Web Security. Mahalingam Ramkumar

Similar documents
Transport Layer Security Protocols

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Network Security Essentials Chapter 5

Communication Security for Applications

Chapter 7 Transport-Level Security

Transport Level Security

Communication Systems SSL

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Security Protocols/Standards

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

The Secure Sockets Layer (SSL)

CSC Network Security

CSC 474 Information Systems Security

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Web Security Considerations

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)


SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

T Cryptography and Data Security

, ) I Transport Layer Security

Secure Socket Layer. Security Threat Classifications

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

SECURE SOCKETS LAYER (SSL)

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Network Security Part II: Standards

Chapter 17. Transport-Level Security

Lecture 7: Transport Level Security SSL/TLS. Course Admin

Secure Socket Layer. Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

, SNMP, Securing the Web: SSL

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Key Management (Distribution and Certification) (1)

Cryptography and Network Security IPSEC

Chapter 8. Network Security

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Secure Sockets Layer

SSL Secure Socket Layer

Lab 7. Answer. Figure 1

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

[SMO-SFO-ICO-PE-046-GU-

SSL A discussion of the Secure Socket Layer

Authenticity of Public Keys

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Three attacks in SSL protocol and their solutions

T Cryptography and Data Security

Overview SSL/TLS HTTPS SSH. TLS Protocol Architecture TLS Handshake Protocol TLS Record Protocol. SSH Protocol Architecture SSH Transport Protocol

Electronic Payments Part 1

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Protocol Rollback and Network Security

Lecture 10: Communications Security

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

SSL Handshake Analysis

mod_ssl Cryptographic Techniques

SSL/TLS: The Ugly Truth

Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.

Security: Focus of Control. Authentication

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

SSL Secure Socket Layer

SSL Protect your users, start with yourself

Overview. SSL Cryptography Overview CHAPTER 1

What is network security?

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

Web Application Entity Session Management using the eid Card Frank Cornelis 03/03/2010. Fedict All rights reserved

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

ISM/ISC Middleware Module

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

EEC-682/782 Computer Networks I

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

DNS security: poisoning, attacks and mitigation

ISA 562 Information System Security

Vulnerabilità dei protocolli SSL/TLS

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

Certificates and network security

Transcription:

Web Security Mahalingam Ramkumar

Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting server side security flaws Server-side scripting languages PHP, Java, ASP, ASP.net, CGI-bin

Cookies HTTP is a state-less protocols How do we move from transport layer to sessions? Cookies Designed by Netscape Cookie fields Domain Name Path Content Expiry Secure

Cookies Content field a series of name=value Secure field cookie will be returned only if the server is secure (uses SSL) Expiry Persistent and Non-persistent cookies

Cookies Cookies are created by web servers Stored in client machine (usually in some directory under the home directory) When a client (browser) connects to a server it checks for cookies for the server domain If a cookie is found, it sends the cookie to the server along with the connection request

Applications Banking Gaming sites Shopping carts News sites (setting user preferences) Web portals Just about every thing... Is it possible to do all this without cookies?

Cookie Abuse Tracking user habits Advertising agencies buy ad-space for big corporations on pages in major websites. Let us say an agency buys ads in N pages. In each page they add a link to some image for the banner ad Page 1 will have link adagency.com/image1.gif Page N has link adagency.com/imagen.gif (Every page has a unique link)

Profiling User Habits User starts with a clean slate User visits page i Sends http request to adagency.com for image_i.gif Adagency server sends back a cookie with a random but unique number This will serve to distinguish the users Now user has a cookie identifying him! Every time the user goes to one of the N sites the cookie is sent to adagency.com!

Tracking User Habits Adagency.com gets paid for placing ads On top of that they sell collected user information! Cookies can be blocked Many websites wont work though Fine grained control of cookies Started with Mozilla

Spreading Misinformation Modify corporate websites Emulex Corporation Lost 2 billion dollars due to a fake email message sent to a news agency Perpetrator made a million dollars! Imitating web sites DNS Spoofing

DNS Spoofing Alice types in Bob's domain name Oscar wants to direct Alice to his page Oscar sends a DNS request for Bob's domain And also immediately sends a spoofed response DNS serve now has Oscar's IP (or the IP that Oscar used in the spoofed response) Alice receives the fake IP from the DNS server Don't really need to crack DNS servers!

DNS Spoofing Okay, not as simple... Oscar needs to fake a DNS servers IP Not very difficult DNS requests carry a sequence number Need to guess the sequence number not so easy Oscar could register his own DNS server! dns.oscar.com Alice's ISP should be made aware of oscar's dns server Oscar sends a DNS request to Alice's ISP asking for the address of some machine in oscar domain Say os1.oscar.com

DNS Spoofing Oscar has Alice's ISP's sequence number now He can send many DNS queries and then answer them too! Sequentially incrementing sequence number each time Only till some one else sends a query to Alice's ISP. Problem could be avoided by using a random number for each query instead of a sequence number difficult to keep track though

Secure DNS DNSsec (RFC 2535) Every DNS zone is has a public / private key pair. Not possible to spoof authoritative responses Not all DNS servers use DNSsec DNSsec services Proof of origin Public key distribution Transaction and request authntication

DNSsec DNS records are grouped in resource record sets (Rrsets) Each RRset has Multiple A records (for each IP the domain name translates to) Each record is signed Additional records KEY record contains public key of the domain SIG record signed hash

DNSsec Signing of Rrsets done offline nd inserted into DNS servers. No public key certificates! How do clients authenticate public keys? Could query a trusted server for verifying the public key Client will be armed with public keys of toplevel domains Top-level domains will authenticate public keys of lower level domains

SSL Secure Socket Layer Purpose Reliable end-to-end secure service Provides a secure TCP socket Usually used with Web browsers Can be used for other applications too Introduced by Netscape in 1995 Provided options for 40 and 128 bit keys 40 bits for export Submitted to IETF standards Result TLS (RFC 2246)

SSL in the Protocol Stack Application HP CSP AP HTTP Security (SSL) Transport (TCP) Network (IP) Data Link Physical Layer SSL Record Protocol Transport (TCP) HP Handshake Protocol CSP Change Cipher Spec AP Alert Protocol

Broad Overview Perform Handshake Exchange of nonces, preferences Exchange of certificates, certificate chains Establishment of shared key Finish handshake Change Cipher Spec To change ciphers on the fly Alert protocol for alerts Unexpected message, bad record, decompression failure... HTTP All performed over SSL Record Layer

Handshake Phase 1 Security Capabilities Session ID, Cipher Suite Nonces Phase 2 Server sends certificates, certificate chains, certificate request Client Hello Server Hello Certificate Server Key Exchange Certificate Request Server Hello done Phase 3 Client sends certificates, (optional) Phase 4 Change Cipher Suite Finish handshake protocol Certificate Client key exchange Certificate Verify Change Cipher Spec Finished CSP Finished

SSL Record Protocol Data Fragment Compress Add MAC Encrypt Add SSL Header

Phase 1 Version Random Nonces Session ID Cipher Suite Crypto algorithms supported in decreasing order of preference For key exchange RSA, Fixed Diffie Helman, Ephemeral DH, Anonymous DH, Fortezza For Cipher Spec Algorithms 3DES, RC4, RC2, DES, DES40, IDEA, Fortezza MAC MD5, SHA1 IsExportable True or False Compression Method

Phase 2,3,4 Server Authentication and Key Exchange Certificate, Certificate Chains Server Key exchange message Certificate request Server done Phase 3 Client Authentication and Key Exchange 384 bit (48 byte) pre-master key If login is used, it is outside the scope of the protocol Can be used safely with HTTP over SSL

SET Secure Electronic Transaction For Credit card purchases over the Internet Confidentiality Integrity of data Authentication of card holder Authentication of Merchant Can be used over HTTP, SSL/TLS, IPSec

Electronic Commerce Components Card holder Internet Merchant Issuer Acquirer

Electronic Commerce Components Card holder Internet Merchant Issuer Acquirer Payment Gateway

Electronic Commerce Components Card holder Internet Merchant CA Issuer Payment Network Acquirer Payment Gateway

Participants Cardholder Merchant Issuer Acquirer Payment Gateway Certification Authority

SET Process Customer opens an account Gets a certificate Merchants get certificates Opens an account with an acquirer (bank) Establishes a relationship with a payment gateway Customer verifies merchant Customer places order Merchant verifies customer Merchant checks validity of card with payment gateway Payment gateway interacts with Acquirer Acquirer transfers funds from Issuer to Merchants account

Dual Signature (DS) Customers order has two parts Order Information Payment Information Merchant does not need to know credit card number (payment information) Acquirer bank does not need to know order information (order information)

Dual Signature Payment Info H PIMD H POMD Order Info H OIMD H Message Digest (SHA-1) E RSA Encryption KRc Customers Private Key POMD Payment and Order Info MD KRc E DS

Purchase Request PI DS E EPI Passed to Payment Gateway OIMD Ks Digital Envelope PIMD H POMD KUb E CHC Cardholder Certificate OI DS CHC H OIMD D KUc Compare POMD

SET Transactions Purchase request Acknowledged with purchase response by the merchant Payment Authorization EPI (Encrypted PI + DS + OIMD) Digital Envelope (sent by customer) Merchant authorization Info Transaction ID signed by merchant, encrypted with one-time key One time key in an envelope encrypted with gateways public key CHC and Merchants certificate Gateway responds with Authorization Response At this point, merchant can commit to selling goods Payment Capture Capture request Initiated by merchant. Gateway performs necessary action for transfer of funds. Capture response