Captchas, Firewalls, Protocols




CS166

Chris Pollett

Oct 29, 2012

Outline

Captchas - Turing Tests

CAPTCHA (Ang, Blum, Langford 2004)

CAPTCHA Paradox?

CAPTCHA Uses?

CAPTCHA: Rules of the Game

Do CAPTCHAs Exist?

CAPTCHAs

CAPTCHA's and AI

Quiz

Which of the following is true?

  1. The Orange Book was a trusted computing evaluation manual that replaced the Common Criteria in 1983.
  2. Bell-LaPadula and Biba's models are both compartment-based MLS models.
  3. Capabilities Lists can be used to delegate authority to avoid the confused deputy problem.

Firewalls

Firewall Messages

Firewall as Secretary

Firewall Terminology

Packet Filter

Network Layer in network stack

Packet Filter - Pros and Cons

Network Layer in network stack

Packet Filter Configuration

Packet Filter ACL

TCP ACK Scan

TCP ACK Scan

TCP ACK Scan Messages

Stateful Packet Filter

Transport Layer in network stack

Stateful Packet Filter

Transport Layer in network stack

Application Proxy

Application Layer in network stack

Application Proxy

Application Proxy

Firewalk

Firewalk and Proxy Firewall

A Firewalk example

Deep Packet Inspection

Firewalls and Defense in Depth

A typical firewall architecture

Protocol

We are now going to start the third major topic of this course -- protocols.

More on Protocols

Ideal Security Protocol

Secure Entry to NSA

To start talking about protocols we will look at several simple security protocols... First, consider the following protocol for entering the NSA building...

  1. Insert badge into reader
  2. Enter PIN
  3. Correct PIN?
    Yes? Enter
    No? Get shot by security guard

ATM Machine Protocol

  1. Insert ATM card
  2. Enter PIN
  3. Correct PIN?
    Yes? Conduct your transaction(s)
    No? Machine (eventually) eats card

Identify Friend or Foe (IFF)

Airplane needs to identify if Friend or Foe to Radar

MIG in the Middle

Flaw in the IFF protocol