520 likes | 794 Views
UNIT -5. Password Management Firewall Design Principles. Password Management. Password Protection. User ID and password: User authorized to gain access to the system Privileges accorded to the user Discretionary access control . Password Protection.
E N D
UNIT -5 Password Management Firewall Design Principles.
Password Management NETWORK SECURITY By: Homera Durani
Password Protection User ID and password: • User authorized to gain access to the system • Privileges accorded to the user • Discretionary access control NETWORK SECURITY By: Homera Durani
Password Protection • Unix system (user ID, cipher text password, plain text salt) • password 8 printable characters - 56-bit value (7-bit ASCII) • encryption routine (crypt(3)) based on DES • modified DES algorithm with 12-bit salt value (related to time of password assignment) • 25 encryptions with 64-bit block of zeros input • 64-bit - 11 character sequence NETWORK SECURITY By: Homera Durani
Loading A New Password NETWORK SECURITY By: Homera Durani
Password Protection Purposes of salt: • Prevents duplicate passwords from being visible • Effectively increases password length without the user needing to remember additional 2 characters (possible passwords increased by 4096) • Prevent use of hardware DES implementation for a brute-force guessing attack NETWORK SECURITY By: Homera Durani
Observed Password LengthsIn a Purdue Study NETWORK SECURITY By: Homera Durani
Passwords Cracked From A Sample Set easy pickin’s NETWORK SECURITY By: Homera Durani
Access Control One Method: Deny access to password file • Systems susceptible to unanticipated break-ins • An accidentin protection may render the password file readable compromising all accounts • Users have accounts in other protection domains using the same passwords NETWORK SECURITY By: Homera Durani
Access Control • Answer:Force users to select passwords that are difficult to guess • Goal:Eliminate guessable passwords while allowing the user to select a password that is memorable NETWORK SECURITY By: Homera Durani
Password Selection Strategies(Basic Techniques) • User education • Users may ignore the guidelines • Computer-generated passwords • Poor acceptance by users • Difficult to remember passwords NETWORK SECURITY By: Homera Durani
Password Selection Strategies • Reactive password checking • System runs its own password cracker • Resource intensive • Existing passwords remain vulnerable until reactive checker finds them • Proactive password checking • Password selection is guided by the system • Strike a balance between user accessibility and strength • May provide guidance to password crackers (what not to try) • Dictionary of bad passwords (space and time problem) NETWORK SECURITY By: Homera Durani
Proactive Password Checker There are two techniques currently in use: • Markov Model – search for guessable password • Bloom Filter – search in password dictionary NETWORK SECURITY By: Homera Durani
Markov Model Probability that b follows a M = {states, alphabet, prob, order} NETWORK SECURITY By: Homera Durani
Markov Model • “Is this a bad password?”…same as… • “Was this password generated by this Markov model?” • Passwords that are likely to be generated by the model are rejected • Good results for a second-order model NETWORK SECURITY By: Homera Durani
Bloom Filter A probabilistic algorithm to quickly test membership in a large set using multiple hash functions into a single array of bits Developed in 1970 but not used for about 25 years Used to find words in a dictionary also used for web caching Small probability of false positives which can be reduced for different values of k, # hash funcs NETWORK SECURITY By: Homera Durani
Bloom Filter Bit Vector: v • A vector v of N bits • k independent hash functions. Range 0 to N-1 • For each element x, compute hash functions H1(x), H2(x)…Hk(x) • Set corresponding bits to 1 • Note: A bit in the resulting vector may be set to 1 multiple times Element: x 1 H1(x)=P1 1 H2(x)=P2 N bits 1 H3(x)=P3 H4(x)=P4 1 NETWORK SECURITY By: Homera Durani
Bloom Filter • To query for existence of an entry x, compute H1(x), H2(x)…Hk(x) and check if the bits at the corresponding locations are 1 • If not, x is definitely not a member • Otherwise there may be a false positive (passwords not in the dictionary but that produce a match in the hash table). The probability of a false positive can be reduced by choosing k and N NETWORK SECURITY By: Homera Durani
Performance of Bloom Filter NETWORK SECURITY By: Homera Durani Dictionary of 1 million words with 0.01 probability of rejecting a password We need a hash table of 9.6 X 106 bits
Firewall NETWORK SECURITY By: Homera Durani
Outline • Firewall Design Principles • Firewall Characteristics • Types of Firewalls • Firewall Configurations NETWORK SECURITY By: Homera Durani
Firewalls • Effective means of protection a local system or network of systems from network-based security threats while affording access to the outside world via WAN`s or the Internet NETWORK SECURITY By: Homera Durani
Firewall DesignPrinciples • Information systems undergo a steady evolution (from small LAN`s to Internet connectivity) • Strong security features for all workstations and servers not established NETWORK SECURITY By: Homera Durani
Firewall DesignPrinciples • The firewall is inserted between the premises network and the Internet • Aims: • Establish a controlled link • Protect the premises network from Internet-based attacks • Provide a single choke point NETWORK SECURITY By: Homera Durani
Firewall Characteristics • Design goals: • All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network except via the firewall) • Only authorized traffic (defined by the local security police) will be allowed to pass NETWORK SECURITY By: Homera Durani
Firewall Characteristics • Design goals: • The firewall itself is immune to penetration (use of trusted system with a secure operating system) NETWORK SECURITY By: Homera Durani
Firewall Characteristics • Four general techniques: • Service control • Determines the types of Internet services that can be accessed, inbound or outbound • Direction control • Determines the direction in which particular service requests are allowed to flow NETWORK SECURITY By: Homera Durani
Firewall Characteristics • User control • Controls access to a service according to which user is attempting to access it • Behavior control • Controls how particular services are used (e.g. filter e-mail) NETWORK SECURITY By: Homera Durani
Types of Firewalls • Three common types of Firewalls: • Packet-filtering routers • Application-level gateways • Circuit-level gateways • (Bastion host) NETWORK SECURITY By: Homera Durani
Types of Firewalls • Packet-filtering Router NETWORK SECURITY By: Homera Durani
Types of Firewalls • Packet-filtering Router • Applies a set of rules to each incoming IP packet and then forwards or discards the packet • Filter packets going in both directions • The packet filter is typically set up as a list of rules based on matches to fields in the IP or TCP header • Two default policies (discard or forward) NETWORK SECURITY By: Homera Durani
Types of Firewalls • Advantages: • Simplicity • Transparency to users • High speed • Disadvantages: • Difficulty of setting up packet filter rules • Lack of Authentication NETWORK SECURITY By: Homera Durani
Types of Firewalls • Possible attacks and appropriate countermeasures • IP address spoofing • Source routing attacks • Tiny fragment attacks NETWORK SECURITY By: Homera Durani
Types of Firewalls • Application-level Gateway NETWORK SECURITY By: Homera Durani
Types of Firewalls • Application-level Gateway • Also called proxy server • Acts as a relay of application-level traffic NETWORK SECURITY By: Homera Durani
Types of Firewalls • Advantages: • Higher security than packet filters • Only need to scrutinize a few allowable applications • Easy to log and audit all incoming traffic • Disadvantages: • Additional processing overhead on each connection (gateway as splice point) NETWORK SECURITY By: Homera Durani
Types of Firewalls • Circuit-level Gateway NETWORK SECURITY By: Homera Durani
Types of Firewalls • Circuit-level Gateway • Stand-alone system or • Specialized function performed by an Application-level Gateway • Sets up two TCP connections • The gateway typically relays TCP segments from one connection to the other without examining the contents NETWORK SECURITY By: Homera Durani
Types of Firewalls • Circuit-level Gateway • The security function consists of determining which connections will be allowed • Typically use is a situation in which the system administrator trusts the internal users • An example is the SOCKS package NETWORK SECURITY By: Homera Durani
Types of Firewalls • Bastion Host • A system identified by the firewall administrator as a critical strong point in the network´s security • The bastion host serves as a platform for an application-level or circuit-level gateway NETWORK SECURITY By: Homera Durani
Firewall Configurations • In addition to the use of simple configuration of a single system (single packet filtering router or single gateway), more complex configurations are possible • Three common configurations NETWORK SECURITY By: Homera Durani
Firewall Configurations • Screened host firewall system (single-homed bastion host) NETWORK SECURITY By: Homera Durani
Firewall Configurations • Screened host firewall, single-homed bastion configuration • Firewall consists of two systems: • A packet-filtering router • A bastion host NETWORK SECURITY By: Homera Durani
Firewall Configurations • Configuration for the packet-filtering router: • Only packets from and to the bastion host are allowed to pass through the router • The bastion host performs authentication and proxy functions NETWORK SECURITY By: Homera Durani
Firewall Configurations • Greater security than single configurations because of two reasons: • This configuration implements both packet-level and application-level filtering (allowing for flexibility in defining security policy) • An intruder must generally penetrate two separate systems NETWORK SECURITY By: Homera Durani
Firewall Configurations • This configuration also affords flexibility in providing direct Internet access (public information server, e.g. Web server) NETWORK SECURITY By: Homera Durani
Firewall Configurations • Screened host firewall system (dual-homed bastion host) NETWORK SECURITY By: Homera Durani
Firewall Configurations • Screened host firewall, dual-homed bastion configuration • The packet-filtering router is not completely compromised • Traffic between the Internet and other hosts on the private network has to flow through the bastion host NETWORK SECURITY By: Homera Durani
Firewall Configurations • Screened-subnet firewall system NETWORK SECURITY By: Homera Durani
Firewall Configurations • Screened subnet firewall configuration • Most secure configuration of the three • Two packet-filtering routers are used • Creation of an isolated sub-network NETWORK SECURITY By: Homera Durani