Announcements
Syllabus
Class notes
- Introduction
- The IP protocol, Part I
- Datagram service, UDP
- UDP:
User Datagram Protocol, packet communications.
(RFC 768)
- Port numbers
- Examples of UDP
- The IP Protocol, Part II
- Local delivery: RFC 826 - ARP
- RFC 2453: RIP2
- Distance Vector
- Counting to infinity
- Split horizon, poison reverse, triggered updates
- Default routers, subnets, authentication, and RIP2
- OSPF: Link state protocols
- Autonomous systems and BGP
- IP fragmentation
- ICMP, ping, traceroute, and host routing tables.
- Connection service, TCP protocol
- TCP: Transmission Control Protocol.
(RFC 793)
- Class notes
- Segment management and acknowlegements
- Connection establishment
- Resend timers, Karn's algorithm
- Congestion control: Slow start and Multiplicative decrease.
(Also, Fast retransmit, and other just-so stories)
See RFC 2001
- Silly window syndrome, Nagel's algorithm
- Network and port address translation
- Example session:
- email: SMTP, 822 headers, and MIME
; POP and IMAP
- HTTP, HTML, CSS, CGI, SHTML, DHTML, and so on.
- CGI test
- Web technologies
- FTP, passive, interaction of protocols
- Network security, protocols, and cryptography
- Firewalls, NAT, Proxies and Packet Filters
- Authentication
- SSL and the PKI
- Attacks
- Countermeasures
- Link level communcations
(in semester 092 this section came
before the security/crypto section)
- Crash course in communication theory.
- Bit rate, bandwidth and Noise:
Shannon-Hartley
Theorem
- RC circuits,
Nyquist rate
- Modulation,
line codes,
symbol rate,
error correction and detection
- R. V. L. Hartley
Transmission of information (PDF),
Bell System Technical Journal, July 1928.
- C. E. Shannon A mathematical theory of communication (PDF),
The Bell System Technical Journal, Vol 27, pp 379-423, 623-656 July, Ocober 1948.
- C. E. Shannon Communication in the presence of noise
(PDF)
Proc. Institute of Radio Engineers vol. 37 (1):
10-21. January 1949.
http://www.stanford.edu/class/ee104/shannonpaper.pdf
- Example of local communication: DTE/DCE,
RS-232
- Ethernet, 802.3 and DIX
- 10-Base-T, or 2 or 5
- 100-Base-TX (faster ether)
- full-duplex, star topologies, auto-negotiate
- 100Base-TX,
4B5B and
MLT-3, SSD, ESD and idle group
- Gig-E
- Wi-Fi
- Bridges, Switches, Hubs and Repeaters
Reading
Assignments
- Project 1: Talker/listener
- Project 2: TFTP server
- Read RFC 1350 and
section 4.2.3.1 of RFC 1123 (by Feb 12)
- Modify your talker/listener to perform the first step of the TFTP protocol,
as server. (by Feb 17)
- The tftp program, part of the standard linux distribution, can be your
client to test your server. It takes in alternative port number to the default
of 69.
- Use getopt (man 2 getopt) to implement a -p <portnumber> option.
- Receive a RRQ or WRQ packet, and return an ERROR packet.
- Decode the packet and print it out.
- Continue your TFTP server to handle RRQ's. Don't worry about time-outs,
or any format other than octet. (by Feb 22).
- Complete your TFTP server. Implement writes; implement time-outs.
(To do timeouts, you will can use the select system all,
you have a watchdog thread that sleeps and resends.)
- Complete the TFTP Project by March 5 (friday)
- Project 3-warmup
- Use telnet to deliver and pop mail from a test server
- See additional notes.
- Project 3: POP client
- Write a pop client that automatically downloads all email,
concatentenating the mail to an mbox file.
- Use TCP sockets as shown in bej's guide.
- Deliver your code by checking it into your directory of
subversion.
(Red book)
- Please submit by Friday, April 16.
- Project 4: POPS client
- Add certificate logic to the project 3 POP client.
- You will need to use the bio abstraction.
Here is a simple example.
- You must validate the POP server's X.509 certificate.
- Create a client certificate and use it against the test POP server.
- Due: April 30 (last day of class)
References
- Additional textbooks:
- Radia Perlman, Interconnects: Bridges, Routers, Switches and Internetworking Protocols.
- Douglas Comer, Internetworking with TCP/IP, Vol I: Principles, Protocols, and Architecture.
- William R. Cheswick and Steven M. Bellovin, Firewalls and Internet Security: Repelling the Wily Hacker.
-
General Networking
- Software engineering for security
- WEP
- My RC4 example.
- CRC-32 failure of WEP.
- SecurityFocus review
- Attacks
on RC4 and WEP, Fluhrer, Mantin, Shamir, Cryptobytes Vol 5., No. 2, 2002,
pp 26-34.
-
KoreK attacks in chopper.
Korek
explains some of them.
-
Weakness in the Key Scheduling
Algorithm of RC4 Scott Fluhrer, Itsik Mantin, Adi Shamir.
-
Using the Fluhrer, Mantin, and
Shamir Attack to Break WEP Adam Stubblefield, John
Ioannidis, Aviel Rubin.
-
AirSnort source code.
- Exploits
- Virus
-
Open Source Security Response Philosophy
-
Secure Operating Systems
- RFC's
- IPv6
- Port Knocking
- Cookies
- Topics for next term