Security Notes

Thu
28
Feb
Sarath Pillai's picture

Linux kernel rp_filter settings (Reverse path filtering )

Reverse Path Filtering in Linux

The main functionality of a router is to route packets from one place to another. Linux machine can be used as router on your network that will route substantial amount of traffic without any issues, if configured correctly.

Due to the increasing amount of malicious and attack traffic on the internet, it has become very much necessary to take some extra care while configuring routes on a Linux machine or physical router's.

One of the major problem that internet security people are dealing with today, is spoofing. 

 

 

What is IP address spoofing?

IP spoofing is a method adopted by attacker's to send forged source address in their attack traffic.Which means they can send an IP packet with an IP address of their wish.

Sun
24
Feb
Sarath Pillai's picture

SLOWLORIS: HTTP DOS(Denial Of Service)attack and prevention

A DDOS(Distributed Denial of Service) attack is one of the major problem, that organizations are dealing with today.

Such a kind of attack is very difficult to mitigate, especially for small organizations with small infrastructure. The main difficulty in dealing with DDOS attack is the fact that, traditional firewall filtering rules does not play well. The main reason behind this problem is that, most of the time the attacking machines(machine's that take part in a DDOS attack, and becomes part of a bot-net) are large in number and are from diverse geographical locations.

And one major point is that the request type mostly used to take down a service appears legitimate, but the large magnitude of requests will make the service offline for legitimate requests.

Thu
24
Jan
Sarath Pillai's picture

What is MAC(Message Authentication Codes)

Message Hashing and Authentication

whenever security in communication is discussed, three things that come to mind is authentication,integrity, and data encryption. Although encryption and authentication are the major topics that needs to be taken care of, integrity of the data transferred also needs a major attention.

What problems are addressed with the help of integrity check?. Imagine that you are communicating with your friend through a chat client. How will your friend's machine know that the message he received is exactly the same message that you send?. And how will he verify that the message was not altered in the middle.

Even after implementing a secure authentication and data encryption, integrity of the message needs to be versified, to confirm, that the data was not tampered in the middle.

Thu
17
Jan
Sarath Pillai's picture

Alert Message Protocol in SSL

Alert Message Protocol SSL

Unitill now we have seen that, in an SSL handshake the server or the client, does have a mechanism to secure the communication, as well us check the integrity of the message with the help of record layer protocol in SSL. But what if something breaks during the initial handshake?

There is a mechanism included in the architecture of SSL protocol, to inform the other recieving end, about any irregularities.

This mechanism, used in SSL to inform the other end, of any irregulartity or failure in authentication, is called as Alert Protocol in SSL.

Thu
17
Jan
Sarath Pillai's picture

ChangeCipherSpec Protocol in SSL

ChangeCipherSpec protocol

SSL is a secure protocol, that's heavily used for encrypted data communication to prevent eavesdropping. Before going ahead with understanding ChangeCipherSpec Protocol layer in SSL, we recommend you to have a look at the following articles, for a better understanding.

Read: Secure Socket Layer

Read:Record layer Protocol in SSL

Read: Handshake Protocol in SSL

Thu
17
Jan
Sarath Pillai's picture

Understanding SSL Handshake Protocol

SSL handshake Protocol

Due to the elaborate explanation required to comprehend SSL protocol, we have divided this SSL tutorial, into multiple parts.

Read: Record Protocol in SSL

Read:Working of Secure Socket Layer

In this post, we will understand "SSL Handshake Protocol".

SSL protocol, does its fantastic job of securing communication over the wire, with the help of multiple layers of protocols, above TCP(And After Application Layer).

Wed
16
Jan
Sarath Pillai's picture

Record Protocol in SSL and TLS

ssl record layer

SSL Protocols

SSL protocol, which was initially developed by Netscape, is the base for secure communication in the internet today. SSL Being a big topic to cover in a single article/blog post, we have tried to segregate different topics to be understood in SSL.

In this post, we will try to understand the Record Protocol in SSL, out of the four main layers in SSL, which are mentioned below.

 

Tue
15
Jan
Sarath Pillai's picture

Understanding the working of Secure Socket Layer(SSL)

SSL Protocol Working

Due to the increase in widespread use of internet website's for online bank transactions, and exchange of sensitive information, over the wire, several efforts were made to secure the communication.

The result of such efforts are evident from different communication protocol's that exists today. We will be discussing two such protocol's in this post.

Sun
06
Jan
Sarath Pillai's picture

TCP Layer 2 Security Threats and attacks

Data link layer threats and attacks

All layers of TCP/IP has got its own security threats and vulnerabilities. We will be discussing security threats and vulnerabilities in each and every layer in TCP/IP separately in different posts as each one requires special attention.

In this post we will discuss vulnerabilities that pose security threats at the second layer of TCP/IP. So our topic of interest for this post is Data Link Layer. Although data link layer comes below most of the other layers, a security breach in this layer can cause service disruptions to upper layers.

Some protocol's of Data link Layer:

 

Wed
02
Jan
Sarath Pillai's picture

MOSH - A better alternative to ssh

mosh remote login

SSH is the best method available out there for the job of establishing connection with remote server's in a secure manner. System administrators use ssh, too ofter to carry out their administration tasks. SSH was truly a revolutionary protocol to take shell remotely and carry out operations very securely.

However there are some shortcomings in the protocol, due the overhead, as well as design limitations. Some of them are listed below.

Pages

Subscribe to RSS - Security Notes