unit -5

52
UNIT -5 Password Management Firewall Design Principles.

Upload: papina

Post on 18-Feb-2016

60 views

Category:

Documents


0 download

DESCRIPTION

UNIT -5. Password Management Firewall Design Principles. Password Management. Password Protection. User ID and password: User authorized to gain access to the system Privileges accorded to the user Discretionary access control . Password Protection. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: UNIT -5

UNIT -5Password ManagementFirewall Design Principles.

Page 2: UNIT -5

2

NETWORK SECURITY By: Hom

era Durani

PASSWORD MANAGEMENT

Page 3: UNIT -5

3

NETWORK SECURITY By: Hom

era Durani

PASSWORD PROTECTIONUser ID and password: User authorized to gain access to the system Privileges accorded to the user Discretionary access control

Page 4: UNIT -5

4

NETWORK SECURITY By: Hom

era Durani

PASSWORD PROTECTION Unix system (user ID, cipher text password,

plain text salt) password 8 printable characters - 56-bit value (7-

bit ASCII) encryption routine (crypt(3)) based on DES modified DES algorithm with 12-bit salt value

(related to time of password assignment) 25 encryptions with 64-bit block of zeros input 64-bit - 11 character sequence

Page 5: UNIT -5

5

NETWORK SECURITY By: Hom

era Durani

LOADING A NEW PASSWORD

Page 6: UNIT -5

6

NETWORK SECURITY By: Hom

era Durani

PASSWORD PROTECTIONPurposes of salt: Prevents duplicate passwords from being

visible Effectively increases password length without

the user needing to remember additional 2 characters (possible passwords increased by 4096)

Prevent use of hardware DES implementation for a brute-force guessing attack

Page 7: UNIT -5

7

NETWORK SECURITY By: Hom

era Durani

OBSERVED PASSWORD LENGTHSIN A PURDUE STUDY

Page 8: UNIT -5

8

NETWORK SECURITY By: Hom

era Durani

PASSWORDS CRACKED FROM A SAMPLE SET

easy pickin’s

Page 9: UNIT -5

9

NETWORK SECURITY By: Hom

era Durani

ACCESS CONTROLOne Method: Deny access to password file Systems susceptible to unanticipated break-ins An accident in protection may render the password

file readable compromising all accounts Users have accounts in other protection domains

using the same passwords

Page 10: UNIT -5

10

NETWORK SECURITY By: Hom

era Durani

ACCESS CONTROL Answer:

Force users to select passwords that are difficult to guess

Goal: Eliminate guessable passwords while allowing the user to select a password that is memorable

Page 11: UNIT -5

11

NETWORK SECURITY By: Hom

era Durani

PASSWORD SELECTION STRATEGIES(BASIC TECHNIQUES) User education

Users may ignore the guidelines

Computer-generated passwords Poor acceptance by users Difficult to remember passwords

Page 12: UNIT -5

12

NETWORK SECURITY By: Hom

era Durani

PASSWORD SELECTION STRATEGIES Reactive password checking

System runs its own password cracker Resource intensive Existing passwords remain vulnerable until

reactive checker finds them Proactive password checking

Password selection is guided by the systemStrike a balance between user accessibility and

strength May provide guidance to password crackers (what

not to try) Dictionary of bad passwords (space and time

problem)

Page 13: UNIT -5

13

NETWORK SECURITY By: Hom

era Durani

PROACTIVE PASSWORD CHECKERThere are two techniques currently in use:

Markov Model – search for guessable password

Bloom Filter – search in password dictionary

Page 14: UNIT -5

14

NETWORK SECURITY By: Hom

era Durani

MARKOV MODELProbability that b follows a

M = {states, alphabet, prob, order}

Page 15: UNIT -5

15

NETWORK SECURITY By: Hom

era Durani

MARKOV MODEL “Is this a bad password?”…same as… “Was this password generated by this Markov

model?” Passwords that are likely to be generated by

the model are rejected Good results for a second-order model

Page 16: UNIT -5

16

NETWORK SECURITY By: Hom

era Durani

BLOOM FILTERA probabilistic algorithm to quickly test membership in a large set using multiple hash functions into a single array of bitsDeveloped in 1970 but not used for about 25 yearsUsed to find words in a dictionary also used for web cachingSmall probability of false positives which can be reduced for different values of k, # hash funcs

Page 17: UNIT -5

NETWORK SECURITY By: Homera Durani

17

BLOOM FILTER A vector v of N bits k independent hash

functions. Range 0 to N-1 For each element x,

compute hash functions H1(x), H2(x)…Hk(x)

Set corresponding bits to 1

Note: A bit in the resulting vector may be set to 1 multiple times

H1(x)=P1

H2(x)=P2

H3(x)=P3

H4(x)=P4

Element: x11

1

1

N bits

Bit Vector: v

Page 18: UNIT -5

18

NETWORK SECURITY By: Hom

era Durani

BLOOM FILTER To query for existence of an entry x,

compute H1(x), H2(x)…Hk(x) and check if the bits at the corresponding locations are 1

If not, x is definitely not a member Otherwise there may be a false positive

(passwords not in the dictionary but that produce a match in the hash table). The probability of a false positive can be reduced by choosing k and N

Page 19: UNIT -5

19

NETWORK SECURITY By: Hom

era Durani

PERFORMANCE OF BLOOM FILTER

Dictionary of 1 millionwords with 0.01 probabilityof rejecting a password

We need a hash table of9.6 X 106 bits

Page 20: UNIT -5

NETWORK SECURITY By: Hom

era Durani

20

FIREWALL

Page 21: UNIT -5

21

NETWORK SECURITY By: Hom

era Durani

OUTLINE Firewall Design Principles

Firewall Characteristics Types of Firewalls Firewall Configurations

Page 22: UNIT -5

22

NETWORK SECURITY By: Hom

era Durani

FIREWALLS

Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet

Page 23: UNIT -5

23

NETWORK SECURITY By: Hom

era Durani

FIREWALL DESIGNPRINCIPLES

Information systems undergo a steady evolution (from small LAN`s to Internet connectivity)

Strong security features for all workstations and servers not established

Page 24: UNIT -5

24

NETWORK SECURITY By: Hom

era Durani

FIREWALL DESIGNPRINCIPLES

The firewall is inserted between the premises network and the Internet

Aims: Establish a controlled link Protect the premises network from Internet-

based attacks Provide a single choke point

Page 25: UNIT -5

25

NETWORK SECURITY By: Hom

era Durani

FIREWALL CHARACTERISTICS

Design goals: All traffic from inside to outside must pass

through the firewall (physically blocking all access to the local network except via the firewall)

Only authorized traffic (defined by the local security police) will be allowed to pass

Page 26: UNIT -5

26

NETWORK SECURITY By: Hom

era Durani

FIREWALL CHARACTERISTICS

Design goals: The firewall itself is immune to penetration (use

of trusted system with a secure operating system)

Page 27: UNIT -5

27

NETWORK SECURITY By: Hom

era Durani

FIREWALL CHARACTERISTICS

Four general techniques: Service control

Determines the types of Internet services that can be accessed, inbound or outbound

Direction control Determines the direction in which particular

service requests are allowed to flow

Page 28: UNIT -5

28

NETWORK SECURITY By: Hom

era Durani

FIREWALL CHARACTERISTICS

User control Controls access to a service according to which

user is attempting to access it Behavior control

Controls how particular services are used (e.g. filter e-mail)

Page 29: UNIT -5

29

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Three common types of Firewalls: Packet-filtering routers Application-level gateways Circuit-level gateways (Bastion host)

Page 30: UNIT -5

30

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Packet-filtering Router

Page 31: UNIT -5

31

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Packet-filtering Router Applies a set of rules to each incoming IP packet

and then forwards or discards the packet Filter packets going in both directions The packet filter is typically set up as a list of

rules based on matches to fields in the IP or TCP header

Two default policies (discard or forward)

Page 32: UNIT -5

32

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Advantages: Simplicity Transparency to users High speed

Disadvantages: Difficulty of setting up packet filter rules Lack of Authentication

Page 33: UNIT -5

33

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Possible attacks and appropriate countermeasures IP address spoofing Source routing attacks Tiny fragment attacks

Page 34: UNIT -5

34

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Application-level Gateway

Page 35: UNIT -5

35

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Application-level Gateway Also called proxy server Acts as a relay of application-level traffic

Page 36: UNIT -5

36

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Advantages: Higher security than packet filters Only need to scrutinize a few allowable

applications Easy to log and audit all incoming traffic

Disadvantages: Additional processing overhead on each

connection (gateway as splice point)

Page 37: UNIT -5

37

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Circuit-level Gateway

Page 38: UNIT -5

38

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Circuit-level Gateway Stand-alone system or Specialized function performed by an

Application-level Gateway Sets up two TCP connections The gateway typically relays TCP segments from

one connection to the other without examining the contents

Page 39: UNIT -5

39

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Circuit-level Gateway The security function consists of determining

which connections will be allowed Typically use is a situation in which the system

administrator trusts the internal users An example is the SOCKS package

Page 40: UNIT -5

40

NETWORK SECURITY By: Hom

era Durani

TYPES OF FIREWALLS

Bastion Host A system identified by the firewall administrator

as a critical strong point in the network´s security

The bastion host serves as a platform for an application-level or circuit-level gateway

Page 41: UNIT -5

41

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible

Three common configurations

Page 42: UNIT -5

42

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Screened host firewall system (single-homed bastion host)

Page 43: UNIT -5

43

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Screened host firewall, single-homed bastion configuration

Firewall consists of two systems: A packet-filtering router A bastion host

Page 44: UNIT -5

44

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Configuration for the packet-filtering router: Only packets from and to the bastion host are

allowed to pass through the router The bastion host performs authentication and

proxy functions

Page 45: UNIT -5

45

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Greater security than single configurations because of two reasons: This configuration implements both packet-level

and application-level filtering (allowing for flexibility in defining security policy)

An intruder must generally penetrate two separate systems

Page 46: UNIT -5

46

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

This configuration also affords flexibility in providing direct Internet access (public information server, e.g. Web server)

Page 47: UNIT -5

47

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Screened host firewall system (dual-homed bastion host)

Page 48: UNIT -5

48

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Screened host firewall, dual-homed bastion configuration The packet-filtering router is not completely

compromised Traffic between the Internet and other hosts on

the private network has to flow through the bastion host

Page 49: UNIT -5

49

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Screened-subnet firewall system

Page 50: UNIT -5

50

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Screened subnet firewall configuration Most secure configuration of the three Two packet-filtering routers are used Creation of an isolated sub-network

Page 51: UNIT -5

51

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Advantages: Three levels of defense to thwart intruders The outside router advertises only the existence

of the screened subnet to the Internet (internal network is invisible to the Internet)

Page 52: UNIT -5

52

NETWORK SECURITY By: Hom

era Durani

FIREWALL CONFIGURATIONS

Advantages: The inside router advertises only the existence of

the screened subnet to the internal network (the systems on the inside network cannot construct direct routes to the Internet)