Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr....

80
Introduction to Network Security Chapter 5 Physical Network Layer 1 Dr. Doug Jacobson - Introduction to Network Security - 2009

Transcript of Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr....

Page 1: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Introduction to NetworkSecurityChapter 5

Physical Network Layer

1Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 2: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Topics• Lower Layer Security• Physical Layer Overview• Common attack methods• Ethernet• Wireless Security• General Mitigation Methods

2Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 3: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Physical Network

Layer

Medium access

Medium Access Protocol

Device Interface

Software Drivers

Service AccessPoints

Data buffers

Hardware

Software

Physical Media

Upper Layer

Physical media specific signal

Digital Data in bytes

Digital Data in bytes

3Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 4: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Common Attack Methods• Spoofing• Sniffing• Physical Attacks

4Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 5: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Hardware Addressing

R1 R2

D2

D1

D4

D3 D5

D6

D7

Network N1 Network N2 Network N3

HW-D1

HW-D2

HW-R1a HW-R1-b

HW-D4

HW-D3 HW-D5 HW-D7

HW-D6

HW-R2a HW-R2bPacket

5Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 6: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Hardware Address Spoofing

Computer 1HW = A1

Computer 2HW = C2Router 1

HW = A2, B1Router 2

HW = B3, C1

Attacker 1 Attacker 2 Attacker 3

Network A Network CNetwork B

6Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 7: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Network Sniffing

Computer 1HW = A1

Computer 2HW = C2Router 1

HW = A2, B1Router 2

HW = B3, C1

Attacker 1 Attacker 2 Attacker 3

Network A Network CNetwork B

7Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 8: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Physical Attacks• Bad network cable• Network cable loop (both ends plugged

into the same device)• Bad network controller• Two network controllers with the same

hardware address

8Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 9: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wired Network Protocols• Many protocols• Local Area Networks (LAN)

– Ethernet is the most common• Wide Area Networks (WAN)

9Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 10: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet• Developed in 1973 by Xerox• Speeds

– 10 Mbps– 100 Mbps– 1000 Mbps (gigabit)– 10 Gigabit

10Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 11: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet Transmission media

Name Cable type Speed Maximum Distance between devices

10Base2 Coax 10 Mbps 185 meters10BaseF Fiber 10 Mbps 500 meters10BaseT Twisted Pair 10 Mbps 100 meters100BaseT Twisted Pair 100 Mbps 100 meters100BaseFX Fiber 100 Mbps 1000 meters1000Base-X Fiber or coax 1000 Mbps Depends on cable type

11Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 12: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Coaxial Ethernet

Packet

12Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 13: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet Access Method• CSMA/CD

– Listen– Talk if no one else is talking– Back off if more than one talks at a time– Minimum packet length is used to

guarantee that a collision can be seen by all machines. This also puts a limit on the length of the cable

13Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 14: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

14Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 15: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet Collision Domain• The range that is effected when a

collision occurs.• 10Mbps Ethernet it is 2500 Meters• This can be changed by using switches

and routers (more later)

15Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 16: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Connecting Devices• Repeater (physical layer only)• Hub (multi port repeater)• Bridge (layer 2 only)• Router (layer 3)• Layer 2 switch• Layer 3 switch

16Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 17: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet HubsHub

Hub Hub

HubC2

C5 C7

C3 C4

C1

C6

17Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 18: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet switches• Collisions can slow the network down• Switches create multiple collision domains• Typically one machine per leg of the switch• Switches only pass traffic to the leg of the

switch where the destination is located• Switches reduce the traffic on each leg

– Problem with network monitoring

18Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 19: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet SwitchSwitch 1

Switch 2 Switch 3

Switch 4C2

C5 C7

C3 C4

C1

C6

P1

P2 P3 P4

P1

P2 P3

P1

P2 P3 P4

P1

P2 P3

Router R1

Port HW AddressP1 UplinkP2 C2P3 Multiple

Port HW AddressP1 UplinkP2 C5P3 C6P4 C7

Port table, switch 2 Port table, switch 4

19Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 20: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet Tap Points

Switch 1

Switch 2 Switch 3

C2 C5C3 C4

C1

P1

P2 P3 P4

P1

P2 P3

P1

P2 P3

Tap

Spanning ormirrored port

Router

Hub

MonitoringPoint

Router

Switch

OR

20Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 21: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet - Frame

Preamble (on wire only) 7 bytes

Start Frame Delimiter 1 bytes

Destination Address 6 Bytes

Source Address 6 BytesType or Length 2 BytesData 46-1500 BytesFCS 4 Bytes

21Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 22: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet Addresses• Goal is to have all addresses globally

unique• 6 bytes

– Upper 3 bytes vendor code– Lower 3 bytes independent

• All 1’s = broadcast address

22Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 23: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Ethernet Type/length

• If value < 0x800 then it is a length field otherwise it is a protocol type field. Some common types are:Hex

• 0800 DoD Internet Protocol (IP)• 0805 X.25 level 3• 0806 Address Resolution Protocol (ARP)• 6003 DECNET Phase IV• 6004 Dec LAT• 809B EtherTalk• 80F3 AppleTalk ARP

23Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 24: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Attacks and vulnerabilities• Header-based• Protocol-based• Authentication-based• Traffic-based

24Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 25: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Header-Based• Attacks

– Setting the destination address as a broadcast address can cause traffic problems

– Setting the source can cause switches to get confused

• Mitigation– Very difficult to mitigate

25Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 26: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Protocol-Based• Protocol is simple and is in hardware

26Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 27: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Authentication-Based• You can set the hardware address• Hardware address is used to

authenticate in switches• Hardware addresses can be used to

authenticate devices in a network

27Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 28: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Authentication-Based• Destination address spoofing• Destination address is obtained

dynamically via a protocol• Trick a device into thinking you are the

destination (ARP Poisoning)• No good mitigation method

28Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 29: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

ARP Poisoning

29Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 30: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Authentication-Based• Source Address Spoofing• Source address if not used for

authentication by default• New security and network management

methods are starting to use the source address to authenticate the device. (Network Access Control [NAC])

• More on NAC as a general countermeasure later

30Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 31: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Traffic-Based• Attack

– Ethernet controllers can be set in promiscuous mode which enables them to sniff traffic

• Mitigation– Encryption, VLAN (more later)

• Broadcast traffic can cause flooding, hard to flood unless directly connected to the LAN

• No good mitigation for flooding

31Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 32: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wireless Security Topics• Standards• Devices• Protocol• Packet Format• Vulnerabilities• Mitigation

32Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 33: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wireless Standards

Name Frequency Data Rate Max Distance

802.11a 5 GHz 54Mbps 30 meters

802.11b 2.4 GHz 11Mbps 30 meters

802.11g 2.4 GHz 11-54 Mbps 30 meters

802.11n 2.4 GHz 200-500 Mbps 50 meters

33Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 34: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Signal Reflection

34Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 35: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wireless Ethernet 802.11• Two topologies

– IBSS Independent Basic Service Set• Ad-hoc, all stations are peers

– ESS Extended Service Set• AP – Access points connected to a network• Station plus the AP form a BSS

35Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 36: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wireless Network Environment

RouterSwitch

Access point CSSID = SERVER ROOM

Access point ASSID = LAB

Access point BSSID = OFFICE

A B C D E

36Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 37: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Discovery and joiningAccess Point A Access point B

BeaconSSID = LAB

Device C

BeaconSSID = OFFICE

Probe

Probe ResponseSSID = LAB Probe Response

SSID = OFFICE

Discovery

Joining

Association Request

Association Response

Probe

37Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 38: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

IEEE 802.11• CSMA/CA

– Wait till medium is free– Backoff after defer random amount– Exponential backoff for retransmission– Backoff timer resets if idle– Get an ACK if frame was received correctly

38Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 39: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

IEEE 802.11 Protocol

Listen

quiet

Got Ack

Send

Quiet

Packet to send

Packet sent

No

Yes

Yes

No

Yes

No

Pick randomNumber ofTime slots

Slot count= 0

No Yes

Wait a time slotDecrementslot count

39Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 40: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

IEEE 802.11 Access PointsTwo types• Extended network

– Access point makes the wireless devices look like they are on the same network as the wired devices

• Wireless router– Access point acts as a router

40Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 41: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Extended Network

Router Switch

A

B C

Network

D

G

E

F

41Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 42: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wireless Router

Router Switch

A B C

WirelessRouter

Network 1

Network 2

ED

F

42Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 43: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

802.11 Frame Format

•Frame Control: Used to identify the frame type and other frame specific information.•Duration/ID: Used to manage the access control protocol.Address 1: Used to identify the destination of the transmitted packet. This is used by the hardware controller to determine if the frame should be read. If it does not match the address of the controller the remainder of the frame is ignored.

43Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 44: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

802.11 Frame Format

• Address 2: Address of the transmitting device.

• Address 3: Used when the access point is part of an extended network where the access point will relay the traffic.

• Address 4: Used when the access point is part of an extended network where the access point will relay the traffic

44Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 45: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

802.11 Frame Format

• Sequence Control: Used by the acknowledgement process.

• Data: The data field contains the data. The data field length is limited to 2312 bytes. Wireless Ethernet does not have a minimum data length.

• Frame Check Sequence (FCS): This field is used to help verify that the frame has not been corrupted during transmission.

45Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 46: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Header Based• Setting the destination address as a

broadcast address can cause traffic problems

• Denial of Service– Invalid headers will cause loss of access or

loss of association• Not easy to fix

46Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 47: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Protocol-Based

• Protocol is simple and is in hardware• Can transmit packets to cause Denial of

service• Jamming of signals by ignoring the protocol• Very hard to stop

47Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 48: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Protocol-Based• Access point can broadcast its SSID

– Wardriving• www.wardriving.com• www.worldwidewardrive.org

48Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 49: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wardriving How easy• One laptop with wireless• Free software• GPS optional

49Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 50: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

WarDriving

50Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 51: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

WardrivingMitigation:• Do we need to mitigate it?• Turn off broadcast of SSID• Use encryption or Network Access

Control (NAC) (make it an authentication problem)

51Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 52: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

SSID discovery• Sometimes additional information is

provided by the SSID that could help an attacker

• Business name• Home address or user’s last name

52Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 53: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Authentication Based• You can set the hardware address• Hardware address is used as

authentication in Access Points• Device authentication

– Access point authentication– Wireless device authentication

• Access point configuration authentication– Gaining access to the access point

53Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 54: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Access point Authentication• Rogue access point

– Installed by valid user• Fake Access point

– Installed by attacker

54Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 55: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Rogue Access Point

RouterSwitch Internet

Rouge Access Point

Rogue User

Attacker / Wardriver

Building Walls

55Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 56: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Rogue Access Point

• Provides access to attacker– Intentional or unintentional

• Bypasses perimeter security mechanisms• Hard to find and stop

– Scan for SSID– Scan for wireless traffic

• NAC might provide some help.

56Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 57: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Fake Access Point

RouterSwitch Internet

Real Access Point

Wireless User

Attacker

Building Walls

Fake AccessPoint

57Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 58: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Fake Access point• Hard to fake an access point within an

organization.• Easier if the access point is a public

access point with no encryption.– Not much to be gained by this

58Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 59: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Access Point Configuration Authentication

• Access point are often configured over the network.

• They have default passwords• An attacker could change security

settings

59Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 60: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Traffic Based• Ethernet controllers can be set in

promiscuous mode which enables them to sniff traffic

• Broadcast traffic can cause flooding

60Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 61: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wired Equivalent Privacy (WEP)• Shared keys

– 40 bits– 128 bits

• Can be cracked if enough data is seen• Aircrack will find a WEP key

61Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 62: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

WEP

Network

Password

Clear TextTraffic

EncryptedTraffic withShared Key

Acknowledge

EncryptedTraffic withShared Key

AcknowledgePassword

Device B Device A

Associate Request

Associate Response

Associate Request

Associate Response

Authenticate Request Authenticate Request

62Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 63: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wi-Fi Protected Access (WPA)

• Uses 802.1X + Extensible Authentication Protocol– Authentication with an auth server

• Encryption– Rc4– AES (WPA2)

63Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 64: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

WPA – Home use• Uses a shared password for

authentication• If mobile password matches AP then

encryption keys are exchanged• New keys for each new association

64Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 65: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Home-Based WPA

Home Network

Password

Clear TextTraffic

EncryptedTraffic withSession Key A

Acknowledge

Negotiate Key

Negotiate Key

EncryptedTraffic withSession Key B

Send Password

Acknowledge

Negotiate Key

Negotiate Key

Password

Device B Device A

Send Password

Associate Request

Associate Response

Associate Request

Associate Response

65Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 66: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

WPA – enterprise• Mobile associates with AP• Mobile authenticates with auth server

(using 802.1X)• Authentication server distributes keys to

AP and mobile

66Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 67: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Enterprise WPA

EnterpriseNetwork

Password

Clear TextTraffic

EncryptedTraffic withSession Key A

Acknowledge

Negotiate Key

Negotiate Key

EncryptedTraffic withSession Key B

Send Password

Acknowledge

Negotiate Key

Negotiate Key

Password

Device B Device A

Send Password

Enterprise UserAuthenticationSystem

PasswordVerification

Associate Request

Associate Response

Associate Request

Associate Response

67Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 68: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wireless (A world without perimeters)

• Wireless can create a new perimeter– Know access points– Unknown access points

• Treat your wireless access points the same as you would any remote access to your network.– Monitor it– Filter it– Protect it

68Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 69: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Why is Wireless different?• Most security models are based on a

strong perimeter around an organization• Wireless signals are not confined to the

walls of an organization• Wireless technology is plug and play• Security makes wireless harder to use.

69Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 70: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

How to secure your wireless network

• Control your broadcast area• Enable WEP, use WPA if possible• Disable SSID Broadcast

– More work to setup clients• Change default AP settings• Don’t choose descriptive SSID• Restrict associations to MAC addresses

70Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 71: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

General Mitigation Methods• VLAN• NAC

71Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 72: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

VLAN

• Virtual Local Area Network– Creates virtual networks where traffic is

isolated between each VLAN based on the hardware address

• Two types– Static: each port on the switch is part of a

VLAN– Dynamic: VLAN assignment is based on

hardware address72Dr. Doug Jacobson - Introduction to

Network Security - 2009

Page 73: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

VLAN

Router

Switch 1

D2D1

D4

D3

D5

D6D7

Switch 2

Switch 3

123

1

1

2

2

VLAN 1 VLAN 2

73Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 74: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Logical View of VLAN

Router

Switch

D4D1

D5

D7

D6D3D2

Switch

VLAN 1

VLAN 2

Router

Router

74Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 75: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

VLAN Security• A VLAN will separate traffic, but will not

protect devices inside a network from other devices in the same network

• Dynamic VLAN can be fooled by changing the MAC address

• Can help in wireless security

75Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 76: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Wireless VLAN

Router/ PerimeterDefense

Router/ PerimeterDefenseSwitch Internet

WirelessVLAN Attacker

76Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 77: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Network Access Control

• Only allow trusted devices on the network• A host has software that involves an

assessment of the host (virus software, etc.)

• Hosts asks policy server if it can use the network

• Network will enforce the policy (limited or full access)

77Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 78: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

NAC Framework

Router/ PerimeterDefense

RouterPerimeter Defense

Policy Enforcement

Switch / PolicyEnforcement Internet

WirelessVLAN

PolicyDecisionPoint

AuthenticationSystem

78Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 79: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

NAC• Limited use today• Focuses on misconfigured or infected

devices

79Dr. Doug Jacobson - Introduction to Network Security - 2009

Page 80: Introduction to Network Security - Doug Jacobson Slides/Chapter-05.pdf · • Physical Attacks Dr. Doug Jacobson - Introduction to 4. Network Security - 2009. Hardware Addressing

Physical Network Security• Protection methods are limited to local

network• Provides limited security

80Dr. Doug Jacobson - Introduction to Network Security - 2009