DOC PREVIEW
CMU CS 15744 - Lecture

This preview shows page 1-2-17-18-19-36-37 out of 37 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 37 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

15-744: Computer NetworkingSecurityOverviewBasic IPDenial of ServiceBandwidth DOS AttacksRoutingSlide 8ICMPTCPSequence Number Guessing AttackSlide 12DNSSlide 14FirewallsTypical Firewall TopologyTypes of FirewallsSlide 18Slide 19Slide 20Slide 21IP TracebackSlide 23Edge SamplingSlide 25Trusted IntermediariesKey Distribution Center (KDC)Slide 28KerberosSlide 30Slide 31Certification AuthoritiesSlide 33Certificate ContentsSecure Sockets Layer (SSL)SSL (continued)Next Lecture: QOS & IntServ15-744: Computer NetworkingL-17 SecurityL -17; 11-6-02© Srinivasan Seshan, 2002 2Security•Denial of service•IPSec•Firewalls•Assigned reading•[SWKA00] Practical Network Support for IP Traceback•[B89] Security Problems in the TCP/IP Protocol SuiteL -17; 11-6-02© Srinivasan Seshan, 2002 3Overview•Security holes•Firewalls•Denial of service traceback•AuthenticationL -17; 11-6-02© Srinivasan Seshan, 2002 4Basic IP•End hosts create IP packets and routers process them purely based on destination address alone (not quite in reality)•Problem – End host may lie about other fields and not affect delivery•Source address – host may trick destination into believing that packet is from trusted source•Many applications use IP address as a simple authentication method•Solution – reverse path forwarding checks, better authentication•Fragmentation – can consume memory resources or otherwise trick destination/firewalls•Solution – disallow fragmentsL -17; 11-6-02© Srinivasan Seshan, 2002 5Denial of Service•Objective of attack: make a service unusable, usually by overloading the server or network•Example: SYN flooding attack•Send SYN packets with bogus source address•Server responds with SYNACK keeps state about TCP half-open connection•Eventually server memory is exhausted with this state•Solution: SYN cookies – make the SYNACK contents purely a function of SYN contents, therefore, it can be recomputed on reception of next ACK•More recent attacks have used bandwidth floods•How do we stop these?L -17; 11-6-02© Srinivasan Seshan, 2002 6Bandwidth DOS Attacks•Possible solutions•Ingress filtering – examine packets to identify bogus source addresses•Link testing – how routers either explicitly identify which hops are involved in attack or use controlled flooding and a network map to perturb attack traffic•Logging – log packets at key routers and post-process to identify attacker’s path•ICMP traceback – sample occasional packets and copy path info into special ICMP messages•IP tracebackL -17; 11-6-02© Srinivasan Seshan, 2002 7Routing•Source routing•Destinations are expected to reverse source route for replies•Problem – Can force packets to be routed through convenient monitoring point •Solution – Disallow source routing – doesn’t work well anyway!L -17; 11-6-02© Srinivasan Seshan, 2002 8Routing•Routing protocol•Malicious hosts may advertise routes into network•Problem – Bogus routes may enable host to monitor traffic or deny service to others•Solutions•Use policy mechanisms to only accept routes from or to certain networks/entities•In link state routing, can use something like source routing to force packets onto valid route•Routing registries and certificatesL -17; 11-6-02© Srinivasan Seshan, 2002 9ICMP•Reports errors and other conditions from network to end hosts•End hosts take actions to respond to error•Problem•An entity can easily forge a variety of ICMP error messages•Redirect – informs end-hosts that it should be using different first hop route•Fragmentation – can confuse path MTU discovery•Destination unreachable – can cause transport connections to be droppedL -17; 11-6-02© Srinivasan Seshan, 2002 10TCP•Each TCP connection has an agreed upon/negotiated set of associated state•Starting sequence numbers, port numbers•Knowing these parameters is sometimes used to provide some sense of security•Problem•Easy to guess these values•Listening ports #’s are well known and connecting port #’s are typically allocated sequentially•Starting sequence number are chosen in predictable way•Solution – make sequence number selection more randomL -17; 11-6-02© Srinivasan Seshan, 2002 11Sequence Number Guessing AttackAttacker  Victim: SYN(ISNx), SRC=Trusted HostVictim  Trusted Host: SYN(ISNs), ACK(ISNx)Attacker  Victim: ACK(ISNguess of s), SRC=Trusted HostAttacker  Victim: ACK(ISNguess of s), SRC=T, data = “rm -r /”•Attacker must also make sure that Trusted Host does not respond to SYNACK•Can repeat until guess is accurateL -17; 11-6-02© Srinivasan Seshan, 2002 12TCP•TCP senders assume that receivers behave in certain ways (e.g. when they send acks, etc.)•Congestion control is typically done on a “packet” basis while the rest of TCP is based on bytes•Problem – misbehaving receiver can trick sender into ignoring congestion control•Ack every byte in packet!•Send extra duplicate acks•Ack before the data is received (needs some application level retransmission – e.g. HTTP 1.1 range requests)•Solutions•Make congestion control byte oriented•Add nonces to packets – acks return nonce to truly indicate receptionL -17; 11-6-02© Srinivasan Seshan, 2002 13DNS•Users/hosts typically trust the host-address mapping provided by DNS•Problems •Zone transfers can provide useful list of target hosts•Interception of requests or comprise of DNS servers can result in bogus responses•Solution – authenticated requests/responsesL -17; 11-6-02© Srinivasan Seshan, 2002 14Overview•Security holes•Firewalls•Denial of service traceback•AuthenticationL -17; 11-6-02© Srinivasan Seshan, 2002 15Firewalls•Basic problem – many network applications and protocols have security problems that are fixed over time•Difficult for users to keep up with changes and keep host secure•Solution•Administrators limit access to end hosts by using a firewall•Firewall and limited number of machines at site are kept up-to-date by administratorsL -17; 11-6-02© Srinivasan Seshan, 2002 16Typical Firewall TopologyIntranetDMZInternetFirewallFirewallWeb server, email server, web proxy, etcL -17; 11-6-02© Srinivasan Seshan, 2002 17Types of Firewalls•Proxy•End host connects to proxy and asks it to perform actions on its behalf•Policy determines if action is secure or insecure•Transport level relays (SOCKS)•Ask proxy to create, accept TCP (or


View Full Document

CMU CS 15744 - Lecture

Documents in this Course
Lecture

Lecture

25 pages

Lecture

Lecture

10 pages

Lecture

Lecture

10 pages

Lecture

Lecture

45 pages

Lecture

Lecture

48 pages

Lecture

Lecture

19 pages

Lecture

Lecture

97 pages

Lecture

Lecture

39 pages

Lecture

Lecture

49 pages

Lecture

Lecture

33 pages

Lecture

Lecture

21 pages

Lecture

Lecture

52 pages

Problem

Problem

9 pages

Lecture

Lecture

6 pages

03-BGP

03-BGP

13 pages

Lecture

Lecture

42 pages

lecture

lecture

54 pages

lecture

lecture

21 pages

Lecture

Lecture

18 pages

Lecture

Lecture

18 pages

Lecture

Lecture

58 pages

lecture

lecture

17 pages

lecture

lecture

46 pages

Lecture

Lecture

72 pages

Lecture

Lecture

44 pages

Lecture

Lecture

13 pages

Lecture

Lecture

22 pages

Lecture

Lecture

48 pages

lecture

lecture

73 pages

17-DNS

17-DNS

52 pages

Lecture

Lecture

10 pages

lecture

lecture

53 pages

lecture

lecture

51 pages

Wireless

Wireless

27 pages

lecture

lecture

14 pages

lecture

lecture

18 pages

Lecture

Lecture

16 pages

Lecture

Lecture

14 pages

lecture

lecture

16 pages

Lecture

Lecture

16 pages

Lecture

Lecture

44 pages

Lecture

Lecture

11 pages

Lecture

Lecture

61 pages

Multicast

Multicast

61 pages

Lecture

Lecture

19 pages

Lecture

Lecture

8 pages

Lecture

Lecture

81 pages

Lecture

Lecture

9 pages

Lecture

Lecture

6 pages

Lecture

Lecture

63 pages

Lecture

Lecture

13 pages

Lecture

Lecture

63 pages

Lecture

Lecture

50 pages

lecture

lecture

35 pages

Lecture

Lecture

47 pages

Lecture

Lecture

29 pages

Lecture

Lecture

92 pages

Load more
Download Lecture
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?