IPv6, Wireless, and Security CS 1 Rick Graziani Cabrillo College Spring 2015 Public Addresses • • IANA – Internet Assigned Numbers Authority Allocates IPv4 and IPv6 addresses to 5 RIRs (Regional Internet Registries) Public Addresses IPv6 • IPv4: 32 bits (written in decimal) – 192.168.1.100 11000000 192. • 10101000 168. 00000001 1. 01100100 100 IPv6: 128 bits (written in hexadecimal) – 2001:0DB8:CAFE:0001:0000:0000:0000:0095 Rick Graziani graziani@cabrillo.edu 4 Increased Address Space Number name Scientific Notation 1 Thousand 10 1 Million 10 1 Billion 10 1 Trillion 10 1 Quadrillion 10 1 Quintillion 10 1 Sextillion 10 1 Septillion 10 1 Octillion 10 1 Nonillion 10 1 Decillion 10 1 Undecillion 10 3 6 9 12 15 18 21 24 27 30 33 36 Number of zeros 1,000 1,000,000 1,000,000,000 There are 4 billion IPv4 addresses 1,000,000,000,000 1,000,000,000,000,000 1,000,000,000,000,000,000 1,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000,000,000,000,000 • 50 billion billion billion addresses for every person on earth There are 340 undecillion IPv6 addresses IPv6 Number name Scientific Notation 1 Thousand 10 1 Million 10 1 Billion 10 1 Trillion 10 1 Quadrillion 10 1 Quintillion 10 1 Sextillion 10 1 Septillion 10 1 Octillion 10 1 Nonillion 10 1 Decillion 10 1 Undecillion 10 3 6 9 12 15 18 21 24 27 30 33 36 Number of zeros 1,000 1,000,000 1,000,000,000 1,000,000,000,000 1,000,000,000,000,000 1,000,000,000,000,000,000 1,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000,000,000,000 1,000,000,000,000,000,000,000,000,000,000,000,000 • IPv4 addresses: 4.3 billion • IPv6 addresses: 340 undecillion Rick Graziani graziani@cabrillo.edu 6 What has kept IPv4 alive… NAT 192.168.1.0/24 RFC 1918 Private Address • • • Public IPv4 Address Network Address Translation (NAT) is a technology commonly implemented within IPv4 networks. – Provides a way for multiple devices to share a single public IP address. The IP address of an internal network host is hidden. This can be problematic for technologies that require end-to-end connectivity. • Monday, January 31, 2011 IANA allocated two blocks of IPv4 address space to APNIC, the RIR for the Asia Pacific region (39/8 and 106/8) • IANA has no more IPv4 network addresses to allocate • RIR’s Remaining IPv4 addresses ARIN soon to run out Rick Graziani graziani@cabrillo.edu 13 ISP Internet Service Provider 24.2.2.2 IP Address = Sub Mask = Default Gateway = Default Gateway 75.1.1.1 Rick Graziani graziani@cabrillo.edu DNS Server = ISP Internet Service Provider 24.2.2.2 DHCP IP Address = 75.1.1.2 (Public) Sub Mask = 255.255.252.0 Default Gateway = 75.1.1.1 Default Gateway 75.1.1.1 Rick Graziani graziani@cabrillo.edu Public Address 75.1.1.2 DNS Server = 24.2.2.2 DSL/Cable Modem Rick Graziani graziani@cabrillo.edu Router 17 ISP Internet Service Provider IP Address = Sub Mask = Default Gateway = 24.2.2.2 DNS Server = IP Address = Sub Mask = Default Gateway = Public IP Address 75.1.1.2 Default Gateway 192.168.1.1 Router/Default Gateway Default Gateway: 192.168.1.1 DHCP Server: Network = 192.168.1.0 (Private) Sub Mask = 255.255.255.0 First host: 192.168.1.100 Rick Graziani graziani@cabrillo.edu Network Address Translation 75.1.1.2 192.168.1.host DNS Server = IP Address = Sub Mask = Default Gateway = DNS Server = 21 ISP Internet Service Provider IP Address = 192.168.1.100 Sub Mask = 255.255.255.0 Default Gateway = 192.168.1.1 24.2.2.2 DNS Server = 24.2.2.2 DHCP IP Address = 192.168.1.101 Sub Mask = 255.255.255.0 Default Gateway = 192.168.1.1 Public IP Address 75.1.1.2 Default Gateway 192.168.1.1 Router/Default Gateway Default Gateway: 192.168.1.1 DHCP Server: Network = 192.168.1.0 Sub Mask = 255.255.255.0 First host: 192.168.1.100 Rick Graziani graziani@cabrillo.edu Network Address Translation 75.1.1.2 192.168.1.host DNS Server = 24.2.2.2 IP Address = 192.168.1.102 Sub Mask = 255.255.255.0 Default Gateway = 192.168.1.1 DNS Server = 24.2.2.2 22 Rick Graziani graziani@cabrillo.edu 23 IP Address = 192.168.1.100 I need an IP address www.bayfed.com Sub Mask = 255.255.255.0 Default Gateway = 192.168.1.1 24.2.2.2 www.bayfed.com is at 65.64.172.199 ISP Internet Service Provider DNS Server = 24.2.2.2 Default Gateway 75.1.1.1 Public IP Address 75.1.1.2 Bay Federal 65.74.172.199 Rick Graziani graziani@cabrillo.edu Router/Default Gateway IP Address = 192.168.1.100 I need an IP address www.bayfed.com Sub Mask = 255.255.255.0 Default Gateway = 192.168.1.1 24.2.2.2 www.bayfed.com is at 65.64.172.199 ISP Internet Service Provider DNS Server = 24.2.2.2 Default Gateway 75.1.1.1 Public IP Address 75.1.1.2 Bay Federal 65.74.172.199 Rick Graziani graziani@cabrillo.edu Router/Default Gateway IP Address = 192.168.1.100 Sub Mask = 255.255.255.0 Default Gateway = 192.168.1.1 24.2.2.2 DNS Server = 99.99.99.99 ISP Internet Service Provider Default Gateway 75.1.1.1 I need an IP address www.bayfed.com Public IP Address 75.1.1.2 Bay Federal 65.74.172.199 Router/Default Gateway 99.99.99.99 99.1.2.3.4 Rick Graziani graziani@cabrillo.edu www.bayfed.com is at 85.255.112.99 L2 PAIX Customer Prefixes Public IP Address Bi-lateral Settlement Free Peer Non-transit. You can get to our prefixes and we can get to your prefixes. No charge. Level 3 Transit Buy transit per Mb/s per month for routes not know from non-transit AS’s EBGP CENIC (non-transit AS) Cabrillo Google Redistribute static MED AS and Public IP Address LocPref SVL-Agg1 SAC EBGP UCSC Hurricane Elec Fully-meshed IBGP EBGP AS and Public IP Address SVL Commodity Peer Commodity Peer UCLA LAX-Agg1 LAX RVR Comcast IGP: IS-IS used for next-hop reachability Public IP Address Commodity Peer EBGP Cuesta Non-transit. You can get to our prefixes and we can get to your prefixes. No charge. Internet 2 Research Peer NLR CUDI Research Peer Cogent Transit Buy transit per Mb/s per month for routes not know from nontransit AS’s 36 Rick Graziani graziani@cabrillo.edu 37 1981 primitive Internet report on KRON http://www.youtube.com/watch?v=5WCTn4FljUQ&feature=pl ayer_embedded Rick Graziani graziani@cabrillo.edu 38 Circuit Switched • Circuit Switching: A form of data communication which establishes a • • single connection or circuit between source and destination to carry the data stream. Like a conventional telephone system. When a subscriber makes a telephone call the dialed number is used to set switches in the exchanges along the route of the call so that there is a continuous circuit from the originating caller to that of the called party. Rick Graziani graziani@cabrillo.edu 39 Rick Graziani graziani@cabrillo.edu 40 Rick Graziani graziani@cabrillo.edu 41 Rick Graziani graziani@cabrillo.edu 42 The range of G.fast will be very short — on the order of 250 meters (820 feet). Basically, G.fast is envisaged as the ideal way of getting fiber-like speeds from the cabinet, manhole, or telephone pole. Rick Graziani graziani@cabrillo.edu 43 Packet Switching • Packet Switching: A form of data communications which breaks • a data stream into small sections, sends them separately by the best available channels and reassembles the original data stream at its destination. An alternative is to allocate the capacity to the traffic only when it is needed, and share the available capacity between many users. Rick Graziani graziani@cabrillo.edu 44 Wireless Access Point • A wireless access point is a device that connects wireless devices (laptops, etc.) to a wired network, usually an Ethernet LAN. Rick Graziani graziani@cabrillo.edu 45 Wireless Access Point • In our example the wireless access point (AP) will include a Router. Rick Graziani graziani@cabrillo.edu 46 Putting it together • Exactly the same as connecting a router without an AP. Rick Graziani graziani@cabrillo.edu 47 Configuring the AP and Router Wireless Settings: • SSID (Service Set Identifier) – Name of your network • Security: WPA2, WPA, WEP, or none SSID Rick Graziani graziani@cabrillo.edu 48 Configuring the AP and Router Wireless Settings: • Security: WPA2, WPA, WEP, or none WPA2 Rick Graziani graziani@cabrillo.edu 49 SSID • The SSID is what will be displayed when people with wireless computers are looking for a wireless LAN. Rick Graziani graziani@cabrillo.edu 50 Linksys WRT54G Router Information • IP Address from ISP • Connects to your DSL/Cable Modem • NAT (Network Address Translation) Local Network • Ethernet Switch • Connect “wired” computers • DHCP Server (optional) Wireless • SSID: MyHomeNetwork • DHCP Server: (optional) • Channel: 11 • Encryption Function: WPA Rick Graziani graziani@cabrillo.edu 51 You choose… • • • • There are many resources to discuss the possible health risks or wireless LANs. As a networking and WLAN user and instructor I have my own thoughts which I will share. If you are concerned, then research the information and come to your own conclusions. The following information is from my own research and experience. Rick Graziani graziani@cabrillo.edu 52 Wireless Frequency • Wireless APs operate at: – 2.4 GHz – 5 GHz • 2 GHZ! That’s the same as my microwave oven, isn’t that dangerous? • Answer: No. – Electromagnetic waves happen naturally. • Light is an electromagnetic wave – It is not the frequency, but the wattage, the power. • Any electromagnetic wave can be dangerous with too much power. • A 25 watt light bulb is safe, but it wouldn’t be safe at 250,000 watts – Wireless access points generate signals at 1/10th of a watt. • Like all electromagnetic waves, the signal does not fade in a linear manner, but inversely as the square of the distance. Rick Graziani graziani@cabrillo.edu 53 Rick Graziani graziani@cabrillo.edu www.britishlibrary.net 54 Inverse square law 10 Point A 20 30 40 3 times the distance 1/9 the power of Point A 2 times the distance ¼ the power of Point A 50 100 10 times the distance 1/100 the power of A 5 times the distance 1/25 the power of Point A • Double the distance of the wireless link, we receive only ¼ of the • • original power. Triple the distance of the wireless link, we receive only 1/9 the original power. Move 5 times the distance, signal decreases by 1/25. Rick Graziani graziani@cabrillo.edu 55 Putting it in some perspective • Measurements from an antenna transmitting 100mW at 1 inch • Remember a milliwatt is 1/1,000th of a Watt • Microwave oven typically operates at 1,000 watts in a confined space. • • 1” 100 mW 1/10th watt 2” 25 mW 1/40th watt 4” 6.25 mW 1/166th watt 8” 1.56 mW 1/1000th watt 16” 0.39 mW 4/10,000th watt 32” 0.097 mW 1/10,000th watt 64” (5.3 ft) 0.024 mW 2/100,000th watt 128” (10.6 ft) 0.006 mW 6/1,000,000th watt 256” (21.3 ft) 0.0015 mW 15/10,000,000th watt Light bulbs would also be dangerous the were 10,000 to 1,000,000,000,000 stronger. A 250,000 watt up to a 250,000,000,000,000 watt light bulb would also be dangerous. Rick Graziani graziani@cabrillo.edu 56 Rick Graziani graziani@cabrillo.edu 57 Wireless N • • Wireless N provides better speeds (bandwidth) and better range by utilizing multiple antennas. Backwards compatible with 802.11 b and g. Rick Graziani graziani@cabrillo.edu 58 Wireless Security – Everyone can hear • • Others can “hear” or capture your information. Wireless signals are propagated, sent, similar to our voice sound waves. Rick Graziani graziani@cabrillo.edu 59 Wireless Security – Everyone can hear • If we don’t want them to understand what they hear, we can encrypt or • code the information. As long a our wireless computer and access point are using the same encryption algorithm, such as WPA2. Rick Graziani graziani@cabrillo.edu 60 Wireless Security • Without any security, anyone can: – Use your wireless access point to access your network and the Internet. – Capture your information from your wireless computer. Rick Graziani graziani@cabrillo.edu 61 Wireless Security CommView Rick Graziani graziani@cabrillo.edu DriftNet 62 Wireless Security • Your web browsing or email access should already be secured. • Look for the lock Rick Graziani graziani@cabrillo.edu 63 Wireless Security • • Why you should protect your wireless network with WPA – http://www.youtube.com/watch?v=A88XB7_Jz7s Wireless Hacking – http://www.youtube.com/watch?v=qP1BOZqrp5g&featur e=related Rick Graziani graziani@cabrillo.edu 64 MAC Cloning Rick Graziani graziani@cabrillo.edu 65 Cell Phones do not cause explosions • http://www.youtube.com/watch?v=OQ0aTMMITp8 • http://www.youtube.com/watch?v=NRGrFLRs9xE&feature= related Rick Graziani graziani@cabrillo.edu 66 Rick Graziani graziani@cabrillo.edu 67 Internet: Safe Surfing Safe Surfing • Adware • • • • • – Pop-ups – Spyware – Blocking Pop-ups Java Traps or Pop-Up Hell Spyware – Blocking Spyware Cookies Virus Protection Spam – Blocking Spam Rick Graziani graziani@cabrillo.edu 69 Adware • Adware or advertising-supported software is any software application • in which advertisements are displayed while the program is running. Adware helps recover programming development costs, and helps to hold down the price of the application for the user (even making it free of charge)—and, of course, it can give programmers a profit, which helps to motivate them to write, maintain, and upgrade valuable software. Rick Graziani graziani@cabrillo.edu 70 What are Pop-ups? (Wikipedia.org) • Pop-up ads are a form of online advertising on the Web where certain • • websites open a new web browser window to display advertisements. Usually generated by JavaScript A less intrusive variation on the pop-up window is the pop-under advertisement. – This opens a new browser window, but in the background, so as not to interrupt the user's page-view. Rick Graziani graziani@cabrillo.edu 71 From Gain Publishing: www.gainpublishing.com/ about/ Rick Graziani graziani@cabrillo.edu 72 • • • • For early advertising-supported websites, banner ads were sufficient revenue generators. But in the wake of the dot com crash, prices paid for banner advertising clickthroughs decreased and many vendors began to investigate more effective advertising methods. Pop-up ads by their nature are difficult to ignore or overlook, and are claimed to be more effective than static banner ads. Pop-ups have a much higher click rate than web banner ads do. – What are Pop-ups? (Wikipedia.org) Rick Graziani graziani@cabrillo.edu 73 Pop-ups (Wikipedia.org) Ultimate irony! • • Most users regard pop-ups as a nuisance. In the early 2000s, all major web browsers except Internet Explorer allowed the user to block pop-ups almost completely. Rick Graziani graziani@cabrillo.edu 74 Rick Graziani graziani@cabrillo.edu 75 Pop-up, looks real… http://www.news3insider.com/finance/google-hiring-you.html Rick Graziani graziani@cabrillo.edu 76 C/NET – Pop-ups mean more $$$ • Publishers willingly allow pop-ups or pop-unders because they command higher prices, and they're in high demand by advertisers. Rick Graziani graziani@cabrillo.edu 77 But are the clicks real or bots? Rick Graziani graziani@cabrillo.edu 78 “Java Trap” or “Pop-up Hell” • Pornographic websites are among the most common users of pop-up • • • • ads. Some particularly vicious types of pop-up ads have been specifically designed to "hijack" a user's Internet session. As each window is closed by the user it activates another window -sometimes indefinitely. Usually the only way to stop this is to close the browser. Mouse Trapping: Another variation of pop-up fills an entire screen with an ad or Web page, removing any menu bars or other on-screen icons by which the user can close the window. Rick Graziani graziani@cabrillo.edu 79 Spyware (Wikipedia.org) • Spyware is computer software that gathers and reports information • • about a computer user without the user's knowledge or consent. May perform many different functions, including: – Delivery of unrequested advertising (pop-up ads in particular), – Harvesting private information – Re-routing page requests to illegally claim commercial site referral fees Spyware or Malware Can include: – keystroke loggers – denial-of-service (DoS) attack agents Rick Graziani graziani@cabrillo.edu 80 Fighting Spyware • Spybot (www.safer-networking.org) • PestPatrol (www.pestpatrol.com) Rick Graziani graziani@cabrillo.edu 81 Cookies • A cookie is information sent by a • • server to a browser and then sent back to the server each time it accesses that server. Amongst other uses, cookies enable websites to be customized for individual users once browsing patterns have been established. Cookies only store information that you provide. Rick Graziani graziani@cabrillo.edu 82 First time you login HTTP Requests: GET (first time) HTTP: Response Set-cookie: ID 5551212 HTTP Requests (GET) Web server can now now include ID track clients activities 5551212 on the web site. HTTP Server Rick Graziani graziani@cabrillo.edu HTTP Client 83 Each time you login… HTTP: Cookie 5551212 included HTTP Server HTTP data customized for Rick Graziani HTTP Client Rick Graziani graziani@cabrillo.edu 84 Cookies - Purpose • Typically this is used to authenticate or identify a registered user of a • web site as part of their first login process or initial site registration without requiring them to sign in again every time they access that site. Other uses are maintaining a "shopping basket" of goods selected for purchase during a session at a site, site personalization (presenting different pages to different users), and tracking a particular user's access to a site. Rick Graziani graziani@cabrillo.edu 85 Cookies - Permissions • A browser may or may not allow the use of cookies. • The user can usually choose a setting. • Microsoft Internet Explorer – Tools > Internet Options > Privacy Tab – Use slider to set options, or use advanced options Rick Graziani graziani@cabrillo.edu 86 Virus Protection • In computer security technology, a virus is a selfreplicating program that spreads by inserting copies of itself into other executable code or documents Rick Graziani graziani@cabrillo.edu 87 http://techguylabs.com/ Rick Graziani graziani@cabrillo.edu 88 Fishing… Rick Graziani graziani@cabrillo.edu 89 Rick Graziani graziani@cabrillo.edu 90 Rick Graziani graziani@cabrillo.edu 91 Rick Graziani graziani@cabrillo.edu 92 Rick Graziani graziani@cabrillo.edu 93 Rick Graziani graziani@cabrillo.edu 94 Rick Graziani graziani@cabrillo.edu 95 Computer Virus, Spyware • • Computer Virus, Spyware http://www.youtube.com/watch?v=uK5ija2gVbY • • How Computer Viruses Work http://www.youtube.com/watch?v=sxal31zIKdE&feature=rel ated Rick Graziani graziani@cabrillo.edu 96 Spam (Wikipedia) • Spamming is the act of sending unsolicited electronic messages in bulk. Rick Graziani graziani@cabrillo.edu 97 Anti-Spam • Spammers obtain e-mail addresses by a number of means: • • • – Web pages – guessing common names at known domains – "e-pending" – searching for e-mail addresses corresponding to specific persons Many e-mail spammers go to great lengths to conceal the origin of their messages. Spoofing e-mail addresses - spammer modifies the e-mail message so it looks like it is coming from another e-mail address. Among the tricks used by spammers to try to circumvent the filters is to intentionally misspell common spam filter trigger words, ie. "viagra" might become "vaigra", or by inserting other symbols within the word, i.e. "v/i/a/g./r/a". Rick Graziani graziani@cabrillo.edu 98 The Nigerian Email Spam Scam • • • Email SPAM Scam The Nigerian Email Spam Scam http://www.youtube.com/watch?v=kYNi2gVpuig • ABC Report on Nigerian Scammers • http://www.youtube.com/watch?v=8PQANsFisvU&feat • • ure=related http://www.youtube.com/watch?v=7PVK0R01tRw&feat ure=related http://www.youtube.com/watch?v=puYEUs18MFI&featu re=related Rick Graziani graziani@cabrillo.edu 99 Passwords • Combine letters, numbers, and symbols. • Use words and phrases that are easy for you to remember, but difficult • • • • for others to guess. Avoid sequences or repeated characters. "12345678”, "abcdefg" Avoid using only look-alike substitutions of numbers or symbols. – 'i' with a '1' – 'a' with '@‘ – ‘o’ with a 0’ – as in "M1cr0$0ft" or "P@ssw0rd" (these are not good though) At least 8 characters; more than14 characters is even better But these substitutions can be effective when combined with other measures: – 1$erf@h00k4i$t – http://howsecureismypassword.net/ – http://www.passwordmeter.com/ Rick Graziani graziani@cabrillo.edu 100 Hoaxes, Scams, and Fraud • This hoax generated thousands of emails with the first day alone. Rick Graziani graziani@cabrillo.edu 101 Google name or go to Snopes.com Rick Graziani graziani@cabrillo.edu 102 Swiffer Wetjet Rick Graziani graziani@cabrillo.edu 103 Typical Email Scam Subject: Account Confirmation {Account Expires in 4 days} Date: Mon, 15 Sep 2008 06:14:39 -0400 From: Leboyd, Nichole <nleboyd@msm.edu> Dear Staff/Student This message is from the IT Service messaging center to all subscribers/webmail users. We are currently upgrading the webmail data base and e-mail centers due to an unusual activities identified in our email system. We are deleting all unused Webmail Accounts. You are required to verify and update your Webmail by confirming your Webmail identity. This will prevent your Webmail account from been closed during this exercise. In order to confirm your Webmail identity, you are to provide the following data; Confirm Your WebMail Identity Below; First Name: Last Name: Username/ID: Password: Date of Birth: Warning: Any subscriber/webmail user that refuses to verify and subsequently update his/her Webmail within 4 days of receiving this warning will lose his/her Webmail Account permanently. We thank you for your prompt attention to this matter. Please understand that this is a security measure intended to help protect your Webmail Account. We apologise for any inconvenience. Regards, Leboyd Nichole Webmail Administrator. Rick Graziani graziani@cabrillo.edu 104 Wells Fargo (Scam) Rick Graziani graziani@cabrillo.edu 105 Fake Site Rick Graziani graziani@cabrillo.edu 106 Fake and Real Sites Rick Graziani graziani@cabrillo.edu 107 Wells Fargo – Reporting Fraud Emails Rick Graziani graziani@cabrillo.edu 108 PayPal Rick Graziani graziani@cabrillo.edu 109 USAA Rick Graziani graziani@cabrillo.edu 110 Changing Who From Rick Graziani graziani@cabrillo.edu 111 Create Fake Email Rick Graziani graziani@cabrillo.edu 112 Creating Fake Link Rick Graziani graziani@cabrillo.edu 113 Receiver Rick Graziani graziani@cabrillo.edu 114 Looking at Options doesn’t help Rick Graziani graziani@cabrillo.edu 115 Click on Link… Rick Graziani graziani@cabrillo.edu 116 RickRoll’D Rick Graziani graziani@cabrillo.edu 117 Killer Whale Lands On Kayak (?) • • http://www.youtube.com/watch?v=H2KBpauoDNs http://www.youtube.com/watch?v=NjwxAJYKFbE Rick Graziani graziani@cabrillo.edu 118 Sites to check for hoaxes • • • http://urbanlegends.about.com/od/internet/a/current_netlor e.htm http://www.snopes.com/ http://www.hoax-slayer.com/ Rick Graziani graziani@cabrillo.edu 119 Rick Graziani graziani@cabrillo.edu 120 Rick Graziani graziani@cabrillo.edu 121 Rick Graziani graziani@cabrillo.edu 122 Rick Graziani graziani@cabrillo.edu 123 Rick Graziani graziani@cabrillo.edu 124 Rick Graziani graziani@cabrillo.edu 125 Rick Graziani graziani@cabrillo.edu 126 IPv6, Wireless, and Security CS 1 Rick Graziani