network security i overview
play

Network Security I: Overview April 13, 2015 Lecture by: Kevin Chen - PowerPoint PPT Presentation

Network Security I: Overview April 13, 2015 Lecture by: Kevin Chen Slides credit: Vern Paxson, Dawn Song 1 network security 2 s T o d a y L e c t u r e Networking overview + security issues Keep in mind, networking is:


  1. Network Security I: Overview April 13, 2015 Lecture by: Kevin Chen Slides credit: Vern Paxson, Dawn Song 1

  2. network security 2

  3. ’ s T o d a y L e c t u r e • Networking overview + security issues Keep in mind, networking is: • Complex topic with many facets – We will omit concepts/details that are not very security- relevant – We’ll mainly look at IP, TCP, DNS and DHCP • Networking is full of abstractions – Goal is for you to develop apt mental models / analogies – ASK questions when things are unclear o (but we may skip if not ultimately relevant for security, or postpone if question itself is directly about security) 3

  4. N e t w o r k i n g O v e r v i e w 4

  5. K e y C o n c e p t # 1 : P r o t o c o l s • A protocol is an agreement on how to communicate • Includes syntax and semantics – How a communication is specified & structured o Format, order messages are sent and received – What a communication means o Actions taken when transmitting, receiving, or timer expires • E.g.: asking a question in lecture? 1.Raise your hand. 2.Wait to be called on. 3.Or: wait for speaker to pause and vocalize 4.If unrecognized (after timeout): vocalize w/ “excuse me” 5

  6. E x a mp l e : I P P a c k e t H e a d e r 4-bit 8-bit 4-bit 16-bit Total Length (Bytes) Header Type of Service Version Length (TOS) 3-bit 13-bit Fragment Offset 16-bit Identification Flags Header is like a letter envelope: 8-bit Time to 8-bit Protocol 16-bit Header Checksum contains all info Live (TTL) needed for delivery 32-bit Source IP Address 32-bit Destination IP Address Payload IP = Internet Protocol

  7. K e y C o n c e p t # 2 : D u mb N e t w o r k • Original Internet design: interior nodes (“routers”) have no knowledge* of ongoing connections going through them • Not : how you picture the telephone system works – Which internally tracks all of the active voice calls • Instead: the postal system! – Each Internet message (“packet”) self-contained – Interior “routers” look at destination address to forward – If you want smarts, build it “end-to-end” – Buys simplicity & robustness at the cost of shifting complexity into end systems * Today’s Internet is full of hacks that violate this 7

  8. K e y C o n c e p t # 3 : L a y e r i n g • Internet design is strongly partitioned into layers – Each layer relies on services provided by next layer below … – … and provides services to layer above it • Analogy: – Consider structure of an Code You Write application you’ve written Run-Time Library and the “services” each System Calls layer relies on / provides Magnetic Domains } Device Drivers Fully isolated Voltage Levels / from user programs 9

  9. “ P ” ) I n t e r n e t L a y e r i n g ( r o t o c o l S t a c k 7 Application 4 Transport 3 (Inter)Network 2 Link 1 Physical 10

  10. “ P ” ) I n t e r n e t L a y e r i n g ( r o t o c o l S t a c k } Implemented only at hosts, 7 Application not at interior routers 4 Transport (“dumb network”) 3 (Inter)Network 2 Link 1 Physical 11

  11. “ P ” ) I n t e r n e t L a y e r i n g ( r o t o c o l S t a c k 7 Application 4 Transport } 3 (Inter)Network 2 Link Implemented everywhere 1 Physical 12

  12. “ P ” ) I n t e r n e t L a y e r i n g ( r o t o c o l S t a c k 7 Application 4 Transport } 3 (Inter)Network ~Same for each Internet “hop” } 2 Link Different for each Internet “hop” 1 Physical 13

  13. H o p - B y - H o p v s . E n d - t o - E n d L a y e r s Host A communicates with Host D Host C Host D Host A Router 1 Router 2 Router 3 Router 5 Host B Host E Router 7 Router 6 Router 4 14

  14. H o p - B y - H o p v s . E n d - t o - E n d L a y e r s Host A communicates with Host D Host C Host D Host A E.g., Ethernet Router 1 Router 2 Router 3 E.g., Wi-Fi Router 5 Host B Host E Router 7 Router 6 Router 4 Different Physical & Link Layers (Layers 1 & 2) 15

  15. H o p - B y - H o p v s . E n d - t o - E n d L a y e r s Host A communicates with Host D Host C Host D Host A Router 1 Router 2 Router 3 Router 5 E.g., HTTP over TCP over IP Host B Host E Router 7 Router 6 Router 4 Same Network / Transport / Application Layers (3/4/7) (Routers ignore Transport & Application layers) 16

  16. Security Issues 17

  17. R e v i e w : G e n e r a l S e c u r i t y G o a l s : C I A • Confidentiality: No one can read our data / communication unless we – want them to • Integrity No one can manipulate our data / processing / – communication unless we want them to • Availability We can access our data / conduct our processing / use – our communication capabilities when we want to • Also: no additional traffic other than ours ... 18

  18. L a y e r 1 , 2 19

  19. L a y e r 1 : P h y s i c a l L a y e r 7 Application 4 Transport Encoding bits to send them over a single physical link 3 (Inter)Network e.g. patterns of 2 Link voltage levels / photon intensities / 1 Physical RF modulation 20

  20. L a y e r 2 : L i n k L a y e r Framing and transmission of a collection of bits into individual messages sent across a 7 Application single “subnetwork” (one physical technology) 4 Transport 3 (Inter)Network Might involve multiple physical 2 Link links (e.g., modern Ethernet) 1 Physical Often technology supports broadcast transmission ( every “node” connected to subnet receives) 21

  21. Layer 1,2 Threats 22

  22. P h y s i c a l / L i n k - L a y e r T h r e a t s : E a v e s d r o p p i n g • For subnets using broadcast technologies (e.g., WiFi, some types of Ethernet), get it for “free” – Each attached system ’s NIC (= Network Interface Card) can capture any communication on the subnet – Some handy tools for doing so o Wireshark (GUI for displaying 800+ protocols) o tcpdump / windump (low-level ASCII printout) • For any technology, routers (and internal “switches”) can look at / export traffic they forward • You can also “tap” a link – Insert a device to mirror physical signal – Or: just steal it! 24

  23. S t e a l i n g P h o t o n s 25

  24. 26

  25. P h y s i c a l / L i n k - L a y e r T h r e a t s : D i s r u p t i o n • With physical access to a subnetwork, attacker can Overwhelm its signaling – o E.g., jam WiFi’s RF Send messages that violate the Layer-2 – protocol’s rules o E.g., send messages > maximum allowed size, sever timing synchronization, ignore fairness rules • Routers & switches can simply “drop” traffic • There’s also the heavy-handed approach … 27

  26. 28

  27. P h y s i c a l / L i n k - L a y e r T h r e a t s : S p o o fj n g • With physical access to a subnetwork, attacker can create any message they like Termed spoofing – • May require root/administrator access to have full freedom • Particularly powerful when combined with eavesdropping Because attacker can understand exact state of – victim’s communication and craft their spoofed traffic to match it Spoofing w/o eavesdropping = blind spoofing – 29

  28. L a y e r 3 : T h e N e t w o r k L a y e r 30

  29. L a y e r 3 : ( I n t e r ) N e t w o r k L a y e r Bridges multiple “subnets” to provide end-to-end internet connectivity between nodes 7 Application • Provides global addressing 4 Transport Works across different link 3 (Inter)Network technologies 2 Link 1 Physical 31

  30. I P P a c k e t S t r u c t u r e 4-bit 8-bit 4-bit 16-bit Total Length (Bytes) Header Type of Service Version Length (TOS) 3-bit 16-bit Identification 13-bit Fragment Offset Flags 8-bit Time to 8-bit Protocol 16-bit Header Checksum Live (TTL) 32-bit Source IP Address 32-bit Destination IP Address Options (if any) Payload

  31. I P P a c k e t S t r u c t u r e 4-bit 8-bit 4-bit 16-bit Total Length (Bytes) Header Type of Service Version Length (TOS) 3-bit 16-bit Identification 13-bit Fragment Offset Flags 8-bit Time to 8-bit Protocol 16-bit Header Checksum Live (TTL) 32-bit Source IP Address 32-bit Destination IP Address Options (if any) Payload

  32. I P P a c k e t H e a d e r F i e l d s • Version number (4 bits) Indicates the version of the IP protocol – Necessary to know what other fields to expect – Typically “4” (for IPv4), and sometimes “6” (for IPv6) – • Header length (4 bits) Number of 32-bit words in the header – Typically “5” (for a 20-byte IPv4 header) – Can be more when IP options are used – • Type-of-Service (8 bits) Allow packets to be treated differently based on needs – E.g., low delay for audio, high bandwidth for bulk transfer – 34

Recommend


More recommend