Title: Internet Security Concerns and Securing Telnet, etc'
1Internet Security Concerns and Securing Telnet,
etc.
- Setting your paranoia level and what to do about
it(?)
2Overview
- Old and New threats
- Sensible Security Precautions
- Protecting your password
- Secure communications (client/server)
3Fundamental Tenet of Security
Trust No One Security is everyones
responsibility. The easiest way into any
computer system is by tricking a nice person.
4Good Password Habits
- Change password periodically
- Choose a good password
- No easily guessable words, phrases or dates
- Use a phrase plus a number
- Use a different password on different systems
- Dont write important passwords down
- Report potential password violations
- failures since last successful login
5Good Password Habits (Contd)
- Only you should know your password
- This is why passwords are pre-expired
- Even the administrator should not know our
password - Dont give you password to ANYONE!
- DAS Staff should never need your password
- If you do give your password to someone change it
ASAP - If you think someone got your password
- Change it immediately
- Report to DAS for investigation
6Saving Passwords is Evil!
- Dont let mail clients or browsers save your
important passwords - It may be convenient, but it means your password
is stored in local workstation and is vulnerable - Anyone with physical (or network) access to your
computer may be able to acquire or use your
password
7Not just your DAS password
- Dont just be paranoid about your DAS password
- STRS reporting
- On-line banking
- Local file/print sharing network
- Other mail systems
- Many sites or services can have financial impact
or threats of impersonation
8Dont be annoyed by your DAS when
- They log you out automatically
- They pre-expire your password
- Your password expires
- They dont believe you are who you claim to be
9Technical Threats to your password and data
- Most Internet connections to computers are
unsecured (unencrypted or plain text) - It is possible for eavesdroppers to pluck your
password from the wire - Physical security of wire is important
- As networks grow and become more complex physical
security is less certain - Access from Home becomes dangerous
10Network security
- From inside the DAS
- Networks are switched and relatively secure
- But still a reason for concern
- Access from dialup modem (ISP)
- Packets travel directly to ISP, then across
global network - Access from DSL or Cable modem
- Packets visit all your neighbors as well as ISP
- The neighbor kid could snag your password
11(No Transcript)
12Solutions for Unsecured Networks
- Encrypting data between computers
- Only cooperating machines can read the data
- Eavesdroppers see only gibberish
- Two broad solutions
- VPNs (Virtual Private Networks)
- Client connects to known network with
authentication - All communication with that network becomes
encrypted - Requires software/configuration in both networks
- SSL for each application
13SSL for each application
- TLS (or SSL) is widely adopted for
- HTTPS for web sites
- SSL/TLS for email (POP, IMAP, SMTP)
- SSH for Telnet (terminal emulators)
- SSH for FTP (file transfers)
- Each of these encrypts both the username/password
and the data
14NWOCA Implementation
- NWOCA has implemented SSL for
- Email (POP/IMAP)
- Some web servers
- Currently optional, but will begin to require
- Will be implementing secure TELNET
- Will be required for connections from outside
- Implementing VPN for some users
- May require new software and/or configuration
changes
15What You Can Do
- See what encrypted services are already
available - POP/IMAP mail clients
- SSH for Telnet
- HTTPS for web sites
- Encourage DA Site and Tech Coordinator to
implement SSL or VPNs - Be cooperative when they do
- May cause some pain
- New software (upgrades or replacement)
- Configuration changes
16Services you should be concerned about
- Any place you type your password for important
and sensitive information - DA Site account (Telnet for state software)
- Email client
- FiscWeb
- SSWAT or DSL
- Et al.
17Viruses
- All computers should have virus scanning
- To protect both data security and workstation
- Even if DA Site virus scans email
- Multiple levels of protection are necessary
- Keep virus scanners up-to-date
- Scanners only catch virus they know about
- Be suspicious
- even if its someone you know
- Only open attachments you were expecting
18Hoaxes
- Hoaxes are human viruses
- They trick humans into doing something
- Never forward a virus warning, especially if
its from a friend - If concerned about a particular warning, forward
it to DAS or network staff for evaluation
19Spotting a hoax
- Send this to everyone you know
- Doesnt say what type of computer it affects
- Claims to come from a reputable person at
Microsoft, IBM, some virus company, CNN, etc,
etc. - Claims unbelievable catastrophe if you dont
immediately delete some file(s)
20Other Miscellaneous Things
- Dont use work email address for personal
business - Your personal mail may become public record
- Review Districts Acceptable Use Policy
- Consider adding password rules
- Consider requiring secure connections for
remote or internal access
21Related Sites
http//www.viruslist.com/ (Virus and Hoax
Lists) http//www.cert.org/ http//www.sophos.co
m/
22Technical Details
- TLS/SSL
- Operates at application/socket level
- Each application must provide support or some
knowledge of SSL - Either provides special port, e.g.
- HTTPS 443, IMAP/TLS 993, POP/TLS995
- Client must connect to correct port
- Or provides mechanism to negotiate TLS over
standard port, e.g. - ESMTP port 25 STARTTLS
- If committing to secure connections only then
- must block non-secure ports at firewall
- or disable non-secure ports on server
23SSH, Secure Shell
- Secure replacement for
- TELNET
- RSHELL/RHOST
- Can tunnel for other protocols
- Listens on port 22
- Client and server transfer keys for encryption
and optionally authentication - Authentication methods
- Password
- Host Authentication (RHOST with host key)
- RSA Auentication (user key)
24Configuring SSH1/SSH2 on Multinet
- Multinet 4.4 supports both SSH
- Similar configuration for both
- Enable SSH service
- Generate host keys for SSH1 and/or SSH2
- See Multinet Installation and Administrator
Guide for details - Read carefully, especially intrusion detection
- If using
- Password authentication, nothing else to do
- If using host or user RSA authentication, then
must move host and/or user keys to remote system - See Multinet User Guide
25Example RSA Host authentication with SSH1
!Host authentication MULTINET SSH1
mx1.nwoca.org Last interactive login on Tuesday,
17-SEP-2002 121823.15 Last non-interactive
login on Tuesday, 17-SEP-2002 081943.76 type
.rhosts nwoca.org smith type
.SSHknown_hosts. nwoca.org 1024 33
10419763534523288398817453543573513685740079341368
054739651242 0666066648846428812346617099775231083
9953168572391310124452017313072891801777871 160461
65434384487151150224687146888398411590798727403199
059829142694706571327219 5184694169021430566794841
83949756813699918547438239226695614981377936373132
86613 2890647
26Example Password authentication with SSH2
MU SSH2 mx1.nwoca.org Welcome to OpenVMS (TM)
Alpha Operating System, Version V7.3 smith's
password smith's password Authentication
successful. Last interactive login on
Tuesday, 17-SEP-2002 122253.66 Last
non-interactive login on Tuesday, 17-SEP-2002
122323.28 1 login failures since last
successful login
27Example RSA Authentication with SSH2
DIR/NOTOTAL .SSH2 Directory
NWBSMITH.SSH2 IDENTIFICATION.2
1/9 15-SEP-2002 192154.37 ID_DSA_102
4_B.1 2/9
15-SEP-2002 192113.68 ID_DSA_1024_B.PUB1
2/9 15-SEP-2002
192113.77 RANDOM_SEED.1
1/9 14-SEP-2002 192945.19 TYPE
.SSH2IDENTIFICATION. idkey ID_DSA_1024_B MU
SSH2 MX1.NWOCA.ORG Welcome to OpenVMS (TM) Alpha
Operating System, Version V7.3 Authentication
successful. Last interactive login on
Tuesday, 17-SEP-2002 122712.47 Last
non-interactive login on Tuesday, 17-SEP-2002
122323.28 DIR .SSH2 Directory
DKC100SMITH.SSH2 AUTHORIZATION.1 1
15-SEP-2002 191553.69 HOSTKEYS.DIR1
1 14-SEP-2002 215434.90 ID_DSA_1024_B.PUB1
2 15-SEP-2002 192113.77 RANDOM_SEED.1
1 14-SEP-2002 191520.54 Total of 4
files, 5 blocks. TYPE .SSH2AUTHORIZATION. key
ID_DSA_1024_B.PUB
28Example Tunneling with SSH2
MU SSH2 MX1.NWOCA.ORG /LOCAL_FORWARD(2300nwoca
7.nwoca.org23)/allow_remote Welcome to OpenVMS
(TM) Alpha Operating System, Version
V7.3 Authentication successful. Last
interactive login on Tuesday, 17-SEP-2002
123628.06 Last non-interactive login on
Tuesday, 17-SEP-2002 122323.28 ! ! From another
Session PIPE MULTINET SHOW/CONNECTION(ALL,PI)
FILTER 2300 2020EB1C 0 0
LOCALHOST(2300) () telnet
localhost /port2300 Trying... Connected to
LOCALHOST. NWOCA7, Version V7.1 Username
smith Password Welcome to OpenVMS (TM) Alpha
Operating System, Version V7.1 on node NWOCA7
Last interactive login on Tuesday, 16-JUL-2002
133236.78 Last non-interactive login on
Tuesday, 17-SEP-2002 124026.70 show
users/full smith OpenVMS User Processes at
17-SEP-2002 124340.04 Total number of users
1, number of processes 1 Username Process
Name PID Terminal SMITH SMITH
00000547 NTY16 (mx1.nwoca.org)
29Example Tunneling with SSH2 (contd)
! Or from another system ! C\gt telnet
nwoca.org 2300 NWOCA7, Version V7.1 Username
smith Password Welcome to OpenVMS (TM) Alpha
Operating System, Version V7.1 on node NWOCA7
Last interactive login on Tuesday, 17-SEP-2002
124333.41 Last non-interactive login on
Tuesday, 17-SEP-2002 124026.70
30More about VPNs
- Requires
- VPN server/concentrator
- Client software and configuration
- Client software
- Makes connection to VPN server
- Authenticates client (user/password, certificate)
- Tunnels all or subset of network activity thru
VPN - All communication occurs over secure tunnel
- Client participates in private network, as if it
were physically connected.
31To TLS, VPN or Both
- TLS appropriate for
- Outside users who need access to specific
services - HTTPS, IMAP, TELNET etc
- VPN appropriate for
- Users who need full access to network
- E.g. DAS staff who need MS Networking or Terminal
Services - To protect hosts that have special security
requirements
32NWOCA is doing both
- TLS enabled on all major services
- Users encouraged to use now
- But have not yet blocked unsecure ports from
outside - Will permit inside use to stay unsecure, for now
- SSH ready, but not in use yet
- Outside users will eventually be forced to use
SSH enabled emulator, or Persona - VPN for staff and specific users