eid Online Authentication Network Threat Model, Attacks and Implications
|
|
|
- Leonard Bryant
- 10 years ago
- Views:
Transcription
1 eid Online Authentication Network Threat Model, Attacks and Implications Christian J. Dietrich 1,2, Christian Rossow 1,3, and Norbert Pohlmann 1 1 Institute for Internet Security, University of Applied Sciences Gelsenkirchen, Germany 2 Department of Computer Science, Friedrich-Alexander University, Erlangen, Germany 3 Computer Systems Group, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands Zusammenfassung We present a threat model for network-based attacks on the eid Online Authentication. Using this model, we show why network-level man-in-the-middle attacks fail, in theory. However, practical limitations of the current eid client used with the German eid card allow an attacker to perform man-in-the-middle attacks when integrity checks of the TLS peer certificates are not applied to all connections of the corresponding channels. 1 Introduction Since November 2010, the new electronic German ID card provides a facility to perform an online remote authentication of the ID card holder. This method is called eid Online Authentication and is defined in the Technical Guideline TR [3] of the Federal Office for Information Security (BSI). As part of the eid Online Authentication, personal data can be transmitted from the electronic ID card to its counterpart, the eid server. All data transmitted between the eletronic ID card and the eid server is supposed to be subject to secure messaging. We develop a threat model and address the feasibility of network-level man-in-the-middle attacks against the eid Online Authentication functionality of the new German electronic ID card. Furthermore, we perform a number of man-in-the-middle attacks against the most-widely used ecard API client implementation for the eid Service, called AusweisApp. As personal data is increasingly valuable nowadays, we impersonate an attacker trying to intercept personal data that is transmitted as part of the eid Online Authentication. The main contributions of this work are: We propose a threat model focussed on the network communication in the context of the eid Online Authentication.
2 A DFN Workshop Sicherheit in vernetzten Systemen Based on this threat model, we describe the prerequisites of man-in-the-middle attacks and develop the required tools to perform such attacks. We provide the results of performing MITM attacks against the most-widely used combination of eid client application (AusweisApp) and eid server. We provide a free proof-of-concept implementation of TLS-RSA-PSK ciphersuites for OpenSSL [1]. This paper is structured as follows. In Section 2, we will give an overview of our threat model. Section 3 describes the prerequisites for man-in-the-middle attacks against several communication channels of the eid Online Authentication. We will then provide the results of attacks that we performed against the most-widely used combination of eid components in Section 4. Based on the attack results, we suggest practical implications in Section 5. Finally, related work is discussed in Section 6 and we provide a conclusion in Section 7. 2 Threat Model Our threat model is based on the general architecture of the eid Online Authentication outlined in [5] and shown in Figure 1. We differentiate between a channel and a connection. A channel denotes a set of connections which share source and destination entities as well as the cipher suite and, if applicable, credentials, e.g. pre-shared key. Abbildung 1: eid Service Architecture The eid Online Authentication provides a secure way to mutually authenticate a web application and an end user. From a security point of view, this has two major advantages. First, the authentication of the web application against the user proves that the user communicates with a benign web site, trying to prevent from service forgery attacks such as phishing. Second, the authentication of the end user enables the web application to reliably read personal data from an eid card, such as e.g. name and address, age or a site-specified identifier that could be used as login name. The most important network channels involved in the eid Online Authentication are depicted in Figure 1 as solid lines. Black lines symbolize channels secured by Transport Layer Security
3 C. Dietrich et al.: eid Online Authentication Network Threat Model A-3 (TLS [6]), blue lines symbolize channels secured by TLS with RSA-PSK cipher suites [9]. The channel BW is the very first channel initiated by the user in order to use a certain web application, e.g. a webshop or a bank. In order to initiate the eid Online Authentication, the user s web browser connects to the eid server using the TLS channel BS. The eid server returns a trigger object in BS that causes the ecard API client application to connect to the eid server using channel CS. The trigger object contains a pre-shared secret as well as a client identity. Listing 1 shows an example of an HTML trigger object for the eid client. Both of these credentials, the PSK client identity and the PSK, are required to successfully establish CS using a special set of cipher suites that combine certificate based peer authentication with pre-shared key as key exchange (TLS-RSA-PSK). The trigger object parameter ServerAddress specifies the eid server that will be used for the eid Online Authentication. In addition, the parameter PathSecurity-Protocol in Listing 1 specifies that TLS-RSA-PSK must be used in the channel CS. Listing 1: Example trigger object in the channel BS 1 < o b j e c t t y p e =" application /vnd.ecard -client"> 2 <param name=" ServerAddress " v a l u e ="eid -ref.eid -service.de:443" / > 3 <param name=" Binding" v a l u e =" urn:liberty:paos: " / > 4 <! RFC 4279 s p e c i f i e s TLS RSA PSK > 5 <param name=" PathSecurity - Protocol " v a l u e =" urn:ietf:rfc:4279 " / > 6 7 <! t h i s i s t h e PSK c l i e n t i d e n t i t y f o r t h e c h a n n e l CS > 8 <param name=" SessionIdentifier " v a l u e =" 54 dcf4d212c990c7a768ce51efad " / > 9 10 <! t h i s i s t h e PSK f o r t h e c h a n n e l CS > 11 <param name="pathsecurity - Parameters " v a l u e ="<PSK > c033f52671c..5 c36e3759f0cf40837 </PSK >" / > 12 <param name=" SHA256ofSAMLRequest " v a l u e =" MDEwDQYJYIZIAW... ChnhhAxzs7Cy " / > 13 <param name=" RefreshAddress " 14 v a l u e ="https: //eid -ref.eid -service.de:443/epa/plugin?uesdbbqacaaial2... QAAC8BAA %3D%3D" / > 15 < / o b j e c t > If all connections are established successfully, Terminal and Chip Authentication [3] are performed resulting in secure messaging between the eid card and the eid server. Thus, on top of the TLS channel CS, there is an end-to-end secure messaging channel between the eid card and the eid server. In a successful eid Online Authentication, the personal data is transmitted from the eid card through the secure messaging channel on top of the TLS channel CS to the eid server. However, it is usually not (only) the eid server but (also) the web application that needs the personal data (or parts thereof). Thus the personal data is forwarded from the eid server via BS and BW to the web application. At some points, the Terminal Authentication and the TLS channels are intertwined which will later be described in more detail. This binding aims to prevent intercepting or manipulating the personal data even in the channels BS and BW. Our network-oriented threat model is based on the following preconditions: 1. The attacker does not have local system-level access on the user s system. 2. The attacker does neither have local system-level access on the intended eid server nor on the web application server.
4 A DFN Workshop Sicherheit in vernetzten Systemen 3. The attacker can trigger the browser and the client application to connect to a destination specified by the adversary, e.g. via social engineering or DNS spoofing. 4. The attacker is positioned as man in the middle such that packets of any connection between the victim and the web application provider and the eid service provider flow through the attacker s intermediate system. As our threat model is centered on the network communication, it covers multiple attack goals. As an example, an attacker might want to break any of the channels BW, BS and CS in order to intercept personal data that is transmitted during an online authentication. Another example would be to break the channel CS in order to exploit possible weaknesses of the ecard API client application. In addition, although the eid infrastructure is designed to prevent from phishing attacks, an attacker could try to intervene in channel BW and perform session hijacking. We define our threat model to comprise the three channels BW, BS and CS as well as the triggering of the ecard API client BC shown in Figure 1. Oepen and Morgner [11] have shown that relay attacks where the attacker is positioned between the eid card API client application and the card reader on the user s system (CR and RID in Figure 1) can successfully be launched. However, as these attacks require the attacker to have local system access on the user s system, they are out of scope of this work. In the following, we look into attacks on the network channels based on our threat model. 3 Attack Prerequisites In order to be able to perform man-in-the-middle attacks on the channels BW, BS and CS between the user s system and the eid server components, several requirements must be met. The channels BW and BS use TLS with X.509 certificates as required by the ecard API framework [4]. Thus, the attacker must be able to generate these kinds of certificates. The network channel CS between the client application and the eid server is secured by TLS with certain pre-shared key cipher suites, defined in RFC 4279 [9]. In the context of the eid Online Authentication, the channel CS must be established using TLS-RSA-PSK cipher suites [4]. The pre-shared key psk and the client identity cid that are required to establish the channel CS are transmitted in advance in the trigger object as part of the previous channel BS between the browser and the eid server. Thus, determining the credentials for CS either requires bruteforcing them or, in turn, requires the attacker to intercept channel BS. This will be covered in more detail in Section 4.2. At the time of this work, there was no free implementation of TLS-RSA-PSK cipher suites available. Hence, we have developed and provide a patch that implements TLS-RSA-PSK cipher suites in OpenSSL [1]. To our knowledge, this is the first implementation of these cipher suites in a free open source crypto library.
5 C. Dietrich et al.: eid Online Authentication Network Threat Model A-5 4 Attacks We break down attacks based on the threat model into two categories. 1. Attacks on the channels BW and BS 2. Attacks on the channel CS In the following, two kinds of attack phases of man-in-the-middle attacks are distinguished. The first phase is completed, if and only if the man-in-the-middle entity the TLS proxy has successfully performed the TLS handshake in both the incoming connection as well as the outgoing connection. At this point, messages of the upper layers can be relayed and modified at will. The second phase is regarded complete, if and only if all messages of the upper layers have successfully and transparently been relayed, effectively resulting in a successful eid Online Authentication. This includes the final step where the result of the eid Online Authentication is transmitted from the eid server to the web application server. Furthermore, we define the eid Online Authentication as broken, if and only if the second phase of the man-in-the-middle attack is complete. We decided to focus on man-in-the-middle attacks for a number of reasons. Cipher degradation attacks where the client s initial ClientHello message is modified by removing strong ciphers do not work against TLS and will result in a handshake error. Given our threat model, an attacker with no system-level access on the user s computer has no way to force certain cipher suites, e.g enull, to be used. Most, if not all, current TLS implementations strive to agree on the strongest available cipher suites on both client and server. Only a man-in-the-middle can thus influence the cipher suite agreement. Furthermore, we decided to perform man-inthe-middle attacks because we want to be able to read and modify the communication. Abbildung 2: Man-in-the-middle attack on BW
6 A DFN Workshop Sicherheit in vernetzten Systemen 4.1 Attacks on BW and BS According to the ecard API Framework [4], BW must be a TLS connection using an X.509- based certificate for server authentication, which is denoted as CertW in Figure 1. Intercepting BW starts with a man-in-the-middle attack where the attacker tries to impersonate the web application server and proxies all requests to the real web application server, as shown in Figure 2. Therefore, an X.509 certificate, CertWA, has to be generated by the attacker which will be used for server authentication of the TLS proxy. Ideally, in order to successfully perform the TLS handshake without user intervention, the browser should successfully verify the X.509 certificate CertWA, e.g. CertWA might have its certificate chain be rooted in one of the browser s trusted root CAs. Note that we do not aim at discussing the trustworthiness of TLS certificate chains. However, in order to support our approach, let us give two examples. Recent studies have shown that users tend to ignore browser warnings for invalid certificates [12] and additionally the certification processes of SSL may not be conducted with enough rigor [10]. In this scenario, the attacker is successfully positioned between the user s browser and the web application server and can proxy messages between both entities. The first phase of the man-in-the-middle attack is thus completed successfully. Messages of the layers above TLS are relayed through the attacker s TLS proxy and the attacker can modify these messages at will. However, as will be shown later, additional means prevent that personal data is actually transmitted over the intercepted channel. For now, we sum up: The channel BW is split in two sub-channels, BWA and BWB, as shown in Figure 2. Messages transmitted between the browser and the web application are proxied by the attacker and message contents of the TLS layer, i.e. TLS payload, is available in the attacker s TLS proxy. Phase one of the man-in-the-middle attack is completed successfully. Analogously, a man-in-the-middle attack on BS is performed in a similar manner. 4.2 Attacks on CS Intercepting the TLS-RSA-PSK channel CS between the ecard API client application and the eid server see Figure 3 is similar to the man-in-the-middle attack on BW described above. Additionally, the attacker needs the credentials used in the pre-shared key handshake. These credentials, a 256-bit pre-shared key psk and a 112-bit client identity cid, are generated by the eid server and transmitted to the user s system in channel BS. The trigger object BC (see Listing 1) provides the ecard API client application with these credentials. Given our threat model, the attacker does not have local system access on the user s system and is thus required to either brute-force the credentials or break the channel BS in order to intercept the credentials for CS. Given the fact that an eid server uses high-security modules and provides strong credentials we regard the brute-force approach as infeasible. Hence, given our threat model and its preconditions, in order to intercept channel CS the attacker is required to intercept BS, too. Once BS is broken and the credentials for CS are available to the attacker, CS can be intercepted.
7 C. Dietrich et al.: eid Online Authentication Network Threat Model A-7 So far, we have shown how man-in-the-middle attacks can be launched against BW, BS, and CS. In all cases, the TLS handshake is completed successfully, thus the first phase of the manin-the-middle attack succeeded. At this point, an attacker can relay and modify messages of the upper layers. For example, in case of exploitable software vulnerabilities, an attacker might be able to exploit the ecard API client implementation. Abbildung 3: Man-in-the-middle attack on CS 4.3 Second Phase Failure However, in theory, none of the above mentioned attacks complete the second phase. This is due to the intertwining of the Terminal Authentication and the TLS channels and it indeed theoretically prevents man-in-the-middle attacks to complete the second phase as described in the following. During an eid Online Authentication, a Terminal Certificate is transmitted as part of the Terminal Authentication [3]. The Terminal Certificate contains the two hash values of the X.509 certificates of the eid server and the web application server, H TC (CertW) and H TC (CertS). As soon as the Terminal Authentication is performed over the channel CS, the peer certificates CertW and CertS are checked against the hash values of the Terminal Certificates, i.e. H(CertW)? = H TC (CertW) and H(CertS)? = H TC (CertS) Due to the fact that the attacker creates its own peer certificate, CertWA or CertSA or both, with its own public keys, the hash values of the peer certificates of the TLS proxy do not match the ones in the Terminal Certificate, i.e. H(CertWA) H TC (CertW) and/or H(CertSA) H TC (CertS)
8 A DFN Workshop Sicherheit in vernetzten Systemen The eid Online Authentication aborts immediately, if any of the pairs of hashes do not match. Furthermore, the eid client implementation must make sure, that during and after a successful online authentication, any subsequent connection in the channel BW undergoes this check. This requirement is currently not stated in the specifications. In practice, the fact that only the very first connection in the channel BW undergoes this check (as of February 2011), enables us to man-in-the-middle any subsequent connection in the channel BW. We even achieved to break the connection of the channel BW where the response of the eid Online Authentication is sent to the web server. Furthermore, the attacker could modify the hash values of the certificates in the Terminal Certificate: H TC (CertW) := H(CertWA) and/or H TC (CertS) := H(CertSA) However, modifying the Terminal Certificate results in an immediate abort, as the validity of the Terminal Certificate signature is verified by the eid card with the public key of the signer stored in the eid card in secure memory. As a consequence, as soon as the Terminal Certificate is modified, the signature of the Terminal Certificate becomes invalid. As only a very limited number of authorities are trusted root signers of Terminal Certificates (CVCA), it is practically impossible to forge a TC signature. Hence, to sum up, in theory, it is not possible to perform a second phase man-in-the-middle attack. In addition, practical implementations must make sure that these integrity means are applied to all connections of the channel BW. Lack thereof will result in successful man-in-the-middle attacks on connections in BW. 5 Practical Implications and Recommendations Interestingly, the set of cipher suites that are allowed to be used for BS and CS is not restricted, thus the default set of cipher suites of TLS [6] applies. This default set of TLS cipher suites comprises enull a cipher suite with no encryption. As of February 2011, we found that the list of allowed and usable ciphers do contain weak cipher suites such as DES64, IDEA and RC2 or MD5. We suggest to restrict the set of allowed cipher suites for TLS channels in the context of the eid Online Authentication, e.g. to comply with [2], effectively preventing from non-encrypting cipher suites. Personal data after being transmitted as part of the secure messaging of the eid authentication is often displayed on a web page to the user. As an example, if a customer registers with an online shop to create a new account, some if not all of the personal data (name, address, etc.) are displayed on a web page for the user to confirm. While the personal data might have been read and transmitted from the eid card to the eid server using the Online Authentication, on the way back in order to be displayed to the user, this data is transmitted in the TLS channel BW with no additional encryption. In combination with a non-encrypting cipher suite or when successfully intercepting connections in the channel BW, this enables an attacker to read the transmitted data when it is reflected to the user on the web page. As a guideline, personal data acquired through eid Online Authentication should not be reflected to the user. Fortunately,
9 C. Dietrich et al.: eid Online Authentication Network Threat Model A-9 some online shops abbreviate the personal data reflected to the user, limiting exposure. However, a successful man in the middle can furthermore read session cookies, effectively allowing session hijacking. The eid client implementation exposes a certain attack surface even inside the TLS channel CS. Whereas in traditional TLS, where connection establishment is handled during the handshake, here the connection is established, verified and possibly torn down only after a couple of messages have been transferred. To be more precise, Terminal Authentication is performed over the established connection in the channel CS. At this point, a man-in-the-middle can attack the eid client implementation, e.g. by modifying the TLV-encoded Certificate object. With certain versions of the AusweisApp, removing the Digital Signature element from the TLV-encoded Certificate has lead to an application crash. This underlines the risk that once the TLS handshake is performed, the attacker can attack the applications on the upper layers, client- and server-side, though server-side attacks have not been analyzed here. 6 Related Work As the eid Online Authentication is actually in use since November 2010, so far, only few people have analyzed actual implementations. Probably the closest work to ours is that of Morgner and Oepen [11]. The authors outline and perform relay attacks which relay access to the eid card remotely over the network. Thus, the location of the eid card and the location of the eid card reader can be separated. However, relay attacks require system-level access on the user s computer. In contrast, our work does not require system-level access, instead it focusses on network-level attacks. On a theoretical level, Dietrich has analyzed a variety of attacks in [7]. However, none of these attacks target the SAML integration of Extended Access Control. Instead, Dietrich has dealt with man-in-the-middle attacks against Terminal and Chip Authentication. Eichholz et al. [8] provide an overview of how Extended Access Control can be mapped to Security Assertion Markup Language. Thus, their work is the basis for our work. Additionally, we outline a specific threat model and show at what stage of the communication in the eid Online Authentication, man-in-the-middle attacks fail. 7 Conclusion In this work, we presented a specific threat model focussed on the network communication in the context of the eid Online Authentication. Our work outlines man-in-the-middle attacks against the three TLS channels that are subject to the eid Online Authentication. The attacks are divided into two phases based on reasonable layers. Furthermore, we show step by step, why in theory the attacks finally fail due to the intertwining of the TLS peer certificates with the Terminal Certificate. However, certain risks remain, especially at the end of phase one where an attacker can easily provide malicious input to the eid client as well as the eid server. These implementations
10 A DFN Workshop Sicherheit in vernetzten Systemen must make sure, that input is correctly validated. In addition, integrity checks of all channels involved should be applied to all connections of the corresponding channels. The threat model presented in this work can be used to methodically check the communication channels of the eid Online Authentication. It can furthermore be used to develop extended guidelines for implementations, client- and server-sided, in the context of the eid Online Authentication. Acknowledgements We thankfully acknowledge support and interesting discussions with Felix C. Freiling, Marian Margraf and Jens Bender. We thank the anonymous reviewers for valuable comments.
11 C. Dietrich et al.: eid Online Authentication Network Threat Model A-11 Literaturverzeichnis [1] TLS-RSA-PSK Patch for OpenSSL 1.0.0c, OpenSSL license. internet-sicherheit.de/service/tools/patches/. [2] Technische Richtlinie Kryptoverfahren. BSI Technical Guideline BSI TR-02102, June [3] Advanced Security Mechanisms for Machine Readable Travel Documents - Extended Access Control (EAC), Password Authenticated Connection Establishment (PACE) and Restricted Identification (RI). BSI Technical Guideline BSI TR-03110, Sept [4] ecard-api-framework - Protocols. BSI Technical Guideline BSI TR , Sept [5] Technische Richtlinie eid-server. BSI Technical Guideline BSI TR-03130, Oct [6] T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Aug Updated by RFCs 5746, [7] C. J. Dietrich. Web-Authentisierung mit dem elektronischen Personalausweis (epa/npa). Master s thesis, [8] J. Eichholz, D. Hühnlein, and J. Schwenk. SAMLizing the European Citizen Card. In A. Brömme, C. Busch, and D. Hühnlein, editors, BIOSIG, volume 155 of LNI, pages GI, [9] P. Eronen and H. Tschofenig. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC 4279 (Proposed Standard), Dec [10] R. Holz, L. Braun, N. Kammenhuber, and G. Carle. The SSL Landscape A Thorough Analysis of the X.509 PKI Using Active and Passive Measurements. In Proceedings of the 11th ACM SIGCOMM conference on Internet measurement conference - IMC 11. ACM Press, [11] F. Morgner and D. Oepen. "Die gesamte Technik ist sicher - Besitz und Wissen: Relay- Angriffe auf den neuen Personalausweis, [12] J. Sunshine, S. Egelman, H. Almuhimedi, N. Atri, and L. F. Cranor. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX Security Symposium, pages , 2009.
TLS-RSA-PSK. Channel Binding using Transport Layer Security with Pre Shared Keys
TLS-RSA-PSK Channel Binding using Transport Layer Security with Pre Shared Keys Christian J. Dietrich dietrich [at] internet-sicherheit. de Institut für Internet-Sicherheit https://www.internet-sicherheit.de
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
EECE 412, TERM PROJECT, DECEMBER 2009 1. EECE 412 Term Project: A Study on SSL Warning Effectiveness
EECE 412, TERM PROJECT, DECEMBER 2009 1 EECE 412 Term Project: A Study on SSL Warning Effectiveness Ildar Muslukhov Andreas Sotirakopoulos Levi Stoddard [email protected] [email protected] [email protected]
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Technical Guideline eid-server. Part 2: Security Framework
Technical Guideline eid-server Part 2: Security Framework BSI TR-03130-2 Version 2.0.1 January 15, 2014 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail:
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Implementation Vulnerabilities in SSL/TLS
Implementation Vulnerabilities in SSL/TLS Marián Novotný [email protected] ESET, spol. s r.o. Bratislava, Slovak Republic Abstract SSL/TLS protocol has become a standard way for establishing a secure communication
Secure Sockets Layer (SSL) / Transport Layer Security (TLS)
Secure Sockets Layer (SSL) / Transport Layer Security (TLS) Brad Karp UCL Computer Science CS GZ03 / M030 19 th November 2014 What Problems Do SSL/TLS Solve? Two parties, client and server, not previously
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
SSL Server Rating Guide
SSL Server Rating Guide version 2009j (20 May 2015) Copyright 2009-2015 Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication.
Breaking the Myths of Extended Validation SSL Certificates
BlackHat Briefings, 2009 Breaking the Myths of Extended Validation SSL Certificates Alexander Sotirov phmsecurity.com Mike Zusman intrepidusgroup.com Introduction Chosen-prefix MD5 collisions allowed us
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
SSL implementieren aber sicher!
SSL implementieren aber sicher! Karlsruher Entwicklertag 2014 21.05.2014 Dr. Yun Ding SSL in the news 2011 2012 2013 2014 BEAST CRIME Lucky 13 Compromised CAs RC4 biases BREACH DRBG Backdoor Apple goto
Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol
SSL/TLS TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol HTTPS SSH SSH Protocol Architecture SSH Transport Protocol Overview SSH User Authentication Protocol SSH Connection Protocol
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
Securing End-to-End Internet communications using DANE protocol
Securing End-to-End Internet communications using DANE protocol Today, the Internet is used by nearly.5 billion people to communicate, provide/get information. When the communication involves sensitive
SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust
SSL Interception Proxies Jeff Jarmoc Sr. Security Researcher Dell SecureWorks and Transitive Trust About this talk History & brief overview of SSL/TLS Interception proxies How and Why Risks introduced
SSL and Browsers: The Pillars of Broken Security
SSL and Browsers: The Pillars of Broken Security Ivan Ristic Wolfgang Kandek Qualys, Inc. Session ID: TECH-403 Session Classification: Intermediate SSL, TLS, And PKI SSL (or TLS, if you prefer) is the
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Web Security. Mahalingam Ramkumar
Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting
Security Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
Analyzing DANE's Response to Known DNSsec Vulnerabilities
Analyzing DANE's Response to Known DNSsec Vulnerabilities Matthew Henry Joseph Kirik Emily Scheerer UMBC UMBC UMBC [email protected] [email protected] [email protected] May 9, 2014 Abstract: SSL/TLS is currently
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict 2010. All rights reserved
Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010 Fedict 2010. All rights reserved What is Entity Authentication? Entity authentication is the process whereby one party
Technical Guideline TR-03124-1 eid-client Part 1: Specifications
Technical Guideline TR-03124-1 eid-client Part 1: Specifications Version 1.2 24. February 2015 Federal Office for Information Security Post Box 20 03 63 D-53133 Bonn Phone: +49 22899 9582-0 E-Mail: [email protected]
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Implementing Identity Provider on Mobile Phone
Implementing Identity Provider on Mobile Phone Tsuyoshi Abe, Hiroki Itoh, and Kenji Takahashi NTT Information Sharing Platform Laboratories, NTT Corporation 3-9-11 Midoricho, Musashino-shi, Tokyo 180-8585,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt,
Secure Shell SSH provides support for secure remote login, secure file transfer, and secure TCP/IP and X11 forwarding. It can automatically encrypt, authenticate, and compress transmitted data. The main
A Study of What Really Breaks SSL HITB Amsterdam 2011
A Study of What Really Breaks SSL HITB Amsterdam 2011 v1.0 Ivan Ristic Michael Small 20 May 2011 Agenda 1. State of SSL 2. Quick intro to SSL Labs 3. SSL Configuration Surveys 4. Survey of Actual SSL Usage
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University
Network Security Web Security and SSL/TLS Angelos Keromytis Columbia University Web security issues Authentication (basic, digest) Cookies Access control via network address Multiple layers SHTTP SSL (TLS)
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Specific recommendations
Background OpenSSL is an open source project which provides a Secure Socket Layer (SSL) V2/V3 and Transport Layer Security (TLS) V1 implementation along with a general purpose cryptographic library. It
Extended SSL Certificates
Introduction Widespread usage of internet has led to the growth of awareness amongst users, who now associate green address bar with security. Though people are able to recognize the green bar, there is
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Angel Dichev RIG, SAP Labs
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine SSL
CS 361S - Network Security and Privacy Spring 2014. Homework #1
CS 361S - Network Security and Privacy Spring 2014 Homework #1 Due: 11am CST (in class), February 11, 2014 YOUR NAME: Collaboration policy No collaboration is permitted on this assignment. Any cheating
Communication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
TLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
Apache Security with SSL Using Ubuntu
Apache Security with SSL Using Ubuntu These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Some SSL background
Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)
Security Protocols (bmevihim132) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected] Outline - architecture
IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0
International Virtual Observatory Alliance IVOA Single-Sign-On Profile: Authentication Mechanisms Version 2.0 IVOA Proposed Recommendation 20151029 Working group http://www.ivoa.net/twiki/bin/view/ivoa/ivoagridandwebservices
Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173
Security & Privacy on the WWW Briefing for CS4173 Topic Outline 1. Information Security Relationship to safety Definition of important terms Where breaches can occur Web techniques Components of security
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Configuring Secure Socket Layer HTTP
Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Sockets Layer HTTP, page 1 Restrictions for Configuring the Switch for Secure Sockets Layer HTTP, page 2 Information
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner [email protected] IAIK
Motivation 2 Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] What you have heard last time Mobile devices: Short history, features Technical evolution, major OS,
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Internet Engineering Task Force (IETF) Request for Comments: 7568. Category: Standards Track ISSN: 2070-1721 A. Langley Google June 2015
Internet Engineering Task Force (IETF) Request for Comments: 7568 Updates: 5246 Category: Standards Track ISSN: 2070-1721 R. Barnes M. Thomson Mozilla A. Pironti INRIA A. Langley Google June 2015 Deprecating
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
