11 - Network Security Flashcards

1
Q

Network Security

A

Attacks:
Routing (BGP)
Naming (DNS) -> “Reflection” (DDoS)
-> Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What makes the Internet insecure?

A

1) the internet is on by default
2) Attacks look like normal traffic
3) Federation ->Thousands of independent operators control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In a packet switching network

A

Resources are not reserved and packets are self-contained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet switch networks

A

are vulnerable to resource exhaustion attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Components of security

Threat: Potential violation
Attack: action that violates

A

Availability: ability to use a resource
Confidentiality: concealing information
Authenticity: assures the origin of information
Integrity: prevents unauthorized changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attack on confidentiality

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDoS is an attack on which property of security?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Negative impacts of attacks:

A
  • theft of confidential info
  • Unauthorized use
  • False info
  • Disruption of service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Routing Security (BGP)

Control Plane Authentication

A

-Origin: Ensures next AS advertising prefix is the owner

protects the origin AS (owner of prefix is the owner)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Route attacks - How?

A

1) Config error - mis-configuration
2) Router is compromised
3) Unserupulous ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Types of attacks

A

Config/management - tamper with management software that changes the configuration
Tamper with software
tamper with routing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Path Attestation

A

{thePath} signed by the private key
Moving to new As it includes the original route attestation with it’s private key and it’s own route attestation signed by it’s own private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Signing with path attestation prevents

A

1) Some Hijack attacks
2) Short path attacks
3) Modification of AS paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attestation cannot prevent

A

1) Suppression

2) certain replay attacks (premature re-advertisement of a withdrawn route)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS attacks

A

1) MITM (DNS SEC)
2) Spoofing (DNS SEC)
3) Cache poisoning (defense: 0x20)
4) Corruption
5) DNS reflection (can be a weapon for DDos)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why is DNS so vulnerable

A

1) Resolver trusts responses
2) Responses can contain info unrelated to the query (no authentication)
* DNS queries are connection-less through UDP - therefore a resolver does not have a way to map the response it receives from a query (other than ID - which can be forged by an attacker)

17
Q

Quiz:

Which aspects of DNS make it so vulnerable to attacks?

A

1) Queries are sent over UDP - (connectionless)

2) no way to authenticate the query responses - makes the DNS vulnerable to spoofing and cache poisoning attacks)

18
Q

DNS Cache poisoning

A

Attacker can guess the query ID and if it gets in before legit query, its cached!

19
Q

DNS poisoning fact

A

DNS has no way of expunging a message once it has been cached (The query ID is only 16 bits)

20
Q

Birthday paradox

A

Attacker doesn’t need to send many bogus IDs as a guess

21
Q

Generating a stream of A-record queries to generate a bunch of races and then stuffing the A-Record responses for each of these with a bogus authoritative NS record for the entire zone

A

Kaminsky attack

Dan Kaminsky discovered this attack

22
Q

Defenses to DNS Cache poisoning

A

1) ID & randomizing
2) Source port randomization (resource intensive and NAT can be de-randomized)
3) “0x20” -> DNS is case insensitive (Not case sensitive)
The resolver and the authoritative server can agree on the “key” or the capitalization patterns of the URL
i.e. www.GooGle.com x= www.google.com
attacker would have to guess the ID and the capitalization sequence.

23
Q

Quiz:

Why does “0x20” make DNS more secure?

A

Added enthropy

24
Q

Entropy definition

A

In data communications, the term entropy refers to the relative degree of randomness.

25
Q

Exploits asymmetry in size between queries and responses

A

DNS Amplification attack
(i.e. query is only 60 bytes but the reply is 3000 bytes)
By generating a small amount of initial traffic, the attacker can cause the DNS resolver to generate a significant large amount of attack traffic.

26
Q

Possible defenses against DNS amplification

A

1) Prevent spoofing
2) Disable open resolvers (disable the ability for DNS resolver to resolve queries from arbitrary locations on the internet)

27
Q

DNS SEC protocol

A

Adds authentication to DNS responses by adding signatures to the responses that are returned for each DNS reply.