安全生產(chǎn)-網(wǎng)絡安全培訓課程_第1頁
安全生產(chǎn)-網(wǎng)絡安全培訓課程_第2頁
安全生產(chǎn)-網(wǎng)絡安全培訓課程_第3頁
安全生產(chǎn)-網(wǎng)絡安全培訓課程_第4頁
安全生產(chǎn)-網(wǎng)絡安全培訓課程_第5頁
已閱讀5頁,還剩38頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領

文檔簡介

SEC400:

Windows?2000/WindowsXP

網(wǎng)絡平安

張執(zhí)玉

系統(tǒng)工程師

微軟〔中國〕大綱企業(yè)網(wǎng)絡客戶端威脅和防范InternetconnectionfirewallIPsecurity企業(yè)網(wǎng)絡客戶端LargegroupsoftrustedusersandcomputersTypically…InsecuresystemsUsedbytrustedusersUsersarelocaladministratorsLittlecentralcontroloversecurityUsersinstalluntrusted,possiblyinfectedsoftwareMobile–connecttomanypublicnetworks,thenbacktobusinessnetwork企業(yè)網(wǎng)絡客戶端“Ourfirewallwillprotectus〞Wrong!NoprotectionfrominternalsystemsWhere’sthedefenseindepth?Infectede-mailspreadseasilywithinBack-doorTrojansleapfrommachinetomachineOftenconnectedtopublic

networksdirectlyTrojansAndViriiDeliveredthroughe-mailorinfectedprogramsRunasloggedonuserVerybadifit’sacorp-trusteduser!DeadlyifuserislocaladminSendpersonaldatatoattackersIdentitytheftofuserIDandpasswordSensitivedatatheftSendmaliciousdatatoattackothersOpenholesforaccessfromInternetEnableattackertocontrolyourPCEnableyourmachinetostoreandserve“bad〞data系統(tǒng)平安危機AttackeraccessfromInternetPortscanisn’tanattack,butprobingforweaknesses,oncein:RunscriptsscanningforknownweaknessesStealyourdata,passwordsInfectyourcomputerwithtrojansto

spreadinfectionBackupswon’thelpifnot“clean〞NetworktrafficisvisibleNetworkaddresses,e-mail,WebpageURLs,Webpagecontent,datafiles,passwordformsPassivecollectionleadstodatabasetrackingPortScan防范DefenseindepthNetworkPlatformApplicationUsersDefinepoliciesWithoutthese,everythingelseisuselessTestenforcementMonitoradherence防范Principleofleastprivilege(POLP)Usersaren’tlocaladministratorsTrustthosewhoareadmins,thoughConfiguretrustrelationshipsonlywherethereisabusinessneedAppropriateaccesslistsandrights,againfollowingbusinessneeds防范TrustedplatformfortrustedusersAnti-virusprogramsUp-to-datepatchesandservicespacksAdministrator-managedandsecuredClientmachinesjoinedtoWindows2000orWindowsXPDomainmakesclientadminscalableUsersarepowerusersandmaybenetworkoperators(WindowsXP),don’tloginwithadministratorrights防范防止不必要的網(wǎng)絡訪問Perimeterprotection(firewalls,routers)End-systemfirewallAuthenticated,authorized

networkconnectionsTousenetwork–802.1x(seewirelesstalk)IPsecurityOutboundrestrictions,tooEndsystemfilteringwithIPSecPerimeterfiltering防范經(jīng)過保護的通信DigitallysignandencryptApp:SSL/TLSconnectionsAdmin:IPSectransportmodeAdmin/User:VPNTunnels–PPTP,L2TP/IPSecMaylimitabilitytoinspect,butcanyoureally?AnonymousaccessisfineforpublicinformationConsiderwhat’struly“public〞Ifyouhavetologontogetinfo,thenit’snot“public〞WindowsXP

InternetConnectionFirewallAddressesthreatofun-solicited

networkaccessInternetConnectionFirewallInWindowsXPHome,WindowsProfessional,WindowsServerEnabledonaper-interfacebasisDropsallIPunicasttrafficinboundExemptsmulticast,broadcastUnlessamappingexistsNo“danger〞dialogsUsersdon’tunderstandUsersunabletotakeactionInternetConnectionFirewallStatefulper-connectionflowentryUsessourceanddestinationportsonoutboundconnectiontocreateflowentryConnectionsclosedbyTCP:ACK-FINandRSTUDP:Time-outICF激活要點Outofboxexperience(OOBE)WizardOnfirst-bootonHomeEditionNetworksetupwizardSetsuphomeandsmallofficenetworksAvailableonHomeandProfessionalNewconnectionwizardEnabledbydefaultforDUN,PPPoEOptiontoenableonVPNNetworkconnectionsfolderPropertiessheetofnetworkconnectionICF使用場景HomeEnableonsinglePCdirectlyconnectedtotheInternetviabroadbandEnabledwhenInternetConnectionSharingusedforhomenetworkingBusinessandmobileGrouppolicyflagcandisableforenterpriseLocationawarenessallowsusertotakelaptopandprotectitwhileoutside

theofficeICF效勞選項AllowsuserswhorunservicesonlocalPCorhomenetworktocreateportmappingsProvidesetof

pre-definedservicesUsercancreatenewmappingsICF日志選項NologgingbydefaultOptiontologunsuccessfulconnectionsOptiontologsuccessfulconnectionsOptionforlogfilename,location,

andsizeICFICMP選項DisabledICMPoptionsType3Type4Type5Type8Type10Type11Type12Type13Type17ICFProtectionWindows2000和

WindowsXP

Internet協(xié)議平安Addressesthreats:Un-solicitednetworkaccessPassiveinterceptionofsensitivenetworktrafficTrustedusershavingtoomuchnetworkaccessIPSec功能IPPacketFilteringPermit,block,negotiatesecuritySecurecommunicationMutualauthenticationSenderandreceiverknoweachother,trustPacketconfidentiality=EncryptionOnlysenderandreceiverknowcontentsPacketintegrity=CryptographicChecksumTamperedpacketsarediscardedAdministrativelyappliedbelowapplicationsNochangeinapplicationsneededNochangeinnetworkneeded,exceptportfilters如何應用IPSecNetworkadministratordesignsagroupofconfigurationsettingsCalledan“ipsecpolicy〞NeedtounderstandIPtrafficrequiredbyapplications,

bysystemLikeafirewallorrouterACLUsetheIPSecpolicymanagementMMCsnapinUse“LocalSecurityPolicy〞tocreatestaticpoliciesstoredinregistryUseActiveDirectory?grouppoliciesfor

centralizedmanagementUseIPSECPOL.EXE(Windows2000)orIPSECCMD.EXE(WindowsXP)tocreatestaticanddynamicpoliciesatcommandlineWindowsXP

TCP/IP

架構IPPacketFilterdriverIPHOOKDriver(DDK)TCPRawICMPUDPWinSockWinsockLayered

ServiceProvidersIPSecFilters,TransportandTunnelOffload:TCPchecksum,largesend,IPSecIPFrag/ReassemblyPPTPL2TPLAN/WANminiportsVPN=PPP

virtualinterfacesIPHOOKcalloutRRASUI,andMPR,IPHLPAPIfilterAPINATandICFPPPTCP/UDP/IPConnectionUIFiltersTCPIPStackNetmon

SniffDriverAPPLICATIONIPSec包過濾FiltersforallowedandblockedtrafficNoactualnegotiationofIPSecsecurityassociationsOverlappingfilters–mostspecificmatch

determinesactionDoesnotprovidestatefulfilteringExample:Toopenonlyport80ontheIIS:FromIPToIPProtocolSrcPortDestPortActionAnyMyInternetIPAnyn/an/aBlockAnyMyInternetIPTCPAny80PermitAD同步端口ServicePort/protocolRPCendpointmapper135/tcp,135/udpNetBIOSnameservice137/tcp,137/udpNetBIOSdatagramservice138/udpNetBIOSsessionservice139/tcpRPCdynamicassignment1024-65535/tcp[1]SMBoverIP(Microsoft-DS)445/tcp,445/udpLDAP389/tcpLDAPoverSSL636/tcpGlobalcatalogLDAP3268/tcpGlobalcatalogLDAPoverSSL3269/tcpKerberos88/tcp,88/udpDNS(ifrequired)53/tcp[2],53/udpWINSresolution(ifrequired)1512/tcp,1512/udpWINSreplication(ifrequired)42/tcp,42/udp

Packet/PortFilteringIsn’tSufficientToProtectServerFromIP1toIP2,UDP,src*,dst88/389FromIP2toIP1,UDP,src88/389,dst*FromIP2toIP1,TCP,src*,dst135FromIP1toIP2,TCP,src135,dst*SpoofedIPpacketscontainingqueriesormaliciousjunkcanstillreachopenportsthroughFWIP1toIP2,UDP,src*,dst88/389,…Manyhackertoolsexisttousesourceports80,88,135,etctoconnecttoanydestinationportFromIP2,toIP1,UDP,src88/389,dst88/389IPSecServerToServer“Lockdown〞IPSecDriverfiltersRequireIPSecto/fromMeandSeattleSiteIPs;Trust“MyCARoot〞onlyRequireIPSecto/fromMeandLondonSiteIPs,allIPtraffic;Trust“MyCARoot〞onlyNosendun-secured(fallbacktoclear)Noreceiveun-securedAction:IPSecESP3DES/SHA1,rekeysessionsevery1houror100MbytesIKESAnegotiationUDPport500IPSecESPEstablishedIPSecDriverfiltersIKEcertcertIKESeattleSiteLondonSiteIPSecWithInternetKeyExchange

SendingpacketsinitiatessecurityInternetKeyExchange(IKE)-IdentityProtectMode–definedinRFC2409Phase1“MainMozde〞establishesIKESA–trustedchannelbetweensystems,negotiationestablishesencryptedchannel,mutualtrust,anddynamicallygeneratessharedsecretkey(“master〞key)Phase2“QuickMode〞establishesIPSecSAs–fordataprotection,oneSAforeachdirectionidentifiedbypacketlabel(SPI),algorithmsandpacketformatsagreed,generatesshared“session〞secretkeysderivedfrom“master〞keyNICTCPIPApplicationServerorGatewayIPSecDriverfiltersIPSecPolicyAgentIKE(ISAKMP)IPSecDriverIPSecPolicyAgentIKE(ISAKMP)NICTCPIPfiltersApporServiceclient“IKEResponder”“IKEInitiator”UDPport500negotiation1IKESA2IPSecSAsIPprotocol50/51IPSecAuthenticationHeader(AH)InTransportModeDataTCPHdrOrigIPHdrDataTCPHdrAHHdrOrigIPHdrNextHdrPayloadLenRsrvSecParamIndexKeyedHashIntegrityhashcoverage(exceptformutablefieldsinIPheader)Seq#24bytestotalAHisIPprotocol51InsertIPSecEncapsulatingSecurityPayload(ESP)InTransportModeDataTCPHdrOrigIPHdrDataTCPHdrESPHdrOrigIPHdrESPTrailerESPAuthUsuallyencryptedintegrityhashcoverageSecParamIndexPaddingPadLengthNextHdrSeq#KeyedHash22-36bytestotalInitVectorESPisIPprotocol50InsertAppendIPSecESPTunnelModeDataTCPHdrOrigIPHdrESPTrailerESPAuthUsuallyencryptedintegrityhashcoverageDataTCPHdrESPHdrIPHdrIPHdrNewIPheaderwithsourceanddestinationIPaddressIPSecLockdownConnectionServerToServerIPSec“ServerInitiated〞ConnectionsForInternalServersActiveDirectoryKeyDistribution

Center(KDC)Windows2000domaincontrollerApplicationIPSecDriverfiltersClient(RespondOnly)PolicyCustomSecureServerPolicy“Securefrommetoanydestination,allunicasttraffic;Acceptunsecured;Trustdomainmember〞“Sendinclear,securetrafficonlyifrequested;Trustdomainmembers〞TGTTGTIKESAnegotiationUDPport500SessionTicketticketIPSecSAsEstablishedServerconfignotforInternetuse!IPSec性能IPSecprocessinghassomeperformanceimpactIKEnegotiationtime–about2-5secondsinitially5roundtripsAuthentication–KerberosorcertificatesCryptographickeygenerationandencryptedmsgsButdoneonceper8hoursbydefault,settableSessionrekeyisfast–<1-2seconds,2roundtrips,onceper

hour,settableHowtoimprove?OffloadingNICsdoIPSecalmostatwirespeed~85-92Mbits/sec3DESfor100MbitEthernetcardFasterCPUsConclusionIPSecperformanceimpactisusuallynegligibleBestforservertoserverorclienttoserverprotecteddatatransfersIPSec硬件加速器IPSecper-packetencryptionhaswire-speedhardwareaccelerationfor

10/100EthernetClient/Svrcardsretail$100-130USD3CR990-TX-97(3DESdesktopNIC)3CR990-TX-95(DESdesktopNIC)3CR990SVR97(3DESserverNIC)3CR990SVR9597(DESserverNIC)3C990B-TXM(DES/3DESDesktopNIC)3C990BSVR(DES/3DESServerNIC)IntelShipping::///network/products/

Intel?PRO/100SDesktopAdapterIntel?PRO/100SServerAdapterIntel?PRO/100SRMobileAdapter(PCMCIA)Intel?PRO/100SRComboMobileAdapter(PCMCIA)Intel?PRO/100SPMobileAdapter(PCMCIA)Intel?PRO/100SPComboMobileAdapter(PCMCIA)XPIPSec性能的增強DoublednumberofnewSAsperminuteReliabledeletehandlinginIKEDoubledpacketfilteringspeed(throughput)ClientLDAPretrievalofADpolicy5timesfasterthanWindows2000BothInteland3Com32bitx8610/100EthernetoffloadsupportshippingintheboxWindowsXP管理的增強IPSecmonitorsnapinprovidesdetailedviewwithDNSnamesforIPsIpseccmdcommandlinein\system32NetdiagshowsmoregrouppolicydetailMoredetailedstats

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
  • 4. 未經(jīng)權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
  • 6. 下載文件中如有侵權或不適當內容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論