Chapter 3ii Flashcards

1
Q

IP Spoofing: sending packets using a source IP address that is not yours

Often related to…

Outgoing & Incoming. What to allow and what not no?

A

DoS attacks (e.g. DNS amplification attack)

Outgoing (to the Internet):
* Only allow source IPs which belong to you
* Don’t be an operator who facilitates spoofed DOS attacks to the Internet!

Incoming (from the Internet)
* Only allow ‘valid’ source IPs
* For a varying definition of ‘valid’
* IPs which belong to you are not valid
* Local and special purpose IPs are not valid
* Rule of thumb: UNIV \ (Your IPs ∪ Special Purpose IPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Except filtering for special purpose IPs, it is only possible to filter spoofed packets close to sender or receiver. Why?

A
  • Only “sender’s firewall” knows its local network’s IP range and can drop spoofed outgoing traffic
  • Only “receiver’s firewall” know its local network’s IP range and can drop spoofed incoming traffic
  • Other firewalls cannot differentiate!
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Automatic Spoofing Protection
* The Linux kernel offers some spoofing protection for free: …
* Activate feature in: /proc/sys/net/ipv4/conf/all/rp_filter
* If a packet arrives at interface i, the kernel checks:
*2
* Only considers ….

A

reverse path filtering

  • Is the source IP of the packet reachable through i?)
  • If not, drop the packet

local routing and interface configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What Firewalls cannot do
A firewall
* cannot protect against …
* cannot protect against …
* cannot protect against …
* cannot …
* does not perform …
* cannot set itself up correctly

A

malicious insiders

connections that don’t go through it

completely new threats

fully protect against viruses

cryptographic operations, e.g. message authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

“ Shadowing refers to the case where all the packets one rule intends to deny (accept) have been accepted (denied) by preceding rules”

A

look at examples from the slides//find more working examples on the internet to work through :)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Common Errors
* …
From the Internet? From the complete internal network?
Via telnet? Via UPnP?
* …
NetBIOS? NFS? RPC? Telnet?
Other ICMP than Unreachable, Fragmentation Needed, TTL Exceeded, Ping?
IP header options?
* …
Are the rule sets compliant?
* …
* Even private IP ranges or IP ranges that don’t belong to you?
* …
Author of security policies and the admin configuring the FW might have different viewpoints

A

How is your firewall management interface reachable?

What is allowed over the Internet?

IPv4 and IPv6?

Outbound rule ANY? (c.f. spoofing)

Policy’s vs. Firewalls understanding of Inbound and Outbound?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Definition and Purpose of a Bastion Host

A

Definition:
“A bastion host is a host that is more exposed to the hosts of an external network than the other hosts
of the network it protects.”

A bastion host may serve for different purposes:
* Packet filtering
* Providing proxy services
* A combination of both
* (Hosting of other services)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How to secure a bastion host?

A

Keep it simple: disable ssh password login, disable not needed user accounts, no services that are absolutely needed should run

Prepare for bastion host to be compromised–> regular backup of config files, don’t enable sniffing internal traffic

Monitor the bastion host closely by extensive and tamper-resistant logging (reboots, usage/load patterns, logins(from remote))

Reliable hardware configuration and physically secure location (availability)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Simple Packet Filter Architecture:

Dual-Homed Host Architecture:

A

A packet filtering router or firewall with two interfaces

  • Dual-Homed: Host is part of two networks (has two NICs)
  • Bastion Host is Firewall + Application Proxy
  • Drawbacks
  • Bastion Host is bottleneck
  • Compromised Bastion Host is worst-case scenario
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Screened Host Architecture

A
  • Packet filter protects network and Bastion Host
  • Bastion Host is Proxy (may be accessible from the Internet)
  • Compromised Bastion Host compromises the internal network
  • If you have a home server and configured port-forwarding on your router, this is probably your architecture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Screen Subnet Architecture - DMZ

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly