CS 494/594 Computer and Network Security



Similar documents
Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

IP Security. Ola Flygt Växjö University, Sweden

Client Server Registration Protocol

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Chapter 10. Network Security

Lecture 17 - Network Security

CS 4803 Computer and Network Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security vulnerabilities in the Internet and possible solutions

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Securing IP Networks with Implementation of IPv6

IPsec Details 1 / 43. IPsec Details

IPsec Simplified. Peter J. Welcher. Introduction. Just a Very Wee Bit of Cryptology. First, a couple of personal and company news items:

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

CSCI 454/554 Computer and Network Security. Final Exam Review

The BANDIT Products in Virtual Private Networks

Protocol Security Where?

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Cryptography and network security CNET4523

Authentication Types. Password-based Authentication. Off-Line Password Guessing

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Chapter 32 Internet Security

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Network Security. Lecture 3

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

CS Final Exam

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Branch Office VPN Tunnels and Mobile VPN

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Lecture 10: Communications Security

Introduction to Security and PIX Firewall

Case Study for Layer 3 Authentication and Encryption

Laboratory Exercises V: IP Security Protocol (IPSec)

Chapter 7 Transport-Level Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CS 5490/6490: Network Security Fall 2015

Chapter 4 Virtual Private Networking

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Security Architecture for IP (IPsec)

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Using IPSec in Windows 2000 and XP, Part 2

IINS Implementing Cisco IOS Network Security Exam.

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Chapter 3. Network Domain Security

Chapter 37. Secure Networks

Network Security Protocols

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Lab Configure a PIX Firewall VPN

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Chapter 5 Virtual Private Networking Using IPsec

Bit Chat: A Peer-to-Peer Instant Messenger

Authentication Applications

Alternative: Strong password Protocols

How To Secure My Data

Chapter 8 Virtual Private Networking

OfficeConnect Internet Firewall VPN Upgrade User Guide

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

IP SECURITY (IPSEC) PROTOCOLS

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

SFWR ENG 4C03 - Computer Networks & Computer Security

Configuring IPsec VPN with a FortiGate and a Cisco ASA

SIP and VoIP 1 / 44. SIP and VoIP

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

CCNA Security 1.1 Instructional Resource

Virtual Private Networks

DoS Protection for UDP-Based Protocols

VPN. VPN For BIPAC 741/743GE

Cryptography and Network Security

This section provides a summary of using network location profiles to identify network connection types. Details include:

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Internet Security Architecture

Firewalls, Tunnels, and Network Intrusion Detection

Virtual Private Networks: IPSec vs. SSL

Introduction to Computer Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5: Network Layer Security

Implementing and Managing Security for Network Communications

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

NETWORK ADMINISTRATION AND SECURITY

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 49 IP Security (IPsec)

Security in Computer Networks

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Transcription:

CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1

Exercise: Chapters 13, 15-18 18

1. [Kaufman] 13.1 Design a variant of Kerberos in which the workstation generates a TGT. The TGT will be encrypted with the user s master key rather than the KDC s master key. How does this compare with standard Kerberos in terms of efficiency, security, etc.? What happens in each scheme if the user changes her password during a login session?

1. [Kaufman] 13.1

2. [Kaufman] 15.4 Compare the following schemes for obtaining Bob's public key, in terms of bandwidth and computation efficiency, security, flexibility, and any other criteria you can think of: downloading Bob's key from the node located at a particular IP address (via an unauthenticated interaction), looking up Bob's key in a directory via an unauthenticated interaction, having an authenticated conversation to the directory, having the directory sign the information you request, storing and retrieving certificates from the directory, having no directory but having each principal responsible for keeping its own certificate and sending it to someone who needs to talk to it.

2. [Kaufman] 15.4

3. [Kaufman] 16.7 Devise a protocol based on a pre-shared secret key that hides identities and gives PFS for identity hiding. Make two variants, one in which an active attacker can learn only the initiator's identity, and one in which an active attacker can learn only the target's identity.

3. [Kaufman] 16.7

4. [Kaufman] 16.11 In the Protocol 16-6, explain why Bob knows that Alice is the real Alice, and not someone replaying Alice's messages. How does Alice know that it's the real Bob if she uses a different a each time? Modify the protocol to allow both Alice and Bob to reuse their a and b values, and yet have both sides be able to know they are talking to a live partner.

4. [Kaufman] 16.11

5. [Kaufman] 17.1 Suppose Alice is sending packets to Bob using IPsec. Suppose Bob's TCP acknowledgment gets lost, and Alice's TCP, assuming the packet was lost, retransmits the packet. Will Bob's IPsec implementation notice that the packet is a duplicate and discard it?

5. [Kaufman] 17.1 No. IPsec treats a retransmitted TCP packet as a new IPsec packet. It is up to TCP to notice the packet is a duplicate.

6. [Kaufman] 17.4 Would it be possible for the SA to be defined only by the destination address and the SPI (i.e., leave out whether it's ESP or AH)? Would this require any changes to the IPsec protocol? Would an implementation of a receiver that defined the SA based solely on destination address and SPI interwork with one that did what the IPsec specification says?

6. [Kaufman] 17.4

7. [Kaufman] 17.5 When sending encrypted traffic from firewall to firewall, why does there need to be an extra IP header? Why can't the firewall simply encrypt the packet, leaving the source and destination as the original source and destination?

7. [Kaufman] 17.5

8. [Stallings] 16.4 The IPsec architecture document states that when two transport mode SA's are bundled to allow both AH and ESP protocols on the same end-to-end flow, only one ordering of security protocols seems appropriate: performing the ESP protocol before performing the AH protocol. Why is this approach recommended rather than authentication before encryption?

8. [Stallings] 16.4 This order of processing facilitates rapid detection and rejection of replayed or bogus packets by the receiver, prior to decrypting the packet, hence potentially reducing the impact of denial of service attacks. It also allows for the possibility of parallel processing of packets at the receiver, i.e., decryption can take place in parallel with authentication.

9. [Kaufman] 18.1 Suppose if Alice's aggressive-mode IKE connection initiate is refused, Alice starts up another aggressive-mode connection initiate with her next (and weaker) choice of Diffie-Hellman group, rather than starting a main-mode exchange telling Bob all her supported Diffie- Hellman groups. What is the vulnerability, given an active attacker?

9. [Kaufman] 18.1 The active attacker can trick Alice into using weak crypto. The bad guy can impersonate Bob and refuse Alice s strong crypto proposal. Then Alice will retry with a weaker proposal.

10. [Kaufman] 18.5 How can you modify aggressive mode with public signature keys (see 18.5.10.2 Public Signature Keys, Aggressive Mode) to hide the endpoint identifiers from eavesdroppers? Which identity will be hidden from an active attacker? Give a disadvantage of this.

10. [Kaufman] 18.5

11. [Kaufman] 18.8 Design a protocol in which authentication is oneway since only one side has a public key. Do the protocol with a public signature key. Now do it with a public encryption key.

11. [Kaufman] 18.8