1.5 Explain common ports and protocols, their application, and encrypted alternatives. Flashcards
Intro to IP: A Series of Moving Vans
- Efficiently move large amounts of data
– Use a shipping truck - The network topology is the road
– Ethernet, DSL, coax cable - The truck is the Internet Protocol (IP)
– We’ve designed the roads for this truck - The boxes hold your data
– Boxes of TCP and UDP - Inside the boxes are more things
– Application information
TCP and UDP
- Transported inside of IP
– Encapsulated by the IP protocol - Two ways to move data from place to place
– Different features for different applications - OSI Layer 4
– The transport layer - Multiplexing
– Use many different applications
at the same time
TCP and UDP
TCP - Transmission Control Protocol
- Connection-oriented
– A formal connection setup and close - “Reliable” delivery
– Recovery from errors
– Can manage out-of-order messages
or retransmissions - Flow control
– The receiver can manage how much data is sent
UDP - User Datagram Protocol
- Connectionless
– No formal open or close to the connection - “Unreliable” delivery
– No error recovery
– No reordering of data or retransmissions - No flow control
Lots of Ports
IPv4 sockets
– Server IP address, protocol,
server application port number
– Client IP address, protocol, client port number
* Non-ephemeral ports –permanent port numbers
– Ports 0 through 1,023
– Usually on a server or service
* Ephemeral ports – temporary port numbers
– Ports 1,024 through 65,535
– Determined in real-time by the clients
Port Numbers
- TCP and UDP ports can be any number
between 0 and 65,535 - Most servers (services) use non-ephemeral
(not-temporary) port numbers
– This isn’t always the case - it’s just a number. - Port numbers are for communication, not security
- Service port numbers need to be “well known”
- TCP port numbers aren’t the same as UDP port numbers
ICMP
- Internet Control Message Protocol
– “Text messaging” for your network devices - Another protocol carried by IP - Not used for data transfer
- Devices can request and reply to administrative requests
– Hey, are you there? / Yes, I’m right here. - Devices can send messages when things don’t go well
– That network you’re trying to reach
is not reachable from here
– Your time-to-live expired, just letting you know
Telnet
- Telnet – Telecommunication Network - tcp/23
- Login to devices remotely
- Console access
- In-the-clear communication
- Not the best choice for production systems
SSH - Secure Shel
- Encrypted communication link - tcp/22
- Looks and acts the same as Telnet
DNS - Domain Name System
- Converts names to IP addresses - udp/53
– www.professormesser.com = 162.159.246.164
– Large transfers may use tcp/53 - These are very critical resources
– Usually multiple DNS servers are in production
SMTP - Simple Mail Transfer Protocol
- SMTP - Simple Mail Transfer Protocol
– Server to server email transfer - tcp/25 - Also used to send mail from a device to a mail server
– Commonly configured on mobile devices
and email clients - Other protocols are used for clients to receive email
– IMAP, POP3
POP/IMAP
- Receive emails from an email server
– Authenticate and transfer - POP3 - Post office Protocol version 3 - tcp/110
– Basic mail transfer functionality - IMAP4 - Internet Message Access Protocol v4 - tcp/143
– Manage email inbox from multiple clients
SFTP - Secure FTP
- Uses the SSH File Transfer Protocol - tcp/22
- Provides file system functionality
– Resuming interrupted transfers, directory listings,
remote file removal
File transfer application protocols
- FTP – File Transfer Protocol
– tcp/20 (active mode data), tcp/21 (control)
– Transfers files between systems
– Authenticates with a username and password
– Full-featured functionality (list, add, delete, etc.) - TFTP – Trivial File Transfer Protocol
– udp/69
– Very simple file transfer application - Read files and write files
– No authentication - Not used on production systems
DHCP - Dynamic Host Configuration Protocol
- Automated configuration of IP address,
subnet mask and other options
– udp/67, udp/68 - Requires a DHCP server - Dynamic / pooled
– IP addresses are assigned in real-time from a pool
– Each system is given a lease
– Must renew at set intervals - Reserved
– Addresses are assigned by MAC address
– Quickly manage addresses from one location
HTTP and HTTPS
HTTP 80 HTTPS 443
* Hypertext Transfer Protocol
– Communication in the browser
– And by other applications
* In the clear or encrypted
– Supported by nearly all web servers and clients
SNMP - Simple Network Management Protocol
- Gather statistics from network devices
– udp/161 - v1 – The original
– Structured tables, in-the-clear - v2 – A good step ahead
– Data type enhancements, bulk transfers
– Still in-the-clear - v3 – The new standard
– Message integrity, authentication, encryption
Syslog
- Standard for message logging
– Diverse systems, consolidated log
– udp/514 - Usually a central log collector
– Integrated into the SIEM - You’re going to need a lot of disk space
– Data storage from many devices over
an extended timeframe
RDP - Remote Desktop Protocol
- Share a desktop from a remote location over tcp/3389
- Remote Desktop Services on many Windows versions
- Can connect to an entire desktop or just an application
- Clients for Windows, MacOS, Linux, iPhone, and others
NTP - Network Time Protocol
- Switches, routers, firewalls, servers, workstations
– Every device has its own clock - udp/123 - Synchronizing the clocks becomes critical
– Log files, authentication information, outage details - Automatic updates
– No flashing 12:00 lights - Flexible - You control how clocks are updated
- Very accurate
– Accuracy is better than 1 millisecond
SIP - Session Initiation Protocol
- Voice over IP (VoIP) signaling
– tcp/5060 and tcp/5061 - Setup and manage VoIP sessions
– Call, ring, hang up - Extend voice communication
– Video conferencing, instant messaging,
file transfer, etc
SMB - Server Message Block
- Protocol used by Microsoft Windows
– File sharing, printer sharing
– Also called CIFS (Common Internet File System) - Direct over tcp/445 (NetBIOS-less)
- Direct SMB communication over TCP
LDAP/LDAPS
- LDAP (Lightweight Directory Access Protocol) - tcp/389
– Store and retrieve information in a network directory - LDAPS (LDAP Secure) - tcp/636
– A non-standard implementation of LDAP over SSL
– Still in use today
Databases
- Microsoft SQL Server
– MS-SQL (Microsoft Structured Query Language)
– tcp/1433 - Oracle SQL *Net
– Also called Oracle Net or Net8 - tcp/1521 - MySQL free and open-source database
Ultimately acquired by Oracle - tcp/3306
ICMP
- Internet Control Message Protocol
– “Text messaging” for your network devices - Another protocol carried by IP
– Not used for data transfer - Devices can request and reply
to administrative requests
– Hey, are you there? / Yes, I’m right here. - Devices can send messages when things don’t go well
– That network you’re trying to reach
is not reachable from here
– Your time-to-live expired, just letting you know
GRE
- Generic Routing Encapsulation
– The “tunnel” between two endpoints - Encapsulate traffic inside of IP
– Two endpoints appear to be directly
connected to each other
– No built-in encryption
AH (Authentication Header)
- Data integrity
- Origin authentication
- Replay attack protection
- Keyed-hash mechanism
- No confidentiality/encryption
VPNs
- Virtual Private Networks
– Encrypted (private) data traversing a public network - Concentrator
– Encryption/decryption access device
– Often integrated into a firewall - Many deployment options
– Specialized cryptographic hardware
– Software-based options available - Used with client software
– Sometimes built into the OS
IPSec (Internet Protocol Security)
Security for OSI Layer 3
– Authentication and encryption for every packet
* Confidentiality and integrity/anti-replay
– Encryption and packet signing
* Very standardized
– Common to use multi-vendor implementations
* Two core IPSec protocols
– Authentication Header (AH)
– Encapsulation Security Payload (ESP)
IPsec Transport mode and Tunnel mode: AH and ESP
- Combine the data integrity of AH
with the confidentiality of ESP