CS 3251: Computer Networking 1 Security Protocols I



Similar documents
Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

What is network security?

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Protocol Rollback and Network Security

Netzwerksicherheit: Anwendungen

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

Security: Focus of Control. Authentication

Security vulnerabilities in the Internet and possible solutions

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Authenticity of Public Keys

Chapter 10. Network Security

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Transport Level Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Key Management (Distribution and Certification) (1)

Chapter 7 Transport-Level Security

Overview of Network Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Network Security Part II: Standards

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

CS5008: Internet Computing

TLS and SRTP for Skype Connect. Technical Datasheet

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Communication Systems SSL

Chapter 8. Network Security

Network Security Fundamentals

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Content Teaching Academy at James Madison University

Transport Layer Security Protocols

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Cornerstones of Security

Chapter 7: Network security

Network Security Essentials Chapter 5

Chapter 17. Transport-Level Security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Topics in Network Security

Overview. SSL Cryptography Overview CHAPTER 1

Using etoken for SSL Web Authentication. SSL V3.0 Overview

CSE 127: Computer Security. Network Security. Kirill Levchenko

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Chapter 6 CDMA/802.11i

Network Security Protocols

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

TELE 301 Network Management. Lecture 18: Network Security

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

TCP/IP Security Problems. History that still teaches

Understanding Digital Certificates and Secure Sockets Layer (SSL)

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

SSL: Secure Socket Layer

Client Server Registration Protocol

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Attack Lab: Attacks on TCP/IP Protocols

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Virtual Private Networks

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Web Security. Mahalingam Ramkumar

Web Security Considerations

Firewalls, Tunnels, and Network Intrusion Detection

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

SSL A discussion of the Secure Socket Layer

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

A S B

Communication Security for Applications

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Chapter 8 Network Security

Secure Sockets Layer

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

, ) I Transport Layer Security

How To Understand And Understand The Security Of A Key Infrastructure

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Security Protocols/Standards

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

, SNMP, Securing the Web: SSL

Savitribai Phule Pune University

Network Security. Mobin Javed. October 5, 2011

Transcription:

Georgia Tech CS 3251: Computer Networking 1 Security Protocols I Brad Reaves, PhD Student 11/21/13 (slides from Prof. Patrick Traynor) CS 3251 - Computer Networks I

Last Time Trying to prove who you are simply by saying your name is an example of...? How are MACs and Digital Signatures Different? What algorithms used to implement them? Diffie-Hellman key exchanges are vulnerable to what kind of attack? 2

Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication 8.5 Securing e-mail 8.6 Securing TCP connections: SSL 8.7 Network layer security: IPsec 8.8 Securing wireless LANs 8.9 Operational security: firewalls and IDS 3

Email Security Analysis! Before discussing what makes a protocol secure it s important to answer the question secure from what Take 3 minutes: Discuss with your neighbors Make a list: what should a secure email protocol defend against? Who is Trudy? What can she do to harm users of email? 4

Secure e-mail Alice wants to send confidential e-mail, m, to Bob. m K S. K S ( ) K S (m ) K S (m ). K S ( ) m K S K + B (. ) K B + K + B (K S ) Alice: generates random symmetric private key, K S. encrypts message with K S (for efficiency) also encrypts K S with Bob s public key. sends both K S (m) and K B (K S ) to Bob. + - Internet K + B (K S ) K B - K S K - B (. ) 5

Secure e-mail Alice wants to send confidential e-mail, m, to Bob. m K S. K S ( ) K S (m ) K S (m ). K S ( ) m K S K + B (. ) K B + K + B (K S ) + - Internet K + B (K S ) K B - K S K - B (. ) Bob: uses his private key to decrypt and recover K S uses K S to decrypt K S (m) to recover m 6

Secure e-mail (continued) Alice wants to provide sender authentication message integrity. m. K - A (. ) H( ) K Ā K - A (H(m)) K - A (H(m)) K A +. K + A ( ) H(m ) m + - Internet m compare. H( ) H(m ) Alice digitally signs message. sends both message (in the clear) and digital signature. 7

Secure e-mail (continued) Alice wants to provide secrecy, sender authentication, message integrity. m H( ) K Ā. K -. A ( ) + K - A (H(m)) K S (. ) K S m K S K + B (. ) K B + + K + B (K S ) Internet Alice uses three keys: her private key, Bob s public key, newly created symmetric key 8

Pretty good privacy (PGP) Internet e-mail encryption scheme, de-facto standard. uses symmetric key cryptography, public key cryptography, hash function, and digital signature as described. provides secrecy, sender authentication, integrity. inventor, Phil Zimmerman, was target of 3-year federal investigation. A PGP signed message: ---BEGIN PGP SIGNED MESSAGE--- Hash: SHA1! Bob:My husband is out of town tonight.passionately yours, Alice! ---BEGIN PGP SIGNATURE--- Version: PGP 5.0 Charset: noconv yhhjrhhgjghgg/12epj +lo8ge4vb3mqjhfevzp9t6n7g6m5gw2 ---END PGP SIGNATURE--- pgp.mit.edu 9

PGP: A Web of Trust Instead of relying on a CA, PGP uses social relationships to verify a key. If you know a friend of mine and they signed my key (and you can verify their signature), you are more likely to believe the key belongs to me. 10

Using PGP For Mac users, download MacGPG. Windows users should get GPG4win. Linux users can download GPG. These are all free versions of PGP based on RFC4880. From the command-line: gpg -c filename.txt (encrypt a file using a symmetric key generated from a passphrase) gpg -e filename.txt (encrypt a file using the public key of the intended reader). 11

Public Key 12

Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message Integrity 8.4 End point Authentication 8.5 Securing e-mail 8.6 Securing TCP connections: SSL 8.7 Network layer security: IPsec 8.8 Securing wireless LANs 8.9 Operational security: firewalls and IDS 13

How do we get secure communications? We now have an idea of how cryptographic algorithms work (and what they try to guarantee). We also know how to ensure integrity of our communications. How do we actually use this stuff? Are we using it on a daily basis? 14

Secure Sockets Layer (SSL) aka TLS Provides transport layer security to any TCP-based application using SSL services. e.g., between Web browsers, servers for e-commerce (https) security services: server authentication, data encryption, client authentication (optional) TCP Application TCP Application SSL sublayer TCP SSL socket socket IP IP TCP API TCP enhanced with SSL 15

SSL: Three Phases 1. Handshake: Bob establishes TCP connection to Alice TCP SYN TCP SYNACK authenticates Alice via CA signed certificate SSL hello TCP ACK creates, encrypts (using Alice s public key), sends master secret key to Alice nonce exchange not shown create Master Secret (MS) certificate K A + (MS) decrypt using K A - to get MS 16

SSL: Three Phases 2. Key Derivation: Alice, Bob use shared secret (MS) to generate 4 keys: EB: Bob->Alice data encryption key EA: Alice->Bob data encryption key MB: Bob->Alice MAC key MA: Alice->Bob MAC key encryption and MAC algorithms negotiable between Bob, Alice why 4 keys? 17

SSL: Three Phases 3. Data Transfer TCP byte stream b 1 b 2 b 3 b n block n bytes together d. H( ) M B compute MAC d d H(d) H(d). H( ) E B SSL seq. # encrypt d, MAC, SSL seq. # SSL record format Type Ver Len d H(d) unencrypted encrypted using E B 18

What does that little lock mean? What does this lock actually mean? Are you secure? It really depends... Some websites used negotiate the use of the null cipher. So even with the lock icon, no crypto was being used. Attackers can launch SSL downgrade attacks against older browsers and old versions have known attacks Commonly misspelled websites might make you think you are connected securely to the right page. 19

Steve Bellovin Long time researcher at AT&T Research/Bell Labs. Member of the National Academy of Engineering Professor at Columbia University Credited as one of the Fathers of the firewall One of the originators of USENET The precursor to World Wide Web, allowed people to view and exchange content in newsgroups. 20

Security Problems in the TCP/IP Protocol Suite This is one of the classics of Network Security literature. Although written in 1989, many of the protocols discussed here are still widely used today. This is a nice overview of why security research is necessary. It is hard to build secure systems when the infrastructure supporting them was never designed to consider security. Attacks on specific implementations not discussed. Three general attack categories: TCP/IP Attacks, Routing Attacks, and Abusing Common Protocols. 21

TCP/IP Sequence Number Guessing TCP connects are established by the 3-way handshake Each client keeps a unique sequence number to order packets and prevent against loss. An attacker can spoof an IP address, but attempting to carry out a conversation when you don t know the correct responses is hard. If you can guess the response (SEQNUM), you can establish a connection! 22

How This Attack Works C SYN, ACK, ACK, SYN, SeqA+1, SeqA+1, SeqB+1 SeqB S C A SYN, ACK, SeqA+1, SeqB ACK, SeqA+1, SeqB+1 SYN, SeqA S 23

What Can You Do With This? On Christmas Day 1994, Kevin Mitnick used this attack to break into Tsuomo Shimamura s machine. Claimed to be from a trusted IP address, added himself to rhosts file, gained full access. Unfortunately for Mitnick, Tsutomu Shimomura caught him in the act (saw the logs). Ultimately, this incident helped the FBI track down and arrest Mitnick in Raleigh, NC. 24

Defense Against SNG Attack Make the initial sequence number hard to guess. Most systems now use a PRNG, but they re not great. Most implementations of TCP will accept RST packets with a sequence number anywhere within their window For a 32Kb window, 2 17 attempts is enough to get the SEQ close enough that a victim will accept it and tear down the connection Actively monitor your logs. But you need to be on top of this as an attacker is likely to delete or modify them once they get access. 25

Class Exercise One way to make such attacks far more difficult is to make guessing an initial sequence number totally improbable to guess. Take 5 minutes and modify the 3-way handshake of TCP to make it more resistant to such an attack. 26

Real-World Routing Attacks Bellovin talks about RIP and EGP BGP is vulnerable to similar attacks AS7007 (1997) YouTube hijacked by Pakistan (2008) China Telecom (2010) 27

ICMP Attacks Examples ICMP Redirect ICMP Destination Unreachable ICMP Time to Live Exceeded Defense Filtering 28

Other Protocols Finger Directory-like service. Can this help with identity theft? Password cracking? Electronic Mail We have already shown how to spoof email. Until recently, even retrieving mail from your server used cleartext passwords. 29

Other Protocols (2) DNS Sequence number guessing and response spoofing thought to be potentially serious attacks in 1989. These are major issues today... why? ARP A local attacker could similarly siphon off all your traffic. 30

General Defenses Authentication Authentication by assertion repeatedly gets us into trouble. Why do we still do it? Encryption End-to-End Link-layer 31

Conclusions IP addresses are meaningless as an authentication token. Use random numbers whenever knowledge of that number may open your system to attack. The core of the network is based on algorithms that fall over pretty easily, making the Internet very fragile. 32

Next Time Read Chapter 8.7-8.9! Project 4 is looming... Remember, not being able to get it to work the night before it is due is a problem of bad time management. 33