|
|
CSS 111 - Introduction to Information System Security
Chapter 6, Security Technology: Firewalls and VPNs; Chapter 7, Security Technology: Intrusion Detection and Prevention Systems, and other Security Tools
Objectives:
This lesson discusses several technology tools used to
secure networks. Objectives
important to this lesson:
- Identify different technologies in relation to network,
data,
and application security
- Access control, access control models
- Authentication
- Credentials
- Authentication models
- Identify types of firewall, intrusion detection, dial-up,
and networking analysis tools
- Identify types of encryption, cryptography, and
trap-and-trace technology.
Concepts:
Chapter 6
The text begins with the topic of access control.
This chapter uses what may be a familiar meaning, allowing,
restricting, and denying access to resources.
Before we begin, there is a distinction between authorization
and access you need to understand. Authorization is permission,
and access
is means. Authorization means we allow someone to do
something. Access means someone can get at an asset. Other than that, a
bit more vocabulary will help you
understand the first terms in the chapter:
- owner - A person responsible for the integrity and
security of an asset. This may be a management role instead of a
technical role.
- custodian
- A person who maintains the
security of a system, perhaps by adding
and removing access by user accounts. (This role is also called an administrator.)
- end user
- A person who uses the asset,
such as reading a file, opening a web page,
or printing some data from a database, but who is not allowed to change
access rights
to the asset. This concept is also called a subject in some texts.
- subjects (users or processes
acting for users) perform operations on objects
(assets)
- supplicant - the
text also users this word as a synonym for "requester"; it is not used
in common discussion unless you are a
rather pedantic member of the attendant
mathematical priesthood
Page 246 introduces three access
control methods. You should know something about each of them:
- Mandatory Access Control (MAC) - the most
restrictive model; the owner defines a security policy, the custodian
implements it, and the end users cannot change it; this may be
implemented by setting a security level for each asset and granting
authorization to users by assigning them to a level
- Nondiscretionary controls
come in two types
- Role
Based Access Control (RBAC) - access is granted to roles (groups)
defined on the systems, end users are assigned to roles so they can
access assets needed for their jobs; the text uses Windows
Server 2008 as an example of a system that can use this model
- Task Based Access Control (TBAC) - may
be the most complex model; rules can change which role
a user is assigned to, based on the task the user is performing,
changing the level of access the user has
- Discretionary Access Control (DAC) - least
restrictive model; subjects (end users) can own objects, and have total
control over them (like a SharePoint web server system); end users must
set and maintain security for their assets, which most people will do
badly; processes run by end users inherit their permission levels
The text tells us that users must first identify themselves to
a system, but identification
is pointless without authentication.
Identification is simply entering a user name. Authentication
is one of three key elements to security:
- authentication - confirmation of identity
- authorization -
granting permissions that are
linked to the user's account
- accounting,
accountability, auditing - tracking
what the user does
Most
security is based on one or more of three types of things: something
you have (like a key or an ID card), something you know
(like a PIN or a password), or something you are
(like a fingerprint).
When a person logs in from a standard workstation
in a normal environment, one level
of protection, like an ID and password pair, may be secure enough.
For a
situation
that is more vulnerable, like logging in from a remote location through
a public data network, two levels may be required,
such as a user name-password pair along with a one-time
password from a security device (that may require a PIN as
well). You see the layers? My password (something I know) is no good
unless I use the
one-time key from the device (something I have), which is no good
unless I know the PIN
that proves I am allowed to use the device (something else I have to
know). The
one-time password shown in the image on the right, by the way, is only
good for one minute. After that minute, a new six numeral code will be
generated.
The text abruptly jumps to the topic of firewalls, which we
are told may be classified three different ways:
- by their processing type
- by their evolutional generation
- by the way they are implemented (structure).
Firewalls by Processing
type:
1. Packet-filtering firewalls
Traffic on a network is broken into packets, smaller message units. Each
packet must hold at least two
addresses: that of the sender and that of the recipient. A packet-filtering
firewall will hold a database of rules that tell it what to do with
packets. Often the rules are based on the addresses mentioned above and
the protocol (network rules) the packet is being sent under. The rules
may include all three ideas, such as the three rules shown at the top
of page 253.
- The first rule says if the packet is from any address on
the 172.16.0.0 network (172.16.x.x) and being sent to any address on
the 10.10.0.0 network, using any protocol (Any), drop the packet
(Deny). The x characters are
used as wildcards
on some firewalls, as the text mentions later. Other firewalls might
use zeros instead, so you need to know the syntax for the firewall you
are configuring.
- The second rule says if the packet is from any address on
the 192.168.0.0 network (192.168.x.x) and being sent to the specific
address 10.10.10.25 (10.10.10.25), using the HTTP protocol (HTTP is
hypertext transfer protocol), let that packet through (Allow). This
tells me that 10.10.10.25 is the address of a web server on that
network, because HTTP is for web pages.
- The third rule says if the source address is specifically
192.168.0.1 (192.168.0.1) and the destination address is specifically
10.10.10.10, and the protocol is FTP (FTP is file transfer protocol),
then let the packet through (Allow).
Packet filtering firewalls come in three types.
- static - a system
administrator sets the rules for the
firewall
- dynamic - the
firewall sets some rules for itself, such as dropping packets from an
address that is sending many bad packets
- stateful - packets
sent by an attacker often are sent to a port that the attacker has
guessed is open; a stateful firewall denies packets sent to any port
unless a connection to that port has already been negotiated; this kind
of checking puts more processing overhead on the firewall
2. Application gateway firewalls
To understand this one and the next two, I have to explain the
ISO-OSI Network
Model. In fact, it will help you to understand all of these
processing
types. The ISO-Open Systems Interconnect networking model has seven
layers that describe what happens to a packet as it is prepared to be
sent out on a network, and what happens when that packet is received by
the machine that is meant to act on it.
Packets leaving a
device start at the top layer of the model (Application, layer 7) and
are processed down to stack to the bottom layer (Physical, layer 1).
Packets being received by a
device arrive at the Physical layer, and are handed off to each
successive layer until they are received by an application at layer 7.
The chart below shows the seven layers of the ISO-OSI model,
the firewall types associated with several layers, and a summary of the
many things that happen on each layer. Do you need to know all the
material in the third column? Not for this lesson, but eventually you
will.
So, what's an application gateway? The text tells us that a proxy server, discussed in the last
lesson, is an example of an application gateway. It acts as an intermediary between a requester and a more protected device. The text tells us
that it is probably dedicated
to one application, then confuses the issue by listing five protocols. The protocols listed
correspond to particular services on a network, whose functions live on
layer 7: FTP is for file service, Telnet is for remote sessions, HTTP is for web pages, SMTP is for mail service, and SNMP is for managing
a network. The proxy server can make the connection, and can examine
the data for allowable content. For example, a business may set up a
proxy server that runs an application to prevent staff from accessing
particular kinds of web sites, such as gambling, gaming, or sports
sites.
Firewall? |
Layer name
|
Topics & Methods |
application gateways live here
|
Application
(layer 7)
|
- Network Services
- File services
- Print services
- Message services
- Application services
- Database services
- Service Advertisement - how services become known
- Service Use - how services are obtained
|
Presentation
(layer 6)
|
- Translation - bit translation, byte translation,
character code translation, file translation
- Encryption - cipher, private key or public key
|
Session
(layer 5)
|
- Dialog Control - simplex, half-duplex and duplex
- Session Administration - connection establishment,
data transfer and connection release
|
circuit
gateways
live here |
Transport
(layer 4)
|
- Address/name Resolution
- Addressing
- Segment Development - breaking large messages into
segments,
combining small messages into segments
- Connection Services
|
packet
filtering
firewalls live here
|
Network
(layer 3)
|
- Addressing - network addresses. 2 methods:
- Switching - route creation for packets, messages and
circuits. 3 methods:
- Packet switching
- Message switching
- Circuit switching
- Route Discovery - finding a route. 2 methods:
- Distance vector
- Link-state
- Route Selection - choosing a route. 2 methods:
- Connection Services - flow control, error control and
packet sequence control. 3 methods:
- Network-layer flow control
- Error control
- Packet sequence control
|
MAC layer
firewalls
live here |
Data
link
(layer 2)
|
- MAC sublayer
- Logical Topology - 2 methods:
- Media Access - 3 methods:
- Contention
- Token Passing
- Polling
- Addressing - 1 method:
- Physical Device Address - the MAC address
- LLC sublayer
- Transmission Synchronization - 3 methods:
- Synchronous
- Asynchronous
- Isochronous
- Connection Services - 3 methods:
- Unacknowledged Connectionless
- Connection Oriented
- Acknowledged Connectionless
|
no
firewall lives here:
no addresses on this layer
|
Physical
(layer 1)
|
- Connection Type - 2 methods:
- Point-to-Point
- Multipoint
- Physical Topology - 5 methods:
- Bus
- Ring
- Star
- Mesh
- Cellular
- Digital Signaling - 2 methods:
- Current State
- State Transition
- Analog Signaling - 2 methods:
- Current State
- State Transition
- Bit Synchronization - 2 methods:
- Bandwidth Usage - 2 methods:
- Multiplexing - 3 methods:
- Frequency Division
- Time Division
- Statistical Time Division
|
3. Circuit gateways
According to our text, this firewall lives on the transport
layer, which is
associated with guaranteed delivery of packets, Other than that, the
explanation in the text is very unclear. The explanation at the PCStats
web site
is clearer. It explains that the function of the circuit gateway is
less analytical than the proxy server, but that it does serve as an
intermediary as well, making sure that only requested data is returned
to the requester. It will not examine the data for content.
4. MAC layer firewalls
The MAC sublayer of the ISO-OSI Data Link layer is concerned
with MAC addresses, the hard
coded addresses that are generally burned into network cards when they
are manufactured. This kind of firewall will check the MAC address of a
requester to determine whether the device
being used to make the connection is authorized to access the data in
question. This would be useful in situations where devices are placed
in lobbies for customers who are allowed to browse a catalog, but not
allowed to place orders that would affect inventory.
5. Hybrids - the fifth
processing firewall type combines features of the other four.
Firewalls by Generation type
- First generation - static packet filtering
- Second generation - application level
- Third generation - stateful inspection
- Fourth generation - dynamic packet filtering
- Fifth generation - examines packets at several layers
Firewalls by Structure
- Commercial appliances - runs on a custom operating system,
on a dedicated device
- Commercial systems - a software solution that runs on a
computer that may or may not be dedicated
- Small Office - Home Office appliances - device may actually
be a cable modem, or DSL modem, may also include router and WAP
services, may include intrusion protection
- Residential (consumer) software - typically a combination
of anti-virus, firewall, intrusion detection software; should be run on
all devices that connect to a home network
Note that none of the firewall solutions discussed will
protect a network from user error. You can still trigger an incident by
following a link to a malware site that is not forbidden, by running a
Trojan or a worm, or by any other action that a user is allowed to take.
Let's move ahead to page 268, where the text discusses some
advice for configuring firewalls.
- All traffic from the trusted network (our network) is
allowed out. Gee, I hope we aren't infected by another worm.
- Firewalls are not configurable from the public facing part
of the network. This makes sense: we should manage our best protection
devices from inside the network, to remove the possibility that a
hacker could modify the firewall's rules.
- Mail traffic sent by SMTP is sent to a mail gateway. Some
may be allowed, some denied, but all should be examined by a dedicated
device.
- All ICMP (ping) packets from outside our network should be
denied. This is not always done in practice. You should try to ping a
few public web serves to see if it works in our classroom.
- Telnet requests from the outside should be blocked. This
technology is not often used any more, but it is a potential hack that
could be used to control our servers.
- Public facing web servers should be in a DMZ, should use
the secure form of HTTP (HTTPS), and should block requests made on them
to contact our trusted network assets.
- Deny traffic that has not been authenticated.
The text discusses some rules that could be set on most
firewalls. It notes that a typical approach to firewall rules is to
decide what is allowed, write rules allowing those things, and then
deny everything else. An alternative is to write rules for everything
you want to deny, then allow everything else. Note that the examples on
page 276 show a rule database that contains a mixture of rules that
allow and deny packets, as is probably the most common approach. The
section on firewall rules is pretty extensive, and a bit beyond what we
want for this course, so we will continue to the next item.
Page 277 discusses content
filters,
which are typically used to prevent your users from accessing websites
that are deemed unacceptable by your organization. A company policy
that directs staff not to access such sites on company time, company
equipment, or company network would be a necessary first step. The text
mentions NetNanny and SurfControl, two name-brand products in the
field.
There are other products that do similar things, and most of them are
offered on a subscription basis. Your administrators download periodic
updates to your proxy servers on a regular basis, which will keep your
staff from accessing known sites that feature objectionable content. As
you might imagine, staff who conduct investigations of violations of
related policies would need to be able to access websites without
restriction.
The next section of this chapter discusses protecting your
network when users connect to your network by other means than your LAN
jacks. There is a good bit of discussion about connecting over a dial-up
connection, and the technologies that are used to support that, but
this is very dated. Is there anyone who would connect to a system by
plain old telephone service (POTS) when the Internet is available in so
many ways? For historical reference, it can't hurt to know this
material. Or if you should find yourself transported to a location with
phones, without Internet access, with
affordable telephone costs, and with the need to
connect to your home network, be aware of RADIUS, TACACS, and Diameter.
The section on Virtual Private Networks (page 282) is more
current. The text points out that a VPN is called that because it
provides a private connection even though it passes through a public
carrier. How? The text discusses three ways:
- trusted VPN - uses leased
data lines from a data vendor that are guaranteed to
be separate from the rest of their network; obviously this is expensive
and not an option if you do not trust the vendor
- secure VPN - uses security
technology and encryption to make your traffic
meaningless to eavesdroppers
- hybrid VPN - uses both
of the methods above, typically over several hops to the target network
(What's a hop? Every time our signals pass across another router,
that's a hop.)
The text describes more technology that is used in VPN
connections, but it is not necessary for the scope of this class.
Chapter 7
Chapter 7 begins with material about intrusion detection
and more security tools. The introduction to the chapter effectively
sets the mood for the topics: an employee has been discharged, he is
angry, and he is plotting revenge against the company. Has the company
applied enough security to guard against his attack?
The text has some definitions on page 293. Too many, actually.
Let's look at a few:
- intrusion - someone
tries to access or disrupt a system
- intrusion detection
- if a product only does detection, it
will notice an attempted or actual intrusion, and will probably tell
someone; a detection system does not take action against the intrusion
- intrusion reaction
- if a product reacts to intrusions, it
attempts to stop them, contain them, or minimize their effects
- intrusion prevention
- if a product acts to prevent
intrusion, it probably does detection as well; I am sometimes notified
by my security suite that an attempted intrusion has been detected and
stopped, which is what you want such a system to do
When you are researching products in this category, you should
be
careful to note what the product actually does. If it is marketed as an
intrusion detection system,
don't expect it to prevent or stop intrusions. As the text says, an intrusion detection and prevention system
(IDPS) would be preferable to a
system that only performed one of those functions.
The text asks the question "Why use an IDPS?" Well, which
would
you rather see on your screen, a message that says an attack has just
been stopped without damage,
or a (insert your favorite emblem of
disaster)? There are some reasons on page 295 that go a bit farther:
- If employees know about an IDPS, they may be less likely to
go postal on your network.
- Detection of events will tell you when your other layers of
security are not working.
- Dealing with probes that are used before an attack may
serve to present that "walled city" Sun Tzu wrote about.
- An IDPS keeps a log of events, which can be analyzed for
current threats and for trends.
As mentioned in another chapter, an IDPS may be installed on a
computer or a network appliance and allowed to
sniff all the packets
that pass by. This sort of network-based
IDPS may need to be duplicated in various parts of your network,
since it has to watch every packet that goes by, and it will not see
any packets that are not passed to the network segment it lives on.
The second major option for an IDPS is a host-based IDPS. This kind of system
can detect changes on the host where it is installed that do not depend
on network traffic. On the other hand, it needs to be installed on
every host you intend to protect. In a home network, this is not a
large burden, but in a commercial setting it can be a lot of work. A
convincing argument may be that the antivirus program provided as part
of your home contract with a cable provider probably includes this
feature. If you are installing Norton 360, for example, you are already
installing a system to watch for intrusions as well as to watch for
viruses.
Other security measures are discussed, starting on page 325.
You should be familiar with these terms, know what they do, and know
why you will probably not use
them:
- honeypot
- The
usual explanation of this metaphor is Winnie the Pooh getting stuck in
a jar of honey. The idea is to put a fake, attractive looking,
unprotected resource on your network that will attract the attention of
a hacker looking for assets to steal, destroy, or otherwise vandalize.
The honeypot system should include an IDPS element that notes the
intrusion and sets off alarms, but does not actually stop it. One of
the tricks here is that the honeypot system must be attractive: it must
look like a real asset ready to be attacked. Ideally, it should be
something that will take the attacker a significant amount of time to
exploit, so that your security staff have time to react.
- honeynet - A more
extensive collection of honeypots on a subnet may be called a honeynet.
- padded cell -
Another variation, this one is a honeypot that presents a challenge to
the hacker. In this regard, it is more credible to the hacker. If the
resource was real and valuable, why would it not be protected? Of
course, if it is too well protected, why should the attacker break into
the padded cell instead of one of your real assets?
- trap-and-trace -
Taking this concept to the next level, if we have detected an intruder,
why not figure out who and where the attacker is? Well, the reason not to do it is to avoid the cost of
the lawsuit that will follow.
The text discusses the ideas of entrapment and enticement that could be part of
lawsuits brought against your company, and which apply to all the items
in this list. Be aware of the concepts and accept the idea that you
will do better without most of this.
The text moves on to discuss tools that analyze networks on
page 328. We have already discussed intrusion detection and prevention
tools and firewalls. The authors suggest vulnerability scanners, log
analyzers (application log, security log,system log), and packet
sniffers. They describe preliminary processes that a would-be attacker
might use in gathering information about a target on pages 328 and 329.
Common early practices are examining web resources and using social
engineering. I have placed a pdf file on our BlackBoard site under week 4 that
discusses a social engineering competition. You should read this file
for ideas about closing gaps in your company's security.
The text discusses particular kinds of network tools useful to
people looking for vulnerabilities, starting on page 332.
- port scanners - The
text recommends Nmap. This sort of utility looks
for devices on a network, and scans them for open ports. In this case,
a port is not a physical thing waiting for a plug. It is a service
running on a computer that is identified by a number which stands for a
place in that computer's memory. A service of this sort may run at a
port whose number is commonly used (like 80 for HTTP, or 25 for SMTP)
or it may run at any port number specified by the person or process
that started it. A Wikipedia page with lots of port numbers and their
commonly associated services can
be seen here. If a port is open,
it can receive requests, and possibly commands from an attacker.
- firewall analysis tools
- The text explains one way that Nmap can be used to determine if a
machine is live beyond a firewall. It also discusses Firewalk and HPING, two other tools that can help
an attacker determine what a firewall is allowing to pass.
- operating system detection
tools - The only tool mentioned by the text is XProbe, which sends ICMP packets to
computers and checks their responses against a list of responses from
machines with known operating systems. Why do you want to know the OS of
a computer? To exploit known vulnerabilities or protect against such
exploits.
- vulnerability scanners
- The text recommends Nessus,
a free program that does everything we have discussed so far, as well
as having other features. It is effective for scanning a network that
is using over the counter software. To scan a network with custom or
in-house-developed software, it recommends a "fuzzy" scanner called SPIKE. It features a proxy server
that sounds like a good tool for a man in the middle attack, as well as
being a tool to test the stability of your own web servers and sites.
These are both active scanners, that send traffic into a network to
test it.
The text mentions two passive scanners, that only watch the traffic
that is already being sent through a network. The two products
mentioned are Passive Vulnerability
Scanner (PVS) and RNA.
- packet sniffers - A
more formal term is network protocol
analyzer. The text lists three products. Sniffer is one you have to buy, Snort is an open source product, and
Wireshark is
freeware. Take the authors' description of the legal requirements for using this
sort of software as a warning.
Do not use them unless all three of the tests on page 337
are met:
- You must be using this on a network your organization
owns.
- You must have been authorized by the network owners to do
this.
- You must be doing this with the knowledge and consent of
the content owners.
As you might imagine, it is rather difficult to pass all three of these
tests.
- wireless security tools-
In passing, the text informs you that the IEEE standard that applies
to wireless networking is 802.11.The text mentions several wireless
tools that were named as good choices in 2006. As I type this, it is
now 2014. Let's update the list for this year as an assignment.
The
chapter ends with a discussion of using biometric
authentication as a means of stopping intrusions. The text discusses
them for three pages, ending with the observation that many people do
not use these methods because of user confrontation and refusal to use
them. They are not 100% reliable, as the text explains.
|