Application Security: Threats and Architecture



Similar documents
Network Security. Mobin Javed. October 5, 2011

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Network Security - ISA 656 Review

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

TLS and SRTP for Skype Connect. Technical Datasheet

Client Server Registration Protocol

Network Security - ISA 656 Security

Chapter 7 Transport-Level Security

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.

Network Security Fundamentals

Authentication Types. Password-based Authentication. Off-Line Password Guessing

COSC 472 Network Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Lecture VII : Public Key Infrastructure (PKI)

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

ICOM 5018 Network Security and Cryptography

Cryptography and Network Security Chapter 14

CSE/EE 461 Lecture 23

Sync Security and Privacy Brief

True False questions (25 points + 5 points extra credit)

Network Security Essentials Chapter 5

Bit Chat: A Peer-to-Peer Instant Messenger

CRYPTOGRAPHY AS A SERVICE

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Security vulnerabilities in the Internet and possible solutions

Overview. SSL Cryptography Overview CHAPTER 1

Authentication Applications

Communication Security for Applications

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Single Sign-On Secure Authentication Password Mechanism

A PKI For IDR Public Key Infrastructure and Number Resource Certification

SBClient SSL. Ehab AbuShmais

VoIP Security regarding the Open Source Software Asterisk

Applying Cryptography as a Service to Mobile Applications

Associate Prof. Dr. Victor Onomza Waziri

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

What is Web Security? Motivation

Topics in Network Security

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

What is network security?

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Authentication Application

Principles of Network Security

CNT Computer and Network Security Review/Wrapup

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Computer System Management: Hosting Servers, Miscellaneous

Description: Objective: Attending students will learn:

Transport Level Security

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Firewalls, Tunnels, and Network Intrusion Detection

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

SSL: Secure Socket Layer

BroadSAFE Enhanced IP Phone Networks

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure

NETWORK ADMINISTRATION AND SECURITY

[SMO-SFO-ICO-PE-046-GU-

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Securing Data on Microsoft SQL Server 2012

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

Public Key Infrastructure (PKI)

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Content Teaching Academy at James Madison University

VOICE OVER IP SECURITY

Is your data safe out there? -A white Paper on Online Security

Security within a development lifecycle. Enhancing product security through development process improvement

Midterm. Name: Andrew user id:

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

CS Network Security: Public Key Infrastructure

From Network Security To Content Filtering

Secure web transactions system

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Best Practices for SIP Security

Chapter 17. Transport-Level Security

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Ciphire Mail. Abstract

MS-55096: Securing Data on Microsoft SQL Server 2012

Guidance Regarding Skype and Other P2P VoIP Solutions

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

CS 356 Lecture 28 Internet Authentication. Spring 2013

Information Security

Transcription:

Application Security: Threats and Architecture Steven M. Bellovin smb@cs.columbia.edu http://www.cs.columbia.edu/ smb Steven M. Bellovin August 4, 2005 1

We re from the Security Area, and We re Here to Help You We annoy a lot of people We keep demanding more security mechanisms We keep demanding more security analysis We keep changing what we want Is there a reason for this, or is the Security Area a home for professional nuisances? Steven M. Bellovin August 4, 2005 2

The World Has Changed Old Teenage joy-hackers Password-guessing Password sniffing Exploit bugs Simple scanner New Hacking for profit Distributed password-guessing Programmable bots with sniffers Protocol-level attacks Tailored worms and viruses Why has this happened? Follow the money. The requirements have changed because the threats have changed. Steven M. Bellovin August 4, 2005 3

What are Today s Problems? Eavesdropping Monkey-in-the-middle ARP-spoofing Evil twin access points Routing attacks All of these are seen in the wild. (See Christian Huitema s APPS Area slides (http://www.huitema.net/talks/ietf63-security.ppt) for an excellent precis of the situation.) Steven M. Bellovin August 4, 2005 4

Patterns of Thought Serial number 1 of any new device is delivered to your enemy. You hand your packets to your enemy for delivery. Your enemy is just as smart as you are. If we haven t seen a given class of attack yet, it s because it hasn t been necessary; simpler attacks have worked well enough. (Besides, how do you know if you ll actually notice it?) Steven M. Bellovin August 4, 2005 5

Things that Don t Work Well Plaintext passwords (we outlawed them a long time ago) Plaintext challenge/response based on passwords Crypto without bilateral authentication: to whom are you talking? Steven M. Bellovin August 4, 2005 6

Is This the Party to Whom I am Speaking? Who is at the other end of a TCP connection? Who is at the other end of a TLS-over-TCP connection? Is it the party you meant? Think about paypa1.com, whitehouse.com, or nasa.com Steven M. Bellovin August 4, 2005 7

Who is the Right Party? With two-party protocols, you often have some idea of the other party s identity and credentials Problems can arise if you don t know the other side that s why signed email won t have much effect on spam or if you re relying on untrustworthy third parties (some commercial CAs) Multi-party protocols make this much worse Steven M. Bellovin August 4, 2005 8

Multi-Party Protocols More and more of our protocols are multi-party: BGP, SIP, AAA, p2p, etc. The client may not have a direct relationship with the ultimate server, and vice-versa How can either party verify the other s credentials? More seriously, how can either party verify the other s authority? Note: such connectivity often instantiates business agreements, the terms of which are often not easily reducible to protocol syntax and semantics Steven M. Bellovin August 4, 2005 9

The Routing Problem Security Architecture Autonomous system A advertises 192.0.2.0/24 to BGP peer B. B tells C that the path to 192.0.2.0/24 is {B,A}. Similarly, E advertises the same prefix to D, which tells C that the path to 192.0.2.0/24 is {D,E}. A 192.0.2.0/24 B C D E 192.0.2.0/24 Which should C believe? Either? Both? Neither? C has contracts with B and D, which specifies what prefixes they may originate. C has no contract with or knowledge of A or E. Steven M. Bellovin August 4, 2005 10

SIP Call Transfer Security Architecture A 3 4 B 1 X 4 2 C 1. A tries to call C 2. The call is redirected to B 3. B agrees to transfer the call to C 4. A contacts C Can X steal those credentials and call C? How does C know that messages 4 or 4 are authorized? Steven M. Bellovin August 4, 2005 11

Transitive Trust Sometimes trust is transitive In that case, cryptographic tokens can be used to convey authority Sometimes, trust is done by reference to external authority: should RIRs give out certificates for IP address blocks? If this isn t possible consider a SIP proxy chain A B C D E Can A trust D to forward the call setup to the real E? Does A have any idea of D s existence, role, or trustworthiness? Does A even know that D is in the path? Steven M. Bellovin August 4, 2005 12

Cryptography Depends on Authorization In the first SIP example, message 3 cannot be reliably encrypted unless either A or C has authentication credentials for the other. Are you encrypting your message to the right party? An encrypted channel to a bad guy only provides protection from intrusion detection systems... Trusted and trustable authorities are essential for protocol security. You can be your own authority if you wish to hand out credentials to everyone you talk to. But can you trust yourself? Steven M. Bellovin August 4, 2005 13

Secure Application Protocol Design Identify the different parties Identify the trust relationships between them Who has to trust whom? How is identity established? How is authorization established? Bilateral communication can be handled by mutual agreement and (offline) credential exchange Multi-party communication is much more difficult You can t build a secure protocol without this analysis Steven M. Bellovin August 4, 2005 14

Security from the Beginning It s easy to bolt on crypto on a single path It s hard to add it later on a multi-hop path It s very hard to change the trust model later. (Example: redirects are easier to analyze than proxies.) Moral: do the analysis very early on, and get help early Steven M. Bellovin August 4, 2005 15

Selecting Cryptographic Primitives Security Architecture Do you need confidentiality+authentication or just authentication? (Note: confidentiality without authentication is generally dangerous) For two-party communication, symmetric cryptography is often sufficient (but try to avoid passwords) When multiple parties need to see a single message, you almost always need public key cryptography Often, hybrid schemes can be used If standard IETF cryptographic protocols cannot be used, contact the Security Area. Even the Security Area isn t competent to design cryptographic primitives such as hash functions and encryption algorithms Steven M. Bellovin August 4, 2005 16

Hybrid DNSsec Paths Security Architecture Client Digitally signed DNS Server Digitally signed Client TSIG Local Cache Trust Boundary DNSsec uses digital signatures because it is multi-party. But a trusted local cache can do the expensive verification, and use TSIG to reliably tell a local party the results. Steven M. Bellovin August 4, 2005 17

Properties of Cryptographic Primitives Encryption is much more expensive than hashing Public key crypto is much more expensive than symmetric crypto Public key often scales better to large environments the (highly secure) credential issuer need not be online at all times, and old client credentials are not endangered if that machine is compromised Revoking public key credentials is hard work Symmetric techniques can work well if all parties are online simultaneously The choice is often difficult, and frequently depends on estimates of likely scale and deployment patterns Steven M. Bellovin August 4, 2005 18

The enemy is getting a lot better Final Thoughts We must use cryptography to secure our protocols (though that won t protect us against buggy code) Proper cryptographic desgin depends on four things: Cryptographic primitives (RSA, AES, SHA-1, etc) Cryptographic protocols (Security Area) Threat model (Security Area and protocol designers) Trust patterns Only the protocol designers understand the trust model Everyone has to work together on the threat model but it s constantly getting worse Steven M. Bellovin August 4, 2005 19