Network Threats & Attacks
1
Network Threats & Attacks 1 Internet Structure backbone ISP - - PowerPoint PPT Presentation
CS 134 Winter 2018 Lecture 16 Network Threats & Attacks 1 Internet Structure backbone ISP local network Internet service Autonomous system (AS) is a provider (ISP) collection of IP networks under control local network of a single
1
local network Internet service provider (ISP) backbone ISP local network
Autonomous system (AS) is a collection of IP networks under control
2
application presentation session transport network data link physical IP TCP email, Web, NFS RPC Ethernet
3
Application data data
TCP header
data
TCP header
data
TCP header
data
TCP header IP header
data
TCP header IP header Ethernet header Ethernet trailer
application layer transport layer network layer data link layer message segment packet frame
4
IPv6 only (IPv4 may fragment)
Alice’s computer Alice’s ISP Bob’s ISP Bob’s computer
IP Packet
Source
128.83.130.239 171.64.66.201
33040
Dest Seq #
128.83.130.239 171.64.66.201
7
8
9
might be local or remote
Src: victim’s address Dest: broadcast address
Looks like a legitimate “Are you alive?” ping request from the victim
generates a ping reply (ICMP Echo Reply) to victim’s address
10
11
12
13
SYNC SYNS, ACKC ACKS Listening… Spawn thread, store data
(connection state, etc.)
Wait Connected
14
SYNC1 Listening… Spawn a new thread, store connection data SYNC2 SYNC3 SYNC4 SYNC5 … and more … and more … and more … and more … and more
15
16
17
[Bernstein and Schenk]
SYNC
Listening… Does not store state F(source addr, source port, dest addr, dest port, coarse time, server secret)
SYNS, ACKC
sequence # = cookie
unforgeable
invert a cookie (why?)
F=AES or a truncated hash
Recompute cookie, compare with with the one received, only establish connection if they match
ACKS(cookie)
Compatible with standard TCP; simply a “weird” sequence number scheme
More info: http://cr.yp.to/syncookies.html
18
19
20
21
Trusted connection between Alice and Bob uses predictable sequence numbers
SYN-flood Bob’s queue Send packets to Alice that resemble Bob’s packets Open connection to Alice to get initial sequence number
authentication
22
23
24
25
26
27
28
Exchange routing tables
29
30
7 7 2 7 2 7 2 7 3 2 7 6 2 7 2 6 5 2 6 5 2 6 5 3 2 6 5 7 2 6 5 6 5 5 5 [Wetherall]
31
32
33
34
35
36
37
www.ics.uci.edu NS uci.edu www.ics.uci.edu NS ics.uci.edu
38
39
40
ftp.ics.uci.edu
41
www.ics.uci.edu NS uci.edu www.ics.uci.edu NS ics.uci.edu
42
host1.foo.com host1.foo.com is at 1.2.3.4 TXID, host1.foo.com
Trick client into looking up host1.foo.com (how?) Guess TXID, host1.foo.com is at 6.6.6.6
Another guess, host1.foo.com is at 6.6.6.6 Another guess, host1.foo.com is at 6.6.6.6
43
host1.foo.com host1.foo.com is at 1.2.3.4 TXID, host1.foo.com
Trick client into looking up host1.foo.com Guessed TXID, very long TTL I don’t know where host1.foo.com is Ask the authoritative server at ns2.foo.com It lives at 6.6.6.6
[Kaminsky]
host2.foo.com
44
45
46
47
48
49
good.net browser Evil.org DNS Lookup www.evil.org 222.33.44.55 Evil.org Web GET /, host www.evil.org Response Evil.org DNS Lookup www.evil.org 10.0.0.7 Intra.good.net 10.0.0.7 POST /cgi/app, host www.evil.org Response – short ttl = compromise!
Invoke sensitive CGI app: Get malicious javascript:
10.0.0.21
50
Zone administrator
Cache pollution by data spoofing Unauthorized updates Corrupting data Impersonating master Cache impersonation
51
ICANN: Internet Corporation for Assigned Names and Numbers
52
53
MORE INFO: http://www.dnssec.net/presentations
54