Introduction to Internet Security



Similar documents
IY2760/CS3760: Part 6. IY2760: Part 6

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security. Network Security Hierarchy. CISCO Security Curriculum

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Chap. 1: Introduction

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Security vulnerabilities in the Internet and possible solutions

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Cryptography and Network Security

Securing IP Networks with Implementation of IPv6

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

COSC 472 Network Security

Information System Security

Chapter 17. Transport-Level Security

Network Security. Lecture 3

Chapter 10. Network Security

Content Teaching Academy at James Madison University

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Cryptography and Network Security Chapter 1

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Information Security Basic Concepts

IP Security. Ola Flygt Växjö University, Sweden

Web Security Considerations

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Network Security Part II: Standards

Notes on Network Security - Introduction

Firewalls, Tunnels, and Network Intrusion Detection

Network Access Security. Lesson 10

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security Fundamentals

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Chapter 7 Transport-Level Security

Introduction to Computer Security

Table: Security Services (X.800)

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 32 Internet Security

Introduction to Computer Security

Virtual Private Networks

TLS/SSL in distributed systems. Eugen Babinciuc

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

How To Understand And Understand The Security Of A Key Infrastructure

Overview. SSL Cryptography Overview CHAPTER 1

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Protocol Rollback and Network Security

CCNA Security 1.1 Instructional Resource

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Laboratory Exercises V: IP Security Protocol (IPSec)

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Chapter 5: Network Layer Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Case Study for Layer 3 Authentication and Encryption

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Site to Site Virtual Private Networks (VPNs):

Security Goals Services

CSCI 454/554 Computer and Network Security. Final Exam Review

CS 4803 Computer and Network Security

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Cornerstones of Security

Introduction to Security

IP SECURITY (IPSEC) PROTOCOLS

Lecture 17 - Network Security

544 Computer and Network Security

INTERNATIONAL TELECOMMUNICATION UNION DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS

INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52) #452%!.$!00,)#!4)/.

Network Security Essentials Chapter 5

Chapter 4: Security of the architecture, and lower layer security (network security) 1

CS5008: Internet Computing

Chapter 9. IP Secure

CSCI 4541/6541: NETWORK SECURITY

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Securing an IP SAN. Application Brief

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Introduction to Security and PIX Firewall

TLS and SRTP for Skype Connect. Technical Datasheet

Reference Guide for Security in Networks

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

NETWORK SECURITY (W/LAB) Course Syllabus

Transcription:

Module II. Internet Security Chapter 4 Introduction to Internet Security Web Security: Theory & Applications School of Software, Sun Yat-sen University

Outline 4.1 Network Security Architectures Levels of Network Security Architectures OSI/ISO 7498-2 Model ISO Security Mechanisms TCP/IP Security 4.2 IPSec Introduction Some Basic Concepts About IPSec ESP protocol Gateway and Road Warrior mode Key management of IPSec Web Security : Theory And Applications 2 / 78

Outline 4.3 SSL/TLS Introduction How TLS Works Decryption of TLS Packet 4.4 VPN Introduction to IPsec VPN OpenVPN Web Security : Theory And Applications 3 / 78

Outline 4.1 Network Security Architectures 5 Levels of Network Security Architectures OSI/ISO 7498-2 Model ISO Security Mechanisms TCP/IP Security 4.2 IPSec 4.3 SSL/TLS 4.4 VPN Web Security : Theory And Applications 4 / 78

4.1 Network Security Architectures 4.1.1 Five Layers of Network Security Architectures Physical Security Physical Security describes measures that are designed to deny access to unauthorized personnel (including attackers or even accidental intruders) from physically accessing a building, facility, resource, or stored information; and guidance on how to design structures to resist potentially hostile acts. System Security Network Sycurity Applications Security Management Security Web Security : Theory And Applications 5 / 78

4.1 Network Security Architectures 4.1.2 OSI/ISO 7498-2 Model PDR, P2DR and PDRR Security Model PDR: Protection, Detection & Reaction P2DR: Policy, Protection, Detection & Reaction PDRR: Policy, Protection, Detection, Reaction & Restore ISO 7498-2-1989 Web Security : Theory And Applications 6 / 78

4.1 Network Security Architectures ISO 7498-2 Architectures 鉴 别 服 务 -- 访 问 控 制 -- 数 据 完 整 性 -- 数 据 保 密 性 -- 抗 抵 赖 性 -- 安 全 服 务 -- 应 用 层 -- 表 示 层 -- 会 话 层 -- 传 输 层 -- 网 络 层 --DL 层 -- 物 理 层 -- -- -- -- -- -- -- 加 数 访 鉴 业 路 公 Web Security : Theory And Applications 7 / 78 OSI 参 考 模 型 密 字 签 名 问 控 制 别 交 换 务 流 填 充 由 控 制 证 安 全 机 制 一 种 安 全 机 制 可 以 提 供 一 种 或 多 种 安 全 服 务 在 7 层 参 考 模 型 中, 第 2 和 5 层 不 适 宜 配 置 安 全 服 务

4.1 Network Security Architectures ISO 7498-2 is intended to serve as a security-specific addition to ISO 7498, the OSI reference model. In doing so it defines many security-related terms and ideas which are of importance to a variety of application areas, including many not covered by the OSI model. Of particular importance is the terminology it introduces for the description of security services and mechanisms. provides standard definitions of security terminology, provides standard descriptions for security services and mechanisms, defines where in OSI reference model security services may be provided, introduces security management concepts. Web Security : Theory And Applications 8 / 78

4.1 Network Security Architectures The underlying model, implicit to the discussion in ISO 7498-2, is that there is a generic security life-cycle, containing the following steps: definition of a security policy, containing a rather abstract series of security requirements for the system, a security requirements analysis, including a risk analysis, possibly using a tool such as CRAMM, and an analysis of governmental, legal and standards requirements, definition of the security services necessary to meet the identified security requirements, system design and implementation, including selection of security mechanisms to provide the chosen security services On-going security management. Web Security : Theory And Applications 9 / 78

4.1 Network Security Architectures Threats, Services and Mechanisms A security threat is a possible means by which a security policy may be breached e.g. loss of integrity or confidentiality A security service is a measure which can be put in place to address a threat e.g. provision of confidentiality A security mechanism is a means to provide a service e.g. encryption, digital signature Note that a security service is provided for a system, and a security mechanism is the means by which a service is provided. Hence confidentiality is a service, whereas encryption is a mechanism which can be used to provide confidentiality. In fact encryption can be used to provide other services, and data confidentiality can also be provided by means other than encryption (e.g. by physical protection of data). Web Security : Theory And Applications 10 / 78

4.1 Network Security Architectures Security Domains and Security Policies When designing a secure system, the scope of the system and the set of rules governing the security behavior of the system are of fundamental importance; these are the security domain and the security policy respectively. A security policy is defined in ISO 7498-2 as the set of criteria for the provision of security services. A security domain can be regarded as the scope of a single security policy. It is possible to have nested or overlapping security domains, and thus nested or overlapping scopes for security policies. Web Security : Theory And Applications 11 / 78

4.1 Network Security Architectures ISO 7498-2 gives the following statement as an example of a possible generic security policy statement regarding authorization: Information may not be given to, accessed by, or permitted to be inferred by, nor may any resource be used by, those not appropriately authorized. An initial generic policy of this type can then be refined, in conjunction with the results of a requirements analysis, into a detailed set of rules governing the operation and management of the system. This generic policy only deals with preventing unauthorized access, i.e. it does not make any statement about guaranteeing access to legitimate users. Thus it does not deal with Availability, and hence does not address denial of service threats. Web Security : Theory And Applications 12 / 78

4.1 Network Security Architectures Types of Security Policies ISO 7498-2 distinguishes between two types of security policy. Identity-based policies authorize system access on the basis of the identity of the client and the identity of the resource which the client wishes to make use of. Rule-based policies rely on global rules imposed on all users, with access decisions typically made using a comparison of the sensitivity of the resources with the user attributes (e.g. the clearance of the user). Web Security : Theory And Applications 13 / 78

4.1 Network Security Architectures Security Threat A threat is a person, thing, event, or idea which poses some danger to an asset, in terms of that asset s Confidentiality, Integrity, Availability or Legitimate use (CIA + ). An attack is an actual realization of a threat. Safeguards are measures to protect assets against threats, including: physical controls, mechanisms, policies and procedures. Vulnerabilities are weaknesses in a safeguard, or the absence of a safeguard. Web Security : Theory And Applications 14 / 78

4.1 Network Security Architectures Risk Risk is a measure of the cost of vulnerability, which takes into account the probability of a successful attack. The risk is high if the value of a vulnerable asset is high and the probability of a successful attack is also high. The risk is low if the value of a vulnerable asset is low and the probability of a successful attack is also low. Risk analysis can provide a quantitative means of determining whether expenditure on safeguards is warranted. Web Security : Theory And Applications 15 / 78

4.1 Network Security Architectures Classification of Threats Deliberate e.g. hacker penetration Accidental e.g. a secret message being sent to the wrong address Deliberate threats can be further sub-divided into passive or active. Passive threats involve monitoring but not alteration of information, e.g. wire-tapping. Active threats involve deliberate alteration of information, e.g. changing the value of a financial transaction. In general passive threats are easier to mount than active ones. Web Security : Theory And Applications 16 / 78

4.1 Network Security Architectures Fundamental Threats There is no universally agreed way to identify or classify security threats. Or we can identify four fundamental threats, which directly relate to the four standard security goals of CIA together with the goal of legitimate use (i.e. ensuring that resources are not used by unauthorized persons or in unauthorized ways). Information leakage. Information is disclosed or revealed to unauthorized parties. Integrity violation. Data consistency is compromised. Denial of service. Legitimate access to resources (e.g. information or processing power) is deliberately impeded. Illegitimate use. A resource is used by an unauthorized person or in an unauthorized way. Web Security : Theory And Applications 17 / 78

4.1 Network Security Architectures Primary Enabling Threats The following five primary enabling threats are significant because a realization of any of these threats can lead directly to a realization of one of the four fundamental threats. They can be sub-divided into three penetration and two planting threats The Three Penetration Threats: Masquerade, where an entity pretends to be a different entity, Bypassing controls, where an attacker exploits system flaws or security weaknesses, in order to acquire unauthorized rights, Authorized violation, where an entity authorized to use a system for one purpose uses it for another, unauthorized purpose. Web Security : Theory And Applications 18 / 78

4.1 Network Security Architectures The Two Planting Threats: Trojan horse, where software contains an invisible part which, when executed, compromises the security of the system, Trapdoor, which is a feature built into a system such that the provision of specific input data allows the security policy to be violated. Web Security : Theory And Applications 19 / 78

4.1 Network Security Architectures 4.1.3 ISO Security Services There are several categories of safeguard. What we are discussing are with communications security safeguards. Other categories include the following: Computer security safeguards e.g. operating system and database system security facilities. Physical security e.g. locks or other physical controls, equipment tamper-proofing. Personnel security e.g. employee screening for sensitive posts, security training and awareness. Web Security : Theory And Applications 20 / 78

4.1 Network Security Architectures Administrative security e.g. controlling the importation of software, procedures for investigating security breaches, audit trail analysis. Media security e.g. protecting stored data, secure destruction of computer storage media, media scanning for viruses. Emanations security e.g. radio frequency emanation controls (TEMPEST protection). Life cycle controls e.g. trusted system design, implementation, evaluation and certification, programming standards and controls, documentation controls. Web Security : Theory And Applications 21 / 78

4.1 Network Security Architectures Five main categories of security service Authentication, including entity authentication and origin authentication, Access control, Data confidentiality, Data integrity, Non-repudiation. ISO/IEC 10181 gives specific Security framework standards corresponding to each of these five categories of service, a much more detailed discussion of the general ways in which these services can be provided. One additional topic covered in the frameworks is security audit. Web Security : Theory And Applications 22 / 78

4.1 Network Security Architectures Authentication Entity authentication provides corroboration to one entity that another entity is as claimed. This service may be used at the establishment of (or during) a connection, to confirm the identities of one or more of the connected entities. This service provides confidence, at the time of usage only, that an entity is not attempting a masquerade or an unauthorized replay of a previous connection. Origin authentication provides corroboration to an entity that the source of received data is as claimed. However, the service does not, in itself, provide protection against duplication or modification of data units. Web Security : Theory And Applications 23 / 78

4.1 Network Security Architectures Access Control This service provides protection against unauthorized use of resources, including: use of a communications resource, reading, writing or deletion of an information resource, execution of a processing resource. This protection may be applied to various types of access to a resource, e.g. the use of a communications resource, the reading, writing, or deletion of an information resource, the execution of a processing resource. Web Security : Theory And Applications 24 / 78

4.1 Network Security Architectures Data Confidentiality Four types of data confidentiality services provide for the protection of data against unauthorized disclosure. Connection confidentiality for the confidentiality of all user data transferred using a connection. Connectionless confidentiality for the confidentiality of all user data transferred in a single connectionless data unit (i.e. a packet). Selective field confidentiality for the confidentiality of selected fields within user data transferred in either a connection or a single connectionless data unit. Traffic flow confidentiality for the confidentiality of information which might be derived from observation of traffic flows. Web Security : Theory And Applications 25 / 78

4.1 Network Security Architectures Data Integrity Five types of data integrity services that counter active threats to the validity of transferred data. Connection integrity with recovery for the integrity of all user data on a connection, and detects any modification, insertion, deletion or replay of data within an entire data unit sequence (with recovery attempted). Connection integrity without recovery as previously but with no recovery attempted. Selective field connection integrity for the integrity of selected fields within the user data of a data unit transferred over a connection. Web Security : Theory And Applications 26 / 78

4.1 Network Security Architectures Connectionless integrity providing integrity assurance to the recipient of a data unit. More specifically, it enables the recipient of a connectionless data unit to determine whether that data unit has been modified. Additionally, a limited form of replay detection may be provided. Selective field connectionless integrity for the integrity of selective fields within a single connectionless data unit. Web Security : Theory And Applications 27 / 78

4.1 Network Security Architectures Non-repudiation Two types of non-repudiation service. Non-repudiation with proof of origin. The recipient of data is provided with proof of the origin of data. This will protect against any subsequent attempt by the sender to falsely deny sending the data. Non-repudiation with proof of delivery. The sender of data is provided with proof of delivery of data. This will protect against any subsequent attempt by the recipient to falsely deny receiving the data. Web Security : Theory And Applications 28 / 78

4.1 Network Security Architectures 4.1.4 ISO Security Mechanisms Eight types of specific security mechanism Encryption mechanisms, Digital signature mechanisms, Access control mechanisms, Data integrity mechanisms, Authentication exchange mechanisms, Traffic padding mechanisms, Routing control mechanisms, Notarization mechanisms. *Specific standards have been developed within ISO/IEC SC27 to provide examples of most of these different classes of mechanism. Web Security : Theory And Applications 29 / 78

4.1 Network Security Architectures Encryption mechanisms Commonly known as encryption or cipher algorithms. Can provide data and traffic flow confidentiality. Also provide the basis for some authentication and key management techniques. Digital signature mechanisms Including signing procedure (private), And verification procedure (public). Can provide non-repudiation, origin authentication and data integrity services. They can be basis of some authentication exchange mechanisms. Web Security : Theory And Applications 30 / 78

4.1 Network Security Architectures Access Control mechanisms A server using client information to decide whether to grant access to resources e.g. access control lists, capabilities, security labels. Data integrity mechanisms Protection against modification of data. Provide data integrity and origin authentication services. Also basis of some authentication exchange mechanisms. Authentication exchange mechanisms Provide entity authentication service. They can be thought of as a means for using information associated with a client entity and a server entity to decide whether access to the server s resource is granted to the client. Web Security : Theory And Applications 31 / 78

4.1 Network Security Architectures Traffic padding mechanisms The addition of pretend data to conceal real volumes of data traffic. Provides traffic flow confidentiality. Routing control mechanisms Used to prevent sensitive data using insecure channels. e.g. route might be chosen to use only physically secure network components. Notarization mechanisms Integrity, origin and/or destination of data can be guaranteed by using a 3rd party trusted notary. Notary typically applies a cryptographic transformation to the data. Web Security : Theory And Applications 32 / 78

4.1 Network Security Architectures Pervasive Security Mechanism Five types of pervasive security mechanism are listed in ISO 7498-2: Trusted functionality, Security labels, Event detection, Security audit trail, Security recovery. Web Security : Theory And Applications 33 / 78

4.1 Network Security Architectures Trusted functionality Any functionality providing or accessing security mechanisms should be trustworthy. May involve combination of software and hardware. Security labels Any resource (e.g. stored data, processing power, communications bandwidth) may have security label associated with it to indicate security sensitivity. Similarly labels may be associated with users. Labels may need to be securely bound to transferred data. Web Security : Theory And Applications 34 / 78

4.1 Network Security Architectures Event detection Includes detection of attempted security violations (and whether they succeeded) legitimate security-related activity. Can be used to trigger event reporting (alarms), event logging, automated recovery. Security audit trail Log of past security-related events. Permits detection and investigation of past security breaches. Web Security : Theory And Applications 35 / 78

4.1 Network Security Architectures Security recovery Includes mechanisms to handle requests to recover from security failures. May include immediate abort of operations, temporary invalidation of an entity, addition of entity to a blacklist. Web Security : Theory And Applications 36 / 78

4.1 Network Security Architectures Services Versus Mechanisms ISO 7498-2 indicates which mechanisms can be used to provide which services. It is illustrative and NOT definitive. Obvious omissions include: the possible use of data integrity mechanisms to help provide peer entity authentication and data origin authentication services the possible use of encryption to help provide nonrepudiation service (as part of notarization) Web Security : Theory And Applications 37 / 78

4.1 Network Security Architectures Service/ Mechanism Encryption Digital Signature Access Control Data Integrity Entity authentication Y Y Origin authentication Y Y Access control Y Connection confidentiality Y Connectionless confidentiality Y Selective field confidentiality Y Traffic flow confidentiality Y Connection integrity with recovery Y Y Connection integrity without Y Y recovery Selective field connection integrity Y Y Connectionless integrity Y Y Y Selective field connectionless Y Y Y integrity Non-repudiation of origin Y Y Non-repudiation of delivery Y Y Web Security : Theory And Applications 38 / 78

4.1 Network Security Architectures Service Mechanism Authorization exchange Y Traffic padding Routing Control Entity authentication Origin authentication Access control Connection confidentiality Y Connectionless confidentiality Y Selective field confidentiality Traffic flow confidentiality Y Y Connection integrity with recovery Connection integrity without recovery Selective field connection integrity Connectionless integrity Selective field connectionless integrity Non-repudiation of origin Non-repudiation of delivery Notarisation Y Y Web Security : Theory And Applications 39 / 78

4.1 Network Security Architectures Services Versus Layers ISO 7498-2 lays down which security services may be provided in what parts of the OSI model. Layers 1 and 2 are restricted to providing certain types of confidentiality services. Layers 3 and 4 can provide authentication, access control, confidentiality (layer 3 only) and integrity services. No security services can be provided in Layer 5 or Layer 6, although Layer 6 may contain facilities to support the provision of services at Layer 7. All security services may be provided at Layer 7. Web Security : Theory And Applications 40 / 78

4.1 Network Security Architectures There are good reasons for varying the position of security functionality within the OSI layer hierarchy depending on the type of network in use. For the maximum degree of traffic flow confidentiality, data encryption needs to be placed at the lowest possible layer (to hide the protocol addresses). Low level placement also offers common security support for all the different applications running across the network. If end-to-end security is required, then the security services must be placed in Layer 3 or above. If application-specific security services are required, then the security must be placed in Layer 7. Web Security : Theory And Applications 41 / 78

4.1 Network Security Architectures Service / Layer Layer 1 Layer 2 Layer 3 Layer 4 Layer 5/6 Layer 7 Entity authentication Y Y Y Origin authentication Y Y Y Access control Y Y Y Connection confidentiality Y Y Y Y Y Connectionless confidentiality Y Y Y Y Selective field confidentiality Y Traffic flow confidentiality Y Y Y Connection integrity with recovery Y Y Connection integrity without recovery Y Y Y Selective field connection integrity Y Connectionless integrity Y Y Y Selective field connectionless integrity Y Non-repudiation of origin Y Non-repudiation of delivery Y Web Security : Theory And Applications 42 / 78

4.1 Network Security Architectures 4.1.4 TCP/IP Security IP, TCP, UDP & ICMP Attacks with TCP/IP Vulnerabilities Discussed in Chapter 5 in details Web Security : Theory And Applications 43 / 78

Outline 4.1 Network Security Architectures 4.2 IPSec Introduction Some Basic Concepts About IPSec ESP protocol Gateway and Road Warrior mode Key management of IPSec 4.3 SSL/TLS 4.4 VPN Web Security : Theory And Applications 44 / 78

4.2 IPSec 4.2.1. Introduction Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite. It can be used in protecting data flows between a pair of hosts (host-tohost), between a pair of security gateways (network-tonetwork), or between a security gateway and a host (network-to-host). Web Security : Theory And Applications 45 / 78

4.2 IPSec Some other Internet security systems in widespread use, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of the TCP/IP model. Hence, IPsec protects any application traffic across an IP network. Applications do not need to be specifically designed to use IPsec. The use of TLS/SSL, on the other hand, must be designed into an application to protect the application protocols. IPsec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was based on the SP3 protocol that was published by NIST (National Institute of Standards and Technology), but designed by the Secure Data Network System project of the National Security Agency (NSA). Web Security : Theory And Applications 46 / 78

4.2 IPSec IPsec is officially specified by the Internet Engineering Task Force (IETF) in a series of Request for Comment (RFC) documents addressing various components and extensions. It specifies the spelling of the protocol name to be IPsec. Web Security : Theory And Applications 47 / 78

4.2 IPSec 4.2.2 How IPsec protect us What do we need to protect Keep Secret Check Data Integrity Verify the Source Prevent Replay-Attack How does IPsec provide us Web Security : Theory And Applications 48 / 78

4.2 IPSec 4.2.3 Some Basic Concepts About IPsec How IPsec organize all things together Need a structure to store keys and related things SA (Security Association) Need a place to store SAs SAD (Security Association Database) Need a structure to associate packets with SAs SPI (Security Parameter Index) Need a place to store policies( or rules ) SPD (Security Policy Database) Web Security : Theory And Applications 49 / 78

4.2 IPSec AH Authentication Headers ESP Encapsulating Security Payloads IKE Internet Key Exchange Tunnel mode Transport mode Web Security : Theory And Applications 50 / 78

4.2 IPSec 4.2.4 ESP Protocol Tunnel mode Encryption all the IP packet (for ESP) Add new header Just like transmission through a tunnel Transport mode Encryption of payloads (for ESP) No encryption of header (for ESP) Web Security : Theory And Applications 51 / 78

4.2 IPSec IPsec (ESP) datagram Web Security : Theory And Applications 52 / 78

4.2 IPSec When a packet is going to be sent 1. Append a ESP trailer 2. Encryption 3. Append an ESP header 4. Append MAC 5. Create a New IP Header Web Security : Theory And Applications 53 / 78

4.2 IPSec When a packet is received 1. Use SPI to determine SA 2. Calculate MAC 3. Check sequence number 4. Decryption 5. Remove padding 6. Forward the original datagram Web Security : Theory And Applications 54 / 78

4.2 IPSec Web Security : Theory And Applications 55 / 78

4.2 IPSec Web Security : Theory And Applications 56 / 78

4.2 IPSec 4.2.5 AH Protocol A Brief Mention of AH Protocol Web Security : Theory And Applications 57 / 78

4.2 IPSec 4.2.6 Gateway and Road Warrior Models Web Security : Theory And Applications 58 / 78

4.2 IPSec 4.2.7 IKE Key Management of IPsec IKE (Internet Key Exchange) ISAKMP Oakley SKEME Web Security : Theory And Applications 59 / 78

Outline 4.1 Network Security Architectures 4.2 IPSec 4.3 SSL/TLS Introduction How TLS Works Decryption of TLS Packet 4.4 VPN Web Security : Theory And Applications 60 / 78

4.3 SSL/TLS 4.3.1 Introduction What s wrong with the transport layer Every thing will be transported in plain text! Give HTTP for example: Web Security : Theory And Applications 61 / 78

4.3 SSL/TLS How to keep my data in secret Encrypt my data with symmetric key before sending it Protect master key with my public key (PKI) Receiver verify my public key with Certificate (by CA) Prevent my data from tempering with HMAC (Hashbased Message Authentication Code) Web Security : Theory And Applications 62 / 78

4.3 SSL/TLS A Simplified Picture of SSL 1. Client send out connection request 2. Server accepts the request and send back its public key 3. Client encrypt secret key with public key and send it to the server. 4. Client and serve start communicating with the secret key Web Security : Theory And Applications 63 / 78

4.3 SSL/TLS 4.3.2 How TLS Works Some Basic Concepts Session Connection Write State Read State Cipher Suites Pre-master Secret Record Layer Protocol Handshake Protocol ChangeCipherSpec Protocol Alert Protocol Web Security : Theory And Applications 64 / 78

4.3 SSL/TLS Application Data Protocol TLS Handshake ClientHello ServerHello Certificate ServerHelloDone ClientKeyExchange ChangeCipherSpec Finished ChangeCipherSpec Finished Web Security : Theory And Applications 65 / 78

4.3 SSL/TLS Key Generation Client randomly generates a PMS (Pre Master Secret) Four keys are generated according to PMS Encryption key for client to server Encryption key for server to client MAC key for client to server MAC key for server to client Web Security : Theory And Applications 66 / 78

4.3 SSL/TLS Resume of TLS Handshake ClientHello ServerHello ChangeCipherSpec Finished ChangeCipherSpec Finished Web Security : Theory And Applications 67 / 78

4.3 SSL/TLS 4.3.3 Decryption of TLS Packet Reading Web Security : Theory And Applications 68 / 78

Outline 4.1 Network Security Architectures 4.2 IPSec 4.3 SSL/TLS 4.4 VPN Introduction to IPsec VPN OpenVPN Web Security : Theory And Applications 69 / 78

4.4 VPN 4.4.1 Introduction to IPsec VPN VPN:virtual private network IPsec VPN on GNU/Linux FreeS/WAN Openswan Web Security : Theory And Applications 70 / 78

4.4 VPN 4.4.2 OpenVPN OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls. It was written by James Yonan and is published under the GNU General Public License (GPL). Web Security : Theory And Applications 71 / 78

4.4 VPN OpenVPN allows peers to authenticate each other using a pre-shared secret key, certificates, or username/password. When used in a multiclient-server configuration, it allows the server to release an authentication certificate for every client, using signature and Certificate authority. It uses the OpenSSL encryption library extensively, as well as the SSLv3/TLSv1 protocol, and contains many security and control features. Web Security : Theory And Applications 72 / 78

4.4 VPN OpenVPN Web Security : Theory And Applications 73 / 78

4.4 VPN Assignment: Construct a VPN by making usae of OpenVPN Web Security : Theory And Applications 74 / 78

References 1. James F.Kurose and Keith W.Ross.,Computer Networking - A Top- Down Approach 5th ed.addison-wesley, 2009. 2. James S. TILLER.A Technical Guide to IPSec Virtual Private Networks.AUERBACH PUBLICATIONS, 2001. 3. Stephen A.Thomas.SSL and TLS Essentials.Wiley Computer Publishing, 2000. 4. Wikipedia.Ipsec. http://en.wikipedia.org/wiki/ipsec. 5. Steve Friedl.An illustrated guide to ipsec. http://www.unixwiz.net/techtips/iguide-ipsec.html. 6. Martti Kuparinen and Oy L M Ericsson Ab.Isakmp and ike. http://www.tml.tkk.fi/opinnot/tik- 110.501/1998/papers/16isakmp/isakmp.html. 7. Richard A. Deal.Isakmp/ike phase 1 connections. http://fengnet.com/book/vpnconf/ch19lev1sec1.html. Web Security : Theory And Applications 75 / 78

References 8. Vicky.ssl handshake. http://developer.connectopensource.org/display/connectwiki/ssl+ha ndshake. 9. Adam Cain Eric Rescorla and Brian Korver.Sslacc: A clustered ssl accelerator. http://www.usenix.org/event/sec02/full_papers/rescorla/rescorla_html. 10.Oracle.overview of secure sockets layer (ssl) in oracle applicationserver. http://download.oracle.com/docs/cd/b32110_01/core.1013/b32196/ssl_intr o.htm. http://www.hostyourspace.co.uk/category/addons 11. John.what is secure sockets layer. http://hackhaholic.blogspot.com/2011/01/what-is-secure-sockets-layerssl.html. 12. Romeoat.wireshark lab: ssl. http://blog.it.kmitl.ac.th/it51066527/10ssl/. Web Security : Theory And Applications 76 / 78

References 13. IBM.the ssl handshake. http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?topic=/com.ibm.itame2.doc_5.1/ss7aumst18.htm. 14. Vimalanandan.Osi security architecture. http://www.classle.net/bookpage/osi-security-architecture. 15.Jacob Appelbaum Arjen Lenstra David Molnar Dag Arne OsvikBenne de Weger Alexander Sotirov, Marc Stevens.Md5 considered harmful today - creating a rogue ca certicate. http://www.win.tue.nl/hashclash/rogue-ca/. 16. TCG.Trusted computing group - developers - trusted netwrok connect. http://www.trustedcomputinggroup.org/developers/trusted_network_conne ct. 17. INTEROP LABS.What is tcg's trusted netwrok connect.document. http://www.interop.com/archive/pdfs/tcg.pdf. Web Security : Theory And Applications 77 / 78

Thank you! Web Security : Theory And Applications 78 / 78