29

Chap 1 Firewall & Internet Security Fundamentals

Embed Size (px)

DESCRIPTION

Firewall and Internet Security

Citation preview

Page 1: Chap 1 Firewall & Internet Security Fundamentals
Page 2: Chap 1 Firewall & Internet Security Fundamentals
Page 3: Chap 1 Firewall & Internet Security Fundamentals

What is a Firewall ? Firewall is simply a program or hardware device that filters the information Coming through the Internet Connection into your Private network or Computer System. Frequently used to prevent unauthorized internet users from accessing private networks connected to the Internet, especially Intranets. Basically, a firewall is a barrier to keep destructive forces away from your property. In fact, that's why its called a firewall. Its job is similar to a physical firewall that keeps fire from spreading from one area to the next.

Page 4: Chap 1 Firewall & Internet Security Fundamentals

Security Solutions can be generally broken down into two Categories : 1.Hardware Solutions 2.Software solutions

A firewall is not a “security solution"; instead it is a part of your security solution.

The firewall decides what is let in and what is let out.

This is done through your firewall rules, which are policy-defined.

Page 5: Chap 1 Firewall & Internet Security Fundamentals

TCP and IP were developed to connect a number different networks designed by different vendors into a network of networks (the "Internet"). It delivers a few basic services that everyone needs (file transfer, electronic mail, remote logon) across a very large number of client and server systems. IP - is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world. TCP - is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. Sockets - is a name given to the package of subroutines that provide access to TCP/IP on most systems.

Page 6: Chap 1 Firewall & Internet Security Fundamentals

The TCP uses port numbers to distinguish traffic destined to different applications.

The official well-known port assignments are documented in RFC 1700 .

The port assignments are made by the Internet Assigned Numbers Authority (IANA).

In general, a service uses the same port number with User Datagram Packet (UDP) as with TCP, although there are some exceptions.

The assigned ports were originally numbered from 0–255, but the numbers were later expanded to 0–1023.

Page 7: Chap 1 Firewall & Internet Security Fundamentals

Some of the most used well-known ports are:

TCP/UDP port 20: FTP (data) TCP/UDP port 21: FTP (control) TCP/UDP port23:Telnet TCP/UDP port 25: SMTP TCP/UDP port 53: DNS TCP/UDP port 67: BOOTP server TCP/UDP port 68: BOOTP client TCP/UDP port 69:TFTP TCP/UDP port 80: HTTP TCP/UDP port 88: Kerberos TCP/UDP port 110: POP3 TCP/UDP port 119: NNTP TCP/UDP port 137: NetBIOS name service TCP/UDP port 138: NetBIOS datagram service TCP/UDP port 139: NetBIOS session service TCP/UDP port 194: IRC TCP/UDP port 220: IMAPv3 TCP/UDP port 389: LDAP

Page 8: Chap 1 Firewall & Internet Security Fundamentals

Ports 1024–65,535 are called registered ports; these numbers are not controlled by IANA and can be used by user processes or applications. However, that does not mean that they, too, are not vulnerable to attack. For example, port 1433 is used by SQL, which might be of interest to hackers. Port scanning in itself does no harm to your network or system, but it provides hackers with information they can use to penetrate a network. Potential attackers use port scans in much the same way that a car thief might try the doors of parked vehicles to determine which ones are unlocked.

Page 9: Chap 1 Firewall & Internet Security Fundamentals

Half scans (also called half-open scans or FIN scans) attempt to avoid detection by sending only initial or final packets rather than establishing a connection.

A half scan starts the SYN/ACK process with a targeted computer but does not complete it.

Software that conducts half scans, such as Jakal, is called a stealth scanner.

Many port-scanning detectors are unable to detect half scans.

IP spoofing involves changing the packet headers of a message to indicate that it came from an IP address other than the true source.

The spoofed address is normally a trusted port, which allows a hacker to get a message through a firewall or router that would otherwise be filtered out. Modern firewalls protect against IP spoofing. Spoofing is used whenever it is beneficial for one machine to impersonate another.

It is often used in combination with one of the other types of attacks.

Page 10: Chap 1 Firewall & Internet Security Fundamentals

Spoofing is also used to hide the true IP address of the attacker in ping of death, teardrop, and other attacks. IP spoofing can be prevented using source address verification on your router, if it is supported.

TCP/IP supports source routing, which is a means to permit the sender of network data to route the packets through a specific point on the network. There are two types of source routing: Strict source routing The sender of the data can specify the exact route (rarely used).

Loose source record route (LSRR) The sender can specify certain routers (hops) through which the packet must pass. Source routing is used by network administrators to map the network or to troubleshoot routing and communications problems. It can also be used to force traffic through a route that will provide the best performance.

Page 11: Chap 1 Firewall & Internet Security Fundamentals

Synchronization request (SYN) attacks exploit the TCP three-way handshake, the process by which a communications session is established between two computers.

Because TCP (unlike UDP) is connection-oriented, a session, or direct one-to-one communication link, must be created prior to sending data.

The client computer initiates the communication with the server (the computer that

has the resources it wants to access).

Page 12: Chap 1 Firewall & Internet Security Fundamentals

The handshake includes the following steps: 1. The client machine sends a SYN segment. 2. The server sends an acknowledge (ACK) message and a SYN, which acknowledges the

client machine‘s request that was sent in Step 1 and sends the client a synchronization request of its own. The client and server machines must synchronize each other‘s sequence numbers.

3. The client sends an ACK back to the server, acknowledging the server‘s request for synchronization. When the two machines have acknowledged each other‘s requests, the handshake has been successfully completed and a connection is established between the two computers.

Page 13: Chap 1 Firewall & Internet Security Fundamentals

An effective attack on some Windows systems involving the transmission corrupted UDP packets to the DNS port (port 53) resulting in a system crash.

Similar to the Bonk attack except that the corrupted UDP packets are sent to multiple ports, not just port 53 (DNS).

The attacks we have discussed so far involve exploiting some feature or weakness of the TCP/IP protocols. Hackers can also exploit vulnerabilities of other common protocols, such as HTTP, DNS, Common Gateway Interface (CGI), and other common protocols.

Active-X controls, JavaScript, and VBScript can be used to add animations or applets to Web sites, or even to HTML e-mail messages, but hackers can exploit these to write controls or scripts that allow them to remotely plant viruses, access data, or change or delete files on the hard disks of unaware users who visit the page and run the script. Both Web browsers and e-mail client programs that support HTML mail are vulnerable.

Page 14: Chap 1 Firewall & Internet Security Fundamentals

System and software exploits allow hackers to take advantage of weaknesses of particular operating systems and applications (often called bugs). Like protocol exploits, they are used by intruders to gain unauthorized access to computers or networks or to crash or clog up the systems to deny service to others. Common ―bugs‖ can be categorized as follows: Buffer overflows Many common security holes are based on buffer overflow problems. Buffer overflows occur when the number of bytes or characters input exceeds the maximum number allowed by the programmer in writing the program. Unexpected input Programmers might not take steps to define what happens if invalid Input (input that doesn‘t match program specifications) is entered. Such input could cause the program to crash or open up a way into the system.

Page 15: Chap 1 Firewall & Internet Security Fundamentals

System configuration bugs These are not really ―bugs; rather, they are ways of configuring the operating system or software that leaves it vulnerable to penetration. Popular software such as Microsoft‘s Internet Information Server (IIS), Internet Explorer (MSIE), and Outlook Express (MSOE) are popular targets of hackers looking for software security holes that can be exploited. Major operating system and software vendors regularly release security patches to fix exploitable bugs. It is very important for network administrators to stay up to date in applying these fixes and/or service packs to ensure that their systems are as secure as possible. The ping flood or ICMP flood is a means of tying up a specific client machine. It is caused by an attacker sending a large number of ping packets (ICMP echo request packets) to the Winsock or dialler software. This action prevents the software from responding to server ping activity requests, which causes the server to eventually time out the connection.

Page 16: Chap 1 Firewall & Internet Security Fundamentals

A symptom of a ping flood is a huge amount of modem activity, as indicated by the modem lights. This attack is also referred to as a ping storm. The fragile attack is related to the ping storm. Using a spoofed IP address (which is the address of the targeted victim), an attacker sends ping packets to a subnet, causing all computers on the subnet to respond to the spoofed address and flood it with echo reply messages. Programs such as NetXray or other IP tracing software to record and display a log of the flood packets. Firewalls can be configured to block ping packets and prevent these attacks.

The Smurf attack is a form of brute force attack that uses the same method as the ping flood but that directs the flood of ICMP echo request packets at the network‘s router. The destination address of the ping packets is the broadcast address of the network, which causes the router to broadcast the packet to every computer on the network or segment. This can result in a very large amount of network traffic if there are many host computers, creating congestion that causes a denial of service to legitimate users.

Page 17: Chap 1 Firewall & Internet Security Fundamentals

The term scanner, in the context of network security, refers to a software

program that hackers use to remotely determine the TCP/UDP ports that are open on a given system and thus vulnerable to attack. Scanners are also used by administrators to detect vulnerabilities in their own systems in order to correct them before an intruder finds them. Network diagnostic tools such as the famous Security Administrator‘s Tool for Analyzing Networks (SATAN), a UNIX utility, include sophisticated port-scanning capabilities. A good scanning program can locate a target computer on the Internet (one that is vulnerable to attack), determine the TCP/IP services running on the machine, and probe those services for security weaknesses.

Page 18: Chap 1 Firewall & Internet Security Fundamentals

World Wide Web access (HTTP). Electronic mail (SMTP). File transfer (FTP). Remote terminal access (Telnet or preferably SSH). Hostname/address lookup (DNS): Users generally don't use this service directly, but it underlies the other four services by translating Internet hostnames to IP addresses and Vice Versa.

The primary application protocol that underlies the Web: it provides users access to the files that make up the Web. These files might be in many different formats (text, graphics, audio, video, etc.), but the format used to provide the links between files on the Web is the HyperText Markup Language (HTML).

Page 19: Chap 1 Firewall & Internet Security Fundamentals

Unfortunately, web browsers and servers are hard to secure. The usefulness of the Web is in large part based on its flexibility, but that flexibility makes control difficult. Just as it's easier to transfer and execute the right program from a web browser than from FTP, it's easier to transfer and execute a malicious one.

Simple Mail Transfer Protocol (SMTP) is the Internet standard protocol for sending and receiving electronic mail; mail going between servers on the Internet almost always uses SMTP, and outgoing mail from clients to servers often does. SMTP itself is not usually a security problem, but SMTP servers can be. A program that delivers mail to users often needs to be able to run as any user that might receive mail. This gives it broad power and makes it a tempting target for attackers. Mail servers, like other programs, have a trade-off between features and security.

Page 20: Chap 1 Firewall & Internet Security Fundamentals

A mail bomb is a means of overwhelming a mail server, causing it to stop functioning And thus denying service to users. This is a relatively simple form of attack, accomplished by sending a massive quantity of e-mail to a specific user or system. Programs available on hacking sites on the Internet allow a user to easily launch a mail bomb attack, automatically sending floods of e-mail to a specified address while protecting the attacker‘s identity. A variation on the mail bomb program automatically subscribes a targeted user to hundreds or thousands of high-volume Internet mailing lists, subsequently filling the user‘s mailbox and/or the mail server. Bombers call this attack list linking. Examples of these mail bomb : Unabomber, Extreme Mail, Avalanche, and Kaboom .

Page 21: Chap 1 Firewall & Internet Security Fundamentals

File Transfer Protocol (FTP) is the Internet standard protocol for file transfers. Most web browsers will support FTP as well as HTTP and will automatically use FTP to access locations with names that begin "ftp:", so many people use FTP without ever being aware of it.

Telnet is the standard for remote terminal access on the Internet. Telnet allows you to provide remote text access for your users from any Internet-connected site without making special arrangements. Telnet was once considered a fairly secure service because it requires users to authenticate themselves. Unfortunately, Telnet sends all of its information unencrypted, which makes it extremely vulnerable to sniffing and hijacking attacks. For this reason, Telnet is now considered one of the most dangerous services when used to access your site from remote systems. 1.SSH (Secure Shell) 2. An encrypted network connection (VPN),Telnet.

Page 22: Chap 1 Firewall & Internet Security Fundamentals

Domain Name System (DNS), which converts between hostnames and IP addresses. DNS allows each site to maintain information about its own hosts and to find the information for other sites. The main risk in providing DNS service is that you may give away more information than you intend.

In creating their policies, organizations take one of two basic approaches: that which is not expressly prohibited is allowed,or that which is not explicitly allowed is prohibited.

Users should also be instructed in the best ways to comply with the policies and what to do if they are unable to comply or if they observe a deliberate violation of the policies on the part of other users. If you involve users in the planning and policy-making stages, you will find it much easier to educate them and gain their support for the policies at the implementation and enforcement stages .

Page 23: Chap 1 Firewall & Internet Security Fundamentals

A good security policy addresses the following areas: Defines roles and responsibilities Defines acceptable use of the organization’s computing resources Serves as a foundation for more specific procedures and standards Defines data sensitivity classifications

Helps prevent security incidents by making clear management’s expectations for protecting information Provides guidance in the event of a security incident Specifies results of noncompliance

Page 24: Chap 1 Firewall & Internet Security Fundamentals
Page 25: Chap 1 Firewall & Internet Security Fundamentals

One security policy, Check Point can enforce the same policy on all firewall modules from a central management station. Otherwise, you will have to maintain a different policy for different locations. Although for business reasons this might be necessary, it can add a level of complexity to your environment that could decrease your overall effective security.

Page 26: Chap 1 Firewall & Internet Security Fundamentals

Introduction In this section, you should state the purpose of this policy. Guidelines In this section you should detail guidelines for choosing controls to meet the objectives of the policy. Standards In this section you should detail the standards for implementing and deploying the selected controls. Procedures In this section you should detail the procedures for maintaining the security solution, such as how often the logs should be reviewed and who is authorized to make changes. Deployment The purpose of the deployment section is to assign responsibilities and specific steps for the implementation of the policy. Enforcement Although many policies lack this component, all policies require a method for enforcement.

Page 27: Chap 1 Firewall & Internet Security Fundamentals

Modification or exceptions No policy is perfect, and the policy may require modifications or exceptions.

An effective security program includes regular vulnerability assessments and penetration testing as well as updates to your risk assessment when there are significant changes to the business or the technology. Things that have to be tested or checked include: Security policy compliance, including things like password strength System patch levels Services running on systems Custom applications, particularly public-facing Web applications New servers added to the network Active modems that accept incoming calls A multitude of tools, both freeware and commercial off-the-shelf tools, are available to perform security testing.

Page 28: Chap 1 Firewall & Internet Security Fundamentals

Some freeware tools Nmap (www.insecure.org/nmap/) Nmap is one of the most commonly used network and port scanning tools, used by hackers and security professionals alike. Nessus (www.nessus.org) Nessus is a powerful, flexible vulnerability-scanning tool that can test different target platforms for known holes. It consists of a server process that is controlled by a separate graphical user interface (GUI). Metasploit (http://www.metasploit.com/) Metasploit is a leading security testing framework helps verify vulnerabilities and manage security assessments.

Page 29: Chap 1 Firewall & Internet Security Fundamentals