💾 Archived View for spam.works › mirrors › textfiles › hacking › ddnet1.txt captured on 2023-11-14 at 09:50:08.
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo DDN - The Defense Data Network The Department of Defense started the major networking scene in the US in the late '70s and early 80s. Their first baby was ARPANET (Advanced Research Projects Agency NETwork). It was just a development system to see how feasible a national computer network would be and to help facillitate information transfer between defense researchers (and some university projects). The world of InterNET has grown up around that existing foundation to become one of the most (THE most?) used network in the world as researchers in other nations found they also needed access to counterparts around the nation to exchange knowledge and ideas. Well to end this simple history I will get back to the DDN and its workings (what little I do really know of them) and it structure. The DoD (Dept of Defense) has been maintaining its own separate networks ever since ARPANET became a success and was "gobbled up" by the growing InterNET structure. The DoD wanted to be able to secure its important work and research and to do so it needed to be isolated from the existing infrastructure. They decided that a somewhat free flow of information would be necessary between constituents and that some kind of framework similar to Internet would be beneficial but that access to their systems would have to be limited by means more secure than anything available on the public Internet system. They developed MILNET for this specific purpose (to carry unclassified data traffic between defense contractors and researchers). Beyond MILNET there were also been establish three other military nets under the auspices of the Defense Secure NETwork (DSNET). The three were DSNET1 for Secret data, DSNET2 for Top Secret data, and DSNET3 for special Top Secret data (probably weapons systems and plans, and ELINT/SIGINT systems -- but that is only a guess). These three each had a separate communications hub including local and widearea nets. The 3 DSNETS have been combined (are being combined) in a unified DISNET (Defense Integrated Security NETwork). The Defense Communication Agency (DCA) was put in charge of maintaining the backbones of the defense networks (except ARPANET which is primarily used by the R&D community and is maintained by DARPA and is not really associated with DDN) as part of the Defense Communication System (DCS). All DDN Nets are not part (officially) of InterNET because of the security risks involved. The restructuring of DDN into DISNET is a continually evolving project (especially in the area of Defense Messaging System - which I know little about at this time and WOULD LIKE TO SEE MORE INFO about if anyone knows about it ), but I will explain its structure as presently laid out... "(1) Security architecture should include a well-defined set of network security services offered to subscribers" Services: CONFIDENTIALITY: 1.Mandatory Confidentiality - protects classified data using DDN rule based security 2.Discretionary Confid. - identity based (Need-to-Know) security 3.Traffic Flow Confid. - protects against disclosure by observing \ characteristics of data flow \_____See the encrypthion and communities descriptions below for more on this. DATA INTEGRITY - protects against (OR ATLEAST TRYS TO DETECT) unauthorized changes of data IDENTIFICATION, AUTHENTICATION, AND ACCESS CONTROL : * 1.Identification- standard name for each system entity (just like every net. 2.Authentication- ensures that a stated identity is correct (HOW???) 3.Access Control- limits system resources to a correctly identified system "(2) Subscribers should not pay for or be hampered by unneedded security" ^\______ Interesting...who does pay for un-needed security then?!? ""(4) Subscribers should share responsibility for security where appro- priate" <----<<<< COULD THIS BE A MAJOR DOWNFALL?? Hmm... * - As for I,A, and AC(above) These services are subscriber respons- ibility except for major communities and subcommunities. STRUCTURE OF THE DDN : The primary elements are computers called switches which communicate via inter-switch trunks.(DCA owns the switches and leases most trunks) Each subscriber connects to DDN as a HOST or a TERMINAL. DDN serves hosts at the OSI (Open Systems Interconnect) network level; the Host - Switch interface is the standard X.25 (CCITT). Many of the hosts are gateways to other nets (mainly LANs) and the number of gateways is increasing. Special Hosts: Montitor Centers (MC) : they manage the switches, trunks, and other special hosts. Name Server hosts - they translate the addresses of the other hosts Terminal Access Controllers (TACs) - more limited DDN service. Instead of a direct Host-to-Switch connection you can connect to a TAC (via dial-up) and be addressed as a terminal by DDN through TAC. TAC uses TELNET protocol so terminal can communicate with a second DDN Host as if directly connected. TAC Access Control Systems (TACACS) - prompt user to login at a TAC Priority Access: All DDN switches can handle data packets according to 4 level hierarchy system. precedence lavels are assigned to hosts and terminals by the Joint Chiefs of Staff. To my knowledge this hasn't been implemented yet. Host to Host Encryption: DISNET uses a end-to-end encryption system (E3) called BLACKER. These are installed on each host-to-switch path of all hosts including TACs . These BLACKER front end devices (BFEs) encrypt all data packets but leave the X.25 header unencrypted for the backbone to use. The BLACKER system includes a Key Distribut-ion Center (KDC) and Access Control Center (ACC) hosts. BLACKER is a Class A1 System (under the Trusted Computer System Evaluation Criteria / "Orange Book"), and it will be able to prevent a community MC from communicating with other MCs in other communities; this will not happen for a while and the MC sites will still have a terminal through a TAC directly to a switch without going through BFE. Bridges between Nets: The plan calls for limited gateways between MILNET and DISNET to allow unclassified data traffic (in the form of store-and-forward electronic mail in both directions). Data entering DISNET from MILNET will be identified as such by the bridge. The DDN plans forbid a subscriber from connecting to both MILNET and DISNET and also forbids DoD system to connect both to a DDN segment and to a segment that does not conform to DDN security structure. Other Stuff: To insure that every subscriber system can exercise discretionary access control over its resources through DDN, and of DDN resources via the subscriber system, DDN requires that all subscribers be TCSEC Class C2 secure. By september '92 any non-complying system will need OSD and JCS waivers or DCA can remove them from the Net. DDN plans to segregate subscribers according to whether or not they meet the TCSEC C2 requirement. Conforming systems comprise a Trusted Subcommunity within each security level. Within this subcommunity hosts can freely communicate. NonConforming systems with waivers will form Closed Communities within each level. Direct net communications between subcommunities will be prevented by switching logic in MILNET and by BLACKER in DISNET except over trusted bridges. Downloaded From P-80 Systems 304-744-2253