Users needing access to networks from remote
locations is increasing, along with the
associated security issues.
The need to identify who is trying to access a
specific port on a network has lead to the
development of the 802.1x standard.
Users needing access to networks from remote
locations is increasing, along with the
associated security issues.
The need to identify who is trying to access a
specific port on a network has lead to the
development of the 802.1x standard.
Uses SNMP to define levels of access control
and behavior of ports providing remote access
to LAN environment
Uses EAP over LAN (EAPOL) encapsulation
method
The PPP Extensible Authentication Protocol
(EAP) is a general protocol for PPP
authentication which supports multiple
authentication mechanisms.
Uses SNMP to define levels of access control
and behavior of ports providing remote access
to LAN environment
Uses EAP over LAN (EAPOL) encapsulation
method
The PPP Extensible Authentication Protocol
(EAP) is a general protocol for PPP
authentication which supports multiple
authentication mechanisms.
54 trang |
Chia sẻ: candy98 | Lượt xem: 528 | Lượt tải: 0
Bạn đang xem trước 20 trang tài liệu Security + Certification - Chapter 4: Remote Access - Athena, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
Chapter 4
Remote Access
Objectives in this chapter
Understand implications of IEEE 802.1x and
how it is used
Understand VPN technology and its uses for
securing remote access to networks
Understand how RADIUS authentication works
Understand how TACACS+ operates
Understand how PPTP works and when it is
used
ATHENA
Learning Objectives
Understand how PPTP/ L2TP works and when
it is used
Understand how SSH operates and when it is
used
Understand how IPSec works and when it is
used
Understand the vulnerabilities associated with
telecommuting
ATHENA
IEEE 802.1x
Users needing access to networks from remote
locations is increasing, along with the
associated security issues.
The need to identify who is trying to access a
specific port on a network has lead to the
development of the 802.1x standard.
ATHENA
IEEE 802.1x
802.1x is an internet standard created to
perform authentication services for remote
access to a central LAN.
802.1x specifies a protocol for transmission
between devices accessing the LAN as well as
protocol requirements between an
authenticator and an authentication server.
ATHENA
IEEE 802.1x
Uses SNMP to define levels of access control
and behavior of ports providing remote access
to LAN environment
Uses EAP over LAN (EAPOL) encapsulation
method
The PPP Extensible Authentication Protocol
(EAP) is a general protocol for PPP
authentication which supports multiple
authentication mechanisms.
ATHENA
802.1x Terminology
Authenticator - The entity that requires the entity on the
other end of the link to be authenticated.
Supplicant - The entity being authenticated by the
Authenticator and desiring access to the services of the
Authenticator.
Port Access Entity (PAE) - The protocol entity associated
with a port. May support functionality of Authenticator,
Supplicant or both.
Authentication Server - An entity providing
authentication service to the Authenticator.
ATHENA
802.1x General Topology
ATHENA
ATHENA
Telnet
Standard terminal emulation protocol within
TCP/IP protocol suite defined by RFC 854
Utilizes UDP port 23 to communicate
Allows users to log on to remote networks and
use resources as if locally connected
ATHENA
Telnet
Username and password are sent cleartext from
the client to the telnet server (can be sniffed).
Telnet is one of the ways you can manage
routers and switches (remote management).
ATHENA
Controlling Telnet Access to Routers
and Switches
Assign enable password as initial line of defense
Use access lists that define who has access to
what resources based on specific IP addresses
Use a firewall that can filter traffic based on
ports, IP addresses, etc
ATHENA
Virtual Private Network
A virtual private network (VPN) is an encrypted
connection that is carried across a shared public
network in a manner that makes it appear to be
a dedicated and secure link between two
cooperating nodes.
ATHENA
Virtual Private Network
Secures connection between user and home
office using authentication mechanisms and
encryption techniques
• Encrypts data both directions
Uses two technologies (currently)
• IPSec
• PPTP
• SSL (new)
ATHENA
VPN Diagram
ATHENA
Tunneling
Enables one network to send its data via
another network’s connections
Encapsulates a network protocol within
packets carried by the second network
ISP acts as a transporter of encrypted,
encapsulated data stream.
ATHENA
Tunneling
ATHENA
Tunneling
Tunneling requires three different protocols:
Carrier Protocol The protocol used by the
network (IP on the Internet) that the
information is traveling over
Encapsulating Protocol The protocol
(PPTP, L2TP, IPSec, Secure Shell [SSH]) that is
wrapped around the original data
Passenger Protocol The original data being
carried
ATHENA
VPN Options
Install/configure client computer to initiate
necessary security communications all the way
to your network
Outsource VPN to a service provider
• Encryption does not happen until data
reaches provider’s network
ATHENA
Site-to-Site VPN
ATHENA
Remote Access VPN
ATHENA
Service Provider Tunneling
ATHENA
Remote Authentication Dial-in User
Service (RADIUS)
Provides a client/server security system
Uses distributed security to authenticate users
on a network
Includes two pieces
• Authentication server
• Client protocols
Authenticates users through a series of
communications between client and server
using UDP
ATHENA
Remote Authentication Dial-in User
Service (RADIUS)
RADIUS is the most popular of all the access
control, authentication, and auditing (AAA)
servers.
An RAS must be able to authenticate a user,
authorize the authenticated user to perform
specified functions, and log (account for) the
actions of users for the duration of the
connection.
ATHENA
Remote Authentication Dial-in User
Service (RADIUS)
One of the reasons the RADIUS is so popular is
that it supports a number of protocols
including:
Point-to-Point Protocol (PPP)
Password Authentication Protocol (PAP)
Challenge Handshake Authentication Protocol
(CHAP)
ATHENA
Authenticating with a RADIUS Server
ATHENA
Vulnerabilities
of RADIUS
Certain “flavors” of RADIUS servers and Web
servers can be compromised by buffer overflow
attacks. A buffer overflow attack occurs when a
buffer is flooded with more information than it
can hold.The extra data overflows into
otherbuffers, which may be accessible to
hackers.
ATHENA
Terminal Access Controller Access Control
System (TACACS+)
Authentication protocol developed by Cisco
Uses TCP – a connection-oriented transmission –
instead of UDP
Offers separate acknowledgement that request has
been received regardless of speed of authentication
mechanism
Provides immediate indication of a crashed server
ATHENA
Terminal Access Controller Access
Control System (TACACS)
TACACS is also used in authenticating remote
users.
TACACS has gone through three major
“generations”, TACACS, XTACACS, and
TACACS+.
ATHENA
Terminal Access Controller Access
Control System (TACACS)
TACACS offers authentication and
authorization, it does not offer any accounting
tools.
TACACS utilized the User Datagram Protocol
(UDP) to handle communications.
ATHENA
TACACS+
Cisco decided to develop a proprietary version
of TACACS known as TACACS+.The driving
factor behind TACACS+ was to offer networking
professionals the ability to manage all remote
access components from a centralized location.
TACACS+ is also credited with separating the
AAA functions.
TACACS+ uses TCP.
ATHENA
Vulnerabilities
of TACACS+
One of the biggest complaints regarding
TACACS+ is that it does not offer protection
against replay attacks. Replay attacks occur
when a hacker intercepts an encrypted packet
and impersonates the client using the
information obtained from the decrypted
packet.
ATHENA
Other common weaknesses of TACACS+
include:
Birthday Attacks The pool of TACACS+
session IDs is not very large, therefore, it is
reasonable that two users could have the same
session ID
Buffer Overflow Like RADIUS,TACACS+
can fall victim to buffer overflow attacks.
Packet Sniffing The length of passwords can
be easily determined by “sniffing” a network.
Lack of Integrity Checking A attacker can
alter accounting records during transmission
because the accounting data is not encrypted
during transport.
ATHENA
ATHENA
Advantages of TACACS+
over RADIUS
Addresses need for scalable solution
Separates authentication, authorization, and
accounting
Offers multiple protocol support
Considered to be more secure than RADIUS,
but less used due to it’s being proprietary
ATHENA
PPTP/L2TP
there are several standard tunneling protocol
technologies in use today.
Two of the most popular are PPTP and L2TP,
which are Layer 2 (Data Link Layer)
encapsulation (tunneling) protocols using ports
1723 and 1701,respectively.
However, PPTP and L2TP do use different
transport protocols:
PPTP uses TCP and L2TP uses UDP.
ATHENA
Point-to-Point Tunneling Protocol
(PPTP)
PPTP establishes point-to-point connections between
two computers by encapsulating the PPP packets being
sent.
PPTP encrypts the data being transmitted, but does not
encrypt the information being exchanged during
negotiation. In Microsoft implementations, Microsoft
Point-to-Point Encryption (MPPE) protocol is used to
encrypt the data.
PPTP is protocol-restrictive, meaning it will only work
over IP networks
PPTP cannot use the added benefit of IPSec
A Microsoft development
ATHENA
L2TP
L2TP was developed through a joint venture
between Microsoft and Cisco.
L2TP was designed to use IPSec for encryption
purposes.
ATHENA
The differences between PPTP and L2TP
L2TP requires IPSec in order to offer encryption.
L2TP offers RADIUS and TACACS+, where PPTP does not.
L2TP is often implemented as a hardware solution, where PPTP is
not.
L2TP can run on top of protocols such as IP, IPX, and SNA, where
PPTP can work only on IP networks.
Using L2TP with IPSec provides per-packet data origin
authentication (proof that the data was sent by an authorized
user), data integrity (proof that the data was not modified in
transit), replay protection (prevention from resending a stream of
captured packets), and data confidentiality (prevention from
interpreting captured packets without an encryption key).
L2TP/IPSec connections require two levels of authentication:computer level authentication using certificates or pre-shared keys
for IPSec sessions, and user-level authentication using PPP
authentication protocol for the L2TP tunnel.
ATHENA
Some advantages of the L2TP/IPSec
combination over PPTP are
IPSec provides per-packet data origin, data integrity,
replay protection, and data confidentiality. In contrast,
PPTP only provides per-packet data confidentiality.
L2TP/IPSec connections require two levels of
authentication: computer level authentication and user-
level authentication.
PPP frames exchanged during user-level authentication
are never sent unencrypted because the PPP connection
process for L2TP/IPSec occurs after the IPSec security
association (SA) is established.
ATHENA
Secure Shell (SSH)
Secure replacement for remote logon and file transfer
programs (Telnet and FTP) that transmit data in
unencrypted text
ATHENA
How SSH Works
Once the server receives the request from the client,
the two perform a handshake, which includes the
verification of the protocol version. Next, session keys
are exchanged between the client and server.
ATHENA
IP Security Protocol
Set of protocols developed by the IETF to support
secure exchange of packets at IP layer
Deployed widely to implement VPNs
Works with existing and future IP standards
Transparent to users
Promises painless scalability
Handles encryption at packet level using
Encapsulating Security Payload (ESP)
ATHENA
IPSec Security Payload
ATHENA
ESP and Encryption Models
Supports many encryption protocols
Encryption support is designed for use by
symmetric encryption algorithms
Provides secure VPN tunneling
ATHENA
Telecommuting Vulnerabilities
Split tunnel – when the remote user is sending
traffic to the office network over the VPN, and is
also sending traffic to other locations on the
Internet (his/her connection to the Internet is
not dedicated exclusively to the VPN
connection)
ATHENA
Telecommuting Vulnerabilities
If the VPN client has split tunneling enabled,
the client is on both the Internet and the central
office network at the same time.
The VPN tunnel can become a direct path for
the bad guys into the office network, by-passing
your firewall and perimeter defenses.
ATHENA
Telecommuting Vulnerabilities
ATHENA
Telecommuting Vulnerabilities
ATHENA
Telecommuting Vulnerabilities
ATHENA
Telecommuting Vulnerabilities
ATHENA
Telecommuting Vulnerabilities
ATHENA
Remote Solutions
Microsoft Terminal Server
Citrix Metaframe
Virtual Network Computing
ATHENA
Summary
Paramount need for remote access security
Use of technologies to mitigate some of the risk
of compromising the information security of a
home network
Importance of keeping pace with technology
changes
ATHENA