安全生产-网络安全培训课程_第1页
安全生产-网络安全培训课程_第2页
安全生产-网络安全培训课程_第3页
安全生产-网络安全培训课程_第4页
安全生产-网络安全培训课程_第5页
已阅读5页,还剩38页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

SEC400:

Windows®2000/WindowsXP

网络平安

张执玉

系统工程师

微软〔中国〕大纲企业网络客户端威胁和防范InternetconnectionfirewallIPsecurity企业网络客户端LargegroupsoftrustedusersandcomputersTypically…InsecuresystemsUsedbytrustedusersUsersarelocaladministratorsLittlecentralcontroloversecurityUsersinstalluntrusted,possiblyinfectedsoftwareMobile–connecttomanypublicnetworks,thenbacktobusinessnetwork企业网络客户端“Ourfirewallwillprotectus〞Wrong!NoprotectionfrominternalsystemsWhere’sthedefenseindepth?Infectede-mailspreadseasilywithinBack-doorTrojansleapfrommachinetomachineOftenconnectedtopublic

networksdirectlyTrojansAndViriiDeliveredthroughe-mailorinfectedprogramsRunasloggedonuserVerybadifit’sacorp-trusteduser!DeadlyifuserislocaladminSendpersonaldatatoattackersIdentitytheftofuserIDandpasswordSensitivedatatheftSendmaliciousdatatoattackothersOpenholesforaccessfromInternetEnableattackertocontrolyourPCEnableyourmachinetostoreandserve“bad〞data系统平安危机AttackeraccessfromInternetPortscanisn’tanattack,butprobingforweaknesses,oncein:RunscriptsscanningforknownweaknessesStealyourdata,passwordsInfectyourcomputerwithtrojansto

spreadinfectionBackupswon’thelpifnot“clean〞NetworktrafficisvisibleNetworkaddresses,e-mail,WebpageURLs,Webpagecontent,datafiles,passwordformsPassivecollectionleadstodatabasetrackingPortScan防范DefenseindepthNetworkPlatformApplicationUsersDefinepoliciesWithoutthese,everythingelseisuselessTestenforcementMonitoradherence防范Principleofleastprivilege(POLP)Usersaren’tlocaladministratorsTrustthosewhoareadmins,thoughConfiguretrustrelationshipsonlywherethereisabusinessneedAppropriateaccesslistsandrights,againfollowingbusinessneeds防范TrustedplatformfortrustedusersAnti-virusprogramsUp-to-datepatchesandservicespacksAdministrator-managedandsecuredClientmachinesjoinedtoWindows2000orWindowsXPDomainmakesclientadminscalableUsersarepowerusersandmaybenetworkoperators(WindowsXP),don’tloginwithadministratorrights防范防止不必要的网络访问Perimeterprotection(firewalls,routers)End-systemfirewallAuthenticated,authorized

networkconnectionsTousenetwork–802.1x(seewirelesstalk)IPsecurityOutboundrestrictions,tooEndsystemfilteringwithIPSecPerimeterfiltering防范经过保护的通信DigitallysignandencryptApp:SSL/TLSconnectionsAdmin:IPSectransportmodeAdmin/User:VPNTunnels–PPTP,L2TP/IPSecMaylimitabilitytoinspect,butcanyoureally?AnonymousaccessisfineforpublicinformationConsiderwhat’struly“public〞Ifyouhavetologontogetinfo,thenit’snot“public〞WindowsXP

InternetConnectionFirewallAddressesthreatofun-solicited

networkaccessInternetConnectionFirewallInWindowsXPHome,WindowsProfessional,WindowsServerEnabledonaper-interfacebasisDropsallIPunicasttrafficinboundExemptsmulticast,broadcastUnlessamappingexistsNo“danger〞dialogsUsersdon’tunderstandUsersunabletotakeactionInternetConnectionFirewallStatefulper-connectionflowentryUsessourceanddestinationportsonoutboundconnectiontocreateflowentryConnectionsclosedbyTCP:ACK-FINandRSTUDP:Time-outICF激活要点Outofboxexperience(OOBE)WizardOnfirst-bootonHomeEditionNetworksetupwizardSetsuphomeandsmallofficenetworksAvailableonHomeandProfessionalNewconnectionwizardEnabledbydefaultforDUN,PPPoEOptiontoenableonVPNNetworkconnectionsfolderPropertiessheetofnetworkconnectionICF使用场景HomeEnableonsinglePCdirectlyconnectedtotheInternetviabroadbandEnabledwhenInternetConnectionSharingusedforhomenetworkingBusinessandmobileGrouppolicyflagcandisableforenterpriseLocationawarenessallowsusertotakelaptopandprotectitwhileoutside

theofficeICF效劳选项AllowsuserswhorunservicesonlocalPCorhomenetworktocreateportmappingsProvidesetof

pre-definedservicesUsercancreatenewmappingsICF日志选项NologgingbydefaultOptiontologunsuccessfulconnectionsOptiontologsuccessfulconnectionsOptionforlogfilename,location,

andsizeICFICMP选项DisabledICMPoptionsType3Type4Type5Type8Type10Type11Type12Type13Type17ICFProtectionWindows2000和

WindowsXP

Internet协议平安Addressesthreats:Un-solicitednetworkaccessPassiveinterceptionofsensitivenetworktrafficTrustedusershavingtoomuchnetworkaccessIPSec功能IPPacketFilteringPermit,block,negotiatesecuritySecurecommunicationMutualauthenticationSenderandreceiverknoweachother,trustPacketconfidentiality=EncryptionOnlysenderandreceiverknowcontentsPacketintegrity=CryptographicChecksumTamperedpacketsarediscardedAdministrativelyappliedbelowapplicationsNochangeinapplicationsneededNochangeinnetworkneeded,exceptportfilters如何应用IPSecNetworkadministratordesignsagroupofconfigurationsettingsCalledan“ipsecpolicy〞NeedtounderstandIPtrafficrequiredbyapplications,

bysystemLikeafirewallorrouterACLUsetheIPSecpolicymanagementMMCsnapinUse“LocalSecurityPolicy〞tocreatestaticpoliciesstoredinregistryUseActiveDirectory™grouppoliciesfor

centralizedmanagementUseIPSECPOL.EXE(Windows2000)orIPSECCMD.EXE(WindowsXP)tocreatestaticanddynamicpoliciesatcommandlineWindowsXP

TCP/IP

架构IPPacketFilterdriverIPHOOKDriver(DDK)TCPRawICMPUDPWinSockWinsockLayered

ServiceProvidersIPSecFilters,TransportandTunnelOffload:TCPchecksum,largesend,IPSecIPFrag/ReassemblyPPTPL2TPLAN/WANminiportsVPN=PPP

virtualinterfacesIPHOOKcalloutRRASUI,andMPR,IPHLPAPIfilterAPINATandICFPPPTCP/UDP/IPConnectionUIFiltersTCPIPStackNetmon

SniffDriverAPPLICATIONIPSec包过滤FiltersforallowedandblockedtrafficNoactualnegotiationofIPSecsecurityassociationsOverlappingfilters–mostspecificmatch

determinesactionDoesnotprovidestatefulfilteringExample:Toopenonlyport80ontheIIS:FromIPToIPProtocolSrcPortDestPortActionAnyMyInternetIPAnyn/an/aBlockAnyMyInternetIPTCPAny80PermitAD同步端口ServicePort/protocolRPCendpointmapper135/tcp,135/udpNetBIOSnameservice137/tcp,137/udpNetBIOSdatagramservice138/udpNetBIOSsessionservice139/tcpRPCdynamicassignment1024-65535/tcp[1]SMBoverIP(Microsoft-DS)445/tcp,445/udpLDAP389/tcpLDAPoverSSL636/tcpGlobalcatalogLDAP3268/tcpGlobalcatalogLDAPoverSSL3269/tcpKerberos88/tcp,88/udpDNS(ifrequired)53/tcp[2],53/udpWINSresolution(ifrequired)1512/tcp,1512/udpWINSreplication(ifrequired)42/tcp,42/udp

Packet/PortFilteringIsn’tSufficientToProtectServerFromIP1toIP2,UDP,src*,dst88/389FromIP2toIP1,UDP,src88/389,dst*FromIP2toIP1,TCP,src*,dst135FromIP1toIP2,TCP,src135,dst*SpoofedIPpacketscontainingqueriesormaliciousjunkcanstillreachopenportsthroughFWIP1toIP2,UDP,src*,dst88/389,…Manyhackertoolsexisttousesourceports80,88,135,etctoconnecttoanydestinationportFromIP2,toIP1,UDP,src88/389,dst88/389IPSecServerToServer“Lockdown〞IPSecDriverfiltersRequireIPSecto/fromMeandSeattleSiteIPs;Trust“MyCARoot〞onlyRequireIPSecto/fromMeandLondonSiteIPs,allIPtraffic;Trust“MyCARoot〞onlyNosendun-secured(fallbacktoclear)Noreceiveun-securedAction:IPSecESP3DES/SHA1,rekeysessionsevery1houror100MbytesIKESAnegotiationUDPport500IPSecESPEstablishedIPSecDriverfiltersIKEcertcertIKESeattleSiteLondonSiteIPSecWithInternetKeyExchange

SendingpacketsinitiatessecurityInternetKeyExchange(IKE)-IdentityProtectMode–definedinRFC2409Phase1“MainMozde〞establishesIKESA–trustedchannelbetweensystems,negotiationestablishesencryptedchannel,mutualtrust,anddynamicallygeneratessharedsecretkey(“master〞key)Phase2“QuickMode〞establishesIPSecSAs–fordataprotection,oneSAforeachdirectionidentifiedbypacketlabel(SPI),algorithmsandpacketformatsagreed,generatesshared“session〞secretkeysderivedfrom“master〞keyNICTCPIPApplicationServerorGatewayIPSecDriverfiltersIPSecPolicyAgentIKE(ISAKMP)IPSecDriverIPSecPolicyAgentIKE(ISAKMP)NICTCPIPfiltersApporServiceclient“IKEResponder”“IKEInitiator”UDPport500negotiation1IKESA2IPSecSAsIPprotocol50/51IPSecAuthenticationHeader(AH)InTransportModeDataTCPHdrOrigIPHdrDataTCPHdrAHHdrOrigIPHdrNextHdrPayloadLenRsrvSecParamIndexKeyedHashIntegrityhashcoverage(exceptformutablefieldsinIPheader)Seq#24bytestotalAHisIPprotocol51InsertIPSecEncapsulatingSecurityPayload(ESP)InTransportModeDataTCPHdrOrigIPHdrDataTCPHdrESPHdrOrigIPHdrESPTrailerESPAuthUsuallyencryptedintegrityhashcoverageSecParamIndexPaddingPadLengthNextHdrSeq#KeyedHash22-36bytestotalInitVectorESPisIPprotocol50InsertAppendIPSecESPTunnelModeDataTCPHdrOrigIPHdrESPTrailerESPAuthUsuallyencryptedintegrityhashcoverageDataTCPHdrESPHdrIPHdrIPHdrNewIPheaderwithsourceanddestinationIPaddressIPSecLockdownConnectionServerToServerIPSec“ServerInitiated〞ConnectionsForInternalServersActiveDirectoryKeyDistribution

Center(KDC)Windows2000domaincontrollerApplicationIPSecDriverfiltersClient(RespondOnly)PolicyCustomSecureServerPolicy“Securefrommetoanydestination,allunicasttraffic;Acceptunsecured;Trustdomainmember〞“Sendinclear,securetrafficonlyifrequested;Trustdomainmembers〞TGTTGTIKESAnegotiationUDPport500SessionTicketticketIPSecSAsEstablishedServerconfignotforInternetuse!IPSec性能IPSecprocessinghassomeperformanceimpactIKEnegotiationtime–about2-5secondsinitially5roundtripsAuthentication–KerberosorcertificatesCryptographickeygenerationandencryptedmsgsButdoneonceper8hoursbydefault,settableSessionrekeyisfast–<1-2seconds,2roundtrips,onceper

hour,settableHowtoimprove?OffloadingNICsdoIPSecalmostatwirespeed~85-92Mbits/sec3DESfor100MbitEthernetcardFasterCPUsConclusionIPSecperformanceimpactisusuallynegligibleBestforservertoserverorclienttoserverprotecteddatatransfersIPSec硬件加速器IPSecper-packetencryptionhaswire-speedhardwareaccelerationfor

10/100EthernetClient/Svrcardsretail$100-130USD3CR990-TX-97(3DESdesktopNIC)3CR990-TX-95(DESdesktopNIC)3CR990SVR97(3DESserverNIC)3CR990SVR9597(DESserverNIC)3C990B-TXM(DES/3DESDesktopNIC)3C990BSVR(DES/3DESServerNIC)IntelShipping::///network/products/

Intel®PRO/100SDesktopAdapterIntel®PRO/100SServerAdapterIntel®PRO/100SRMobileAdapter(PCMCIA)Intel®PRO/100SRComboMobileAdapter(PCMCIA)Intel®PRO/100SPMobileAdapter(PCMCIA)Intel®PRO/100SPComboMobileAdapter(PCMCIA)XPIPSec性能的增强DoublednumberofnewSAsperminuteReliabledeletehandlinginIKEDoubledpacketfilteringspeed(throughput)ClientLDAPretrievalofADpolicy5timesfasterthanWindows2000BothInteland3Com32bitx8610/100EthernetoffloadsupportshippingintheboxWindowsXP管理的增强IPSecmonitorsnapinprovidesdetailedviewwithDNSnamesforIPsIpseccmdcommandlinein\system32NetdiagshowsmoregrouppolicydetailMoredetailedstats

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论