DOC PREVIEW
Stanford CS 155 - Network Protocols and Vulnerabilities

This preview shows page 1-2-3-4-24-25-26-50-51-52-53 out of 53 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Network Protocols and VulnerabilitiesOutlineInternet InfrastructureTCP Protocol StackData FormatsInternet ProtocolIP RoutingIP Protocol Functions (Summary)User Datagram ProtocolTransmission Control ProtocolInternet Control Message ProtocolBasic Security ProblemsPacket SniffingSmurf DoS AttackTCP HandshakeSYN FloodingSlide 17Protection against SYN AttacksTCP Connection SpoofingIP Spoofing AttackTCP Sequence NumbersRecent DoS vulnerability [Watson’04]Cryptographic network protectionWireless ThreatsEvolution of Wireless SecurityWhat Went Wrong With WEPIEEE 802.11i - WPA2Security issues in development of 802.11iTCP Congestion ControlCompetitionRouting VulnerabilitiesSource Routing AttacksRouting Table Update ProtocolsInterdomain RoutingBGP overviewBGP example [D. Wetherall]IssuesBGP Route InstabilitySlide 41Slide 42Domain Name SystemDNS Root Name ServersDNS Lookup ExampleCachingLookup using cached DNS serverDNS Implementation VulnerabilitiesInherent DNS VulnerabilitiesDNS cache poisoningPharmingDNS Rebinding AttackDNS Rebinding DefensesSummary (I)Summary (II)Network Protocols and Vulnerabilities John MitchellCS 155Spring 2008OutlineBasic NetworkingNetwork attacksAttacking host-to-host datagram protocolsSYN flooding, TCP Spoofing, …Attacking network infrastructureRoutingDomain Name System This lecture is about the way things work now and how they are not perfect. Next lecture – some security improvements (still not perfect)BackboneISPISPInternet InfrastructureLocal and interdomain routingTCP/IP for routing, connectionsBGP for routing announcementsDomain Name SystemFind IP address from symbolic name (www.cs.stanford.edu)TCP Protocol StackApplicationTransportNetworkLinkApplication protocolTCP protocolIP protocolData LinkIPNetwork AccessIP protocolData LinkApplicationTransportNetworkLinkData FormatsApplicationTransport (TCP, UDP)Network (IP)Link LayerApplication message - dataTCP data TCP data TCP dataTCP HeaderdataTCPIPIP HeaderdataTCPIPETH ETFLink (Ethernet) HeaderLink (Ethernet) Trailersegment packetframemessageInternet ProtocolConnectionlessUnreliableBest effortTransfer datagramHeaderDataIPVersion Header LengthType of ServiceTotal LengthIdentificationFlagsTime to LiveProtocolHeader ChecksumSource Address of Originating HostDestination Address of Target HostOptionsPaddingIP DataFragment OffsetIP RoutingInternet routing uses numeric IP addressTypical route uses several hopsMegTomISPOffice gateway121.42.33.12132.14.11.51SourceDestinationPacket121.42.33.12121.42.33.1132.14.11.51132.14.11.1IP Protocol Functions (Summary)RoutingIP host knows location of router (gateway)IP gateway must know route to other networksFragmentation and reassemblyIf max-packet-size less than the user-data-sizeError reportingICMP packet to source if packet is droppedUser Datagram ProtocolIP provides routingIP address gets datagram to a specific machineUDP separates traffic by portDestination port number gets UDP datagram to particular application process, e.g., 128.3.23.3, 53Source port number provides return addressMinimal guaranteesNo acknowledgmentNo flow controlNo message continuationUDPTransmission Control ProtocolConnection-oriented, preserves orderSender Break data into packetsAttach packet numbersReceiverAcknowledge receipt; lost packets are resentReassemble packets in correct orderTCPBook Mail each page Reassemble book19511 1Internet Control Message ProtocolProvides feedback about network operationError reportingReachability testingCongestion ControlExample message typesDestination unreachableTime-to-live exceededParameter problemRedirect to better gatewayEcho/echo reply - reachability testTimestamp request/reply - measure transit delayICMPBasic Security ProblemsNetwork packets pass by untrusted hostsEavesdropping, packet sniffing (e.g., “ngrep”)IP addresses are publicSmurfTCP connection requires stateSYN flooding attackTCP state can be easy to guessTCP spoofing attackPacket SniffingPromiscuous NIC reads all packetsRead all unencrypted data (e.g., “ngrep”)ftp, telnet send passwords in clear!Alice BobEveNetworkNetworkPrevention: Encryption, improved routing (Another lecture: IPSEC)Sweet Hall attack installed sniffer on local machineSmurf DoS AttackSend ping request to broadcast addr (ICMP Echo Req) Lots of responses:Every host on target network generates a ping reply (ICMP Echo Reply) to victimPing reply stream can overload victimPrevention: reject external packets to broadcast addressgatewayDoSSourceDoSTarget1 ICMP Echo ReqSrc: Dos TargetDest: brdct addr3 ICMP Echo ReplyDest: Dos TargetTCP HandshakeCSSYNCSYNS, ACKC+1ACKS+1ListeningStore dataWaitConnectedSYN FloodingCSSYNC1 ListeningStore dataSYNC2SYNC3SYNC4SYNC5SYN FloodingAttacker sends many connection requestsSpoofed source addresses Victim allocates resources for each requestConnection requests exist until timeoutFixed bound on half-open connectionsResources exhausted  requests rejectedProtection against SYN AttacksClient sends SYNServer responds to Client with SYN-ACK cookiesqn = f(src addr, src port, dest addr, dest port, rand)Normal TCP response but server does not save stateHonest client responds with ACK(sqn)Server checks response If matches SYN-ACK, establishes connection“rand” is top 5 bits of 32-bit time counterServer checks client response against recent valuesSee http://cr.yp.to/syncookies.html [Bernstein, Schenk]TCP Connection SpoofingEach TCP connection has an associated stateClient IP and port number; same for serverSequence numbers for client, server flowsProblemEasy to guess statePort numbers are standardSequence numbers often chosen in predictable wayIP Spoofing AttackA, B trusted connectionSend packets with predictable seq numbersE impersonates B to AOpens connection to A to get initial seq numberSYN-floods B’s queueSends packets to A that resemble B’s transmissionE cannot receive, but may execute commands on AServer ABEAttack can be blocked if E is outside firewall.TCP Sequence NumbersNeed high degree of unpredictabilityIf attacker knows initial seq # and amount of traffic sent, can estimate likely current valuesSend a flood of packets with likely seq numbersAttacker can inject packets into existing connectionSome implementations are vulnerableRecent DoS vulnerability


View Full Document

Stanford CS 155 - Network Protocols and Vulnerabilities

Documents in this Course
Lecture 5

Lecture 5

64 pages

Phishing

Phishing

31 pages

Load more
Download Network Protocols and Vulnerabilities
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Network Protocols and Vulnerabilities and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Network Protocols and Vulnerabilities 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?