Network Security Controls
Tom Kelliher, CS 325
Nov. 29, 2007
Read Chapter 8 for Monday's exercise.
Problems and solutions for several networking protocols.
- Controls.
 
- Vulnerability points.
 
Lab day to begin your voting system analysis work.
- DNS
   
- Keep named up to date.
 
- Use authentication techniques to verify source of query replies.
 
 
- SMTP
   
- Disable relaying for hosts outside your domain.
 
- Use greylisting and Bayesian techniques to reduce SPAM.
 
- SPF protects 
Return-Path (envelope address).  What about
   From and Sender headers? -- Not used by mail handling
   software.
 
 
- XDMCP
   
- Block at external firewall.
 
- Use tcpd or tcpwrappers as an additional layer of defense, and to
   limit internal use.
 
- Do not disable built-in protection, regardless of DNS problems.
 
 
A summary of controls:
- Design and implementation -- segmented networks and services.
Redundancy.  Eliminating single points of failure.
 
- Encryption.  Link-level.  End-to-end.  VPNs.  Signed code.
 
- Data integrity.  ECC.  Cryptographic checksum.
 
- Strong authentication.  One-time passwords.  Challenge-response
systems.  Distributed authentication.
 
- Access controls.  ACLs on routers.  Firewalls.
 
- Alarms and alerts.  IDS at system- and network-levels.
 
- Honeypots.
Traffic flow security.  Onion routing.
 
Threats to mediate:
- Intercepting data in traffic.
 
- Accessing programs or data at remote hosts.
 
- Modifying programs or data at remote hosts.
 
- Inserting communications.
 
- Impersonating a user.
 
- Inserting a repeat of a previous communication.
 
- Blocking selected traffic.
 
- Blocking all traffic.
 
- Running a program at a remote host.
 
Thomas P. Kelliher
2006-11-29
Tom Kelliher