Download 07-IPheader

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Piggybacking (Internet access) wikipedia , lookup

Network tap wikipedia , lookup

TCP congestion control wikipedia , lookup

Airborne Networking wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Computer network wikipedia , lookup

Distributed firewall wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

AppleTalk wikipedia , lookup

Net bias wikipedia , lookup

RapidIO wikipedia , lookup

SIP extensions for the IP Multimedia Subsystem wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

IEEE 1355 wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Internet protocol suite wikipedia , lookup

Deep packet inspection wikipedia , lookup

Zero-configuration networking wikipedia , lookup

UniPro protocol stack wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Real-Time Messaging Protocol wikipedia , lookup

Transcript
Examining IP Header Fields
There are 2 types of attack towards Network Intrusion
Detection System (NIDS):
• Insertion Attacks - Where an attacker forces an
NIDS to read information that isn’t valid, confusing
it about what’s actually happening.
• Evasion Attacks - When attackers slips entire
packet past the NIDS by making them look invalid
when they aren’t.
Insertion Attack
Evasion Attack
INSERTION ATTACKS
Attacker would to send
Attacker
send three packet
the packet R E W T to
which
is R
, O , and EWT
obscure
NIDS
EO
W
RT
Confuse about
NIDS sees
Ractually
O E W T, but
what’s
Victim happening,
host sees R E W T.
NIDS accepted
the packet O
EVASION ATTACKS
Attacker would to
send the packet
E WAttacker
T to
send two packet which is R, and E W T
obscure NIDS
E WRT
Attacker slips entire packet
past the NIDS by making
them look invalid when
they aren’t. Packet R
NIDS sees E W T, but Victim
host sees R E W T.
5 ways to examine IP header fields
either being attack or not :
1. IP Version Number
•
There are two IP version numbers currently in use. There are IPv4
and IPv6. IPv4 is the most common and pervasive version
number thus far. IPv6 is not yet in wide use in user networks.
•
The IP version field must be validated by a receiving host
(receiver) and if not valid, the datagram is discarded and no error
message is sent to the sending host (sender).
•
RFC 1121 protocol states that the datagram must be silently
discarded if an invalid value is discovered.
•
Using IP version number, it is rather difficult to detect insertion
attack unless the attacker is on the same network as the NIDS.
IP VERSION NUMBER
Invalid
datagram
Datagram
Sender
IP
Version
Number
(RFC 1121
PROTOCOL)
Receiver
Datagram silently
discarded. No error
message sent to sender
Cont..
2. Protocol Number
•
Protocol number use the later version of network mapper
(nmap) to scan a host for listening protocols.
•
This is done using the –sO option.
•
The target host is scanned for all 256 possibilities of
protocols. Protocols are deemed listening when no Internet
Control Message Protocol (ICMP) “protocol unreachable”
message is returned.
Cont..
2. Protocol Number
•
There is a flaw in the logic use by nmap to discern listening
protocols:
•
Nmap assumes that the absence of an ICMP “protocol
unreachable” message means that the protocol is listening.
Yet, conditions such as the scanned site blocking outbound
ICMP messages prevent the nmap scanner from getting
these messages.
•
Dropped packets, that might also cause the loss of packets
and falsely influence nmap.
Cont..
2. Protocol Number
The author of nmap tried to mitigate the flaws by:
Nmap sends duplicate packets for each protocol to deal with the
problem of packet loss by using Differentiated Services Byte and
The Don’t Fragment (DF) Flag.
If nmap get no ICMP “protocol unreachable” message back, it
doesn’t assume all protocols are listening. Instead, it wisely
assumes that the traffic is being “filtered” and reports this.
PROTOCOL NUMBER
Nmap scan a
protocol
number
Protocol
Number
Network
Mapper
(nmap)
Sender
Receiver doesn’t
support the
protocol number
“Protocol
Unreachable”
Receiver
Receiver send
“protocol unreachable”
message
Cont..
3. IP Numbers
•
IP numbers are 32-bit fields. The source IP number is located in
the 12th through 15th bytes offset of the IP header; the
destination IP number is located in the 16th through 19th bytes
offset of the IP header.
•
If users see an IP number entering their network that purports to
be from their network, there is a misconfiguration problem with a
host. Most likely, someone has crafted this packet and is spoofing
an IP address in their range.
Cont..
3. IP Numbers
•
Users also should never see source IPs coming from the
loopback address 127.0.0.1(identifies the local host), nor should
not see any source IPs that fall in the Internet Assigned Numbers
Authority (IANA) reserved private network numbers defined in
RFC 1918. These address intended use is for local internal
networks only.
•
The method use to prevent these problems:
•
–
A packet-filtering device should shun this traffic.
–
Use decoy or spoofed source IP’s as a smokescreen.
Users shouldn’t allow traffic with a broadcast destination IP
address into or out of your network. Such destination addresses
are typically used to quickly map other networks or use them as
Smurf amplification sites.
Cont..
4. IP Identification Number
• The IP identification value is found in bytes 4 and 5 offset of the IP
header. For each new datagram that a host sends, it must generate
a unique IP ID number. This value is normally incremented by 1,
although some use an increment of 256, for each new datagram
sent by the host.
• The range for IP ID values is 1 through 65,535 because this is a 16bit field. When the maximum value of 65,535 is reached, it should
wrap around and start again.
Cont..
4. IP Identification Number
• If users see different “alleged” source IPs sending traffic to their
network and that IPs appear to have a chronology of incrementing
IP ID numbers, it is possible that the source IP are being spoofed.
• The –vv option of TCPdump can be used to display the IP ID
number along with the time-to-live (TTL) value.
– Time-to-Live (TTL) - Number of hops/links which the packet may
be routed over, decremented by most routers - used to prevent
accidental routing loops IP Checksum
IP IDENTIFICATION NUMBER
TCPdump display IP ID
number with TTL value
to receiver
Spoofed IP
address
Sender
TCPdump
Receiver
Cont..
4. IP Checksum
• Checksums are used to ensure that data has not gotten corrupted
from source to destination.
• The IP checksum is found in the 10th and 11th bytes offset of the IP
header.
• The algorithm used for TCP/IP is to divide the data that being
checksummed into 16-bit fields. Each 16-bit field has a 1’s
complement operation done on it and all of these 1’s complement
values are added. The final value is considered to be the checksum.
Cont..
4. IP Checksum
• The IP checksum is validated by each router through which it
passes from source to destination and finally is validated by the
destination host as well.
• Is the computed checksum does not agree with the one found in the
datagram, the datagram is discarded silently.
• The IP checksum is examined and recomputed for each hop on the
way from source to destination. Intermediate routers validate the IP
checksum, and if it is correct, the TTL value is decremented by 1.
The IP header checksum must be recomputed to reflect this change
in the IP header.
The end