SSL, PKI and Secure Communication



Similar documents
SSL and Browsers: The Pillars of Broken Security

SSL BEST PRACTICES OVERVIEW

Using etoken for SSL Web Authentication. SSL V3.0 Overview

SSL/TLS: The Ugly Truth

Web Security Considerations

SSL A discussion of the Secure Socket Layer

The Secure Sockets Layer (SSL)

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

CS5008: Internet Computing

Should You Trust the Padlock? Web Security and the HTTPS Value Chain. Keeping Current 20 November 2013 Ken Calvert

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

Internet Programming. Security

What is an SSL Certificate?

Securing the SSL/TLS channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs

Overview. SSL Cryptography Overview CHAPTER 1

SSL Interception Proxies. Jeff Jarmoc Sr. Security Researcher Dell SecureWorks. and Transitive Trust

Authenticity of Public Keys

Chapter 17. Transport-Level Security

Secure Sockets Layer

GT 6.0 GSI C Security: Key Concepts

Breaking the Myths of Extended Validation SSL Certificates

Installation and usage of SSL certificates: Your guide to getting it right

Linux Web Based VPN Connectivity Details and Instructions

Web Security. Introduction: Understand applicable laws, legal issues and ethical issues regarding computer crime

Security: Focus of Control. Authentication

Apache Milagro (incubating) An Introduction ApacheCon North America

Chapter 7 Transport-Level Security

Strong Encryption for Public Key Management through SSL

ARPKI: Attack Resilient Public-Key Infrastructure

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security Protocols/Standards

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

SBClient SSL. Ehab AbuShmais

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

SSL User Authentication with the HTTP Security Server

Understanding Digital Certificates and Secure Sockets Layer (SSL)

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Inspection of Encrypted HTTPS Traffic

Secure Client Applications

Using Foundstone CookieDigger to Analyze Web Session Management

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

EECS 588: Computer and Network Security. Introduction

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Communication Security for Applications

Key Management (Distribution and Certification) (1)

T Cryptography and Data Security

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

MAC Web Based VPN Connectivity Details and Instructions

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Software and Web Security 2 Session Management

SSL implementieren aber sicher!

SSL/TLS and MITM attacks. A case study in Network Security By Lars Nybom & Alexander Wall

Network Security Fundamentals

Secure Web Access Solution

PKI : state of the art and future trends

Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Sascha Fahl, Marian Harbach, Matthew Smith. Usable Security and Privacy Lab Leibniz Universität Hannover

Topics in Network Security

How To Understand And Understand The Security Of A Key Infrastructure

Executive Summary and Purpose

What is Web Security? Motivation

Privacy + Security + Integrity

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

Implementation Vulnerabilities in SSL/TLS

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Cornerstones of Security

SSL Inspection Step-by-Step Guide. June 6, 2016

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

SSL: Secure Socket Layer

The Benefits of SSL Content Inspection ABSTRACT

SSL VPN Technology White Paper

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

WISHIN Pulse Statement on Privacy, Security and HIPAA Compliance

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

TLS/SSL (Mis)Protecting our Connections Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Public Key Infrastructure (PKI)

A Study of What Really Breaks SSL HITB Amsterdam 2011

Written by Edmond Ng on behalf of D-Link for a Thai magazine (before translation) Page 1 of 4

Attacks against certification service providers and their ramifications

What is network security?

Virtual Private Networks

Transport Level Security

Data Protection: From PKI to Virtualization & Cloud

Evaluate the Usability of Security Audits in Electronic Commerce

Network Security Essentials Chapter 5

Why Eve and Mallory Love Android An Analysis of Android SSL (In)Security

Breaking the Security Myths of Extended Validation SSL Certificates

Secure Socket Layer. Security Threat Classifications

Network Security Administrator

Strong Security in Multiple Server Environments

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Properties of Secure Network Communication

Transcription:

SSL, PKI and Secure Communication Aditya Marella 20 th March, 2014 03/19/2014 Usable Privacy and Security 1

Secure Sockets Layer (SSL) Developed by Netscape Sits on top of TCP and below application level protocols HTTP IMAP LDAP Secure Sockets Layer(SSL) Application Layer Network Layer TCP/IP Layer 03/19/2014 Usable Privacy and Security 2

What are the typical use-cases of SSL? HTTPS Secure web communication Enhances privacy by allowing encrypted data transfer Application (binary) Signing Email Certificates VPN 03/19/2014 Usable Privacy and Security 3

What does SSL offer? Confidentiality: encrypts data in transit Integrity: uses message authentication codes to detect tampering Authentication: public key cryptography to authenticate peers (X.509 certificates) All of these are dependent on the trust model (PKI) 03/19/2014 Usable Privacy and Security 4

Problems 03/19/2014 Usable Privacy and Security 5

Problems observed with SSL Many SSL related issues are actually software bugs Implementation flaws (Remote timing attacks, PRNG Seeding) Oracle Attacks (reverse engineering or predicting victim s protocol implementation) Protocol Level Attack (ciphersuite downgrade attack, version downgrade attack, renegotiation attack) Weak Crypto Primitives Weak encryption (40, 56, 64 bit encryptions subject to brute force attack) Weak Hash Functions (MD5) Jeremy Clark and Paul C. van Oorschot. SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013. (S&P '13 / Oakland '13) 03/19/2014 Usable Privacy and Security 6

SSL Trust Model or What is PKI? 03/19/2014 Usable Privacy and Security 7

The Trust Model Root Certificate Authorities (CAs) rule CAs sell certificates to entrust companies and users CAs delegate trust to other CAs for a price (creating a chain of trust ) There is validation process when they sell you a certificate 03/19/2014 Usable Privacy and Security 8

End user certificate validation Server: this is my certificate, this is the chain of trust leading upto the root CA Client: let s see if any of these certificates have been revoked/expired.. If all the certificates in the chain are valid and linked to a trusted CA (Accepted) Revoked/expired certificates or certificate doesn t match host or don t trust the CA (Rejected) 03/19/2014 Usable Privacy and Security 9

Chain of trust (in principle) 03/19/2014 Usable Privacy and Security 10

Chain of trust (in practice) 03/19/2014 Usable Privacy and Security 11

Trust Model Issues Single point(s) of failure (Root Certificate Authority) CAs themselves get hacked (Diginotar) CAs could be malicious (cannot be trusted) CAs could have malicious employees (Insider threats) Not Agile CA hacks are very hard to recover from Profit driven model Entity with more money/influence gets to choose what can be trusted (big companies, governments) 03/19/2014 Usable Privacy and Security 12

Trust Model Issues Compelled certificate creation attack (Soghoian et al) Govt. agencies force CAs to issue false certificates Intelligence agencies use these certificates to spy secure web communication Christopher Soghoian and Sid Stamm. Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL. In Proceedings of the 15th international conference on Financial Cryptography and Data Security (FC '11) 03/19/2014 Usable Privacy and Security 13

The Trust Model Now what? 03/19/2014 Usable Privacy and Security 14

Solution: Certificate Transparency (from Google) Log servers hold append only logs of all issued certificates (as Merkle Trees) CA sends its cert to a log server and gets timestamp as response Monitor servers check log servers periodically and flags unauthorized certificates Auditors (browsers) check any cert and timestamp they receive appears in the log 03/19/2014 Usable Privacy and Security 15

Solution: Public key pinning Extending HTTP to allow websites to instruct browsers to remember( pin ) the hosts public keys for a given period of time During this time, browsers will require hosts to present a certificate chain including at least one public key that matches one of the pinned ones IETF Proceedings 88(http://www.ietf.org/proceedings/88/slides/slides-88-wpkops-0.pdf) 03/19/2014 Usable Privacy and Security 16

Solution: Convergence Several notaries can vouch for a single site If the notaries disagree, user can go for Majority vote or they can also be content with single notary Voting method can be controlled using a setting in the browser plugin No single point of failure BlackHat USA 2011: SSL And The Future Of Authenticity http://www.youtube.com/watch?v=z7wl2fw2tca 03/19/2014 Usable Privacy and Security 17

Solution: Accountable Key Infrastructure Reduces the amount of trust placed in one CA 03/19/2014 Usable Privacy and Security 18

Solution: HTTP Strict Transport Security (HSTS) Allowing websites to say that they are only contactable using HTTPS HTTP response header contains sites security policy Browser remember policy and strictly enforces it This stops users clicking through security warnings of web sites that the browser does not trust IETF Proceedings 88(http://www.ietf.org/proceedings/88/slides/slides-88-wpkops-0.pdf) 03/19/2014 Usable Privacy and Security 19

Extending SSL in Appified World Transparent development of SSL in the applications Central deployment of SSL validation strategies and infrastructures (Certificate Transparency, Convergence, AKI) instead of each application developer separately implementing it Sascha Fahl, Marian Harbach, Henning Perl, Markus Koetter, and Matthew Smith. Rethinking SSL Development in an Appified World. InProceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security, 2013. (CCS '13) 03/19/2014 Usable Privacy and Security 20

Whoever thinks his problem can be solved using cryptography, doesn t understand his problem and doesn t understand cryptography Roger Needham and Butler Lampson taken from Ross Anderson. Chapter 21: Network Attack and Defense In Security Engineering (Second Edition). Wiley, 2008 03/19/2014 Usable Privacy and Security 21