November 2nd 1988? ** Something interesting happened on this date Any ideas? Network Security (N. Dulay & M. Huth) Introduction (1.1) Internet Worm Launched ** Moved relentlessly across network connections from computer-to-computer Within 12 hours, first Berkeley Univ then Purdue Univ distributed patches to stop spread. Computers affected 2,000-3,000 maybe more Even those computers not affected had to be tested ! Cost? Estimated between $1M and $100M. A great deal of time and resources expended. Network Security (N. Dulay & M. Huth) Introduction (1.2) Who did it? ** Robert T Morris Jr. (Student at Cornell Univ.) Claimed it was an experimental program that had a bug :-) 2yrs later -> 3yr probation, $10K fine, 400 hours community service. Network Security (N. Dulay & M. Huth) Introduction (1.3) Net Effect? ** Birth of a multi-million pound industry £££££ Network Security (N. Dulay & M. Huth) Introduction (1.4) C430 Network Security Introduction Michael Huth M.Huth@doc.ic.ac.uk www.doc.ic.ac.uk/~mrh/430/ Network Security (N. Dulay & M. Huth) Introduction (1.5) Cryptography & Network Security (3rd ed) William Stallings, Prentice-Hall International, 2002 Detailed, academic, best overall book for course Practical Cryptography Niels Ferguson, Bruce Schneier, Wiley 2003 Superb introduction to cryptographic building blocks. Network Security (N. Dulay & M. Huth) Introduction (1.6) Applied Cryptography (2nd ed) Bruce Schneier, John Wiley, 1996 Wide-ranging introduction, Parts I and II very readable. Handbook of Applied Cryptography Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone , CRC Press, 1996 (Fifth printing Oct 2001) Cryptography encyclopaedia. Fabulous resource. All chapters available for download at http://www.cacr.math.uwaterloo.ca/hac/ Network Security (N. Dulay & M. Huth) Introduction (1.7) Others RSA Lab’s: Cryptography FAQ http://www.rsasecurity.com/rsalabs/faq/ Nigel Smart: Cryptography, McGraw-Hill, 2002 John Viega & Gary McGraw: Building Secure Software, Addison-Wesley Professional Computing Series, 2002. Michael Huth: Secure Communicating Systems, Cambridge Univ. Press, 2001 Bruce Schneier: Secrets and Lies, John Wiley, 2000. Peter Wayner: Disappearing Cryptography, 2nd ed, Morgan Kaufmann, 2002. Simon Singh: The Code Book, Fourth Estate 1999 Sarah Flannery: In Code: A Mathematical Journey, Profile Books, 2000 Neal Stephenson: Cryptonomicon, Heinemann, 1999 Cryptogram newsletter: http://www.counterpane.com/crypto-gram.html Network Security (N. Dulay & M. Huth) Introduction (1.8) Course Topics Classical cryptography Symmetric-key cryptography Public-key cryptography Digital signatures Protocols: Authentication Key management Access Control Wireless & Mobile Security Coursework: Details will be announced within the next two weeks, probably one assessed coursework Network Security (N. Dulay & M. Huth) Introduction (1.9) Assets, Threats, Risk, Countermeasures, Aftercare Assets Threats Risks Policies Countermeasures Proactive Security Management Aftercare Network Security (N. Dulay & M. Huth) Introduction (1.10) Expectancy & Impact of Network Security Expectancy Impact HIGH HIGH Prevent HIGH LOW Contain & Control LOW HIGH Contingency Plans, Insurance LOW LOW Live with? Network Security (N. Dulay & M. Huth) Introduction (1.11) Network Security Model - 1 Max Alice Msg Channel Msg Bob Traffic Analysis, Covert Channels Network Security (N. Dulay & M. Huth) Introduction (1.12) Network Security Model - 2 Distrib Secret Info, Arbitrate Trusted Third Party Msg Secret Info Msg ? Channel ? Secret Info Adversary Network Security (N. Dulay & M. Huth) Introduction (1.13) Network Access Model Adversary Host Human Channel Software Processor Memory I/O Files Processes Internal Net Security Controls Internal Adversaries? Network Security (N. Dulay & M. Huth) Introduction (1.14) Key Security Properties Confidentiality Authentication Integrity Non-repudiation Availability Access Control Network Security (N. Dulay & M. Huth) Introduction (1.15) Confidentiality (Secrecy) Protect transmitted data Protect against traffic analysis INTERCEPTION Unauthorised party gains access to data Timeliness Network Security (N. Dulay & M. Huth) Introduction (1.16) Authentication Assurance that message is from proper source FABRICATION Insertion of “counterfeit” messages Protect from third party masquerade Mutual Authentication Network Security (N. Dulay & M. Huth) Introduction (1.17) Integrity Message is received as sent Modification MODIFICATION Gain access and “tampers” with messages Also interested in replay, reordering, deletion, delay Network Security (N. Dulay & M. Huth) Introduction (1.18) Availability Complete loss of availability Reduction/Degradation in availability Network Security (N. Dulay & M. Huth) INTERRUPTION Loss of communication (cut the cable) DENIAL OF SERVICE Noisy comms (physical noise, spurious messages) Introduction (1.19) Non-repudiation Prevents parties from denying they sent or received a message; ie. concerned with protecting against legitimate protocol participants, not with protection from external source REPUDIATION ATTEMPT Party anonymously publishes his or her message/key(s) and falsely claims that they were stolen. Receiver can verify and prove who sent a message Sender can verify and prove who received a message Network Security (N. Dulay & M. Huth) Introduction (1.20) Access Control Limit & control access to host system/services REPLAY Record a legitimate message e.g. a login, and replay later Limit & control access to networks Authenticate each party so that access rights can be assigned More fine-grained solutions, e.g. Digital Rights Management Auditing Service Network Security (N. Dulay & M. Huth) Introduction (1.21) Passive Attacks Interception Message Contents Traffic Analysis Only monitors channel (threat to confidentiality) Difficult to Detect -> Incentive to Prevent Countermeasures? Network Security (N. Dulay & M. Huth) Introduction (1.22) Active Attacks Interruption Denial of Service (AVAILABILITY) Modification (INTEGRITY) Fabrication Masquerade (AUTHENTICITY) Modification of, or creation of a false data stream Hard to Prevent -> Incentive to Detect and Recover REPLAYS are a very powerful form of active attack where a message is intercepted (passive attack) and then replayed to gain access or to break a protocol. E.g. fake interfaces at bank teller machines. Network Security (N. Dulay & M. Huth) Introduction (1.23) Reading Stallings. Chapter 1 - Introduction Network Security (N. Dulay & M. Huth) Introduction (1.24) The Internet Worm Michael Huth M.Huth@doc.ic.ac.uk www.doc.ic.ac.uk/~mrh/430/ Network Security (N. Dulay & M. Huth) Introduction (1.25) when & how accounts attacked date: 2nd november 1988 accounts with obvious passwords ________________________ sendmail (with debug mode enabled) fingerd (vaxen only) rexec accounts with a passwords in a 432 word dictionary accounts with passwords in /usr/dict/words accounts with trusted machines ( .rhosts ) rsh Network Security (N. Dulay & M. Huth) Introduction (1.26) machines attacked what it did not do certain sun’s and vax’s gain privileged access machines in /etc/hosts.equiv machines in .rhosts machines in cracked account’s .forward files machines in cracked account’s .rhosts files machines listed as network gateways in routing tables destroy or attempt to destroy any data leave time bombs behind attack specific well-known or privileged accounts such as root machines at guessed LAN addresses Network Security (N. Dulay & M. Huth) Introduction (1.27) rsh tried to connect as current user tried 3 locations for rsh: /usr/ucb/rsh, /usr/bin/rsh, /bin/rsh successful access if attacked host trusts user and host. trust defined by /etc/host.equiv or remote users .rhosts file rexec tried to connect with users and passwords already “discovered” on local host requested /bin/sh as command to execute if successful transferred worm bootstrap program if successful transferred worm bootstrap program Network Security (N. Dulay & M. Huth) Introduction (1.28) sendmail flaw fingerd bug debug mode allowed execution of a named program as the mail recipient. program would run with input coming from attacking host fingerd used a library routine (gets) which allocated a buffer on the stack. gets performed no bound checking recipient program stripped off mail headers and passed body to a command interpreter worm overflowed stack buffer, and setup a fake stack frame body was a script which "created" a worm bootstrap program to pull in rest of worm from attacking host both vax and sun worm binaries were tried Network Security (N. Dulay & M. Huth) causing a small new piece of vax code to run on procedure return code exec’ed bourne shell with input (worm bootstrap program) coming from attacking host Introduction (1.29) worm bootstrap self protection c source program erased argument list compiled with c compiler on attacked host deleted executing binary transferred main worm code (binaries) from attacking host both vax and sun binaries tried on execution detached itself from parent process Network Security (N. Dulay & M. Huth) used resource limit functions to prevent a core dump used sh for compiled name forked every 3 minutes, child continued, parent exited xor’ed all constant strings with hex 81 Introduction (1.30) Network Security Tutorial 1 Michael Huth M.Huth@doc.ic.ac.uk www.doc.ic.ac.uk/~mrh/430/ Network Security (N. Dulay & M. Huth) Introduction (1.31) Assets Personal Data, Passwords, CC, Files, Data, Configuration Data, Medical Data Money, Revenue stream CPU time, Network bandwidth, Filespace, Availability of Net Access to services Hardware .... Minimise downtime Network Security (N. Dulay & M. Huth) Intellectual Property Reputation, Public Image Privacy Staff morale Anonymity Introduction (1.32) Assets Data including archives Computers, Disks, Tapes CPU time, Storage, Net capacity Comms (routers, switches, firewalls, modems, patch panels, bandwidth), Phones, Faxes Air-conditioning systems/alarm systems, Physical Security Manuals, guides Printouts: reports, letters, emails, contracts Configuration information Passwords Network Security (N. Dulay & M. Huth) ** Staff Safety and health of personnel Privacy of users Public image and reputation Customer/client goodwill Share price Intellectual property Domain name Introduction (1.33) Threats Hardware errors Terrorists Theft, Malicious, Microsoft Industrial espionage, Government Malicious software Pirating Password cracking Denial of Service Masquerade Misuse of resources Social engineering Reverse engineering Network Security (N. Dulay & M. Huth) Acts of God, Fire, Earthquakes, Disaffected employees Human error Illness & Injury Economic downturns Introduction (1.34) Threats Unreliable software, bugs Viruses, worms, trojan horses, bombs, trap doors, spoofs, artificial life-forms, password crackers, Cryptanalysis, Microsoft Disgruntled, blackmailed, bribed, greedy employees or exemployees Hackers Government agencies, military spies, industrial spies, criminals, terrorists ISPs, Backbone Providers BIGGEST THREAT? Network Security (N. Dulay & M. Huth) Illness, flu epidemic, death, strikes, Resignations, badly-trained staff Loss of phone/network services Loss of utilities (water, electricity), Garbage Lightning, flood, fire, ... Bombs, ransom demands Vendor bankruptcy Bad press, fringe groups Legal action Faulty computers/equipment Bad practice, mis-configuration Introduction (1.35) Countermeasures Anti-virus software Backups Firewalls CERT Security Policies Physical security Disaster recovery Intrusion detection Systems Hardware dongles Patches Cryptography Access control Increasing bandwidth Network Security (N. Dulay & M. Huth) Good pay, food, computers, gym Train users Patents, copyrights, lawyers Contracts Background people Insurance Introduction (1.36) Countermeasures Protect buildings, equipment and people from unauthorised access, natural disasters Use fibre optic cabling, Shield equipment & cabling Use reliable H/W & S/W, Shredder Keep backups & standby systems Use “good” cryptography Use firewalls, simulated attacks Use good password admin, virus checkers, intrusion detection s/w, auditing software, biometrics Isolate network Counter-intelligence, Ethical hackers, Security guards, Lawyers Network Security (N. Dulay & M. Huth) Employ trustworthy staff, background checks Train/educate staff Keep staff happy Insure Good legal backup Take security seriously (planning, administration, risk assessment, cost/benefit analysis, paranoia level) Splendid Isolation EXPECTANCY & IMPACT Introduction (1.37) Policies Set of well-defined, consistent and implementable rules (security requirements). Policies should be general and change little over time. Consider an online auction company such as E-bay which allows most users to buy and sell goods online. Sellers can post details of their goods on E-Bay’s web site and interested buyers can bid for the goods. What policies might the users of the system want applied? What policies might E-Bay want applied? Network Security (N. Dulay & M. Huth) Introduction (1.38) Rank the Security functions below Confidentiality Authentication Integrity Availability Bank ? ? ? ? Military ? ? ? ? ? ? ? ? University 1 = Most Important Network Security (N. Dulay & M. Huth) 4 = Least Important Introduction (1.39) An access control is violated, what next? E.g. a password is broken and web pages for Amazon.com are replaced Network Security (N. Dulay & M. Huth) Introduction (1.40)