Guide to Operating System Security Chapter 6 Firewalls

  • Slides: 50
Download presentation
Guide to Operating System Security Chapter 6 Firewalls and Border Security

Guide to Operating System Security Chapter 6 Firewalls and Border Security

Objectives l l Understand how TCP, UDP, and IP work, and the security vulnerabilities

Objectives l l Understand how TCP, UDP, and IP work, and the security vulnerabilities of these protocols Explain the use of IP addressing on a network and how it is used for security Explain border and firewall security Configure the firewall capabilities in operating systems Guide to Operating System Security 2

Transmission Control Protocol/Internet Protocol l Networking protocol that serves as a universal language of

Transmission Control Protocol/Internet Protocol l Networking protocol that serves as a universal language of communication for networks and operating systems Ubiquity makes it a prime target for attackers Three core component protocols Transmission Control Protocol (TCP) u User Datagram Protocol (UDP) u Internet Protocol (IP) u Guide to Operating System Security 3

Understanding TCP l l Establishes reliable connection-oriented communications between communicating devices on networks Enables

Understanding TCP l l Establishes reliable connection-oriented communications between communicating devices on networks Enables communications to operate in an orderly fashion through use of sequence numbers and acknowledgments Guide to Operating System Security 4

Fields in a TCP Header Guide to Operating System Security 5

Fields in a TCP Header Guide to Operating System Security 5

TCP and UDP Ports in Relation to Port Scanning Guide to Operating System Security

TCP and UDP Ports in Relation to Port Scanning Guide to Operating System Security continued… 6

TCP and UDP Ports in Relation to Port Scanning (Continued) Guide to Operating System

TCP and UDP Ports in Relation to Port Scanning (Continued) Guide to Operating System Security 7

TCP and UDP Ports in Relation to Port Scanning (Continued) Guide to Operating System

TCP and UDP Ports in Relation to Port Scanning (Continued) Guide to Operating System Security 8

Understanding UDP l l l Connectionless protocol Can be used instead of TCP Faster

Understanding UDP l l l Connectionless protocol Can be used instead of TCP Faster communications when reliability is less of a concern Performs no flow control, sequencing, or acknowledgment Port-scanning attacks are less productive against it Guide to Operating System Security 9

Fields in a UDP Header Guide to Operating System Security 10

Fields in a UDP Header Guide to Operating System Security 10

Understanding How IP Works l l Enables packet to reach different subnetworks on a

Understanding How IP Works l l Enables packet to reach different subnetworks on a LAN and different networks on a WAN Networks must use transport methods compatible with TCP/IP Guide to Operating System Security 11

Basic Functions of IP l l l Data transfer Packet addressing Packet routing Fragmentation

Basic Functions of IP l l l Data transfer Packet addressing Packet routing Fragmentation Simple detection of packet errors Guide to Operating System Security 12

IP as a Connectionless Protocol l Provides network-to-network addressing and routing information Changes size

IP as a Connectionless Protocol l Provides network-to-network addressing and routing information Changes size of packets when size varies from network to network Leaves reliability of communications in hands of the embedded TCP segment Guide to Operating System Security 13

TCP/IP Datagram Guide to Operating System Security 14

TCP/IP Datagram Guide to Operating System Security 14

Fields in an IP Packet Header Guide to Operating System Security 15

Fields in an IP Packet Header Guide to Operating System Security 15

How IP Addressing Works l l Identifies a specific station and the network on

How IP Addressing Works l l Identifies a specific station and the network on which it resides Each IP address must be unique Uses dotted decimal addressing Enables use of network IDs and host IDs for locating networks and specific devices on the network Guide to Operating System Security 16

IP Address Classes l l Fives classes – Class A through Class E –

IP Address Classes l l Fives classes – Class A through Class E – each used with different type of network Reflect size of network and whether the packet is unicast or multicast Guide to Operating System Security 17

IP Address Classes Guide to Operating System Security 18

IP Address Classes Guide to Operating System Security 18

IP Address Classes (Continued) Guide to Operating System Security 19

IP Address Classes (Continued) Guide to Operating System Security 19

IP Address Classes (Continued) Guide to Operating System Security 20

IP Address Classes (Continued) Guide to Operating System Security 20

Using a Subnet Mask l l l Required by TCP/IP addresses Determine how portions

Using a Subnet Mask l l l Required by TCP/IP addresses Determine how portions of addresses on a network are divided into network ID and host ID Divide a network into subnetworks to control network traffic Guide to Operating System Security 21

Creating Subnetworks l l Subnet mask contains a subnet ID within network and host

Creating Subnetworks l l Subnet mask contains a subnet ID within network and host IDs Enables routing devices to ignore traditional class designations u u l Creates more options for segmenting networks through multiple subnets and additional network addresses Overcomes four-octet limitation in IPv 4 Newer way to ignore class designation u Classless interdomain routing (CIDR) Guide to Operating System Security 22

Border and Firewall Security l l Firewalls protect internal or private networks Firewall functions

Border and Firewall Security l l Firewalls protect internal or private networks Firewall functions Packet filtering u Network address translation u Working as application gateways or proxies u Guide to Operating System Security 23

Implementing Border Security Guide to Operating System Security 24

Implementing Border Security Guide to Operating System Security 24

Packet Filtering l l l Use characteristics of a packet Determines whether a packet

Packet Filtering l l l Use characteristics of a packet Determines whether a packet should be forwarded or blocked Techniques Stateless packet filtering u Stateful packet filtering u Guide to Operating System Security 25

Securing a Subnet with a Firewall Guide to Operating System Security 26

Securing a Subnet with a Firewall Guide to Operating System Security 26

Network Address Translation (NAT) l l Discourages attackers; all protected network addresses are seen

Network Address Translation (NAT) l l Discourages attackers; all protected network addresses are seen by outsiders as a single address Enables a network to use IP addresses on the internal network that are not formally registered for Internet use Guide to Operating System Security 27

Ways to Perform NAT Translation l l Dynamic translation (or IP masquerade) Static translation

Ways to Perform NAT Translation l l Dynamic translation (or IP masquerade) Static translation Network redundancy translation Load balancing Guide to Operating System Security 28

Proxy l l Computer located between a computer on an internal network and a

Proxy l l Computer located between a computer on an internal network and a computer on an external network Acts as a middleman to: Filter application-level communications u Perform caching u Create virtual circuits with clients for safer communications u Guide to Operating System Security 29

Proxy Configurations l l Application-level gateways Circuit-level gateways Guide to Operating System Security 30

Proxy Configurations l l Application-level gateways Circuit-level gateways Guide to Operating System Security 30

Proxy Firewall as an Application -Level Gateway Guide to Operating System Security 31

Proxy Firewall as an Application -Level Gateway Guide to Operating System Security 31

Proxy Firewall as a Circuit-Level Gateway Guide to Operating System Security 32

Proxy Firewall as a Circuit-Level Gateway Guide to Operating System Security 32

Using Routers for Border Security (Continued) l l Often used as firewalls because they

Using Routers for Border Security (Continued) l l Often used as firewalls because they can filter packets and protocols Forward packets and frames to networks using a decision-making process based on: Routing table data u Discovery of most efficient routes u Preprogrammed information u Guide to Operating System Security 33

Using Routers for Border Security (Continued) l Protocols used by routers in a local

Using Routers for Border Security (Continued) l Protocols used by routers in a local system u Routing Information Protocol (RIP) • u Uses only hop count as its metric Open Shortest Path First (OSPF) • • • Router sends only the link-state routing message Compact packet format Shared updated routing table information among routers Guide to Operating System Security 34

OSPF Border Areas Guide to Operating System Security 35

OSPF Border Areas Guide to Operating System Security 35

Using Firewall Capabilities in Operating Systems l Important when the computer: On which OS

Using Firewall Capabilities in Operating Systems l Important when the computer: On which OS is running is directly connected to the Internet u Is in a demilitarized zone (DMZ) u Guide to Operating System Security 36

Configuring a Firewall in Windows XP Professional l Enable Internet Connection Firewall (ICF) Monitors

Configuring a Firewall in Windows XP Professional l Enable Internet Connection Firewall (ICF) Monitors source and destination addresses that come in and go out of the computer via Internet u Maintains table of IP addresses allowed into OS u Discards communications from unauthorized IP addresses u Discourages port scanning via an Internet connection u Guide to Operating System Security 37

Configuring a Firewall in Windows XP Professional Guide to Operating System Security 38

Configuring a Firewall in Windows XP Professional Guide to Operating System Security 38

Configuring a Firewall in Windows Server 2003 l Enable ICF, enabling only those services

Configuring a Firewall in Windows Server 2003 l Enable ICF, enabling only those services that are needed on the server Guide to Operating System Security 39

Configuring a Firewall in Windows Server 2003 Guide to Operating System Security 40

Configuring a Firewall in Windows Server 2003 Guide to Operating System Security 40

Configuring NAT in Windows Server 2003 l Routing and Remote Access Services (RRAS) Remote

Configuring NAT in Windows Server 2003 l Routing and Remote Access Services (RRAS) Remote access (dial-up or VPN) u Network address translation (NAT) u Virtual Private Network (VPN) u Secure connection between two private networks u Custom configuration u Guide to Operating System Security 41

Configuring NAT in Windows Server 2003 Guide to Operating System Security 42

Configuring NAT in Windows Server 2003 Guide to Operating System Security 42

Configuring NAT in Windows Server 2003 Guide to Operating System Security 43

Configuring NAT in Windows Server 2003 Guide to Operating System Security 43

Configuring NAT in Windows 2000 Server l l l Set up Windows server as

Configuring NAT in Windows 2000 Server l l l Set up Windows server as an Internet connection server – with NAT – in Windows 2000 Server Routing and Remote Access tool Enables multiple computers to share a connection to an external network Provides address translation services for all computers that share the connection, thus protecting those computers Guide to Operating System Security 44

Configuring a Firewall in Red Hat Linux 9. x l l l Use Security

Configuring a Firewall in Red Hat Linux 9. x l l l Use Security Level Configuration tool (High, Medium, No Firewall) Customize firewall by designating trusted devices Allow or deny access to WWW (HTTP), FTP, SSH, DHCP, mail (SMTP), or Telnet Guide to Operating System Security 45

Configuring NAT and a Firewall Using IPTables (Red Hat Linux 9. x) l l

Configuring NAT and a Firewall Using IPTables (Red Hat Linux 9. x) l l Configure through a terminal window using iptables command Enables configuration of packet filter rules through use of tables u Set of rules (chain) is applied to packets containing specific information Guide to Operating System Security 46

Sample Iptables Parameters Guide to Operating System Security 47

Sample Iptables Parameters Guide to Operating System Security 47

Configuring NAT and a Firewall Using IPTables (Red Hat Linux 9. x) l l

Configuring NAT and a Firewall Using IPTables (Red Hat Linux 9. x) l l Make sure IPChains is turned off Start IPTables service and ensure that it starts automatically each time OS is booted Configure firewall to deny incoming, outgoing, and forwarded packets Make sure all configured options are saved and reused each time computer is booted Guide to Operating System Security 48

Configuring a Mac OS X Firewall l Use System Preferences via the Sharing icon

Configuring a Mac OS X Firewall l Use System Preferences via the Sharing icon Allow or deny network communications through TCP and UDP ports by turning specific services on or off Turn firewall on or off Guide to Operating System Security 49

Summary l l TCP, UDP, and IP protocols, their security vulnerabilities and how to

Summary l l TCP, UDP, and IP protocols, their security vulnerabilities and how to mitigate them IP addressing and how it can be used to thwart attacks How border and firewall security use characteristics of TCP, UDP, and IP to build more secure networks How to configure firewall capabilities of operating systems Guide to Operating System Security 50