IP Addresses, Ports, and Protocols Flashcards
Types of Network Services
Client / Server
• Client requests resources or a service from a server
• Server does majority of the processing, client handles user
interaction
• Examples: VoIP, email, web, file transfer
Peer-to-peer
• No clear separation between client and server; most hosts do both
• Examples: File sharing like BitTorrent, and eDonkey
Multi-tier
• Distributed applications where complex process is spread out over
several specialized servers
• Example: web application front-end to database back-end
DNS
Domain Name Service (T/U:53)
• Translates human friendly names to machine friendly addresses
• Hierarchical system: Root, Top Level Domain, Subdomains
• Potential attacks redirect, intercept, or deny other services
• No integrity, confidentiality or authentication by default
LDAP
Lightweight Directory Access Protocol (T/U:389)
• Client-server directory query based on X.500
• Front-end system only, LDAP can interface with many back-ends
• Plain text by default, but can run over SSL
NetBIOS
Network Basic Input Output System
(U:137,138,T:139)
• Predecessor to LDAP, has information on users, hosts, domains
• Ports are frequently targeted by worms, especially on Windows
Instant Messaging
Peer-to-peer, server-oriented and brokered messaging systems
allow users to chat or send messages to each other
IRC
Internet Relay Chat
• Client-server based chat system; plain text only
• Provides public and private channels
• Maliciously used for control of botnets
NTP
Network Time Protocol (U:123)
• Synchronizes a host’s clock with a central source
• Simple Network Time Protocol (SNTP) provides less exact service
at a reduced resource usage
• Useful for keeping audit trails in synch across servers
• Later version of NTP introduced authentication security
SMTP
Simple Mail, Transfer Protocol (T:25)
• Client/server protocol running over TCP port 25
• Sends email messages from client to server, and between servers
• No authentication by default; open relays used for SPAM
POP
Post Office Protocol (T:110)
• Client/server protocol running on TCP port 110
• Client downloads messages and then deletes from server
• Basic authentication and no encryption unless run through SSL/TLS
IMAP
Internet Message Access Protocol (T:143)
• Permits multiple devices to access the same mailbox and see the
same set of messages at any given time
• Authentication and encryption of data, but can do plain text
CIFS
Common Internet File System & SMB – Server
Message Block (T:445)
• File sharing protocol; server hosts files that clients can download
• Various authentication methods can be used
NFS
Network File System (T/U:111, 2049)
• Another file sharing system, common to *nix platforms
• Authentication and encryption through Secure RPC
SNFS
Secure Network File System
• Authenticates each request; increased overhead from NFS
• Dependent on time synchronized servers
iSCSI
Internet Small Computer System Interface • IP based storage protocol (SCSI over networks) • Hard drive accessed over the network • Used in SAN (Storage Area Network) • Low-cost alternative to Fibre Channel
Fibre Channel
High-speed network storage technology
• Originally designed for dedicated fiber-optic cables
• More expensive – dedicated hardware/fiber
• Enterprise/geographically separated SANs