Lecture 8

Authentication, Firewalls, the DMZ

Authentication

alt text

Kerberos guarding Hades

alt text

First communication with authentication server

Second to ticket granting server

Service ticket sent to service center

Kerberos - Overview

Mutual authentication

alt text

NEWER IMAGE:

alt text

alt text

Start at client side

Step two, send the Ticket-granting ticket to ticket granting server

Step 3

Step 5

Step 6

More on the topic of a ‘secure network‘

Revision - communication protocols

alt text

Revision - computer network communication

alt text

Which part of the IP address specifies the network and which the host machine?

We use the subnet mask used to determine which part of the IP address specifies the network and which part specifies the host.

The mask uses a specific number of bits, set to 1, to identify the network portion of the IP address, and the remaining bits, set to 0, to identify the host portion, which separates the IP address into two distinct parts.b

The subnet mask is a 32-bit number that is used in conjunction with the IP address to determine which part of the IP address specifies the network and which part specifies the host.

In binary form, the subnet mask is a series of 1s followed by a series of 0s. For example, the subnet mask 255.255.255.0 in binary form is 11111111.11111111.11111111.00000000.

To determine the network and host portions of an IP address using the subnet mask, the following process is used:

  1. Convert the IP address and subnet mask to binary form.
  2. Perform a bitwise AND operation between the binary IP address and the binary subnet mask.
  3. The resulting value is the network portion of the IP address.
  4. The remaining bits are the host portion of the IP address.

For example, consider the IP address 192.168.1.10 and subnet mask 255.255.255.0. In binary form, the IP address is (4 octets, i.e. 4 times 8 binary digits)

Performing a bitwise AND operation between the IP address and subnet mask yields the following result:

So, the network portion of the IP address is 192.168.1.0, and the host portion is 0.0.0.10. This means that any IP address with the same network portion as 192.168.1.0 (e.g. 192.168.1.54) belongs to the same network, and traffic destined for that network can be forwarded using the information in the routing table.

alt text

Revision - TCP/IP and OSI Architecture

alt text

alt text

  1. TCP is designed to process CONNECTIONS (related groups of packets)
  2. IP is designed to process individual PACKETS (each packet individually)
  3. Some firewalls work at the IP level, some at the TCP level, some at the application level. This ‘level of operation’ significantly determines the level of security a firewall can introduce into a network and its use in the network

Firewalls

alt text

Next, trusted company internet

Red area

Firewall rules

alt text

Firewalls and Network Devices by OSI Layer

Firewall processing modes

Static filtering – fastest – most limited security

alt text

Dynamic filtering – next level (up) of sophistication

A dynamic filtering firewall can detect ‘emergent’ events – implement a consequential rule – deal with more ‘situations’.

alt text

Stateful inspection – top level of sophistication

alt text

Firewall architectures (how we position firewalls)

Four common architectural implementations of firewalls:

  1. packet filtering routers/firewalls,
  2. screened host firewalls & (3) dual-homed firewalls : NOT FOR US,
  3. screened subnet firewalls – these work with proxies (application gateways)

Packet filtering firewalls/routers (mainly work at layer 3)

alt text

alt text

The request from Client A to the External Server is ‘proxied’ – the Proxy acts as the agent – this breaks the connection – a very important security benefit – the details of the trusted network are hidden away – defence in depth also

alt text

Operational logic: