Friday, May 8, 2015

What are worms and how to protect your systems from them.

Worms are a form of malware that can infect many systems on a network by sending copies of themselves from one system to another until they infect every system. A common form of distribution is by attaching the worm to an email. Once the user opens the attachment, the worm installs itself on the system and spreads to other systems on the same network. The example below shows Melissa, the worm, is sent as an attachment and then spreads to the rest of the systems on the network.

Since a worm is malware, the best protection against a worm attack starts with not letting the worm have access to the system. The first line defense to protect your system is a network firewall configured to block external access to network services.  You should also enable content filtering and using anti-virus programs to scan for known viruses and worms.
The next logical defense against a worm attack is security awareness training for users to teach them signs of this known threat. This training should explain not to open unknown attachments, links or emails from untrusted sources.  It should also include procedures for reporting symptoms of a worm infection on their systems to help with containment.

Finally, to protect against worms the systems administrator should ensure all systems and software are up to date with the newest security releases. These patches will help protect computers from newly discovered threats.

References:

GFI Software. (2013). Protecting your network against email threats: How to block email viruses and attacks. Retrieved from http://www.windowsecurity.com/whitepapers/anti_virus/Protecting_your_network_against_email_threats_How_to_block_email_viruses_and_attacks.html.

VERCODE. (2014). Computer Worm. Retrieved from http://www.veracode.com/security/computer-worm.

Saturday, May 2, 2015

IPsec headers used with IPv4.

IPsec is designed to provide security functions for authentication and encryption for TCP/IP at the Internet level. To better understand how IPsec works, you first have to understand the IPsec header and where it is located. When looking at IPv4, the header contains addressing and control fields, while the payload carries the actual data to be sent over the internet.  A standard IP header is 20 bytes long. The complete IP header can be seen in the illustration below.
IP Header
(Friedl, 2005)
To break down the IP header, we start at the top with the version (ver). This identifies the version of the IP used, which is IPv4 for this example. It is used to ensure compatibility between devices running on the version of IP. It is 4 bits long and is followed by the Internet Header Length (hlen).  The hlen specifies the length of the IP header, in 32-bit words. This includes the length of any options fields and padding.
Next, there is the type of service (TOS) block. This field is designed to carry information to provide quality of service features, such as prioritized delivery, for IP datagrams. The packet length (pkt len) specifies the total length of IP datagrams in bytes. After the pkt len, there is the ID field. This field contains a 16-bit value that is common to each of the fragments belonging to a particular message.
Continuing on to the next block, you have the flags (flgs). The flags are used to manage fragmentation. It is followed by the fragment offset. This field specifies the offset, or position, in the overall message where the data in this fragment goes. This is followed by the time to live (TTL) block. This specifies how long the datagram is allowed to “live” on the network, in terms of router hops.
After the TTL, there is the protocol (proto) field. This identifies the protocol used for transport and encapsulation. The next field is the header checksum which detects errors in the transport to ensure the message is not corrupted. This is followed by the source IP, destination IP address, and IP options to complete the full IP header.
When using IPsec, it is easier to understand how the IP header is used for authentication when in transport mode. It can be used for either authentication or encryption but the IP heard being transported is not an encryption protocol but is a secure IP connection.  As illustrated in the diagram below, when used for authentication and authentication header (AH) is added to the IPv4 IP header for transport.
 IPsec in AH mode
(Friedl, 2005)
When using ESP in transport mode you are adding an encapsulating Security Payload (ESP) to support encryption and optional authentication. This encrypted payload is constructed by encapsulating the datagrams payload by adding security parameters Index and Sequence number fields on one side of the payload and ESP trailer consisting of padding, the next header, and optional authentication data at the end. This can be seen in the illustration below.
 IPsec in ESP mode
(Friedl, 2005)
 References:
Friedl, S. (2005). AN Illustrated guide to IPsec. Retrieved from http://www.unixwiz.net/techtips/iguide-ipsec.html#ip