Week 7 - DNS, Management and Security Flashcards

1
Q

What is DNS?

A

Domain Name System
- Solution to directory problem for hosts
- Distributed (no single point of failure)
- Local control and update (accuracy of information)
- Replicable (secure)
- Consistent (everyone has same view of data)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are zones of control?

A

Each zone has a primary server
Each zone is in charge of information about the zone
For performance & availability each zone has backup servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does DNS lookup work?

A
  1. A local machine asks its local dns server for www.ibm.com
  2. The dns1 server asks a root name server m for www.ibm.com
  3. The root server m refers dns1 to the .com name server f (referral)
  4. The root server f refers dns1 to the ibm.com name servers y
  5. THe root server y responds with www.ibm.coms address

After this query the dns1 now knows:
- THe name and ip address of the .com name servers (m)
- The name and ip address of the ibm.com name servers (y)
- The IP address of www.ibm.com

Now the resolution process is cached to directly go to the correct root server and avoid referral. Cache will have a TTL that allows for reduced queries but without losing ability to change addresses efficiently.

DNS lookups can be done in an iterative mode or a recursive mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between authoritative and non-authoritative dns lookup answers?

A

Authoritative is from the server, non-authoritative is from the cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main types of DNS records?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is SNMP?

A

Simple Network Management Protocol (SNMP)
Manages information that is:
- static: information that characterises the current config (e.g. number of interfaces)
- dynamic: related to events in the networks (e.g. number of packets)
- statistical: information derived from dynamic information (e.g. average packets per unit of time).

Runs over UDP as messages are small

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does SNMP work?

A

Monitoring application:
- functions visible to the user/manager
- performance monitoring, fault monitoring, security monitoring, account monitoring
Manager function:
- performs basic monitoring function of retrieving info
Agent function:
- gathers and records management information for one or more network elements and communicates the information to the network monitoring elements
- usually runs in the router/switch and listens/replies to information requests
Managed Objects:
- the resources
- queue sizes, number of packets on each interface, number of packets with errors, abnormal occurences
Monitoring Agent:
- Generates summaries and stats from info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whats the difference between polling and traps?

A

Polling is when the management station continuously tries to get the status information about hte managed devices.
Traps occur when something abnormal happens in the management station.
Crucial for network efficiency.

Traps are not acknowledged by the monitoring station which can cause problems. Threshold of when trap is sent is configurable. Trap is usually packed with information in the form of MIB objects and their values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is MIB?

A

An MIB is a database where each resource is represented by an object. It is a tree structure. Each system (router, switch) maintains one for i its managed resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an SMI?

A

SMI (Structure of Management Information) defines the general framework in which an MIB can be defined.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four main SNMP functions?

A

GetRequest()
GetNextRequest()
GetResponse()
SendTrap() - can only be run by server not client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is polling frequency calculated?

A

Example:
Polling every 15 minutes
Processing time of 50ms
Network delay of 1ms
N <= 15x60/0.202=4500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the SNMPv2/SNMPv3 enhancements?

A

SNMPv2:
- No security mechanisms
- New structure of Management Information (SMI)
- Manager to Manager capabilities
- New protocol operations

SNMPv3:
- Administration and security added

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name some network security risks?

A

Confidentiality - Someone intercepts packets between two entities (man-in-the-middle attack) - packet sniffer.
Authentication - Someone pretends to be someone else (phishing, dns poisoning, fake email address)
Non-repudiation - Charlier sends message to ALice but then claims he didn’t send it.
Unauthorized Access - Charlie pretends to be Alice and accesses her resources (password capture, inadequate firewall)
Denial of service - Charlie sends a huge amount of traffic disabling Alice’s server (botnets, SYN floods, source spoofing, email spam)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What steps can be taken to protect a network?

A
  1. Security policy
    - First step to decide what is to be protected - systems, data, cpu cycles, etc.
    - Who is it to be protected from? Who gains the most from the organisations loss
    - Is it affordable? Equipment, admin, frustration - extreme end is a system not connected to any network in a locked room.
  2. Physical security
    - Theft, access to console, power cuts, floods, fire
    - Mitigation includes security, insurance, steel doors, cctv, uninterruptible power supplies (UPS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are viruses/worms/botnets?

A

Viruses attach to other programs. Worms propagate by themselves. Both have exponential impact as each program can infect many hosts.

BotNets - commonly virus/trojan infected machines are recruited to form large networks which can be remotely controlled. Used to launch distribtued DDoS attacks (usually for blackmail). Used to accept and relay SPAM.

17
Q

What is the key problem in cryptography?

A
18
Q

How do public keys work?

A

System was invented independently by Ellis, Cocks and Williams in 1975. Uses large prime numbers and modular arithmetic as the basis of one way functions (a one way function is where it is very computationally expensive to reverse the calculation).

Public keys can also be used for authentication. Bob sends a message encrypted by private key. Alice with the public key can check if Bob signed the message.

19
Q

What is SSL/TLS?

A

Secure Sockets Layer/Transport Layer Security
- Server must have a public/private key pair.
- Should have a certificate.
- User connects to the server with a browser on https (which connects on port 443 as it signifies the use of ssl/tls)
- Client and server negotiate a cryptographic algorithm (symmetric) to use for the session and the server assigns a sessionID (allows same keys to be used for a period)
- Server sends the certificate to the client.
- Client checks the certificate using the root certification authority’s key (suppled with the browser)
- Also checks the name of the server
- Client now generates the key material for encrypting the network traffic
- Material is signed using the servers public key and sent
- The server and client then exchange a message authentication code (MAC) to ensure that both agree with the key exchanges up to that point.
- Caveat - unless you check the certificate details, all you know is that you are talking to some site over an encrypted channel.

20
Q

How do certificates work?

A
21
Q

What is a secure shell?

A
22
Q

How are IP and DNS secured?

A

IPSec and DNSSec - same principles

23
Q

What is a firewall?

A
24
Q

What are the firewall methods of access control?

A

Static filtering - simplest method. TCP and UDPnpackets will be identifiable with the 4-tuple of: source ip, source port, destiantion ip, destination port. A set of rules will specify allowed combinations of this key. Have to allow traffic in both directions.

Dynamic filtering - similar to static, but the firewall makes a note of the addresses and port numbers and dynamically installs a rule to allow the reverse traffic. Causes issues where data channels are negotiated dynamically with the application.

Content Based Access Control - deals with the limitations of static and dynamic filtering. Can look inside of the command stream and set up rules to enable the protocol to work.

25
Q

What are the next generation firewall features?

A

Content inspection.
Email attachment sandbox (validate attachments and check sysstem behaviour before allowing traffic through)
Machine learning

26
Q

What DDOS methods exist?

A

Source spoofing:
- Any host can put the source address on message - ISP/AS should check but some don’t
- THey can check by doing a reverse path check (check message came from direction expected for given source).
SYN Flood
- Attackers send SYN packets, creating state in the receivers, attackers never send the final ACK
- SYN cookies avoid this. It encodes the client initial sequence in the server, only when it receives the final ack is state created.
Botnets
- Many computers are in the control of Botnet herders - very difficult to detected.
- Traffic comes with the right source address
- Attackers can return the right ACK to SYN-ACK
- Cloud computing helps - instantiating new services on demand
- Still an open issue: Machine learning can help.
SPAM
- Sending identical messages to thousands of recipients. Represents 95% of the mail sent in the internet. Major problem for ISPs.
- Bayesian filtering in mail readers classifies SPAM. Does not save bandwith though.
- Governments have legal options
- Bill Gates proposed electronic stamps
Sender Policy Framework (SPF)
- see picture