Pro Curve Network Security Student Guide
Pro Curve Network Security Student Guide
Student guide
Technical training
Rev. 6.41 i
ProCurve Networking Security Primer
ii Rev. 6.41
Contents
iv Rev. 6.41
Contents
Rev. 6.41 v
ProCurve Networking Security Primer
vi Rev. 6.41
Contents
HIDS....................................................................................................................8-30
Hybrid IDS Solutions ..........................................................................................8-32
Pattern-based Detection.......................................................................................8-33
Rule-based Detection..........................................................................8-33
Signature-based Detection ..................................................................8-34
Disadvantages of Pattern-based Detection .........................................8-34
Anomaly-based Detection ...................................................................................8-35
Network Behavior-based Anomaly Detection (NBAD).....................8-36
Active Response ..................................................................................................8-38
IPS .......................................................................................................................8-39
Content-based Detection .....................................................................................8-44
Rate-based Detection...........................................................................................8-45
Incident Databases...............................................................................................8-47
UTM ....................................................................................................................8-48
Wireless IDS/IPS.................................................................................................8-51
Summary..............................................................................................................8-56
Glossary
Audience
This course is designed for network administrators, network engineers, and
technology professionals who need to learn about threats to network security and
the technologies and methods used to secure networks from attacks and intrusions.
Prerequisites
Before taking this class, students should complete the HP ProCurve Networking
Primer or have a basic understanding of network architecture. Other recommended
courses are:
Internet Routing Fundamentals 5.21 or later
Mobility 4.31 or later
For more information about HP ProCurve training, visit
http://www.hp.com/go/procurvetraining.
Course Objectives
After completing this course, students should be able to:
Explain how the traditional network is evolving to fit today’s business needs
Explain the threats that face the evolving network and why a traditional
network security approach is not sufficient for today’s threats
Describe the common regulatory statutes and layered security solutions that,
if properly implemented, will strengthen your company’s network security
Understand attack vectors
Recognize and understand:
• Attacks that gain confidential information by manipulating the users
• Attacks that force unauthorized access into your network
• Attacks that search your network to discover vulnerabilities that can be
exploited
• Attacks where an attacker impersonates a legitimate network access device
Explain how change auditing, honeypots, and hard drive encryption can be
used to protect stored data
Explain how to use a local user database to secure managed devices
Describe how remote authentication can also be used to protect network
backbone devices
Show how the Secure Shell (SSH) protocol secures communication between
an endpoint and a managed device
Explain how the Secure Sockets Layer (SSL) [Transport Layer Security
(TLS)] protocol can provide secure access to network devices
Show how Secure File Transfer Protocol (SFTP) can be used to safely upload
and download files
Describe the Simple Network Management Protocol version 3 (SNMPv3)
security upgrades
Describe how antivirus software on endpoint devices works to keep the
network safe
Explain what a sandbox is and how it can prevent malware infections
Show how personal firewalls help protect against internal or Web-based attacks
Describe software patches and how they protect a network
Understand how network security solutions monitor and ensure endpoints’
security compliance
Explain the functions of comprehensive security solutions
Describe how network device features such as the following can help secure
a network:
• Bridge Protocol Data Unit (BPDU) blocking
• Dynamic Host Configuration Protocol (DHCP) protection
• dynamic Address Resolution Protocol (ARP) protection
• Virus Throttle™ software
• Simple Network Management Protocol (SNMP) throttle
Describe how an intrusion detection system (IDS) discovers network attacks
Discuss how an intrusion prevention system (IPS) can keep a network secure
Explain how a unified threat management (UTM) device can be a valuable
part of your network security
Show how a wireless IDS/IPS can add an important element of security to
your wireless network
Course Modules
This course contains the following modules:
Module 1 introduces network security and describes the problems associated with
protecting network resources and information.
Module 2 discusses network attacks and introduces six different types of attacks
that can compromise and harm a network.
Module 3 provides a framework for approaching network security issues and
implementing security solutions. This module discusses the proactive/defensive
network security paradigm and introduces the four network security layers.
Module 4 describes the technologies that are used to provide network access
control. These technologies include the AAA framework, the 802.1X
authentication standard, EAP, authentication protocols such as Remote
Authentication Dial-In User Service (RADIUS) and Terminal Access Controller
Access Control System Plus (TACACS+), and other technologies.
Module 5 explains the process behind data encryption and describes how hash
functions and encryption algorithms are used to secure data. This module discusses
information on VPNs, digital certificates, wireless encryption, and hard drive
encryption.
Module 6 focuses on the authentication methods and secure file transfer
technologies that are used to keep network backbone devices secure.
Module 7 discusses software solutions that can be used to protect network
endpoint software, such as personal firewalls, antivirus software, and sandbox
software.
Module 8 describes comprehensive network security solutions that can protect a
network at more than one security layer. This module discusses network security
solutions such as advanced firewalls, IDS/IPS technologies, and UTM solutions.
Further Reading
Because this is an introductory course, the security subjects are only briefly
discussed here. This course provides references to more in-depth information at
the end of each section. Students are encouraged to do their own research on each
of these subjects. Additionally, comprehensive information on network security
can be found in the following books:
Gast, Matthew S. 802.11 Wireless Networks: The Definitive Guide. Second
Edition. O’Reilly: April 2005. ISBN 0596100523..
Hansche, Susan; Berti, John; and Hare, Chris. Official (ISC)2 Guide to the
CISSP Exam. First Edition. Auerbach Publications: 2004. ISBN
084931707X.
Northcutt, Stephen and Novak, Judy. Network Intrusion Detection: An
Analyst’s Handbook. Third Edition. New Riders: August 2002. ISBN
0735712654.
Disclaimer
Objectives
In this course, you will learn about the limitations of traditional network security
and about new technologies designed to overcome these limitations. After
describing common threats to network security, the course will describe proactive
and defensive measures and technologies that can provide a robust security
solution. The course will close with a discussion of comprehensive network
security technologies that incorporate multiple proactive and defensive measures.
This module will introduce you at a high level to both today’s network security
problems and to emerging methods designed to solve them.
After completing this module, you should be able to:
Explain how the traditional network is evolving to fit today’s business needs
Explain the threats that face the evolving network and why a traditional
network security approach is not sufficient for today’s threats
Describe the common regulatory statutes and layered security solutions that,
if properly implemented, will strengthen your company’s network security
Traditional Network
Attacks wreaked havoc on traditional networks through two main doors: the
Internet and employee workstations. Traditional security solutions focused almost
entirely on securing the opening between the untrusted Internet—from which it
was assumed all attacks originated—and the private network, considered
inherently trustworthy. Workstations inside the trusted network were also
considered vulnerable, however, because employees could load infected or
insecure personal software and devices onto them.
Internet
A firewall was the primary means of protecting the traditional network. The
firewall allowed employees to access what they needed on the Internet but blocked
external traffic in accordance with the defined network policy.
Employees accessed private company data on internal servers. Rarely was this data
transmitted over an untrusted network or to unknown users accessing the private
network. With this limited business flow, attacks from the Internet were still a
danger, but a danger against which the firewall was designed to protect.
The firewall, however, did not control traffic from the internal network to the
Internet. Employees could take advantage of the company’s high-speed Internet
access to fulfill personal needs and interests. By accessing Internet email accounts
containing virus attachments or downloading popular songs and games that
contained malware, or otherwise opening security holes, employees often allowed
threats to breach their workstation and then the network. But keeping antivirus
software up to date on each workstation protected the network against most
malware infections.
Workstations
In addition to protecting the network against Internet downloads, network
administrators had to worry about what lurked on the removable media employees
used. Would the floppy disks have a virus? And what kinds of dangers were hiding
on removable drives and CDs? Again, up-to-date antivirus software on each
workstation protected against major attacks.
The traditional network was static: the network administrator knew who connected
to the network and at what ports because employees were assigned to specific
computers and ports. Employees accessed necessary files from their own personal
workstations, which were protected with each employee’s personal password.
These simple desktop computers and an Ethernet connection served most of their
work needs. As a result, administrators could create security policies for network
devices and be confident that users would have access to the correct network
resources.
Each year brings new ways for your company to use technology to increase
productivity: more employees who rely on networking connections and personal
devices to take their work with them wherever they go, and more wireless
networks supporting increasingly mobile workers. However, new technologies
bring new threats that you must confront.
Mobile users can connect to your network via one of three methods:
Temporary access—For example, contractors and temporary employees
may need network rights for several months or weeks only; guests, for a day
or even an hour.
Wireless access—Many companies are realizing the benefits of continuous
network access, access not tied to a particular location. The wireless medium
makes such access possible.
Offsite access—For example, employees might telecommute, using their
home Internet connections to access the company network.
Offering these network access methods can help company productivity, but each
can also open network vulnerabilities.
Guest Users
Customers, vendors, partners, and contractors need to interact and do business
with your company. These users are given access to your network through a guest
user account with limited rights. If the guest account does not use a password,
attackers can log on to your network and easily attack. Often, guest accounts
installed on computers are inactive and unprotected. Attackers can enable the guest
account. Once they are in your system, even with limited access, they can infiltrate
it. Attackers can also provide false information to set up a legitimate guest account
to access company information and connect to any other compromised account
they can find on your network.
1 – 10 Rev. 6.41
Introduction
To accommodate a mobile workforce that needs access to the network at all times,
companies are increasingly providing their employees with laptops. Nearly all of
these laptops are equipped with wireless capabilities. If you add wireless products
to your network to take advantage of these capabilities, you might also open your
network to attack.
Particular characteristics of the wireless medium create particular vulnerabilities.
Shared Medium
Without special measures, wireless access is inherently insecure. In a traditional
Ethernet network, data is more or less confined to the wire; not so in a wireless
network, where anyone with a wireless-enabled device can pluck frames out of the
air. If these frames are not encrypted properly, attackers can easily intercept and
read or corrupt it before it reaches its destination. Even when frames are encrypted,
an attacker can intercept data and decipher it if the encryption relies on the
denigrated, but still-used Wired Equivalent Privacy (WEP) protocol.
Rev. 6.41 1 – 11
ProCurve Network Security Fundamentals
APs
As mentioned earlier, an AP handles all traffic traveling between a wireless
connection and a wired connection. Anyone who can access the AP can hijack a
great deal of traffic. Unfortunately, rogue APs—APs set up without permission
and frequently not in compliance with the company’s wireless local area network
(WLAN) security policies—are frequently connected to a network by well-
intentioned employees looking for convenience and flexibility at work. These
employees unwittingly place the network at risk of attack.
Attackers can also set up rogue APs in order to sniff wireless network traffic and
thereby gain unauthorized access to your network environment. One danger is an
attacker’s ability to overpower a legitimate hotspot AP signal, causing the
employee’s computer to connect to the attacker’s rogue AP because it is the
stronger signal. Once connected, the employee can be sent to a spoofed but
familiar-seeming login page where he or she may give away username and
password login information or inadvertently have his or her wireless device loaded
with Trojans and other security threats that can steal confidential information.
1 – 12 Rev. 6.41
Introduction
Employees can access the company’s network from remote areas such as homes,
hotels, and Internet cafes. Typically, these employees use the Internet to reach
your company. Thus there are many more points of access to your network
through the Internet than there have been in the past. And just as in a wireless
network, any data sent through the Internet can be intercepted and eavesdropped
upon unless it is protected by encryption.
Employees or other users accessing your network offsite pose a number of
additional threats. Other business’s Internet connections or computers could
contain malware that employees transfer when they hook up their laptops to your
private network. In addition, there could be backdoor vulnerabilities on other
business’s devices through which attackers could steal identities or other important
information to gain access to your network. And data that users retrieve from your
company’s Web site—such as images, scripts, portlets, secure information,
personal information, and session-specific data—may be unintentionally cached on
the devices they use and left behind for attackers to access and abuse.
Rev. 6.41 1 – 13
ProCurve Network Security Fundamentals
1 – 14 Rev. 6.41
Introduction
As mobility increases and doors open to allow more business flow onto your
network, attackers are taking advantage by exploiting an increasing number of
vulnerabilities and by increasing the speed of attacks. Consequently, it is easy to
see why contemporary network managers and administrators often feel as if they
are under siege.
Rev. 6.41 1 – 15
ProCurve Network Security Fundamentals
Incidents have become so common that CERT no longer counts them. Typical
incidents include hackers exploiting security weaknesses to access confidential
data, employees opening email attachments that include viruses, and theft of laptop
computers from insecure locations where doors have been left unlocked.
According to the 2005 Malware Report: Executive Summary, in 2005 the financial
impact of viruses worldwide was U.S. $14.2 billion.
Faster Attacks
Given the increasing number of network vulnerabilities, attacks are having a more
immediate and devastating impact:
The Code Red Worm, discovered on July 16, 2001, infected 75,000 hosts in
15 hours, and two years later Slammer, discovered on January 24, 2003,
infected the same number of hosts in only 30 minutes.
As of November 29, 2005, the Sober-Z worm accounted for 1 in 13 emails
traveling across the Internet.
Massive attacks now take as little as 5.5 hours to spread via hundreds of
millions of emails.*
Modern attacks are also more sophisticated because the tools attackers use are
more advanced. These tools include:
Password crackers—Attackers use password crackers to find weak
passwords, crack them, and gain network access to aid in their attacks.
Sniffers—These tools seek out and grab all data and sensitive information
being transferred from one computer to the other.
Sweepers—Sweepers erase files and applications on your computer.
*Commtouch Detection Center January 2006 statistics
Evolving Attacks
Methods that have worked in the past to prevent or manage attacks do not stand up
to today’s sophisticated attacks. Attackers use technologies that are intended to
secure or enhance a network to launch attacks. For example, password crackers
were programs originally intended for network administrators to identify weak
passwords and create more secure ones. As new technologies intended to enhance
the network are developed, attackers will continue to find ways to use them to
compromise network security.
In addition, because of increased use of the Internet for buying, selling, and
entertainment, it is easier now than ever for attackers to bait victims—often your
own employees—with promises of “free” and “new, improved” products. These
offers entice employees to click on a link that exposes them to viruses, worms, or
other kinds of advanced attacks. As the Internet becomes more and more
integrated into everyday business activity, these attacks will continue to increase.
1 – 16 Rev. 6.41
Introduction
Ineffectual Defenses
Despite the increasing volume and velocity of network threats, most companies
still use traditional security products and methods. The 2006 CSI/FBI Computer
Crime and Security Survey revealed the following about a cross-section of U.S.
companies that are older than three years and have more than five employees and
U.S. $1 million in revenue:
Worms and viruses were the most costly incidents—even though 97 percent
of respondents stated they use antivirus software.
Ninety-eight percent of respondents used firewalls and 79 percent said they
use anti-spyware methods, yet almost 10 percent of businesses said that they
suffered 10 or more security incidents.
The top four categories of incidents were virus infections, unauthorized
access, laptop or mobile hardware theft, and theft of proprietary information.
Losses due to such incidents accounted for nearly three-quarters (74.3
percent) of total cyber losses, which exceed U.S. $52 million.
Despite basic network security measures such as firewalls, antivirus software, and
even anti-spyware measures, network attacks continue to be a costly problem.
Additionally, network security has not kept up with issues created by the
increasingly mobile workforce, such as the theft of unsecured information on
mobile devices.
Rev. 6.41 1 – 17
ProCurve Network Security Fundamentals
Insider attacks account for a significant portion of company cyber losses. In the
2006 CSI/FBI Computer Crime and Security Survey, a significant number of the
respondents reported that they believe insider attacks account for a substantial
portion of cyber losses. Awareness of internal threats is growing: more than three-
fourths (77 percent) of respondents reported that employee company security
policy education is very important.
Employees’ lack of security knowledge accounts for large security threats to your
network, opening doors to internal attacks. When employees don’t update antivirus
software—to save time, to avoid slowing down their machines, or because they
simply don’t know how—they create security gaps in your network. Without that
protection on their machines, when they surf the Web or download files, they can
open backdoors into your network or download viruses that will spread throughout
your system. Employees who fail to comply with company policies have always
been a threat, but with the greater freedom employees now have to use and control
their own machines, the threat has increased.
1 – 18 Rev. 6.41
Introduction
Internal attacks can also come from angry employees or other constituents seeking
revenge or gain. Because these insiders have access—sometimes extensive
access—to your network, intentional internal attacks can be even more detrimental
to your company than external attacks.
Whether or not internal attacks are intentional, your network is in danger because
traditional security methods defend from the outside in rather than the inside out,
making it easy for an attack to come from the inside. (For more information on
internal and external attacks, see Module 2—General Threats.)
Rev. 6.41 1 – 19
ProCurve Network Security Fundamentals
As people have become more aware of the necessity to keep information secure,
countries worldwide, including the U.S., Britain, Europe, Canada, Japan, and
Australia, have implemented privacy laws or reinforced existing ones to improve
security standards in company networks. The U.S. government has issued a
number of regulatory statutes to raise security levels in companies of all sizes:
companies using electronic transactions and the Internet to publish personal health
information. (Before HIPAA, some companies were transferring or selling such
information for commercial gain.)
Rev. 6.41 1 – 21
ProCurve Network Security Fundamentals
Personal privacy has long been of concern to member states of the European
Union (EU). As these member states began to legislate electronic privacy
protection in the 1980s and 1990s, the European Commission soon realized that
diverging data protection laws would impede the free flow of data, and therefore
the free flow of trade, within the EU zone. To standardize privacy laws, in 1995
the European Commission proposed the Directive on the Protection of Personal
Data (Directive 95/46/EC). This directive specifies how personal and sensitive
data should be handled. The majority of the directive focuses on the explicit
reasons for which an entity can collect and store personal data. The directive also
includes the specification that stored data must be secured, protected against
accidental loss, and kept for a limited amount of time. Meeting these specifications
necessitates a highly secure and organized network infrastructure.
Directive 95/46/EC was modified and adopted by each EU member state either
through the revision of an existing law or through new legislation. In addition,
countries such as Canada, Australia, and Japan have adopted similar legislation:
Germany—Bundesdatenschutzgesetz (Federal Data Protection Act)
United Kingdom—Data Protection Act of 1998
1 – 22 Rev. 6.41
Introduction
Rev. 6.41 1 – 23
ProCurve Network Security Fundamentals
1 – 24 Rev. 6.41
Introduction
Rather than attempt to fit a single solution over all possible network vulnerabilities
or to smatter disparate solutions across the network, a company must establish
comprehensive network security by implementing proactive and defensive
components in organized layers. Network security is similar to the roof of a
building that must keep the interior dry and protected while constantly being
deluged with water. Most people can’t tell where the leaks are by looking at the
roof: most leaks are only discovered after they let in the rain. If you spend all of
your time bolting patches over specific holes, you’ll spend a lot of time and money
patching problems while the rain continues to trickle in elsewhere.
Similarly, many of today’s companies address security problems as they occur
rather than planning and then implementing a comprehensive solution. These sorts
of bolt-on, single-problem solutions are time consuming and expensive, and
inevitably they address only a single point of failure. Through layering, you can
design and build a roof that has all the elements it needs to keep the rain out.
Layering also allows you to cater your solution to your business’s needs. For
example, the roof of a skyscraper is designed in a very different manner than the
roof of a family home. Similarly, a security solution that works for a small-to-
medium business will be inadequate for a large corporate structure. When you
implement security layers, you can use solutions that fit the needs of your business
and your users.
Rev. 6.41 1 – 25
ProCurve Network Security Fundamentals
Summary
In this module, you learned about how networks have evolved to include not only
more stationary workstations and employees but also mobile devices and workers.
Opening up network access has created many opportunities but has also created
vulnerabilities to ever-increasing attacks. Current security measures alone cannot
protect your network against these threats. You must have a scalable, layered
proactive and defensive security approach to protect every point of your network.
1 – 26 Rev. 6.41
General Threats
Module 2
Objectives
“If you know the enemy and know yourself, you need not fear the result
of a hundred battles.” Sun Tzu, The Art of War, ~500 B.C.
Hacker attacks, employee threats, virus skirmishes, and battles with worms—to
implement successful network security, you must first seek to understand the types
of attacks that threaten your network. While a list of every attack is beyond the
scope of this (or any) course, this module will explore some of the most common
network attacks.
The first part of the module will introduce you to four network attack vectors.
Understanding the origin of an attack and the intentions behind it can help you to
implement the correct type of network protection in the correct network location.
Next, this module will discuss five common network attack types. While these
attack types are by no means comprehensive, learning about them will greatly
increase your understanding of the ways that attackers can infiltrate or damage
your network so that you can protect your network accordingly.
After reading this module, you should be able to:
Understand attack vectors
Recognize and understand:
• Attacks that gain confidential information by manipulating the users
• Attacks that force unauthorized access into your network
• Attacks that search your network to discover vulnerabilities that can be
exploited
• Attacks in which attackers impersonate legitimate network access devices
• Attacks that install malicious software without the knowledge or
consent of the device administrator
• Attacks that infect a network with viruses and worms
• Attacks that inundate a network with traffic to prevent legitimate users
from accessing network resources
Attack Intentions
To appropriately manage intrusions and take the correct preventive measures, it is
important first to classify attack intentions.
Intentional attacks are malicious attempts to harm a network. These attacks target
a particular network either to profit from the information on the network or to
reduce the company’s profitability by damaging company credibility and the
ability to serve customers. Because attackers usually seek to infiltrate or harm a
network using the quickest and dirtiest methods, it is often possible to predict what
files and resources will be attacked. For example, intentional attacks usually target
specific (often crucial) network resources such as OS system files, network
bandwidth, or files that contain customer or employee personal information.
Knowing this, you can predict attacks that target these files and resources and
focus network security around them.
Unintentional attacks are much more difficult to predict because most of these
attacks occur as unexpected side effects of network applications or operating
procedures. Although not created to maliciously injure the network, these side
effects can nevertheless have the same devastating effect as successful intentional
attacks. For example, actions by inexperienced users or administrators can result in
network outages, data loss, or worm infections. To prevent unexpected side
effects, you should use a robust network design and make sure your users and
administrators are well educated.
The attack vectors of external attacks are:
External intentional—In most cases, external attackers will aim attacks at
well-known network vulnerabilities. These attacks are usually stopped by
good perimeter measures such as firewalls. However, not every external
intentional attack is preventable. For example, some zero-day attacks might
be unpreventable because they are designed to exploit vulnerabilities your
security solutions are not configured to address. One hundred percent
protection from external attacks cannot be guaranteed without disconnecting
your network from the Internet. However, a well-planned solution will
eliminate the majority of attacks.
External unintentional—External unintentional attacks are those that
originate outside the network but are not necessarily targeted to harm your
network. While most external unintentional attacks—such as a sudden flood
of time requests to an overwhelmed Network Time Protocol (NTP) server
that results in network devices losing synch—can be easily prevented through
sturdy software and a good network design, some external unintentional
attacks are impossible to predict or prevent. An example is the Slashdot
effect, which occurs when a Web site suddenly becomes too popular for the
bandwidth and hosting devices to handle. This creates an unintentional
denial-of-service (DoS) attack.
Types of Attacks
Social Engineering
Further Reading
For more information on social engineering, see
http://en.wikipedia.org/wiki/Social_engineering_%28computer_securit
y%29, or The Art of Deception: Controlling the Human Element of
Security by Mitnick, Simon, and Wozniak.
Unauthorized Access
Additionally, not all wireless encryption schemes are secure. For example, a
war driver may gain access to a Wired Equivalent Privacy (WEP)-secured
network by intercepting traffic passed between the AP and authorized
wireless device and analyzing the traffic with software that decipher
encryption keys. The encryption key can then be used as a password to access
the network.
Wire tapping—Another way that attackers can gain access to network
information is by tapping the physical data or phone wires. Wiretapping
occurs when a device that intercepts and broadcasts information is placed on
the physical wire. Any intercepted or “tapped” traffic can then be recorded
and analyzed.
Many unauthorized access attacks are quickly discovered using basic network
logging and management software. However, the next attack type introduces a
slightly more elegant way for an attacker to infiltrate your network with decreased
risk of discovery.
Further Reading
For more information on brute force attacks, see
http://en.wikipedia.org/wiki/Brute_force_attack.
For more information on war driving, see
http://en.wikipedia.org/wiki/War_driver.
For more information on wire tapping, see
http://en.wikipedia.org/wiki/Wire_tapping#Internet_wiretapping.
2 – 10 Rev. 6.41
General Threats
Reconnaissance
Rev. 6.41 2 – 11
ProCurve Network Security Fundamentals
Similar to reconnaissance attacks, the next attack type is intended to steal network
information. However, instead of directly searching the network for
vulnerabilities, these attacks try to fool unsuspecting users into revealing private or
sensitive information.
Further Reading
For more information on port scanning, see
http://en.wikipedia.org/wiki/Port_scan.
For more information on the Nmap network mapping software, see
http://en.wikipedia.org/wiki/Nmap and http://www.insecure.org/nmap/.
2 – 12 Rev. 6.41
General Threats
Impersonation: Man-in-the-Middle
Rev. 6.41 2 – 13
ProCurve Network Security Fundamentals
Further Reading
For more information on MITM attacks, see
http://en.wikipedia.org/wiki/Man-in-the-middle.
2 – 14 Rev. 6.41
General Threats
Impersonation: Phishing
Rev. 6.41 2 – 15
ProCurve Network Security Fundamentals
Along with reconnaissance attacks, MITM and phishing attacks focus on gaining
information about your network. The next type of attack, however, infects
endpoint devices with the intent to outright damage the network, steal information,
or use the devices to attack another network.
Further Reading
For more information on phishing, see
http://en.wikipedia.org/wiki/Phishing.
2 – 16 Rev. 6.41
General Threats
Malware
Malware is a term that broadly describes software that is at best a nuisance and at
worst destructive to your network devices. Any software designed to use network
resources or infiltrate network devices without the knowledge or consent of the
device owner is considered malware:
Adware—Adware is software that displays unwanted pop-up ads on an
infected endpoint. While this type of malware may seem innocuous, the
number and repetition of the ads can disrupt productivity and drain network
bandwidth. Some adware programs are extremely difficult to uninstall or
remove. Adware is usually installed using a Trojan. The example above is the
install screen for a desktop theme that also installs several adware programs.
Spyware—Similar to adware, spyware is often installed on an endpoint as
part of a seemingly legitimate program. It, too, is often very difficult to find
and remove once installed and is much more sinister than adware. Rather
than simply displaying unwanted ads, spyware can keep a record of Web sites
visited, keystrokes, and other personal information. This information can then
be used for identity theft or network access. A single network endpoint
infected with spyware can compromise an entire network.
Rev. 6.41 2 – 17
ProCurve Network Security Fundamentals
Further Reading
For more information on adware, see
http://en.wikipedia.org/wiki/Adware.
For more information on spyware, see
http://en.wikipedia.org/wiki/Spyware.
For more information on rootkits, see
http://en.wikipedia.org/wiki/Rootkit.
For more information on Trojan horses, see
http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29.
2 – 18 Rev. 6.41
General Threats
Viruses and worms can spread rampant through an unprotected network and cause
enormous amounts of damage to vital files and network resources. These network
attacks are caused by small, malicious bits of code that self-replicate and
propagate.
Viruses—Viruses are bits of programming code that require a computer file
to act as a host. Viruses spread by inserting copies of themselves into as
many host files as possible, and they spread to other computers when an
infected file is transferred.
Virus code usually includes instructions for destroying programs and
documents on a hard drive. For example, a virus may insert itself into a
required executable file and spread itself to other files as they open. Then,
whenever an infected file is opened, the virus executes a part of its code that
erases large portions of the endpoint’s memory. If spread to a server, viruses
can damage network software and resources while infecting crucial files.
Rev. 6.41 2 – 19
ProCurve Network Security Fundamentals
2 – 20 Rev. 6.41
General Threats
Worm, virus, and malware attacks are the most costly security problems facing
most networks. And some virus and worm attacks can destroy irreplaceable and
mission-critical applications, documents, or network components. The next attack
type, however, can be just as devastating to a network.
Further Reading
For more information on viruses, see
http://en.wikipedia.org/wiki/Computer_virus.
For more information on worms, see
http://en.wikipedia.org/wiki/Computer_worm.
For information on zero-day worms, see
http://en.wikipedia.org/wiki/Zero_day_worm
For information on polymorphic and metamorphic worms, see “On
Deriving Unknown Vulnerabilities from Zero-day Polymorphic and
Metamorphic Worm Exploits” by Chong, Crandall, Su, and Wu,
which can be found at
http://portal.acm.org/citation.cfm?id=1102152&dl=ACM&coll=porta
l&CFID=15151515&CFTOKEN=6184618, or at
http://wwwcsif.cs.ucdavis.edu/~crandall/ccsdacoda.pdf.
Rev. 6.41 2 – 21
ProCurve Network Security Fundamentals
DoS
2 – 22 Rev. 6.41
General Threats
Further Reading
For more information on DoS attacks, see
http://en.wikipedia.org/wiki/Denial-of-service_attack.
For more information about SYN flood DoS attacks, see
http://en.wikipedia.org/wiki/SYN_flood.
For more information on ping smurfing, see
http://en.wikipedia.org/wiki/Smurf_attack.
For more information on ping fraggling, see
http://en.wikipedia.org/wiki/Fraggle_attack.
Rev. 6.41 2 – 23
ProCurve Network Security Fundamentals
Rather than sending traffic directly from the attacker to the attack target, a
distributed DoS (DDoS) attack involves sending seemingly legitimate traffic from
many sources to a target network. The purpose behind a DDoS attack is to use
Internet-connected devices to leverage the power of a DoS attack and disguise the
attack source. The process is as follows:
1. An attacker distributes malware to thousands or millions of unsuspecting
Internet-connected endpoints. This malware is often spread using worms.
These worms include spyware that opens a network backdoor, allowing the
attacker to control certain aspects of the infected endpoints. These infected
endpoints are called zombies.
2. The attack begins when the attacker sends a particular packet to the zombie
endpoints. Using the backdoor access created by the malware, the attacker is
able to control the zombie endpoints, which become unwilling attack
participants.
3. Now activated by the attacker, the zombies begin to send large amounts of
traffic to the attack target. The number of zombie computers can exceed one
million and can quickly overwhelm the target network’s resources.
2 – 24 Rev. 6.41
General Threats
A DDoS attack can create network outages for both the target network and the
zombie endpoint networks. And because the attacker hides behind the zombie
traffic sources, tracing and catching the attacker is much more difficult.
The next section details a third type of DoS attack, reflected DDoS, which is less
draining on zombie devices, but is vastly more devastating to the target and makes
tracing the attacker exponentially more difficult.
Rev. 6.41 2 – 25
ProCurve Network Security Fundamentals
To amplify the amount of traffic involved in a DDoS attack, DDoS attackers can
employ a second layer of devices between themselves and the attack target. This
second layer is composed of reflectors.
Reflectors are network devices that generate return traffic to acknowledge the
receipt of a request, such as the generation of a SYN-ACK in response to a SYN
request. The most common Internet reflectors in a reflected DDoS attack are Web
servers, Domain Name System (DNS) servers, and routers. A reflected DDoS
attack follows these steps:
1. The attacker installs malware on thousands or even millions of Internet
endpoints. These endpoints then become zombies.
2. The attack begins when the attacker accesses the zombie endpoints through
the malware-created backdoor.
3. The zombies begin to generate and send traffic. However, unlike DDoS attacks
in which the zombie computers send traffic directly to the attack target, reflected
DDoS zombies send traffic to Internet reflectors using the target’s spoofed IP
address as the traffic source.
4. The reflectors flood the target network with traffic.
2 – 26 Rev. 6.41
General Threats
Rather than each zombie sending a large amount of traffic, which can cripple the
zombie endpoint’s network, zombies need only send traffic to a couple of reflectors
for the attack to succeed. And the large number of zombies and use of reflectors
makes tracing the source of a reflected DDoS attack extremely difficult.
Further Reading
For more information on DDoS attacks and reflected DDoS attacks,
see
http://www.linuxsecurity.com/resource_files/intrusion_detection/ddos-
whitepaper.html.
Rev. 6.41 2 – 27
ProCurve Network Security Fundamentals
Summary
The attack types that have been discussed in this module are intended as a guide to
understanding the kinds of problems that you face in securing a network.
However, with all the different attacks that can threaten your network, it would
take a lifetime to think of every possible way to exploit a network and plug each
hole. Rather than consider each attack one by one, you can apply network security
in a layered, organized manner. The next module will discuss four layers of
network security that can be used to create a comprehensive security solution.
2 – 28 Rev. 6.41
Security Layers Overview
Module 3
Objectives
To protect your network from attacks, both the many known and the as-yet-
unknown, you will need an organized method to implement network security.
Network security can be broken down into four layers, each of which can help to
protect against particular network vulnerabilities. In this module, you will be
briefly introduced to the four main network security layers and to comprehensive
security solutions. Comprehensive security solutions are security measures that
handle two or more of the network security layers. Each of the layers will be
discussed in greater detail in later modules, and the course will close with an in-
depth discussion of comprehensive security solutions.
After reading this chapter, you should be able to:
Explain proactive and defensive security components used to protect your
network
Describe the Network Access Control Security layer and give examples of
methods for controlling access to your network
Describe the Data Integrity and Privacy layer and methods used to keep
network data secure
Identify the Device Access Security layer and explain why access to managed
devices must be secured
Identify the Endpoint Integrity layer and explain why endpoint devices must
be protected
Give examples of security solutions that cover more than one network
security layer
Proactive Components
To prevent a burglar from vandalizing or stealing from your business, you can
restrict entry to the building where your business is located. Network security
begins the same way: to prevent an attacker from breaking in and stealing or
destroying data, begin by controlling who and what devices gain entry to your
network and by making sure that the only endpoints that connect to the network
are known, approved, and trusted.
The Network Access Control Security layer focuses on methods to prevent
attackers from gaining entry, or access, to your network. At this layer, you will use
technologies that can verify an endpoint’s identity (authentication), grant the
endpoint limited access (authorization), and keep a record of what the endpoint
accesses (accounting).
Before an endpoint connects to the network and requests access to network resources,
network devices can require it to authenticate. The process for authenticating an
endpoint includes verifying its identity through passwords or digital certificates and
policies stored on authentication servers. After an endpoint’s identity has been
established, the network device may then restrict the endpoint’s access to network
resources using virtual local area networks (VLANs) or host-based access control lists
(ACLs). And for auditing and prevention purposes, records of all endpoint connect
attempts may be logged using a Remote Authentication Dial-In User Service
(RADIUS) accounting server.
Further Reading
For more information on access control, including information on
VLANs, ACLs, authentication, authorization, and accounting, see
Module 4—Layer 1: Network Access Control Security.
The Data Integrity and Privacy layer focuses on securing data as it is stored or
as it transits the network. At this layer, you will implement encryption
algorithms (such as the Advanced Encryption Standard [AES] or Triple Data
Encryption Standard [3DES]) on the data to ensure that it cannot be
eavesdropped on, and hash functions (such as the Secure Hash Algorithm
[SHA-1] or Message Digest 5 [MD5]) on the data to ensure that it has not been
tampered with.
While data security measures can protect the data itself, attackers may still be able
to open a network security hole by gaining access to the network devices. To
protect against such attacks, your network should incorporate defensive network
security components, which provide security and attack immunity for your
network devices.
Further Reading
For more information on data integrity and privacy, including
information on encryption, see Module 5—Layer 2: Data Integrity
and Privacy.
Defensive Components
Another way that a burglar can overcome security is by subverting the measures
already in place, such as security guards, surveillance cameras, or other devices.
For example, in many court cases, impartial trial jurors form the backbone of the
trial system. If an attacker were able to subvert one of the trial jurors, the attacker
could get private information about the case, or the attacker could attempt to sway
the juror’s decision with inappropriate or incorrect information. To protect the
jurors’ impartiality and safety, they are quarantined and guarded.
In a network, an attacker may attempt to gain management access to a network
device such as a router, switch, or server with the intent to reconfigure the device to
allow unlimited access to network resources. For example, unauthorized access to a
switch may allow an attacker to reconfigure a VLAN (in the slide, VLAN 164) that
opens a severe network security hole.
The Device Access Security layer focuses on protecting managed network devices
that serve as network security checkpoints. Under the control of an attacker, these
devices can cause devastating problems in your network, including group or
network outages, unauthorized access, and untraceable theft of information. You
can protect managed devices by requiring login authentication and by limiting
unsecured methods of access.
To establish a terminal management session with the device, you will either need
to connect directly to the device using a cable, or you will need to establish a
remote session using a Web browser, Telnet, or Secure Shell (SSH) session. The
device, however, can require authentication using passwords or digital certificates
to the device itself or to an external authentication server. (For more information
on authentication methods, see Module 4—Layer 1: Network Access Control
Security.) The device can also be configured to reject unsecured Telnet or HTTP
sessions to ensure that management passwords and traffic are kept secure.
Further Reading
For more information on device access security, including information
on Telnet, SSH, and HTTP, see Module 6—Layer 3: Device Access
Security.
Endpoint Integrity
Despite good building security, a motivated burglar will look for ways to
circumvent perimeter defense. One way to get around perimeter security is to use
authorized employees to get information about the business and about the building
that houses the business. For example, a burglar may subvert an employee to tell
him about the building layout or use an unsuspecting employee to carry a camera
or microphone inside the building.
Employee subversion is a very uncommon occurrence in most businesses, but
endpoint subversion by using an authorized host (usually an endpoint device) to
act as a carrier is a common way that network attacks can overcome network
access layer security. For example, an endpoint device may include malware,
worms, viruses, or spyware that can infect the network and compromise security.
A computer that is not running a personal firewall may become vulnerable to
attacks that can carry over to your LAN. Workstations that do not have the most
current OS patches are susceptible to attacks that exploit well-known software
vulnerabilities. Antivirus software that is not up to date may leave a laptop open to
newer viruses and worms.
3 – 10 Rev. 6.41
Protection Layers
The Endpoint Integrity layer of network security protects endpoint devices from
knowingly or unknowingly infecting the network. At this layer, you will ensure
that endpoint devices have the appropriate personal firewall, antivirus software,
OS patches, and monitoring agents to secure the network against vulnerabilities
opened by endpoint devices.
You should now understand the four layers that build a secure network. The next
four modules will discuss each of these layers in depth.
As you create a multi-layered approach to your network security, you will discover
that many solutions address security at one particular layer. To maintain granular
control over your network solution, you may want to implement one solution for
each security layer. However, for simplicity, you may want to consider a single
solution that secures more than one layer.
Further Reading
For more information on ways you can keep network endpoints
secure, including antivirus software, firewalls, and OS patches, see
Module 7—Layer 4: Endpoint Integrity.
Rev. 6.41 3 – 11
ProCurve Network Security Fundamentals
The best network security comes from implementing measures at all four security
layers. However, using a separate system for each layer can create a management
and compatibility nightmare. For example, going back to the burglar scenario,
suppose your company decides to outsource each layer of security to a separate
company. You must devote time and money to monitor and audit the behavior of
each company, ensuring that the security measures are being adjusted to fit
changing policies, evolving company infrastructure, and new security threats. A
far better solution would be to outsource security to a single company that
provides a comprehensive solution.
Similarly, by integrating all four security layers—the Network Access Control
Security layer, the Data Integrity and Privacy layer, the Device Access Security layer,
and the Endpoint Integrity layer—you can protect your network at multiple layers
from multiple types of attacks.
In addition, even after deploying network solutions at all four layers, your network
is vulnerable to new and evolving attacks. To mitigate this vulnerability, you can
deploy comprehensive security solutions that cover multiple layers. These
comprehensive solutions include intrusion detection systems/intrusion prevention
systems (IDS/IPS) and unified threat management (UTM) solutions, among others.
Each of these solution devices or mechanisms allows you to simultaneously
protect multiple layers of your network.
3 – 12 Rev. 6.41
Protection Layers
Further Reading
For more information on comprehensive network solutions such as
IDSs, IPSs, and UTM devices, see Module 8—Comprehensive
Security Solutions.
Rev. 6.41 3 – 13
ProCurve Network Security Fundamentals
Summary
In this module, you were introduced to the four network security layers. You
should now be familiar with network access security, endpoint integrity, data
integrity and privacy, and device access security. You should also be aware of
some comprehensive security solutions that span multiple security layers.
While it takes a great deal of time and effort for a burglar to physically infiltrate a
company, network infiltration requires much less effort. Attacks are real and can
occur for a much less sinister reason than corporate espionage. To ensure your
company's network integrity, you should implement security solutions in multiple
security layers. Specific security solutions at each layer will be discussed in the
next four modules.
3 – 14 Rev. 6.41
Layer 1: Network Access Control Security
Module 4
Objectives
This module explains how network devices identify each user that connects to the
network (authentication) and enforce the appropriate network rights for that user
(authorization). It also describes the wide array of technologies for monitoring
traffic at levels ranging from the packet header to the packet content.
By the time you have completed this module, you should be able to:
List advantages and disadvantages for several types of authentication
credentials
Describe authentication protocols, outlining in particular the Extensible
Authentication Protocol (EAP) process
Describe the Authentication, Authorization, and Accounting (AAA)
framework
Explain the roles of supplicant, authenticator, and authentication server in
802.1X authentication
List several types of access controls and explain how a network device
applies them to a user
Identify other ways of filtering network traffic, including firewalls and
content filtering
The previous slide outlined a process for controlling users’ network rights through
authentication and access control. This slide illustrates other security technologies
that filter traffic, including:
Firewalls—Firewalls stand between a device and untrusted devices, often a
WAN router and the Internet, and filter traffic.
Access control lists (ACLs)—If a user has the correct credentials and is
allowed to enter the network, ACLs determine which devices he is allowed to
use and what applications and data he can access within the network.
Content filters—For example, a Web filter can block Web traffic to sites
that include particular forbidden keywords.
Firewalls, ACLs, and content filters will be discussed in detail later in this module.
Authentication Credentials
You can identify yourself in many different ways: give your name, show an ID
badge, tell information an imposter would not know. In the networking world, a
user can also submit many different forms of authentication: a password, a number
displayed on a token card, a fingerprint. In the end, all authentication techniques
rely on the user’s client software submitting a value the authentication server has
previously associated with the user.
The client can derive this value based on:
something the user knows
something the user has
something the user is
The weakest authentication techniques use only one of these methods (typically
the first), while stronger techniques combine several.
To pass the guard, you must first answer his questions satisfactorily—an old
authentication scheme. Most traditional authentication solutions use a single form
of credentials: a shared secret. You are presumed to be someone because you know
something. When withdrawing money from an automated teller machine (ATM),
the secret can be your credit card’s personal identification number (PIN).
In the networking world, the secret is typically a password, stored on a server and
known by the user. When a user must authenticate herself, she enters her
password. The server receives the password and verifies that it matches the one
stored for that user.
Passwords are convenient network credentials because they are portable (you carry
them in your head), and as data, they are easily transferred through a system
designed to carry data.
Unfortunately, shared secrets have a way of ceasing to be secret. Nothing is so
easily spread as information. Users may write down their passwords where anyone
can find them; they may tell them to friends and family members. Users often
select easily guessed passwords such as birthdays, children’s names, and favorites.
In addition, passwords that are not changed frequently be can be collected by
hackers.
On the other hand, your certificate is only as trusted as your CA is trusted, and
purchasing certificates from reputable CAs can be expensive, while deploying
certificates to many endpoints can be time consuming.
Although X.509 was created as part of the X.500 standard (which will be
discussed in detail later in this module) to provide strong authentication, it has
become the de facto standard for digital certificates used in other security
implementations as well.
Two-factor Authentication
4 – 10 Rev. 6.41
Layer 1: Network Access Control Security
A token is a physical object the user must have in order to authenticate. At its most
literal level, such an object would be, for example, a key a user would insert in a
lock before he could access a keypad and enter a password.
In the networking world, the physical object is almost always some form of token
card. The user can either enter a value read from the card as a password, or the
card itself can generate and submit authentication credentials.
Using tokens in addition to passwords typically provides the two security
enhancements explained below.
Non-Reproducible Credentials
A password is easily copied and transferred. Your password may be stolen and your
network account accessed without your realizing it. If, on the other hand, someone
steals your token, you can at least inform network administrators of the theft.
As hard-to-duplicate physical objects, tokens also prevent users from voluntarily
distributing their credentials to unauthorized users.
Rev. 6.41 4 – 11
ProCurve Network Security Fundamentals
4 – 12 Rev. 6.41
Layer 1: Network Access Control Security
Many companies, including RSA Security Inc., VeriSign, Inc., Bluetooth SIG,
Inc., CRYPTOCard Corp., Booleansoft Inc., and Mykotronx Corp., have
developed tokens. While all tokens are physical objects that allow a user to
retrieve authentication credentials, some require a great deal of user interaction
and others none at all. Some contain complex encryption capabilities, and others
are relatively simple.
Disconnected Tokens
Perhaps the most common type of token, a disconnected token requires the user to
manually input information into whatever client she uses for authentication.
Some tokens display a value on an LCD screen. This value periodically changes in a
non-predictable fashion. (Other tokens change the value only when a user presses a
button.) When a user wants to authenticate, he must manually input the value into
his authentication client along with, if required, his password. The authentication
client or other software generates an OTP from this value. Other tokens can generate
the OTP themselves. For example, in addition to the screen, the token may have a
keypad. You input your password, and the token returns the OTP.
Rev. 6.41 4 – 13
ProCurve Network Security Fundamentals
Because the user reads information from the disconnected token, the token can be
relatively simple and does not require an expensive input device. However,
disconnected tokens have a limited battery life (usually two to four years) and
require more from users and their authentication clients.
Connected Tokens
Connected tokens are installed in a station, offering the advantage of submitting
credentials directly to the user’s authentication client and thus on to the
authentication server.
The most common types are:
Smart cards—Roughly the size of a credit card, the smart card stores a
digital certificate as well as a private key. With its cryptographic capabilities,
the smart card both signs data and verifies signatures. Smart cards may
require expensive input devices called card readers to be installed in a station.
USB tokens—Some USB tokens hold a bank of OTPs. Others store digital
certificates and private keys like a smart card. Because most endpoint devices
now have USB ports, USB tokens are generally easier to use and install than
smart cards. Also, because they do not require card readers, USB tokens tend
to be cheaper.
RSA security is in the process of developing standards for integrated OTP
applications in connected tokens. Among other functions, these standards will
regulate:
the configuration of the token (how the token is programmed with the OTPs
also programmed on the authentication server)
the retrieval of OTPs (how authentication clients retrieve an OTP from a
connected token)
4 – 14 Rev. 6.41
Layer 1: Network Access Control Security
Both passwords and tokens associate individuals with more or less arbitrary
credentials, whether a piece of information or an object. An increasingly important
authentication factor, biometrics attempts to equate users and their credentials by
identifying individuals with something intrinsic to them—a physical characteristic
such as a fingerprint.
Passwords can be intercepted and guessed; tokens can be stolen. A person’s
physical characteristics are (in theory at least) inseparable from him or herself—
unalterable and irreproducible.
The term “biometric” refers to two, closely connected concepts: the physical
characteristics themselves and the process of using those characteristics for
authentication. The first will be discussed on this slide and the second on the next.
Biometric Types
A biometric is the physical characteristic used to identify a user. One of the oldest
biometrics is a fingerprint. Other biometrics—such as voices, faces, and
handwriting—have long been used in day-to-day life, but only relatively recently
as systematic authentication methods. Still other biometrics, such as iris patterns,
are relatively new on all fronts.
Rev. 6.41 4 – 15
ProCurve Network Security Fundamentals
4 – 16 Rev. 6.41
Layer 1: Network Access Control Security
Biometrics: Process
“Biometric” also refers to the process of using a biometric (such as an iris scan) to
authenticate a user. This process breaks down into these general steps:
1. Data collection—A sensor must collect the individual’s biometric and
convert it into digital form.
2. Signal processing—The biometric must then be transformed into a digital
template. Biometric standards define signal processing algorithms, which
should return a unique digital template for each individual.
3. Transfer—The authentication client transmits the digital template to the
authenticator as the user’s credentials. The authenticator transmits the
template to an internal or external server for processing.
4. Matching—The authentication server stores digital templates. Using a
relatively complex algorithm, it determines whether the received digital
template matches a template in its database.
5. Deciding—The authentication server might store a list of templates allowed
to access a system (a white list) or a list of templates barred from the system
(a black list). Based on which list a user’s template matches, the authenticator
decides whether to grant the user access.
Rev. 6.41 4 – 17
ProCurve Network Security Fundamentals
Further Reading
For information on digital certificates, see also these ProCurve
Networking courses:
ProCurve Networking Security
ProCurve WAN Fundamental Technologies
4 – 18 Rev. 6.41
Layer 1: Network Access Control Security
Authentication Protocols
To this point, this module has focused on the various types of authentication
credentials and how users receive these credentials and submit them to an
authentication server.
You must also understand how an authenticator (typically an edge network device
such as a switch or wireless AP) requests these credentials and how an endpoint
returns them. (From this point, it will be assumed that the client retrieves and
submits the credentials, and the authentication client will not be distinguished from
the endpoint as an entity.)
One of several authentication protocols defines this process. You will learn about:
Password Authentication Protocol (PAP)
Challenge-Handshake Authentication Protocol (CHAP), including the more
robust and commonly used Microsoft CHAP version 2 (MS-CHAP v2)
Extensible Authentication Protocol (EAP)
These three protocols were originally designed to authenticate peers on either end
of a Point-to-Point Protocol (PPP) link. EAP, however, has become particularly
important as part of the overall authentication method 802.1X (discussed later in
the module).
Rev. 6.41 4 – 19
ProCurve Network Security Fundamentals
PAP
4 – 20 Rev. 6.41
Layer 1: Network Access Control Security
PAP opens several security vulnerabilities. First, because the endpoint initiates the
process, the authenticator cannot control parameters such as how many times the
endpoint can reattempt to authenticate. Second, the password is sent in plaintext
and can be intercepted. However, to limit the interception window to a point-to-
point link, the authenticator can obfuscate the password with the MD5 hash
function before sending it through the network to a Remote Authentication Dial-In
User Service (RADIUS) server. (RADIUS is the most common AAA protocol. For
more information on RADIUS servers, see the “RADIUS” section of this module.)
Some administrators allow PAP as a final authentication option for endpoints that do
not support more secure protocols. However, you should be wary of such
implementations because a network is only as secure as the least secure protocol.
Rev. 6.41 4 – 21
ProCurve Network Security Fundamentals
CHAP
4 – 22 Rev. 6.41
Layer 1: Network Access Control Security
Because the authenticator must recalculate the hash of the password with various
challenge values, it must be able to extract the password. Therefore, the database
must store the password in plaintext or reversible encrypted form. This
requirement excludes certain types of authentication servers from a network that
uses CHAP.
MS-CHAP v2
Mutual Authentication
In contemporary networks, unauthorized users are not the only danger: users are
also vulnerable to hackers posing as legitimate servers. CHAP provides one-way
authentication. If an endpoint wants to authenticate a server, it must initiate its own
authentication process.
MS-CHAP v2 provides mutual authentication in a single CHAP exchange by
piggybacking a CHAP-Challenge onto the endpoint’s Response packet. When the
authenticator sends a Success packet, it includes its own authentication
information for the endpoint to check.
Rev. 6.41 4 – 23
ProCurve Network Security Fundamentals
4 – 24 Rev. 6.41
Layer 1: Network Access Control Security
EAP
Soon after PAP and CHAP were developed, designers began experimenting with
various authentication methods in environments with rapidly changing needs. For
example, the spread of wireless technologies has driven the quest for robust
authentication in environments with many eavesdroppers. Rather than limiting
such experiments, designers agreed upon an overall framework for authentication
called EAP.
This framework follows the basic three-way handshake of CHAP: challenge,
response, and result (success or failure). EAP was originally defined for PPP
connections. Ethernet networks also use EAP, for example as a part of 802.1X
authentication (discussed later in this module). In this case, EAP must be
encapsulated in Ethernet frames, called EAP over LAN (EAPOL) frames.
Rev. 6.41 4 – 25
ProCurve Network Security Fundamentals
Exchange
The exchange can be quite simple—a two-step request and response—or quite
complex—involving, for example, the negotiation of a secure tunnel to exchange
credentials. In addition, different methods can require different types of
credentials. Unlike PAP and CHAP, therefore, which only use passwords, EAP
can support OTPs, token cards, and digital certificates.
Result
Based on the result of the exchange, the authenticator decides whether the
authentication has succeeded or failed.
4 – 26 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 27
ProCurve Network Security Fundamentals
EAP Methods
EAP Methods
Authenticator
Station
MySecret
Hash EAP Request/MD5
3$ EAP Response/MD5
3$
The least secure EAP methods simply transport the authentication credentials
much as they are transported in CHAP. For example, EAP-MD5 involves an EAP
Request, which indicates the authenticator requires this method, and an EAP
Response, which includes the hash of the user’s password.
EAP-Generic Token Card (EAP-GTC) features a similar two-step exchange.
Traditionally, the authentication credential submitted was a value read from a
token card. However, EAP-GTC can carry simple passwords as well.
The slide illustrates only the MD5-specific portion of an EAP exchange. An entire
exchange would include these packets:
1. An EAP Request/Identity packet that initiates the authentication
2. An EAP Response/Identity packet that indicates the endpoint’s support for
EAP and, perhaps, the user’s identity
3. An EAP Request/MD5 packet that indicates the authenticator requires MD5
authentication
4. An EAP Response/MD5 packet that includes the user’s hashed password
5. An EAP Success or EAP Failure packet, depending on whether this password
is correct
4 – 28 Rev. 6.41
Layer 1: Network Access Control Security
While EAP-MD5 and EAP-GTC meet the basic requirements of EAP, they do not
meet the goal of secure authentication in unsafe, public environments. Nor do they
support mutual authentication—an increasingly important requirement in a world
in which identity thieves mask themselves as legitimate servers.
More secure EAP methods include:
EAP-Transport Layer Security (EAP-TLS)
EAP-Tunneled TLS (EAP-TTLS)
Protected EAP (PEAP)
EAP-TLS
Considered one of the most secure EAP methods, EAP-TLS uses a three-way TLS
handshake to exchange digital certificates and generate encryption keys. By the
end of the process, the endpoint of the connection is not only authenticated, but the
connection itself is also secured with encryption.
Rev. 6.41 4 – 29
ProCurve Network Security Fundamentals
Further Reading
For information on authentication protocols such as PAP, CHAP,
and EAP, see also the ProCurve Fundamental WAN Technologies
course.
4 – 30 Rev. 6.41
Layer 1: Network Access Control Security
AAA
Airport Analogy
This module will, from time to time, compare the AAA model to airport security.
Of course, this comparison cannot hold entirely true, and procedures described
may not match your experiences at the airport. However, by putting technologies
in familiar terms, the analogy will hopefully help you to understand how these
technologies work.
In the analogy of airport security, the area with the arrival and departure gates is
like the private network. Before you can enter this area, airport officials check
your ticket and documents. In an actual airport, you might show your ticket and ID
at one location to check in and later to pass a security checkpoint. For simplicity,
this analogy will discuss you submitting your credentials only once at a check-in
counter.
The officials in the check-in area (who are like the authenticators) force you to
show your documents and ticket before you receive your boarding pass and
proceed deeper into the airport.
Most airports have several check-in counters; you could turn up at any of them.
The airport therefore finds it efficient to keep a central database of reservations.
Officials submit your ticket and identification information to a computer that
verifies you against this central database.
The computer that verifies your reservation is like an authentication server; the
reservation database, like a directory. The computer also acts like an authorization
server if it prints out the gate number on your boarding pass to direct you toward a
certain section of the airport.
4 – 32 Rev. 6.41
Layer 1: Network Access Control Security
Authentication
Rev. 6.41 4 – 33
ProCurve Network Security Fundamentals
Authorization
4 – 34 Rev. 6.41
Layer 1: Network Access Control Security
Time and location—You cannot always predict which users will cause
problems. However, you can create rules that minimize suspicious activity.
For example, you can prevent a typically authorized user from connecting to
the network after normal work hours.
Previous activity—The server might deny or allow a user certain kinds of
network access based on whether the user has logged certain types of activity.
Implementing such a rule relies on the server’s accounting functions as well
as its authorization functions.
The AAA server communicates its authorization decisions to the NAS, which
enforces them using such configurations as:
Virtual local area network (VLAN) assignments—VLANs are logically
independent networks within a network that divide users into separate
broadcast domains, each isolated and relatively secure from the others. Data
cannot enter a VLAN without first being filtered and directed to the correct
endpoint, and VLANs also isolate attacks so a hacker cannot infiltrate an
entire network at once by entering a single VLAN. (For more information on
VLANs, see the “VLANs” section of this module.)
ACLs—If a user has the correct credentials and is allowed to enter the
network, ACLs (the access rules) determine which devices he is allowed to
use and what applications and data he can access within the network. (For
more information on ACLs, see the “ACL” section later in this module.)
Rate limits—Rate limits control the maximum bandwidth for traffic sent or
received on a network interface.
QoS settings—QoS priorities are assigned to packets as they traverse the
network so that packets that must be delivered in real time, such as voice and
video packets, receive higher delivery priority than other packets, creating an
unbroken data flow and higher quality reception.
In the metaphor of the airport, authorization divides checked-in travelers into
different flight and boarding groups by printing information on their boarding
passes. For example, just as an authorization server might divide users into
separate VLANs, the check-in counter computer might mark a traveler to
Singapore’s boarding pass with gate A-37, but the pass for a traveler to Paris with
gate B-12.
Similarly, just as an authorization server can assign rate limits and QoS settings to
user traffic, the check-in counter computer could place handicapped, elderly, and
underage passengers in the first boarding group for their flights. (The officials at
the gates, not the computer itself, will enforce this priority treatment, as do NASs
in the networking world.)
Rev. 6.41 4 – 35
ProCurve Network Security Fundamentals
Accounting
Many network administrators now realize that a single security check is not
sufficient to ensure network security. It is important to authenticate a user when
she connects, but it is also important to monitor what she actually does.
Accounting, the third AAA function, collects information from NASs about users’
activities. The information the NASs report varies widely from protocol to
protocol and implementation to implementation. Some AAA servers can gather
and analyze a great deal of granular information so that you can analyze traffic
patterns and even monitor for suspicious activity. For example, you can view
which network resources various users access.
Other AAA servers simply receive a summary of information about each user’s
connection, including its duration and the resources used. In this case, accounting
facilitates billing by providing information about resource use and only some
degree of network auditing.
In the airport metaphor, video cameras placed throughout the airport provide
accounting. All cameras feed into a central room where officials scan the video for
people behaving suspiciously.
4 – 36 Rev. 6.41
Layer 1: Network Access Control Security
RADIUS
The most common AAA protocol, RADIUS is the transport protocol for
communications between NASs and RADIUS servers. RADIUS servers:
store and check authentication credentials (authenticate)
grant users access rights based on those credentials (authorize)
collect information about the resources a user consumes (account)
At the Transport Layer, RADIUS uses User Datagram Protocol (UDP). While
often considered a less reliable protocol, UDP does offer fast, flexible service:
Servers can quickly open multiple sessions to authenticate many users at once.
You can set retransmission timers more suited to authentication than those of
Transmission Control Protocol (TCP). For example, users must have time to
enter their credentials, but on the other hand, most will not wait more than a
minute to be authenticated.
Any information about a user, an endpoint, and a NAS is valuable. Although
RADIUS does encrypt the password field, it does not encrypt the entire packet.
Rev. 6.41 4 – 37
ProCurve Network Security Fundamentals
4 – 38 Rev. 6.41
Layer 1: Network Access Control Security
RADIUS Authentication
You have already learned about how an authenticator forces an endpoint to submit
a user’s authentication credentials. An authenticator configured for RADIUS
authentication (in AAA terminology, a NAS) translates the endpoint’s response
into RADIUS format and forwards the resulting NAS Access-Request packet to a
RADIUS server. The server then decides whether to accept or reject the response.
RADIUS supports several authentication protocols, including:
PAP
CHAP
EAP, with EAP extensions
Translation
The NAS must format the authentication information it receives from an endpoint
into a RADIUS packet, called the NAS Access-Request. For example, a CHAP
Response packet includes fields for:
a username
a hash
the challenge string used by the endpoint when creating the hash
Rev. 6.41 4 – 39
ProCurve Network Security Fundamentals
The NAS reads the username and copies it to the NAS Access-Request User ID
field. It reads the hash and copies it to the CHAP-Password field.
The NAS also adds relevant information to the NAS Access-Request. For
example, it includes the challenge value in the CHAP Challenge it sent to the
endpoint. The RADIUS server then has all necessary values for hashing the
password.
The NAS should also add information to the request such as the port to which
the endpoint connects (Port ID), its own IP address, and the type of service the
endpoint needs.
Other authentication protocols require slightly different translation. For example,
PAP passwords are copied and encrypted in the RADIUS password field.
RADIUS specifies a special field into which entire EAP messages are copied.
In short, the NAS supplies the RADIUS server with all necessary information for
making its decision to either accept or reject the authentication.
Decision
The server can base its decision on several factors, including:
password
port ID
NAS ID
type of service
The server must factor the password into the decision, and often, if the user’s
password matches the stored password, the server automatically grants the user
access. However, the server might also consider the port and NAS to which the
user connects and the type of service it requests. For example, you might configure
your RADIUS server to restrict guest access to certain workstations in public
locations.
If the server ultimately decides to authenticate the user, it sends an Access-Accept
packet to the NAS. This packet can include attribute-value pairs (AVPs) to control
the user’s traffic; these attributes are discussed as part of RADIUS authorization.
If the server rejects the user’s authentication (whether because her credentials are
incorrect or because she is connecting from an unauthorized location), it sends an
Access-Reject packet. This packet can include an explanation that displays on the
user’s station.
4 – 40 Rev. 6.41
Layer 1: Network Access Control Security
RADIUS Authorization
Rev. 6.41 4 – 41
ProCurve Network Security Fundamentals
4 – 42 Rev. 6.41
Layer 1: Network Access Control Security
RADIUS Accounting
Rev. 6.41 4 – 43
ProCurve Network Security Fundamentals
The Accounting-Request-Stop packet identifies the user in question with its ID. It
then adds one or more of the following fields:
Acct-Input-Octets—the number of bytes the user received
Acct-Output-Octets—the number of bytes the user sent
Acct-Session-Time—the number of seconds the user was connected
Acct-Input-Packets—the number of packets the user received
Acct-Output-Packets—the number of packets the user sent
If RADIUS accounting is used for billing, the RADIUS server can process this
information and forward it to the billing server, which calculates how much the
user should be charged for the services.
Because lost accounting packets are literally lost money, RADIUS takes certain
steps to prevent such losses. A NAS should store and retransmit an Accounting-
Request until the RADIUS server acknowledges it with an Accounting-Response.
4 – 44 Rev. 6.41
Layer 1: Network Access Control Security
TACACS+
Rev. 6.41 4 – 45
ProCurve Network Security Fundamentals
TACACS+ Authentication
START Packets
The NAS starts the exchange when it needs the server to verify authentication
information sent by an endpoint. The START packet includes the authentication
type. TACACS+ supports:
PAP
CHAP
MS-CHAP
The START packet generally also includes a user ID.
4 – 46 Rev. 6.41
Layer 1: Network Access Control Security
REPLY Packets
The TACACS+ server only sends REPLY packets, which fall into two general
categories:
REPLY packets that tell the NAS to continue the exchange—According
to the authentication type in the START packet, REPLY packets request
different types of information. For example, a TACACS+ server that receives
a CHAP request may be programmed to request first the user’s username and
then password.
REPLY packets that tell the NAS to terminate the authentication
session—Once the server has collected enough information, it processes the
information and decides whether to authenticate the user. A terminate
REPLY packet indicates whether the user’s authentication passed or failed.
The flexibility of this scheme—developers can program TACACS+ servers to
request new types of information as well as to process this information in new
ways—helps TACACS+ meet as-yet-unpredicted challenges.
CONTINUE Packets
The NAS sends CONTINUE packets to return the information requested by the
server. The NAS copies this information from authentication responses elicited
from the endpoint. For example, a REPLY packet asks the NAS to get the user’s
password. The NAS copies the user’s password from a CHAP Response and sends
it in the user message field of a CONTINUE packet.
Rev. 6.41 4 – 47
ProCurve Network Security Fundamentals
TACACS+ Authorization
4 – 48 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 49
ProCurve Network Security Fundamentals
TACACS+ Accounting
Like RADIUS accounting, TACACS+ accounting is used primarily for billing and
possibly for tracking network activity and planning for expansion. However,
TACACS+ accounting can also act as a security measure, showing you which
users access which resources.
A NAS sends accounting information whenever it starts or stops granting a user a
particular service or access to a particular resource. For example, the NAS can
send accounting packets when a user connects to the network; it can also send
accounting packets when a user accesses a device and when a user enters a
command into the device’s management interface.
The mechanics of TACACS+ accounting are similar to TACACS+ authorization. A
NAS sends a server a REQUEST packet that indicates a certain resource or service.
However, rather than asking the server to decide whether the user has rights to this
resource, the packet simply reports that the user is accessing it. A REQUEST stop
packet typically includes additional information such as the duration of the service and
the number of bytes or packets the user sent and received.
4 – 50 Rev. 6.41
Layer 1: Network Access Control Security
The TACACS+ server stores and processes the accounting information and, if so
configured, forwards it to a Syslog server.
Reliability is crucial to accounting, and TCP helps to maintain accurate records. In
addition, TACACS+ ensures that servers actually store the information: the server
does not send a RESPONSE packet until it has not only received, but also logged,
the account.
Further Reading
For more information on AAA protocols such as RADIUS and
TACACS+, see the ProCurve Networking Security course.
Rev. 6.41 4 – 51
ProCurve Network Security Fundamentals
Authentication Methods
4 – 52 Rev. 6.41
Layer 1: Network Access Control Security
802.1X
802.1X is the industry standard for port authentication—ensuring that users are
properly identified and controlled as soon as they connect to a network. Developed
primarily for Ethernet, 802.1X has proved vital to wireless networks—which are
designed to provide convenient access to authorized users, but are all too prone to
providing easy access to any user, authorized or not. As part of the wireless
security standard, 802.11i, and of Wi-Fi Protected Access (WPA)/WPA2, 802.1X
promises to become practically mandatory for all enterprises.
802.1X is implemented on ports on edge devices. It activates as soon as the Data
Link Layer for a connection opens:
An Ethernet cable is plugged into a switch, and the link opens.
A wireless endpoint associates with a wireless AP.
802.1X splits the port into two virtual ports:
a controlled port, for which the state depends on a user’s authentication state
an uncontrolled port, which is always open but which can accept only certain
types of traffic
Rev. 6.41 4 – 53
ProCurve Network Security Fundamentals
The controlled port’s default state is closed. The controlled port is like a path with
two drawbridges. Both ends of the link control one “drawbridge.” When both
drawbridges are lowered, the path is accessible to traffic: it opens. When at least
one drawbridge is raised, the port is closed.
By default, the uncontrolled port only accepts EAP traffic. In other words, the user
can authenticate with EAP, but do nothing else until he has completed
authentication.
Note
If the user does not authenticate in time, his workstation might be placed in
the wrong VLAN and receive an incorrect IP address. Or the workstation
might fail to receive an IP address at all. Inexperienced users who do not
know how to check or renew an IP address will be frustrated that they cannot
access the network resources they expect.
Some products that act as 802.1X authenticators allow you to configure a
longer period of time for users to enter their credentials.
4 – 54 Rev. 6.41
Layer 1: Network Access Control Security
802.1X Roles
Supplicant
The supplicant is the device that requests access to a network, or more precisely,
requests that its link be activated. Typically, the supplicant is an endpoint with
either a static Ethernet connection or a mobile wireless connection. However,
network devices such as switches and routers can also be 802.1X supplicants.
Some administrators require new devices to authenticate when added to the
network, which enables supplicants to protect themselves from rogue devices and
provides for mutual authentication.
Rev. 6.41 4 – 55
ProCurve Network Security Fundamentals
Typical rogue devices are APs installed without authorization. As APs have
become cheaper and more common, some employees and low-level administrators
have begun to install unauthorized devices for their own convenience. For
example, employees want Internet access for their laptops in the employee lounge.
Rather than work through the appropriate channels, they simply plug an AP into a
spare Ethernet jack. While the employees may not mean any harm, an unsecured
AP can punch holes in network security. Implementing 802.1X on all ports plugs
the holes before they are created.
Because the supplicant controls one “drawbridge” on the port, the supplicant, as
well as the authenticator, can affect the state of the controlled port. This provision
allows supplicants to protect themselves from rogue devices. It also provides for
mutual authentication. However, unlike an authenticator, the supplicant might
open the controlled port on its side (“lower the drawbridge”) even when the other
endpoint does not authenticate. For example, EAP times out, so the supplicant
assumes that the network does not enforce 802.1X.
Authenticator
The authenticator controls network access for a supplicant at the other end of the
link. In the graphic above, the entire edge device, either a switch or an AP, is
labeled as authenticator. However, an authenticator typically resides within an
individual port on the edge device, deciding whether to open or close its side of
that single controlled port.
The authenticator makes this decision based on the supplicant’s authentication
state. Almost always, an unauthenticated or failed authenticate state signals the
authenticator to close the port while an authenticated state signals it to open
the port.
As shown in the slide, the authenticator and the supplicant use EAP to
communicate, giving the supplicant a chance to change its authentication state.
Typically, the authenticator is responsible for initiating authentication by sending
an EAP Request/Identity packet.
Because some stations activate an Ethernet link before they boot sufficiently for
users to enter their authentication credentials, EAP authentication sometimes
expires. Once the station finally boots, the user would be shut out entirely—
authorized or not. The latest version of 802.1X solves this problem by allowing the
supplicant to initiate EAP with an EAP Start packet.
Authentication Server
The authentication server checks users’ authentication credentials for the authenticator.
In other words, the authentication server decides the user’s authentication state while
(based on this decision) the authenticator decides the port’s activation state.
The role of the authenticator and the authentication server can be played by the
same device. However, a centralized authentication server simplifies database
management.
The authenticator and authentication server communicate with a AAA protocol
(almost always RADIUS, although TACACS+ is theoretically a possibility).
4 – 56 Rev. 6.41
Layer 1: Network Access Control Security
Airport Analogy
In the analogy of the airport, the supplicant is a traveler who wants to check in.
The authenticator is the official at the reservation desk, and the authentication
server is this official’s computer.
An important 802.1X concept is the separation of the role of authenticator and
authentication server. This separation makes sense in terms of the airport analogy.
The computer (the authentication server) actually verifies a traveler’s
reservation—how can each check-in counter official (authenticator) be expected to
keep track of the hundreds of people who have reservations?
In essence, then, the traveler is submitting her name, ID, and ticket directly to the
computer. However, because she does not know how to work this computer (and
would not be allowed access to it even if she did), she passes this information
through the official behind the counter.
Rev. 6.41 4 – 57
ProCurve Network Security Fundamentals
802.1X Process
802.1X Process
Controlled port
1
Uncontrolled port – EAP
Supplicant Authenticator
RADIUS server
EAP Request/Identity 2
3
EAP Response/Identity NAS Access-Request
Username 4
EAP Response/Identity
5
6 EAP Request/METHOD Access-Challenge
EAP Request/METHOD
You should now be able to trace the entire 802.1X process from the time the link
comes up to the time an authenticated user receives full network access—or an
unauthenticated user none. You should keep in mind all that you have learned
about authentication techniques, as well as EAP and AAA protocols. As shown
above, the steps in the authentication process are:
1. The supplicant’s authentication state is unauthenticated. The 802.1X
controlled port is closed. The uncontrolled port allows EAP packets. The
authenticator drops all other packets from the client.
2. The authenticator sends an EAP Request/Identity packet to initiate
authentication.
3. The supplicant responds with an EAP Response/Identity packet containing
the username. (If the supplicant does not support EAP, authentication times
out, and the supplicant cannot connect to the network.)
4. The authenticator repackages the EAP Response/Identity in a AAA protocol
and forwards it to the authentication server. In this example, the network uses
a RADIUS server, so the authenticator sends a NAS Access-Request.
RADIUS includes an AVP field for EAP messages, so the authenticator
simply copies the response into this field. The authenticator also adds other
information such as the user’s identity, the port ID, its own identity, and its
own shared key.
5. The authentication server initiates a certain EAP method. The server might
support several methods and be configured to always try one first, or it might
4 – 58 Rev. 6.41
Layer 1: Network Access Control Security
Airport Analogy
Sometimes it is easier to remember a process if you think of it as a story. For
example, you can follow the 802.1X process through the airport analogy.
Port Deactivation
Recall that 802.1X deactivates the controlled port until authentication is complete.
You can think of this measure as that of a harried official in a busy airport.
Travelers may ask him to check their bags, to tell them about the weather at their
destinations, or to recommend a good airport restaurant. The official refuses to do
anything until he has checked them in.
EAP Process
You should now be familiar with the flexibility of EAP. Perhaps you have witnessed
a similar flexibility at the airport. In a single trip, you might be required to show two
forms of ID at one airport, to show ID and to answer questions about your luggage
at a second airport, and to undergo more intensive searching at a third.
In any case, the official behind the check-in counter will probably start by asking
you your name and entering it into the computer. Similarly, EAP always begins
with an EAP Request/Identity packet. After submitting your name to the computer,
the official can determine what else he must do to check you in. (Note that, in the
analogy, the separation between the roles of authenticator and authentication
server is not perfect. In 802.1X, the authentication server is completely responsible
for verifying the supplicant’s identity. In a world of human interaction, roles are
more fluid.)
Rev. 6.41 4 – 59
ProCurve Network Security Fundamentals
The EAP process completes when the server either accepts or rejects the
supplicant’s authentication. Based on this decision, the authenticator determines its
own action. The slide illustrates the two possible outcomes.
1. The RADIUS server matches the user’s credentials to those stored for the
user in its database. Any other rules (such as time and location) also
permit the user. The server sends the authenticator an Access-Accept
packet, which includes:
• an encapsulated EAP Success that the authenticator forwards to the
supplicant
• optional AVPs to control the supplicant’s network rights
The supplicant’s state is now authenticated, so the authenticator opens the
controlled port. As far as 802.1X authentication is concerned, the supplicant
can now send any traffic into the network. However, if the Access-Accept
packet included any AVPs, the authenticator should apply them to control
this traffic.
The server can also send information necessary for generating an encryption
key with the Access-Accept—another reason 802.1X suits wireless security
needs so well.
4 – 60 Rev. 6.41
Layer 1: Network Access Control Security
Airport Analogy
In the end, airport security decides:
whether you are or are not who you claim to be (verifies your credentials)
whether you do or do not have a reservation (matches you to a policy to see
whether you are allowed to enter)
In real life, of course, the official at the check-in counter decides the first by
looking at your photo ID while the computer decides the second. It is important to
remember that in the networking world both decisions are under the providence of
the authentication server.
Authentication Success
If your documents and reservation check out, you are checked in. At this point,
many officials simply wave you toward other security checkpoints, baggage
checks, and departure gates. Similarly, 802.1X opens a port entirely to
authenticated users.
However, an NAS might receive access controls from a RADIUS server. In an
airport, your boarding pass may similarly affect where you go within the airport
(although in a less rigorous way). For example, boarding passes typically assign
you to a departure gate (just as network users are typically assigned to VLANs).
Authentication Failure
If you fail to pass the check-in procedure—whether because you don’t have a
reservation, you don’t look like the person shown on your ID, or you’ve come too
early for your flight—the computer will not issue you a boarding pass. In airports
with particularly tight security, officials may escort you out of the area.
Rev. 6.41 4 – 61
ProCurve Network Security Fundamentals
Web-Auth
4 – 62 Rev. 6.41
Layer 1: Network Access Control Security
The slide illustrates how the authenticator maintains a white list of IP addresses
unauthenticated users can access such as a private Web server. Some white lists
might also include DHCP and DNS servers. If the user attempts to access an
unauthorized device—for example, the user opens her Web browser and types in
an external Web site—the NAS redirects the traffic to the private Web server. The
user sees a login screen that prompts her to authenticate.
Rev. 6.41 4 – 63
ProCurve Network Security Fundamentals
Web-Auth: Continued
The Web page guides the user through the authentication while the authenticator
handles all behind-the-scenes processes.
In addition to whatever text, logos, and graphics Web administrators design, the
login page includes two fields: one for the username and one for the password.
(Some companies display a guest username and password on the login page so
anyone can receive guest access.)
The authenticator retrieves whatever the user enters in the username field and
places it in the username field of a RADIUS Access-Request PAP packet.
Similarly, it copies the user input in the password field into the password field of
the Access-Request packet (where the password is encrypted for greater security).
Alternatively, the authenticator can use a RADIUS Access-Request CHAP packet.
The authenticator adds any necessary information such as the access port and its
own ID and forwards the packet to the RADIUS server.
The server sends a reply. If it accepts the authentication, the authenticator allows
the user to access all traffic, limited, however, by any AVPs in the Access-Accept.
(For example, if your company freely distributes a guest account on the login page,
you should carefully control this account.) If the server rejects the authentication,
the user remains confined to the limited access granted by the white list.
4 – 64 Rev. 6.41
Layer 1: Network Access Control Security
MAC-Auth
Operating at Layer 2, MAC authentication identifies hardware, not users. For this
reason, it is sometimes downplayed in contemporary security solutions. However,
MAC authentication remains the only choice for devices without user interfaces
and without support for 802.1X.
Note
A device without a user interface may still support 802.1X. For example, many
Voice-over-IP (VoIP) phones support EAP-Subscriber Identity Module (SIM)
and include smart cards automatically configured to send their authentication
credentials. Some network devices such as APs and switches can also act as
802.1X supplicants as well as authenticators.
Rev. 6.41 4 – 65
ProCurve Network Security Fundamentals
As with any other type of credentials, an authenticator can forward MAC addresses to
be checked against a central database—for example, on a RADIUS server.
In this case, the authenticator must forward the credentials exactly as they are
stored in the database.
You should first consider the format. Does the RADIUS server store the address
with or without colons?
Next consider the password for the MAC address. Most applications store the
MAC address as both the username and the password. Some, on the other hand,
use a value such as the service set identifier (SSID) to which a wireless endpoint
connects for its password. In this way, administrators can control which devices
connect to which wireless networks.
You should verify that your authenticator device forwards the correct credentials
in the correct format.
4 – 66 Rev. 6.41
Layer 1: Network Access Control Security
Further Reading
For information on 802.1X, Web-Auth, and MAC authentication,
see also these ProCurve Networking courses:
ProCurve Networking Security
ProCurve Networking Mobility
See also these ProCurve Networking white papers:
Access Control Security Solution
Protecting the Extended Enterprise Network
You can look up these white papers at
http://www.hp.com/rnd/library/a-z_index.htm#Archived.
Rev. 6.41 4 – 67
ProCurve Network Security Fundamentals
Directory Services
To this point, you have learned about security methods in which edge and other
infrastructure devices act as authenticators, as well as network access controllers.
Another security solution is a directory service, which:
organizes network resources into a searchable directory structure
authenticates users who attempt to access network resources
controls access to network resources based on the rights granted to each
authorized user
In a typical directory service implementation, users submit their login credentials
directly to the directory service. The network switches act solely to transport data
from the user to the directory service and visa versa. After users are authenticated,
the directory service handles authorization as well.
A directory service can also integrate with other security solutions, such as 802.1X.
In this implementation, users must first authenticate to an edge device (such as a
switch) before activating the connection at all. When the AAA server verifies the
user’s credentials, it queries the directory server.
4 – 68 Rev. 6.41
Layer 1: Network Access Control Security
In order for users to access a directory service the same way regardless of the
directory type or how it is implemented, two global standards have been created to
secure and ease communication between a user and a directory service:
X.500
Lightweight Directory Access Protocol (LDAP)
Some specific implementations of directory services include:
Microsoft Active Directory
Novell eDirectory
Red Hat Directory Server
Sun Java System Directory Server Enterprise Edition
Rev. 6.41 4 – 69
ProCurve Network Security Fundamentals
The X.500 standard was jointly developed by the International Organization for
Standardization (ISO) and the Consultative Committee for International Telegraph
and Telephone (CCITT). (The CCITT is the predecessor of the International
Telecommunications Union-Telecommunication Standardization Sector [ITU-T].)
Designed to allow companies to organize and manage their network resources,
the X.500 standard outlines a hierarchical directory structure that includes:
The tree—The tree is the entire directory structure. If you compare using a
directory for organizing network resources with using a file cabinet for
organizing paper documents, the tree is the room that contains the file
cabinet.
The root—The root is the file cabinet itself. In the hierarchical X.500 tree,
nothing is superior to the root; it contains the entire directory. In a X.500
implementation for a particular company, the company name could be
the root.
4 – 70 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 71
ProCurve Network Security Fundamentals
The X.500 standard defines agents, which enable communication between a user
and the servers that hold the directory information base (DIB):
Directory User Agent (DUA)—The DUA runs on the endpoint, enabling an
authorized user to perform the operations for which he has rights. For
example, with the appropriate rights, a user can access, read, search, or
modify information in the directory tree.
Directory System Agent (DSA)—The DSA runs on servers that hold the
DIB. In addition to responding to queries from DUAs, a DSA communicates
with other DSAs in the directory tree.
The DUAs and DSAs use X.500 protocols to communicate with each other:
Directory Access Protocol (DAP)—DAP enables communication between a
DUA and a DSA. DAP defines the operations users can perform, including
read, search, and modify.
Directory System Protocol (DSP)—DSP defines the way DSAs
communicate with one another.
4 – 72 Rev. 6.41
Layer 1: Network Access Control Security
DAP uses all the layers of the Open Systems Interconnection (OSI) model, a
characteristic that has made it difficult for vendors to create applications and
directories based on the X.500 standard.
Note
DAP and DSP are only two of the protocols outlined in the X.500 standard.
The standard defines additional protocols to handle specific types of
communications (such as updates) between DSAs.
Rev. 6.41 4 – 73
ProCurve Network Security Fundamentals
X.500 Authentication
In the X.500 standard, the DUA uses the bind operation to establish a session with
the DSA. During this operation, the DUA initiates a connection to the DSA and
submits the user’s login credentials.
The X.500 standard defines two authentication methods:
simple authentication, which requires the user to enter his or her
distinguished name and password
strong authentication, which requires a digital certificate as outlined in the
X.509 standard
4 – 74 Rev. 6.41
Layer 1: Network Access Control Security
To log in to the directory tree, the user must provide his or her password, as well
as his or her distinguished name.
The DUA can transmit the distinguished name and password in plaintext to the
DSA, or the DUA can encrypt it. The X.500 standard does not require encryption.
X.509
With X.509, each X.500 operation and result can be signed to ensure its integrity. In
this process, either the originating user or the server can use its public key, and the
signed request transfers from end to end in the protocol: with the public key, X.500
can check integrity at every step to protect against attackers or intermediate servers
modifying information along the way. (For more information on digital certificates,
see the “Digital Certificates” section of this module.)
Rev. 6.41 4 – 75
ProCurve Network Security Fundamentals
X.500 Authorization
4 – 76 Rev. 6.41
Layer 1: Network Access Control Security
The X.500 access controls are more complex than this simplified description
suggests. What is important to understand, however, is that these access controls
allow the directory service to determine the operations each user can perform on
the different objects in the directory tree.
The X.500 standard also defines administrative models that allow you to delegate
administrative control for portions of the directory tree. For example, you could
grant a network administrator in Chicago all the rights needed to manage the
Chicago container, which includes all of the objects for the network resources and
users in the Chicago office. Although the network administrator has all rights to
the Chicago container, however, you could ensure that he or she does not have any
rights to the London container.
Rev. 6.41 4 – 77
ProCurve Network Security Fundamentals
LDAPv3
The Internet Engineering Task Force (IETF) developed LDAP to overcome one of
the major issues preventing vendors from creating directories and applications that
complied with the X.500 standard. LDAP provides a simplified method for
communications between an endpoint and the directory. LDAP uses TCP/IP
instead of the entire OSI stack to access the directory, eliminating much of the
connection setup and packet-handling overhead of the OSI Session and
Presentation Layers, which DAP requires.
Over time, LDAP has evolved to become more than a lightweight access protocol
for X.500. For example, LDAP makes the directory extensible, allowing vendors
to add new objects or new attributes to entries.
Like X.500, LDAP also defines the operations that users can perform in the
directory tree.
Because LDAP is an open protocol, LDAP-compliant directories should
recognize all applications that support this standard—although you should
always verify support with the vendor. Some of the major directory services that
support LDAP include:
Novell eDirectory
Microsoft Active Directory
Red Hat Directory Server
4 – 78 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 79
ProCurve Network Security Fundamentals
Before requesting information from a directory, an LDAP client must first use the
bind operation to authenticate to an LDAP server. (An LDAP client can represent
a user or an application.) LDAPv3 supports two authentication methods with the
bind operation:
simple authentication
Simple Authentication and Security Layer (SASL)
Simple Authentication
With simple authentication, three types of authentication are possible:
Anonymous authentication—In an anonymous bind operation, the LDAP
client sends a bind request that contains a zero in both the name and the
password values. Provided primarily for LDAP-compliant applications, the
anonymous authentication enables applications to:
• read the directory
• determine the access controls and directory extensions that have been
applied
• determine if SASL authentication methods have been implemented
4 – 80 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 81
ProCurve Network Security Fundamentals
4 – 82 Rev. 6.41
Layer 1: Network Access Control Security
LDAPv3 does not define a standard set of access controls for authorization—
probably because vendors had already defined their own access controls before
LDAPv3 was released. Instead, LDAPv3 supports the access controls implemented
by the various directory service vendors.
LDAPv3 does, however, define the types of operations that LDAP clients can
perform in the directory tree:
• Bind—enables authentication
• Unbind—terminates an LDAP session
• Abandon—terminates an operation that is not completed
• Search—defines the criteria and scope for a search and initiates the lookup
• Compare—compares the attribute value provided by the LDAP client to the
attribute value stored on the LDAP server
• Add—adds a new object
• Delete—deletes an object
Rev. 6.41 4 – 83
ProCurve Network Security Fundamentals
4 – 84 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 85
ProCurve Network Security Fundamentals
Further Reading
For more information about X.500, see DW Chadwick, Understanding
X.500—The Directory, 1994 (http://sec.cs.kent.ac.uk/x500book/).
For more information about LDAPv3, see RFC 4513 (by visiting
http://www.ietf.org and entering the RFC number in the IETF Search
field).
4 – 86 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 87
ProCurve Network Security Fundamentals
Later in the day, she must access a database of financial records and a File
Transfer Protocol (FTP) site in another domain. She’s forgotten the FTP site’s
password, as she has several times. She’ll once again have to contact the IT staff;
if no one is available to resolve her issue, she’ll be forced to do without this
information. To prevent herself from forgetting the password for the financial
records database, she has written it down on a sticky note—a good idea, maybe, as
an aid against forgetfulness, except that anyone who finds the note can freely
browse sensitive information about the company’s customers.
This scenario illustrates two problems that arise when users must enter password
after password throughout the day:
Inefficiency—Instead of immediately accessing necessary resources, users
must wait to once again authenticate. Forgotten passwords may prevent
users from completing work until they receive a new password. Users may
become frustrated by the many passwords they must remember, and the
more passwords each user has, the more calls IT staff will receive about lost
passwords and other authentication problems. On the network administrator
side, managing many accounts is a nightmare, particularly when a user must
be added or deleted from the system.
Decreased security—When users must remember many passwords, they
make those passwords easy to remember—and easy to guess. Users who
write down their passwords might almost as well hand them over to hackers.
SSO solutions reduce the number of passwords users must enter themselves—
ideally to one, although this is not always possible. The mechanics of SSO
solutions, which may need to integrate a great many separate authentications, can
be rather complex. For this course, you simply need to understand the end result of
these mechanisms at a high level.
An SSO solution renders multiple authentications transparent to the user. He signs in
once to the SSO server, and this server handles subsequent authentications for him.
Various SSO solutions implement the service differently. Some have the user log
into a primary domain. The SSO service then passes authentication credentials
directly on to secondary domains.
Others, such as Kerberos, issue tickets to users who have authenticated themselves
to the Kerberos server. Each ticket authorizes the user for a specific service or
resource. For this implementation, the services requiring authentication must
understand and accept Kerberos tickets.
Other SSO solutions tap into a bank of all passwords and credentials associated
with users. The SSO service intercepts requests for authentication and fills in the
necessary information. In addition to storing user credentials securely (far more
securely than on a sticky note), some solutions actually negotiate new credentials
with applications requiring authentication. This ensures that passwords follow
your company’s policies.
4 – 88 Rev. 6.41
Layer 1: Network Access Control Security
Further Reading
For more information on SSO, see the Open Group at
http://www.opengroup.org/security/sso; or see
http://www.wikipedia.org/wiki/Single_sign-on).
For information from various SSO solution vendors, see:
Protocom SecureLogin (http://www.protocom.com)
Citrix Password Manager (http://www.citrix.com, listed with
products and solutions)
Novell SecureLogin (http://www.novell.com, listed with
products)
Rev. 6.41 4 – 89
ProCurve Network Security Fundamentals
Access Control
4 – 90 Rev. 6.41
Layer 1: Network Access Control Security
VLANs
One of the oldest ways of managing and isolating user traffic, VLANs remain an
important security tool—though far from the capstone of security, a foundational
block nonetheless.
In very early LANs, all users were part of the same subnet or broadcast domain.
Any bad traffic could spread throughout the entire network. What did would-be
hackers care for traffic controls, if their traffic could reach servers and
management interfaces without ever having to pass through a device intelligent
enough to filter it?
A VLAN divides users into separate broadcast domains, each isolated and
relatively secure from the others. For example, a network typically includes a
management VLAN, which cordons off all the IP addresses through which you
access and configure network devices from the one or more user VLANs. Traffic
cannot cross a VLAN boundary unless forwarded by a router, which can filter the
traffic appropriately.
Rev. 6.41 4 – 91
ProCurve Network Security Fundamentals
Sometimes the management VLAN is also the default VLAN, into which all newly
connected devices are automatically placed. Such a system places the most trusted
and most sensitive devices (in terms of the havoc a hacker can wreak by accessing
them) with the least trusted devices. Therefore, some administrators create a new
management VLAN and use the default VLAN for currently unused ports. If a
rogue user plugs into an unguarded port, his traffic dead-ends in the default
VLAN.
In contemporary networks, edge devices often filter traffic, and VLANs are far
from the only way to immediately control traffic. However, VLANs remain an
essential way of classifying traffic for the appropriate controls. Intelligently
placing users in VLANs ensures that each user always receives the correct
network rights.
4 – 92 Rev. 6.41
Layer 1: Network Access Control Security
User-Based VLANs
Rev. 6.41 4 – 93
ProCurve Network Security Fundamentals
User-based VLANs offer a third option. Instead of assigning a user to a port and a
port to a VLAN and trusting that the user will stay put, you can remove the
middleman: assign the user to the VLAN and store the assignment on a AAA
server. The server takes over your role (assigning a port to a VLAN depending on
the user who connects to it) and delivers the correct VLAN assignment to the
access port every time a new user authenticates.
4 – 94 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 95
ProCurve Network Security Fundamentals
ACLs
4 – 96 Rev. 6.41
Layer 1: Network Access Control Security
In effect, the ACL controls which devices can access which other devices using
which applications. For example, you want to allow devices in VLAN 100 to
access a private Web server. In an “allow” rule, you enter TCP for the protocol,
specify the address of the VLAN 100 subnet as the IP source address, leave the
source port unspecified, and enter the Web server’s IP address as the IP destination
address and 88 (HTTP) for the destination port.
You can apply ACLs manually to a certain access port to control all traffic on that
connection, or you can apply an ACL to a certain VLAN to control all traffic from
users in that VLAN. You can also apply ACLs to interfaces on a router.
A device today should be able to process hundreds of ACLs.
Rev. 6.41 4 – 97
ProCurve Network Security Fundamentals
User-based ACLs
User-based ACLs
AAA Server
NAS
Monday
Access-Accept
User 1 ACL A AVP-ACL A
AAA Server
NAS
Tuesday
Access-Accept
User 2 ACL B AVP-ACL B
Just as your network can implement user-based VLANs, it can implement user-
based ACLs—and for the same reasons. Users in the same VLAN should typically
receive the same rights, and ACLs do the grunt work of enforcing those rights. A
port without the appropriate ACL is not properly secured, even if it implements
authentication.
User-based ACLs preserve you from devoting all your time to configuring
complicated ACLs that still are not where they need to be.
When the AAA server accepts a user’s authentication, it sends the ACL configured
for that user, ensuring all users receive the correct level of access no matter when,
where, and how they connect to the network.
4 – 98 Rev. 6.41
Layer 1: Network Access Control Security
Rev. 6.41 4 – 99
ProCurve Network Security Fundamentals
Further Reading
For information on ACLs, both manual and user-based, user-based
VLANs, and IDM, see also these ProCurve Networking courses:
ProCurve Networking Security
ProCurve Networking Mobility (for how these policies
integrate with the wireless word)
See also these ProCurve Networking white papers:
Delivering Intelligent Network Access through Identity Driven
Management
IDC Report: Identity and Access Management
ACLs in ProCurve IDM 2.0: Making User-Based Security
More Usable
You can look up these white papers at
http://www.hp.com/rnd/library/a-z_index.htm#Archived.
Firewalls
Firewalls are another security component intrinsic to access control. Sitting at the
network perimeter, a firewall acts as the guardian, filtering and controlling all
traffic flow into a trusted network.
Firewalls can enforce relatively complex access control policies between any
internal and external network—or even between two remote networks that are part
of the same organization. Most often, however, they secure a private network that
connects to the insecure Internet. Firewalls have long shouldered the bulk of
network security, and while the network perimeter is no longer the only
vulnerability, a firewall is still an important security device.
Firewalls filter incoming packets primarily based on header information such as
source and destination network addresses, protocol, and application, or any
combination of these factors. They also screen for packets that display symptoms
indicative of an attack, such as an out-of-order TCP-RST (reset) packet.
Packet-filtering Firewall
Circuit-level Gateway
A packet-filtering firewall is like a guard who lets anyone on his list talk to an
employee. A circuit-level gateway, on the other hand, is like a guard that monitors
the conversation itself. If someone arrives with a “flag” that signals danger—for
example, a bulge in the shape of a gun—the guard will not admit her. If, at any
point during a conversation, the visitor starts acting oddly—speaking gibberish or
out-of-order words—the guard escorts her out. Finally, the guard might stand
between an employee and visitor, passing messages back and forth between them.
A circuit-level gateway protects your network by monitoring TCP handshakes
between untrusted endpoints and trusted clients or servers to determine whether or
not a requested session is legitimate. The gateway can also act as a proxy to
establish the session, communicating with the untrusted endpoint on behalf of the
trusted endpoint. This guardian operates at a more complex layer of the OSI
model—the Session Layer (Layer 5).
Attack Checking
When establishing a session between endpoints, the TCP handshake should
proceed as follows:
1. An endpoint sends a TCP packet with a SYN (synchronize) flag.
2. The server sends a TCP packet with SYN and ACK (acknowledge) flags.
3. The endpoint sends a TCP-ACK packet.
Various denial-of-service (DoS) attacks disrupt this process. For example, a SYN-
flood attacker bombards a server with multiple session requests, but never returns
TCP-ACK packets to finish the handshake. The server soon lacks the resources to
accept legitimate requests. The circuit-level gateway can guard against such an
attack by acting as a proxy. Instead of forwarding an endpoint’s TCP-SYN packet
directly to a server, the firewall returns the SYN-ACK to the endpoint as well as a
cookie that stores information about the session. Only if the endpoint replies with a
TCP-ACK and the correct cookie does the firewall treat the request as legitimate.
Other attackers capitalize on set behaviors elicited by certain TCP flags. The
firewall can drop any SYN packets with unnecessary flags:
URG
RST
FIN
Untrusted endpoints must meet other basic filtering criteria. For example, the DNS
server must be able to locate the client’s IP address and associated Web address.
However, once a requested session is deemed legitimate, the circuit-level gateway
copies and forwards packets back and forth without further filtering them. For this
reason, as with a packet-filtering firewall, a hacker on an untrusted network could
possibly slip malicious packets past the circuit-level gateway.
Proxy Server
A circuit-level gateway can act as a proxy server throughout sessions between
the internal and external endpoint. Such a gateway can optionally translate
source addresses on all outgoing packets so that they appear to have the proxy
server’s IP address. Such a server is also called a NAT server because it
translates internal addresses to a public address.
However, because of their complex screening process, ALGs are less transparent
even than circuit-level gateways. The gateway also requires two separate
connections (from the trusted network to the gateway and from the gateway to the
untrusted network).
The greatest limitation of the ALG is that a separate proxy must exist for each
protocol used in the network. For example, only a Telnet proxy can copy, forward,
and filter Telnet traffic. Thus, if the network relies only on an ALG, incoming and
outgoing packets cannot access services for which there is not a proxy, and the
administrator must modify the gateway’s protocol stack to handle each new
application. Finally, ALGs cannot provide proxies for UDP, Remote Procedure
Call (RPC), and certain other services from common protocol families.
Stateful-inspection Firewall
Attack Checking
In a dynamic state table, the stateful-inspection firewall records the significant
attributes of each connection from start to finish that constitute the state of the
connection:
source and destination TCP and UDP port numbers
TCP sequence numbering
TCP flags
TCP session state based on the RFCed TCP state machine
UDP traffic tracking based on timers
In other words, the firewall compares packets against pre-configured rules and
then checks the table to confirm that the packets are part of a valid, established
connection. If part of an established session, packets are processed rapidly
because the firewall can quickly determine that they belong to the existing, pre-
screened session.
The firewall inspection process relies on the three-way handshake of the TCP
protocol during session initiation. Packets containing the SYN bit are considered
requests for new sessions. If the packet is allowed, the firewall sends back a packet
containing both the SYN and ACK bit. When the endpoint sends back only the
ACK bit, the session is set and recorded in the table. All outgoing packets pass
through the firewall, but only incoming packets that are part of a valid session can
enter, which protects a network against attackers who try to start unsolicited
connections with internal devices.
Once a session ends, its entry in the state table is discarded. Sessions will also time
out if no traffic has passed for a certain period of time, which helps to clear the
state table. A common DoS attack, the SYN flood, occurs when large numbers of
SYN packets are sent to the server in order to overflow the state table, impeding
the server from accepting other connections. Therefore, if a connection does not
send periodic keepalive messages, the firewall times it out and clears it for
protection.
As with an application-level firewall, modern stateful-inspection firewalls are
aware of application-layer protocols, such as FTP and HTTP, and can perform
access-control functions based on these protocols’ specific needs. It uses
application-level filters, called proxies, without significant decease in performance
because devices with modern CPU speeds are capable of performing deep-packet
inspection in reasonable time. These proxies can read the data part of each packet
in order to make more intelligent decisions about the connection.
Stateful-inspection firewalls are transparent to users because they work faster than
other packet screening methods: they require less processing at higher levels and
make allow or deny decisions at lower layers of the OSI model.
Further Reading
For more information about firewalls, see the ProCurve Secure
WAN Router course.
Content Filtering
While firewalls are a necessary component of any security solution, they do not
protect against more sophisticated attacks that can circumvent their access control
and filtering methods. An endpoint protected by a firewall can still be infected by
one of the many threats that slip in via Web-based downloading and surfing—
attack-loaded ads, cookies, and malware included in downloadable programs,
email, or email attachments.
Content filtering is one of the most effective and accurate scanning and filtering
measures to prevent these attacks. Because viruses, worms, and other attacks often
spread through email, it is important to implement security measures that filter and
scan not only email content but also attachments, including Word documents,
PowerPoint presentations, and any other Windows applications or attachments.
Content filtering protects your network from attacks originating from:
the Internet
chat/instant messaging (IM)
email
attachments (including Word, PowerPoint, and other Windows applications)
Because your company’s employees work so closely with the Internet, they can be
threats to your network: with or without realizing it, they can cause large amounts
of damage. An employee could visit a Web site, for example, to download an IM
client he needs to communicate with a business correspondent, or simply surf his
way through a workday. Without the employee’s knowledge, either of these
activities could enable a Trojan horse to enter your system and install itself so that
it will be ready for an attacker to use on demand.
A number of Web-based content filtering methods can help protect your system
against attacks:
keyword filtering
cookie filtering
URL-based/IP address filtering
port filtering
active content filtering
Keyword Filtering
The most basic method of Web-based content filtering is keyword filtering. This
method scans for specific words in the text of a Web page as it is downloaded and
blocks the page if any of the listed words in its database are detected. Keyword
filtering is a less effective way of protecting your system because it cannot take
into account the context for specified character strings that make up the keywords,
and as a result, often blocks perfectly acceptable content. Attackers, on the other
hand, can slip through the filters by modifying words—for example, typing
“w0rd5” instead of “words.”
Because keyword filtering works by scanning only the text portion of Web sites, it
also cannot protect against virus- and worm-laden sites that contain nothing but
non-textual photographs. In addition, photographs themselves can pose security
risks. Hackers are developing ways to breach networks with shell code embedded
into seemingly innocent image files.
Cookie Filtering
Though cookies cannot deliver viruses to your system, it is possible that the Web
sites your company’s employees visit can collect their personal information and
pass it on to third parties through third-party cookies embedded in advertisements
in the Web sites. Cookie filters combat this threat by tracking all changes to your
cookie folder and informing you when you receive a cookie from a third party.
These filters can also transparently delete any cookies you receive that you add to
a cookie black list.
Port Filtering
Peer-to-peer (P2P) file transferring allows your employees to download and use
copyrighted material in a way that violates intellectual property laws or to share
files in a way that violates your company’s security policies—and it also opens the
floodgates to attacks. According to FaceTime Security Labs, in the first quarter of
2006, reported incidents of viruses and security threats via P2P applications, such
as MP3 and AVI file sharing and IM clients, increased by 723 percent over the
previous year. Because these applications open your network ports to shared files
and transform computers into pseudo-servers, they also open your network to
intrusions, data theft, DoS attacks, viruses, and worms. In order to combat these
threats and attacks, you can install security technologies that deny Internet access
to the centralized servers of public IM and P2P servers. Other technologies block
IM and P2P services by detecting the actual IM and P2P packets sent to unknown,
private, or proxy servers, thus preventing the application’s use.
You can filter your incoming emails using the following techniques.
Virus Detection
The means for detecting viruses include:
Antivirus software—The virus-scanning software installed on each endpoint
in your system can scan emails, searching for code snippets that identify
email as infected. Software can scan emails before they enter your inbox and
deny any malicious or seemingly suspicious emails before they damage your
system.
Your system can block any suspicious emails based on specific words or
phrases found in the message subject, message body, and any attachments.
Without this type of filtering, viruses such as the 2000 I Love You virus can
spread rapidly. This virus seemed harmless because its subject line read,
“ILOVEYOU,” but it contained a virus-infested attachment titled “Love-
Letter-For-You.txt.vbs” that destroyed millions of computer systems in a few
short hours.
This software can also check email addresses or message content in known
email addresses to verify that the email’s address and content have not
changed. This integrity checking can either dump emails that no longer match
the recorded address or content quality, or it can restore the email to its pre-
corrupted/infected state.
The software checks for virus-like behavior. For example, viruses commonly
relocate themselves and install themselves as trusted identities. If the
software does detect a virus in your email, it can intercept it and warn you
before the virus does damage.
Antivirus gateway—Antivirus gateways offer additional protection: before
emails enter your network, routers direct them to your antivirus gateway.
There, the gateway scans emails for viruses, and if the emails are safe, it sends
them on to your network. If the email contains a virus, the gateway will send a
notice to the recipient indicating who sent the email (though some new viruses
fake the source) and what virus was embedded in the attachment. The gateway
also tells the recipient what it did to the virus and where to go for more
information on the virus and protections against it.
Spam Filtering
Email filters provide several types of spam filtering:
White list/black list filters—You and your employees can create a list of
approved addresses from the filter accepts messages. Because you place only
safe senders on your white list, attackers’ emails will not reach your
employees and tempt them to click on seemingly harmless links that in reality
contain viruses, worms, or other attacks such as phishing. For instance, your
employee could receive a legitimate-looking email from your IT staff
requesting him to update his login and password details. By clicking on the
links in the email, the employee is taken to an external Web site where he is
asked to enter details that are captured by a phishing script.
Any white-listed messages are delivered to the user’s inbox, but all others are
filtered into a low-priority folder, including mail from spoofers who slightly
change an address to pretend to be legitimate business associates. A white list
filter does place an extra burden on you and employees, though, and could
affect productivity because you are required to maintain an updated white
list. Also, some valid emails that are not on your white list might be sent to
the low-priority mailbox because the filter suspects a threat.
Alternatively, you can set up a black list against incoming email is checked.
When an email reaches your filter, its sending-machine identity is checked
against several identities on the black list. Emails from senders on this list are
dropped. Placing threatening email senders on a blacklist will once again
protect your employees and your company from Internet-born attacks such as
phishing.
Image Filtering
Using a filter, your system can analyze an image or video dataflow based on its
visual features (shape, color, texture). This dataflow is then translated into a digital
signature, or DNA, which is used to identify a number of visual categories that
must be monitored for security purposes. If an image DNA matches that of a virus,
the system either destroys the virus but keeps the email or blocks the email
entirely. If the system keeps the email, it sends the clean version and image to the
recipient.
As discussed previously, employees are often one of the greatest threats your
company faces. A 2006 Proofpoint survey of 294 decision-makers at large U.S.
companies found that more than 1 in 5 outgoing emails in their companies contain
content that poses a legal, financial, or regulatory risk. The most common form of
non-compliant content is messages that contain confidential or proprietary
business information. It is, therefore, imperative to protect your company’s
security with security policies and encryption that target outgoing email.
Encryption
To secure messages between your employees and your business partners or other
trusted entities, you can establish a secure private email network. All email sent
between your mail server and the designated entity travels via TLS or SSL
encrypted tunnels. (For more information on these protocols, see Module 6—
Layer 3: Device Access Security.) All other, non-secured, emails travel through a
different network.
There are currently two protocols that enable email encryption:
• Secure MIME (S/MIME)—The more widely-known protocol,
S/MIME provides authentication, message integrity, non-repudiation of
origin, and data privacy using encryption for email.
• Pretty Good Privacy (PGP)—PGP is incompatible with S/MIME, but
it does encrypt emails using both public-key cryptography and
symmetric key cryptography. It also includes a system that binds the
public key to the user identity.
Further Reading
For more information on Web and content filtering, see
http://www.wikipedia.org/wiki/Content_control_software. You
can research some particular solutions at
http://www.cerberian.com/resources_technology.html and
http://www.cyberoam.com/whitepapers.html.
For more information on malicious code stored in images, see
“Lethal Shell Game” (http://www.darkreading.com, search for the
article title).
Summary
Objectives
Networks are designed to allow users to create and access the information they
need. The challenge of data security is balancing the need to make data available
with the need to protect it. We’ve already discussed ways to make sure that only
permitted users can access the data. In this module, we discuss technologies used
to protect the data itself, both as it is stored and as it is moved through a network.
After reading this module, you should be able to:
Explain how encryption secures data
Describe encryption key management technologies
Identify hash functions and how they are used to secure data
Explain how digital certificates are created and used to ensure data security
Describe virtual private networks (VPNs) and how they are used to ensure
data security
Identify IPv6 security standards that improve the security of forwarded data
Describe wireless encryption standards
Discuss how the 802.1AE standard (MACsec) can protect Layer 2 networks
Explain how change auditing and honeypots can be used to protect stored data
Data Integrity
After you have secured access to your network, you need to employ measures to
protect your data. Your data should remain uncompromised while stored within
your network and as it is forwarded between networks, particularly across the
Internet. Data crossing networks is forwarded through many devices, any of which
can be compromised by an attacker. And even the most protected network will still
be subject to intrusions that place your stored data at risk.
In a corporate environment, a burglar may seek to attack a business by discovering
and altering sensitive company paperwork. For example, a mortgage company
may be transferring to a new office building across town. To protect the mortgage
documents while stored on site, the papers are usually kept in a locked filing
cabinet in a locked room. During the move, however, to prevent the identity theft
problems that could be caused by the loss of these papers, the company may hire
an armored truck to transport them. The mortgage papers would be put into
envelopes, placed in a locked suitcase inside a locked truck, and sent to their
destination. Then, in the unlikely event that attackers are able to capture the truck,
they would be unable to access and alter the contracts unless they had the keys to
open the truck and the lock combination to open the suitcase within.
Encryption Techniques
In this section of the module, we will introduce you to the basics of encryption.
You will learn the elements involved in secure encryption and how these elements
are used to ensure data privacy. You will be introduced to the XOR function: a
logical function that can work as a simple two-way encryption algorithm. This
section will also provide examples of simple encryption and decryption. And
finally, we will discuss hash functions, often enlisted to ensure data integrity.
Encryption Algorithms
Encryption is the art of altering data so that it is recoverable only by the intended
recipient. Therefore, encryption must make the data change complex enough to
prevent unintended access, but not so complex that the recipient cannot reliably
and quickly recover the data.
Most encryption uses a mathematical formula to combine data with strings of
characters. The string of characters is called an encryption key, and the
mathematical formula is called an encryption algorithm. If the recipient knows the
right key, the data can be recovered using the correct algorithm.
When in school, you may have written secret messages that you wanted to pass to
a friend. To prevent intervening note-handlers from reading it, you might have
written it using a code that only you and the friend knew. In the example above, a
basic encryption algorithm “Shift +3” is used to encrypt a message. This algorithm
shifts alphabet letters by three so that A becomes D, B becomes E, and so on. In
this example, the unencrypted (or plaintext) message is “Let’s go to the movies,”
and the encrypted (or ciphertext) message becomes “Ohw’v jr wr wkh prylhv,”
using the Shift +3 algorithm.
This is a very simple example. Encryption algorithms are usually complex
mathematical formulas that allow the data to be recovered easily only if one or
more secret variables are known by both parties. Without knowing the secret
variable, the recipient will find it extremely difficult to decrypt the data.
Exclusive Or
One of the most basic encryption functions is called the “exclusive or” (XOR)
function. A basic XOR operation is a simple way to encrypt a data string using a
key. Most standard encryption algorithms, including Rivest Cipher 4 (RC4),
Advanced Encryption Standard (AES), and Blowfish, involve the XOR function.
This function combines two binary strings, usually data and an encryption key, to
yield an encrypted result. The XOR function is performed bit by bit: the first bits
in each string are XORed together to produce the first bit of the encrypted string,
then the second bits to produce the second bit of the encrypted string, and so on.
The XOR function works by comparing the two bits in question. “Exclusive or”
simply means that one bit of the two can be a particular value, but not both. So if
both bits in the two strings are the same, the result is 0. If the two bits are different,
the result is 1. In the example above, the first bit of both the data string and the key
string is 1. When we XOR them, the result is 0. The second bits in the data string
and the key string are different; the XOR result is 1.
The beauty of the XOR function is that it is symmetric; that is, the same function
can be used to both encrypt and decrypt the data. For example, the 12-digit binary
string 101110001010 and the encryption key 111000101011 are XORed together
to yield 010110100001. If you XOR the result (010110100001) with the
encryption key (111000101011), you recover the original string (101110001010).
Most encryption algorithms are not symmetric—two separate sets of instructions
are used to encrypt and decrypt the data. The next example is a simple encryption
algorithm that specifies separate instructions for encrypting and decrypting
the data.
Encryption
Decryption
Given the ciphertext and the encryption key, we can use the corresponding
decryption algorithm to recover the message:
1. First, the characters in both the ciphertext and the encryption key are
converted into two-digit numbers according to their place in the alphabet
(capital letters having 26 added to their value). For example, the letter E has a
value of 05, but because the character is capitalized, we add 26, giving a total
value of 31.
2. Then, the value of each two-digit number in the encryption key is subtracted
from the value of each number in the ciphertext.
3. The resulting values each correspond to a letter in the alphabet. The original
data is recovered by converting the numbers into alphabetic characters.
You can see from this example that even if someone were to intercept the
encrypted message and figure out the encryption algorithm, it would still be very
difficult for the eavesdropper to recover the message without the encryption key.
In data encryption, the encrypted text is protected by the algorithm and the key.
However, the algorithm used to encrypt a particular bit of data is often openly
declared in the packet header. Therefore, it is very important to closely guard the
encryption keys.
Algorithms
There are two types of encryption algorithms: block ciphers and stream ciphers.
Block ciphers encrypt chunks of data, while stream ciphers encrypt bit by bit.
Block ciphers separate data into chunks, typically 128-bit chunks in contemporary
algorithms. Next, the algorithm encrypts each block and sequences the encrypted
blocks in the packet. The same mathematical algorithm is used on each block, but
the most secure block ciphers use a separate encryption key for each block. Block
ciphers often use a large amount of processing power, but are relatively secure.
Stream ciphers encrypt each bit as it comes, using a slightly different
encryption key for each packet. Stream ciphers require less processing power
and time than block ciphers, but are inherently insecure if an encryption key is
ever used more than once.
Further Reading
For more information on stream ciphers, see
http://en.wikipedia.org/wiki/Stream_cipher.
For more information on block ciphers, see
http://en.wikipedia.org/wiki/Block_cipher.
5 – 10 Rev. 6.41
Layer 2: Data Integrity & Privacy
Hash Functions
Rev. 6.41 5 – 11
ProCurve Network Security Fundamentals
Further Reading
For more information on hash functions, see
http://en.wikipedia.org/wiki/Hash_function.
For information on HMAC, see request for comment (RFC) 2104 at
http://www.rfc-archive.org/getrfc.php?rfc=2104, or see
http://en.wikipedia.org/wiki/HMAC.
5 – 12 Rev. 6.41
Layer 2: Data Integrity & Privacy
Algorithm Security
To protect your network, you should ensure that you stay current on the status of
the encryption algorithms that you are using. Most network encryption
applications rely on one of several standardized encryption algorithms. Public
encryption algorithms are constantly being tested by the cryptographic community
against many types of attacks.
If it can be shown that an encryption key can be recovered from ciphertext, the
algorithm used to protect the ciphertext is said to be broken. Brute force attacks
represent the most difficult and time-consuming method to break an encryption
algorithm: most algorithms require decades of computer-aided analysis to recover
a single encryption key. The object of cryptanalysis, then, is to find a more elegant
method than a brute force attack to recover the encryption key. The ease of an
attack method is measured by the number of mathematical operations it takes to
recover that encryption key. When a brute force attack is not practical, a successful
break uses fewer operations than the number of operations it takes to
systematically try every encryption key.
Rev. 6.41 5 – 13
ProCurve Network Security Fundamentals
Further Reading
For more information on cryptanalysis, see
http://en.wikipedia.org/wiki/Category:Cryptographic_attacks, and
http://www.ssh.com/support/cryptography/.
A CPU cache can be used to attack encryption algorithms that use a
lookup table, such as AES. However, these attacks can only take
place if an attacker has full access to the device. For more
information about CPU cache timing attacks on AES, see “Cache
Attacks and Countermeasures: The Case of AES” by Osvik, Shamir,
and Tromer at
http://www.wisdom.weizmann.ac.il/~tromer/papers/cache.pdf, and
see “Cache Collision Timing Attacks against AES” by Bonneau and
Mironov at http://www.stanford.edu/~jbonneau/AES_timing.pdf.
5 – 14 Rev. 6.41
Layer 2: Data Integrity & Privacy
Key Management
The inherent weakness in data encryption is that the ciphertext is only as secure as
the key protecting it. If a key is leaked, all data encrypted with that key becomes
vulnerable.
Rather than simply picking an arbitrary value for the encryption key, network
devices can calculate a key that is unique to the communicating devices. And
instead of sending the encryption key across a connection (and thus compromising
it), both communicating parties can agree on a secure encryption key based on a
shared secret, as well as a combination of device attributes, such as MAC
addresses, and random numbers that are used only once. The securely generated
keys can then be used to hash, encrypt, and decrypt the data.
There are two types of encryption key schemes: symmetric and asymmetric. The
symmetric key scheme requires both the sender and the recipient to have the
same encryption key. The asymmetric key scheme uses two encryption keys: a
publicly known key that is used to encrypt the data and a private key that is used
to decrypt the data.
This section of the module will introduce you to some of the technologies used to
generate and manage each type of encryption keys.
Rev. 6.41 5 – 15
ProCurve Network Security Fundamentals
The symmetric key scheme uses the same key to both encrypt and decrypt a
packet. It is typically faster and easier to use than the asymmetric key scheme.
However, because only one key is used, using a symmetric key can be less secure:
the lone key must be kept secret.
5 – 16 Rev. 6.41
Layer 2: Data Integrity & Privacy
The asymmetric key scheme allows you to use different keys to encrypt and
decrypt your data: a public key and a private key. The sender uses the recipient’s
public key to encrypt the data and the recipient uses his or her private key to
decrypt it. Each user must have his or her own public/private key pair.
Rev. 6.41 5 – 17
ProCurve Network Security Fundamentals
Asymmetric encryption works because public and private key pairs are
complementary. That is, the public key is mathematically related to the private
key. However, the keys are related in such a way as to make it extremely difficult
to derive the private key from the public key.
5 – 18 Rev. 6.41
Layer 2: Data Integrity & Privacy
KDC
e n Sh
ed cr are
ar b yp d
sh B o t e se
t /
es w et d cr
q u re t cr h A w e
ith t
e
R se c se wit
ed d B
a r te
Sh ryp
c
en
Alice Bob
The challenge with encryption is finding ways to create and exchange encryption
keys or shared secrets in a safe manner. This can be done by receiving keys from a
trusted third party, such as a key distribution center (KDC), or by using a key
exchange algorithm to establish keys. A KDC is used to create and distribute a
shared secret to endpoints from which these endpoints calculate a key to be used in
a symmetric key scheme.
In the example above, Alice wants to communicate securely with Bob, but Alice
and Bob do not have a shared secret. However, Alice and Bob each have a
symmetric encryption key that they share with the KDC server.
How KDC Shared Secret Assignments Work
When Alice and Bob request a shared secret from the KDC, the following steps occur:
1. Alice sends a request to the KDC for a shared secret to communicate with Bob.
2. The KDC calculates a shared secret for the two and sends Alice the shared
secret encrypted with Alice’s KDC symmetric encryption key.
3. The KDC then sends Bob the same shared secret encrypted with Bob’s
KDC symmetric encryption key.
4. Alice and Bob then used the shared secret to create a symmetric
encryption key.
Rev. 6.41 5 – 19
ProCurve Network Security Fundamentals
Diffie-Hellman Exchange
5 – 20 Rev. 6.41
Layer 2: Data Integrity & Privacy
3. P, Q, and each random number are put into a mathematical formula. The
result is sent to the other party. In this example, Alice puts P, Q, and A into
the formula and sends the result, , to Bob. Bob puts P, Q, and B into the
formula and sends the result, Δ, to Alice.
4. The result of putting , P, and A in the formula is the same as the result of
putting Δ, P, and B in the formula. Knowing this, Alice and Bob can solve
for the shared secret, .
Using the shared secret, Alice and Bob can then create symmetric encryption keys.
The Diffie-Hellman exchange does not require the peers to ever transmit any
information that could be used to easily guess or calculate the shared secret.
However, the exchange can be vulnerable to a man-in-the-middle (MITM) attack.
For example:
1. An attacker, Mallory, creates her own random number and puts it into the
mathematical formula to come up with the result, .
2. Mallory intercepts from Alice and substitutes before sending the packet
to Bob. Bob then uses Mallory’s and his Δ to calculate a shared secret.
3. Mallory also intercepts Δ from Bob and substitutes before sending the
packet to Alice. Alice then uses her and Mallory’s to calculate a shared
secret.
4. Mallory calculates two shared secrets, one with Alice and one with Bob.
These shared secrets are used to create symmetric encryption keys.
To protect against MITM attacks, the Diffie-Hellman exchange can be secured
through authentication and asymmetric keys, such as in a public key infrastructure
(PKI) system, which we’ll learn about in a moment. However, on their own,
asymmetric key schemes are still vulnerable to MITM attacks.
Further Reading
For more information on the Diffie-Hellman exchange, see
http://en.wikipedia.org/wiki/Diffie-Hellman and
http://www.rsasecurity.com/rsalabs/node.asp?id=2248.
Rev. 6.41 5 – 21
ProCurve Network Security Fundamentals
When you use an asymmetric key scheme, you trust your data to the peer’s public
key. If a public key has been compromised, anyone holding an associated private
key would be able to decrypt your data. For example, an attacker could create a
public/private key pair and falsely attribute the public key to the peer to which
you’re sending data. Any data that you send using this key is completely open to
the attacker, who holds the private key.
To provide peer authentication and prevent MITM attacks when using the Diffie-
Hellman exchange or other asymmetric key scheme, endpoints can use the PKI
system. PKI is a system that allows a trusted third party to vouch for an endpoint’s
identity by verifying credentials and issuing digital certificates. In this section of
the module, we will discuss digital certificates and how they secure public keys in
an asymmetric key scheme.
5 – 22 Rev. 6.41
Layer 2: Data Integrity & Privacy
Digital Certificates
Digital certificates are data files that prove a particular public encryption key
belongs to the certificate holder. Digital certificate file formats are standardized in
the IETF X.509 standard, and the protocols that support X.509 certificates include
SSL-Transport Layer Security (SSL-TLS), Secure/Multipurpose Internet Mail
Extensions (S/MIME), IP Security (IPsec), Secure Shell (SSH), HTTP over SSL
(HTTPS), Lightweight Directory Access Protocol version 3 (LDAPv3), and
Extensible Authentication Protocol (EAP).
Digital certificates are composed of several parts:
Public key—This is the public encryption key held by the certificate owner.
X.509 version number—This field identifies which X.509 format this
certificate uses. All PKI certificates are version 3.
Certificate serial number—Certificate issuers keep a record of the
certificates they generate. To track these certificates, each certificate is given
a serial number that is unique to the issuer.
Issuer information—This information identifies the certificate issuing
authority in distinguished name format.
Validity—This is the range of dates between which this certificate is valid.
Rev. 6.41 5 – 23
ProCurve Network Security Fundamentals
Further Reading
For more information on PKI and X.509 digital certificates, see RFC
2459 at http://www.rfc-archive.org/getrfc.php?rfc=2459.
5 – 24 Rev. 6.41
Layer 2: Data Integrity & Privacy
Certificate Authorities create, sign, distribute, and revoke digital certificates. CAs,
such as VeriSign, Thawte, and Entrust, must be trusted by both parties: the
certificate is trustworthy only as long as both parties have faith in the CA’s
credibility.
To protect its credibility, CAs maintain the right to revoke or place a hold on the
certificates they issue. Held and revoked certificate serial numbers are published
online in a certificate revocation list (CRL).
A hold is a reversible status. A certificate may be put on hold if the user has
lost the private key and is uncertain whether it has been compromised. If the
private key is found and remains secure, the hold can be reversed and the
certificate’s serial number removed from the CRL. A certificate revocation,
however, is non-reversible.
Certificates may be held or revoked because:
a private key is suspected of being compromised
the user is not the sole possessor of the private key
the certificate holder fails to adhere to CA policy requirements—Certificate
holders must not do anything that brings the credibility of the certificate or
the CA into question.
Rev. 6.41 5 – 25
ProCurve Network Security Fundamentals
The CA’s reputation is based on whether the public key in the certificate belongs
to the certificate holder. This reputation is put on the line with every certificate the
CA signs. Therefore, when the CA receives a request to create a certificate, it
verifies the applicant’s identity. For example, when an applicant applies for an
SSL certificate, the CA requires the applicant to prove the existence of the
business, the ownership of the domain name, and employment status. This
information is then verified using two-factor authentication.
After verifying and authenticating the applicant, the CA digitally signs the
certificate. As described on the next slide, digital signatures are generated in a way
that allows an authenticating party to verify the legitimacy of the certificate.
5 – 26 Rev. 6.41
Layer 2: Data Integrity & Privacy
Digital Signatures
Rev. 6.41 5 – 27
ProCurve Network Security Fundamentals
Certificate Validation
There are three steps to validating a certificate: verifying the signature, verifying
the validity date, and verifying the revocation status.
1. Verify the signature—Certificate signatures are validated using a second
certificate. This certificate, called a root or validation certificate, is a self-
signed certificate verifying the CA’s public key belongs to the CA. The
public key from the root certificate is used to decrypt the certificate signature,
which yields the certificate hash. If the certificate hash in the signature
matches a hash of the entire certificate, the certificate is considered valid.
Validation (root) certificates from well-known CAs such as Thawte and
VeriSign are included in most Web browsers.
2. Verify the validity date—Make sure that the current date falls within the
validity period specified on the certificate.
3. Verify revocation status—Ensure that the certificate serial number is not on
the issuing CA’s CRL.
If all three criteria are met, the certificate is considered valid.
5 – 28 Rev. 6.41
Layer 2: Data Integrity & Privacy
Further Reading
For information on the Online Certification Status Protocol, which
automatically verifies that a certificate is not on a CRL, see RFC 4557
at http://www.rfc-archive.org/getrfc.php?rfc=4557, or see
http://en.wikipedia.org/wiki/Online_Certificate_Status_Protocol.
For more information on proxy certificates, which allow proxy devices
that work on behalf of an endpoint to have the same authenticated
rights as that endpoint, see RFC 3820 at http://www.rfc-
archive.org/getrfc.php?rfc=3820.
Rev. 6.41 5 – 29
ProCurve Network Security Fundamentals
VPNs
Thus far, we have discussed encryption techniques, technologies that are used to
generate and manage encryption keys, and the process by which digital certificates
secure asymmetric key schemes.
The next few sections of the module will introduce you to data security
technologies that use these encryption and key management technologies.
5 – 30 Rev. 6.41
Layer 2: Data Integrity & Privacy
Tunnels
One way to help ensure that data is secure as it is forwarded across the Internet is
to send the data through a tunnel. A tunnel is a virtual point-to-point connection
that is created by encapsulating a packet’s contents inside another protocol. The
data contained in encapsulated packets is not visible to intermediate devices. This
provides the data with an extra layer of anonymity.
Packets that are sent over the Internet are wrapped in many protocol layers. For
example, data for a Web page is usually encapsulated in an Ethernet frame, an IP
header, a TCP header, and an HTTP header, among others. The packet is
forwarded only according to the information on the outer protocol layer. After the
packet is received at the outer layer destination, that protocol layer is stripped off,
and the packet is forwarded to its next destination based on the next layer. This
process continues until the data reaches its intended endpoint. Tunneling protocols
such as Generic Routing Encapsulation (GRE) provide an extra protocol layer that
must be processed by the endpoint before the data can be recovered.
Rev. 6.41 5 – 31
ProCurve Network Security Fundamentals
As an example, imagine that you want to send a birthday card with a special
message to a nephew. You write the message on the inside of the card, sign it,
place it in an envelope, write the address on the outside of the envelope, and give
the envelope to the postal service. The postal service then forwards the card
entirely based on the address on the outside. After the letter arrives at your
nephew’s house, the boy’s mother or father removes the envelope and delivers the
card to him. Your nephew can then open the card and see the message that you
wrote. Encasing the card in an envelope prevents the letter handlers from casually
reading the message inside.
This level of security is fine for most correspondence, but merely encasing the
message on a card in an envelope wouldn’t stop a determined busybody from
taking the card, opening it, and reading the message. If you were sending a highly
sensitive contract to a client, you would want to make sure that the contract is
secure as it is transported. To protect it, you could ensure that it is hand-delivered
to the client, and that the envelope cannot be opened by casual busybodies.
Similarly, you can add a small level of security to your data transmissions by
tunneling them, but true security requires more.
Data can be tunneled over several OSI Layers. For example, GRE tunneling is
Layer 3 tunneling because it encapsulates a Layer 3 (IP) packet with a header,
which is in turn encapsulated with a new IP header. Basic tunneling is similar
to wrapping information in an envelope, providing the data with a small
amount of security.
However, for a tunnel to fully protect the data, it must provide these additional
functions:
Authentication—This ensures that each endpoint creates a point-to-point
connection with the correct endpoint.
Integrity—This verifies that all traffic sent through the tunnel is generated
by the tunnel’s two endpoints, preventing MITM attacks.
Confidentiality—Encryption protects the data itself from being sniffed and
read by attackers.
Tunnels that provide this level of security create a secure virtual point-to-point
connection between endpoints on two separate networks. These secure tunnels are
called virtual private networks (VPNs).
Note
Various vendors offer solutions for what they call tunneling and
VPN capabilities. This module will discuss only secure VPNs,
primarily those based on IPsec and SSL.
5 – 32 Rev. 6.41
Layer 2: Data Integrity & Privacy
VPNs
Rev. 6.41 5 – 33
ProCurve Network Security Fundamentals
Further Reading
For more information on VPNs, see http://en.wikipedia.org/wiki/VPN
or “Chapter 8: Virtual Private Networks” in the ProCurve Secure
Router 7000dl Advanced Management Configuration guide at
ftp://ftp.hp.com/pub/networking/software/A-C08-VPNs.pdf.
For more information on PPTP, see the PPTP FAQ at
http://www.microsoft.com/.
For more information on L2TP, see RFC 2661 at
http://rfc.net/rfc2661.html, or see http://en.wikipedia.org/wiki/L2TP.
5 – 34 Rev. 6.41
Layer 2: Data Integrity & Privacy
IPsec
IPsec is a standard that operates at OSI Layer 3 to provide an open framework for
tunneling data using secure encryption algorithms and authentication methods.
Using IPsec, a network administrator can customize the security protocols,
algorithms, and cryptographic keys used to establish and maintain a VPN.
When an IPsec connection is created, the two endpoints must agree to a
Security Association (SA) that defines the terms of the VPN connection. These
terms include the exact set of algorithms, protocols, and keys that will be used
to authenticate and protect the traffic transmitted across the connection. After
the endpoint devices are authenticated and an SA is established, the VPN
tunnel is created.
Rev. 6.41 5 – 35
ProCurve Network Security Fundamentals
Further Reading
For more in-depth information on IPsec, see RFC 4301 at
http://rfc.net/rfc4301.html.
5 – 36 Rev. 6.41
Layer 2: Data Integrity & Privacy
IPsec IKE
Note
In this discussion, VPN tunnel “endpoints” can refer to network
endpoints, such as workstations and servers, or gateway devices, such as
routers, that can set up VPNs on behalf of network devices.
Rev. 6.41 5 – 37
ProCurve Network Security Fundamentals
To create IKE SAs and the IKE tunnel, the endpoints perform the following steps:
1. The initiating endpoint (Initiator) sends a message to the recipient endpoint
(Responder) proposing several security parameter options for
communication. Each of the proposed parameters includes an authentication
method, an encryption algorithm, and a hash algorithm.
2. The Responder accepts one of these parameters, provided one is listed in the
Responder’s accepted list, and sends it back to the Initiator. This exchange
sets the security policy for the next exchange of messages.
3. The Initiator and Responder use the Diffie-Hellman exchange to establish a
shared secret, which will be used to create the encryption keys.
4. The last message exchange, which is encrypted over the temporary IKE
tunnel, authenticates each tunnel endpoint. This authentication can be done
using a pre-shared key or digital certificates.
After authentication, IKE enters a second phase in which the endpoints determine
the keys that will encrypt data in the final IPsec tunnel. This negotiation can be
based on the Diffie-Hellman exchange in phase 1. However, in implementations
using Perfect Forward Secrecy, a second Diffie-Hellman exchange is required.
SAs are protocol specific. To supply encryption and data authentication over an
IPsec tunnel, you can use AH, ESP, or both. If both protocols are used, two SAs
must be established, one for each protocol.
Further Reading
For more information on IKE, see RFC 4306 at
http://rfc.net/rfc4306.html.
5 – 38 Rev. 6.41
Layer 2: Data Integrity & Privacy
After the encryption algorithms and keys are agreed upon in the IKE exchange,
IPsec uses the AH and ESP protocols to manage the actual data encryption and
authentication. These IPsec protocols operate within the new, or delivery, IP
packet header.
The AH protocol is used for authentication. It verifies the identity of the sender
and the integrity of packet contents. It can also provide an anti-replay service. A
replay attack occurs when an attacker deliberately delays or resends a stolen
packet, such as a password packet. Replay protection ensures that messages in the
IPsec session cannot be reused or replayed. AH does not, however, provide
encryption.
The ESP protocol encrypts and decrypts tunnel packets. ESP uses the keys
calculated during the last phase of IKE to encrypt the data and can support both
symmetric and asymmetric key schemes. This protocol can also provide
authentication and anti-replay service, but its authentication capabilities are more
limited than those of AH.
An AH header authenticates both the packet payload and the IP header. An ESP
header only authenticates the payload, but can also encrypt it.
Rev. 6.41 5 – 39
ProCurve Network Security Fundamentals
AH and ESP both use a hash function to authenticate data. The hash function uses an
encryption key to create a message digest. The endpoint then appends the message
digest to the data. When the remote endpoint receives the complete packet, it uses
the same encryption key and algorithm to hash the received data into a message
digest. The endpoint then compares the result to the message digest that was
appended to the packet. If the two match, then the endpoint knows both that:
the data was sent by the endpoint claimed as the source (because only this
endpoint also knows the unique authentication key)
the data has not been tampered with en route
AH and ESP can be used independently or together; for most applications, just one
of these protocols is sufficient.
In most cases, clients who establish and connect to a client-to-site VPN tunnel
must use VPN client software. This software supports the IPsec standard and
provides the AH and ESP protocol functions. However, rather than installing
separate VPN client software, a client can create and connect to a non-IPsec VPN
tunnel using a Web browser and SSL.
Further Reading
For more information on AH, see RFC 4302 at
http://rfc.net/rfc4302.html.
For more information about ESP, see RFC 4303 at
http://rfc.net/rfc4303.html.
5 – 40 Rev. 6.41
Layer 2: Data Integrity & Privacy
SSL VPNs
Rev. 6.41 5 – 41
ProCurve Network Security Fundamentals
IPv6, previously called IPng, is the next version of IP. This version is primarily
designed to provide enough IP addresses that every device on every network can
have a globally unique address. IPv6 also includes some design elements that
improve packet security over that offered by IPv4.
IPv6 implementation will take several years, and even after implementation, IPv4
will operate concurrently with IPv6. For a more in-depth discussion of IPv6, see
http://en.wikipedia.org/wiki/IPv6.
This section of the module will discuss IPv6 security enhancements.
5 – 42 Rev. 6.41
Layer 2: Data Integrity & Privacy
IPv6 IPsec
Though IPv4 can provide security by optionally supporting IPsec, IPv6 requires
the use of IPsec. In other words, every IPv6 packet travels through a VPN tunnel
across the Internet.
IPv6 handles IPsec packets much like IPv4 does:
1. The original IP header and data are encrypted, or encrypted and hashed, using
the algorithms specified in the SA. The packet is then encapsulated in an
outside IP header.
2. The packet is forwarded at each hop using the outside IP header until it
reaches its destination.
3. The outside header is then removed, and the encrypted packet contents are
processed, decrypted, and authenticated.
Rev. 6.41 5 – 43
ProCurve Network Security Fundamentals
To provide enough addresses for IP devices, the IPv6 address length was increased
to 128 bits. The 128-bit address space provides 3.4 x 1038 total IP addresses, or
roughly 5 x 1028 addresses for each person on the planet. The IPv6 address length
is a considerable increase over the 32-bit length used in IPv4, which provided only
4.3 billion addresses total.
The increased address and header size makes IPv6 networks much more resistant
to some reconnaissance attacks such as network mapping. For example, network
mapping software systematically scans every possible address on the target
network’s subnet to map the devices on that network. On an IPv4 network, this
scan can complete within seconds. However, with greatly increased IPv6 address
length and subnet size, it can take years to scan every possible IP address within
a subnet.
5 – 44 Rev. 6.41
Layer 2: Data Integrity & Privacy
IPv6 addresses are created using an interface identifier that is unique to each
device and a network-specific prefix. Because device MAC addresses are globally
unique identifiers, it was initially proposed that these be used as the interface
identifiers.
However, a problem arises: IPv6 was designed to implement stateless
autoconfiguration, a process for automatically assigning IP addresses without
resorting to a Dynamic Host Configuration Protocol (DHCP) server. Stateless
autoconfiguration can be used to assign addresses to both stationary and mobile
devices that may need temporary IP addresses. However, using a static interface
identifier, such as a MAC address, in conjunction with a set autoconfiguration
process may allow certain attacks:
An attacker may be able to find a network address pattern that allows a
successful network attack.
An attacker may be able to track a particular device no matter where or how
it is connected to the Internet.
IPv6 privacy extensions obscure address patterns by creating dynamic interface
identifiers to be used with stateless autoconfiguration. These dynamic identifiers
vary within a particular network and are created by using an MD5 hash to
periodically generate pseudo-random interface identifiers.
Rev. 6.41 5 – 45
ProCurve Network Security Fundamentals
Wireless Security
IPv6 and VPNs use encryption and authentication to secure data as it is forwarded
across an untrusted network. However, data doesn’t need to be forwarded across
an untrusted network to be at risk. A strong, additional layer of security is needed
to protect data as it is moved between a wireless network access point (AP) and a
wireless device.
The Internet Engineering Task Force (IETF) 802.11 standard specifies the
encapsulation and transmission methods used to forward traffic between a wireless
device and the network AP. The 802.11i amendment, which became part of the
802.11 standard in 2004, specifies the wireless security measures required to
ensure wireless data confidentiality.
This section of the module will discuss technologies used to secure data that is
forwarded over wireless connections.
5 – 46 Rev. 6.41
Layer 2: Data Integrity & Privacy
Wireless Encryption
Rev. 6.41 5 – 47
ProCurve Network Security Fundamentals
5 – 48 Rev. 6.41
Layer 2: Data Integrity & Privacy
After WEP was cracked, the IETF began to develop a new wireless security
amendment to the 802.11 standard called 802.11i. This security standard is
designed to provide a wireless security baseline for vendors to follow. However,
this standard took more than four years to ratify and networks needed an
immediate solution. The Wi-Fi Protected Access (WPA) standard was introduced
as an interim wireless security measure until the new IETF standard could be
implemented.
Further Reading
In the United States, the FBI performed a WEP-cracking demonstration at a
2005 Information Systems Security Association (ISSA) meeting. Read the
article at
http://www.tomsnetworking.com/2005/03/31/the_feds_can_own_your_wla
n_too.
For more information on WEP, see
http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy.
Rev. 6.41 5 – 49
ProCurve Network Security Fundamentals
WPA
WPA is more secure than WEP in several ways: it uses a longer counter length, an
encrypted message integrity code (MIC) that is more complex than a simple CRC
checksum, and a complex encryption key generation and management protocol
called the Temporal Key Integrity Protocol (TKIP).
Important features of WPA include:
1. 802.1X peer authentication—WPA ensures that the peer connecting to the
wireless network is authorized to do so.
2. RC-4-based encryption—WPA is backward compatible with WEP devices
because it is based on the RC4 stream cipher. Although stream ciphers are
insecure if an encryption key is used more than once, TKIP overcomes this
problem by dynamically assigning unique per-frame keys.
5 – 50 Rev. 6.41
Layer 2: Data Integrity & Privacy
3. MIC for payload integrity—Rather than using a simple CRC checksum, the
MIC is calculated using the Michael algorithm. This algorithm creates a
complex blend of encrypted data excerpts mixed with one of the temporal
keys generated by TKIP. For further security, the MIC itself is encrypted and
added to the end of the packet.
4. TKIP—WEP was insecure because it used a single encryption key for every
device in the wireless network. TKIP greatly improves key security by
generating a set of keys, each of which are used for separate purposes in the
encryption and authentication process. These keys are unique to the device
and dynamically changed over time.
Rev. 6.41 5 – 51
ProCurve Network Security Fundamentals
TKIP
TKIP uses device MAC addresses, randomly generated numbers, and a shared secret
to create a set of encryption keys. The first key created is the Pairwise Master Key
(PMK), which is calculated using a shared secret generated during the 802.1X
authentication process. TKIP then uses a four-part handshake that uses randomly
generated numbers and device MAC addresses to calculate a Pairwise Transient Key
(PTK). Next, the PTK is split into three keys, each of which is used for a different
purpose. The three keys are:
The Key Encryption Key (KEK)—This key is used to encrypt the PTK,
ensuring that an unauthenticated endpoint does not intercept it during the
TKIP handshake.
The Key Confirmation Key (KCK)—This key is combined with frame-
specific data to calculate the MIC.
The Temporal Key (TK)—This key is used to encrypt the data.
5 – 52 Rev. 6.41
Layer 2: Data Integrity & Privacy
To encrypt each packet, the MIC is calculated and appended to the data. A 48-bit
counter is appended to the TK, and the TK+Counter is then used as the per-frame
key to encrypt the data and the MIC. The encrypted data is then encapsulated in
an 802.11 header and transmitted.
TKIP solved many of the most major problems with WEP. However, WPA does
not meet the IETF 802.11i wireless security standard. The WPA2 standard builds
on TKIP and is fully compliant with the 802.11i amendment.
Rev. 6.41 5 – 53
ProCurve Network Security Fundamentals
WPA2
5 – 54 Rev. 6.41
Layer 2: Data Integrity & Privacy
CCMP
CCMP is a protocol that specifies how the AES encryption algorithm is applied to
the data. CCMP has two parts:
Cipher block chaining—This is used to calculate the MIC. Rather than use
the Michael algorithm, which was shown to be vulnerable to some attacks,
WPA2 uses chain block ciphering (CBC) to calculate the MIC. CBC works
by encrypting the first block of data using the KCK derived from the PTK.
Each successive block of data is then encrypted using the last encrypted
block of data. The high-level 64 bits of the result are the MIC.
AES counter mode—This is used to encrypt the data. A starting block with a
counter is encrypted using AES and the TK. The result is XORed with the
first 128-bit block of data yielding the first encrypted data block. The counter
is then incremented in the starting block and this new starting block is
encrypted using AES and the temporal key. This result is XORed with the
next 128-bit block of data to give the second encrypted data block. This
process continues until the entire payload of the frame is encrypted. The last
block that is encrypted is the MIC, which is added to the end of the payload.
CCMP provides a complex and secure encryption and data authentication method
for wireless traffic.
Rev. 6.41 5 – 55
ProCurve Network Security Fundamentals
MACsec
In addition to the 802.11i wireless security standard, the Institute of Electrical and
Electronics Engineers (IEEE) is now implementing similar security measures for
the 802 standard. The 802.1AE Media Access Control Security (MACsec)
amendment specifies per-hop security that includes:
mutual authentication
key management
message integrity
frame encryption
5 – 56 Rev. 6.41
Layer 2: Data Integrity & Privacy
MACsec
MACsec
• MACsec
CA
A
SCAB
SCBA
D B
SCAC SCCA
SCCB
C SCBC
SC = Secure Channel
• MACsec Frame
Authenticated
The IEEE 802.1AE and 802.1af MACsec standards are designed to deter some
network attacks by creating a connectivity association (CA) between trusted Layer 2
network devices. Traffic handled by devices within the CA is marked with a
MACsec tag, which differentiates traffic that originates from a trusted network
device from traffic that originates from an untrusted device.
For example, you have a network with four devices, three of which are in the CA.
The fourth device can send and receive frames using the connectivity provided by
the shared LAN, but it does not have the correct MACsec tag that would allow it to
participate in the CA. Instead, A, B, and C recognize the traffic from D as traffic
from an untrusted source, and they filter it. Filtering untrusted frames helps to
ensure that D cannot compromise the integrity, confidentiality, or origin of any of
the frames exchanged among A, B, and C.
MACsec performs three functions:
1. Defines a secure CA among devices within the LAN—Secure CAs are created
by mutually authenticating all devices within the group and creating the
MACsec tag. The MACsec tag is then added to every frame sent within the CA.
2. Sets up secure, one-way communication channels within the CA—After
the CA is established, the devices create unidirectional Secure Channels
(SCs) with each other. Each SC secures traffic using an overlapped sequence
of security associations (SAs) similar to those used in IPsec. The SAs define
the frame integrity verification process (and optionally the data encryption
process) that the device will use when transmitting over the SC.
Rev. 6.41 5 – 57
ProCurve Network Security Fundamentals
Further Reading
One of MACsec’s notable features is that it uses the AES
Galois/Counter Mode (GCM), which incorporates unique mathematical
matrices (called Galois fields) as part of the algorithm. For further
reading on GCM, see “The Galois/Counter Mode of Operation” by
McGrew and Viega at
http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-
revised-spec.pdf.
For more information on MACsec, you can look up the IEEE 802.1AE
and 802.1af standards, or see
http://www.networkworld.com/details/7593.html?def.
5 – 58 Rev. 6.41
Layer 2: Data Integrity & Privacy
This module has primarily focused on protecting data as it moves across untrusted
networks. The same encryption methods can also be used to protect data as it is
stored within the network.
Unencrypted data is easily read and exploited by an attacker who gains access to
the storage device. To monitor that data, you can use hash algorithms to verify
data integrity. You can also protect data by requiring authentication for access or
by encrypting portions of the storage device to obscure either the data or the means
by which it is accessed. The final section of this module will discuss methods that
are used to protect stored data.
Rev. 6.41 5 – 59
ProCurve Network Security Fundamentals
Change Auditing
Securing stored data can be challenging. Stored data is static in its location and
availability. To access forwarded data, an attacker must intercept it while it is in
transit. To access stored data, an attacker simply must access the storage location.
To protect your stored data, you can use an auditing system that allows you to
detect intrusions and take measures to restore the original files.
Attackers often target specific OS system files. By changing these files, the
attacker can open backdoors and alter how the network operates. Most of these OS
files are not often accessed and do not change. Change auditing works by detecting
changes to these files. By noting and tracking these changes, you can detect
network intrusions and take actions to restore your data.
Change auditing software looks at several file aspects, including differing message
digests and unexpected file size changes, to detect an intrusion. The software
begins by creating a message digest of the file along with noting several other file
aspects such as file size and the date when the data was last accessed. Then, at
periodic intervals, the software hashes another message digest and compares the
digest and the current file specifications with the initial values. If the values don’t
match, you can then trace the intrusion and use a backup copy to restore the file.
This method only works to protect system files that do not change very often. For
files that are works in progress or need to be accessed from time to time, another
protection method should be used.
5 – 60 Rev. 6.41
Layer 2: Data Integrity & Privacy
Honeypots
A honeypot is a network resource that has no legitimate use within a network. In
other words, any interaction with the honeypot must be illegitimate, such as a
network intrusion. Honeypots are designed to attract attackers away from your
trusted network by intercepting an attack and providing an alternative environment
for the attacker to work in. A honeypot also monitors the attacker’s behavior,
allowing you to understand and prepare to combat different types of network
attacks.
There are two types of honeypots:
Low-interaction—These honeypots emulate the network OS and network
services to interact with a possible attacker while pretending to be legitimate
network resources. For example, some honeypot implementations intercept
an attacker by monitoring network IP address usage. If traffic is received
destined to an IP address that is not used on the network, the honeypot will
intercept the traffic and pose as a valid network device operating at that
address.
Rev. 6.41 5 – 61
ProCurve Network Security Fundamentals
Honeynets
To gather more information on a network attack, you can deploy a honeynet. A
honeynet is a network—with actual servers, switches, routers, and hubs—that
includes one or more high-interaction honeypots. Similar to honeypots, honeynets
themselves provide no legitimate network services. Rather, the honeynet is
designed to intercept a network attack and give the attacker an isolated network
playground. Attacker behavior is then monitored and recorded.
Several risks are associated with honeynets:
If attackers discover the honeynet, they can bypass it to access your trusted
network.
The honeynet can be used as a zombie to attack another network.
The honeynet can be used for illegal activity such as uploading stolen credit
card numbers or illegal copies of CDs and DVDs. If illegal activity is traced
back to your network by law enforcement, you could be held liable until you
are able to prove that the traffic originated elsewhere.
5 – 62 Rev. 6.41
Layer 2: Data Integrity & Privacy
Summary
This module introduced you to the basics of encryption, including how encryption
algorithms and hash functions can be used to secure data. You were introduced to
key management techniques such as KDCs and the Diffie-Hellman exchange. You
also learned about digital certificates, how they are generated, and how they
authenticate an endpoint. You then learned about the ways in which encryption
and hash functions can be used to protect your network.
The next module will discuss ways in which authentication, encryption, and hash
function technologies can be used to secure network backbone devices.
Rev. 6.41 5 – 63
ProCurve Network Security Fundamentals
5 – 64 Rev. 6.41
Layer 3: Device Access Security
Module 6
Objectives
Network access control and data integrity and privacy technologies compose the
proactive components of network security. These proactive components are
designed to address security concerns and network vulnerabilities before they
become a network security crisis. However, attacks continue to evolve, and
proactive network security components will not always catch every intrusion. If
your infrastructure is insecure, you leave your network open to attacks that bypass
or worm their way through the proactive security layers. For comprehensive
network security, you must also ensure that your network devices are secure and
immunized against attacks.
In this module, you will learn about the authentication and file transfer
technologies that are used to secure managed devices. After reading this module,
you should be able to:
Explain how to use a local user database to secure managed devices
Describe how remote authentication can also be used to protect network
backbone devices
Show how the Secure Shell (SSH) protocol secures communication between
an endpoint and a managed device
Explain how the Secure Sockets Layer (SSL) (Transport Layer Security
[TLS]) protocol can provide secure access to network devices
Show how Secure File Transfer Protocol (SFTP) can be used to safely upload
and download files
Describe the Simple Network Management Protocol version 3 (SNMPv3)
security upgrades
Managed Devices
Networks use several different types of devices to manage the flow of information
between endpoints. Called managed devices because they are controlled by the IT
staff, these devices, such as routers, switches, and wireless access points (APs),
form the network infrastructure. To adequately protect your network, you must
secure access to these network infrastructure devices.
These managed devices keep track of network structure and security information,
which allows them to efficiently route and forward traffic. However, if an attacker
were to obtain this information from these devices, the network would be quickly
and easily compromised. Sensitive data on managed devices includes:
Network device IP address and routing information—Routers and routing
switches maintain IP routing information for devices that are within and
outside the network. If an attacker accesses the route table, he or she can use
this information to impersonate a network device or perform a direct attack
on network resources.
Network security information—Devices such as routers and APs maintain
information on currently operating network security measures such as virtual
private network (VPN) security associations (SAs), access control lists
(ACLs), preshared keys, and authentication server information.
Local Access
Access Rooms
Infrastructure devices should be installed in locations segregated from the general
office infrastructure. The ideal location is an enclosed wiring closet guarded by
security personnel and locaked and by locks that require two-token authentication.
(discussed in Module 4—Layer 1: Network Access Control Security).
To further secure the area, you can place cameras at the entrance as well as
inside the wiring closet to audit and monitor those accessing your network.
Security audits will also protect against security breaches: for example, you can
ensure that the door to the network access room is not propped open and is
always closed and locked.
Passwords
Most managed devices allow you to set a password to control console access.
This technique, which is also used to secure remote access, is discussed on the
next slide.
Passwords
The most basic way to increase security on your managed devices is to change the
default password to something that is not easily guessed. For example, almost
every attacker will attempt to use “admin” or “user” (and other common
variations) as both the username and password. Changing the password from the
default value will require the attacker to use a more sophisticated method of
attack—a brute force or social engineering attack—to discover the password.
Some devices allow you to set different passwords for different device access
methods. For example, you can configure one password for console access and
another password for remote access. On some of these devices you can also
configure separate passwords for administrator levels: you can set one password
for read-only access and another for read-write (configuration) access.
6–6 Rev. 6.41
Layer 4: Device Access Security
While it is highly desirable to change passwords from their default settings, even a
highly complex management password must still be secured and kept secret. It is
best to encrypt device passwords so these passwords do not appear in plaintext
inside of configuration files.
Management VLAN
Virtual local area networks (VLANs) are logically independent networks within a
network that divide users into separate broadcast domains, each isolated and
relatively secure from the others. VLANs can also be used to secure device
management traffic: a management VLAN isolates all device management traffic
from all other user traffic on the device.
A management VLAN introduces the first level of administrative security, one
prior to any authentication or authorization on the switch: if the attacker cannot
even pass packets onto the management VLAN, he or she cannot successfully
attack the device. However, in many cases the management VLAN is the same as
the default VLAN: the default VLAN is the VLAN to which all unassigned ports
belong. If an attacker were to attach a device to an unassigned port, he or she
would gain access to the management VLAN. To prevent this, you should assign
the management VLAN to a separate VLAN.
Further Reading
For more information on VLANs, see Module 4—Layer 1: Network
Access Control Security or http://en.wikipedia.org/wiki/Vlan.
Most managed devices can also secure management access using authentication
server protocols such as Remote Authentication Dial-In User Service (RADIUS)
and Terminal Access Controller Access Control System Plus (TACACS+).
In the example above, an attacker uses Telnet to connect to the router interface
at 10.5.2.19. Before the router opens a session with the attacker, it passes the
attacker’s authentication credentials to the network RADIUS server to
validate—but the attacker fails the RADIUS authentication and is denied access
to the router’s management interface.
Telnet
Telnet is a simple network protocol typically used to establish command-line login
sessions between a user and a managed device. For instance, when you configure
your router, you may use a Telnet session from a network workstation.
The Telnet protocol allows:
devices to interact regardless of characteristics
remote logon for the purpose of device management
users to access information from another device
Telnet allows a high degree of device interaction regardless of the differences in
OS and applications between the communicating devices. However, Telnet is
insecure because it sends all data plaintext. An attacker who intercepts the packets
can copy or steal all of the commands entered, giving the attacker access to the
session endpoint device.
6 – 10 Rev. 6.41
Layer 4: Device Access Security
Further Reading
For more information on Telnet, see
http://en.wikipedia.org/wiki/Telnet. For more information about SSH,
see http://en.wikipedia.org/wiki/Ssh.
Rev. 6.41 6 – 11
ProCurve Network Security Fundamentals
HTTP
HTTP is the protocol used over the Internet to establish connections and transfer
data between Web servers and endpoints. Similar to Telnet traffic, HTTP traffic is
transferred in plaintext, which provides plenty of opportunities for attackers to
intercept and steal information sent between the endpoint and the Web server.
Many network devices include a Web-based interface for management sessions.
To secure your Web-based management sessions, you must encrypt the data sent
between the user and the managed device.
SSL
SSL and its successor, TLS, can provide private and reliable data transfer by
encrypting the data sent between a server and an endpoint. The SSL-TLS standard
includes:
Encryption algorithms—SSL-TLS supports both stream and block ciphers,
including Rivest Cipher 2 (RC2), Rivest Cipher 4 (RC4), International Data
Encryption Algorithm (IDEA), Data Encryption Standard (DES), Triple DES
(3DES), and Advanced Encryption Standard (AES). For more information on
encryption algorithms, see Module 5—Layer 2: Data Integrity and Privacy.
6 – 12 Rev. 6.41
Layer 4: Device Access Security
HTTPS
HTTP over SSL (HTTPS) is an HTTP session over an encrypted SSL tunnel. Using
HTTP, which transmits all data in plaintext, is much like sending a letter through the
post office in a transparent envelope. Everyone can see what you are sending; if it
looks valuable, someone may take it or alter it. With HTTPS, you can put your
information in a secure box that no one can see into or manipulate in transit.
An HTTPS connection is primarily intended to secure data sent from the endpoint
to the Web server. That is, the data sent from the Web server is sent in plaintext,
but the data sent from the endpoint to the Web server is encrypted. HTTPS also
involves checking the Web server’s certificate so that users can be sure, for
example, that they are sending credit card numbers to a legitimate business server
and not a phisher.
The establishment of an HTTPS session follows these steps:
1. The endpoint requests a secure session.
2. The HTTPS Web server sends its public key digital certificate.
3. The endpoint verifies the certificate is valid.
4. In the process of checking certificates, the Web server and the endpoint agree
on keying material to encrypt future data using one of the encryption
algorithms supported by SSL.
5. The encrypted data is sent to the Web server.
Rev. 6.41 6 – 13
ProCurve Network Security Fundamentals
With an HTTPS connection, users can safely send personal information such as
names, passwords, and credit card numbers. You can similarly protect network
information, including manager usernames and passwords, by using HTTPS for
Web-based management sessions. You can verify that your Web session is secure
by looking for clues in your Web browser:
URL begins with “https” rather than “http.”
Padlock icon is displayed in the address bar or on the bottom of the screen.
In some browsers, the URL window background color changes.
Further Reading
For more information on HTTP, see
http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol. For more
information on HTTPS, see http://en.wikipedia.org/wiki/Https.
6 – 14 Rev. 6.41
Layer 4: Device Access Security
Rev. 6.41 6 – 15
ProCurve Network Security Fundamentals
The files transferred through FTP and TFTP may contain username and password
information, addressing schemes, or other data that can leak information about
your network. It is therefore important to use secure methods to transfer files to
your managed devices. But FTP is insecure because it sends data and files in
plaintext, leaving the information vulnerable to internal attackers who can sniff
usernames, passwords, FTP commands, and file transfers. FTP also does not
support file integrity checks: if the transfer is interrupted or compromised, the
receiver has no way of verifying whether the received file is complete.
Attempts have been made to run FTP over SSH for increased security, despite the
difficulty in tunneling the entire FTP session. That is, an SSH tunnel can be set up
for the FTP control connection, which protects data on that TCP port, but when the
data is transferred over a separate port, the FTP peers set up a new TCP connection
that bypasses the SSH tunnel. In order to run all the FTP channels over the SSH
connection, you must either use an FTP client that explicitly supports FTP over
SSH, or you must configure the FTP client to connect to a SOCKS server, which
can manage setting up SSH tunnels over both TCP ports.
A better solution is to use a file transfer protocol that is built on SSH v2, such as
the two described below.
Further Reading
For more information on FTP, SCP, and SFTP, see:
http://en.wikipedia.org/wiki/File_Transfer_Protocol
http://en.wikipedia.org/wiki/Secure_Copy
http://en.wikipedia.org/wiki/SSH_file_transfer_protocol
6 – 16 Rev. 6.41
Layer 4: Device Access Security
SNMP Version 3
Rev. 6.41 6 – 17
ProCurve Network Security Fundamentals
6 – 18 Rev. 6.41
Layer 4: Device Access Security
Further Reading
For more information on SNMP version 3 and the user-based security
model (USM), see RFC 3414 at http://rfc.net/rfc3414.html.
Rev. 6.41 6 – 19
ProCurve Network Security Fundamentals
Summary
6 – 20 Rev. 6.41
Layer 4: Endpoint Integrity
Module 7
Objectives
Despite strong authentication requirements and strict access control, network
endpoint devices may continue to be a threat to network security. Even the most
securely protected network can become threatened if a single network entry point is
compromised. Likewise, a single authenticated and authorized user may
unknowingly bring in a security threat once he or she begins accessing network. To
help deter threats such as these from internal sources, many software applications
monitor and protect endpoint devices; this module is intended to raise your
awareness of the many endpoint security applications available for this purpose.
After reading this module, you should be able to:
Describe how antivirus software on endpoint devices works to keep the
network safe
Explain what a sandbox is and how it can prevent malware infections
Show how personal firewalls help protect against internal or Web-based attacks
Describe software patches and how they protect a network
Understand how network security solutions monitor and ensure endpoints’
security compliance
Network Endpoints
Network Endpoints
Network-terminating devices:
• Workstations
• Laptops
• Voice over IP (VoIP) phones
• Personal digital assistants (PDAs)
• Servers
VoIP
Phones
Laptops
Network
Workstations
and PDAs
Servers
Rev. 6.41 Student Guide: 7–2 3
Antivirus Software
Some of the most common and expensive network attacks are those from worms
and viruses that access the network through endpoint devices. Not only can viruses
and worms cause large amounts of damage and network downtime, but some well-
known worms such as MyDoom and Sasser can also install malware and open
back doors on infected devices, as well as use the infected devices to launch
distributed-denial-of-service (DDoS) attacks.
To help prevent and mitigate the damage caused by worm and virus infections,
you should install antivirus software on all endpoint devices. This is particularly
true for devices that may have access to untrusted networks such as the Internet.
Antivirus programs provide two functions: they continuously scan the endpoint
device for infections, and they manage infected files. Antivirus program
components include:
Antivirus software—This is a software engine that scans the endpoint
device and manages infected files.
Virus definition files—Antivirus software diagnoses infections based on the
presence of small snippets of code that are exclusive to worms and viruses.
These bits of code are called “signatures” and are used in virus definition files.
Many viruses and worms share common propagation or infection code, so a
particular antivirus signature may be able to detect multiple viruses or worms.
7–4 Rev. 6.41
Layer 4: Endpoint Integrity
New definition files are continually created as new viruses and worms are
discovered. New viruses and worms are analyzed, and an attack signature file
is created and distributed by the antivirus software vendor. Keeping your
definition files current gives your network endpoint devices the best chance
of defending against new attacks.
Infection Management
Once a worm or virus is diagnosed, the infection must be handled to prevent
further spread and damage. Antivirus software handles an infection in one of three
ways:
It repairs the file—In cases where the virus that is infecting the endpoint is
known and well understood, the virus code can be deleted from the file.
It deletes the file—When a worm file or virus-infected file is discovered, the
quickest way to nullify the infection is to delete the file. You should delete
infected non-essential files.
It quarantines the file—In some cases, the infected file is important or
necessary for normal device operation. In cases such as this, the file cannot
be deleted. If the file cannot be repaired or deleted, it can be quarantined.
Quarantine prevents further damage to the network and endpoint device by
restricting the infected file from being opened or altered by endpoint
applications. However, quarantined files may be eventually repaired: virus
definition files sometimes include updates that allow the antivirus software to
repair previously quarantined files.
Installing antivirus software on every network endpoint will protect your network
in two ways: endpoint devices with access to untrusted networks will be protected
from known attacks from outside, and they will be protected from known worms
and viruses that might gain access to the internal network.
Viruses and worms are not the only attacks that threaten network endpoints. While
antivirus software can protect endpoints from self-replicating code-based attacks,
the next endpoint security measure can protect servers and workstations from
methodical attacks that use seemingly legitimate traffic.
Further Reading
Many vendors offer antivirus software. For more information on
antivirus solutions, you can look up vendor Web sites or whitepapers,
or go to http://en.wikipedia.org/wiki/Antivirus_software.
Personal Firewalls
Every network should have a perimeter firewall to protect all internal network
devices. Perimeter firewalls can protect against attacks that use seemingly
legitimate traffic: spoofing, malformed packet attacks, and some DoS attacks.
However, the perimeter firewall does not protect against attacks that originate
from internal sources such as infected laptops. Firewalls installed on network
endpoints can add a much-needed additional layer of protection.
Personal firewalls work in a similar manner to network perimeter firewalls. Both
types of firewalls check traffic at multiple layers, serve as a barrier against
network attacks, and permit or deny traffic based on a security policy. This
security policy stipulates a definition for the types of traffic that will be blocked.
Based on the security policy, personal firewalls can:
terminate or block a connection when an intrusion is suspected
check traffic at Layers 3 and 4 to permit or deny traffic based on source and
destination IP address and TCP/UDP flag logic, and to protect the device
against malformed packets
look at Layer 7 processes to decide access permission (to connect to a
particular port, for example)
It’s not always easy to tell whether a particular file or email is infected with a
worm or virus. Similarly, it’s not always possible to know whether a particular
program includes malware. The next endpoint integrity measure can allow you to
run a suspicious program or open an untrusted Web page while minimizing the
chances that the virus, worm, or malware will infect the endpoint device.
Further Reading
As with antivirus software, many vendors offer personal firewall
solutions. For more information, you can visit vendor Web sites or
see http://en.wikipedia.org/wiki/Personal_firewall.
Sandboxes
Another way to protect network endpoints from attacks that use seemingly
legitimate traffic is by using a sandbox. A sandbox is a highly restricted
environment in which you can run untrusted files.
Sandboxes were originally used by software developers to test projects that were
in progress without actually putting the device at risk. New code is often unstable
and may have unexpected results: sandboxes allowed the software developers to
see where the code was unstable or to observe the unexpected results without
worrying about the potential damage.
Because sandboxes allow potentially damaging programs to be run in a restricted
environment, they can also be used to run programs that may have malicious code
while preventing them from attacking or harming the endpoint device.
7 – 10 Rev. 6.41
Layer 4: Endpoint Integrity
Further Reading
For more information on sandboxes, see
http://en.wikipedia.org/wiki/Sandbox_%28computer_security%29.
Rev. 6.41 7 – 11
ProCurve Network Security Fundamentals
Software Patches
Patches are easy to download and install, but installing patches on every
vulnerable endpoint device can quickly become a management nightmare. One
way to ease software patch deployment and ensure endpoint security is through
network management.
Further Reading
For more information on software patches and computer security,
see http://en.wikipedia.org/wiki/Software_patch. Visit
http://www.softwarepatch.com/ for information on available
software patches and upgrades.
Rev. 6.41 7 – 13
ProCurve Network Security Fundamentals
Web browser caches and HTTP cookies reduce the amount of information that
must travel over the Internet. This, in turn, speeds up Web page displays and
Internet access. However, the information stored in endpoint devices’ caches and
cookies can be used by an attacker to retrieve private information.
Caching
Caching is a data management technique for storing copies of frequently accessed
data in an easily accessible area and thus significantly reducing the amount of data
that has to be retransmitted or re-accessed to run an operation.
For example, a person living in a gated community must know his or her personal
combination to open the gate and enter the community. There are a couple of ways
that the person can manage the personal access code: he can memorize the code so
that he can quickly enter it when needed, or he can spend the time and effort of
stopping at the guard gate and requesting the code every time he wants to enter the
community. Similarly, caching allows devices to readily store frequently accessed
data rather than repeatedly requesting it every time it is needed.
7 – 14 Rev. 6.41
Layer 4: Endpoint Integrity
The Web browser cache is a file that stores information regarding recently
accessed graphics, sounds, and URLs. The cache allows a browser to quickly
display a recently visited Web page without having to reload it from the Web
server. However, when accessed by an attacker, a cache can reveal sensitive
information. For example, any personal or sensitive information that has been sent
over an Internet connection may be stored in the Web cache. This data is available
to an attacker with unauthorized access to the device, either through physical
access or through spyware programs. Additionally, data that may have been
encrypted before being forwarded through the Internet is often stored as plaintext
in the Web browser cache. To protect sensitive or personal data that has been sent
over the Internet from being compromised, you should routinely clear Web
browser caches.
Cookies
Cookies are little bits of data that act as an identifier between a Web browser and a
Web server. Cookies are created by and sent from a Web server to the Web
browser. The Web browser stores the cookie and sends it back unchanged to the
server the next time that Web site is visited. The cookie contains personalized
information, such as Web page display and other browser preferences, the site
shopping cart contents, successful login verification, and so on. Unique cookie
content allows a Web server to customize the Web page for each client. However,
because each Web page has a separate cookie, an attacker can see what Web sites
you have visited—and over time track your browsing behavior—by looking at the
cookies stored in your Web browser. Additionally, cookies may include personal
information that has been given to a Web site.
To protect personal and Web browsing information, most browsers allow users to
manage cookies by specifying which cookies are trusted and setting the browser to
routinely delete all other cookies. However, deleting certain cookies makes some
Web sites unusable.
Further Reading
For specific instructions on how to clear a Web cache or manage
cookies, see http://www.pcworld.com/article/106715-1/article.html, or
visit vendor Web sites:
• http://www.microsoft.com/windows/ie/ie7/privacy/ieprivacy_pr7.
mspx
• http://www.mozilla.org/projects/security/pki/psm/help_20/using_
priv_help.html
• http://browser.netscape.com/ns8/help/options-
privacy.jsp#cookie_settings
Rev. 6.41 7 – 15
ProCurve Network Security Fundamentals
It is one thing to create a security policy that requires all network endpoints to use
antivirus software, personal firewalls, and current patches, and quite another to
verify that each endpoint actually complies with this policy. By monitoring and
tracking endpoint software, behavior, and network usage, network security
compliance solutions can pinpoint security problems and ensure that endpoints
meet requirements. In some cases, these solutions can also distribute such software
from a central network location, further reducing the manpower required to
manage and maintain endpoint security.
A network that attempts to control endpoints’ compliance can be compared to a
government attempting to inoculate its population against various diseases. Just as
the inoculation of a single individual protects everyone who comes in contact with
him, ensuring that each endpoint has up-to-date antivirus software helps protect
the network as a whole as well as the node itself. Network security compliance
solutions are the means by which a network ensures endpoints do not “spread
disease.”
7 – 16 Rev. 6.41
Layer 4: Endpoint Integrity
Rev. 6.41 7 – 17
ProCurve Network Security Fundamentals
All monitoring and management solutions require agents, but they differ in the
type of agent they use and the way in which that agent is installed on the endpoint.
Perhaps the most straightforward approach for deploying agents is to manually
install on each managed device the software application specific to your network
security compliance solution. Solutions that use this approach are considered
permanent agent-based solutions.
Permanent agent-based solutions have several benefits:
Reduced network bandwidth usage—Permanent agents can generate and
send alerts only when there is a problem, or they can send information to the
management server when requested.
Robustness—Permanent agents run independently from the management
server and can continue to monitor and manage a device even in the event of
a network outage.
Control—Permanent agents can often automatically correct configuration
problems.
7 – 18 Rev. 6.41
Layer 4: Endpoint Integrity
Rev. 6.41 7 – 19
ProCurve Network Security Fundamentals
7 – 20 Rev. 6.41
Layer 4: Endpoint Integrity
For example, your company uses Web authentication (Web-Auth) to control the
complimentary network access it offers guests. Before prompting a user to enter
his username and password, the system directs him to a link where he can
download the agent that helps scan his device for compliance.
Transient agent-based solutions have several benefits:
Ease of deployment—Time and resources are saved because the solution
itself manages the installation of the transient agent.
Control—Like a permanent agent, a transient agent is designed to work with
your network compliance solution, so it may be able to help the endpoint fix
problems as specified by that solution.
But transient agent-based solutions are not without drawbacks:
Time to connect—Installing permanent agents on every endpoint may be
time consuming, but it is a one-time affair for each individual endpoint. With
transient agents, users must always wait for the agent to download before
they can connect to the network.
Imperfect deployment—Some endpoints still might fail to receive the agent
either because the user refuses the download or because the endpoint’s
security policies prohibit downloading executable files.
Note
Some vendors call their transient agent-based solutions “agentless” solutions
because you do not have to install software manually on every station.
However, the solutions do require an agent, albeit one that deploys
automatically.
Rev. 6.41 7 – 21
ProCurve Network Security Fundamentals
Agentless Solutions
7 – 22 Rev. 6.41
Layer 4: Endpoint Integrity
Problems include:
Drain on network bandwidth—Communication and information gathering
between the managed device and the management server occurs through
device polling and SNMP traffic. Because all information from every
managed device must be collected by a management server, agentless
solutions can occupy a great deal of bandwidth and cause traffic choke points
at the management server.
Decreased security—Many agentless solutions use SNMP as a method to
report and collect information about managed devices. This leaves the
managed devices vulnerable to security issues raised by SNMP and the
additional open TCP/UDP ports.
Limited problem management—If a problem is discovered, agents can
usually implement an automatic configuration change, or changes can be
passed down from the management server. Agentless solutions, on the other
hand, are unable to make automatic or remote configuration changes.
However, users can still be directed toward resources that help them to solve
the problem.
An agentless solution can be compared to a government that consolidates medical
records with other commonly carried documents. When necessary, a citizen can
prove that she has received mandatory inoculations without the hassle of visiting
the doctor. However, should she find that she does not have the required
inoculations, she has fewer options for receiving them.
Rev. 6.41 7 – 23
ProCurve Network Security Fundamentals
Combined Solutions
Agentless solutions can work well on devices that do not allow the installation of
software-based agents or on devices that only need to be monitored. Agent-based
solutions are necessary for devices that need robust monitoring and management.
For the best of both worlds, some vendors are now offering solutions that combine
several types of agents. Combined solutions support the robustness of permanent
agent-based monitoring with the ease of deployment and smaller expense of
transient agent-based and agentless monitoring.
For example, network administrators might install software-based agents on
devices that require high availability and robust management, but use an agentless
approach for endpoint devices that need only monitoring or patch and update
management.
Some network compliance solutions automatically determine the best type of
monitoring for a particular endpoint based on configurable policies. For example,
the solution might automatically apply agentless monitoring to all endpoints with the
necessary native capabilities. Network administrators install permanent agent
software on older devices for which this approach fails. Finally, transient agents
deploy to endpoints missed by both of these methods.
7 – 24 Rev. 6.41
Layer 4: Endpoint Integrity
Rev. 6.41 7 – 25
ProCurve Network Security Fundamentals
To this point, the discussion of network security compliance solutions has focused
on testing for compliance. But tests mean little unless their results affect the level
of access an endpoint is granted.
Some security solutions force endpoints to download patches and antivirus software
when they connect to the network, but are implemented on the endpoint. Abdicating
control to the endpoint clearly causes problems: an endpoint without the appropriate
software connects to your network freely, and yet this is the very type of device you
want to control. It is far better to integrate compliance scans into a network-based
access control solution (such as those discussed in Module 4—Layer 1: Network
Access Control Security), preventing unprotected endpoints from ever connecting to
your network.
Trusted Network Connect (TNC) is a security standard developed by the Trusted
Computing Group (TCG) to integrate compliance testing with network access
control solutions. In other words, in order to receive network access rights, an
endpoint must prove its integrity in addition to its identity.
Because TNC defines open standards to which all vendors can develop, by
conforming with TNC you no longer have to worry so much about whether your
compliance solution integrates with software on your endpoints and with your
network access control solution.
7 – 26 Rev. 6.41
Layer 4: Endpoint Integrity
Rev. 6.41 7 – 27
ProCurve Network Security Fundamentals
The next slide will explain some of the actions both TNC and non-TNC solutions
can take to deal with non-compliant endpoints.
Further Reading
TCG is a group that includes over 50 of the networking industry’s leading
companies. For more information on TCG and the companies involved, see
http://www.trustedcomputinggroup.org.
For more information specifically on TNC, see
https://www.trustedcomputinggroup.org/groups/network/.
7 – 28 Rev. 6.41
Layer 4: Endpoint Integrity
When an endpoint fails to meet your company’s security policies, the network
security compliance solution may dictate one of three possible responses:
Disconnect—Without the proper antivirus software and OS patches, the
endpoint might open security holes in your network. The most secure
solution would be to then shut down the port through which the non-
compliant device is trying to access the network. However, this can prevent
important users from accessing network resources they might need. Rather
than outright denying the endpoint access, you can specify that the network
grant the non-compliant device limited access.
Quarantine—Because a non-compliant network device is a security risk, it is
prudent to use virtual local area networks (VLANs) or other network
segregating techniques when granting such a device limited network access.
The VLAN should be highly restrictive: it should include severe rate-limiting
and access control lists (ACLs) to prevent the non-compliant devices from
having any contact with other devices on the network. Traditionally, while a
quarantine VLAN prevented, for example, an endpoint infected with a worm
from infecting fully compliant and trusted network devices, it did not prevent
the infected endpoint from contaminating other devices on the quarantine
VLAN. However, some solutions now place each quarantined device in its
own isolated VLAN. In either case, a quarantine VLAN protects the network
Rev. 6.41 7 – 29
ProCurve Network Security Fundamentals
from a non-compliant device; it does not present such a device with the
specific resources it needs to become compliant. (For more information on
VLANs and ACLs, see Module 4—Layer 1: Network Access Control
Security.)
Remediation—The third option is to quarantine the non-compliant device
but also provide it with the resources it needs to become compliant. Ideally,
the solution should inform the user how his or her device fails to comply with
security policies and what he or she can do to remediate the problem—for
example, users might be redirected to a network server from which their
devices can download the software they need to become compliant. For the
duration of this process, the endpoint is placed in a carefully controlled
remediation VLAN, which typically allows access only to the Web sites or
network servers with the necessary antivirus software and patches.
(Depending on your solution, the remediation VLAN might also provide
limited network access, such as to the Internet only.) Once the required
software is installed, the endpoint can be granted greater access to the
network (though access is still controlled by network policies).
Further Reading
For more information on quarantine and remediation solutions, see
vendor Web sites such as:
http://trial.patchlink.com/update.aspx
http://www.miragenetworks.com/products/quarantining.asp
http://www.stillsecure.com/safeaccess/index.php
Or you can see http://www.engr.sc.edu/its/ClientValidation/?c=4.
7 – 30 Rev. 6.41
Layer 4: Endpoint Integrity
Summary
Rev. 6.41 7 – 31
ProCurve Network Security Fundamentals
7 – 32 Rev. 6.41
Comprehensive Security Solutions
Module 8
Objectives
The layered approach to network security allows you to apply security solutions in
an organized and methodological fashion. Even after deploying security solutions
from Layers 1 through 4, however, you may still have unprotected network
vulnerabilities: the current trend in network attacks is to exploit crucial network
protocols or to launch zero-day attacks on vital network software. Additionally,
most of the Layer 1 through 4 security solutions do not include methods for
establishing and tracking their effectiveness, impeding your ability to adjust the
solutions to meet your network’s needs.
This module introduces you to security solutions that work over several layers to
specifically monitor the network, detect security breaches, and in some cases
prevent network attacks.
After reading this module, you should be able to:
Explain the functions of comprehensive security solutions
Describe how network device features such as the following can help secure
a network:
• Bridge Protocol Data Unit (BPDU) blocking
• Dynamic Host Configuration Protocol (DHCP) protection
• dynamic Address Resolution Protocol (ARP) protection
• Virus Throttle™ software
• Simple Network Management Protocol (SNMP) throttle
Describe how an intrusion detection system (IDS) discovers network attacks
Discuss how an intrusion prevention system (IPS) can keep a network secure
Explain how a unified threat management (UTM) device can be a valuable
part of your network security
Show how a wireless IDS/IPS can add an important element of security to
your wireless network
Comprehensive Solutions
Cost savings—An integrated solution such as a UTM device can provide the
same functionality as several separate security products. You can save money
by purchasing a single solution and decrease your management time by
managing one solution rather than several.
The first part of this module will discuss device-specific security measures that
address the lack of security in commonly used network protocols. The module will
then introduce IDSs and IPSs and, finally, UTM devices.
These protocols are all required for most networks to function properly. However,
because they do not include inherent security features, they are vulnerable to
specific attacks. (The functions and security implications of each of these
protocols will be discussed in greater detail in the following sections.) To mitigate
these vulnerabilities, many network devices now include features that overcome
security shortcomings in the protocol, protecting both the device and the network.
These features address the Network Access Control Security layer and the Device
Access Security layer.
BPDU Blocking
Overview of RSTP
Recall that Layer 2 devices work by transmitting broadcast frames and frames with
unknown destinations out of every interface, except the interface on which the
traffic was received. This behavior can create a problem in a network with
redundant links because devices will continue to forward the broadcasts to each
other: a single frame can create a broadcast storm that saturates the bandwidth
capacity of the network.
Good network design includes redundant links that provide an alternate path for
traffic to follow in case one path should fail. To allow a Layer 2 network to have
redundant links while avoiding the pitfalls of broadcast storms, network ports must
be part of a spanning tree (a loopless network topology) that is designed to prevent
these broadcast storms.
This loopless topology is typically constructed using RSTP (which has superseded
the original STP). RSTP works by electing a root device that serves as a common
point around which the network can define primary connections. The root device is
usually the device with the lowest priority value. If more than one device has the
same priority value, the device with the lowest MAC address becomes the root.
After the root device is chosen, each port on every participating device is put into a
forwarding or blocking state based on the path cost to the root device. The ports
with the lowest cost paths are put into a forwarding state and forward network
traffic. Any redundant ports are placed in a blocking state and do not forward
network traffic. If a forwarding port goes down, however, the redundant port is put
into a forwarding state and begins to forward traffic.
Vulnerabilities of RSTP
This is a high-level description of how RSTP works; at a lower lever, the protocol
relies on bridge protocol data units (BPDUs). BPDUs are a specific type of Layer 2
frame used to communicate spanning tree information. These frames are insecure:
they have no authentication, can be easily spoofed, and contain information about
the network such as infrastructure device MAC addresses. Several network attacks
take advantage of the lack of security measures:
Spoofed BPDUs—An attacker can broadcast a spoofed BPDU to the
network to cause network devices to recalculate path costs and perhaps to
force a device to use a slower port to forward all network traffic. A DoS
attack can occur when the traffic bottlenecks at a device port that doesn’t
have sufficient bandwidth.
Endpoint becoming root—An endpoint device can become the root either
unintentionally by assigning an incorrect priority value or intentionally using
a man-in-the-middle (MITM) attack. In an RSTP MITM attack, a rogue edge
switch with a priority value of zero is attached to the network. When an edge
switch becomes the spanning tree root, it impedes the network’s ability to
efficiently handle traffic, sometimes causing in a DoS attack.
In the slide on the previous page, a rogue switch is added to the network,
creating a spanning tree topology change. This topology change disables a
high-speed link between the two core switches, creating a DoS attack.
Further Reading
For more information on BPDU filtering and protection, see Chapter 10:
Bridging–Transmitting Non-IP Traffic or Merging Two Networks in the
ProCurve Secure Router 7000dl Series Basic Management and
Configuration Guide.
DHCP Protection
DHCP Vulnerabilities
DHCP helps reduce network administrative overhead by automatically assigning
and managing IP addresses. However, DHCP packets do not provide
authentication or access control; therefore, the DHCP server has no way of
knowing if the client requesting the address is a legitimate client on the network,
and the DHCP client has no way of knowing if the server that assigned the address
is a legitimate network server. As a result, DHCP is vulnerable to attacks from
both rogue clients and servers. For example:
Address spoofing—A rogue DHCP server on the network can assign bogus
addresses to network devices. Without valid IP addresses and network
gateway addresses, these devices are unable to contact any other IP network
devices.
Address exhaustion—An attacker can access the network and request IP
addresses until the DHCP server’s supply of available addresses is exhausted.
This prevents legitimate hosts from receiving IP addresses and accessing the
network.
8 – 10 Rev. 6.41
Comprehensive Security Solutions
ARP Poisoning
ARP Table Switch ARP Table
IP MAC A B IP MAC
IP A MAC A IP A MAC C
IP B MAC C IP B MAC B
C
ARP Vulnerabilities
ARP works to resolve a device’s MAC address with its IP address. ARP creates
and populates a table of known MAC and IP addresses, and it requests information
for unknown MAC or IP addresses. However, most ARP devices update their
tables every time they receive an ARP packet even if the information wasn’t
requested. This makes ARP vulnerable to these attacks:
ARP poisoning—ARP poisoning occurs when an unauthorized device forges
an ARP response that is subsequently adopted by a network device. In the
example above:
1) A sends a request for B’s MAC address.
2) C responds with a packet that matches B’s IP address with C’s
MAC address.
3) When A updates its ARP table with the spoofed entry, A’s ARP
table is considered “poisoned.”
4) C poisons B’s ARP table by matching A’s IP address with C’s
MAC address in response to a request from B.
5) Because A’s and B’s IP addresses are matched with C’s MAC
address, all IP traffic that the two intend to send to each other is
sent to C instead.
Rev. 6.41 8 – 11
ProCurve Network Security Fundamentals
5) Because A’s and B’s IP addresses are matched with C’s MAC
address, all IP traffic that the two intend to send to each other is
sent to C instead.
Reconnaissance—Device C works as a man-in-the-middle, intercepting and
sniffing all packets to A and B. This is problematic because C can sniff
information such as usernames and passwords and use this information to
gain authenticated access to the network.
DoS—C can spoof the network gateway’s MAC address with a non-gateway
device’s IP address. Because the non-gateway does not have access to outside
networks, outgoing traffic is prevented from leaving the network. The non-
gateway device may also be overwhelmed by the outgoing traffic.
8 – 12 Rev. 6.41
Comprehensive Security Solutions
SNMP Throttle
Recall from Module 6—Layer 3: Device Access Security that SNMP provides
device monitoring and management and that SNMP version 3 (SNMPv3) includes
some security features. However, despite the inherent security measures in
version 3, SNMP can still cause an unintentional DoS attack: a network outage can
cause several devices to generate SNMP traps, and many of these traps in rapid
succession can quickly overwhelm the network.
SNMP throttling solves this problem by requiring network devices to wait a
configurable time period between sending traps. This fix is similar to that for some
highway traffic access problems. For example, in some urban areas, highway
onramps are equipped with metering lights. These metering lights only allow a
single car from each onramp lane to enter the highway at a time. By staggering
access to the highway, these meters mitigate bottlenecks created when a large
group of cars all attempt to enter the highway at once.
Just as metering a single onramp will not necessarily make a large difference in
highway traffic, enabling the SNMP throttle limit on one device will not eliminate
the danger of a DoS attack. You should set the SNMP throttle limit on the majority
of managed network devices to prevent traps from clogging the network and
causing a DoS attack.
Rev. 6.41 8 – 13
ProCurve Network Security Fundamentals
8 – 14 Rev. 6.41
Comprehensive Security Solutions
3. If the destination endpoint is not listed in the working set, Virus Throttle™
software checks the connection rate threshold for the source. The connection
rate threshold determines how many new connections an endpoint is allowed
to make in a set time period. The connection rate is a good indicator of virus
activity. For example, in most circumstances an endpoint may open one new
connection per second while an infected endpoint may attempt to open
hundreds.
4. If the new connection request exceeds the source’s threshold, Virus
Throttle™ software takes action. It can both send an alarm and block traffic
associated with new connections, either for a short “penalty period” or—if
the endpoint continues exceeding its threshold—permanently.
Throttling viruses can also be compared to onramp metering lights. Each car is like
a connection (or conversation). The meter restricts access to the highway to one
car per light while allowing cars already on the highway to continue moving
freely. Similarly, Virus Throttle™ software restricts the number of new
connections, but allows traffic associated with existing connections to flow freely.
Because Virus Throttle™ software manages traffic based on its behavior rather
than on virus signatures, wide deployment of this feature makes the network
infrastructure resistant to known and unknown threats. This feature also works for
zero-day attacks: if a previously unknown worm infects a machine, Virus
Throttle™ software limits outgoing connections based on the worm behavior and
greatly slows the spread of the infection.
Further Reading
For more information on Virus Throttle™ software, see
http://www.hp.com/rnd/pdfs/virus_throttling_tech_brief.pdf, or see
http://h20000.www2.hp.com/bc/docs/support/SupportManual/c0036
9532/c00369532.pdf.
Rev. 6.41 8 – 15
ProCurve Network Security Fundamentals
So far, we have discussed device features that not only protect network
infrastructure devices but also protect against unintentional and intentional DoS
attacks. These features, however, are focused preventive measures: they only
protect against specific types of network attacks.
The next two sections will introduce you to network security technologies that put
systems in place to identify, react to, and in some cases prevent a broad range of
network intrusions.
8 – 16 Rev. 6.41
Comprehensive Security Solutions
IDS
IDS
Network
Attack Attack Attack
IDS Internet
Attacker
Attack
detected
Alert
generated
Rev. 6.41 8 – 17
ProCurve Network Security Fundamentals
IDSs
Intrusion detection with an IDS works in a similar manner. The IDS acts as an
alarm system: it is a tripwire, benchmark, and security guard that looks for and
tracks network changes and reports suspicious behavior. By using audit data
collected by the IDS (such as bandwidth usage, packet elements, and file activity),
you can detect whether your network has been compromised.
IDSs provide a good security solution that allows network administrators to
address security issues that may otherwise go unnoticed. However, IDSs are not a
perfect solution:
They only monitor and report—When an intrusion is detected, traditional
IDSs do not take automatic preventive or reactive measures beyond sending
notifications to the network administrator.
They can generate a high number of false positives—If the number of
false positives is too high, it can render the IDS more of a problem than a
solution. To overcome over-sensitive IDSs, network administrators must put
a considerable amount of time into fine-tuning the traditional IDS.
Further Reading
For more information on IDS, see http://www.sans.org/resources/idfaq/.
8 – 18 Rev. 6.41
Comprehensive Security Solutions
Detection Components
For comprehensive network monitoring, installing both NIDS and HIDS services
on your network is recommended. For example, when diagnosing an infection, a
doctor may perform multiple tests: the doctor may check the blood for signs of
infection as well as look at the tissue for wounds or other telltale signs. In cases
where the doctor is unable to find a specific infection in the tissue, the blood test
may return more definite results. And in cases where the blood test is negative, the
doctor may find small infections in the tissue and begin to treat them before they
become larger.
IDSs work in a similar way: network-based IDSs monitor the network bloodstream
while host-based IDSs monitor the network tissues, looking for wounds and other
signs of problems. And just as the doctor needs both tests to watch a person’s
health or diagnose an infection, you need both a NIDS to watch the traffic flow
and HIDSs to monitor network endpoints in order to keep a comprehensive watch
on network health and security.
8 – 20 Rev. 6.41
Comprehensive Security Solutions
Network-based IDS
Network-based IDS
IDS
Network
Analyzer
IDS Internet
Sensor
A NIDS uses strategically placed sensors to monitor network traffic. These sensors
are placed at traffic choke points and near traffic sources. A NIDS provides the
following benefits:
All network traffic is monitored—When deploying a NIDS, it is important
to monitor all network traffic streams: any traffic entry point left unmonitored
creates a security hole. With sensors placed at strategic points within the
network, a NIDS can observe all network traffic. However, processing a large
amount of traffic can create a bottleneck that can impair the overall network
speed. Additionally, certain types of traffic, such as encrypted packets, may
require extra time and processing power to analyze.
Intrusions can be detected before attacks become security breaches—
Because a NIDS looks at network traffic, attacks can be detected as the traffic
enters the network and before the first attack packet reaches its destination
endpoint.
Reconnaissance and DoS attacks can be detected—Again, because a NIDS
watches all network traffic, it can detect attacks such as network mapping
attempts and repeated DoS packets that would otherwise go unnoticed by a
firewall.
No host or network impact—A properly installed NIDS does not use
network or host bandwidth or resources.
Although a NIDS may seem like a good method for monitoring and detecting
network intrusions, it:
Rev. 6.41 8 – 21
ProCurve Network Security Fundamentals
8 – 22 Rev. 6.41
Comprehensive Security Solutions
TAPs
TAPs are specialized devices designed to split off in-line copies of network traffic
without affecting network throughput. Copying occurs at Layer 1; that is, the data
signal itself is split.
In most networks, data is forwarded over two types of media: fiber optic cables or
copper wire such as that found in CAT-5 cables. TAPs split the signal differently
depending on the transmission medium:
Fiber optic cables—The optical signal is divided into two streams with a
beam splitter. After the signal has been split, one signal is sent to the NIDS
and the other signal continues through the TAP unimpeded. Optical signals
are usually strong enough to withstand beam splitting without requiring
signal augmentation or regeneration. Therefore, fiber taps are passive devices
and often do not require a power supply.
Note
When implementing TAPs on fiber optic cables, you must carefully
analyze your potential optical signal loss and attenuation. Fiber optic
technologies and devices vary greatly and this course cannot, within its
scope, address all the potential issues.
Rev. 6.41 8 – 23
ProCurve Network Security Fundamentals
Copper cables—The electrical signal is split into two and forwarded over
two separate wires. Electrical signals can degrade fairly quickly. As a result,
electrical signal regeneration is required in most cases.
When properly implemented, TAPs provide complete network information for the
IDS. Some considerations to keep in mind when using TAPs:
They are passive devices—Absolutely no packet inspection occurs on the
TAP. The TAP sends all signals exactly as they are received, including errors
and malformed packets. This allows for an accurate view of the network.
However, because TAPs are passive devices, they cannot be used to mitigate
an attack.
They can operate without an IP address—TAPs that operate without an IP
address are transparent to network traffic. The lack of address works as an
additional security measure: TAPs cannot be seen by reconnaissance attacks,
so they cannot be used as a pathway to directly attack the IDS or the network.
They can become a potential single point of failure—A TAP that fails
closed will prevent any traffic from being forwarded on that line. In some
cases, such as during DoS attacks, it may be preferable for all network traffic
to be halted in the area of failure rather than allowed to blindly continue
through. However, most TAPs are designed to fail open to allow continued
network operation.
They must be placed carefully—TAPs must be deployed at network choke
points. However, if not placed correctly, portions of the network may be left
unmonitored.
They can be expensive—Because TAPs should be placed at every network
choke point, the cost of deploying TAPs can quickly add up, particularly in
large networks.
8 – 24 Rev. 6.41
Comprehensive Security Solutions
Port Mirroring
Rather than purchase and deploy separate TAPs to collect traffic data for the
NIDS, you can collect the data using the port mirroring feature commonly found in
switches.
Port mirroring may seem to be a simple solution that takes advantage of network
device features you may already have. However, there are several drawbacks to
port mirroring:
Often only one port or VLAN can be mirrored—Because of processor
constraints, in many cases only one port or VLAN on the switch can be
mirrored. For those switches that can be configured to mirror a number of
ports or VLANs, there is no guarantee of reliability: the mirror port usually
has the same bandwidth capabilities as any other port on the switch. Any
traffic that is received over the mirror port’s bandwidth limit may be
dropped, and this packet loss affects the IDS’s ability to comprehensively
observe the network.
Mirroring can affect network throughput—Copying and forwarding
traffic requires device processing resources. During high network usage, the
mirroring device may have difficulty managing mirrored traffic while
continuing to switch and forward all other network traffic. Thus mirroring
can affect the device’s throughput rate.
Rev. 6.41 8 – 25
ProCurve Network Security Fundamentals
Remote Mirroring
Ideally, IDS traffic should travel over dedicated lines to the IDS analyzer.
However, in most cases, the IDS analyzer will not have enough ports to
accommodate a direct connection with every network device, and a switch
dedicated to IDS traffic is not always practical. Some network devices can
overcome this limitation by using remote mirroring. Remote mirroring allows you
to send mirrored traffic from network devices to a remote analyzer using the
network infrastructure rather than a dedicated line.
Remote mirroring allows you to specify a particular port or VLAN on a remote
device as the mirrored traffic destination. You also have the option to send mirrored
traffic to any port either across a wide area network (WAN) connection or within the
local area network (LAN). Remote mirroring overcomes the port limitations
imposed by using dedicated lines for IDS traffic; however, it consumes network
bandwidth and is still limited by device bandwidth and resource constraints.
8 – 26 Rev. 6.41
Comprehensive Security Solutions
Traffic Profiling
Rather than send copies of all network traffic to be analyzed to the IDS, you can
reduce the network and device bandwidth and resources used for traffic analysis
by using traffic profiling technology. Traffic profiling collects and organizes
information on the traffic that traverses a network.
The main components of traffic profiling implementations are:
The agent—The agent is usually embedded into network backbone devices.
Working in tandem with the switching/routing Application-Specific
Integrated Circuits (ASICs), the agents applies an algorithm to network
traffic to collect traffic information. The agent then packages and sends the
gathered information.
The collector—The collector receives and analyzes the packaged
information. From this information, the collector creates a statistical model of
network traffic that can be used by an IDS.
Rev. 6.41 8 – 27
ProCurve Network Security Fundamentals
There are two main traffic profiling methods: flow-based and sample-based.
Flow-based
Flow-based traffic profilers work by looking at packet attributes and organizing
traffic with the same characteristics into flows. In some implementations, the
packet characteristics used to define flows are configurable. However, in most
cases flows are defined based on five Layer 3 characteristics: source IP address,
source Transmission Control Protocol/User Datagram Protocol (TCP/UDP) port,
destination IP address, destination TCP/UDP port, and IP protocol. After the
traffic is separated into flows, the flow-based profiling agent tallies up flow
statistics, such as how many packets were exchanged and bytes sent/received
during the session associated with the flow. Statistics such as these are collected
from several flows, packaged, and sent to the collector, which analyzes the
information and generates reports. Examples of flow-based traffic profilers include
NetFlow, JFlow, and IP Flow Information eXport (IPFIX).
Sample-based
Rather than separating traffic into flows, a sample-based profiler uses statistical
traffic sampling to create a statistically accurate profile of network traffic within a
margin of error. That is, rather than require the agent to inspect every packet that
passes through, sample-based profiling looks at every nth packet and derives
correct statistics based on the sampled traffic. The standard sample-based profiling
technology is sFlow.
Unlike flow-based profilers that package the information into an export data
packet, sFlow packages sample information into small datagrams. These sFlow
datagrams include Layer 2 through 7 information, including packet routing
information (source, destination, hop addresses, and AS numbers) as well as
authentication information and a payload sample. sFlow datagrams are compact
and do not require a large amount of network bandwidth: they are approximately
0.7 percent of the original packet size, and information from several packets can fit
into a single datagram.
One sFlow collector can monitor a network of thousands of switches because the
UDP datagrams do not include the user data payload. Therefore, the collector
provides timely reports of network traffic while consuming a minimum of
bandwidth.
8 – 28 Rev. 6.41
Comprehensive Security Solutions
Further Reading
For more information on sFlow, see RFC 3176 at
http://www.ietf.org/rfc/rfc3176.txt, or see the sFlow Web site at
http://www.sflow.org.
For more information on NetFlow, see
http://en.wikipedia.org/wiki/NetFlow.
For more information on IPFIX, see RFC 3917 at
http://www.ietf.org/rfc/rfc3917.txt or RFC 3955 at
http://www.ietf.org/rfc/rfc3955.txt.
Rev. 6.41 8 – 29
ProCurve Network Security Fundamentals
Host-based IDS
Host-based IDS
HIDS
Internet
Internet
IDS
Manager
IDSs work by monitoring the network and generating alarms to notify network
administrators when unusual behavior is detected. A NIDS collects audit data from
disbursed sensors, forwarding the data to a central engine that analyzes it and
generates alarms when potential attacks are detected. HIDSs, however, work
without disbursed sensors: instead, they monitor the network by collecting,
analyzing, and generating alarms autonomously on each endpoint device.
HIDSs monitor network endpoints in several ways:
File integrity monitoring—Using checksums and message digests, HIDSs
can ensure that no files, particularly crucial system files, are compromised.
Device state monitoring—Device states include a list of all currently
running processes. Because endpoint intrusions often alter a device state by
running malware or other executables, a HIDS can detect possible intrusions
based on unexpected device states.
Dynamic behavior monitoring—A HIDS can monitor applications on the
device and ensure that they are behaving as expected. For example, a HIDS
will detect if a word processor suddenly starts to modify the system password
database, which would signal a network intrusion.
HIDSs have the following benefits:
They can verify the success or failure of a network intrusion—While
NIDSs can detect that an attack packet is on the network, HIDSs can report
whether an attack successfully reaches its intended destination.
8 – 30 Rev. 6.41
Comprehensive Security Solutions
Rev. 6.41 8 – 31
ProCurve Network Security Fundamentals
HIDSs allow you to monitor endpoint integrity and catch internal attacks, and
NIDSs allow you to monitor network traffic and detect reconnaissance and DoS
attacks. As mentioned earlier, for a complete IDS solution, you should use a
combination of a NIDS and a HIDS, allowing you to leverage the best of both IDS
types. For example:
Hybrid solutions can discover attacks that, separately, HIDSs and NIDSs
would miss.
Hybrid solutions can both detect an attack through the NIDS and determine
whether it was successful through the HIDS.
Hybrid solution IDS analyzers are able to correlate NIDS and HIDS
information for more complete network monitoring.
Hybrid solutions are deployed in a similar fashion to HIDS and NIDS solutions:
NIDS sensors should be deployed at all network entry and exit points as well as
next to all traffic sources, and HIDSs should be deployed on all business critical
endpoint devices such as servers and superuser workstations.
After the IDS sensors are in place, the hybrid IDS analyzer can then monitor NIDS
and HIDS audit data.
8 – 32 Rev. 6.41
Comprehensive Security Solutions
Pattern-based Detection
IDSs analyze audit data and look for intrusions using two different methods:
pattern-based analysis
anomaly-based analysis
Pattern-based analysis compares the network audit data with known attack
behaviors and patterns in one of two ways: by defining rules or by using attack
signatures.
Rule-based Detection
Rule-based detection uses preconfigured profiles (rules) that characterize known
security attack scenarios. For example, a known DoS attack might involve three
unique phases; during each phase the attacker sends a specific type of packet. The
IDS analyzer will recognize the first packet as part of the first phase of the known
DoS attack. Rule-based analysis can detect intruders that exhibit specific patterns of
behavior known to be suspicious or in violation of security policies. In particular, it
is intended to detect attempts to exploit known security vulnerabilities, such as OS
holes and protocol weaknesses, and to raise an alarm if observed activity matches
any of its encoded rules.
Rev. 6.41 8 – 33
ProCurve Network Security Fundamentals
Most rule-based systems are user configurable so that you can define your own
rules based on your corporate environment. However, because rule-based detection
relies on pre-configured profiles of known intrusions, intrusions not profiled in the
set of rules will be overlooked.
Signature-based Detection
Similar to rule-based detection, signature-based detection works by comparing
audit data with the signatures of known attacks. A signature consists of an
attack model based on past intrusions and is stored in a signature database.
Unlike rule-based detection, in which the IDS detects attacks based on
behaviors, signature-based detection looks only at packet contents. Signature-
based IDSs must recognize and interpret certain series of packets (or data
within the packets) as an intrusion attempt.
Further Reading
For more information on signature-based detection, see
http://www.sans.org/resources/idfaq/limitations.php.
For more information on rule-based detection, see the Snort Web site
at http://www.snort.org.
8 – 34 Rev. 6.41
Comprehensive Security Solutions
Anomaly-based Detection
Relying on known attack patterns can leave the network vulnerable to new attacks;
instead, you can use an attack detection method based on the fact that any network
intrusion will create some sort of anomalous behavior. Anomaly-based detection
discovers network intrusions based on statistical deviations from pre-established
network norms.
Anomaly-based IDSs analyze audit data and compare it to typical or predicted
network profiles. Suspicious behavior is flagged when it deviates from the
normal network usage by a pre-set percentage.
This type of detection requires a network baseline to act as a standard. This
baseline is usually established through the following steps:
1. System usage samples are taken over a learning period of normal operation.
2. Using these samples, the IDS establishes average network resource usage,
such as CPU utilization, packet protocol types, bandwidth consumption,
and so on.
3. As the learning period progresses, the baseline thresholds are adjusted to take
into consideration normal deviations.
Rev. 6.41 8 – 35
ProCurve Network Security Fundamentals
4. At the end of the learning period, this baseline is used to define expected
normal network behavior. Any sequence of events that deviate from this
baseline by a statistically significant amount is flagged as a possible
intrusion. For example, a statistically significant deviation may include 10 or
more failed login attempts, users logging in at odd hours, or unexplained
device restarts.
Because anomaly-based IDSs do not rely on known attack profiles, they can detect
new or zero-day attacks that may not be recognized by signatures. Anomaly-based
IDSs can also be more sensitive to intrusions because of their ability to adapt and
create baselines that keep close to normal network behavior.
However, anomaly-based IDSs tend to produce more false positives than pattern-
based detection. To mitigate this problem, network administrators must take the
time to determine and fine-tune the statistical standard deviation thresholds. An
attacker can also outsmart this type of IDS by making gradual behavior changes
over time.
To generate traffic baselines and detect deviations, NBAD systems collect network
information in a variety of different ways. For example, many NBAD systems rely
on traffic profiling technologies such as NetFlow and sFlow.
8 – 36 Rev. 6.41
Comprehensive Security Solutions
Further Reading
For more information on anomaly-based detection, see
http://www.sans.org/resources/idfaq/anomaly_detection.php.
For more information on NBAD, see
http://www.itarchitectmag.com/shared/article/showArticle.jhtml?articleId
=163700677.
Rev. 6.41 8 – 37
ProCurve Network Security Fundamentals
Active Response
8 – 38 Rev. 6.41
Comprehensive Security Solutions
As you have seen, IDSs provide comprehensive network monitoring but very little
in the way of actively protecting the network against attacks.
Next, we will discuss IPSs, which are comprehensive security solutions that use
intrusion detection methods to identify attacks and take active measures to protect
the network before an attack succeeds.
Rev. 6.41 8 – 39
ProCurve Network Security Fundamentals
Most network administrators do not have the time to constantly respond to IDS
alerts. Active response reduces the need for immediate administrator response.
However, a good network security product will do more than send RST packets
and adjust ACLs.
IPSs do just that. IPSs are designed to detect network attacks and take immediate
countermeasures rather than waiting for a network administrator to react to the
threat. And unlike IDSs, IPSs can stop the initial exploit from being successful
while responding to the attack. As a result, IPSs are becoming the standard
comprehensive security solution.
Similar to IDSs, IPSs can be deployed as a host-based solution or as a network-
based solution:
Host-based IPS (HIPS)—Because an HIPS resides directly on an endpoint
and so can tightly monitor that device, it is very effective at detecting
attacks and taking appropriate countermeasures. But similar to HIDS,
HIPSs are not an easily scalable solution: deployment on every network
endpoint requires a large amount of time and management.
8 – 40 Rev. 6.41
Comprehensive Security Solutions
Further Reading
For more information on HIPS, see
http://www.networkworld.com/news/tech/2005/072505techupdate.
html.
For more information on NIPS, see
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci969054,
00.html.
Rev. 6.41 8 – 41
ProCurve Network Security Fundamentals
IPS
Initially, IPSs identified and stopped network attacks using access control and
firewalls: ACLs and firewalls prevent attacking packets from accessing the
network.
The current approach to intrusion prevention is much more sophisticated than
merely whitelisting or blacklisting packet attributes. When placed in-line with
network traffic, an IPS can take countermeasures as soon as an attack is detected.
IPSs implement countermeasures at four OSI Layers:
Data Link—For local or internal attacks, the IPS can shut down a network
port interface associated with the system from which attacks are being
launched.
Network—The IPS can interact with the firewall or gateway device to add
ACL entries that block all communication from an individual IP address or
from an entire network.
Transport—To tear down malicious TCP sessions, the IPS can generate and
send TCP RST packets. For malicious UDP sessions, the IPS can respond by
generating and sending Internet Control Message Protocol (ICMP) error packets.
Application—The IPS can alter malicious application layer data to make it
harmless before it is forwarded to the destination endpoint.
8 – 42 Rev. 6.41
Comprehensive Security Solutions
However, because IPSs handle network traffic in a different manner than IDSs,
they detect attacks in slightly different ways. The next section will discuss the two
ways in which an IPS can identify attacks:
content-based detection
rate-based detection
Rev. 6.41 8 – 43
ProCurve Network Security Fundamentals
Content-based Detection
8 – 44 Rev. 6.41
Comprehensive Security Solutions
Rate-based Detection
IPS rate-based attack detection is intended to prevent DoS and distributed DoS
(DDoS) attacks. Much like IDS’s anomaly-based detection, many rate-based IPS
solutions ignore traffic content and instead only monitor for traffic that displays
characteristics of a network flood, scan, or malware outbreak.
Just as with IDSs, rate-based IPSs requires the development of a baseline, and
intrusions are detected from statistical deviations. Specifically, IPSs check for the
following anomalies:
Behavioral—The IPS looks for anomalies in endpoint-based user behavior.
In particular, this detection method focuses on tracking the types of
applications and protocols that are typically used at certain times of day.
Some implementations can be specific enough to check keystroke timing and
the number of database queries.
Traffic—The IPS looks for anomalies in network traffic patterns. This is not
packet inspection: the IPS focuses on metrics such as traffic volume, types of
protocols, and distribution of elements such as source and destination IP
addresses.
Rev. 6.41 8 – 45
ProCurve Network Security Fundamentals
Protocol—IPSs can also look for deviations from a restrictive and detailed
set of protocol standards. For example, it can look for IP packets that use
restricted addresses (or even addresses that simply do not make sense in your
network) or TCP packets set with invalid flags. Based on the protocol
standards and average usage, the IPS creates models to act as the baselines
from which it detects deviation. This detection method can cause false
positives: not all vendors strictly comply with protocol standards.
A rate-based IPS uses very granular anomaly-detection methods and requires
network administrators to set adaptive thresholds on network parameters. For
example, this type of IPS can be configured to detect attacks that use SYN flood
packets based on several elements such as source IP address and SYN packet
thresholds.
Rate-based thresholds are adaptive. That is, the IPS is designed to learn average
traffic patterns for specific times and areas and predict expected traffic each
moment for each network parameter. That is, in addition to predicting the number
of total expected packets, rate-based IPSs can look at patterns as specific as the
number of IP packets, the number of ARP packets, the number of new connections
per second, and the number of packets on a particular TCP or UDP port expected
in the next few moments.
If the amount of actual traffic for a particular parameter exceeds the expected
amount by a statistically significant number, the IPS detects an attack. It then
prevents the attack from succeeding by using several techniques, including:
Granular rate limiting—Similar to virus throttling and SNMP throttling, the
IPS can limit the rate at which packets with certain characteristics are
forwarded through the network.
Address, network, and port scan filtering—DoS and other attack traffic
can be dropped based on the source and destination IP addresses, TCP port
numbers, or other behavior.
Rate-based IPS solutions are designed for deployment outside of the firewall to
protect the network against SYN flood and other DoS attacks. These solutions can
also identify and stop zero-day attacks based on the anomalous behavior that they
create (for example, a sudden jump in traffic).
8 – 46 Rev. 6.41
Comprehensive Security Solutions
Incident Databases
8 – 48 Rev. 6.41
Comprehensive Security Solutions
UTM
UTM is a network security solution that works at all four network security
layers—endpoint integrity, device access, data integrity and privacy, and network
access. It is an all-in-one solution that includes IDS/IPS, a stateful inspection
firewall, and antivirus capabilities. The UTM industry is a growing and changing
field, and UTM devices are becoming more comprehensive. For example, in
addition to IDS/IPS, firewall, and antivirus solutions, industry-leading UTMs can
also include:
content and spam filtering
spyware and Trojan protection
virtual private network (VPN) support
event logging
network access authentication
dynamic routing
Network Address Translation (NAT), DHCP, and Quality of Service (QoS)
support
Rev. 6.41 8 – 49
ProCurve Network Security Fundamentals
The best network location for a UTM device is between the trusted network and
the Internet. However, UTM devices can also be installed at network choke points
to offer additional protection.
A UTM offers the following benefits:
Cost-effective security— Like IPD/IPSs, UTM devices require subscriptions
to keep antivirus, content filtering, and attack signatures up to date. However,
investing in a single comprehensive solution, even one that seems rather
expensive, might be more cost-effective than purchasing several independent
solutions.
Ease of management—The UTM presents a single site for managing a great
many network functions.
While a UTM device can be a good comprehensive security solution, you should
be aware that it has the following disadvantages:
Throughput and latency—UTM processors can easily become
overwhelmed. Because UTMs are placed at network choke points, this can
affect network throughput and introduce packet latency.
Single point of failure—A failed UTM device leaves the network
completely vulnerable.
Support that varies from vendor to vendor—Because UTMs can support a
wide range of features, you must carefully research the particular features
offered by the vendor solution you are considering. For example, a UTM
device by an antivirus company may offer superior UTM antivirus protection
while providing a relatively weak IDS/IPS UTM solution. Additionally, you
should be aware that some vendors claim to offer a UTM solution, but the
solution is not truly comprehensive.
8 – 50 Rev. 6.41
Comprehensive Security Solutions
Wireless IDS/IPS
Wireless IDS/IPS
Rev. 6.41 8 – 51
ProCurve Network Security Fundamentals
Wireless Attacks
Because of the unique nature of the shared medium, wireless networks are
susceptible to several types of attacks that do not affect wired networks. These
attacks, which take advantage of the physical nature of radio communications and
of the workings of 802.11, include:
Wired Equivalent Privacy (WEP) cracking—The initial 802.11 encryption
standard (WEP) is very weak: using easily accessible software, attackers can
recover the WEP key and break into a WEP-secured network within minutes.
For more information on WEP, see Module 5—Layer 2: Data Integrity and
Privacy.
Rogue Access Points (APs)—Most endpoint devices are designed to
associate with the wireless AP that has the strongest signal, which facilitates
roaming by allowing the endpoint to detect when it is leaving one AP cell and
entering another. However, an attacker can mount a MITM attack by
introducing a rogue AP that has a vastly stronger signal than the network
APs. Wireless endpoints will try to associate with the rogue AP and reveal
username and password information in the process. This information can then
be used to gain unauthorized access to the network.
8 – 52 Rev. 6.41
Comprehensive Security Solutions
Rev. 6.41 8 – 53
ProCurve Network Security Fundamentals
Wireless IDS/IPS
8 – 54 Rev. 6.41
Comprehensive Security Solutions
The best way to deploy a wireless IDS/IPS is to place a sensor next to every AP.
These sensors can then monitor all wireless traffic and in some cases respond to
detected attacks. Wireless IDS/IPS attack responses include:
Locating attacking devices—Wireless attackers are almost always near the
AP that is being attacked, and it is often possible for the wireless IDS/IPS to
approximate the attacker’s location. With this knowledge, network
administrators can stop an attack by using a laptop with wireless network
mapping software such as NetStumbler to find the attacker and turn off the
attacking devices.
Signal jamming—When a rogue AP is detected, some wireless IPSs can
generate signal noise. This prevents any sessions between network devices
and the rogue AP from continuing.
Closing network ports—Most wireless IDS/IPSs have the ability to identify
the network port from which the attack is originating and disable that port.
Adjusting ACLs—Wireless IDS/IPSs can add ACL entries to deny traffic
from the IP or MAC address associated with an attack.
Further Reading
For more information on wireless IDS or IPS products, see vendor Web sites
such as:
• AirMagnet (http://www.airmagnet.com/products/enterprise.htm)
• AirDefense (http://www.airdefense.net/products/airdefense_ids.shtm)
Rev. 6.41 8 – 55
ProCurve Network Security Fundamentals
Summary
This course has introduced you to four network security layers, as well as solutions
that secure your network at each layer. Additionally, this module introduced you to
some technologies and solutions that you should use create a comprehensive
network security solution at several layers.
After reading this module, you should be able to describe and discuss solutions
such as IDSs, IPSs, and UTM devices and explain how to implement these
solutions for comprehensive network security.
8 – 56 Rev. 6.41
Glossary
Numeric
3DES Triple DES. A well-known public encryption standard that
encrypts information multiple times (encrypts, decrypts, and
encrypts again). Each phase uses a 56-bit key, making the total key
length 168 bits. This 168-bit key provides 2,168 or approximately
3.741e+50 possible combinations. Many security solutions,
including IPsec, the industry standard for VPNs, support 3DES.
See also IPsec and VPN.
A
AAA Authentication, Authorization (Access Control), and Accounting.
AAA controls network access and enforces security policies.
Authentication refers to the process of confirming each user’s
identity and is accomplished through the use of passwords, keys,
and often a RADIUS or TACACS+ server. Authorization ensures
that the authenticated user can access only the network resources
to which that user has rights. Accounting refers to the process of
collecting information about how resources are used. The collected
information can then be used for trend analysis, billing, or
auditing. For more information about AAA, see Request for
Comments (RFC) 2989 (at http://www.ietf.org/rfc/rfc2989.txt).
Active Content Blocking Java and ActiveX scripts in order to increase security by
Filtering preventing attackers from exploiting such scripts to install
malware or hijack a workstation.
Asymmetric key A public key or a private key used in an asymmetric key algorithm.
Asymmetric key An algorithm for cryptography that uses one cryptographic key for
algorithm encryption and a different key for decryption
Authorization The process of controlling the network resources and services that
a user can access, usually based on the user’s identity. A RADIUS
or TACACS+ server can act as an authorization server, which
makes authorization decisions enforced by other infrastructure
devices. Authorization is sometimes called access control.
B
Backdoor A method of bypassing normal authentication or securing remote
access to a computer, while attempting to remain hidden from
casual inspection. The backdoor may take the form of an installed
program or could be a modification to a legitimate program.
Black list A list of devices created for MAC authentication that blocks
network access for any listed device, while granting access to all
other devices.
Block cipher An algorithm that encrypts chunks of data, separating data into
(typically) 128-bit chunks, encrypting each block, and then
sequencing them.
BPDU Bridge protocol data unit. A specific type of Layer 2 packet frame
that carries spanning tree information. BPDUs are insecure: they
have no authentication and can be easily spoofed. A switch sends a
BPDU frame using the unique MAC address of the port as a
source address, and a destination address of the STP multicast
address.
BSS Basic Service Set. The coverage area in a wireless LAN of one
AP, identified by an SSID. In infrastructure mode, groups of BSSs
can be connected together with the use of a backbone network and
form a network called an ESS.
Bugtraq An electronic mailing list that discusses both new and established
network vulnerabilities while proposing solutions.
C
CA Certificate Authority. A trusted third-party that verifies the
identity of two parties that wish to communicate with one another.
CAs are responsible for generating, distributing, and revoking
digital authentication certificates. VeriSign is an example of a CA.
Connected token A token such as a smart card or USB token that submits
credentials directly to the user’s authentication client and from
there to the server.
Content filtering Web and email filtering to protect a network through the use of
content-control software and spam-blocking solutions.
Cookie filtering A method of filtering that tracks changes to a cookie folder and
informs the user when a third party sends a cookie. These filters
can also transparently delete any cookies on a cookie black list.
D
DAP Directory Access Protocol. In basic X.500 communications, the
DAP enables communication between the DUA and the DSA, and
defines the operations that users can perform, including read,
search, and modify.
Data Access Encryption of sensitive data for secure storage and transmission
Control over untrusted networks.
Data Integrity A security layer that focuses on protecting stored and transmitted
layer data through the use of various encryption algorithms.
Data Link Layer Layer 2 of the OSI model. At this layer, data frames are encoded
and decoded into bits. The Data Link Layer is divided into two
sublayers: Media Access Control (MAC) and Logical Link
Control (LLC). The MAC sublayer controls how a computer on
the network gains access to data and permission to transmit it. The
LLC sublayer controls frame synchronization, flow control, and
error checking.
DHCP snooping A security feature that differentiates between trusted and untrusted
ports, builds and maintains a DHCP snooping table, and filters
DHCP requests received on an untrusted port.
Digital certificate An electronic document that contains a public key and is digitally
signed by a third-party issuer such as a CA. Digital certificates are
used for network authentication. They contain the certificate
holder’s name, a serial number, the expiration dates, and a copy of
the certificate holder’s public key (used for encrypting messages).
Disconnected A token that requires the user to manually input information into
token an authentication client.
E
EAP Extensible Authentication Protocol. A protocol that allows PPP to
use authentication protocols that are not part of the PPP suite. For
more information about EAP, see RFC 3748 (at
http://www.ietf.org/rfc/rfc3748.txt). See also CHAP, PAP,
and PPP.
EAP-GTC EAP-Generic Token Card. One of the least secure EAP methods,
EAP-GTC features a two-step exchange similar to EAP-MD5.
Traditionally, the authentication credential submitted was a value
read from a token card. However, EAP-GTC can carry simple
passwords as well. EAP-GTC transports the authentication
credentials much as they are transported in CHAP.
Email content Using virus detection, spam filters, and content and image filters
filtering to filter incoming and outgoing emails.
F
False positive Traffic that may appear abnormal and is flagged as an attack, but
that is not destructive in any way.
Frame Relay Frame Relay is a protocol standard that provides a fast and
efficient method of data transmission for intermittent traffic
between LANs and between endpoints in a WAN. Frame Relay
puts data in a variable-size unit called a frame and leaves any
necessary error correction (retransmission of data) up to the
endpoints, which speeds up overall transmission time.
G
Galois/Counter An AES block cipher mode that incorporates Galois mathematical
Mode fields into the algorithm. This mode of AES allows MACsec to be
implemented within hardware at nominal cost while satisfying
high-speed requirements. See “The Galois/Counter Mode of
Operation” by McGrew and Viega at
http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gc
m-revised-spec.pdf for more information.
Rev. 6.41 G – 11
ProCurve Network Security Fundamentals
H
Hash function An encryption function that generates a number by running a string
of text through an algorithm. Because algorithms transform data so
that it is extremely unlikely that some other text will produce the
same hash value, the resulting hash is deemed to be unique.
G – 12 Rev. 6.41
Glossary
I
ICMP Internet Control Message Protocol. ICMP is part of the IP suite.
OSs that use IP as their network protocol chiefly use ICMP to send
error messages—indicating, for instance, that a requested service
is not available or that an endpoint or router could not be reached.
For more information, see RFC 792 (at
http://www.ietf.org/rfc/rfc0792.txt).
Rev. 6.41 G – 13
ProCurve Network Security Fundamentals
IPv4 Internet Protocol version 4. The fourth IP version, and the first
iteration of the protocol to be widely deployed. Besides IPv6, it is
the only protocol used on the Internet.
G – 14 Rev. 6.41
Glossary
J
Jail A type of sandbox that imposes device resource restrictions without
completely isolating the untrusted content from the OS. A jail often
consists of a file system that has severe limits on CPU time, RAM,
shared memory, and bandwidth. The untrusted content is executed
after placing it in this highly restricted file system.
K
KCK Key Confirmation Key. A key that combines with packet-specific
data to calculate the MIC in TKIP.
KDC Key Distribution Center. A trusted third party that facilitates the
exchange of encryption keys.
Rev. 6.41 G – 15
ProCurve Network Security Fundamentals
Keyword The most basic and least effective method of Web-based content
Filtering filtering, keyword filtering scans for specific words in the text of a
Web page as it is downloaded and blocks the page if any of the
listed words in its database are detected.
L
L2F Layer 2 Forwarding. A tunneling protocol enabling organizations
to set up VPNs that use the Internet backbone to move packets.
M
MAC Media Access Control. The MAC layer is the lowest Data Link
sublayer, and it interfaces directly with the network medium. A
MAC address is a hardware address that uniquely identifies each
node of a network.
G – 16 Rev. 6.41
Glossary
Managed devices Network endpoint devices that the management server manages
and monitors.
Management A VLAN that isolates device management traffic from all other
VLAN user traffic on the device. A remote user must gain access to the
management VLAN before he or she can gain management access
to the switch.
Rev. 6.41 G – 17
ProCurve Network Security Fundamentals
MyDoom A computer worm that became the fastest spreading email worm
ever (as of January 2004). Perhaps commissioned by email
spammers so as to send junk email through infected computers, the
actual author of the worm is unknown.
N
NAS Network Access Server. NASs enforce the decisions of AAA
servers, guarding access to the Internet, printers, a phone network,
or other protected resources. While an NAS does not contain
information about what clients can connect or what credentials are
valid, it does send a client’s credentials to an AAA server that
processes them and directs the NAS how to proceed.
G – 18 Rev. 6.41
Glossary
Network Access A security layer that focuses on methods to prevent attackers from
Control Security gaining entry or access to a network by using identity
layer authentication, access control, and recordkeeping.
NTP Network Time Protocol. One of the oldest internet protocols still
in use, NTP synchronizes computer clocks over packet-switched,
variable-latency data networks. NTP uses UDP as its transport
layer and is designed to resist the effects of variable latency.
O
One-way Irreversibly encrypting data into a unique stream called a hash
encryption value or message digest.
Rev. 6.41 G – 19
ProCurve Network Security Fundamentals
P
Packet Referencing OSI Layer 3, it is a block of data encapsulated within
one or more lower layer protocol headers. These headers provide
information about the packet’s application and about how the
packet is to be handled and routed as it travels through the
network. A packet that has been encapsulated within a Data Link
Layer protocol is called a frame or a cell.
Packet Sampling Rather than sending every single packet that traverses the network
to the IDS analyzer, packet sampling uses statistical sampling to
create a statistically accurate profile of network traffic within a
margin of error.
Password cracker Software that finds weak passwords and cracks them, granting
attackers access to the network. Password crackers were originally
intended for network administrators to identify weak passwords
and create more secure ones.
G – 20 Rev. 6.41
Glossary
PGP Pretty Good Privacy. PGP encrypts emails using both public-key
and symmetric-key cryptography. PGP also includes a system that
binds a public key to user identities and is incompatible with
S/MIME.
PMK Pairwise Master Key. The first key created in TKIP, calculated
using a shared secret generated during the 802.1X authentication
process.
Rev. 6.41 G – 21
ProCurve Network Security Fundamentals
Polymorphic / Code that mutates while keeping the original algorithm intact.
metamorphic Viruses and worms sometimes use this technique to hide their
code presence. Polymorphic algorithms make it difficult for AV
software and IDSs to locate offending code as it constantly
mutates.
Encryption is the most commonly used method of achieving
polymorphism in code. Not all of the code, however, can be
encrypted as it would be completely unusable. A small portion is
left unencrypted and used to jumpstart the encrypted software. AV
software targets the unencrypted portion of code.
Malicious programmers try to protect polymorphic code by
rewriting the unencrypted decryption engine each time the virus or
worm is propagated. Antivirus software uses sophisticated pattern
analysis to find underlying patterns within the different mutations
of the decryption engine in order to detect such malware.
Private key A key used only for decryption in an asymmetric key algorithm.
The key is kept secret and enables only the receiver to perform
decryption.
G – 22 Rev. 6.41
Glossary
Proxy server A server that allows clients to make indirect network connections
to other network services. A client that has connected to a proxy
server requests a resource available on another server. The proxy
then provides the resource either by connecting to the specified
server or by serving it from a cache. In some cases, the proxy may
alter the client’s request or the server’s response for various
purposes. A proxy server can also serve as a firewall.
Public key A key used only for encryption in an asymmetric key algorithm.
The key is published and enables any sender to perform
encryption.
Q
QoS Quality of Service. The “quality” of the packet forwarding service
provided to a packet. A value set in the packet’s ToS field can
request a specific level of QoS. QoS mechanisms regulate and
manage traffic across a WAN link to reduce latency for high-
priority packets and to increase the quality and speed of data
transmissions. QoS mechanisms include queuing methods,
buffering, dropping of excess traffic, and traffic shaping. For more
information on current QoS architecture, see RFC 2990 (at
http://www.ietf.org/rfc/rfc2990.txt). See also DiffServ, FRTS,
GTS, IP precedence, LLQ, and WFQ.
R
RADIUS Remote Authentication Dial-In User Service (RADIUS) is an
AAA for applications such as network access or IP mobility. It is
intended to work in both local and roaming situations. For more
information, see RFC2865 (http://www.ietf.org/rfc/rfc2865.txt).
Rev. 6.41 G – 23
ProCurve Network Security Fundamentals
RADIUS server When you connect to an ISP, the RADIUS server checks that the
information is correct using authentication schemes. If accepted,
the server then authorizes access to the ISP system and selects an
IP address, L2TP parameters, etc. The RADIUS server will also be
notified if and when a session starts and stops.
Rate-based An IPS detection method that attempts to prevent DoS and DDoS
detection attacks. Rate-based IPS solutions typically ignore traffic content,
only monitoring traffic that is characteristic of a network flood,
scan, or malware outbreak.
RC2 Rivest Cipher 2. A 64-bit block cipher with a variable size key
created by noted cryptologist Ron Rivest of RSA fame. See RSA.
Reflected DDoS A method of attack in which forged requests of some type are sent
attack to a large number of computers that will reply to the requests.
Using IP spoofing, the attacker sets the source address to that of
the targeted victim so that all replies flood the target.
Remanence The magnetic field that remains in a material after the magnetizing
element is removed.
Remote Technology that enables you to send mirrored traffic from network
Mirroring devices to a remote analyzer using the network infrastructure
rather than a dedicated line.
G – 24 Rev. 6.41
Glossary
Router A device that forwards data packets from one network to another.
A router connects at least two different networks. A WAN router
often connects LANs to WANs or to an ISP. A router uses a
packet’s Layer 3 header to determine the route it should send the
packet over. The router uses its routing table, which can be
configured manually or generated using routing protocols, to
determine the best routes for forwarding packets.
S
SA Security association. The set of algorithms, protocols,
authentication methods, and keys to be used to authenticate
endpoint devices and protect the traffic transmitted across a
particular secured connection.
Rev. 6.41 G – 25
ProCurve Network Security Fundamentals
Shared key A key used for both encryption and decryption in a symmetric key
algorithm. The sender and receiver use the same key set up in
advance and kept secret from others.
Signature-based Attack detection that compares audit data with known attack
detection signatures stored in a signature database. Signature-based IDSs
recognize and interpret series of packets consistent with past
intrusions as new attacks.
G – 26 Rev. 6.41
Glossary
Sniffer Software (usually) or hardware that can intercept and log traffic
passing over a digital network or part of a network. As data
streams travel over the network, the sniffer captures each packet
and eventually decodes and analyzes its content. Depending on the
network structure (hub or switch), one can sniff all or just parts of
the traffic from a single machine within the network.
SNMP throttle An SNMP fix that requires network devices to wait a configurable
time period between sending traps.
Rev. 6.41 G – 27
ProCurve Network Security Fundamentals
Stream cipher An encryption algorithm that encrypts each bit as it comes, using a
slightly different encryption key for each packet.
Symmetric key A key used for both encryption and decryption. The sender and
receiver use the same key set up in advance and kept secret
from others.
Symmetric key An algorithm for cryptography that uses the same cryptographic
algorithm key to encrypt and decrypt the message.
G – 28 Rev. 6.41
Glossary
T
TACACS+ Terminal Access Controller Access Control System Plus. A
client/server protocol that transports data between a TACACS+
client and server. The TACACS+ server contains a database of
information on network hosts and users. It provides a client
authentication at the client’s request. TACACS+ can also provide
a client authorization to access certain network applications, and
TACACS+ can log, or account, for clients’ activity. TACACS+
allows independent handling of the aspects of AAA. For more
information on the original TACACS protocol, see RFC 1492 (at
http://www.ietf.org/rfc/rfc1492.txt). See also AAA.
Rev. 6.41 G – 29
ProCurve Network Security Fundamentals
ToS Type of Service. An 8-bit header field in IPv4 packets that allows
marking traffic for special handling. Two standards define how the
ToS field defines traffic: IP precedence, the original standard for
using this field, and DiffServ. For more information about the ToS
field in the IP header, see the RFC 791 on IP (at
http://www.ietf.org/rfc/rfc0791.txt).
Transparent Invisible to the network devices that handle it. For example, a
protocol header is considered transparent if it neither impedes
processing nor is processed by the devices through which it passes.
G – 30 Rev. 6.41
Glossary
Rev. 6.41 G – 31
ProCurve Network Security Fundamentals
U
UDP User Datagram Protocol. One of the core protocols of the Internet
protocol suite. Using UDP, programs on networked computers can
send short messages known as datagrams to one another.
UDP does not provide the reliability and ordering guarantees that
TCP does. Datagrams may arrive out of order or go missing without
notice. Without the overhead of checking if every packet actually
arrived, UDP is faster and more efficient for many lightweight or
time-sensitive purposes. Also, its stateless nature is useful for
servers that answer small queries from huge numbers of clients.
UDP is required for broadcast (sent to all on local network) and
multicast (sent to all subscribers) traffic. As of 2006, UDP was 20
percent of Internet traffic, second to TCP at 75 percent.
USB Universal Serial Bus. A serial bus standard for interface devices. It
was designed for computers, but its popularity has made it
commonplace on video game consoles, PDAs, cell phones,
portable memory devices, and even on televisions and home stereo
equipment.
V
Virus Throttle™ A ProCurve Networking security measure that works to reduce
software network damage when a virus or worm infects an endpoint. Virus
Throttle™ software works on the principle that a worm will
request sessions with a large number of devices on the network as
it attempts to spread. Created by ProCurve HP Labs and
implemented in ProCurve Networking devices and other HP
devices and servers.
VLAN Virtual LAN. The IEEE 802.1Q standard enables you to group
users by logical function rather than by physical location. By
creating VLANs on switches, you can segment networks into
smaller broadcast domains, enhance network security, and
simplify network management.
G – 32 Rev. 6.41
Glossary
W
WAN Wide area network. A network within a wide geographical area
(usually larger than a city or metropolitan area) that shares data,
programs, or equipment.
Rev. 6.41 G – 33
ProCurve Network Security Fundamentals
White list A list of devices created for MAC authentication that grants
network access for any listed device, while blocking access to all
other devices.
G – 34 Rev. 6.41
Glossary
X
X.500 A series of computer networking standards covering electronic
directory services, developed in order to support the requirements
of X.400 electronic mail exchange and name lookup. X.500
secures and eases communication between a user and a directory
service.
Z
Zero-day worms Worms that can aggressively propagate throughout the world in a
matter of hours. Zero-day attacks consume incredible amounts of
network resources when propagating and can use unique code that
most antivirus software does not detect.
Rev. 6.41 G – 35
ProCurve Network Security Fundamentals
G – 36 Rev. 6.41
For further information, please visit our Web site at:
www.procurve.com