Telecommunications & Network Security Originally (1/01) by: Usha Viswanathan Modified (1/03, 5/06 ) by: John R. Durrett 1 Presentation Overview – – – – – – – – C.I.A. as it applies to Network Security Protocols & Layered Network Architectures OSI and TCP/IP TCP/IP protocol architecture IP addressing & Routing TCP Applications IPv6 2 C.I.A. – Confidentiality: The opposite of disclosure • Elements used to insure: Security Protocols, authentication services, encryption services – Integrity: The opposite of Alteration • Elements used to insure: Firewalls, Communications Security Management, Intrusion Detection Services – Availability: The opposite of destruction / denial • Fault Tolerance, Acceptable system performance, Reliable administration and network security 3 Protocols & the Layered Network: Intro – Protocol: • A standard set of rules that determine how computers talk • Describes the format a message must take • Enables multi-platform computers to communicate – The Layered Architecture Concept • Data passes down through the layers to get “out”, and up to get “in” • Reasons for use: to clarify functionality, to break down complexity, to enable interoperability, easier troubleshooting 4 TCP/IP The “lingua franca” of the Internet. 5 ISO’s Open Systems Interconnect (OSI) Reference Model – Protocol Layering • Series of small modules Well defined interfaces, hidden inner processes Process modules can be replaced Lower layers provide services to higher layers – Protocol Stack: modules taken together – Each layer communicates with its pair on the other machine 6 The OSI Model Sender Receiver Application Application The path messages take Presentation Presentation Session Session Transport Transport Network Network Datalink Datalink Across Network Physical Physical 7 OSI Layers Communication partners, QoS identified Semantics , encryption compression (gateways) Application Presentation Establishes, manages, terminates sessions Session Sequencing, flow/error control, name/address resolution Routing, network addresses (routers) Transport Network MAC address, low level error control (bridges ) Datalink Encoding/decoding digital bits, interface card Physical 8 TCP/IP Application Application Transport Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Network Layer Network Layer Network Layer Alice Router Bob 9 TCP/IP: The Protocols and the OSI Model Application Presentation Session Transport TELNET FTP SMTP DNS SNMP DHCP RIP RTP RTCP Transmission Control Protocol User Datagram Protocol OSPF ICMP IGMP Internet Protocol Network ARP Datalink Physical Ethernet Token Bus Token Ring FDDI 10 Data Encapsulation by Layer Data Application TCP Header Datagram TCP Network Packet Data Link Frame Destination Opens envelopes layer-by-layer 11 Transmission Control Protocol (TCP) – – – – – – Traditional TCP/IP Security: None • No authenticity, confidentiality, or integrity • Implemented & expanding: IPSec Workhorse of the internet • FTP, telnet, ssh, email, http, etc. The protocol responsible for the reliable transmission and reception of data. Unreliable service is provided by UDP. Transport layer protocol. Can run multiple applications using the same transport. • Multiplex through port numbers 12 TCP Fields Source port Destination port Sequence number Acknowledgment number Data offset Reserved U A P R S F R C S S Y I P K H T N N Window Checksum Urgent pointer Options Padding data 13 TCP Connection Establishment – Alice to Bob: SYN with Initial Sequence Number-a – Bob to Alice: ACK ISN-a with ISN-b – Alice to Bob: ISN-b – Connection Established 14 User Datagram Protocol (UDP) – – Connectionless Does not retransmit lost packets Does not order packets Inherently unreliable – Mainly tasks where speed is essential – Streaming audio and video DNS – – – Source Port Destination Port Message Length Checksum Data … 15 ICMP: network plumber Message Type Type # Purpose Echo Reply 0 Ping response –system is alive Destination Unreachable 3 No route, protocol, or port closed Source Quench 4 Slow down transmission Redirect 5 Reroute traffic Echo 8 Ping Time Exceeded 11 TTL exceeded packet dropped Parameter Problem 12 Bad header Timestamp 13 Time sent and requested Timestamp return 14 Time request reply Information request 15 Hosts asks: What network am I on Information Reply 16 Information Response 16 Ports “Ports are used in the TCP [RFC793] to name the ends of logical connections which carry long term conversations. For the purpose of providing services to unknown callers, a service contact port is defined. This list specifies the port used by the server process as its contact port. The contact port is sometimes called the "well-known port". PORT USE 17 Quote of the Day 20 File Transfer Data •Source port •Destination port •Logical connection 21 File Transfer Control 22 SSH •Priviledged – unprivileged ports 23 Telnet 25 SMTP 43 Whois (tcp & udp) 666 Doom 17 Network Address Translation (NAT) – – – – Illegal Addresses Unroutable addresses: 10.0.0.0 192.168.0.0 Limited address space in IP V4 NAT maps bad to valid addresses • Mapping to single external address • One-to-One mapping • Dynamically allocated addresses 12.13.4.5 10.0.0.5 Router 18 Logical Structure of the Internet Protocol Suite HTTP TELNET FTP TFTP DNS SNMP User Datagram Protocol Transmission Control Protocol Connectionless Connection Oriented IP (ICMP,IGMP) Internet Addressing ARP RARP Physical Layer 19 Address Resolution Protocol (ARP) Maps IP addresses to MAC addresses When host initializes on local network: – ARP broadcast : IP and MAC address – If duplicate IP address, TCP/IP fails to initialize Address Resolution Process on Local Network – Is IP address on local network? – ARP cache – ARP request – ARP reply – ARP cache update on both machines 20 ARP Operation Give me the MAC address of station 129.1.1.4 Here is my MAC address ARP Request 129.1.1.1 ARP Response Accepted B Not me Request Ignored C Not me Request Ignored 129.1.1.4 That’s me 21 Address Resolution on Remote Network – IP address determined to be remote – ARP resolves the address of each router on the way – Router uses ARP to forward packet Router Network A Network B 22 Reverse Address Resolution Protocol (RARP) Give me my IP address RARP Response 129.1.1.1 Not me Not me RARP Request Diskless Workstation B RARP Response Accepted Request Ignored C RARP Server Request Ignored Same packet type used as ARP Only works on local subnets Used for diskless workstations 23 The Internet Protocol (IP) – – IP’s main function is to provide for the interconnection of subnetworks to form an internet in order to pass data. The functions provided by IP are: • Addressing • Routing • Fragmentation of datagrams 24 Host Name Resolution Standard Resolution – – – Checks local name Local HOSTS file DNS server Windows NT Specific Resolution – – – – NetBIOS cache WINS server b-node broadcasts LMHOSTS file (NetBIOS name) 25 Routing Packets – Process of moving a packet from one network to another toward its destination – RIP, OSPF, BGP – Dynamic routing – Static routing – Source routing 26 Static Routing Tables – – – Every host maintains a routing table • Use the “route” command in Linux and Windows Each row (or “entry”) in the routing table has the following columns: • (1) destination address and (2) mask • (3) gateway [i.e., the IP address of the host’s gateway/router] • (4) interface [i.e., the IP address of a host interface] • (5) metric [indicates the “cost” of the route, smaller is better] When the host wants to send a packet to a destination, it looks in the routing table to find out how • Each OS handles routing somewhat differently 27 LAN Technologies – – – – – Ethernet: CSMA/CD, occasionally heavy traffic, BUS topology ARCnet: token passing, STAR topology Token Ring: active monitor, IBM, RING topology FDDI: token passing, fast, long distance, predictable, expensive Media & Vulnerabilities • Attenuation, Crosstalk, Noise • Coax: cable failure & length limits • Twisted Pair (Cat 1-7): bending cable, crosstalk, Noise • Fiber-Optic: cost, high level of expertise required to install • Wireless: later 28 Coaxial Cable – Two types • ThinNet (10Base2) 10 Mbps, 30 nodes per segment, max 180 meters • ThickNet (10Base5) 10 Mbps, 100 nodes per segment, max 500 meters – LAN Backbone Insecure • Coax is easy to splice 29 Twisted Pair Copper Cable – – – Copper wire Twist reduces EMI Classified by transmission rates • Cat3, Cat5, Cat5e, Cat6 30 Fiber-Optic Cable – – – – – – Glass core with plastic shielding Small, light, fragile, and expensive Very fast transmission rate Can transmit data very far Immune to interference Hard to splice 31 Security Concerns – – – – Easy to insert a node or splice into network Most attacks involve eavesdropping or sniffing Physical security War driving 32 Network Topologies – – – – – BUS • Ethernet RING • Unidirectional • FDDI, Token Ring STAR • Logical BUS tends to be implemented as physical Star TREE • Basically a complicated BUS topology MESH • Multiple computer to computer connections 33 Hubs & Switches – Hub: • broadcasts information received on one interface to all other physical interfaces – Switch: • does not broadcast • Uses MAC address to determine correct interface 34 Unswitched Devices “Dumb” Devices (forward all packets) – – Layer 1 = Hub, Repeater • Technically, a hub passes signals without regenerating them Layer 2 = Bridge • Connects different types of LANs (e.g., Ethernet and ATM, but not Token Ring if you’re lucky) “Intelligent” Devices (decide whether to forward packets) – Layer 3 = Router • Use routing table to make decisions • Improved performance and security – Layer 2/3 =Bridge/Router 35 Switches – – – – Layer 2 = data link layer (MAC address) = + over hubs/repeaters • Systems only see traffic they are supposed to see • Unswitched versus switched (full duplex) 10 and 100 mb Ethernet = 40% of bandwidth versus 95%+ (no collisions) Layer 3 = network layer (IP address) = + over routers • Routers moved to periphery • Virtual LANs (VLANs) become viable Layer 4 = transport layer (TCP/UDP/ICMP headers) = + over L3 • Firewall functionality (i.e., packet filtering) • Significantly more expensive Layer 5 = session layer and above (URLs) = + over L4 for clusters • Application proxy functionality (but MUCH faster than proxies) • Special function, cutting-edge = significant specific performance gains • 1999/2000: researchers (from IBM & Lucent) designed a layer 5 switch as front-end to a load-balanced 3-node cluster running AIX and Apache: 220% performance increase due to content partitioning 600% performance increase due to SSL session reuse 36 Firewalls – Control the flow of traffic between networks – Internal, External, Server, Client Firewalls – Traditional Packet filters Stateful Packet filters Proxy-based Firewalls – – 37 Traditional Packet Filters – – – Analyses each packet to determine drop or pass SourceIP, DestinationIP, SrcPort, DestPort, Codebits, Protocol, Interface Very limited view of traffic Action Source Destination Protocol SrcPort Dest Port Codebits Allow Inside Outside TCP Any 80 Any Allow Outside Inside TCP 80 >1023 ACK Deny All All All All All All 38 Stateful Packet Filters – Adds memory of previous packets to traditional packet filters – When packet part of initial connection (SYN) it is remembered Other packets analyzed according to previous connections – 39 Proxy-based (Application) Firewalls – Focus on application to application – Can approve: • By user • By application • By source or destination – Mom calls, wife answers, etc. 40 Firewall Architectures – Packet-Filtering Routers • Oldest type, sits between “trusted” & “untrusted” networks – Screened-Host Firewalls • Between a trusted network host and untrusted network – Dual-Homed Host Firewalls • Two nics, ip forwarding, NAT translation – Screened-Subnet Firewalls • Two screening routers on each side of bastion host • DMZ 41 Security – Encryption: Symmetric vs Asymmetric, hash codes – Application Layer • PGP, GnuPG, S/MIME, SSH – Session Layer: Secure Socket Layer (SSL) • Digital certificates to authenticate systems and distribute encryption keys • Transport Layer Security (TLS) – Network-IP Layer Security (IPSec) • AH: digital signatures • ESP: confidentiality, authentication of data source, integrity 42 IPSec Authentication Header (AH) Next Header Payload Length Reserved Security Parameters Index (SPI) Sequence Number Field Authentication Data (variable number of 32 bit Words) 43 IPSec: Encapsulating Security Payload (ESP) Security Parameters Index (SPI) Sequence Number Field Opaque Data, variable Length Padding Pad Length Next Header Authentication Data 44 Introduction to the TCP/IP Standard Applications – – – – – – – DHCP–Provides for management of IP parameters. TELNET–Provides remote terminal emulation. FTP–Provides a file transfer protocol. TFTP–Provides for a simple file transfer protocol. SSH-Encrypted remote terminal & file transfer SMTP–Provides a mail service. DNS–Provides for a name service. 45 DHCP Operation DHCP Server B DHCP Server A DHCP Client DHCP Discover FFFFFF DHCP A Offer (IP addr) DHCP B Offer (IP addr) DHCP Request (A) DHCP A ACK 46 TELNET TELNET server Host TELNET server TELNET client 47 File Transfer Protocol (FTP) Host Storage Client (TFTP – uses UDP) 48 Simple Mail Transfer Protocol (SMTP) – Basic RFCs 821, 822, 974. – Very fast and capable of delivery guarantee depending on client & server. – Primary protocols are used for today’s email. • SMTP–operates over TCP, used primarily as send protocol • POP–operates over TCP, basic receive protocol • IMAP-allows remote storage • Exchange-calendar, contacts, storage, news • http-web interface – Problems: • Phishing, viruses, no built in protects for “stupidity” • Client software glitches 49 Post Office Protocol (POP) – – – – SMTP is set up to send and receive mail by hosts that are up full time. • No rules for those hosts that are intermittent on the LAN POP emulates you as a host on the network. • It receives SMTP mail for you to retrieve later POP accounts are set up for you by an ISP or your company. POP retrieves your mail and downloads it to your personal computer when you sign on to your POP account. 50 POP Operation POP Server POP Client TCP port 110 connection attempt Send authentication Retrieve all messages Send QUIT command Session closed Read messages locally “POP3 server ready” reply Wait for authentication Process authentication and if okay, enter transaction state Lock mailbox for user. Assign messages numbers Send messages Delete (possibly) messages Quit received Perform update on mailbox 51 SMTP, DNS, and POP Topology Your PC Your ISP Retrieve mail Send mail POP Server mnaugle user1 user2 DNS SMTP POP3/SMTP root DNS Internet Remote ISP DNS send mail Joe’s PC SMTP joe Retrieve mail POP Server 52 IPv6 – – IPv6 features: • 128 bit address space • 340,282,366,920,938,463,463,374,607,431,768,211,456 addresses • ARP not used, “Neighbor Discovery Protocol" IPv6 addressing: • Unicast: A one-to-one IP transfer • Multicast: A one-to-many-but-not-all transfer • Anycast: A one-to-many-but-not-all (nearest in group) • No broadcast 53 References – – RFCs: 1180 - A TCP/IP tutorial, 1812 - IP Version 4 Routers 1122 - Requirements for Internet Hosts -- Communication Layers 1123 –Requirements for Internet Hosts -- Application & Support 826 – Address Resolution Protocol, 791 – IP addressing, 950 – Subnetting, 1700 – Assigned Numbers TCP/IP 24/7 (ISBN: 0782125093) – MCSE TCP/IP for Dummies : Cameron Brandon – Illustrated TCP/IP : Matthew Naugle 54