to address the issues in RFC 4593 Uses X.509 v3 certificates With RFC3779 extensions 62

63 What is RPKI? represents the allocation hierarchy of IP address space and Autonomous Systems (AS) numbers A system to manage the creation and storage of digital certificates and the associated Route Origin Authorization documents Helps to secure Internet routing by validating routes Proof that prefix announcements are coming from the legitimate holder of the resource RPKI is in the process of standardization through the Secure Inter-Domain Routing (SIDR) working group RFCs on RPKI RFC 6810 The Resource Public Key Infrastructure (RPKI) to Router Protocol (January 2013) - Standard RFC 6480 An Infrastructure to Support Secure Internet Routing (Feb 2012) - informational RFC 6481 A Profile for Resource Certificate Repository Structure (Feb 2012) - standard RFC 6491 RPKI Objects Issued by IANA RFC 6493 The RPKI Ghostbusters Record RFC 6487 A Profile for X.509 PKIX Resource Certificate 63

64 A bit of History 1986 Bellovin & Perlman identify the vulnerability in DNS and Routing National Academies study called it out 2000 S-BGP X.509 PKI to support Secure BGP - Kent, Lynn, et al NANOG S-BGP Workshop 2006 RPKI.NET(for ARIN) & APNIC start work on RPKI. RIPE starts in RPKI.NET Open Testbed and running code in test routers Benefits of RPKI - Routing Prevents Route Hijacking when an entity participating in Internet routing announces a prefix without authorization Reason: malicious attack Prevents mis-origination A prefix that is originated by an AS which does not own it Reason: configuration mistake 64

65 Internet Routing The Internet Global Routing Table 4.128/ / / / /24 Announce /24 Traffic / /24 Right to Resources ISP gets their resources from the RIR ISP notifies its upstream of the prefixes to be announced Upstream _MUST_ check the Whois database if resource has been delegated to customer ISP. We need to be able to authoritatively prove who owns an IP Prefix and what AS(s) may announce it. 65

66 X.509 Certificate Resource certificates are based on the X.509 certificate format - RFC 5280 Extended by RFC 3779 this extension binds a list of resources (IP, ASN) to the subject of the certificate X.509 Certificate with 3779 Extension X.509 Certificate SIA Subject Information Access; contains a URI that references the directory RFC 3779 Extension SIA Owner's Public Key 66

67 Two Components Certificate Authority (CA) Internet Registries (RIR, NIR, Large LIR) Issue certificates for customers Allow customers to use the CA s GUI to issue ROAs for their prefixes Relying Party (RP) Software which gathers data from CAs Route Origin Authorization (ROA) Certificate holder uses its private key to sign an ROA Verifies that an AS has been given permission by an address block holder to advertise routes to one or more prefixes without that block 67

68 Resource Certification RIRs have been developing a new service for their members APNIC has now launched Resource Certification for the AP region The goal is to improve the security of inter-domain routing and augmenting the information published in the APNIC Whois Database Resource Certification Benefits Routing information corresponds to properly delegated address resources Resource Certification gives resource holders proof that they hold certain resources Resource holders can attest to those resources when distributing them Resource Certification is a highly robust means of preventing the injection of false information into the Internet's routing system. 68

69 APNIC Resource Certification A robust security framework for verifying the association between resource holders and their Internet resources. Initiative from APNIC aimed at improving the security of inter-domain routing, and augmenting the information published in the Whois database Verifies a holder s current right-of-use over an Internet resource How it Works 69

70 Creating ROA Records Login to MyAPNIC, then Resources -> Certification Adding ROA Records 70

71 Deleting ROA Records RPKI Validation RPKI-capable routers can fetch the validated ROA dataset from a trust anchor BGP states: VALID if a matching VRP* was found INVALID a VRP was found, but ASN did not match UNKNOWN if no matching or covering VRP was found 71

72 Questions How APNIC can help you?

73 Internet Challenges Today Internet Security Unauthorized Intrusions Denial of Service (DoS) Attacks Internal Attacks Non-compliance etc. Spam Unsolicited Commercial (UCE) & Unsolicited Bulk (UBE) Spam volume is exploding Network abuse RIR s do not regulate conduct of Internet activity Investigation possibilities Cooperation of the network administrators Law enforcement agencies APNIC Service offerings Whois Database an important resource! Troubleshooting Tracking source of abuse Protecting address space to prevent hijacking Information dissemination APNIC Conferences Technical talks & tutorials Publications & Research Education Training courses, Workshops and Seminars 73

74 Steps we take to ensure Whois accuracy Member account opening verification of corporate existence with corporate registries or regulators (where possible) Membership renewal once a year to corporate contact, with payment record Internet resources revoked if account not paid or renewed Transfer policies encourage registration of resources value of Internet resources encourage registration Efforts in Preventing Network Abuse As a registry, APNIC adopts and applies policies for it s community which address network abuse. APNIC does not have the capacity to investigate abuse complaints or the legal powers to regulate Internet activity. APNIC seeks to raise awareness of the need for responsible network management in the Asia Pacific, through training and communication. 74

75 Why APNIC appear as the source in some abuse search reports? Some designed to search the ARIN Whois database and may refer to APNIC as the culprit Many websites with Whois lookup functions has the same limitations However the IP addresses are registered by five RIRs on a regional basis Detecting the Abuse If a standard search refers you to APNIC It means only that the network in question is registered in the Asia Pacific region Does not mean that APNIC is responsible or that the hacker/spammer is using APNIC network 75

76 Can APNIC stop Abuse? No, because APNIC is not an ISP and does not provide network connectivity to other networks APNIC does not control Internet routing APNIC is not a law enforcement agency APNIC has no industry regulatory power Investigation of Complaints Laws relating to network abuse vary from country to country Investigation possibilities Cooperation of the network administrators Law enforcement agencies Local jurisdiction Jurisdiction where the problem originates 76

77 What can you do? Use the APNIC Whois Database to obtain network contact information APNIC Whois may or may not show specific customer assignments for the addresses in question But will show the ISP holding APNIC space Contact the network responsible and also its ISP/upstream Contact APNIC for help, advice, training or support Community discussions can be raised in the APNIC conferences, mailing lists, etc. APNIC Resource Quality Assurance Community awareness Build relationships with reputable organizations that maintain bogon/black list Keep the WHOIS Database accurate Actively remind resource holders to update their data 77

78 APNIC also manages Reverse DNS Forward DNS maps names to numbers svc00.apnic.net è Reverse DNS maps numbers to names è svc00.apnic.net Person (Host) Address (IPv4/IPv6) 155 The APNIC Whois Database

79 The APNIC Whois Database Holds IP address records within the AP region Can use this database to track down the source of the network abuse IP addresses, ASNs, Reverse Domains, Routing policies Can find contact details of the relevant network administrators not the individual users use administrators log files to contact the individual involved Resource Registration As part of the membership agreement with APNIC, all members are required to register their resources in the APNIC Whois database. Members must keep records up to date: Whenever there is a change in contacts When new resources are received When resources are sub-allocated or assigned

80 Whois Object Types OBJECT PURPOSE person contact persons role contact groups/roles inetnum IPv4 addresses Inet6num IPv6 addresses aut-num Autonomous System number domain reverse domains route prefixes being announced mntner (maintainer) data protection mnt-irt Incident Response Team How to use APNIC Whois Web browser Whois client or query tool whois.apnic.net Identify network contacts from the registration records IRT (Incident Response Team) if present Contact persons: tech-c or admin-c 80

81 What if Whois info is invalid? Members (ISPs) are responsible for reporting changes to APNIC Under formal membership agreement Report invalid ISP contacts to APNIC APNIC will contact member and update registration details What if Whois info is invalid? Customer assignment information is the responsibility of ISPs ISPs are responsible for updating their customer network registrations Tools such as traceroute, looking glass and RIS may be used to track the upstream provider if needed More information available from APNIC 81

82 Inetnum / Inet6num Objects Contains IP allocation and assignment information APNIC creates an inetnum (or inet6num) object for each allocation or assignment they make to the Member All members must create inetnum (or inet6num) objects for each sub-allocation or assignment they make to customers 163 IRT Object Incident Response Team (IRT) Dedicated abuse handling teams (not netops) Implemented in Nov 2010 through Prop-079 Abuse contact information Mandatory object reference in inetnum, inet6num, and autnum objects 82

83 IRT Object Why provide abuse contact Dedicated contacts or team that specifically resolve computer security incidents Efficient and accurate response Stops the tech-c and admin-c from getting abuse reports Shared response to address abuse APNIC Whois Registration 83

84 APNIC Whois Registration APNIC Whois Registration 84

85 APNIC Whois Registration Maintainer Hierarchy Diagram Allocated to APNIC: Maint-by can only be changed by IANA Allocated to Member: Maint-by can only be changed by APNIC Sub-allocated to Customer: Maint-by can only be changed by Member

86 Using the Whois step by step 3 inetnum: 1 2 person: nic-hdl: KX17-AP Contact info mntner: Data Protection Allocation (Created by APNIC) inetnum:... KX17-AP... mnt-by:... 4 inetnum:... KX17-AP... mnt-by:... 5 Customer Assignments (Created by Member) inetnum:... KX17-AP... mnt-by:... 6 Whois Database Queries Flags used for inetnum queries None one level less specific matches - L find all less specific matches - m find first level more specific matches - M find all More specific matches - x find exact match (if no match, nothing) - d enables use of flags for reverse domains - r turn off recursive lookups 86

87 Whois Database Query - inetnum whois -L /20 Less specific (= bigger block) inetnum: /8 whois /20 inetnum: /20 whois m /20 More specific (= smaller blocks) inetnum: /24 inetnum: /25 inetnum: /26 Recursive Lookups whois à inetnum route, & person recursion enabled by default whois -r inetnum route person à & whois -T inetnum à inetnum person & whois -r -T inetnum à inetnum recursion turned off type of object specified type of object specified & recursion turned off 87

88 Inverse Queries Inverse queries are performed on inverse keys See object template (whois t) Returns all public objects that reference the object with the key specified as a query argument Practical when searching for objects in which a particular value is referenced, such as your nic-hdl Syntax: whois -i <attribute> <value> Customer Privacy Public data Includes portable addresses (inetnum objects), and other objects e.g.route objects Public data: must be visible Private data Can include non-portable addresses (inetnum objects) Members have the option to make private data visible Customer assignments Can be changed to be public data (public data is an optional choice) 88

89 What needs to be visible? IANA range Non-APNIC range APNIC range APNIC allocations & assignments NIR range must be visible PORTABLE addresses NIR allocations & assignments LIR/ISP Customer assignments Infrastructure Sub-allocations visibility optional NON-PORTABLE addresses APNIC Whois Database & the Internet Routing Registry APNIC Whois Database Two databases in one Public Network Management Database Whois info about networks & contact persons IP addresses, AS numbers etc Routing Registry contains routing information routing policy, routes, filters, peers etc. APNIC RR is part of the global IRR 89

90 Benefits of APNIC RR integrated in Whois Database Facilitates network troubleshooting Registration of routing policies Generation of router configurations Provides global view of routing Security Management and Practices 90

91 Open-Source Tools for Monitoring Logging and monitoring systems Syslog, SNMP, Nagios, Cacti, Netflow, Nfsen Detection and data gathering IDS system, active scanners, packet analyzers, Netflow Firewalls and NAC IPTables, Packetfence Security tools does not have to be expensive! It can also be free. NetFlow

92 Packetfence Securing the Host Machine Encrypt! Encrypting s IMAPS SMTP over TLS/SSL Use PGP Browser Set browser preferences Add-ons or plugins (NoScript, HTTPS Everywhere, Adblock, etc) File encryption Full disk encryption (FileVault for Mac, Bitlocker on Windows, Truecrypt) 92

Virtual Private Network

Virtual Private Network VPN and IPsec Virtual Private Network Creates a secure tunnel over a public network Client to firewall Router to router Firewall to firewall Uses the Internet as the public backbone to access a secure

More information

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Threat Pragmatics 25-29 June 2018 PacNOG 22, Honiara, Solomon Islands Supported by: Issue Date: Revision: 1 Target Many sorts of targets: Network infrastructure Network services Application services User

More information

Secure channel, VPN and IPsec. stole some slides from Merike Kaeo

Secure channel, VPN and IPsec. stole some slides from Merike Kaeo Secure channel, VPN and IPsec stole some slides from Merike Kaeo 1 HTTP and Secure Channel HTTP HTTP TLS TCP TCP IP IP 2 SSL and TLS SSL/TLS SSL v3.0 specified

More information

Threat Pragmatics & Cryptography Basics. PacNOG July, 2017 Suva, Fiji

Threat Pragmatics & Cryptography Basics. PacNOG July, 2017 Suva, Fiji Threat Pragmatics & Cryptography Basics PacNOG20 3-7 July, 2017 Suva, Fiji Issue Date: [31-12-2015] Revision: [V.1] Why Security? The Internet was initially designed for connectivity Trust is assumed,

More information

VPN, IPsec and TLS. stole slides from Merike Kaeo apricot2017 1

VPN, IPsec and TLS. stole slides from Merike Kaeo apricot2017 1 VPN, IPsec and TLS stole slides from Merike Kaeo apricot2017 1 Virtual Private Network Overlay Network a VPN is built on top of a public network (Internet)

More information

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013

APNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database

More information

LEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013

LEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 LEA Workshop Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 Agenda Introduction to APNIC Know about APNIC Internet Policy Development How the Internet Policies are developed

More information

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2. P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and

More information

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Int ernet w orking Internet Security Literature: Forouzan: TCP/IP Protocol Suite : Ch 28 Internet Security Internet security is difficult Internet protocols were not originally designed for security The

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

Sample excerpt. Virtual Private Networks. Contents

Sample excerpt. Virtual Private Networks. Contents Contents Overview...................................................... 7-3.................................................... 7-5 Overview of...................................... 7-5 IPsec Headers...........................................

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Network Security. Thierry Sans

Network Security. Thierry Sans Network Security Thierry Sans HTTP SMTP DNS BGP The Protocol Stack Application TCP UDP Transport IPv4 IPv6 ICMP Network ARP Link Ethernet WiFi The attacker is capable of confidentiality integrity availability

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Internet Security Introduction. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok

Internet Security Introduction. ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok Internet Security Introduction ITU/APNIC/MICT IPv6 Security Workshop 23 rd 27 th May 2016 Bangkok Last updated 5 th May 2015 1 Introduction to Internet Infrastructure Security p Introduction to the main

More information

VPN, IPsec and TLS. stole slides from Merike Kaeo 2015/08/09 1

VPN, IPsec and TLS. stole slides from Merike Kaeo 2015/08/09 1 VPN, IPsec and TLS stole slides from Merike Kaeo 1 Virtual Private Network Overlay Network a VPN is built on top of a public network (Internet) Cost effecsve

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved.  Worldwide Education Services Junos Security Chapter 8: IPsec VPNs 2012 Juniper Networks, Inc. All rights reserved. www.juniper.net Worldwide Education Services Chapter Objectives After successfully completing this chapter, you will

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

Secure Routing with RPKI. APNIC44 Security Workshop

Secure Routing with RPKI. APNIC44 Security Workshop Secure Routing with RPKI APNIC44 Security Workshop Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015 Lecture 6 Internet Security: How the Internet works and some basic vulnerabilities Thursday 19/11/2015 Agenda Internet Infrastructure: Review Basic Security Problems Security Issues in Routing Internet

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Virtual Private Networks

Virtual Private Networks EN-2000 Reference Manual Document 8 Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission security,

More information

L13. Reviews. Rocky K. C. Chang, April 10, 2015

L13. Reviews. Rocky K. C. Chang, April 10, 2015 L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing

More information

14. Internet Security (J. Kurose)

14. Internet Security (J. Kurose) 14. Internet Security (J. Kurose) 1 Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer:

More information

IP Security IK2218/EP2120

IP Security IK2218/EP2120 IP Security IK2218/EP2120 Markus Hidell, mahidell@kth.se KTH School of ICT Based partly on material by Vitaly Shmatikov, Univ. of Texas Acknowledgements The presentation builds upon material from - Previous

More information

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes 1 Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes 2 Internal prefixes originated in IP core network Loopback Transport Connect inter-regional

More information

Misdirection / Hijacking Incidents

Misdirection / Hijacking Incidents Security Tutorial @ TWNOG SECURE ROUTING WITH RPKI 1 Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Deploying RPKI An Intro to the RPKI Infrastructure

Deploying RPKI An Intro to the RPKI Infrastructure Deploying RPKI An Intro to the RPKI Infrastructure VNIX-NOG 24 November 2016 Hanoi, Vietnam Issue Date: Revision: Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours)

More information

CSC 4900 Computer Networks: Security Protocols (2)

CSC 4900 Computer Networks: Security Protocols (2) CSC 4900 Computer Networks: Security Protocols (2) Professor Henry Carter Fall 2017 Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication

More information

CS 356 Internet Security Protocols. Fall 2013

CS 356 Internet Security Protocols. Fall 2013 CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5

More information

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney. Overview of SSL/TLS Luke Anderson luke@lukeanderson.com.au 12 th May 2017 University Of Sydney Overview 1. Introduction 1.1 Raw HTTP 1.2 Introducing SSL/TLS 2. Certificates 3. Attacks Introduction Raw

More information

Cyber Security Threat Pragmatics & Cryptography. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh

Cyber Security Threat Pragmatics & Cryptography. Cyber Security & Network Security March, 2017 Dhaka, Bangladesh Cyber Security Threat Pragmatics & Cryptography Cyber Security & Network Security 20-22 March, 2017 Dhaka, Bangladesh Issue Date: [31-12-2015] Revision: [V.1] Global Cyber Security Trend It s Global Issue

More information

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 27. Firewalls and Virtual Private Networks Paul Krzyzanowski Rutgers University Fall 2013 November 25, 2013 2013 Paul Krzyzanowski 1 Network Security Goals Confidentiality: sensitive

More information

Syllabus: The syllabus is broadly structured as follows:

Syllabus: The syllabus is broadly structured as follows: Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data

More information

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,

More information

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes

Route Filtering. Types of prefixes in IP core network: Internal Prefixes External prefixes. Downstream customers Internet prefixes Types of prefixes in IP core network: Internal Prefixes External prefixes Downstream customers Internet prefixes Internal prefixes originated in IP core network Loopback Transport Connect inter-regional

More information

20-CS Cyber Defense Overview Fall, Network Basics

20-CS Cyber Defense Overview Fall, Network Basics 20-CS-5155 6055 Cyber Defense Overview Fall, 2017 Network Basics Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter

More information

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic. 15-441 Lecture Nov. 21 st 2006 Dan Wendlandt Worms & Viruses Phishing End-host impersonation Denial-of-Service Route Hijacks Traffic modification Spyware Trojan Horse Password Cracking IP Spoofing DNS

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Chapter 5: Network Layer Security

Chapter 5: Network Layer Security Managing and Securing Computer Networks Guy Leduc Mainly based on Network Security - PRIVATE Communication in a PUBLIC World C. Kaufman, R. Pearlman, M. Speciner Pearson Education, 2002. (chapters 17 and

More information

Table of Contents 1 IKE 1-1

Table of Contents 1 IKE 1-1 Table of Contents 1 IKE 1-1 IKE Overview 1-1 Security Mechanism of IKE 1-1 Operation of IKE 1-1 Functions of IKE in IPsec 1-2 Relationship Between IKE and IPsec 1-3 Protocols 1-3 Configuring IKE 1-3 Configuration

More information

BGP Origin Validation

BGP Origin Validation BGP Origin Validation ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

IPsec NAT Transparency

IPsec NAT Transparency sec NAT Transparency First Published: November 25, 2002 Last Updated: March 1, 2011 The sec NAT Transparency feature introduces support for Security (sec) traffic to travel through Network Address Translation

More information

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats Internetwork Expert s CCNA Security Bootcamp Common Security Threats http:// Today s s Network Security Challenge The goal of the network is to provide high availability and easy access to data to meet

More information

The EN-4000 in Virtual Private Networks

The EN-4000 in Virtual Private Networks EN-4000 Reference Manual Document 8 The EN-4000 in Virtual Private Networks O ne of the principal features of routers is their support of virtual private networks (VPNs). This document discusses transmission

More information

A PKI For IDR Public Key Infrastructure and Number Resource Certification

A PKI For IDR Public Key Infrastructure and Number Resource Certification A PKI For IDR Public Key Infrastructure and Number Resource Certification AUSCERT 2006 Geoff Huston Research Scientist APNIC If You wanted to be Bad on the Internet And you wanted to: Hijack a site Inspect

More information

CompTIA Security+ (Exam SY0-401)

CompTIA Security+ (Exam SY0-401) CompTIA Security+ (Exam SY0-401) Course Overview This course will prepare students to pass the current CompTIA Security+ SY0-401 certification exam. After taking this course, students will understand the

More information

Network Security and Cryptography. December Sample Exam Marking Scheme

Network Security and Cryptography. December Sample Exam Marking Scheme Network Security and Cryptography December 2015 Sample Exam Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography

Principles of Information Security, Fourth Edition. Chapter 8 Cryptography Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries

More information

Software Development & Education Center Security+ Certification

Software Development & Education Center Security+ Certification Software Development & Education Center Security+ Certification CompTIA Security+ Certification CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication Topic 14: Secure Communication 1 Readings for This Lecture On Wikipedia Needham-Schroeder protocol (only the symmetric

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements CONTENTS Preface Acknowledgements xiii xvii Chapter 1 TCP/IP Overview 1 1.1 Some History 2 1.2 TCP/IP Protocol Architecture 4 1.2.1 Data-link Layer 4 1.2.2 Network Layer 5 1.2.2.1 Internet Protocol 5 IPv4

More information

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist VPN World MENOG 16 Istanbul-Turkey By Ziad Zubidah Network Security Specialist What is this Van used for?! Armed Van It used in secure transporting for valuable goods from one place to another. It is bullet

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

Some Lessons Learned from Designing the Resource PKI

Some Lessons Learned from Designing the Resource PKI Some Lessons Learned from Designing the Resource PKI Geoff Huston Chief Scientist, APNIC May 2007 Address and Routing Security The basic security questions that need to be answered are: Is this a valid

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California

Security and Lawful Intercept In VoIP Networks. Manohar Mahavadi Centillium Communications Inc. Fremont, California Security and Lawful Intercept In VoIP Networks Manohar Mahavadi Centillium Communications Inc. Fremont, California Agenda VoIP: Packet switched network VoIP devices VoIP protocols Security and issues in

More information

COMPUTER SECURITY. Computer Security Secure Communication Channels (2)

COMPUTER SECURITY. Computer Security Secure Communication Channels (2) COMPUTER SECURITY 7. Secure Communication Channels: 2 case studies (2) Technologies' case studies (2) WEP Wired Equivalent Privacy (3) IPsec Internet Protocol Security (11) SSL Secure Sockets Layer (25)

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 18: Network Attacks Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Network attacks denial-of-service (DoS) attacks SYN

More information

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security - ISA 656 IPsec IPsec Key Management (IKE) Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating

More information

Configuring OpenVPN on pfsense

Configuring OpenVPN on pfsense Configuring OpenVPN on pfsense Configuring OpenVPN on pfsense Posted by Glenn on Dec 29, 2013 in Networking 0 comments In this article I will go through the configuration of OpenVPN on the pfsense platform.

More information

CS November 2018

CS November 2018 Authentication Distributed Systems 25. Authentication For a user (or process): Establish & verify identity Then decide whether to allow access to resources (= authorization) Paul Krzyzanowski Rutgers University

More information

CSCE 715: Network Systems Security

CSCE 715: Network Systems Security CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina Security in Network Layer Implementing security in application layer provides flexibility in security

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

ETHICAL HACKING & COMPUTER FORENSIC SECURITY ETHICAL HACKING & COMPUTER FORENSIC SECURITY Course Description From forensic computing to network security, the course covers a wide range of subjects. You will learn about web hacking, password cracking,

More information

CS System Security 2nd-Half Semester Review

CS System Security 2nd-Half Semester Review CS 356 - System Security 2nd-Half Semester Review Fall 2013 Final Exam Wednesday, 2 PM to 4 PM you may bring one 8-1/2 x 11 sheet of paper with any notes you would like no cellphones, calculators This

More information

Ethical Hacking and Prevention

Ethical Hacking and Prevention Ethical Hacking and Prevention This course is mapped to the popular Ethical Hacking and Prevention Certification Exam from US-Council. This course is meant for those professionals who are looking for comprehensive

More information

Security in inter-domain routing

Security in inter-domain routing DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks

More information

Network Security: IPsec. Tuomas Aura

Network Security: IPsec. Tuomas Aura Network Security: IPsec Tuomas Aura 3 IPsec architecture and protocols Internet protocol security (IPsec) Network-layer security protocol Protects IP packets between two hosts or gateways Transparent to

More information

INDEX. Symbols. 3DES over4 mechanism to4 mechanism...101

INDEX. Symbols. 3DES over4 mechanism to4 mechanism...101 INDEX Symbols 3DES...138 6over4 mechanism...101 6to4 mechanism...101 A AA...24 AAAA...99 access control list. See ACL ACK...150 ACK-SYN message...150 ACL...110 ActiveX...38 Active attacks...196 Active

More information

Configuring Security for VPNs with IPsec

Configuring Security for VPNs with IPsec This module describes how to configure basic IPsec VPNs. IPsec is a framework of open standards developed by the IETF. It provides security for the transmission of sensitive information over unprotected

More information

RPKI. Resource Pubic Key Infrastructure

RPKI. Resource Pubic Key Infrastructure RPKI Resource Pubic Key Infrastructure Purpose of RPKI RPKI replaces IRR or lives side by side? Side by side: different advantages Security, almost real time, simple interface: RPKI Purpose of RPKI Is

More information

IPsec (AH, ESP), IKE. Guevara Noubir CSG254: Network Security

IPsec (AH, ESP), IKE. Guevara Noubir CSG254: Network Security IPsec (AH, ESP), IKE Guevara Noubir noubir@ccs.neu.edu Securing Networks Control/Management (configuration) Applications Layer telnet/ftp: ssh, http: https, mail: PGP (SSL/TLS) Transport Layer (TCP) (IPSec,

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski The Internet Packet switching: store-and-forward routing across multiple physical networks... across multiple organizations Computer Security 11. Network Security ISP Paul Krzyzanowski Rutgers University

More information

Introducción al RPKI (Resource Public Key Infrastructure)

Introducción al RPKI (Resource Public Key Infrastructure) Introducción al RPKI (Resource Public Key Infrastructure) Roque Gagliano rogaglia@cisco.com 4 Septiembre 2013 Quito, Equator 2011 Cisco and/or its affiliates. All rights reserved. 1 Review of problem to

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification https://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

Computer Security. 11. Network Security. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 11. Network Security. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 11. Network Security Paul Krzyzanowski Rutgers University Spring 2018 April 15, 2018 CS 419 2018 Paul Krzyzanowski 1 The Internet Packet switching: store-and-forward routing across multiple

More information

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science History of computer network protocol development in 20 th century. Development of hierarchical

More information

VPN Overview. VPN Types

VPN Overview. VPN Types VPN Types A virtual private network (VPN) connection establishes a secure tunnel between endpoints over a public network such as the Internet. This chapter applies to Site-to-site VPNs on Firepower Threat

More information

Curso: Ethical Hacking and Countermeasures

Curso: Ethical Hacking and Countermeasures Curso: Ethical Hacking and Countermeasures Module 1: Introduction to Ethical Hacking Who is a Hacker? Essential Terminologies Effects of Hacking Effects of Hacking on Business Elements of Information Security

More information

iii PPTP... 7 L2TP/IPsec... 7 Pre-shared keys (L2TP/IPsec)... 8 X.509 certificates (L2TP/IPsec)... 8 IPsec Architecture... 11

iii PPTP... 7 L2TP/IPsec... 7 Pre-shared keys (L2TP/IPsec)... 8 X.509 certificates (L2TP/IPsec)... 8 IPsec Architecture... 11 iii PPTP................................................................................ 7 L2TP/IPsec........................................................................... 7 Pre-shared keys (L2TP/IPsec)............................................................

More information

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography

Computer Networking. What is network security? Chapter 7: Network security. Symmetric key cryptography. The language of cryptography Chapter 7: Network security 15-441 Computer Networking Network Security: Cryptography, Authentication, Integrity Foundations: what is security? cryptography authentication message integrity key distribution

More information

Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC

Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC Resource Public Key Infrastructure (RPKI) Nurul Islam Roman, APNIC Target Audience Knowledge of Internet Routing(specially BGP) Fair idea on Routing Policy No need to know Cryptography Basic knowledge

More information

IP Security. Have a range of application specific security mechanisms

IP Security. Have a range of application specific security mechanisms IP Security IP Security Have a range of application specific security mechanisms eg. S/MIME, PGP, Kerberos, SSL/HTTPS However there are security concerns that cut across protocol layers Would like security

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Networking Security SPRING 2018: GANG WANG

Networking Security SPRING 2018: GANG WANG Networking Security SPRING 2018: GANG WANG About the Midterm Close book; Close notes; Close computer/phone/calculator; No cheat sheet. You are NOT allowed to leave the room during the exam There are 6

More information

CHAPTER 8 SECURING INFORMATION SYSTEMS

CHAPTER 8 SECURING INFORMATION SYSTEMS CHAPTER 8 SECURING INFORMATION SYSTEMS BY: S. SABRAZ NAWAZ SENIOR LECTURER IN MANAGEMENT & IT SEUSL Learning Objectives Why are information systems vulnerable to destruction, error, and abuse? What is

More information

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.

More information

Implementing Cisco Network Security (IINS) 3.0

Implementing Cisco Network Security (IINS) 3.0 Implementing Cisco Network Security (IINS) 3.0 COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Defeating All Man-in-the-Middle Attacks

Defeating All Man-in-the-Middle Attacks Defeating All Man-in-the-Middle Attacks PrecisionAccess Vidder, Inc. Defeating All Man-in-the-Middle Attacks 1 Executive Summary The man-in-the-middle attack is a widely used and highly preferred type

More information