37
OV 4 - 1 ght © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services Harden Internetwork Connection Devices Harden DNS and BIND Servers Harden Web Servers Harden File Transfer Protocol (FTP) Servers Harden Network News Transfer Protocol (NNTP) Servers Harden Email Servers Harden Conferencing and Messaging Servers

OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services Harden Internetwork Connection Devices

Embed Size (px)

Citation preview

Page 1: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 1Copyright © 2005 Element K Content LLC. All rights reserved.

Hardening Internetwork Devices and Services

Harden Internetwork Connection Devices Harden DNS and BIND Servers Harden Web Servers Harden File Transfer Protocol (FTP) Servers Harden Network News Transfer Protocol (NNTP) Servers Harden Email Servers Harden Conferencing and Messaging Servers

Page 2: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 2Copyright © 2005 Element K Content LLC. All rights reserved.

Internetwork Devices

SwitchesRouters Firewalls

Page 3: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 3Copyright © 2005 Element K Content LLC. All rights reserved.

Unnecessary Network Protocols

Transport protocols

NetBEUI

NWLink

AppleTalk

Service protocols

NNTP

FTP

Others

Page 4: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 4Copyright © 2005 Element K Content LLC. All rights reserved.

Firmware Updates

Page 5: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 5Copyright © 2005 Element K Content LLC. All rights reserved.

Internetwork Device Vulnerabilities

SNMP Telnet Router configuration Finger Small server IP filter Default ports IP source routing ICMP redirect RIP v1

Page 6: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 6Copyright © 2005 Element K Content LLC. All rights reserved.

A DMZ

DMZ

Web server

Page 7: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 7Copyright © 2005 Element K Content LLC. All rights reserved.

An Intranet

Employee handbook

Page 8: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 8Copyright © 2005 Element K Content LLC. All rights reserved.

An Extranet

Company A

Company C Company B

Page 9: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 9Copyright © 2005 Element K Content LLC. All rights reserved.

A VLAN

Point-to-pointconnection

Point-to-pointconnection

Point-to-pointconnection

Point-to-pointconnection

VLAN switch

Page 10: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 10Copyright © 2005 Element K Content LLC. All rights reserved.

NAT

192.168.12.100

NAT Server

192.168.12.20 192.168.12.30

24.96.83.120

Page 11: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 11Copyright © 2005 Element K Content LLC. All rights reserved.

Network Media Types

Coax

Twisted pair

Fiber-optic

Page 12: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 12Copyright © 2005 Element K Content LLC. All rights reserved.

Network Media Vulnerabilities

Coax vulnerabilities Twisted-pair vulnerabilities Fiber-optic vulnerabilities General vulnerabilities

Page 13: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 13Copyright © 2005 Element K Content LLC. All rights reserved.

Hardening Internetwork Devices

Protect the devices while maintaining connectivity Follow hardening guidelines Requirements will vary

Page 14: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 14Copyright © 2005 Element K Content LLC. All rights reserved.

DNS

everythingforcoffee.com

www.everythingforcoffee.com192.168.1.2

www.everythingforcoffee.com192.168.1.2

.com .org

Page 15: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 15Copyright © 2005 Element K Content LLC. All rights reserved.

DNS and BIND Vulnerabilities

Spoofing Hijacking Cache corruption Input validation Environment variables Zone transfers Rogue client registrations

Page 16: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 16Copyright © 2005 Element K Content LLC. All rights reserved.

Hardening DNS and BIND

Protect the zone information while maintaining

service availability Follow hardening guidelines Requirements will vary

Page 17: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 17Copyright © 2005 Element K Content LLC. All rights reserved.

HTTP

Web client Web server

Page 18: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 18Copyright © 2005 Element K Content LLC. All rights reserved.

Web Server Authentication

Web client Web server

Page 19: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 19Copyright © 2005 Element K Content LLC. All rights reserved.

Web Server Authentication Methods

Address-based Anonymous Basic Digest Integrated Certificates

Page 20: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 20Copyright © 2005 Element K Content LLC. All rights reserved.

Web Server Vulnerabilities

Format string Improper input validation CGI scripts Code outside web root Web server applications Weak authentication Clear text transmissions HTML source code Buffer overflows

Page 21: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 21Copyright © 2005 Element K Content LLC. All rights reserved.

Hardening Web Servers

Protect data and server while maintaining

website access Follow hardening guidelines Requirements will vary

Page 22: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 22Copyright © 2005 Element K Content LLC. All rights reserved.

FTP

FTP

FTP client

Page 23: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 23Copyright © 2005 Element K Content LLC. All rights reserved.

FTP Vulnerabilities

Basic authentication Anonymous and blind FTP Unnecessary services Clear text transmissions Firewall configuration “Glob” “Bounce” File sharing exploitation

Page 24: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 24Copyright © 2005 Element K Content LLC. All rights reserved.

SSH

PasswordPasswordPassword isencrypted

Password isencrypted

Session issecured

Session issecured

011001slogin

Page 25: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 25Copyright © 2005 Element K Content LLC. All rights reserved.

SFTP

SSH encryptionFTP client

Page 26: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 26Copyright © 2005 Element K Content LLC. All rights reserved.

Hardening FTP Servers

Protect the server and data while

maintaining service Follow hardening guidelines Requirements will vary

Page 27: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 27Copyright © 2005 Element K Content LLC. All rights reserved.

NNTP

Subscriber

Page 28: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 28Copyright © 2005 Element K Content LLC. All rights reserved.

NNTP Vulnerabilities

NNTP

Anonymous access Password privacy Data privacy Email integration

Page 29: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 29Copyright © 2005 Element K Content LLC. All rights reserved.

Hardening an NNTP Server

Prevent unauthorized postings and data

loss while maintaining service Follow hardening guidelines Requirements will vary

NNTP

Page 30: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 30Copyright © 2005 Element K Content LLC. All rights reserved.

SMTP

Email clientEmail server

Page 31: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 31Copyright © 2005 Element K Content LLC. All rights reserved.

Email Vulnerabilities

Email worms Malicious code 8.3 file names Data buffers Spam Hoaxes SMTP relays

Page 32: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 32Copyright © 2005 Element K Content LLC. All rights reserved.

PGP

Public email security Encrypt message contents and encrypt key Digital signing

Page 33: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 33Copyright © 2005 Element K Content LLC. All rights reserved.

S/MIME

Security for email attachments Various attachment file formats Encryption and digital signing

Page 34: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 34Copyright © 2005 Element K Content LLC. All rights reserved.

Hardening Email Servers

Protect server and mail data while

supporting email users Follow hardening guidelines Requirements will vary

Page 35: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 35Copyright © 2005 Element K Content LLC. All rights reserved.

Conferencing and Messaging Vulnerabilities

Sniffing Eavesdropping Privacy Social engineering

Page 36: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 36Copyright © 2005 Element K Content LLC. All rights reserved.

Hardening Conferencing and Messaging Servers

Protect server and data, prevent spoofing,

maintain service availability Follow hardening guidelines Requirements will vary

Page 37: OV 4 - 1 Copyright © 2005 Element K Content LLC. All rights reserved. Hardening Internetwork Devices and Services  Harden Internetwork Connection Devices

OV 4 - 37Copyright © 2005 Element K Content LLC. All rights reserved.

Reflective Questions

1. Which internetwork connection device do you think is most important to secure?

2. Which provides a greater security threat to your organization: your border router or your email infrastructure?