Slides for Networking Overview

Slides for Networking Overview

Internet Overview Router Internet/Networking Overview Router Router Router Notes for CSC 580 Gateway/Firewall • Basic idea: Network of networks • Internet (protocol) vs. “The Internet” Internet/Networking Overview Slide 2 Packet Switching Some Internet History A B C D E F G H I J K L M N O P • ARPA (Advanced Research Projects Agency) experiment to test ideas of “packet switched A B C D E F G H I J K L M N O P networks” Packet size determined by MTU (Maximum Transmission Unit) • 1969: First node goes on-line (UCLA) • Each packet sent independently • 1970’s: Maturing and apps (e-mail in 1972) – Different pieces can routed separately • 1980’s: Widespread in academic, military, – Not dependent on a fixed “switched” connection, and research communities so can “re-route” easily to avoid trouble spots – 1985: NSFNET • 1990’s: The web and privatization • Postcard analogy Internet/Networking Overview Slide 3 Internet/Networking Overview Slide 4 Some Web History Network Protocols • 1990: Tim Berners-Lee at CERN defined: •A network protocol provides syntactic and – HTTP (transfer) semantic rules for communication. – HTML (presentation) – Often defined in terms of state machines – URLs (reference) – Standards allow service-based interoperability • 1993: Mosaic released by NCSA • Internet RFCs (TCP/IP, DNS, …) • IEEE standards (Ethernet, etc.) • December 1994: Netscape appears – Improvements in efficiency/caching • Protocols can be in hardware or software – Integrated encryption/SSL to enable secure connections – Ethernet access protocol often in hardware – Portable with attractive / easy-to-use user interface – HTTP and other high-level usually in software Internet/Networking Overview Slide 5 Internet/Networking Overview Slide 6 1 Network Layers Link Layer • Layered Model: • For directly-connected systems to communicate – Each layer uses only the layer directly below it – Benefit: Different issues to address at different levels of abstraction • Example 1: Ethernet – Ethernet cards IDed by “MAC address” (48 bits) Layer OSI Model IP (or TCP/IP or Internet) Model – E.g., sending from 00:02:d1:61:9c:f1 to 00:d0:15:38:2c:d0 7 Application Examples: HTTP, FTP, SMTP (E-mail)… – Packet: 6 Presentation 00 d0 15 38 2c d0 00 02 d1 61 9c f1 08 00 Data to be transmitted … 5 Session 4 Transport Examples: TCP, UDP • Example 2: PPP (Point-to-Point Protocol) link 3 Network IP (Internet Protocol) 2 Data Link layer uses HDLC (High-level Data Link Control) Transmission media (ethernet, token ring, …) 1 Physical – Only two endpoints, so no addressing is necessary! Next: We look at issues and vulnerabilities with each layer. – Includes error detection for flakey links Internet/Networking Overview Slide 7 Internet/Networking Overview Slide 8 Link Layer Issues Link Layer Threats and Vulnerabilities Topology Message Interception • Original Ethernet – bus topology: Ring Shared medium Bus – All systems on a LAN “see” all traffic – Usually ignore all but to them (based on MAC addr) • However: Interfaces can be put into “promiscuous mode” Hub/Concentrator • Ethernet evolution 1: Hubs Or – Star topology, but all traffic still to all hosts Crossbar/switch • Ethernet evolution 2: Switches – star/tree topology Star Tree – Switch remembers which MAC addresses are connected to which ports, and sends traffic only to addressed host Internet/Networking Overview Slide 9 Internet/Networking Overview Slide 10 Network Layer Issues IP Packets IP Addresses 0 7 8 15 16 31 • Network (IP) layer concerned with addressing and routing Vers: 4 IHL ToS Total Length – Address usually obtained from DNS – an application-layer protocol! ID (for fragmentation) Flags Fragment Offset • Current version of IP protocol: IPv4 TTL Protocol Header Checksum – Addresses are 32-bit values IP Source Address – IP addresses are for interfaces, not computers – Given as 4 bytes in “dotted notation” (e.g., 129.120.61.48) IP Destination Address – Addresses divided into network and host parts • Class C example: 129.120.61 is net addr, 48 is host addr Options (usually empty) • Hosts w/same network addr can talk directly to each other (LAN) • Net address notations: – Subnet mask: 129.120.61.0/255.255.255.0 Data – Net addr bitcount: 129.120.61.0/24 – See with “/sbin/ifconfig” in Unix/Linux ; “ipconfig” in Windows • Everything is just bits being transmitted • Next generation IP: IPv6 – Can all be tampered with! – Header checksum is not cryptographic – for detecting transmission errors, not – Addresses are 128-bit values – huge address space tampering Internet/Networking Overview Slide 11 Internet/Networking Overview Slide 12 2 ARP: Finding the right host on a subnet When ARP goes bad: ARP Spoofing • Performance: Hosts keep an “ARP Table” of known IP address <-> • Problem: MAC mappings – Ethernet works on MAC addresses (doesn’t understand IP) – Doesn’t have to ask if MAC address known – IP works on IP addresses (doesn’t understand Ethernet) – Updates table with each “I have a.b.c.d” message – How do we get a packet to the right host on a LAN/subnet? – Expires mappings regularly (in case IP moves) In Windows: “arp –a” [root@host ~]# arp -n Address HWtype HWaddress Flags Mask Iface 129.120.61.49 ether 00:D0:B7:BA:A6:D2 C eth0 • Answer: The Address Resolution Protocol (ARP) 129.120.61.250 ether 00:08:20:30:37:FC C eth0 129.120.61.41 ether 00:02:B3:B5:20:23 C eth0 – Example: Host 10.1.1.42 wants to send to 10.1.1.92 129.120.61.232 ether 00:D0:B7:93:14:E4 C eth0 • But! Only knows IP address, not MAC address • So: Broadcasts an ARP message on Ethernet saying “Who has • ARP spoofing: To sniff on a switched Ethernet 10.1.1.92?” – Attacker (on same LAN) sends out “I have a.b.c.d” messages for target • 10.1.1.92 responds with “I have 10.1.1.92. My MAC is 00:02:2d:9a:27:72” machine (or all machines!) • Now 10.1.1.42 sends over Ethernet to this MAC – Packets then sent to the attacker rather than the destination (which could be the gateway router) – Attacker can then forward packets so no disruption – just monitoring Internet/Networking Overview Slide 13 Internet/Networking Overview Slide 14 Subnet-to-subnet Communication ARP Spoofing Countermeasures Gateways and Routers • Static ARP tables • Router “lives on” multiple subnets – Local address on each – Sensitive subnets should use static ARP tables 129.12.60.0/23 – Can be more than 2 NICs / subnets subnet – Mappings don’t expire • Routing tables say what goes where – Mappings are hard-coded to be genuine by the – See with “/sbin/route” in Linux/Unix administrator – See with “route print” in Windows 129.12.61.1 – Not perfect: MAC address spoofing still possible! Router Sample simplified host routing table: 72.1.19.53 Destination Gateway Genmask Iface • Possible future directions: 129.12.60.0 0.0.0.0 255.255.254.0 eth0 0.0.0.0 129.12.61.1 0.0.0.0 eth0 – A better solution is still an unresolved research issue Sample simplified router routing table: 72.1.19.0/24 – Some suggest authenticated ARP Destination Gateway Genmask Iface subnet 129.120.60.0 0.0.0.0 255.255.254.0 eth1 • Uses digital signatures (PK Crypto), so slow – and ARP 72.1.19.0 0.0.0.0 255.255.255.0 eth0 needs to be very low overhead! 0.0.0.0 72.1.19.2 0.0.0.0 eth0 Internet/Networking Overview Slide 15 Internet/Networking Overview Slide 16 Network Layer Topology Topology Example • How are subnets connected together? DMZ – Earlier discussion was physical link topology – now logical links Corporate Network www • Physical layer considerations: mail Internet – Point-to-point: Direct connections of two endpoints • Protocols: PPP (point-to-point protocol – typically over serial/phone lines) and PPoE (point-to-point over Ethernet – used by a lot of DSL) – Broadcast: Sent out to “whoever gets it” (e.g., wireless) – Similar issue on ethernet: switches vs. hubs Controlled Access Point (Router, Firewall, IDS) • Interconnection issues: But: What about public servers? – Ownership: Who owns pieces of the network? • Must make sure “controlled access” is only way in! (Modems, wireless, …) – Control: Sub-network administration • Firewall/border security: “A crunchy shell around a soft, chewy center” (Cheswick) – Boundary: Separation of separate domains of control Internet/Networking Overview Slide 17 Internet/Networking Overview Slide 18 3 About DMZs Faking Network Layer Topology • Important: What is called a “DMZ” on many home routers is not Virtual Link what a network professional means by a “DMZ”!!! • Overlay networks Subnet 1 – Idea: Use connections over – A network on top of a network • A real DMZ: – P2P can be viewed as overlay networks – Hosts isolated in a separate subnet so traffic does not enter the – Anonymity networks (like tor) are overlay networks – PlanetLab overlay for networking research internal network, even if public hosts broken in to. Physical Path – Can provide gateways or “bastion hosts” that are connected to both internal and external networks (ssh stepping stones). • PPP: Point-to-Point Protocol Subnet 2 – Standard used for dial-up connections • A “home router DMZ”: – One host on each side of a link – All traffic (all ports) is routed to one particular internal-network – Originally for sending network packets over serial connections system – makes an internal host “public” for receiving connections – Actually lets traffic into the internal network, so if someone breaks into the “DMZ host” they have full access to your network! • More later, when we discuss VPNs Internet/Networking Overview Slide 19 Internet/Networking Overview Slide 20 Network Layer Attacks Field Tampering IP Spoofing • Attack type 1: Put

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    7 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us