32
TCP/IP Vulnerabilities

TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Embed Size (px)

Citation preview

Page 1: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

TCP/IP Vulnerabilities

Page 2: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

OutlineSecurity Vulnerabilities

Denial of Service

Worms

Countermeasures: Firewalls/IDS

Page 3: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Internet design goals1. Interconnection

2. Failure resilience

3. Multiple types of service

4. Variety of networks

5. Management of resources

6. Cost-effective

7. Low entry-cost

8. Accountability for resources

Where is security issues?

Page 4: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Why did they leave it out?Designed for simple connectivity

Network designed with implicit trustNo “bad” guys

Security may be provided at the edgeEncryptionAuthentication

Page 5: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Security VulnerabilitiesUnfortunately at every layer in the

protocol stack!

Network-layer attacks IP-level vulnerabilities Routing attacks

Transport-layer attacks TCP vulnerabilities

Application-layer attacks

Page 6: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Where do the problems come from?

Protocol-level vulnerabilities Implicit trust assumptions in design

Implementation vulnerabilitiesBoth on routers and end-hosts

Incomplete specificationsOften left to the imagination of programmers

Page 7: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

IP-level vulnerabilitiesIP addresses are provided by the source

Spoofing attacks

Use of IP address for authenticationRemote command (rsh, rlogin) allows remote login

without explicit password authentication

Some known exploited IPARP SpoofingFragmentation Traffic amplification

Page 8: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Routing attacksDivert traffic to malicious nodes

Black-hole attackEavesdropping

Routing attacksNo authenticationsAnnounce lower cost route in Distance-Vector

BGP vulnerabilitiesPrefix hijacking

Page 9: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

TCP-level attacksSYN-Flooding

Flood with incomplete connection to hold service resources

Session hijackSequence number guessingPretend to be a trusted host

Session TerminationForge packet to close a legitimate connection

Page 10: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Application VulnerabilitiesApplication Protocol Attack

SPAM

Phishing

etc.

Page 11: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

OutlineSecurity Vulnerabilities

Denial of Service

Worms

Countermeasures: Firewalls/IDS

Page 12: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Denial of ServiceMake a service unusable by overloading the

server or network

Disrupt service by taking down hostse.g., ping-of-death

Consume host-level resourcese.g., SYN-floods

Consume network resourcese.g., UDP/ICMP floods

Page 13: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

OutlineSecurity Vulnerabilities

Denial of Service

Worms

Countermeasures: Firewalls/IDS

Page 14: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Worm OverviewSelf-propagate through network

Typical Steps in Worm Propagation Probe host for vulnerable software Exploit the vulnerability Launches copy of itself on compromised host

Very fast spreading with short windows to react

Page 15: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

The Case of Code-Red 1212thth July 2001 : Code-Red Worm (CRv1) began July 2001 : Code-Red Worm (CRv1) began

1919thth July 2001 : Code-Red Worm (CRv2) began July 2001 : Code-Red Worm (CRv2) began 359,104 hosts were compromised in approximately 24 hours359,104 hosts were compromised in approximately 24 hours

The total number of inactive hosts over time The number of newly inactive hosts per minute

http://www.caida.org/analysis/security/code-red/coderedv2_analysis.xml

Worm growth: Slow-start, Exponential phase, Slow decay

Page 16: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Code Red Spreads (I)July 19, Midnight – 159 hosts infectedJuly 19, Midnight – 159 hosts infected

Page 17: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Code Red Spreads (II)July 19, 11:40 am – 4,920 hosts infectedJuly 19, 11:40 am – 4,920 hosts infected

Page 18: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Code Red Spreads (III)July 20, Midnight – 341,015 hosts infectedJuly 20, Midnight – 341,015 hosts infected

Page 19: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Animation of Code Red Spreads

Page 20: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Animation SQL Slammer Spreads

Page 21: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

OutlineSecurity, Vulnerabilities

Denial of Service

Worms

Countermeasures: Firewalls/IDS

Page 22: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Firewall A Firewall is a system or group of systems used to control A Firewall is a system or group of systems used to control

access between two networks using pre-configured rules or access between two networks using pre-configured rules or filtersfilters

Page 23: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

How to filter?What to filter based on?

Packet Header FieldsIP source and destination addressesApplication port numbersICMP message types/ Protocol options etc.

Packet contents (payloads)

Page 24: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Some examplesBlock all packets from outside except for SMTP

servers

Block all traffic to/from a list of domains

Ingress filteringDrop all packets from outside with addresses inside

the network

Egress filteringDrop all packets from inside with addresses outside

the network

Page 25: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Typical Firewall Configuration• Internal hosts can access DMZ

and Internet

• External hosts can access DMZ only, not Intranet

• DMZ hosts can access Internet only

• Advantages?

• If a service gets compromised in DMZ it cannot affect internal hosts

InternetInternet

IntranetIntranet

DMZDMZ

XX

Page 26: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Sample Firewall Rule

Dst Port

Alow

Allow

Yes

Any

> 1023

22

TCP22

TCP> 1023

ExtIntOutSSH-2

IntExtInSSH-1

Dst Addr

ProtoAck Set?

ActionSrc PortSrc Addr

DirRule

Allow SSH from external hosts to internal hostsTwo rules

Inbound and outboundHow to know a packet is for SSH?

Inbound: src-port>1023, dst-port=22Outbound: src-port=22, dst-port>1023Protocol=TCP

Ack Set?

SYN

SYN/ACK

ACK

Client Server

Page 27: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Intrusion Detection IDS is an automated system intended to detect IDS is an automated system intended to detect

computer intrusionscomputer intrusions

To identify, preferably in real-time, unauthorized To identify, preferably in real-time, unauthorized use, misuse, and abuse of computer systemuse, misuse, and abuse of computer system

Page 28: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Basic IDS Architecture

Detector

System

Countermeasure

Database

Configuration

Audits

Alarm

Action

Page 29: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Detection MethodMisuse DetectionMisuse Detection

Looking for the attempts to exploit known vulnerabilities or Looking for the attempts to exploit known vulnerabilities or attack patternsattack patterns

Typically low false alarmsTypically low false alarms Difficult to gather all attack signaturesDifficult to gather all attack signatures

Anomaly DetectionAnomaly Detection Observing a deviation of normal behavior of system or user to Observing a deviation of normal behavior of system or user to

detect intrusionsdetect intrusions Can detect a new or unseen vulnerabilities or attack patternsCan detect a new or unseen vulnerabilities or attack patterns Typically a lot of false alarmsTypically a lot of false alarms

Page 30: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Audit Source LocationHost/IDSHost/IDS HostHost HostHost

IDSIDS HostHost HostHost

Host based IDSHost based IDS

Network based IDSNetwork based IDS

Page 31: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Next Generation FirewallLayer 7 Content InspectionLayer 7 Content Inspection

Integration of Firewall/IDS Integration of Firewall/IDS

Page 32: TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

SummarySecurity vulnerabilities are real!

Protocol or implementation or bad specs Poor programming practices At all layers in protocol stack

DoS/DDoS Resource utilization

Worm Exponential spread Scanning strategies

Firewall/IDS Counter-measures to protect hosts Fail-open vs. Fail-close?