22
Gujarat Technological University Ahmedabad & C-dac, pune M.E (Electronics & Communication Engineering) In VLSI & Embedded System Design (sem- 1) En No-160930359011

security problems in the tcp/ip protocol suite

Embed Size (px)

Citation preview

Page 1: security problems in the tcp/ip protocol suite

Gujarat Technological UniversityAhmedabad

&C-dac, pune

M.E (Electronics & Communication Engineering)

InVLSI & Embedded System Design (sem-1)

En No-160930359011

Page 2: security problems in the tcp/ip protocol suite

Security Problems in theTCP/IP Protocol Suite

Presented by:Yash kotak

Page 3: security problems in the tcp/ip protocol suite

Agenda Introduction TCP Sequence Number Prediction Routing Authentication Server

Page 4: security problems in the tcp/ip protocol suite

Network Architecture/ OSI ModelGatewayRouter Router

TCP/IP Protocol Family

TELNET FTP SMTP DNSTCP UDP

IPNetworks

NetworkData linkPhysical

ApplicationPresentation

SessionTransportNetworkData linkPhysical

NetworkData linkPhysical

NetworkData linkPhysical

ApplicationPresentation

SessionTransportNetworkData linkPhysical

Page 5: security problems in the tcp/ip protocol suite

TCP Sequence Number PredictionSYN(ISNC)

SYN(ISNS), ACK(ISNC)

ACK(ISNS)

Client C Data Server S

SYN(ISNX), SRC=T

ACK(ISNS), SRC=T

Bad data, malicious commandAttacker X Server S

Trusted Client T

ACK(ISN X)

SYN(ISN S),

SRC(Service routing Certification)

Page 6: security problems in the tcp/ip protocol suite

Defense against Sequence Number Prediction

Increase the rate of change of ISN. Increase the granularity of the increase

More possible ISN’s in particular time period, low probability of successful prediction

Randomizing the increment Cryptographic algorithm for ISN generation Good logging and alert mechanism Excessive ping request Short-lived TCP connections Unusual Request to Send (RST) packets

Page 7: security problems in the tcp/ip protocol suite

Vulnerabilities

In a computer security vulnerability is a weakness which allows an attacker to reduce a system’s info. assurance . Vulnerability is the intersection of three elements

System susceptibility or flowAttacker access to the flowAttacker capability to exploit it.

Page 8: security problems in the tcp/ip protocol suite

Source Routing VulnerabilitiesAttacker X Secret C-S

Client C Server S

Attacker X Secret C-S

Client C Server S

Defense Reject external

packets (prevent outside attackers) Reject pre-authorized connections via source routing

S X X’

S X CC X S

C X S

S X C

Page 9: security problems in the tcp/ip protocol suite

RIP Vulnerabilities

A EI’m onehop from G

DB GF

CCool!!

Advertise bogus routing information Claim a route to a particular unused host

(impersonation) Claim a route to an active host to draw traffic

for inspection/alterationto itself

Compromise address-based authentication protocol

Page 10: security problems in the tcp/ip protocol suite

Defense against RIP attack Paranoid gateway to filter packets based on source/

destination address Check the routes before accepting them Authenticate RIP packet. Using public-key is

expensive when broadcasting Good log generation, notice anomaly

Page 11: security problems in the tcp/ip protocol suite

ICMP Vulnerabilities ICMP Redirect message from gateways to advise

better routes may be spoofed Denial of Service attack from spoofed Destination

unreachable, Time-to-live Exceeded, Subnet Mask Reply message

Defense Check to ensure that the message belongs to

particular connection Verify whether the replay message contains

reasonable sequence number Restrict route changes to particular connections Honor reply packets only at the appropriate time

Page 12: security problems in the tcp/ip protocol suite

Authentication Server Alternative to address-based authentication

Secure because of the second TCP connection

Various Risks:

Client host not secure Authentication message compromised Variant of TCP sequence number attack DoS Attack

Defense: More secure means of validation like Needham-algorithm

Shroeder

Page 13: security problems in the tcp/ip protocol suite

1] Finger Service

Used to find out information about users on remote systems

Eg.FINGER [email protected]

Loss of privacy and other issues on distributed systems

Useful information for password crackers

(Windows 2000 and Windows XP do not provide the finger service)

Page 14: security problems in the tcp/ip protocol suite

net standardstandard protocol,protocol, toto retrieveretrieve ee--mmailail fromfrom remoteremoteP/IPentication usingusing singlesingle commandcommand swordsandand passwordpassword intointo twotwo commandscommands

ange commandcommand transmittedtransmitted unencryptedunencrypted

1]1] POPPOP ApplicationApplication

layerlayer Intern centralcentral sservererver overover TTC

VulnerableVulnerable sincesince Auth

Solution:Solution: OneOne timetime pas

POP3POP3 splitssplits usernameusername

2]2] PCMAILPCMAIL SupportsSupports

passwordpassword ch

OldOld andand newnew passwordpassword

2] Electronic Mail

Solution: SSL,SSH,Kerberos

Page 15: security problems in the tcp/ip protocol suite

3] Domain Name System (DNS)

Maps host names to IP addresses eg. cse.psu.edu to 198.2.1.2

Vulnerabilities: Sequence number attack in resolver implementation Combined attack Spying- Zone transfer request (AXFR) ->includes error code for “refused”

Hesiod Name server

Recent attacks on DNS servers: PHARMING

4] File Transfer Protocol (FTP)

FTP Authentication

Anonymous FTP Some implementations require creation of partial replica of directory tree Truly anonymous

Which is cyber attack to redirect a web site’s traffic to another fake sites. Compromised DNS server are sometimes referred to as poisoned.

Page 16: security problems in the tcp/ip protocol suite

5] Simple Network Management Protocol (SNMP)

Aids in network management- used by network management systems to monitornetwork-attached devices for conditions that warrant administrative attention

Caveats of SNMP

6] Remote Booting:

Subvert boot process- A new kernel with altered protection mechanism can besubstituted

Two protocols used: RARP with TFTP- risky since relies on Ethernet BOOTP with TFTP- additional layer of security including 4 byte random transaction ID

Page 17: security problems in the tcp/ip protocol suite

Trivial Attacks

Vulnerability of Local Network

Eavesdropping Host-spoofing Denial of Service Attack- Broadcast storms

Trivial File Transfer protocol

File transfers without authentication

Reserved Ports

Berkeley derived TCPs and UDPs- Port=>privileged process

number < 1024

Neither TCP nor UDP contain any such concept

( unauthorized real time interception of private communication)(Host file hijacking Techniques )

Page 18: security problems in the tcp/ip protocol suite

Comprehensive Defenses (Broad Spectrum Defenses)

Authentication

Uses IP source address- can be spoofed Cryptographic authentication needed- Needham Shroeder Protocol Pre-authenticated connections can be implemented safely DNS provides ideal base for authentication systems

Trusted systems:

Questioning the extent to which Orange book and Red book criteria protect ahost from attacks.

Page 19: security problems in the tcp/ip protocol suite

•Encryption (implies authentication)

Link encryption End-to-End Encryption

Security within hosts

Data exposed in sending host Data encrypted in sending host

Data exposed in intermediate host Data encrypted in intermediate nodes

Role of User

Applied by sending host Applied by sending process

Invisible to user User applies encryption

Host maintains encryption User must find algorithm

One facility for all users User selects encryption

Typically done in hardware Either s/w or h/w implementation

All or no data encrypted User chooses to encrypt or no for data item

Implementation concerns

Requires one key per host pair Requires one key per user pair

Provides node authentication Provides user authentication

Page 20: security problems in the tcp/ip protocol suite

Conclusion:

Security flaws and attacks on TCP/IP protocol suite has been discussed

Protocol-specific as well as broad spectrum defenses have been suggested

Take Away:

TCP/IP has a number of security flaws which must be addressed

“Hosts in a network should not give out information gratuitously”

Page 21: security problems in the tcp/ip protocol suite

References

IEEE explore library Internet Data Comm. Network [Forouzan] TCP/IP Network [Forouzan]

Page 22: security problems in the tcp/ip protocol suite

THANK YOU