Upload
augustus-bailey
View
238
Download
3
Tags:
Embed Size (px)
Citation preview
Agenda
• Remote access• Remote authentication• RADIUS and TACACS• VPNs and tunnelling• Terminal sessions• Wireless network security• IPSec
Remote access
• Additional security challenges with RAS networks
• Traditional: remote access by dialling into modems at corporate office
• VPNs use existing internet connections – no control over how packets flow
Dial-up connections• Bank of modems connected to remote access server• RAS server authenticates the user• RAS server routes packets between remote computer and
corporate network• Uses PPP (Point-to-Point) or SLIP (Serial Line Internet Protocol)• SLIP does not support encryption and transmits passwords in clear
text• Connection level security from RAS server:• CBCP (Call-Back Control Protocol) – either end calls back on a
supplied number or prearranged number (access only from specific location)– Accepts or reject calls based on caller ID or automatic number
identification
Dial-up connections
• Advantages:– Limited access for attackers (long distance rates)– Low likelihood of eavesdropping (requires access to
telephone lines/exchange)
• Disadvantages:– Cost – equipment, line rental, call charges– Low productivity – limited connection speed– War dialling – dialling numbers to determine if modem
attached
Virtual Private Networks
• Virtual Private Networks– Both sides establish an encrypted session with
each other over the internet– Connection is assigned IP addresses and uses a
virtual adapter• VPN tunnel – a secure connection through the
internet
Virtual Private Networks• Advantages:
– Low costs: modems are not required, local call to ISP– High productivity: Broadband connection at remote users end means
faster connection speed– Fewer external connection points: A single device (firewall) to handle
multiple client connections – limits the attack surface – only one connection point
• Disadvantages:– Risk of attack: potential attacks from Internet to compromise RAS
server– Risk of eavesdropping: potential to intercept traffic and decrypt it– High exposure to attackers: if remote user’s computer is not secure
there is a risk to the corporate network
Remote connection requirements
• Common protocols at physical and data link layers• Secure communications• RAS - authenticate remote user• Common data-link layer protocols:
– Point-to-point connections: PPP or SLIP– Network and transport protocols: TCP/IP – Remote computer is assigned an IP address and other parameters for
virtual adapter – generally DHCP• Host and remote software:
– Remote user requires a VPN client program– Host or server requires VPN server service
• Security:– Control access to resources – only authenticated and authorised users– Limit access of remote users to only those resources required
Authentication methods
• PAP: (Password Authentication Protocol) – password sent in clear text
• SPAP: (Shiva Password Authentication Protocol) – a reversible encryption mechanism more secure but does not prevent attacker impersonating a legitimate RAS server
• CHAP: (Microsoft® Challenge Handshake Authentication Protocol) – uses MD5 hashing algorithm – Server sends session ID and random value (challenge) to client – client creates a hash from session ID, challenge and password and sends to server. Password is never sent.
Authentication methods
• MS-CHAP: (Microsoft® Challenge Handshake Authentication Protocol) support domain login capabilities – MD4 hash comprising challenge string, session ID and password
• MS-CHAPv2: – Version 2, larger initial encryption key and support for bidirectional challenge so that client also sends a challenge to the server to authenticate itself
• EAP: (Extensible Authentication Protocol)– Supports multitude of authentication mechanisms: passwords,
tokens, Kerberos and smart cards– Highly secure and flexible
Centralised authentication
• RAS authenticates users against a user accounts database such as ADS
• RAS forwards the authentication messages to a central server that authenticates the user against a central database
Centralised authentication• Steps:
1. RAS queries the user for credentials2. Client sends authentication information3. RAS forwards authentication information to a central authentication
server4. Central server checks users credentials against user account
database: ADS, Novell e-directory, Unix NIS5. Authentication server returns success or failure to RAS6. If success, RAS allows client onto the network
• RAS servers contain no user account data – less risk of compromise
• Protocols:– RADIUS: Remote Authentication Dial-In User Service– TACACS+: Terminal Access Controller Access Control Service
RADIUS• Provides AAA – authentication, authorisation and accounting for RAS
servers• RADIUS protocol used to establish connection from RAS to authentication
server or RADIUS Server• Separation of remote access and user authentication to allow:
• RADIUS client (RAS server) and Server can use different OS and hardware architectures – different vendor implementation of RADIUS work with each other
• RADIUS client and server can be geographically separated• User accounts are secure because they are located on internal
corporate network• Authentication traffic between RADIUS client and server can be
encrypted• Can outsource RAS servers to third party organisation
RADIUS• RADIUS separates authentication from remote access functions:
– Can use variety of authentication protocols: CHAP, MS-CHAP– Encrypt with variety of algorithms: MPPE, DES– Create connections with a variety of protocols: TCP/IP, IPX/SPX– Allow connections by using a variety of technologies: dialup, DSL, ISDN
• RADIUS servers can maintain remote access policies, inform users of such and enforce policies:– Includes protocols the user is allowed to use– Length of time that the user can be connected– Operating system that the user can use
• Case-sensitive shared secret password is set on RADIUS Server and RADIUS Client – never sent over the network – hashing algorithm used to verify shared secret, to authenticate RADIUS server and client and to encrypt authentication information.
RADIUS accounting
• Tracks the following:– Length of time the remote user is connected– Remote user authentication success or failure– Situation when the RADIUS server cannot
authenticate a RADIUS client• ISPs use RADIUS to bill customers
RADIUS authentication1. RAS receives a connection request from remote access client2. RAS configured as RADIUS client, creates an Access-Request message and sends it
to the RADIUS server3. RADIUS server processes message
• If required RADIUS Server sends an Access-Challenge to RAS• RAS server or remote access client process challenge and sends a new Access-
Request to RADIUS server• User credentials are verified – connection to ADS or user accounts DB• Remote access policies are evaluated – is client allowed access to network
4. If connection is authenticated and authorised, RADIUS server sends an Access-Accept message to remote access server or sends Access-Reject message
5. RAS server receives Access-Accept message – sends an accounting request message to RADIUS server
6. RADIUS server processes accounting request message and sends an accounting response message to RAS (RADIUS client)
7. Client connection is completed
TACACS and TACACS+
• Cisco AAA protocol• Standard method to manage dissimilar NAS network
access servers• NAS provides connections to single user, network or
interconnected networks• TACACS+ has replaced TACACS – not compatible
TACACS and TACACS+• Supports:
– Authentication: forwards username and password in these formats: ARA (Apple Remote Access), SLIP, PAP, CHAP, telnet, KCHAP (Kerberos CHAP)• Authentication data hashed with MD5• Supports multiple challenge and responses as required for token based
authentication (OTP password)– Authorisation:
• Mechanism to give an access server a pointer to an ACL associated with a user. ACL specifies which resources can be accessed once authenticated
– Accounting:• Accounting protocol part of TACACS+ contains network address of user,
username, service attempted, protocol used, time and date and packet filter – all logged
• Auditing information includes commands and arguments used and the connection associated with it.
• Protocol can provide intruder detection routines, reporting statistics, number of packets and number of bytes
RADIUS and TACACS differences
• RADIUS runs over UDP, TACACS+ runs over TCP• RADIUS provides a user profile with
authentication that defines user specific parameters, TACACS+ separates the authentication and authorisation functions
• TACACS+ typically used for network devices such as routers and switches
• RADIUS used for computers and network devices
Virtual Private Networks
• Protocols used to establish VPN tunnel:– PPTP: Point-to-Point Tunnelling Protocol– L2TP: Layer 2 Tunnelling Protocol– IPSec: Internet Protocol Security: architecture,
protocol and IKE (Internet Key Exchange) protocol
PPTP• Point-to-Point Tunnelling Protocol• PPTP client computer establishes a control connection to server using TCP
port 1723 > PPTP tunnel is established• GRE (Generic Routing Encapsulation) protocol used to send data• Characteristics:
– Layer 2 protocol encapsulates PPP frames in IP datagrams– PPTP uses PAP, CHAP, MS-CHAP for authentication– Requires an IP based network and does not support header
compression – provide encryption– IP packet is encapsulation into a PPP frame which is encapsulated into
a VPN IP packet– All data sent through the tunnel is encrypted– PPTP supports many protocols and multicast – can be established
across networks that use NAT
L2TP• IETF standard• L2TP encapsulates PPP frames for sending over IP, X.25,
frame relay or ATM networks• L2TP over IP uses UDP port 1701 and includes control
messages for tunnel maintenance• Encapsulated frames can be encrypted or compressed
however L2TP has no mechanism for encryption or authentication – use with another protocol - IPSec
• L2TP over IPSec: L2TP provides encapsulation and IPSec in transport mode provides strong integrity, replay, authenticity and privacy protection
• Authentication options: CHAP, MSCHAP, MSCHAPv2, EAP• Some NAT implementations cannot use IPSec tunnel mode,
use NAT-T transversal technology to encapsulate IPSec in UDP
Comparing VPN solutions
• L2TP/IPSec:– Multivendor interoperability– Client to gateway and gateway to gateway– IPSec may have issues with NAT
• PPTP:– Early implementations have lower security – Security of PPTP depends on strength of users
password– No NAT limitations
Securing VPN connections
• Choose a protocol that provides a secure authentication method and encrypts the data
• Monitor traffic that originates from VPNs after it has been decrypted on RAS
• Require multifactor authentication – such as smart card• Ensure computers connecting with VPN meet corporate
security policies (antivirus, quarantine if configuration not sufficient)
• Ensure that after VPN is established, no routes to internet exist in client computer that bypass your network – hacker may gain access via VPN
Terminal sessions• Remotely access a single computer: all processes run
on remote computer but session takes input from another computer and redirects output to that computer: terminal services, remote desktop and VNC
• Terminal services also allows multiple users to simultaneously establish sessions and run programs on a single computer.
• Provide an alternative to remote access connections• Useful administrator tool however also create security
risks• Use strong encryption for the terminal session and
prevent users from accessing other users data
Secure shell protocol
• SSH lets users log onto a remote computer, execute commands and moves files from one computer to another
• Provides strong authentication and secure communications over unsecured channels
• SSH2 is a replacement for FTP• Encrypts passwords and data, host and user
authentication, data compression, data confidentiality, strong encryption, host authentication and integrity protection
SSH
• 3 major components:– Transport layer SSH-TRANS secure authentications, confidentiality and
network integrity – encryption is an option – typically runs over TCP/IP but can be used over any reliable data stream
– User authentication protocol SSH-USERAUTH – authenticates the user at the client computer to the server
– Connection protocol SSH-CONN multiplexes the encrypted tunnel into several logical channels
• SSH uses PKI- public key encryption for user authentication, however older methods may be used
• PKI ensures that users cant access a host for which they do not have a public key
• SSH also provides protection from packet spoofing, IP/Host spoofing, password sniffing and eavesdropping
Wireless threats• Data can be intercepted without requiring physical access• Common risks:
– Theft of service: free access to internet– Eavesdropping: intercepted traffic– Unauthorised access: to corporate information
• Basic defences:– Limit the range of transmissions – do a site survey periodically to
detect signal strength and unauthorised APs– Don't broadcast the SSID – harder for a hacker to determine existence
of WLAN– Restrict access based on MAC address (MAC addresses can be spoofed
by hacker)– Put all APs in a separate network segment and limit the type of traffic
allowed from network into corporate network
Wireless security
• WEP (Wired Equivalency Protocol)• WPA (Wi-Fi Protected Access)• 802.1x• WAP (Wireless Application Protocol)
IPSec• Layer 3 protocol that provides authentication and
encryption for IP traffic• Situations for implementation:
– End- to end security for IP unicast traffic – transport mode– Remote access VPN client to gateway – L2TP and IPSec
transport mode– Site-to-site VPNs using L2TP/IPSec or IPSec tunnel mode
• Open protocol and interoperable• Windows has built in support for IPSec clients• Transparent protection for layer 3 and above protocols: • IPSec policy defines the types of traffic that require
encryption and/or digital signing
IPSec features• ESP and AH
– ESP: provides encryption and signing– AH: signs traffic but does not encrypt
• Tunnel and transport modes– Transport mode – end to end security – protects entire data
path between sender and receiver– Tunnel mode – secures the channel between the VPN gateways
• Protection from:– Man-in-the-middle attacks – both parties authenticate– Spoofing – digital signing to verify integrity– Replay attacks – sequence numbers
IPSec features
• Before communication both parties negotiate a SA (Security Association) – determines what authentication and encryption methods will be used
• IPSec uses IKE (Internet Key Exchange) for authentication VPN devices.
• IKE uses:– Kerberos– Certificates– Password pre-shared authentication keys