network security cs642 computer security adam everspaugh

Similar documents
network security s642 computer security adam everspaugh

DNS and BGP. CS642: Computer Security. Professor Ristenpart h9p:// rist at cs dot wisc dot edu. University of Wisconsin CS 642

DNS and BGP. CS642: Computer Security. Professor Ristenpart h9p:// rist at cs dot wisc dot edu. University of Wisconsin CS 642

DNS and BGP. CS642: Computer Security. Professor Ristenpart h9p:// rist at cs dot wisc dot edu. University of Wisconsin CS 642

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

Inter-domain Routing. Outline. Border Gateway Protocol

Lecture 19: Network Layer Routing in the Internet

Computer Security. 11. Network Security. Paul Krzyzanowski. Rutgers University. Spring 2018

Accurate Real-time Identification of IP Hijacking. Presented by Jacky Mak

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

surveillance & anonymity cs642 computer security adam everspaugh

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

CS Paul Krzyzanowski

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Internet Infrastructure

Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation:

IPv4. Christian Grothoff.

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Internetworking Part 2

Most important (cont d) What s most important in Project 1. Important for individuals. From from Most Important

CS 43: Computer Networks. 24: Internet Routing November 19, 2018

Quiz. Segment structure and fields Flow control (rwnd) Timeout interval. Phases transition ssthresh setting Cwnd setting

CS321: Computer Networks Unicast Routing

Introduction to IP Routing. Geoff Huston

Why dynamic route? (1)

CS118 Discussion, Week 6. Taqi

EEC-684/584 Computer Networks

CPSC156a: The Internet Co-Evolution of Technology and Society. Lecture 4: September 16, 2003 Internet Layers and the Web

Internet Security: How the Internet works and some basic vulnerabilities

Introduction to Information Science and Technology 2017 Networking II. Sören Schwertfeger 师泽仁

CSc 466/566. Computer Security. 18 : Network Security Introduction

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala October 9, 2018 (a) October 18 October 9,

HY 335 Φροντιστήριο 8 ο

Chapter 4: Advanced Internetworking. Networking CS 3470, Section 1

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Topics for This Week

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Network layer: Overview. Network Layer Functions

Internet Protocol and Transmission Control Protocol

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 16, 2017

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

internet technologies and standards

Dan Boneh, John Mitchell, Dawn Song. Denial of Service

EC441 Fall 2018 Introduction to Computer Networking Chapter4: Network Layer Data Plane

DDoS Testing with XM-2G. Step by Step Guide

CSc 450/550 Computer Networks Internet Routing

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca

Routing Protocols --- Exterior Gateway Protocol

20-CS Cyber Defense Overview Fall, Network Basics

CSCE 463/612 Networks and Distributed Processing Spring 2018

Network Security. Thierry Sans

Department of Computer and IT Engineering University of Kurdistan. Computer Networks II Border Gateway protocol (BGP) By: Dr. Alireza Abdollahpouri

Review for Chapter 4 R1,R2,R3,R7,R10,R11,R16,R17,R19,R22,R24, R26,R30 P1,P2,P4,P7,P10,P11,P12,P14,P15,P16,P17,P22,P24,P29,P30

ECE 428 Internet Protocols (Network Layer: Layer 3)

Lecture 4 The Network Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Master Course Computer Networks IN2097

Ravi Chandra cisco Systems Cisco Systems Confidential

CS 43: Computer Networks. 21: The Network Layer & IP November 7, 2018

Finish Network Layer Start Transport Layer. CS158a Chris Pollett Apr 25, 2007.

End-to-End Communication

PART III. Implementing Inter-Network Relationships with BGP

CS670: Network security

Inter-networking. Problem. 3&4-Internetworking.key - September 20, LAN s are great but. We want to connect them together. ...

Internet Routing : Fundamentals of Computer Networks Bill Nace

CS555, Spring /5/2005. April 12, 2005 No classes attend Senior Design Projects conference. Chapter 4 roadmap. Internet AS Hierarchy

CSC 401 Data and Computer Communications Networks

CSCI Networking Name:

Top-Down Network Design

Introduction to BGP. ISP/IXP Workshops

Network Layer: Internet Protocol

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 12

Network Layer: Control/data plane, addressing, routers

Routing in the Internet

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:

Introduction to BGP ISP/IXP Workshops

Network Layer PREPARED BY AHMED ABDEL-RAOUF

Overview 4.2: Routing

Introduction to Network. Topics

The Network Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

CNT Computer and Network Security: BGP Security

TCP/IP Protocol Suite

b. Suppose the two packets are to be forwarded to two different output ports. Is it

CSCI-1680 Network Layer: IP & Forwarding Rodrigo Fonseca

IP Protocols. ALTTC/Oct

CIS 5373 Systems Security

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat no true in practice. administrative autonomy

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Routing(2) Inter-domain Routing

CSCI Topics: Internet Programming Fall 2008

ETSF10 Internet Protocols Routing on the Internet

ICS 351: Today's plan. OSPF BGP Routing in general routing protocol comparison encapsulation network dynamics

Lecture 8. Basic Internetworking (IP) Outline. Basic Internetworking (IP) Basic Internetworking (IP) Service Model

CS 43: Computer Networks Internet Routing. Kevin Webb Swarthmore College November 14, 2013

Last time. Transitioning to IPv6. Routing. Tunneling. Gateways. Graph abstraction. Link-state routing. Distance-vector routing. Dijkstra's Algorithm

Network Layer Protocols

COMPUTER NETWORK. Homework #3. Due Date: May 22, 2017 in class

Announcements. CS 5565 Network Architecture and Protocols. Project 2B. Project 2B. Project 2B: Under the hood. Routing Algorithms

Network Layer. Chapter 5 Section 5.1, 5.3, 5.5, 5.6. CS 360 Spring 2012 Pacific University

Internetworking Part 2

CSCI Computer Networks Fall 2016

Transcription:

network security cs642 computer security adam everspaugh ace@cs.wisc.edu

today Reminder: HW3 due in one week: April 18, 2016 CIDR addressing Border Gateway Protocol Network reconnaissance via nmap Idle scans

DNS cache poisoning Victim DNS server.com NS Clients Internet bankofamerica.com 10.1.1.1 How might an attacker do this? Attacker site 10.9.9.99 What security features must an attacker overcome? Packet spoofing Guess UDP port Guess QID Assume SRC port spoofing Assume predictable UDP port think-pair-share

Phishing is common problem Typo squatting: www.lansdend.com www.goggle.com secure.bank0famerica.com wíkipedia.org Phishing attacks Trick users into thinking a malicious domain name is the real one

ip routing

CIDR addressing 10110 1110000 10110 1100011 5.6.7.8 ISP1 ISP2 1111001 1111011 10110 1111000 Network prefix MSBs Host address x LSBs backbone Classless inter-domain routing (CIDR) Prefixes used to setup hierarchical routing: - An organization assigned a.b.c.d/x - It manages addresses prefixed by a.b.c.d/x

Routing 10110 1110000 AS wisc.edu 10110 1100011 AS charter.net 5.6.7.8 1111001 10110 1111000 AS att.net 1111011 Autonomous systems (AS) are organizational building blocks - Collection of IP prefixes under single routing policy - wisc.edu

AS Categories 1 3 4 8 2 7 6 5 Stub: connected to only on other AS Multi-homed: connected to multiple other AS Transit: routes traffic through it's AS for other AS's

BGP and routing wisc.edu charter.net Exterior gateway protocol: Border Gateway Protocol (BGP) defense.gov Interior gateway protocol: Open shortest-path first (OSPF) used within an AS

Border Gateway Protocol (BGP) Policy-based routing AS can set policy about how to route economic, security, political considerations BGP routers use TCP connections to transmit routing information Iterative announcement of routes

BGP example [D. Wetherall] 7 2 6 5 7 7 1 8 2 7 2 6 5 2 7 2 6 5 3 4 2 6 5 3 2 6 5 2 7 6 5 2 7 3 2 7 6 2 7 6 5 5 5 2, 7, 3, 6 are Transit AS 8, 1 are Stub AS 4,5 multihomed AS Algorithm seems to work OK in practice BGP does not respond well to frequent node outages

IP/Route Hijacking BGP unauthenticated Anyone can advertise any routes False routes will be propagated This allows IP/route hijacking AS announces it originates a prefix it shouldn t AS announces it has shorter path to a prefix AS announces more specific prefix

2008: Pakistan attempts to block YouTube youtube is 208.65.152.0/22 youtube.com = 208.65.153.238 Pakistan ISP advertises 208.65.153.0/24 via BGP more specific, prefix hijacking Internet thinks youtube.com is in Pakistan Outage resolved in 2 hours

reconnaissance

Port scanning: legality United States Computer Fraud and Abuse Act (CFAA) Computer system access must be authorized Moulton v VC3 (2000). port scanning, by itself, does not create a damages claim (direct harm must be shown to establish damages under the CFAA). O. Kerr. Cybercrime s scope: Interpreting access and authorization in computer misuse statutes. NYU Law Review, Vol. 78, No. 5, pp. 1596 1668, November 2003.

NMAP Network map tool De-facto standard for network reconnaissance, testing Numerous built in scanning methods

nmap PN st p 22 192.168.1.0/24

Some of the NMAP status messages open host is accepting connections on that port closed host responds to NMAP probes on port, but does not accept connections filtered NMAP couldn t get packets through to host on that port. Firewall?

Port scan of host

Service detection

nmap PN st p 22 192.168.1.0/24

Port scan of host

Service detection What is tcpwrapped? Firewall software man tcpd

OS fingerprinting

Another example

idle scans

Network DMZ Web server Internet Customer databases Inner firewall IDS Outer firewall DMZ (demilitarized zone) helps isolate public network components from private network components Firewall rules to disallow traffic from Internet to internal services

Idle scans Adversary wants to port scan database machine Web server Internet Customer databases (targets) Inner firewall IDS Outer firewall inet => web server OK inet => databases X WS => databases OK

Idle scans Adversary wants to port scan database despite firewall/ids rules Salvatore (Antirez) Sanfilippo 1998 Idle scan 1) Determine IPID of a zombie via SYN/ACK 2) Send SYN spoofed from zombie 3) Determine new IPID of zombie via SYN/ACK Old systems: IPID incremented with each IP packet sent

IPv4 ENet hdr IP hdr data ENet tlr Ethernet frame containing IP datagram 4-bit version 4-bit hdr len 8-bit time to live (TTL) 16-bit identification 8-bit type of service 8-bit protocol 3-bit flags 32-bit source IP address 32-bit destination IP address options (optional) 16-bit total length (in bytes) 13-bit fragmentation offset 16-bit header checksum

Idle scans We want to avoid sending any non-spoofed packets to the target, but still want to port scan it TCP SYN/ACK Web server TCP SYN/ACK RST IPID = 12345 RST IPID = 12346 TCP SYN/ACK Internet RST IPID = 12347 Customer databases Inner firewall If port open final IPID =?? If port closed final IPID =?? IDS Outer firewall SYN spoofed as from Web Server inet => web server OK inet => databases X WS => databases OK

Idle scans We want to avoid sending any non-spoofed packets to the target, but still want to port scan it RST Web server TCP SYN/ACK RST IPID = 12345 TCP SYN/ACK Internet RST IPID = 12346 Customer databases Inner firewall IDS If port open final IPID = first + 2 If port closed final IPID = first + 1 Outer firewall SYN spoofed as from Web Server

Preventing idle scans How can we prevent our system from being a zombie?

recap CIDR, BGP / IP/route hijacking Network reconnaissance / scanning, nmap, fingerprinting Idle scans, zombie hosts Exit slips / 1 thing you learned / 1 thing you didn't understand