expressive Internet Architecture Security Concepts
|
|
|
- Peter Cameron
- 9 years ago
- Views:
Transcription
1 expressive Internet Architecture Security Concepts Adrian Perrig Peter Steenkiste, Dave Andersen, David Eckhardt, Sara Kiesler, Jon Peha, Srini Seshan, Marvin Sirbu, Hui Zhang Carnegie Mellon University Aditya Akella, University of Wisconsin John Byers, Boston University Bruce Maggs, Duke June 1, 2015, MIT
2 Narrow Waist of the Internet Key to its Success! Has allowed Internet to evolve dramalcally! But now an obstacle to addressing challenges: Applications Internet Protocol Link Technologies No built- in security New usage models a challenge content and services, not hosts Hard to leverage advances in technology in network Limited interaclons between network edge and core! But where do we get started?
3 Three Simple Ideas! DesLnaLons are hosts Typing supports mullple deslnalon types Principals can be: hosts, but also content, services, etc. Matches applicalons, reduced complexity and overhead! No network level security Intrinsic security offers authenlcity of endpoint Does not rely on external configuralons, data bases,.. Accountability, address agility,! One way of reaching deslnalon Flexible addresses offer diverse delivery oplons Include both intent and fallback address Evolvability, network diversity, fault recovery, mobility,.. 4
4 Multiple Principal Types! Associated with different forwarding seman.cs Support heterogeneity in usage and deployment models! Hosts XIDs support host- based communicalon who?! Service XIDs allow the network to route to possibly replicated services what does it do? LAN services access, WAN replicalon,! Content XIDs allow network to retrieve content from anywhere what is it? OpportunisLc caches, CDNs,! Set of principal types can evolve over Lme 5
5 Intrinsic Security in XIA! XIA uses self- cerlfying idenlfiers that guarantee security properles for communicalon operalon Host and service ID are a hash of its public key correct deslnalon and accountability (AIP) Content ID is a hash of the content correctness Does not rely on external configuralons! Intrinsic security is specific to the principal type! Useful to manage addresses securely and for bootstrapping e- e security solulons! Many other oplons, e.g., CID variants, non- PKI, 6
6 Flexible Addressing: DAGs Support Scoping and Fallbacks Client side Server- side domain hierarchy CID S NIS S HID S 7
7 Main Security Properties! Trust management How to set up trust relalons, roots of trust! AuthenLcity / integrity AuthenLcaLon of user, host, domain, service, content! AuthenLcaLon and Accountability Both authorizalon and deterrence, respeclvely! Secrecy of idenlty, anonymity, privacy Sender / receiver privacy if desired! Availability CommunicaLon availability (hosts and services) Finding nearby contents and services Defenses against DoS aeacks
8 Overview! Global trust architecture IsolaLon domains PKI for roulng PKI for services, domains PKI for endhosts Intrinsic security for CID, SID! Control plane security! Data plane security! Anonymity and privacy 9
9 Non-Scalability of Trust! As the Internet has grown to encompass a large part of the global populalon, not everyone trusts everyone else on the Internet any more! The heterogeneity of global environment complicates enlty authenlcalon infrastructures Relevant in this context: authenlcalon of roulng updates, DNS replies, TLS cerlficates! Two models for trust roots for authenlcalon Monopoly model Oligarchy model 10
10 Monopoly Model for Trust Root! Single root of trust (i.e., root public key) that is globally accepted to authenlcate enlles! Examples: RPKI for BGPSEC or DNSSEC rely on a public key that forms root of trust All AS cerlficates or DNS records are authenlcated based on root of trust! Problems EnLre world needs to agree on enlty to hold root of trust Single point of failure Inefficient revocalon / update mechanisms 11
11 Oligarchy Model for Trust Root! Numerous roots of trust that are globally accepted to validate enlles! Example: TLS PKI relies on > 1000 roots of trust TLS cerlficate accepted if signed by any root of trust! Problems Single point of failure: any single compromised root of trust can create any bogus TLS cerlficate RevocaLon / update is handled through OS or browser sokware update 12
12 Proposed Approach: Isolation Domains! ObservaLon: subset of the Internet can agree on roots of trust " form IsolaLon Domain with that root of trust! AuthenLcate enlles within each IsolaLon Domain! Users & domains can select IsolaLon Domain based on root of trust! Also supports modern log- based PKI approaches: CT, AKI, ARPKI,! Challenge: retain global verifiability 13
13 SCION Isolation Domains (ISD)! SCION IsolaLon Domain requirements Region which can agree on a common root of trust Set of ISPs to operate IsolaLon Domain Core to manage ISD! Root of trust and Autonomous Domain (AD) cerlficates! Manage core path and beacon servers Other ISDs need to agree to connect as peers or as a provider in case of hierarchical ISD! Open research issue exactly how to best structure ISDs: polilcal and legal issue arise Possible parllon is along geographical regions 14
14 Trust Root Management! Each ISD manages their own trust roots Used to create per- AD cerlficates AD cerlficates used to verify beacon messages! Trust Root ConfiguraLon (TRC) file serves as root of trust for ISD TRC file specifies public keys of trust root and policy for TRC file update Thresholds enable revocalon and re- authenlcalon of new TRC files Beacon messages quickly disseminate new TRC files! Requirement: ISDs cross- sign TRC files 15
15 Trust Root Config (TRC): ISD Root-of-Trust! Each ISD has a TRC file Each AD is verified based on trust roots in TRC ISD EU TRC file version N A cert E cert CA1 cert Update: 2 out of 3 Sigs with keys of TRC version N- 1 EU TD1 ISD Core CH ISD Core { B cert }K A - 1 { CH ISD TRC }K A
16 TRC File Update! New TRC file version N+1 signed by threshold number of keys from version N! Beaconing process distributes new TRC file ISD EU TRC file version N A cert E cert CA1 cert Update: 2 out of 3 Sigs with keys of TRC version N- 1 ISD EU TRC file version N+1 A cert E cert CA1 cert Update: 2 out of 3 Sigs with keys of TRC version N EU TD1 ISD Core 17
17 Routing PKI! Per- ISD TRC file enables heterogeneous trust roots! TRC file update mechanism enables efficient update and revocalon Tens of seconds to update / revoke roots of trust network- wide! ObservaLon: network architecture should provide mechanism for updalng trust roots! RouLng PKI cannot have circular dependencies between roulng message verificalon and end- to- end communicalon 18
18 Overview! Global trust architecture IsolaLon domains PKI for roulng PKI for services, domains PKI for endhosts Intrinsic security for CID, SID! Control plane security! Data plane security! Anonymity and privacy 19
19 Why We Need a Better Service PKI! Security of the weakest link Security breach of a single CA " Compromise security of sites protected by any other CA! On- path aeacker can perform Man- in- the- Middle (MitM) aeack! CA stalslcs from EFF SSL Observatory, ,482 CA public keys trustable by Microsok or Mozilla 651 organizalons! MSR SV PKI project [HotOS 2013] 1500 intermediate CA cerlficates issued (signed by root CAs) 20
20 Man-in-the-Middle (MitM) Attack Normal case Browser (3) Hello (4) Key K D, Cert KD Domain D Adversary obtains fraudulent cerlficate Aeacker (1) Key K D (2) Cert KD = { D.com, K D } K - 1 CA Cer.ficate Authority Man- in- the- Middle aeack (1) Key K D (2) Cert KD = { D.com K D } K - 1 CA Cer.ficate Authority Browser (1) Hello (SSL/TLS session) (4) Key K D, Cert KD Aeacker (2) Hello (SSL/TLS session) (3) Key K D, Cert KD Domain D
21 CA BREACH EVENTS! Jan 2001: false Microsok AcLveX cerlficate issued by Verisign! 2010: VeriSign hacked, successfully and repeatedly VeriSign aeacks were revealed in a quarterly U.S. SecuriLes and Exchange Commission filing in October 2011! Mar 2011: aeack on Commodo reseller Several fraudulent cerlficates were issued: mail.google.com, login.yahoo.com, login.skype.com, addons.mozilla.org, login.live.com Suggested that aeack originated from Iranian IP address! Aug 2011: DigiNotar, a Dutch CA, improperly issued a cerlficate for all Google domains to an external party Claim: 250 cerlficates for an unknown number of domains were released Iranian government spied on Iranian cilzens' communicalons with Google during the month of August 2011! Oct 2011: Stuxnet used compromised cerlficates from 2 Taiwanese CAs! Dec 2012: EGO uses erroneously issued TurkTrust cerlficate! Possibly a large number of CA breaches are concealed 22
22 How to Resolve these Vulnerabilities?! CerLficate RevocaLon List (CRL)! Online CerLficate Status Protocol (OCSP)! Short- lived cerlficates! PerspecLves, Convergence! DANE! CerLficate Pinning!! New approach: log to make aeacks publicly visible Google: CerLficate Transparency EFF: Sovereign Keys 23
23 CERTIFICATE TRANSPARENCY (CT)! CerLficate logs Read- and append- only logs (similar to a Lmestamping server) Merkle Hash Tree (MHT) to implement log Entry = SSL/TLS cerlficate Periodically appends new entries and signs the root (Signed Tree Head)! Upon receiving a cerlficate chain from domain or CA Log verifies the cerlficate Log issues Signed CerLficate Timestamp (SCT)! Promise to add the new cerlficate to the MHT Cert K = { D.com K} K - 1 CA Browser (5) Hello (6) Key K, cert K, SCT Domain D (1) Key K (4) Cert K, SCT Cer.ficate Authority (3) SCT (2) Key K, cert K Cer.ficate Log
24 SECURITY OF CT! How CT improves security Browser would require SCT for opening conneclon Browser contacts log server to ensure that cerlficate is listed in log! Consequence Aeack cerlficate would have to be listed in public log Aeacks become publicly known " deterrence! Advantage Deployable, CT log already up and running No change to domain s web server required! Disadvantage MitM aeack slll proceeds (but can be detected externally) Browser slll needs to contact Log eventually to verify that cerlficate is listed in log Current CT does not support revocalon 26
25 AKI GOALS! Reduce trust in any single component (e.g., CA, log server) Reduce aeack surface, no single point of failure Handle legilmate key and cerlficate management events Gracefully handle catastrophic events (e.g., domain key loss/ compromise) Enable Domain to create own security policies / levels of security! Address adversarial events CA private key compromise Domain private key compromise Make aeacks visible! Support legilmate events that are indislnguishable from malicious events Switch to different CAs! Possibly to stop using a compromised CA LegiLmate re- crealon of a key pair aker private- key loss! May look like an impersonalon aeempt 28
26 AKI ENTITIES! Set of enlles audit each other s operalons and disseminate misbehavior if detected Client (browser) establishes TLS conneclons with Domain (server) Cer.ficate Agency (CA) cerlfies domains public keys Integrity Log Server (ILS) logs domains cerlficates and makes them publicly available! Maintains Integrity Tree Hash tree of all the registered certs in lexicographical order " Quick to verify the absence of an entry Validators monitor ILS operalons and disseminate misbehavior! Download enlre ILS data & perform consistency checks! Misbehavior detected " disseminate the informalon 30
27 AKI INTEGRITY TREE! Lexicographically sorted hash tree Efficient representalon of the current state of all domains Leaf validalon requires log(n) entries + root only Quickly verify absence of an entry Independent validators can check integrity of enlre data structure Hash chaining of tree: temporal reconstruclon of all operalons! ILS_UP: interval between 2 tree updates At every ILS_UP, ILS finalizes and commits next Integrity Tree D contacts ILS for signed root and hash tree verifica.on nodes ILS_UP! 32
28 AKI OVERVIEW (registralon) 2 is sent to each ILS 5 is sent to at least one ILS from ILS_LIST 7 is sent to any Validator AKICert={Cert 1 Cert 2 } AKICert {promise} K - 1 ILS {OK, } K - 1 V A.com (K A, K - 1 A ) Browser Cert 1 ={A.com, K A } K - 1 CA1 Cert 2 ={A.com, K A } K - 1 CA2 CA 2 CA 1 (K CA1, K - 1 CA1 ) 1 2 {Yes/No} K - 1 ILS {OK, } K - 1 V ClientHello {Add AKICert} K - 1 A {promise} K - 1 ILS Verify AKICert {promise} 8 K - 1 ILS Validator Validator (K V, K - 1 V (K ) V, K - 1 V ) Verifies Cert and ILS verificalon informalon CA monitors AKICert {Is A.com in the log?} 6 ILS ILS (K ILS, K - 1 ILS (K ) ILS, K - 1 ILS ) K - 1 CAx Root Verifies AKICert Adds/Removes AKICert Creates proofs of these aclons
29 AKI OVERVIEW (confirmalon) 1 is sent to at least one ILS from ILS_LIST 3 is sent to any Validator CA 2 CA 1 (K CA1, K - 1 CA1 ) CA monitors AKICert AKICert {Root, h} K - 1 ILS {OK, } K - 1 V A.com (K A, K - 1 A ) Browser 1 3 {OK, } K - 1 V ClientHello {Confirm AKICert} K - 1 A {Root, h} K ILS Verify AKICert {Root, h} K - 1 ILS 4 Validator Validator (K V, K - 1 V (K ) V, K - 1 V ) Verifies ILS confirmalon ILS ILS (K ILS, K - 1 ILS (K ) ILS, K - 1 ILS ) Root Verifies AKICert Adds/Removes AKICert Creates proofs of these aclons
30 INTERESTING CHALLENGE! How to prevent malicious events that appear indislnguishable from legilmate events?! Example 1: trusted CA compromise Domain trusts CA1, CA1 is compromised, domain switches to CA2 Aeacker issues new cerlficate for domain using CA2! Example 2: domain private key compromise Domain is compromised, loses access to its private key, registers a new cerlficate with CA1 Aeacker issues new cerlficate for domain through CA1 36
31 CERTIFICATE UPDATE RULES! Cool- off periods (COP) introduce delay for suspicious operalons (only in case of catastrophic events!) 37
32 ARPKI: ATTACK-RESILIENT PKI! Problem: AKI is highly complex, with many potenlal cases Domain key compromise CA, ILS, validator compromise OperaLon with many ILSes, validators Different interleavings of messages, operalons! Without formal verificalon, we cannot ensure consideralon of all cases! ARPKI: Extension of AKI with formal verificalon using Tamarin security protocol verificalon tool David Basin, Cas Cremers, Ralf Sasse, Pawel Szalachowski performed most of the verificalon 38
33 39
34 40
35 Endhost PKI! Link to a device joining a network Mutual authenlcalon: host and AD Ties in with AD- level trust establishment! Variant: mobile network! Work in Progress 41
36 Joining Network! When a device joins a network we need a handshake that includes: Service discovery, including network layer services Agreement on services Mutual authenlcalon! Requirements include: Works in diverse environments: wired/wireless, corporate/hotspot/home, Efficient, e.g., for high mobility scenarios Example: vehicular networks 42
37 Intrinsic Security in XIA! XIA uses self- cerlfying idenlfiers that guarantee security properles for communicalon operalon Host and service ID are a hash of its public key correct deslnalon and accountability (AIP) Content ID is a hash of the content correctness Does not rely on external configuralon! Intrinsic security is specific to the principal type! Useful to manage addresses securely and for bootstrapping end- to- end security solulons! Many other oplons, e.g., CID variants, non- PKI, 45
38 XIA Example: Retrieving Content Service Content Host ID: ID: Nearest From Same Anywhere as Instance Today Service SID Content CID Host HID SID CID Content CID Content CID Content CID Content CID Content CID Content CID Service SID CID 46
39 Using Intrinsic Security! Useful for efficient authenlcalon within a limited temporal scope, e.g., during a session Not a replacement for PKI or other authenlcalon mechanisms! Examples of using intrinsic security: Changing addresses for mobile users Rebinding of addresses for replicated services CIDs for content (has longer Lme scale) 47
40 Example: Finding a Mobile Device NID H NID S SID HID NID S! Rendez- vous point keeps track of localon of its users Can take many forms: home network, global service, hot spot provider, DNS,! Rendez- vous point forwards packets to mobile device, e.g., SYN! Mobile device sends signed change of address to peer Based on applicalon endpoint - SID SID Signed Change of address Internet NID home Home Loca Lon Loc Svc Signed Change of address NID foreign 48
41 Overview! Global trust architecture! Control plane security SCION secure beacons! Data plane security! Anonymity and privacy 49
42 Secure Control Plane! XIA support different types of XIA idenlfiers, which require roulng protocols XIDs generally have XID- specific requirements! All protocols share the roulng PKI for security! XIA supports two models for inter- domain roulng: deslnalon and path based DesLnaLon: based on network IDs and tradilonal roulng protocols, e.g., path vector Path: Scion provides stronger path guarantees 50
43 SCION Secure Routing and Forwarding! Goals RouLng protocol can tolerate malicious ADs, malicious routers, erroneous configuralons No black hole aeacks: malicious enlty cannot aeract traffic or influence traffic that does not flow through it SeparaLon of control and data plane! AssumpLon: Trust Root ConfiguraLon (TRC) file is distributed within isolalon domain 51
44 Beaconing for Route Discovery! Periodic Path ConstrucLon Beacon (PCBs) Scalable & secure disseminalon of path/topological informalon from core to edge K- wise mull- path policy- constrained flood to provide mullple paths TD1 Core
45 SCION Forwarding (Data Plane)! Domains register paths at DNS- like server in ISD Core! End- to- end communicalon Source fetches deslnalon paths Source path combined with deslnalon path forms end- to- end path Packet contains forwarding informalon! Advantages TD1 Core Balanced route control Isolates forwarding from roulng Transparent forwarding No forwarding table at routers Enables mull- path path server
46 Path Construction and Usage! Path ConstrucLon Beacon (PCB) construclon: PCB 1 = < T exp Int 1 O 1 S 1 > Opaque field O 1 = MAC K ( T exp Int 1 ) Signature S 1 = { PCB 1 } K TD1 Co! PCB 2 = < T exp Int 1 O 1 S 1 Int 2 Int 3 O 2 S 2 > Opaque field O 2 = MAC K ( O 1 T exp Int 12 Int 3 ) Signature S 2 = { PCB 2 } K! AD receiving PCB 2 : Verify signatures Use opaque fields O 1 O 2 to send packet to ISD Core 54
47 Overview! Global trust architecture! Control plane security! Data plane security mctls: TLS and middleboxes OPT: source authenlcalon and path validalon! Anonymity and privacy 55
48 Increased Use of EncrypLon due to Privacy Concerns Mobile, South America Wired, Europe % HTTPS % HTTPS Aug 2013 Nov 2013 Feb 2014 May 2014 Aug Apr 2012 Jan 2013 Oct 2013 Jul 2014
49 But This Involves Tradeoffs! Use of TLS locks out middleboxes, which is oken a good thing, but! Some middleboxes are useful and users want them! Caching and compression can save significant bandwidth for provider or user Also: virus scanning, packet pacing, parental filters,! How do we allow encryplon and the use of (trusted) in- network funclonality I.e., communicalon involving more than 2 parles 57
50 TLS + Middleboxes? TLS WAS DESIGNED FOR EXACTLY 2 PARTIES: No mechanism to authenticate middleboxes. Client has no guarantees past first hop. Middleboxes have full read/write access.
51 Design Requirements! Keep TLS properles, but extend them to all parles: EnLty authenlcalon Data secrecy Data integrity! Control and visibility: end- points can control what data can be seen or modified by each middlebox Minimize privileges of each middlebox 59
52 Key Ideas! MulLple encryplon contexts: Each context has key for readers, writers and endpoints; can be given seleclvely to parles Sender picks encryplon context for each record! Contributory keys: Client and server contribute half of each context key! Upcoming Sigcomm: mull- context TLS (mctls): Enabling Secure In- Network FuncLonality in TLS David Naylor, Kyle Schomp, Maeeo Varvello, Ilias LeonLadis, Jeremy Blackburn, Diego Lopez, KonstanLna Papagiannaki, Pablo Rodriguez Rodriguez, Peter Steenkiste 60
53 Source Authentication and Path Validation! Path validalon enables receiver to check if packet exactly followed intended AD- level path! Source authenlcalon enables routers to authenlcate sender and packet content! Lightweight Source AuthenLcaLon and Path ValidaLon by Kim et al., Sigcomm
54 Basic Path Validation S R 1 R 2 D! Set up shared secret keys Using, R 1 checks path has been followed so far Using, R 1 creates a proof for R 2 that it has seen the packet Using, R 1 creates a proof for D as well 63
55 Retroactive-OPT! No key setup before packet forwarding! Only with suspected misbehavior, S and D set up keys to verify the previous packets key setup OPT Time Retroactive OPT key setup Time Start coward attack detection 65
56 Retroactive-OPT! No key setup before packet forwarding Only with suspected misbehavior, S and D set up keys for previous packets! Routers commit to a key during forwarding Reveal keys used later Wrong key or refusal to provide key " misbehavior 66
57 Efficiency on Routers! Dynamically re- creatable keys on the fly S selects parameters that routers use for key setup Parameters in packet header + local secret "! Constant computalon during forwarding, independent of path length 2 MAC operalons per packet 67
58 Retroactive-OPT Process! Each OPT node derives a key Parameters in packet header + local secret 1 " 1 S R 1 R 2 D Parameters 1 1 PVF MAC PVF 1 68
59 Retroactive-OPT Process! Each OPT node derives a key Parameters in packet header + local secret 1 " 1 S R 1 R 2 D Parameters 2 2 MAC PVF MAC 1 MAC PVF
60 Overview! Global trust architecture IsolaLon domains Secure PKI for roulng and services! Control plane security! Data plane security! Anonymity and privacy APIP: balance privacy and accountability LAP: Lightweight Anonymity and Privacy 70
61 Growing User Concern about Privacy! Fueled by personal experience and reports E.g., social networks, vendors, Snowden,! So more privacy is always beeer?! Privacy can be expensive Obvious example: strong anonymity using TOR More subtle costs associated with HTTPS! Privacy can lead to lack of accountability Address spoofing, DOS aeacks,! Can we balance the privacy and accountability? Rather than having to choose one over the other! Balancing Accountability and Privacy in the Network by Naylor, Mukerjee, Steenkiste, SIGCOMM
62 Source Addresses: Controlling Privacy versus Accountability! Source address are assumed to be essenlal but you can build a network without them! What are source addresses used for? Hard to balance Privacy and Accountability: Tor versus AIP Tussle controlled by on/off switch Return address IdenLfy sender Accountability Error reporlng Flow ID Used by: DesLnaLon Network 72
63 Accountability and Privacy! View source addresses as accountability addresses Uses AIP style accountability, but Accountability can be delegated to a service that takes responsibility for packet Return address can be (hidden) inside packet! Many details : nature of delegate, fate sharing, 73
64 Research Questions! How do sources efficiently brief accountability delegates! Who can be a delegate? Anybody versus only trusted parles! How to prevent aeacks against delegates No delegate, no conneclvity!! How to balance performance with security Checking introduces delays, overhead Balancing Privacy and Accountability, David Naylor, Maehew Mukerjee, Peter Steenkiste, ACM Sigcomm, August
65 Lightweight Anonymity and Privacy! Desired property: bridge latency gap between systems with strong anonymity proteclon and non- anonymous systems, efficient enough to protect all traffic by default! LAP: Lightweight Anonymity and Privacy by Hsiao et al., IEEE Security and Privacy 2012 or or? LAP- enabled network Where in the topology??????? 75
66 Proposed Approach: LAP Lightweight Anonymity & Privacy 1. Consider a relaxed yet praclcal aeacker model (a remote aeacker) to bridge the latency gap Explore a tradeoff between aeack class and latency 2. Network- layer approach to efficiently hide source address or or? LAP- enabled network Where in the topology??????? 76
67 LAP Insights! Anonymity: being unidenlfiable within a set of users The set is called an anonymity set 1. Hiding path info improves anonymity The aeacker cannot recover origin address from packet 2. Extending hidden path increases anonymity! SCION encrypted opaque fields provide topological anonymity 1 3 Sender Know is in sender AS1, 2, is IP, or in AS1, 3. S = S AS1 + AS2 + AS3 = AS- level topology (AS = Autonomous System) 77
68 Summary: Security Aspects of XIA! Much progress over the past 5 years; highlights: Internet- scale trust architecture: roulng, services, domains, endhost, content ARPKI: Aeack Resilient PKI designed, analyzed, and implemented Secure roulng and forwarding Middle- box friendly TLS OPT: Efficient Origin and Path Trace APIP: Privacy and accountability architecture LAP: Lightweight Anonymity and Privacy! Other aspects not covered: DDoS defense, fault localizalon, security policies, 78
ARPKI: Attack Resilient Public-Key Infrastructure
ARPKI: Attack Resilient Public-Key Infrastructure David Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski ETH Zurich, University of Oxford, CMU 1 PUBLIC KEYS AND CERTIFICATES
Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
OWASP AppSec APAC 2012 The OWASP Foundation http://www.owasp.org Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB
ALTERNATIVES TO CERTIFICATION AUTHORITIES FOR A SECURE WEB Scott Rea DigiCert, Inc. Session ID: SEC-T02 Session Classification: Intermediate BACKGROUND: WHAT IS A CERTIFICATION AUTHORITY? What is a certification
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
SANE: A Protection Architecture For Enterprise Networks
Fakultät IV Elektrotechnik und Informatik Intelligent Networks and Management of Distributed Systems Research Group Prof. Anja Feldmann, Ph.D. SANE: A Protection Architecture For Enterprise Networks WS
SSL, PKI and Secure Communication
SSL, PKI and Secure Communication Aditya Marella 20 th March, 2014 03/19/2014 Usable Privacy and Security 1 Secure Sockets Layer (SSL) Developed by Netscape Sits on top of TCP and below application level
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
SSL BEST PRACTICES OVERVIEW
SSL BEST PRACTICES OVERVIEW THESE PROBLEMS ARE PERVASIVE 77.9% 5.2% 19.2% 42.3% 77.9% of sites are HTTP 5.2% have an incomplete chain 19.2% support weak/insecure cipher suites 42.3% support SSL 3.0 83.1%
CSA SDP Working Group
CSA SDP Working Group An Open Source Code Project for a Software Defined Perimeter to Defend Cloud Applications from DDoS CSA Conference - Berlin November 2015 DHS Problem Addressing the Changing Perimeter
Grandstream Networks, Inc. UCM6100 Security Manual
Grandstream Networks, Inc. UCM6100 Security Manual Index Table of Contents OVERVIEW... 3 WEB UI ACCESS... 4 UCM6100 HTTP SERVER ACCESS... 4 PROTOCOL TYPE... 4 USER LOGIN... 4 LOGIN TIMEOUT... 5 TWO-LEVEL
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]
BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa
Defenses against Distributed Denial of Service Attacks Adrian Perrig, Dawn Song, Avi Yaar CMU Internet Threat: DDoS Attacks Denial of Service (DoS) attack: consumption (exhaustion) of resources to deny
Regional cyber security considerations for network operations. Eric Osterweil Principal Scientist, Verisign
Regional cyber security considerations for network operations Eric Osterweil Principal Scientist, Verisign Internet operations and cyber security These two fields are deeply intertwined But, one could
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
PKI : state of the art and future trends
PKI : state of the art and future trends David Chadwick [email protected] 25 Sept 2013 2010-13 TrueTrust Ltd 1 Contents Review of X.509 state of the art to date What is new in X.509 (2016) What
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
SSL/TLS and MITM attacks. A case study in Network Security By Lars Nybom & Alexander Wall
SSL/TLS and MITM attacks A case study in Network Security By Lars Nybom & Alexander Wall SSL/TLS Background SSL/TLS Secure Socket Layer/Transport Layer Security (rfc 2246) SSL/TLS Background SSL/TLS Secure
Public Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
How To Protect Your Network From Attack
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Internet (In)Security Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail: [email protected]
Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Introduction to the DANE Protocol
Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust
SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.
Architecture The policy discussed suggests that the network be partitioned into several parts with guards between the various parts to prevent information from leaking from one part to another. One part
Life of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
Internal Server Names and IP Address Requirements for SSL:
Internal Server Names and IP Address Requirements for SSL: Guidance on the Deprecation of Internal Server Names and Reserved IP Addresses provided by the CA/Browser Forum June 2012, Version 1.0 Introduction
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
Computer and Network Security. Outline
Computer and Network Security Lecture 10 Certificates and Revocation Outline Key Distribution Certification Authorities Certificate revocation 1 Key Distribution K A, K B E KA ( K AB, E KB (KAB) ) K A
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
How Network Transparency Affects Application Acceleration Deployment
How Network Transparency Affects Application Acceleration Deployment By John Bartlett and Peter Sevcik July 2007 Acceleration deployments should be simple. Vendors have worked hard to make the acceleration
