Network Protocols and Vulnerabilities - PowerPoint PPT Presentation

About This Presentation
Title:

Network Protocols and Vulnerabilities

Description:

Other queries may reuse some parts of lookup. NS records for domains ... Requests come with numeric source address. Use reverse DNS to find symbolic name ... – PowerPoint PPT presentation

Number of Views:369
Avg rating:3.0/5.0
Slides: 49
Provided by: johncmi4
Category:

less

Transcript and Presenter's Notes

Title: Network Protocols and Vulnerabilities


1
Network Protocols and Vulnerabilities
  • John Mitchell

2
Outline
  • Basic Networking (FMU)
  • Network attacks
  • Attack host networking protocols
  • SYN flooding, TCP Spoofing,
  • Attack network infrastructure
  • Routing
  • Domain Name System
  • This lecture is about the way things work now
    and how they are not perfect. Next lecture some
    security improvements (still not perfect).

3
Internet Infrastructure
Backbone
ISP
ISP
  • Local and interdomain routing
  • TCP/IP for routing, connections
  • BGP for routing announcements
  • Domain Name System
  • Find IP address

4
TCP Protocol Stack
Application protocol
Application
Application
TCP protocol
Transport
Transport
Network
IP
Network
IP protocol
IP protocol
Link
Network Access
Link
Data Link
Data Link
5
Data Formats
TCP Header
Application
Application message - data
message
Transport (TCP, UDP)
segment
TCP
data
TCP
data
TCP
data
Network (IP)
packet
data
TCP
IP
Link Layer
frame
data
TCP
IP
ETH
ETF
IP Header
Link (Ethernet) Header
Link (Ethernet) Trailer
6
Internet Protocol
IP
  • Connectionless
  • Unreliable
  • Best effort
  • Transfer datagram
  • Header
  • Data

7
IP Routing
Meg
Office gateway
Tom
121.42.33.12
132.14.11.1
ISP
132.14.11.51
121.42.33.1
  • Internet routing uses numeric IP address
  • Typical route uses several hops

8
IP Protocol Functions (Summary)
  • Routing
  • IP host knows location of router (gateway)
  • IP gateway must know route to other networks
  • Error reporting
  • IP reports discards to source
  • Fragmentation and reassembly
  • If packets smaller than the user data

9
User Datagram Protocol
UDP
  • IP provides routing
  • IP address gets datagram to a specific machine
  • UDP separates traffic by port
  • Destination port number gets UDP datagram to
    particular application process, e.g., 128.3.23.3,
    53
  • Source port number provides return address
  • Minimal guarantees ( mice and elephants)
  • No acknowledgment
  • No flow control
  • No message continuation

10
Transmission Control Protocol
TCP
  • Connection-oriented, preserves order
  • Sender
  • Break data into packets
  • Attach packet numbers
  • Receiver
  • Acknowledge receipt lost packets are resent
  • Reassemble packets in correct order

Book
Mail each page
Reassemble book
1
19
5
1
1
11
Internet Control Message Protocol
ICMP
  • Provides feedback about network operation
  • Error reporting
  • Reachability testing
  • Congestion Control
  • Example message types
  • Destination unreachable
  • Time exceeded
  • Parameter problem
  • Redirect to better gateway
  • Echo/echo reply - reachability test
  • Timestamp request/reply - measure transit delay

12
Basic Security Problems
  • Network packets pass by untrusted hosts
  • Eavesdropping, packet sniffing
  • IP addresses are public
  • Smurf
  • TCP connection requires state
  • SYN flooding attack
  • TCP state easy to guess
  • TCP spoofing attack

13
Packet Sniffing
  • Promiscuous NIC reads all packets
  • Read all unencrypted data
  • ftp, telnet send passwords in clear!

Eve
Network
Alice
Bob
Sweet Hall attack installed sniffer on local
machine
Prevention Encryption, improved routing (Next
lecture IPSEC)
14
Smurf Attack
  • Choose victim
  • Idea Flood victim with packets from many sources
  • Generate ping stream (ICMP Echo Req)
  • Network broadcast address with spoofed source IP
    set to victim
  • Wait for responses
  • Every host on target network will generate a ping
    reply (ICMP Echo Reply) to victim
  • Ping reply stream can overload victim

Prevention Turn off ping? Authenticated IP
addresses?
15
TCP Handshake
C
S
SYNC
Listening
Store data
SYNS, ACKC
Wait
ACKS
Connected
16
SYN Flooding
C
S
SYNC1
Listening
SYNC2
Store data
SYNC3
SYNC4
SYNC5
17
SYN Flooding
  • Attacker sends many connection requests
  • Spoofed source addresses
  • Victim allocates resources for each request
  • Connection requests exist until timeout
  • Fixed bound on half-open connections
  • Resources exhausted ? requests rejected

18
Protection against SYN Attacks
Bernstein, Schenk
  • Client sends SYN
  • Server responds to Client with SYN-ACK cookie
  • sqn f(src addr, src port, dest addr, dest port,
    rand)
  • Server does not save state
  • Honest client responds with ACK(sqn)
  • Server checks response
  • If matches SYN-ACK, establishes connection
  • See http//cr.yp.to/syncookies.html

19
Random Deletion
Half-open sessions
SYNC
171.64.82.03
232.61.28.05
168.44.14.21
121.49.16.22
132.24.14.28
  • If queue is full, delete random entry
  • Legitimate connections have chance to complete
  • Fake addresses eventually deleted
  • Easy to implement, some improvement

20
TCP Connection Spoofing
  • Each TCP connection has an associated state
  • Sequence number, port number
  • Problem
  • Easy to guess state
  • Port numbers are standard
  • Sequence numbers often chosen in predictable way

21
IP Spoofing Attack
  • A, B trusted connection
  • Send packets with predictable seq numbers
  • E impersonates B to A
  • Opens connection to A to get initial seq number
  • SYN-floods Bs queue
  • Sends packets to A that resemble Bs transmission
  • E cannot receive, but may execute commands on A

A
E
B
Attack can be blocked if E is outside firewall.
22
TCP Sequence Numbers
  • Need high degree of unpredictability
  • If attacker knows initial seq and amount of
    traffic sent, can estimate likely current values
  • Send a flood of packets with likely seq numbers
  • larger bandwidth gt larger flood possible
  • Reported to be safe from practical attacks
  • Cisco IOS, OpenBSD 2.8-current, FreeBSD
    4.3-RELEASE, AIX, HP/UX 11i, Linux Kernels after
    1996
  • Solaris 2.6 if strong seq numbers turned on
  • Set TCP_STRONG_ISS to 2 in /etc/default/inetinit.
  • HP/UX , IRIX 6.5.3, if so configured

23
Cryptographic protection
  • Solutions above the transport layer
  • Examples SSL and SSH
  • Protect against session hijacking and injected
    data
  • Do not protect against denial-of-service attacks
    caused by spoofed packets
  • Solutions at network layer
  • IPSec
  • Can protect against
  • session hijacking and injection of data
  • denial-of-service attacks using session resets

24
TCP Congestion Control
Source
Destination
  • If packets are lost, assume congestion
  • Reduce transmission rate by half, repeat
  • If loss stops, increase rate very slowly
  • Design assumes routers blindly obey this policy

25
Competition
Source A
Destination
Source B
Destination
  • Amiable Alice yields to boisterous Bob
  • Alice and Bob both experience packet loss
  • Alice backs off
  • Bob disobeys protocol, gets better results

26
TCP Attack on Congestion Control
  • Misbehaving receiver can trick sender into
    ignoring congestion control
  • Receiver duplicate ACK indicates gap
  • Packets within seq number range assumed lost
  • Sender executes fast retransmit algorithm
  • Malicious receiver can
  • Send duplicate ACK
  • ACK before data is received
  • needs some application level retransmission
    e.g. HTTP 1.1 range requests See RFC 2581
  • Solutions
  • Add nonces ACKs return nonce to prove reception

See Savage et al., TCP Congestion Control with
a Misbehaving Receiver
27
Routing Vulnerabilities
  • Source routing attack
  • Can direct response through compromised host
  • Routing Information Protocol (RIP)
  • Direct client traffic through compromised host
  • Exterior gateway protocols
  • Advertise false routes
  • Send traffic through compromised hosts

28
Source Routing Attacks
  • Attack
  • Destination host may use reverse of source route
    provided in TCP open request to return traffic
  • Modify the source address of a packet
  • Route traffic through machine controlled by
    attacker
  • Defenses
  • Gateway rejects external packets claiming to be
    local
  • Reject pre-authorized connections if source
    routing info present
  • Only accept source route if trusted gateways
    listed in source routing info

29
Routing Table Update Protocols
  • Interior Gateway Protocols IGPs
  • distance vector type - each gateway keeps track
    of its distance to all destinations
  • Gateway-to-Gateway GGP
  • Routing Information Protocol RIP
  • Exterior Gateway Protocol EGP
  • used for communication between different
    autonomous systems

30
Routing Information Protocol (RIP)
  • Attack
  • Intruder sends bogus routing information to a
    target and each of the gateways along the route
  • Impersonates an unused host
  • Diverts traffic for that host to the intruders
    machine
  • Impersonates a used host
  • All traffic to that host routed to the intruders
    machine
  • Intruder inspects packets resends to host w/
    source routing
  • Allows capturing of unencrypted passwords, data,
    etc

31
Routing Information Protocol (RIP)
  • Defense
  • Paranoid gateway
  • Filters packets based on source and/or
    destination addresses
  • Dont accept new routes to local networks
  • Interferes with fault-tolerance but detects
    intrusion attempts
  • Authenticate RIP packets
  • Difficult in a broadcast protocol
  • Only allows for authentication of prior sender

32
Interdomain Routing
earthlink.net
Stanford.edu
Exterior Gateway Protocol
Autonomous System
Interior Gateway Protocol
connected group of one or more Internet Protocol
prefixes under a single routing policy (aka
domain)
33
(No Transcript)
34
Transit and Peering
Peering
Peering
Transit
  • Transit ISP sells access
  • Peering reciprocal connectivity
  • BGP protocol routing announcements for both

35
BGP overview
  • Iterative path announcement
  • Path announcements grow from destination to
    source
  • Subject to policy (transit, peering)
  • Packets flow in reverse direction
  • Protocol specification
  • Announcements can be shortest path
  • Nodes allowed to use other policies
  • E.g., cold-potato routing by smaller peer
  • Not obligated to use path you announce

36
BGP example D. Wetherall
3
4
1
8
2
5
6
7
  • Transit 2 provides transit for 7
  • 7 reaches and is reached via 2
  • Peering 4 and 5 peer
  • exchange customer traffic

37
Issues
  • BGP convergence problems
  • Protocol allows policy flexibility
  • Some legal policies prevent convergence
  • Even shortest-path policy converges slowly
  • Incentive for dishonesty
  • ISP pays for some routes, others free
  • Security problems
  • Potential for disruptive attacks

38
Domain Name System
DNS
  • Hierarchical Name Space

root
edu
uk
com
net
org
ca
stanford
cmu
mit
ucb
wisc
cs
ece
www
39
DNS Root Name Servers
  • Root name servers
  • Local name servers contact root servers when they
    cannot resolve a name

40
DNS Lookup Example
root edu DNS server
www.cs.stanford.edu
www.cs.stanford.edu
NS stanford.edu
stanford.edu DNS server
Local DNS server
NS cs.stanford.edu
Client
wwwIPaddr
cs.stanford.edu DNS server
41
Caching
  • DNS responses are cached
  • Quick response for repeated translations
  • Other queries may reuse some parts of lookup
  • NS records for domains
  • DNS negative queries are cached
  • Dont have to repeat past mistakes
  • E.g. misspellings, search strings in resolv.conf
  • Cached data periodically times out
  • Lifetime (TTL) of data controlled by owner of
    data
  • TTL passed with every record

42
Subsequent Lookup Example
root edu DNS server
ftp.cs.stanford.edu
stanford.edu DNS server
Local DNS server
ftp.cs. stanford.edu
Client
ftpIPaddr
cs.stanford.edu DNS server
43
DNS Implementation Vulnerabilities
  • Reverse query buffer overrun in BIND Releases 4.9
    (4.9.7 prior) and Releases 8 (8.1.2 prior)
  • gain root access
  • abort DNS service
  • MS DNS for NT 4.0 (service pack 3 and prior)
  • crashes on chargen stream
  • telnet ntbox 19 telnet ntbox 53

44
Inherent DNS Vulnerabilities
  • Users/hosts typically trust the host-address
    mapping provided by DNS
  • Problems
  • Zone transfers can provide useful list of target
    hosts
  • Interception of requests or compromise of DNS
    servers can result in bogus responses
  • Solution authenticated requests/responses

45
Bellovin/Mockapetris Attack
  • Trust relationships use symbolic addresses
  • /etc/hosts.equiv contains friend.stanford.edu
  • Requests come with numeric source address
  • Use reverse DNS to find symbolic name
  • Decide access based on /etc/hosts.equiv,
  • Attack
  • Spoof reverse DNS to make host trust attacker

46
Reverse DNS
  • Given numeric IP address, find symbolic addr
  • To find 222.33.44.3,
  • Query 44.33.222.in-addr.arpa
  • Get list of symbolic addresses, e.g.,
  • 1 IN PTR server.small.com
  • 2 IN PTR boss.small.com
  • 3 IN PTR ws1.small.com
  • 4 IN PTR ws2.small.com

47
Attack
  • Gain control of DNS service for domain
  • Select target machine in domain
  • Find trust relationships
  • SNMP, finger can help find active sessions, etc.
  • Example target trusts host1
  • Connect
  • Attempt rlogin from compromised machine
  • Target contacts reverse DNS server with IP addr
  • Use modified reverse DNS to say addr is host1
  • Target allows rlogin

48
Defense against this attack
  • Double-check reverse DNS
  • Modify rlogind, rshd to query DNS server
  • See if symbolic addr maps to numeric addr
  • Use another service besides DNS
  • Network Information Service (NIS, or YP)
  • Only works if attacker cannot control NIS
  • Authenticate entries in DNS tables
  • Relies on some form of PKI?
  • Next lecture

49
Summary (I)
  • Eavesdropping
  • Encryption, improved routing (Next lecture
    IPSEC)
  • Smurf
  • Turn off ping? Authenticated IP addresses?
  • SYN Flooding
  • Cookies
  • Random deletion
  • IP spoofing
  • Use less predictable sequence numbers

50
Summary (II)
  • Source routing attacks
  • Additional info in packets, tighter control over
    routing
  • Interdomain routing
  • Authenticated routing announcements
  • Other issues
  • DNS attack
  • Double-check reverse DNS
  • Use another service besides DNS
  • Authenticate entries in DNS tables

51
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com