Network Security Controls
Tom Kelliher, CS 325
Nov. 29, 2007
Read Chapter 8 for Monday's exercise.
Problems and solutions for several networking protocols.
- Controls.
- Vulnerability points.
Lab day to begin your voting system analysis work.
- DNS
- Keep named up to date.
- Use authentication techniques to verify source of query replies.
- SMTP
- Disable relaying for hosts outside your domain.
- Use greylisting and Bayesian techniques to reduce SPAM.
- SPF protects
Return-Path
(envelope address). What about
From
and Sender
headers? -- Not used by mail handling
software.
- XDMCP
- Block at external firewall.
- Use tcpd or tcpwrappers as an additional layer of defense, and to
limit internal use.
- Do not disable built-in protection, regardless of DNS problems.
A summary of controls:
- Design and implementation -- segmented networks and services.
Redundancy. Eliminating single points of failure.
- Encryption. Link-level. End-to-end. VPNs. Signed code.
- Data integrity. ECC. Cryptographic checksum.
- Strong authentication. One-time passwords. Challenge-response
systems. Distributed authentication.
- Access controls. ACLs on routers. Firewalls.
- Alarms and alerts. IDS at system- and network-levels.
- Honeypots.
Traffic flow security. Onion routing.
Threats to mediate:
- Intercepting data in traffic.
- Accessing programs or data at remote hosts.
- Modifying programs or data at remote hosts.
- Inserting communications.
- Impersonating a user.
- Inserting a repeat of a previous communication.
- Blocking selected traffic.
- Blocking all traffic.
- Running a program at a remote host.
Thomas P. Kelliher
2006-11-29
Tom Kelliher