Shared Flashcard Set

Details

Networking
CMSC414: Final: Networking
40
Computer Science
Undergraduate 4
05/20/2014

Additional Computer Science Flashcards

 


 

Cards

Term
Avoidance routing:
Definition
“Get me from src to dst but avoid country C”
Term
Botnet:
Definition
Collection of compromised machines (bots) under unified control of an attacker (botmaster)
Term
VPN Properties:
Definition
Authentication: users have to log in, sites have public keys.
Confidentiality & Integrity: perform key exchange and encrypt all traffic from user to VPN server.
Term
VPN (Virtual Private Network):
Definition
Provides secure remote access to a network protected by a firewall through tunneling
Term
Subverting Firewalls:
Definition
1) Use port allocated to another service 2) “Tunneling”: Encapsulate one protocol inside another
Term
Firewall Disadvantages:
Definition
1) Functionality loss 2) Malicious Insider problem
Term
Firewall Advantages:
Definition
1) central control 2) easy to deploy 3) easier to use firewall then secure code
Term
Exercise: Create allow/disallow for firewall
•Inbound mail connections to our mail server (1.1.1.1:25)
•All outbound connections from our network, 1.1.1.0/24
-1.1.1.0/24 = “any address for which the first 24 bits are “1.1.1”
-i.e., IP addresses 1.1.1.0 - 1.1.1.255
•Nothing else
Definition
allow tcp *:* -> 1.1.1.1:25
allow tcp 1.1.1.0/24:* -> *:*
allow tcp *:* -> 1.1.1.0/24:* if ACK bit set
drop * *:* -> *:*
Term
drop tcp 1.1.1.1:* -> 2.2.2.2:80
allow tcp 1.1.1.1:556 -> 2.2.2.2:80
Definition
In this order, the rules won’t allow any TCP packets from 1.1.1.1 to port 80 of 2.2.2.2
Term
allow tcp 1.1.1.1:556 -> 2.2.2.2:80
drop tcp 1.1.1.1:* -> 2.2.2.2:80
Definition
TCP packets from 1.1.1.1 to port 80 of 2.2.2.2 only if they come from source port 556.
Term
allow tcp 1.1.1.1:556 -> 2.2.2.2:80:
Definition
permits any packet from 1.1.1.1 using source port 556 to 2.2.2.2 destination port 80
Term
drop tcp 1.1.1.1:* -> 2.2.2.2:80:
Definition
will drop any packet rom 1.1.1.1 regardless of source port
Term
DNSSEC
Definition
Public Key Encryption for DNS and is signed by the Authoritative DNS server.
Term
Cache Poisoning:
Definition
1. Bad guy makes request to local name server gets query ID.
2. He can assume that the next query ID will be incremented so the bad guy sets a record so that domain name of a website is connected to bad guy’s IP
Term
DNS defense:
Definition
randomize query ID’s
Term
DNS override defense:
Definition
since there’s a small space of query ID’s just issue a lot
Term
DNS query ID’s increment presents Vulnerability:
Definition
Cache Poisoning
Term
DNS
Definition
requesting host, recursive local main server contacts ROOT DNS server “.” then TLD DNS server “.edu” then Authoritative DNS server “umd.edu”
Term
Recursive name server:
Definition
a name server which will do the heavy lifting, issuing queries on behalf of the client
resolver until an authoritative answer returns.
Term
Record:
Definition
Mapping between hostname and IP address
Term
Resolver:
Definition
While name server’s answer queries, resolvers ask queries
Term
Nameserver:
Definition
A piece of code that answers queries of the form “What is the IP address for foo.bar.com?”
Term
Dynamic Host Configuration Protocol
Definition
1. New Host -> DHCP discover -> DHCP server
2. New Host <- New Offer <- DHCP server (offer includes: IP address, DNS server, gateway router, and duration of this offer)
3. New Host -> Request -> DHCP request (Accepts offer)
4. New Host <- DHCP ACK <- DHCP server
Term
DHCP Attacks (for attackers on the same subnet)
Definition
1. DNS server - redirect hosts lookups of website to a website of attackers choosing
2. Gateway - Modify gateway to intercept user’s traffic
Term
Opt-ack attack (DoSing their network)
Definition
1. Must be able to predict when A will send bytes (1000-1500) and the last Seq No
2. The moment after A sends those bytes, but before B receives it, B will ACK A for bytes 1501-2001 and onward
3. Eventually A’s packets will start being dropped (DoS’d)
Term
Mitnick Attack
Definition
1. A floods C
2. A spoofs IP of B
3. C too busy to reset B’s (really A’s) syn+ack
4. Ack with guessed Seq No
5. Access granted to all sources
6. C resets B (clean up)
Term
Mitnick Attack Defense:
Definition
Seq No must be hard to guess
Term
Injection attacks
Definition
If you are between the path and destination: Easy to inject packets with correct Seq No
If NOT between the path and destination: Need to guess correct Seq No
What can injection attacks do? 1. Send resets 2. TCP veto attacks, 3. Initiate connection w/o hearing other end
Term
Three Way Handshake
Definition
A ->SYN-> B
A <-SYN + ACK< - B
A ->ACK->B
Term
SYN flooding
Definition
A exhausts memory of B by sending multiple Syn’s. B stores (incl. IP, port, maximum, segment size) for each syn)
Term
SYN Flooding defense
Definition
Easy to detect incomplete handshakes, A will have B stores the SYN information
Term
SYN flooding override defense
Definition
Spoof source IP (just a header, can be set to whatever you want) - ideally spoof host you know won’t respond
Term
Routers
Definition
are the interior nodes that •“Route”: determine how to get to B
•“Forward”: actually forward traffic from A to B
Term
OSI Model - Physical Layer
Definition
Physical - Encoding of bits to send over a single physical link
Examples:•Voltage levels •RF modulation•Photon intensities
Term
OSI Model - Link
Definition
Link - Framing and transmission of a collection of bits into individual messages sent across a single subnetwork (one physical topology)
Examples: •Modern Ethernet •WiFi (802.11a/b/g/n/etc)
Term
OSI Model - (inter)network
Definition
Bridges multiple “subnets” to provide end-to-end internet connectivity between nodes “best effort”
Term
OSI Model - Transport
Definition
Transport - End-to-end communication between processes Ex: TCP, and UDP
Term
OSI Model - Application
Definition
Application - Communication of whatever you want
Examples:•Skype (UDP)•SMTP = email (TCP)•HTTP = web (TCP)•Online games (TCP and/or UDP)
Term
Max bytes sent by victim per ACK:
Definition
maxwindowsize/payload * 14+40+payload
14 = bytes for Ethernet
40 = bytes for TCP/IP
Term
Max ACKs attacker can send per second:
Definition
attackerbandwidth/14+40
14 = bytes for Ethernet
40 = bytes for TCP/IP
Supporting users have an ad free experience!