DOC PREVIEW
CMU CS 15744 - Security and DoS

This preview shows page 1-2-3-22-23-24-45-46-47 out of 47 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

15-744: Computer NetworkingOverviewBasic IPRoutingSlide 5ICMPTCPSequence Number Guessing AttackSlide 9DNSSlide 11Denial of Service: What is it?TCP Reminder: 3-Way HandshakeExample DoS: TCP SYN FloodsPreventing SYN floodsSYN CookiesBandwidth FloodsReflector AttacksInferring DoS Activity: BackscatterBandwidth DOS Attacks - SolutionsSpoofing 1: Ingress/Egress FilteringSpoofing 2: RPF ChecksSecure Overlay ServicesSlide 25CapabilitiesUnforgeable CapabilitiesTVA (Capability)Fine-Grained CapabilitiesSlide 31Bounded Router StateBalancing Authorized TrafficShort, Slow or Asymmetric FlowsSlide 36Filters & PushbackThe Need for TracebackApproaches to TracebackIP TracebackSlide 41Edge SamplingLog-Based TracebackChallenges to LoggingSolution: Packet DigestingInvariant ContentBloom FiltersMistake Propagation is LimitedAdjusting Graph AccuracyHow long can digests last?15-744: Computer NetworkingL-22 Security and DoS2Overview•Security holes in IP stack•Denial of service•Capabilities•Traceback3Basic IP•End hosts create IP packets and routers process them purely based on destination address alone (not quite in reality)•Problem – End host may lie about other fields and not affect delivery•Source address – host may trick destination into believing that packet is from trusted source•Many applications use IP address as a simple authentication method•Solution – reverse path forwarding checks, better authentication•Fragmentation – can consume memory resources or otherwise trick destination/firewalls•Solution – disallow fragments4Routing•Source routing•Destinations are expected to reverse source route for replies•Problem – Can force packets to be routed through convenient monitoring point •Solution – Disallow source routing – doesn’t work well anyway!5Routing•Routing protocol•Malicious hosts may advertise routes into network•Problem – Bogus routes may enable host to monitor traffic or deny service to others•Solutions•Use policy mechanisms to only accept routes from or to certain networks/entities•In link state routing, can use something like source routing to force packets onto valid route•Routing registries and certificates6ICMP•Reports errors and other conditions from network to end hosts•End hosts take actions to respond to error•Problem•An entity can easily forge a variety of ICMP error messages•Redirect – informs end-hosts that it should be using different first hop route•Fragmentation – can confuse path MTU discovery•Destination unreachable – can cause transport connections to be dropped7TCP•Each TCP connection has an agreed upon/negotiated set of associated state•Starting sequence numbers, port numbers•Knowing these parameters is sometimes used to provide some sense of security•Problem•Easy to guess these values•Listening ports #’s are well known and connecting port #’s are typically allocated sequentially•Starting sequence number are chosen in predictable way•Solution – make sequence number selection more random8Sequence Number Guessing AttackAttacker  Victim: SYN(ISNx), SRC=Trusted HostVictim  Trusted Host: SYN(ISNs), ACK(ISNx)Attacker  Victim: ACK(ISNguess of s), SRC=Trusted HostAttacker  Victim: ACK(ISNguess of s), SRC=T, data = “rm -r /”•Attacker must also make sure that Trusted Host does not respond to SYNACK•Can repeat until guess is accurate9TCP•TCP senders assume that receivers behave in certain ways (e.g. when they send acks, etc.)•Congestion control is typically done on a “packet” basis while the rest of TCP is based on bytes•Problem – misbehaving receiver can trick sender into ignoring congestion control•Ack every byte in packet!•Send extra duplicate acks•Ack before the data is received (needs some application level retransmission – e.g. HTTP 1.1 range requests)•Solutions•Make congestion control byte oriented•Add nonces to packets – acks return nonce to truly indicate reception10DNS•Users/hosts typically trust the host-address mapping provided by DNS•Problems •Zone transfers can provide useful list of target hosts•Interception of requests or comprise of DNS servers can result in bogus responses•Solution – authenticated requests/responses11Overview•Security holes in IP stack•Denial of service•Capabilities•TracebackDenial of Service: What is it?•Crash victim (exploit software flaws)•Attempt to exhaust victim's resources•Network: Bandwidth•Host•Kernel: TCP connection state tables, etc.•Application: CPU, memory, etc.•Often high-rate attacks, but not always12Attacker VictimTCP Reminder: 3-Way Handshake13CSSYNCSYNS, ACKCACKSListeningCreate TCBWaitConnectedslide credit: FeamsterExample DoS: TCP SYN Floods•Each arriving SYN stores state at the server•TCP Control Block (TCB) •~ 280 bytes•FlowID, timer info, Sequence number, flow control status, out-of-band data, MSS, other options•Attack:•Send TCP SYN packets with bogus src addr•Half-open TCB entries exist until timeout•Kernel limits on # of TCBs•Resources exhausted  requests rejected14Preventing SYN floods•Principle 1: Minimize state before auth•(3 way handshake == auth)?•Compressed TCP state•Very tiny state representation for half-open conns•Don't create the full TCB•A few bytes per connection == can store 100,000s of half-open connections15SYN Cookies•Idea: Keep no state until auth.•In response to SYN send back self-validating token to source that source must attach to ACK •SYN  SYN/ACK+token  ACK+token•Validates that the receiver's IP is valid•How to do in SYN? sequence #s!•top 5 bits: time counter•next 3: Encode the MSS•bottom 24: F(client IP, port, server IP, port, t)?•Downside to this encoding: Loses options.16Bandwidth Floods•1990s: Brute force from a few machines•Pretty easy to stop: Filter the sources•Until they spoof their src addr!•Late 90s, early 00s: Traffic Amplifiers•Spoofed source addrs (next)?•Modern era: Botnets•Use a worm to compromise 1000s+ of machines•Often don't need to bother with spoofing17Reflector Attacks•Spoof source address•Send query to service•Response goes to victim•If response >> query, “amplifies” attack•Hides real attack source from victim•Amplifiers:•DNS responses (50 byte query  400 byte resp)?•ICMP to broadcast addr (1 pkt  50 pkts) (“smurf”)18Inferring DoS Activity: Backscatter19IP address spoofing creates


View Full Document

CMU CS 15744 - Security and DoS

Documents in this Course
Lecture

Lecture

25 pages

Lecture

Lecture

10 pages

Lecture

Lecture

10 pages

Lecture

Lecture

45 pages

Lecture

Lecture

48 pages

Lecture

Lecture

19 pages

Lecture

Lecture

97 pages

Lecture

Lecture

39 pages

Lecture

Lecture

49 pages

Lecture

Lecture

33 pages

Lecture

Lecture

21 pages

Lecture

Lecture

52 pages

Problem

Problem

9 pages

Lecture

Lecture

6 pages

03-BGP

03-BGP

13 pages

Lecture

Lecture

42 pages

lecture

lecture

54 pages

lecture

lecture

21 pages

Lecture

Lecture

18 pages

Lecture

Lecture

18 pages

Lecture

Lecture

58 pages

lecture

lecture

17 pages

lecture

lecture

46 pages

Lecture

Lecture

72 pages

Lecture

Lecture

44 pages

Lecture

Lecture

13 pages

Lecture

Lecture

22 pages

Lecture

Lecture

48 pages

lecture

lecture

73 pages

17-DNS

17-DNS

52 pages

Lecture

Lecture

10 pages

lecture

lecture

53 pages

lecture

lecture

51 pages

Wireless

Wireless

27 pages

lecture

lecture

14 pages

lecture

lecture

18 pages

Lecture

Lecture

16 pages

Lecture

Lecture

14 pages

lecture

lecture

16 pages

Lecture

Lecture

16 pages

Lecture

Lecture

37 pages

Lecture

Lecture

44 pages

Lecture

Lecture

11 pages

Lecture

Lecture

61 pages

Multicast

Multicast

61 pages

Lecture

Lecture

19 pages

Lecture

Lecture

8 pages

Lecture

Lecture

81 pages

Lecture

Lecture

9 pages

Lecture

Lecture

6 pages

Lecture

Lecture

63 pages

Lecture

Lecture

13 pages

Lecture

Lecture

63 pages

Lecture

Lecture

50 pages

lecture

lecture

35 pages

Lecture

Lecture

47 pages

Lecture

Lecture

29 pages

Lecture

Lecture

92 pages

Load more
Download Security and DoS
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Security and DoS and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security and DoS 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?