Buffl

Übungen

TM
von Tobias M.

The recommended password length for offline applications (e.g. disk encryption) is significantly higher that that for online applications (e. g. Web-based login): At least 12-20 characters versus at least 8-10 characters (given a Latin alphabet, plus numbers an special characters)

What are the crucical differences between the two appliactions that influence the above recommendation?

main differences:

  • for offline application, the only limitation is the attacker’s resources. For example the attacker has stolen someone’s hard drive and wants to decrypt it, the only limitations is the attacker’s hardware’s ability to generate and test passwords

  • for online Appliactions, the limit is the defender’s resources and, to some extent, the network itself

more thoughts:

Online appliactions induce a delay for attacker due to the need for the server to respond (network latency, network bandwidth and server CPU) While the attacker cannot change network bandwidth and the server’s resources, they can send multiple login attemps in parallel

Online appliactions can (and should) defend against brute force attacks.

Possible defenses are:

  • Limit logins per IP -> Does not work when the attacker has acces to dynamic IPs, multiple VPN endpoints, of even a botnet with hunderds of devices

  • Limit logins per user account -> The attacker might impersonate a benign (= gutartig) user and send “bad“ requests. The benign user might get blocked quickly

  • During a (possible) attack, limit logins to humans -> Accessicility? Not everyone can solve captchas

  • Block entire network -> There might also be honest users that get blocked

  • Two-factor authentication -> Increased effort on user side

  • Monitor login attempts -> The amound of log messages might be overwhelming

Getting a login page right is highly complicates. Needs a carefully selected and monitored implementation of the mentiened measures. Every defense can also introduce problems and has potential to make the system less user-friendly




You want to configure a firewall for your home network. Figure 1 shows the configuration you want to achieve. In Zone 2, you’ve got one Web server (131.159.20.1) on TCP ports 80 and 443, and one mail server (131.159.20.2) on TCP port 25. Your home users reside in Zone 1.

Your security policy is as follows:

  1. Your home users may freely access any Web service, anywhere, on ports 80 and 443, but only if they initiate the connection themselves (i.e. they are allowed to browse the Web). No one outside Zone 1 can initiate connections to Zone 1, on any port.

  2. Everyone, including the Evil Internet, can access the web server (both ports) and mail server in Zone 2. However, no host in Zone 2 can initiate connections anywhere else.

  3. Your web server should only be reachable on TCP ports 80 and 443 and your mail server should only be reachable on port 25.

  4. Home users can access the servers in Zone 2 via SSH, too. They can also use SSH to hosts on the Evil Internet. However, for port 22, hosts in Zone 2 can only be contacted by hosts in Zone 1.

a) The policy has some ambiguities and conflicts. Find them and resolve them with common sense by deciding which rule should take precedence.


You can use zone names instead of IP ranges. Use ‘Ext’ if you want to refer to the Evil Internet, ‘Zone 1’ if you want to refer to Zone 1 etc. Use * to indicate ‘all’. You may match on multiple ports in one rule. Make sure you drop spoofed packets.


b) Draw and complete a table to define a statefull firewall configuration for the given scenario (as we did in the lecture). Hint: I needed 8 rules.


c) Based on the above, do the same again to define a stateless firewall configuration. Hint: I needed 14 rules (it is possible to do with 12). Don’t forget about interfaces and spoofing protection.

a)

  • Rule 1 implies that Zone 1 can access the mail server on ports 80 and 443. Contradicts rule 3. Rule 3 should take precedence

  • Rule 4 directly contradics rule 3. We assume that rule 4 is an exception to rule 3. Rule 4 should take precendence

Inreality, with this setop, most users will be helpless because we don’t allow DNS. Furthermore. a mail server which is not allowed to initiate connections to other mail servers can not send but only receive mails.


b)


c)


The network is designed as follows. There are three network segments.

  • The uplink to the Internet is at wan. wan has the IP address 131.159.19.1

  • All internal hosts are connected to lan. It uses the IP range 10.8.0.0/16. Alice is at 10.8.0.4 and Bob is at 10.8.0.8.

  • Servers which should be accessible from both the internal network and the Internet are at eth42.

    It uses the IP range 131.159.20.0/24. WebSrv is at 131.159.20.2 and Printer is at 131.159.20.3.


a) How is the firewall architecture called?

The network administrator has written the following stateful firewall rules.

Use this ruleset for the following questions. In the following subtasks, packets will be sent through the firewall. For each subtask

  • For each packet give the matching rule and action. Write legibly.

  • Give the state table after the packet has been processed.

  • Always continue with your previous state. You may use –“– to refer to the previous state.

b)Alice is establishing a HTTP connection (TCP port 80) to 1.2.3.4. She has chosen 52000 as her ephemeral port.

c) 1.2.3.4 replies with a SYN/ACK packet.

d) Your WebSrv is doing a system update over HTTP. It connects to 141.30.13.20. It has chosen

55000 as its ephemeral port.

e) 141.30.13.20 replies with a SYN/ACK packet.

f) Alice sends a DNS query (UDP port 53) to the Google DNS server 8.8.8.8. She has chosen 49152 as her ephemeral port.

g) The Google DNS server is replying to Alice

a) Screened Subnet Architecture (DMZ). Both are okay


b) Matching rule + action: D −→ Permit

State: (Alice, 1.2.3.4, 52000, 80, TCP)


c) matching rule: I −→ Permit

State: – “ –


d) matching rule: G −→ Permit

State: – “ – ++ (WebSrv, 141.30.13.20, 55000, 80, TCP)


e) matching rule: H −→ Drop State: – “ –


f) matching rule: C −→ Permit State: – “ – ++ (Alice, 8.8.8.8, 49152, 53, UDP)


g) matching rule: J −→ Drop State: – “ –





Author

Tobias M.

Informationen

Zuletzt geändert