10/26/05, W - Computer Science
Download
Report
Transcript 10/26/05, W - Computer Science
CS 5950/6030 Network Security
Class 24 (W, 10/26/05)
Leszek Lilien
Department of Computer Science
Western Michigan University
Based on Security in Computing. Third Edition by Pfleeger and Pfleeger.
Using some slides courtesy of:
Prof. Aaron Striegel — at U. of Notre Dame
Prof. Barbara Endicott-Popovsky and Prof. Deborah Frincke — at U. Washington
Prof. Jussipekka Leiwo — at Vrije Universiteit (Free U.), Amsterdam, The Netherlands
Slides not created by the above authors are © by Leszek T. Lilien, 2005
Requests to use original slides for non-profit purposes will be gladly granted upon a written request.
4. Protection in General-Purpose OSs
...
4.5. User Authentication
...
Class SKIPPING FOR NOW:
23
5. Designing Trusted OSs
6. Database Security
7. Security in Networks
7.1. Network Concepts
a) Introduction
b) The network
c) Media
d) Protocols—PART 1
2
To help you with your network security projects, we’re skipping
for now two chapters:
5. Designing Trusted OSs
6. Database Security
We’ll cover these chapters later.
3
7. Security in Networks
Network attacks are critical problems due to:
Widespread use of networks
Fast changes in network technology
We’ll discuss security issues in network
Design / Development / Usage
Outline
7.1. Network Concepts
7.2. Threats in Networks
7.3. Network Security Controls
7.4. Tools
7.4.1. Firewalls
7.4.2. Intrusion Detection Systems
7.4.3. Secure E-Mail
7.5. Conclusions
4
7.1. Network Concepts
Outline
a) Introduction
b) The network
c) Media
d) Protocols
e)
f)
g)
h)
i)
5
Types of networks
Topologies
Distributed systems
APIs
Advantages of computing networks
Media (3)
5) Infrared
Line-of-sight transmission
Convenient for portable devices
Typically used in protected space (an office)
6) Satellite
a. Geosynchronous orbit (incl. geostationary orbit over equator)
Speeding satellite seems to be fixed over a point on earth
22,240 miles (35,786 km) orbit, period: 1 day
For some communication apps, satellites are alternative to
intercontinental cables on the ocean bottom
Good for TV
Bad for telephones – Delay: earth-satellite-earth
b. Low earth orbit (LEO)
6
Seen from earth as moving satellites
~95 miles (150 km) above the earth, period: 90 minutes
Cover~660 miles (1000 km) radius
For full coverage require a satellite constellation
E.g., Iridium has 66 satellites
d. Protocols (1)
Media independence – we don’t care what media used for
Protocols provide abstract view of communications
communications
Protocol stack – layered protocol architecture
7
View in terms of users and data
The ‘how’ details are hiden
Each higher layer uses abstract view (what) provided by
lower layer (which hides the ‘how’ details)
Each lower layer encapsulates higher layer (in an
‘envelope’ consisting of header and/or trailer)
Two popular protocol stacks:
1) Open Systems Interconnection (OSI)
2) Transmission Control Protocol / Internet Protocol (TCP/IP)
Protocols (2)
1) ISO OSI Reference Model (ISO = Int’l Standards Organization)
OSI
Name
Activity
Layer
7
Application User-level messages
6
Presentation Standardized data appearance, blocking,
text compression
Sessions/logical connections among parts
5
Session
of an app; msg sequencing, recovery
4
Transport Flow control, end-to-end error detection &
correction, priority service
Routing, msg same-sized packets
3
Network
2
Data Link Reliable data delivery over physical
medium; transmission error recovery,
packets same-sized frames
Actual communication across physical
1
Physical
medium; transmits bits
8
Protocols (7)
OSI is a conceptual model — not actual implementation
9
Shows all activities required for communication
Would be to slow and inefficient with 7 layers
An example implementation: TCP/IP
End of Class 23
10
4. Protection in General-Purpose OSs
...
4.5. User Authentication
...
Class SKIPPING FOR NOW:
23
5. Designing Trusted OSs
6. Database Security
7. Security in Networks
7.1. Network Concepts—PART 1
a) Introduction
b) The network
c) Media
d) Protocols—PART 1
Class
24
11
d)
e)
f)
g)
h)
i)
Protocols—PART 2
Types of networks
Topologies
Distributed systems
APIs
Advantages of computing networks
Protocols (8)
2) Transmission Control Protocol/Internet Protocol (TCP/IP)
Invented for what eventually became Internet
Defined in terms of protocols not layers
but can be represented in terms of four layers:
Application layer
Host-to-host (e2e =end-to-end) transport layer
Internet layer
Physical layer
12
Actually not TCP/IP but:
TCP/IP/UDP (user datagram protocol)
Protocols (9)
TCP/IP vs. OSI
OSI
Name
Activity
Layer
7
Application User-level data
6
Presentation Standardized data appearance
5
Session
4
3
Transport
Internet
(Network)
Data Link
Physical
2
1
13
Logical connection among parts
Flow control
Routing
Reliable data delivery
Actual communication across physical
medium
[cf. B. Endicott-Popovsky and D. Frincke]
Protocols (10)
TCP/IP
Layer
Action
Application
Prepare messages
from user
interaction
Transport
Convert messages
to packets
Internet
Physical
14
Responsibilities
User interaction,
addressing
Sequencing of packets,
reliability (integrity), error
correction
Convert packets to Flow control, routing
datagrams
Transmit
Actual data
datagrams as
communication
individual bits
Protocols (11)
TCP packet includes:
Sequence nr
Acknowledgement nr connecting packets of a session
Flags
Source port nr
Destination port nr
Port – nr of a channel for communication for a particular
(type of) application running on a computer
Examples of port-application pairs:
23 – Telnet (remote terminal connection)
25 – SMTP (e-mail)
80 – HTTP (web pages)
161 – SNMP (network mngmt)
App has a waiting process monitoring its port
15
When port receives data, app performs service on it
Protocols (12)
UDP - user datagram protocol (connectionless)
Faster and smaller than TCP
No error checking/correction
8 bytes of control info (vs. 24 bytes for TCP)
Uses IP => actually UDP/IP
Applications use application-level protocols
- which, in turn, use TCP/IP or UDP/IP
Apps do not use TCP/IP or UDP/IP directly
Examples - cf. Table 7-3, p.379 (shows 4 protocol layers)
Examples of App Protocols using TCP/IP:
SMTP (e-mail) / HTTP (web pages) / FTP (file transfer) /
Telnet (remote terminal connection)
Examples of App Protocols using UDP/IP:
16
SNMP (network mngmt) / Syslog (entering log records) /
Time (synchronizing network device time)
Protocols (13)
Network addressing scheme
Address – unique identifier for a single point in the
network
WAN addressing must be more standardized than LAN
addressing
LAN addressing:
Each node has unique address
17
E.g. = address of its NIC (network interface card)
Network admin may choose arbitrary addresses
WAN addressing:
Most common: Internet addr. scheme – IP addresses
32 bits: four 8-bit groups
In decimal: g1.g2.g3.g4 wher gi [0, 255]
E.g.: 141.218.143.10
User-friendly representation
E.g.: cs.wmich.edu (for 141.218.143.10)
Protocols (14)
Parsing IP addresses
From right to left
Rightmost part, known as top-level domain
E.g., .com, .edu, .net, .org,. gov,
E.g., .us, .in, .pl
Top-level domain controlled by Internet Registrars
IRs also control 2nd-level domains (e.g., wmich in
wmich.edu)
IRs maintain tables of 2nd-level domains within
„their” top-level domains
18
Finding a service on Internet – e.g., cs.wmich.edu
Host looking for a service queries one of tables at IRs
for wmich.edu
Host finds numerical IP address for wmich.edu
Using this IP address, host queries wmich.edu to get
from its table numerical address for cs.wmich.edu
Protocols (15)
19
Dissemination of routing information
Each host knows all other hosts directly connected to it
Directly-connected => distance = 1 hop
Each host passes information about its directly
connected hosts to all its neighbors
Example – Fig. 7-2 p.366
System 1 (S1) informs S2 that S1 is 1 hop away from
Clients A, B, and C
S2 notifies S3 that S2 is 2 hops away from A, B, C
S3 notifes S2 that S3 is 1 hop away from D, E and S4
S2 notifies S1 that S2 is 2 hops away from D, E and
S4
Etc., etc.
e. Types of networks
LANs
WANs
Single control of the whole network
Covers wide area – even the whole globe
Physically exposed – use public communication media
Internetworks (Internets)
20
Small - < 100 users / within 3 km
Locally controlled – by a single organization
Physically protected – no public access to its nodes
Limited scope – supports a single group, dept, project, etc.
Internetwork = network of networks
A.k.a. internet (lower case „i”)
Most popular, largest internet: the Internet (upper case „I”!)
Internet Society controls (loosely) the Internet – basic rules
Internet is: federation / enormous / heterogeneous / exposed
f. Topologies
Topology can affect security
Topologies:
Common bus – Fig.7-11a
Convenient for LAN
All msgs accessible to every node
Star / Hub – Fig.7-11b
Central „traffic controller” (TC) node
TC can easily monitor all traffic
TC can defeat covert channels
All between source S and destination D on one of the 2 paths
between S and D
Msg read only by TC and destination
Unique path between any 2 nodes
Ring – Fig.7-11c
All msgs accessible to many node
21
No central control
Natural fault tolerance – 2 paths between any S-D pair
g. Distributed systems
Distributed system = system in which computation is
spread across ≥ 2 computers
Types of DS include:
Client-server systems
Clients request services from servers
22
Uses multiple, independent, physically separated
computers
Computers connected directly / via network
Peer-to-peer systems
Collection of equals – each is a client and a server
Note:
Servers usually protect themselves fr. hostile clients
Clients should also protect themselves – fr. rogue servers
h. APIs
API (Application Programming Interface) = definition of
interfaces to modules / systems
23
Facilitate component reuse
Facilitate using remote services
GSSAPI (Generic Security Services API) = template for
many kinds of security services that a routine could provide
Template independent of mechanisms, implementation,
etc.
Callers need credentials to use GSSAPI routines
CAPI (Cryptographic API) = Microsoft API for cryptographic
services
Independent of implementation, etc.
i. Advantages of computing networks
Networks advantages include:
Resource sharing
Workload distribution
„Natural” fault tolerance due to redundancy of most of network
resources
Easy expandability
24
Can shift workload to less occupied machines
Increased reliability
For efficient use of common resources
Afffordability of devices that individual users could not afford
Can add nodes easily
End of Class 23
25