Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security



Similar documents
Cornerstones of Security

Overview. SSL Cryptography Overview CHAPTER 1

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Chapter 17. Transport-Level Security

Chapter 10. Network Security

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Using etoken for SSL Web Authentication. SSL V3.0 Overview

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Chapter 8. Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Security: Focus of Control. Authentication

ISM/ISC Middleware Module

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Chapter 7 Transport-Level Security

Windows 2000 Security Architecture. Peter Brundrett Program Manager Windows 2000 Security Microsoft Corporation

Transport Layer Security Protocols

Security Technology: Firewalls and VPNs

Sync Security and Privacy Brief

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Savitribai Phule Pune University

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Content Teaching Academy at James Madison University

Transport Level Security

Security IIS Service Lesson 6

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Network Security Essentials Chapter 5

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

VPN. Date: 4/15/2004 By: Heena Patel

Chapter 37. Secure Networks

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Compter Networks Chapter 9: Network Security

Configuring Security Features of Session Recording

Chapter 4 Virtual Private Networking

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

FileCloud Security FAQ

Proxy Server, Network Address Translator, Firewall. Proxy Server

RemotelyAnywhere Getting Started Guide

Computer System Management: Hosting Servers, Miscellaneous

7.1. Remote Access Connection

Module 7 Security CS655! 7-1!

Authentication Application

Security Policy Revision Date: 23 April 2009

Client Server Registration Protocol

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Security vulnerabilities in the Internet and possible solutions

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Chapter 32 Internet Security

Case Study for Layer 3 Authentication and Encryption

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

CRYPTOGRAPHY IN NETWORK SECURITY

Lukasz Pater CMMS Administrator and Developer

Information Security

Fig : Packet Filtering

How To Understand And Understand The Security Of A Key Infrastructure

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Proxy firewalls.

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

As enterprises conduct more and more

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Security Digital Certificate Manager

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Computer Security: Principles and Practice

SiteCelerate white paper

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Firewalls, Tunnels, and Network Intrusion Detection

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

z/os Firewall Technology Overview

Network Security Protocols

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Vidder PrecisionAccess

Xerox DocuShare Security Features. Security White Paper

TLS and SRTP for Skype Connect. Technical Datasheet

Network Security and Firewall 1

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Transcription:

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security Ch 7 - Security 1

Confidentiality and privacy: Protect business and personal information from unauthorized disclosure. Integrity: Protect information from unauthorized modification. Availability: Protect information and processing services from disruption and destruction. Accountability and non-repudiation: Ensure that individuals can be held responsible for their actions. Ch 7 - Security 2

http://msdn.microsoft.com/library/backgrnd/html/msdn_mssecure.htm Applications NT Security Features Enabling Technologies Basic Principles Ch 7 - Security 3

Authentication Access control Cryptography Firewall System Integrity Auditing Ch 7 - Security 4

CryptoAPI P-Store, Wallet, PFX Smart Cards Security Support Provider, Secure RPC, DCOM Certificate Server Authenticode, Java Security Ch 7 - Security 5

IIS Proxy Server SQL Server IE Exchange, Outlook SNA Server Ch 7 - Security 6

User Authentication Access Control Refs: http://www.microsoft.com/ntserver/security/tec hdetails/prodarch/cooperslybrand.asp Ch 7 - Security 7

A domain is a logical group of computers that share a set of common user accounts The Domain Controller, a NT server, keeps the domain user account database, which is visible to all computers. Each local computer has its own isolated user account database. Local user accounts are not necessarily domain user accounts and vice versa. Ch 7 - Security 8

Local Logon: how - check the local user account database. only the hashed password is stored. Remote logon: types - Remote Access Service (RAS): Dial-up Virtual Private Network (VPN): Internet-based logon from local computer as a domain user Ch 7 - Security 9

1. The domain controller is requested to set up a secure RPC session. 2. The controller issues a 16-byte one-time randomly generated number as the challenge. 3. The local computer produces a response by encrypting the hashed password and challenge together and sends it back a response. 4. The controller uses the challenge and the hashed password from the domain user account database to produce its own response. 5. The logon is granted if the two responses match. Ch 7 - Security 10

Each user ID is associated with an security ID (SID). Each user may belong to one or more user s groups, and is given group SID. For simplicity, group SID are ignored from here on. An access token is created upon a user logon, which is attached to any process (or thread) the user invoked. An access token is mainly comprised of two parts: the SID User Rights: privileges of the process associated with the token; mostly related to the computer, e.g. shut down the computer Ch 7 - Security 11

Similar to Daemon in UNIX It runs forever unless otherwise halted. Users may log on to an NT service without logon to the NT system. Examples: SQL Server, MS Exchange, IIS and other operating system functions such as WINS (Windows Internet Name Service). User may supply his/her own application as a service. Ch 7 - Security 12

An NT service may use the access token of the client to acquire resources. An NT service may not logon to another NT machine on the behalf of the client, because NetLogon does not authenticate with any access token. Ch 7 - Security 13

Each NT object is associated with an ACL which has two components: Discretionary ACL: specifies the access permissions for each user. System ACL: for security logging and auditing NTFS ACL permissions for each directory and file object: Read, Write, Execute, Delete, Change Permissions, Take Ownership Ch 7 - Security 14

An ACE determines whether an entity X is allowed or not allowed to do activity Y (DACL) an attempt by entity X to do activity Y is or is not to be logged in the security event logs (SACL) Components in an ACE: SID (for entity X) Type (for action) Access permissions (for entity Y) Ch 7 - Security 15

Ch 7 - Security 16

If DACL is empty, then no one is allowed access to the object If DACL is deleted, then everyone is allowed access to the object In traversing a DACL, the system stops looking as soon as access is explicitly granted or denied. For safety, denial ACEs should appear in the ACL. Ch 7 - Security 17

Three major concerns: Privacy tool: Encryption/Decryption Authentication tool: digital certificate Integrity tool: digital signature (digital timestamp) Ref: http://www.rsasecurity.com/rsalabs/faq/sections.ht ml Ch 7 - Security 18

Cipher is the procedure of encrypting a message. Cipher usually has one or more parameters, that are considered keys, i.e. the values may be generated randomly. Cipher is not usually not the object to protect; keys are. Ch 7 - Security 19

Ch 7 - Security 20

Symmetric: encryption key = decryption key key is private Asymmetric: encryption key not equal to decryption key one public key and one secret key Ch 7 - Security 21

Stream Cipher Block Cipher Input:a fixed-length block of plaintext Parameter: the encryption key Output: a block of encrypted text of the same length Deciphers work in a reverse way, with the same key. Ch 7 - Security 22

If a party intends to communicate with 5 other parties, it needs 5 different keys. Transmitting a private key over an insecure communication channel is problematic. Ch 7 - Security 23

Lengths: 128/40 bits (North America/Export) Strength: DES 56-bit key (the Data Encryption Standard) is too small for safety. US Govt. recommends 40/512 for adequate and strategic strengths RSA, the most well-known vendor, recommends 80/768 Safe transport of key Well known secret: password Public-key cryptography Ch 7 - Security 24

E and D are the cipher and decipher respectively, and M is the message. D(E(M)) = M Both E and D are easy to compute. D is a one-way function, if by revealing E in public, there is no easy way for others to compute D. Ch 7 - Security 25

E is a cipher with n as the parameter, where n is the product of two larger prime numbers p, and q. D is a decipher with p and q as the parameters. Both D and E are well-known, albeit patented algorithms. n is the public key The p and q together is the private key The one-way function here is the multiplication of p and q. Ch 7 - Security 26

A product of 2 large prime numbers is 129- digit long (about 435-bits) In early 90 s, it took eight months using 1,600 computers to derive the two prime factors of this product. Ch 7 - Security 27

A (Alice) gets B s (Bob) public key from the directory, with which to encrypt the message. The cipher-text is transmitted over an insecure channel to Bob. Bob receives the message, and use his own secret private key to decrypt the cipher-text. Ch 7 - Security 28

Public key cryptography offers increased security and convenience Symmetric algorithms are much faster. In practice, public key cryptography is used to pass the private key needed to run symmetric algorithms. Ch 7 - Security 29

Ch 7 - Security 30

the output has a fixed length, H(x) is relatively easy to compute for any given x, H(x) is one-way, H(x) is collision-free. Ch 7 - Security 31

Bob computes the message digest MG, of the message M using a cryptographic hash function H, i.e. MG=H(M). Bob encrypts MG with his private key D B, and sends D B (MG) to Alice, together with the un-ciphered M. Alice uses Bob s public key E B to decipher D B (MG) obtain MG. Alice applies the same H to M, to obtained MG. If MG is equal to MG, Alice now has proof the Bob signs the message. Ch 7 - Security 32

SHA = A well-known cryptographic hash Ch 7 - Security 33

Hashing is not strictly necessary, but it will save time in the encryption. It may be extremely difficult to crack a one-way hash function, but it is (slightly) easier to produce a different message that is hashed to the same result. Birthday Attack : for a group of 23 or more people the probability that two or more people share the same birthday > 50%. If a message M may be found such H(M )=H(M), Bob may be perceived to have signed the message M as well. Ch 7 - Security 34

Bob computes his signature S for the message M using his private key D B, i.e. S=D B (M) Bob encrypts the signature with Alice s public key, E A, and sends E A (S) to Alice, together with the unciphered M. Alice uses her own private key D A to decrypt the ciphertext, and then use Bob s public key E B to obtain M. If M is not equal to M, some one must have tempered the message, and/or Bob did not sign it. If M is equal to M, Alice now has the proof the Bob sends the message to Alice. Ch 7 - Security 35

Certificate Authorities are created to certify the authenticity of a public key. A certificate contains at least the following: the public key the name of the owner the issuing CA digital signature CA keeps a list of revoked certificates which are declared invalid before they expire. Ch 7 - Security 36

To be effective, the user must have a high level of trust in the CA which issues. CA may rely on its own certification by other CA s to establish a level of trust, hence a hierarchy of trust. An organization may become a CA for issuing certificates to its employees. Ch 7 - Security 37

Ch 7 - Security 38

1. Key generation: the individual generates key pairs of public and private keys. 2. Matching of policy information: the applicant packages up the additional information necessary for the CA to issue the certificate 3. Sending of public keys and information: the applicant sends the public keys and information to the CA. Ch 7 - Security 39

4. Verification of information: the CA applies whatever policy rules it might require to verify that the applicant should receive a certificate. 5. Certificate creation: the CA creates a digital document with the appropriate information (public keys, expiration date, other data) and signs it using the CA's private key. 6. Sending/posting of certificate: The CA may send the certificate to the applicant, or post it publicly as appropriate. Ch 7 - Security 40

Man-in-the-middle attack: garbled message Integrity of messages in plaintext (e.g. stock price) Need to authenticate the message, but not the sender or receiver: Digital coupon, digital ticket, Ch 7 - Security 41

Use cryptographic hash function to produce a message digest Encrypt the digest with a secret key to produce the MAC. The message may be optionally encrypted. The MAC can be decrypted only by the same secret key. Ch 7 - Security 42

SSL is the most popular protocol for secure communication over insecure channel. SSL is a layered protocol. SSL is application protocol independent. A higher level protocol can layer on top of the SSL Protocol transparently. SSL imposes a performance penalty. Ch 7 - Security 43

The connection is private: Encryption is used after an initial handshake to define a secret key. Symmetric cryptography is used for data encryption The peer's identity are authenticated: Digital certificates are examined. The connection is reliable. Message transport includes a message integrity check using a keyed MAC. Cryptographic hash functions are used. Ch 7 - Security 44

SSL Record Protocol is used for encapsulation of various higher level protocols, the Handshake Protocol. manages the CipherSpec, the state of SSL protocol SSL Handshake Protocol: It allows the server and client to authenticate each other to negotiate an encryption algorithm to negotiate cryptographic keys before the application protocol transmits or receives its first byte of data. Ch 7 - Security 45

Ch 7 - Security 46

Web server needs 3 to 4 threads to process the protocol set-up. During the message transmission, it takes on average tens of instructions to process each byte of the message. The window size for SSL is only 16K. SSL runs only in user mode. Ch 7 - Security 47

A firewall is a system that enforces an access control policy between two networks. It blocks or permits traffic one network to another. Firewall acts a single choke point where security and audit can be imposed. Ch 7 - Security 48

Firewall is a generic name for hardware, software, or its combination that used to protect internal network from intruders. Two types of firewalls: Network level Application level application-level proxy service circuit-level gateway proxy (SOCKS) Ref: http://www.microsoft.com/technet/security/ch11ce.asp Ch 7 - Security 49

A router is a hardware that can perform simple packet filtering at the network level. It implements rules that blocks or permit IP packets, based on a number of factors: destination address source address port number service types (e.g. DNS queries, SMPT mail) Ch 7 - Security 50

Bastion host architecture Filtering host architecture Filtering subset architecture Ch 7 - Security 51

Ch 7 - Security 52

Bastion host is usually a proxy server on NT platform. A bastion may have two network interface cards (with different IP addresses), which allows to be a dual-homed host, i.e. running on two networks. The proxy server will relay the authorized traffic between the two interfaces and block traffic that is denied. The host is able to provide extensive logging of transactions for auditing purposes. Ch 7 - Security 53

Ch 7 - Security 54

SSL provides a secure end-to-end session between the client and original server. The proxy server will become a tunnel, or a byteforwarder in both directions. It cannot, and need not act as the application level proxy. Benefits: URL is hidden from the proxy server Minimize the chance of man-in-the-middle attack. Downside: no protection for other security risks. Ch 7 - Security 55

The proxy server is sent a HTTP request with a CONNECT method on a HTTP header. The proxy server will response either positively, or negatively. The tunneling ceases to work when one side drops the connection. Ch 7 - Security 56

Ch 7 - Security 57

The router can be configured to make the proxy server as the only host that accesses the router. All internal hosts will be forced to use the proxy server to reach external hosts. This architecture is more secure than the bastion host one because it provides two layers of protection. Ch 7 - Security 58

Ch 7 - Security 59

The internal network is considered as a subnet. The perimeter network is considered as a filtering subnet. There is no internal information on the filtering subnet. Benefits: Provides specific security requirements to a subset of an organization (CSIL) Provides three layers of protection. Ch 7 - Security 60

CryptoAPI is an API that provides core cryptographic functionality to application developers. Features: cryptographic hashing, encrypting and decrypting data, private and public key cryptography authentication using digital certificates, managing certificates in certificate stores. Ch 7 - Security 61

A CSP contains implementations of cryptographic standards and algorithms. Microsoft works with vendors such as RSA Data Security Inc. to develop programs that implements the features of CryptoAPI. Ch 7 - Security 62

Ch 7 - Security 63

Secure Support Provider Interface MS Certificate Server MS Authenticode Ch 7 - Security 64

SSPI makes common network authentication schemes available to application developers via simplified software libraries. A SSP is a library that manages a particular scheme. User of SSPI may call its SSP directly or use the secure options in DCOM or RPC. Ch 7 - Security 65

Kerberos NTLM (NT Lan Manager) SSL DPA (password-based) Ch 7 - Security 66

Certificate Server is a toolkit for building a Certificate Authority (CA) for large networks. It enables an organization to issue, renew, and revoke certificates without having to rely on external certificate. Each site building a CA with Certificate Server may supply its own approval module to verify the certificate applicant, or use a market standard modules (like software publishing). Ch 7 - Security 67

It uses simple cryptographic integrity features to help ensure the authenticity of a software module. Digital signature is generated by the Authenticode software which is attached to the code. This technology may be used to sign script, COM objects, and programs in C++ or VB. Ch 7 - Security 68

Grant or deny access for both inbound and outbound connections by: user service / port IP domain Each port can be enabled or disabled for communications by a specific list of users or user groups. Ch 7 - Security 69

Local Address Table: A system table containing the IP internal IPs. Use by Proxy Server to prevent IP spoofing. Packet alert: issue alerts for specific events, such as for dropped packets or packets sent to an unused service port. IP address aggregation: requests to external hosts will use proxy s external IP. SSL Tunnelling Ch 7 - Security 70

Anonymous User: an NT user account IUSR_xxxx, where xxxx is the server name, will be assigned to the user. NT User: Basic authentication Challenge/Response Ch 7 - Security 71

The access permission to objects in the Web application is determined by the user s access token. The request by anonymous user to access the requested object will be denied if its ACL does not permit access by IUSER. HTTP will response with a failure return-code (HTTP Error 401), with an authenticate header: WWW-Authenticate: Basic WWW-Authenticate: NTLM The browser will choose one of the two methods. Ch 7 - Security 72

Procedure: The browser will gather the user account and password from the user. The information will be sent to the server in BASE64 code. Given a choice, Netscape browser will pick this method over NTLM, because it does not do NTLM IE will by default use NTLM. Ch 7 - Security 73

IIS will impersonate the user when accessing resources in the server. When IIS attempts to logon to a remote database server: In case of the basic authentication, IIS will be able to do because it has the user id and password. In case of NTLM, IIS can t because domain controller, instead of IIS, did the authentication. Ch 7 - Security 74

<%If request.servervariables("remote_addr") = "200.200.157.4" then Response.Buffer = TRUE Response.Status = ("401 Unauthorized") Response.End End If%> Ch 7 - Security 75

<% Response.Clear Response.Buffer = True Response.Status = 401 Unauthorized Response.AddHeader WWW-Authenticate, NTLM Response.End %> Ch 7 - Security 76

User may set different levels of security for the following classes of sites: Internet Local Intranet Trusted sites Restricted sites Major differences: Prompt/No-prompt signature of ActiveX Control required/not required. Cookies allowed/not allowed Ch 7 - Security 77