Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)



Similar documents
Security Protocols/Standards

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Network Security Part II: Standards

Chapter 7 Transport-Level Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

IP Security. Ola Flygt Växjö University, Sweden

Securing IP Networks with Implementation of IPv6

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Web Security Considerations

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Network Security Essentials Chapter 5

Security vulnerabilities in the Internet and possible solutions

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 32 Internet Security

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Lecture 17 - Network Security

IPSec and SSL Virtual Private Networks

Chapter 5: Network Layer Security

Virtual Private Networks

TLS/SSL in distributed systems. Eugen Babinciuc

Chapter 17. Transport-Level Security

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Introduction to Computer Security

Computer and Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Communication Security for Applications

Network Security. Lecture 3

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Communication Systems SSL

Why SSL is better than IPsec for Fully Transparent Mobile Network Access

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Internet Protocol Security IPSec

Introduction to Computer Security

Transport Level Security

Application Note: Onsight Device VPN Configuration V1.1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

The Secure Sockets Layer (SSL)

Transport Layer Security Protocols

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Secure Sockets Layer

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Chapter 10. Network Security

Site to Site Virtual Private Networks (VPNs):

CS 4803 Computer and Network Security

Protocol Security Where?

Branch Office VPN Tunnels and Mobile VPN

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Introduction to Security and PIX Firewall

Protocol Rollback and Network Security

Internetwork Security

, ) I Transport Layer Security

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Laboratory Exercises V: IP Security Protocol (IPSec)

Computer Networks. Secure Systems

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

How To Add Security To The Basic Protocols

How To Understand And Understand The Security Of A Key Infrastructure

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Computer security Lecture 9

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Implementing and Managing Security for Network Communications

CCNA Security 1.1 Instructional Resource

Lecture 9 - Network Security TDTS (ht1)

IP SECURITY (IPSEC) PROTOCOLS

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

IPsec Details 1 / 43. IPsec Details

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Lecture 4: Transport Layer Security (secure Socket Layer)

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

Cryptography and Network Security IPSEC

T Cryptography and Data Security

Chapter 9. IP Secure

VPN. VPN For BIPAC 741/743GE

Netzwerksicherheit: Anwendungen

Network Security Fundamentals

Using IPSec in Windows 2000 and XP, Part 2

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Case Study for Layer 3 Authentication and Encryption

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Transcription:

Security Protocols

Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic mechanisms TCP/IP Stack Application (HTTP,DNS) Transport (TCP/UDP) Internet (IP) Network (Ethernet) Security Protocols HTTPS/ DNSSEC TLS Transport (TCP/UDP) Internet (IPSEC) Network (802.1x) Unsecure Secure

Transport Layer Security (TLS)

TLS Previous Secure Sockets Layer (SSL) Originally designed to support secure HTTP (HTTPS) Runs over TCP Datagram TLS TLS equivalent for UDP Currently used to secure many other protocols Provides: Authentication/Integrity uses MACs Confidentiality encryption of messages

TLS/SSL Versions Older SSL 1.0-2.0 well known security vulnerabilities SSL 3.0 weak key generation Government Approved (based on NIST SP 800-52 rev 1) TLS 1.0 not significantly different than SSLv3 Only when dealing with business/public (not govt only comm.) Browser Exploit Against SSL/TLS (BEAST) vulnerability TLS 1.1 fixes some issues with CBC mode, other fixes TLS 1.2 specify SHA-2 (256,512 bit) hash functions

TLS Protocol Stack

Type: Application Data

Type: Handshake Stateful connection Handshake used to communicate/agree on various parameters TLS/SSL versions Ciphers Certificates Pre-master secret Master secret Session ID

TLS Handshake Proposes 1) version, 2) ciphers, 3) session ID, 4) random number Specifies: 1) version, 2) cipher, 3) random number Server certificate Public key parameters Client certificate (optional) Premaster secret Change cipher suite (encrypted in future) Change cipher suite (encrypted in future)

TLS Handshake Continued Premaster secret Random number created by client Encrypted with server s public key Master secret Generated from premaster secret Data used to compute the encryption keys/ivs

TLS Ciphers Cipher contains set of crypto algorithms necessary to perform following functions: Key exchange algorithm E.g. RSA, Diffie Hellman, ECDH Bulk encryption algorithm Stream(RC4, etc.), Block(3DES, DES, AES, etc.) Data Integrity/Auth. MAC algorithms, HMAC with (MD5, SHA1, SHA256)

IPsec

IPsec Commonly used to build secure VPNs Host to host, network to network, host to network Encryption and authentication at the network layer Functions Security Associations algorithms and parameters used in encryption Authentication Header (AH) Deprecated connectionless authentication and integrity Encapsulated Security Payload (ESP) Provides confidentiality, authentication, integrity

Benefits Provide confidentiality, integrity, authentication of all IP packets (routable traffic) Transparent to users Can move crypto processing often moved to network routers/devices rather than the system

IPsec ESP Format

Security Associations One way relationship between sender and receiver about security protocol parameters Algorithms and keys used to protect the communication Need two SAs for two way communication Includes Security Parameter Index (SPI) identifier for the SA IP destination address destination endpoint of the SA Crypto algorithms/keys SA establishment relies on ISAKMP protocol

Encapsulating Security Payload (ESP) Normal IP IP Hdr Data TCP/IP Stack Application Transport IPsec Network IP Hdr ESP Hdr Data ESP Trailer ESP Auth Transport payload of IP packet encrypted/authenticated Common for communication between hosts TCP/IP Stack Application Transport Internet IPsec Network New IP Hdr ESP Hdr IP Hdr Data ESP Trailer Tunnel entire IP packet encrypted and/or authenticated Common for communication between networks ESP Auth

ESP Modes - Examples External Hosts External Hosts Unsecure Connection IPsec (Tunnel) IPsec (Transport) Trusted Network A Trusted Network B

TLS vs IPsec Connection Establishment IPSec pre-established Security Associations to agree on ciphers, etc. Additional overhead TLS utilizes handshake to negotiate between client/server Vulnerable to MitM downgrade attacks Trust Establishment IPSec pre-established during SA TLS based on trusted certificate authority pre-shared certificates