Sunday, May 27, 2012
Public Key Infrastructure (Digital Cert )
In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document which uses digital signature to bind a public key with an identity; information such as the name of a person or an organization, their address, and so forth. The certificate can also be used to verify that a public key belongs to an individual.
In a public key infrastructure (PKI) scheme, the signature will be the certificate authority (CA). In a web of trust scheme, the signature is of either the user (self-signed certificate) or other users (endorsements). In either case, the signatures on a certificate are attestations by the certificate signer that the identity information and the public key belong together.
For provable security, this reliance on something external to the system has the consequence that any public key certification scheme has to rely on some special setup assumption, such as the existence of a certificate authority.
Certificates can be created for Unix-based servers with tools such as OpenSSL’s ca command or SuSE’s gensslcert. These may be used to issue unmanaged certificates, CA certificates for managing other certificates, and user and/or computer certificate requests to be signed by the CA, as well as a number of other certificate related functions.
In order to make sure that a digital certificate is real or valid, it must have the follow contents:
Serial Number -- Used to uniquely identify the certificate.
Subject -- The person, or entity identified.
Signature Algorithm -- The algorithm used to create the signature.
Signature -- The actual signature to verify that it came from the issuer.
Issuer -- The entity that verified the information and issued the certificate.
Valid-From -- The date the certificate is first valid from.
Valid-To -- The expiration date.
Key-Usage -- Purpose of the public key (e.g. encipherment, signature, certificate signing...).
Public Key
Thumbprint Algorithm -- The algorithm used to hash the public key.
Thumbprint -- The hash itself, used as an abbreviated form of the public key.
IPSec (ESP, AH, DES, MD5, SHA, DH)
Internet Protocol Security (IPsec) is a protocol suite to secure Internet
Protocol (IP) communications by authenticating and encrypting each IP packet of
a communication session. IPsec also includes protocols for establishing mutual
authentication between agents at the beginning of the session and negotiation
of cryptographic keys that will be used during the session. Some example of IPsec
includes: ESP, AH, DES, MD5, SHA and DH.
Encapsulating Security Payload (ESP)
ESP is a security protocol that is used to provide confidentiality (encryption),
data origin authentication, integrity, optional anti-replay service, and
limited traffic-flow confidentiality by defeating traffic-flow analysis.
Authentication Header (AH)
AH provides authentication and
integrity to the datagrams that are passed between two systems. This is
achieved by applying a keyed one-way hash function to the datagram to create a
message digest. If any part of the datagram is changed during transit, this
will be detected by the receiver when it performs the same one-way hash
function on the datagram and compares the value of the message digest that the
sender has supplied. The fact that the one-way hash also involves the use of a
secret shared between the two systems means that authenticity can be
guaranteed.
DES Algorithm
DES is used to encrypt and decrypt
packet data; it is capable of turning clear text into cipher text via an encryption
algorithm. The decryption algorithm on the remote end restores clear text from
cipher text. The shared secret keys enable the encryption and decryption of the
packet data. Also, DES uses a 56-bit key, which ensures high-performance
encryption.
Message Digest 5 (MD5)
MD5 is a hash algorithm used to
authenticate packet data. Cisco routers and PIX Firewall uses the MD5 hashed message
authentication code (HMAC) variant that provides an additional level of
hashing. A hash is a one-way encryption algorithm that takes an input message of
arbitrary length and produces a fixed-length output message. MD5 authentication
can also be used by IKE, AH and ESP.
Secure Hash Algorithm 1 (SHA-1)
SHA-1 is a hash algorithm used to
authenticate packet data. Cisco routers and the PIX Firewall use the SHA-1 HMAC
variant, which provides an additional level of hashing. Similar to MD5, SHA-1
authentication can also be used by IKE, AH and ESP.
Diffie-Hellman (D-H)
D-H is a public-key cryptography protocol
which allows two parties to establish a shared secret key that will be used by
encryption algorithms over an insecure communications channel. D-H is used
within IKE to establish session keys. 768-bit and 1024-bit D-H groups are
supported in the Cisco routers and PIX Firewall. The 1024-bit group is more
secure than 768-group.
Monday, May 14, 2012
Authentication, Authorization and Accounting
What is
Authentication, Authorization and Accounting?
Authentication refers to the process where an entity’s
identity is authenticated, usually by providing evidence that represents a
specific digital identity such as an identifier or credentials. Some examples
of credentials include passwords, tokens, digital certificate.
Authorization is the process where it determines if a
particular entity is authorized to carry out an action, usually inherited from
authentication when logging on to an application or service. Authorization may
be determined based on a range of restrictions, for example time-of-day
restrictions, physical location restrictions or multiple access attempts from
the same user or entity. Examples of some common authorization services in
networking includes IP address filtering, address assignment, route assignment,
quality of service/differential services, bandwidth control/traffic management,
compulsory tunnelling to a specific endpoint, and encryption.
Accounting refers to the tracking of network resources used
up by users for the purpose of capacity and trend analysis, cost allocation and
billing. In addition, it may also record events such as authentication and
authorization failures, and include auditing functionality, which permits verifying
the correctness of procedures carried out based on accounting data. Real-time
accounting refers to accounting information that is delivered concurrently with
the consumption of the resources.
Some example of
AAA (Authentication, Authorization, Accounting) usage in CDMA data networks:
AAA servers in CDMA data networks are entities that provide
IP functionality to support the functions of authentication, authorization and
accounting. The AAA server in the CDMA wireless data network architecture is
similar to the HLR in the CDMA wireless voice network architecture.
Some types of AAA servers include:
- Access Network AAA – It communicates with RNC in the Access Network to enable authentication and authorization functions to be performed at the Access Network.
- Broker AAA – Acts as an intermediary to proxy AAA traffic between roaming partner networks.
- Home AAA – The Home AAA stores user profile information, responds to authentication requests, and collects accounting information.
- Visited AAA – The AAA server in the visited network from which a roamer is receiving service. The Visited AAA in the serving network communicates with the Home AAA in a roamer’s home network.
Saturday, May 12, 2012
Context-based access control
Context-based access control, also known as CBAC, is capable
of filtering TCP and UDP packets based on application layer protocol session
information, and also can be used for intranets, extranets and internets. CBAC
can also be configured to allow specified TCP and UDP traffic to travel through
a firewall only when the connection is initiated from the network that requires
protection. Apart from being able to inspect traffic for sessions that
originate from the external network, CBAC is also capable of checking traffic
for sessions that originate from either side of the firewall.
Without CBAC, it limits traffic filtering to only access
list implementations that examine packets at the network layer, or furthest,
the transport layer. However, CBAC examines not only network and transport
layers information but also the application-layer protocol information, such as
FTP connection information, to learn about the state of TCP or UDP session.
This allows support of protocols that involves multiple channels created as a
result of negotiations in the FTP control channel. Most of the multimedia
protocols as well as some of the protocols, such as FTP, RPC, and SQL*NET, involves
multiple control channels.
CBAC inspects traffic that travels through the firewall to
discover and manage state information for TCP and UDP sessions. This state
information is used to create temporary openings in the firewall’s access lists
to allow return traffic and additional data connections for permissible
sessions. And since CBAC does deep packet inspection, it is also considered to
be an IOS Firewall. Apart from the above mentioned services, CBAC also prevent
and detect Denial-of-Service (DoS), and also provide Real-time alerts and audit
trails.
Resources:http://en.wikipedia.org/wiki/Context-based_access_control
Access Control Lists
An access control list, ACL, in a computer file system
refers to a list of permissions accompanying to an object. The purpose of an
ACL is to grant permission/limit access of users and system processes to
objects. Each entry in an ACL specifies the subject and operation. For example,
if a file has an ACL that contains (Ben, update), this would grant Ben the
permission to edit the file. When a subject requests an operation on an object
in an ACL-based security model, the operating system will search for an
applicable entry in the ACL to determine if the requested operation is
authorized. A key issue in the definition of any ACL-based security model is
determining how access control lists are edited, which refers to the users and
processes that are granted permissions access ACL-modification. A filesystem
ACL is a data structure containing entries that specify individual user or
group rights to specific system objects such as programs, processes or files. The
privileges or permissions determine specific access rights, such as whether a
user is able to read from, write to, or execute an object. In some
implementations, an ACE can control whether a user or group of users is
permitted to edit the ACL on an object.
Saturday, May 5, 2012
Secure Perimeter Routers & Disable Services & Logging
A
network is the entry point to your applications. It provides the first
gatekeepers that control access to the various servers in your environment. The
servers are protected by their own OS (Operating System) gatekeepers. However,
it is important not to allow them to be swamped with attacks from the network
layer. In a way, it is also important to ensure that the network gatekeepers
cannot be replaced or reconfigured by unauthorized users. In summary, network
security involves protection of networking devices and the data that they send.
As
we know, the router is the very first line of defence. Apart from routing
packets, they can also be configured to block or filter forwarding of packet
types that are known to be vulnerable or used maliciously, such as ICMP or
Simple Network Management Protocol (SNMP).
The
different types of configurations available for the routers are:
- Patches and updates
- Protocols
- Administrative access
- Services
- Auditing and Logging
- Intrusion detection
By disabling
redundant and inactive services like CDP, TCP and UDP can improve network
security. Many of these services involves security issues, each with it
individual level of risk, where a hacker could make use of these security
loopholes to their own advantage by gathering information about your router or
even attempting to gain unauthorized access. Thus, it is safer to disable inactive
service on the perimeter router in order to avoid unnecessary risks.
Perimeter router logs may be useless in troubleshooting,
capacity planning and dealing with security incidents. For security purposes,
the events to log are interface status changes, system configuration changes,
access list matches, events detected by firewall and intrusion detection
features. System logging events can be reported to various destinations, for
example:
- The system console port, as many console ports are unattended or connected to terminals with no historical storage, this information might not be available to reconstruct a major event.
- Most routers are capable of saving system logging information into a local RAM buffer. The buffer has a fixed size and keeps only the most recent information, and the contents are lost whenever the router is reloaded.
Resources: http://etutorials.org/Networking/Router+firewall+security/Part+II+Managing+Access+to+Routers/Chapter+4.+Disabling+Unnecessary+Services/
http://etutorials.org/Networking/Cisco+Certified+Security+Professional+Certification/Part+II+Securing+the+Network+Perimeter/Chapter+5+Securing+Cisco+Perimeter+Routers/Chapter+Review/
http://etutorials.org/Networking/Cisco+Certified+Security+Professional+Certification/Part+II+Securing+the+Network+Perimeter/Chapter+5+Securing+Cisco+Perimeter+Routers/Event+Logging+on+Perimeter+Routers/
http://msdn.microsoft.com/en-us/library/ff648651.aspx
Common Threats to Router and Switch Physical & Mitigation
In Physical Installations, it basically involves four types
of threat: Hardware, Electrical, Environmental and Maintenance.
Hardware Threats:
It refers to potential threats that will cause physical
damage to the router or switch hardware. Therefore, it is essential to take
note of the following requirements to reduce damage risks:
1.The physical hardware must be locked in a room and only
authorized personnel can access to the room.
2.The room must be secured and cannot be accessed from any windows,
dropped ceiling, or point of entry except for the secured access point.
3.Adopting biometric system where every access to and from the
area will be logged by security systems and monitored by security personnel.
4.Security cameras with automatic recording should be
installed and monitored by security personnel.
Electrical Threats:
It refers to irregular shift in voltage such as brownouts
and voltage spikes. However, these threats, such as voltage spikes, brownout,
power loss, can be limited by following these guidelines mentioned:
1.Install uninterrupted power supply (UPS) system
for important network devices.
2.Install backup generators systems for important
network devices.
3.
Having regular UPS or generator testing and
maintenance.
4.Install redundant power supplies on important
devices.
5.Monitor and alarm power-related parameter at the
power supply and device levels.
Environmental Threats:
Threats include extreme temperature, moisture, electrostatic
and magnetic interference. In order to make sure that these threats do not
affect or deal damage to the network devices, we have to make sure that:
1.The room is being kept in a recommended
temperature and humidity by control systems according to the supplied product
documentation.
2.
Potential sources of electrostatic and magnetic
inference should be removed from the room.
3.A monitor and alarm system should be installed
in the room to alert about the environmental parameters in the room.
Maintenance Threats:
These threats include not having backup parts or components
for critical network components; not labelling components and their cabling correctly.
It also includes inappropriate handling of key electronic components,
electrostatic discharge. Thus, maintenance-related threats are generally a
broad topic as it includes many items. However, it can be prevented by following
the general rules below:
1.Clearly label all equipment cabling and secure
the cabling to the equipment racks to prevent accidental damage, disconnection,
or incorrect termination.
2.Use cable runs, raceways or both to traverse
rack-to-ceiling or rack-to-rack connections.
3.Always follow ESD procedures during replacement
or working with internal router and switch device components.
4. Maintain a stock of critical spares for
emergency use.
5. Do not leave a console connected to and logged
into any console ports. Always log off administrative interfaces when leaving a
station.
6.Do not depend solely on a locked room as the only protection for a device.
Friday, May 4, 2012
Network/Port Address Translation
In networking terms, Network Address Translation, NAT, is
the process of modifying IP Address information in the headers of IP packet
during the movement across a traffic routing device. The most basic type of NAT
provides a one-to-one translation of IP addresses. RFC 2663 type NAT is also
known as the most basic form of NAT. In a basic NAT, only the IP addresses, IP
header checksum and any other higher level checksums that involves IP address
need to be edited, leaving the remaining of the packet untouched. Basic NATs
are usually used when there is a need to interconnect two IP networks with
conflicting addressing. Although it is common to hide an entire IP address
space, usually made up of private IP addresses behind either a single IP
address or in another address space.
As mentioned, NAT enables communication through the router
only when the conversion originates in the masked network, since this creates
the translation tables. However, most up-to-date NAT devices allow the network
administrator to configure translation table entries for permanent use. This is
known as static NAT/port forwarding and it allows traffic from the outside
network to reach their destination host in the masked network.
However, NAT has some grave flaws on the quality of Internet
connectivity and requires careful attention to the details of its
implementation. In particular, all types of NAT break the initial image model
of IP end-to-end connectivity across the Internet and NAPT makes it difficult
for systems behind a NAT to accept incoming communications. Thus NAT traversal
methods have been implemented to ease the problems that occurred.
PAT, which is also known as Port Address Translation, on the other hand
provides most services that are similar to what NAT provides, except that PAT
allows many internal hosts to share a single external IP address and for users
who does not need inbound connection support do not consume public IP addresses
Perimeter Router,Internal Router and Firewall
For today we will be talking about Perimeter Router, Internal Router and Firewall.
Firstly, what is a Perimeter Router? It is actually an interface that has connections to both the inside of the network and with the outside world. Typically, an ISP is at the other end of that connection, and then the Internet.
The perimeter router is responsible of filtering outside
traffic to implement basic security for the dirty DMZ and also the primary
filtering for the inside network. The perimeter router could also be running
the firewall feature set for additional security options.
Since the perimeter router is usually connected to a slower WAN
interface on one side and it doesn’t provide routing functions for internal
networks, the LAN interface speed isn’t as important as making sure decent
memory and features exist to handle the outside connection. Even if the inside
network is 100MB and all protected DMZ interfaces are full-duplex 100MB, if the
Internet connection is a T1 (1.54MB), then a 10MB LAN interface on the
perimeter router shouldn’t interfere traffic. Even most DSL or cable
connections would be below 10MB.
Although bandwidth issues are important, feature sets are more
important on perimeter routers. Routers can clear down to the 800 series
support access list, firewall features, and so forth, making low-end devices
attractive in some perimeter implementations. If intrusion detection features
are needed, though, firewall feature sets for devices below 2600 do not include
intrusion detection. Thus, while a 1700 or 2500 device might be able to handle
the traffic, it will not provide intrusion detection services.
Next,
Firewall is a device that separates or joins the internal
network to the dirty DMZ and any optional protected DMZs. The firewall can be a
router-running firewall feature set, a specialty server with two or more NICs
in different networks, or a specialty device like the Cisco PIX that does
nothing except providing firewall services. While suitable applications exist
for each type of firewall, it is best is to use a dedicated device performing
only security features, and leave routing and serving to other devices.
Unsolicited access from the outside directed to the inside would
typically be blocked. Certain well-thought-out exceptions and configurations
could be created, so e-mail server(s) residing on the inside network, instead
of the DMZ, could still exchange e-mails. Securing this type of connection is
covered in the firewall chapters.
A typical firewall device has two or more LAN interfaces: one for
the inside and outside networks respectively. Optionally, an additional LAN
interface can exist for each protected DMZ network.
Resources:http://etutorials.org/Networking/Cisco+Certified+Security+Professional+Certification/Part+II+Securing+the+Network+Perimeter/Chapter+5+Securing+Cisco+Perimeter+Routers/Perimeter+Router+Terms+and+Concepts/
Resources:http://etutorials.org/Networking/Cisco+Certified+Security+Professional+Certification/Part+II+Securing+the+Network+Perimeter/Chapter+5+Securing+Cisco+Perimeter+Routers/Perimeter+Router+Terms+and+Concepts/
Subscribe to:
Comments (Atom)