Computer Security and Privacy

Similar documents
Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

Why Firewalls? Firewall Characteristics

CS155 Firewalls. Why Firewalls? Why Firewalls? Bugs, Bugs, Bugs

Internet Security: Firewall

CSC Network Security

W is a Firewall. Internet Security: Firewall. W a Firewall can Do. firewall = wall to protect against fire propagation

CS155 Firewalls. Simon Cooper CS155 - Firewalls 23 May of 30

Chapter 8 roadmap. Network Security

Network Security. Tadayoshi Kohno

Network Security: Firewalls. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Intranets 4/4/17. IP numbers and Hosts. Dynamic Host Configuration Protocol. Dynamic Host Configuration Protocol. CSC362, Information Security

CSC 474/574 Information Systems Security

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Indicate whether the statement is true or false.

Internet Security Firewalls

Spring 2010 CS419. Computer Security. Vinod Ganapathy Lecture 14. Chapters 6 and 9 Intrusion Detection and Prevention

Computer Security Spring Firewalls. Aggelos Kiayias University of Connecticut

4.1.3 Filtering. NAT: basic principle. Dynamic NAT Network Address Translation (NAT) Public IP addresses are rare

Distributed Systems. 29. Firewalls. Paul Krzyzanowski. Rutgers University. Fall 2015

CyberP3i Course Module Series

Information Systems Security

Chapter 9. Firewalls

COMPUTER NETWORK SECURITY

Protection of Communication Infrastructures

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

CSE 565 Computer Security Fall 2018

SE 4C03 Winter 2005 Network Firewalls

20-CS Cyber Defense Overview Fall, Network Basics

Our Narrow Focus Computer Networking Security Vulnerabilities. Outline Part II

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall

Application Firewalls

Advanced Security and Mobile Networks

Unit 4: Firewalls (I)

TCP /IP Fundamentals Mr. Cantu

Computer and Network Security

Firewalls, IDS and IPS. MIS5214 Midterm Study Support Materials

CHAPTER 8 FIREWALLS. Firewall Design Principles

Fundamentals of Network Security v1.1 Scope and Sequence

10 Defense Mechanisms

CE Advanced Network Security

Network Security: Firewall, VPN, IDS/IPS, SIEM

COSC 301 Network Management

CSC 4900 Computer Networks: Security Protocols (2)

Implementing Firewall Technologies

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Firewalls Network Security: Firewalls and Virtual Private Networks CS 239 Computer Software March 3, 2003

Network Security. Thierry Sans

Configuring IP Session Filtering (Reflexive Access Lists)

Computer Science 3CN3 and Software Engineering 4C03 Final Exam Answer Key

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

Stateless Firewall Implementation

Hands-On Ethical Hacking and Network Defense

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Firewalls and NAT. Firewalls. firewall isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others.

Firewalls, Tunnels, and Network Intrusion Detection

Software Engineering 4C03 Answer Key

Configuring attack detection and prevention 1

Computer Network Vulnerabilities

Advanced Security and Forensic Computing

Configuring attack detection and prevention 1

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

Features of a proxy server: - Nowadays, by using TCP/IP within local area networks, the relaying role that the proxy

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices

The DNS. Application Proxies. Circuit Gateways. Personal and Distributed Firewalls The Problems with Firewalls

Overview. Computer Network Lab, SS Security. Type of attacks. Firewalls. Protocols. Packet filter

CSCE 813 Internet Security Network Access Control

CSE/EE 461 Lecture 13 Connections and Fragmentation. TCP Connection Management

HP High-End Firewalls

Introduction to TCP/IP networking

Network Control, Con t

Computer Networks. Wenzhong Li. Nanjing University

VG422R. User s Manual. Rev , 5

Information about Network Security with ACLs

Global Information Assurance Certification Paper

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

CISNTWK-440. Chapter 5 Network Defenses

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Applied Networks & Security

Sirindhorn International Institute of Technology Thammasat University

Network Security. Kitisak Jirawannakool Electronics Government Agency (public organisation)

Broadcast Infrastructure Cybersecurity - Part 2

Security SSID Selection: Broadcast SSID:

Network Security Fundamentals

INFS 766 Internet Security Protocols. Lecture 1 Firewalls. Prof. Ravi Sandhu INTERNET INSECURITY

Flashback.. Internet design goals. Security Part One: Attacks and Countermeasures. Why did they leave it out? Security Vulnerabilities

CSE 565 Computer Security Fall 2018

ISA 674 Understanding Firewalls & NATs

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

ch02 True/False Indicate whether the statement is true or false.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

Configuring Transparent Redirection for Standalone Content Engines

INBOUND AND OUTBOUND NAT

TCP/IP Transport Layer Protocols, TCP and UDP

Chapter 2 Advanced TCP/IP

Transcription:

CSE P 590 / CSE M 590 (Spring 2010) Computer Security and Privacy Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample s and materials...

Goals for Today Lab 2 discussion / HW 3 discussion Network security Hardware security (based on requests) Research reading

Network Security

Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks

Castle and Moat Analogy More like the moat around a castle than a firewall Restricts access from the outside Restricts outbound connections, too Important: filter out undesirable activity from internal hosts!

Firewall Locations in the Network Between internal LAN and external network At the gateways of sensitive subnetworks within the organizational LAN Payroll s network must be protected separately within the corporate network On end-user machines Personal firewall Microsoft s Internet Connection Firewall (ICF) comes standard with Windows XP

Firewall Types Packet- or session-filtering router (filter) Proxy gateway All incoming traffic is directed to firewall, all outgoing traffic appears to come from firewall Application-level: separate proxy for each application Different proxies for SMTP (email), HTTP, FTP, etc. Filtering rules are application-specific Circuit-level: application-independent, transparent Only generic IP traffic filtering (example: SOCKS) Personal firewall with application-specific rules E.g., no outbound telnet connections from email client

Firewall Types: Illustration

Packet Filtering For each packet, firewall decides whether to allow it to proceed Decision must be made on per-packet basis Stateless; cannot examine packet s context (TCP connection, application to which it belongs, etc.) To decide, use information available in the packet IP source and destination addresses, ports Protocol identifier (TCP, UDP, ICMP, etc.) TCP flags (SYN, ACK, RST, PSH, FIN) ICMP message type Filtering rules are based on pattern-matching

Packet Filtering Examples

Example: FTP (borrowed from Wenke Lee) FTP server FTP client Client opens command channel to server; tells server second port number Server acknowledges 20 Data 21 Connection from a Command random port on an 5150 5151 external host PORT 5151 OK DATA CHANNEL Server opens data channel to client s second port Client acknowledges TCP ACK

Weaknesses of Packet Filters Do not prevent application-specific attacks For example, if there is a buffer overflow in URL decoding routine, firewall will not block an attack string No user authentication mechanisms except (spoofable) address-based authentication Firewalls don t have any upper-level functionality Vulnerable to TCP/IP attacks such as spoofing Solution: list of addresses for each interface (packets with internal addresses shouldn t come from outside) Security breaches due to misconfiguration

Abnormal Fragmentation For example, ACK bit is set in both fragments, but when reassembled, SYN bit is set (can stage SYN flooding through firewall)

Fragmentation Attack (borrowed from Wenke Lee), Send 2 fragments with the ACK bit set; fragment offsets are chosen so that the full datagram re-assembled by server forms a packet with the SYN bit set (the fragment offset of the second packet overlaps into the space of the first packet) Telnet Server Telnet Client 23 1234 SYN packet (no ACK) Allow only if ACK bit set FRAG1 (with ACK) FRAG2 (with ACK) All following packets will have the ACK bit set ACK

Stateless Filtering Is Not Enough In TCP connections, ports with numbers less than 1024 are permanently assigned to servers 20,21 for FTP, 23 for telnet, 25 for SMTP, 80 for HTTP Clients use ports numbered from 1024 to 16383 They must be available for clients to receive responses What should a firewall do if it sees, say, an incoming request to some client s port 5612? It must allow it: this could be a server s response in a previously established connection OR it could be malicious traffic Can t tell without keeping state for each connection

Example: FTP (borrowed from Wenke Lee) FTP server FTP client Client opens command channel to server; tells server second port number Server acknowledges 20 Data 21 Connection from a Command random port on an 5150 5151 external host PORT 5151 OK DATA CHANNEL Server opens data channel to client s second port Client acknowledges TCP ACK

Session Filtering Decision is still made separately for each packet, but in the context of a connection If new connection, then check against security policy If existing connection, then look it up in the table and update the table, if necessary Only allow incoming traffic to a high-numbered port if there is an established connection to that port Hard to filter stateless protocols (UDP) and ICMP Typical filter: deny everything that s not allowed Must be careful filtering out service traffic such as ICMP Filters can be bypassed with IP tunneling

Example: Connection State Table

Application-Level Gateway Splices and relays two application-specific connections Example: Web browser proxy Daemon spawns proxy process when communication is detected Big processing overhead, but can log and audit all activity Can support high-level user-to-gateway authentication Log into the proxy server with name, password, etc Simpler filtering rules than for arbitrary TCP/IP traffic Each application requires implementing its own proxy

Circuit-Level Gateway Splices two TCP connections, relays TCP segments Less control over data than application-level gateway Does not examine the contents of TCP segment Client s TCP stack must be aware of the gateway Client applications are often adapted to support SOCKS Often used when internal users are trusted Application-level proxy on inbound connections, circuit-level proxy on outbound connections (lower overhead)

Comparison Performance Modify client application Defends against fragm. attacks Packet filter Best No No Session filter No Maybe Circuit-level gateway Yes (SOCKS) Yes Application-level Worst Yes Yes gateway

Bastion Host Bastion host is a hardened system implementing application-level gateway behind packet filter All non-essential services are turned off Application-specific proxies for supported services Each proxy supports only a subset of application s commands, is logged and audited, disk access restricted, runs as a non-privileged user in a separate directory (independent of others) Support for user authentication All traffic flows through bastion host Packet router allows external packets to enter only if their destination is bastion host, and internal packets to leave only if their origin is bastion host

Single-Homed Bastion Host If packet filter is compromised, traffic can flow to internal network

Dual-Homed Bastion Host No physical connection between internal and external networks

Screened Subnet Only the screened subnet is visible to the external network; internal network is invisible

Protecting Addresses and Routes Hide IP addresses of hosts on internal network Only services that are intended to be accessed from outside need to reveal their IP addresses Keep other addresses secret to make spoofing harder Use NAT (network address translation) to map addresses in packet headers to internal addresses 1-to-1 or N-to-1 mapping Filter route announcements No need to advertise routes to internal hosts Prevent attacker from advertising that the shortest route to an internal host lies through him

General Problems with Firewalls Interfere with networked applications Doesn t solve all the problems Buggy software (e.g., buffer overflow exploits) Bad protocol design (e.g., WEP in 802.11b) Generally don t prevent denial of service Don t prevent insider attacks Increasing complexity and potential for misconfiguration

Cold Boot Attacks http://citp.princeton.edu/memory/

Power Analysis http://www.cc.gatech.edu/~traynor/f08/s/lecture11-dpa.pdf

More Hardware Security (Not Covered) http://www.share.net/guest3bd2a12/advanced-hardware-hackingtechniques-presentation