Network Security Protocols: Analysis methods and standards



Similar documents
Security Analysis of Network Protocols. John Mitchell Stanford University

CS 356 Lecture 29 Wireless Security. Spring 2013

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Course organization. Security Analysis of Network Protocols. Cryptographic Protocols. Computer Security. Security Analysis. Correctness vs Security

ANALYSIS OF SECURITY PROTOCOLS FOR WIRELESS NETWORKS

1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

Authenticity of Public Keys

How To Use Kerberos

Protocol Rollback and Network Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Formal Methods in Security Protocols Analysis

Web Security Considerations

Security Analysis on Wireless LAN protocols

Network Security Protocols

Wireless security. Any station within range of the RF receives data Two security mechanism

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

WLAN w Technology

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Q: Why security protocols?

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

IEEE Wireless LAN Security Overview

Network Security Standards. Key distribution Kerberos SSL/TLS

chap18.wireless Network Security

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Client Server Registration Protocol

Chapter 16: Authentication in Distributed System

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Chapter 6 CDMA/802.11i

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Secure Sockets Layer (SSL) / Transport Layer Security (TLS)

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

Communication Security for Applications

Security in IEEE WLANs

Take-home points. Distributed Systems Security II. Remember digital signatures. Today: Auth protocols

Wireless communications systems security. Alexey Fomin, SUAI

Chapter 3. Network Domain Security

WiFi Security: WEP, WPA, and WPA2

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Chapter 7: Network security

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Cryptography and network security CNET4523

WLAN Security. Giwhan Cho Distributed/Mobile Computing System Lab. Chonbuk National University

Chapter 7 Transport-Level Security

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

COSC 472 Network Security

Authentication Applications

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Authentication Types. Password-based Authentication. Off-Line Password Guessing

IT-Sicherheit: Sicherheitsprotokolle. Wireless Security. (unter Benutzung von Material von Brian Lee und Takehiro Takahashi)

Network Security Protocols

Cryptography and Network Security

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

CS 4803 Computer and Network Security

Kerberos. Guilin Wang. School of Computer Science, University of Birmingham

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

State of Kansas. Interim Wireless Local Area Networks Security and Technical Architecture

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

TELE 301 Network Management. Lecture 18: Network Security

What is network security?

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

Attestation and Authentication Protocols Using the TPM

Chapter 2 Wireless Networking Basics

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Authentication Application

CSCI 454/554 Computer and Network Security. Final Exam Review

Wireless Sensor Networks Chapter 14: Security in WSNs

NIST PKI 06: Integrating PKI and Kerberos (updated April 2007) Jeffrey Altman

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

A framework towards adaptable and delegated end-to-end transport-layer security for Internet-integrated Wireless Sensor Networks

Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey

Communication Systems SSL

Authentication in WLAN

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Basic network security threats

Overview. SSL Cryptography Overview CHAPTER 1

Network Security Fundamentals

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Network Security Protocols

Kerberos. Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, BC. From Italy (?).

Transcription:

Network Security Protocols: Analysis methods and standards John Mitchell Stanford University Joint work with many students, postdocs, collaborators

TRUST: Team for Research in Ubiquitous Secure Technologies NSF Science and Technology Center Multi-university multi-year effort Research, education, outreach http://trust.eecs.berkeley.edu/

TRUST Research Vision Critical Infrastructure Privacy Societal Challenges Computer and Network Security TRUST will address social, economic and legal challenges Electronic Medical Records Identity Theft Project Integrative Efforts Secure Networked Embedded Systems Specific systems that represent these social challenges. Trusted Platforms Applied Crypto - graphic Protocols Software Security Complex Inter - Dependency mod. Secure Network Embedded Sys Model -based Security Integration. Component Technologies Econ., Public Pol. Soc. Chall. Forensic and Privacy Secure Info Mgt. Software Tools Component technologies that will provide solutions Network Security Secure Compo - nent platforms HCI and Security 3

Network security protocols Primarily key management Cryptography reduces many problems to key management Also denial-of-service, other issues Hard to design and get right People can do an acceptable job, eventually Systematic methods improve results Practical case for software verification Even for standards that are widely used and carefully reviewed, automated tools find flaws 4

Recent and ongoing protocol efforts Wireless networking authentication 802.11i improved auth for access point 802.16e metropolitan area networks Simple config setting up access point Mobility Mobile IPv6 update IP addr to avoid triangle routing VoIP SIP call referral feature, other issues Kerberos PKINIT public-key method for cross-domain authentication IPSec IKEv1, JFK, IKEv2 improved key management 5

Mobile IPv6 Architecture Mobile Node (MN) Direct connection via binding update Corresponding Node (CN) Home Agent (HA) Authentication is a requirement Early proposals weak 6

7 Wireless Authentication

802.11i Protocol Supplicant UnAuth/UnAssoc Auth/Assoc 802.1X UnBlocked No PTK/GTK Key 802.11 Association EAP/802.1X/RADIUS Authentication MSK 4-Way Handshake Group Key Handshake 8 Data Communication

Needham-Schroeder Protocol { A, NonceA } Kb A { NonceA, NonceB } { NonceB} Kb Ka B Result: A and B share two private numbers not known to any observer without Ka -1, Kb -1 9

Anomaly in Needham-Schroeder [Lowe] A { A, Na } { Na, Nb } Ke Ka E { Nb } Ke 10 Evil agent E tricks honest A into revealing private key Nb from B. Evil E can then fool B. { Na, Nb } Ka B { A, Na } Kb

Needham-Schroeder Lowe { A, NonceA } Kb A { NonceA, B, NonceB } { NonceB} Kb Ka B 11 Authentication? Secrecy? Replay attack Forward secrecy? Denial of service? Identity protection?

Explicit Intruder Method Informal Protocol Description Formal Protocol Intruder Model Find error Analysis Tool 12

Run of protocol A Initiate Respond B Attacker C D 13 Correct if no security violation in any run

Automated Finite-State Analysis Define finite-state system Bound on number of steps Finite number of participants Nondeterministic adversary with finite options Pose correctness condition Can be simple: authentication and secrecy Can be complex: contract signing Exhaustive search using verification tool Error in finite approximation Error in protocol No error in finite approximation??? 14

State Reduction on N-S Protocol 1000000 100000 10000 1000 100 10 1 1706 980 58 1 init 1 resp 514550 155709 17277 6981 3263 222 2 init 2 init 1 resp 2 resp Base: hand optimization of model CSFW: eliminate net, max knowledge Merge intrud send, princ reply 15

CS259 Term Projects - 2006 Security Analysis of OTRv2 Onion Routing 802.16e Multicast- Broadcast Key Distribution Protocols Formalization of HIPAA Analysis of ZRTP Short-Password Key Exchange Protocol Security analysis of SIP MOBIKE - IKEv2 Mobility and Multihoming Protocol Analysis of the IEEE 802.16e 3-way handshake Analysis of Octopus and Related Protocols 16 http://www.stanford.edu/class/cs259/

CS259 Term Projects - 2004 ikp protocol family Electronic voting XML Security IEEE 802.11i wireless handshake protocol Secure Ad-Hoc Distance Vector Routing Onion Routing An Anonymous Fair Exchange E-commerce Protocol Electronic Voting Key Infrastructure Secure Internet Live Conferencing Windows file-sharing protocols 17 http://www.stanford.edu/class/cs259/www04/

802.11i Protocol Supplicant UnAuth/UnAssoc Auth/Assoc 802.1X UnBlocked No PTK/GTK Key 802.11 Association EAP/802.1X/RADIUS Authentication MSK 4-Way Handshake Group Key Handshake 18 Data Communication

Changhua He Wireless Threats Passive Eavesdropping/Traffic Analysis Easy, most wireless NICs have promiscuous mode Message Injection/Active Eavesdropping Easy, some techniques to gen. any packet with common NIC Message Deletion and Interception Possible, interfere packet reception with directional antennas Masquerading and Malicious AP Easy, MAC address forgeable and s/w available (HostAP) Session Hijacking Man-in-the-Middle Denial-of-Service: cost related evaluation 19

4-Way Handshake Blocking AA, ANonce, sn, msg1 PTK Derived SPA, SNonce, SPA RSN IE, sn, msg2, MIC PTK Derived AA, ANonce, AA RSN IE, GTK, sn+1, msg3, MIC SPA, sn+1, msg4, MIC AA, ANonce, sn, msg1 20 PTK confirmed 802.1X Unblocked PTK confirmed 802.1X Unblocked

Countermeasures Random-Drop Queue Randomly drop a stored entry if the queue is full Not so effective Authenticate Message 1 Use the share PMK; must modify the packet format Reuse supplicant nonce Reuse SNonce, derive correct PTK from Message 3 Performance degradation, more computation in supplicant Combined solution Supplicant reuses SNonce Store one entry of ANonce and PTK for the first Message 1 If nonce in Message 3 matches the entry, use PTK directly Eliminate memory DoS, only minor change to algorithm Adopted by TGi 21

Summary of larger study ATTACK security rollback reflection attack attack on Michael countermeasures RSN IE poisoning 4-way handshake blocking SOLUTIONS supplicant manually choose security; authenticator restrict pre-rsna to only insensitive data. each participant plays the role of either authenti-cator or supplicant; if both, use different PMKs. cease connections for a specific time instead of re-key and deauthentication; update TSC before MIC and after FCS, ICV are validated. Authenticate Beacon and Probe Response frame; Confirm RSN IE in an earlier stage; Relax the condition of RSN IE confirmation. adopt random-drop queue, not so effective; authenticate Message 1, packet format modified; re-use supplicant nonce, eliminate memory DoS. 22

Model checking vs proof Finite-state analysis Attacks on model Attack on protocol Formal proof Proof in model No attack using only these attacker capabilities Finite state analysis assumes small number of principals, formal proofs do not need these assumptions 23

Protocol composition logic Protocol Honest Principals, Attacker 24 Private Data Logic has symbolic and computational semantics Send Receive Alice s information Protocol Private data Sends and receives

802.11i correctness proof in PCL EAP-TLS Between Supplicant and Authentication Server Authorizes supplicant and establishes access key (PMK) 4-Way Handshake Between Access Point and Supplicant Checks authorization, establish key (PTK) for data transfer Group Key Protocol AP distributes group key (GTK) using KEK to supplicants AES based data protection using established keys 25 Formal proof covers subprotocols 1, 2, 3 alone and in various combinations

SSL/TLS ClientHello ServerHello, [Certificate], [ServerKeyExchange], [CertificateRequest], ServerHelloDone C [Certificate], ClientKeyExchange, [CertificateVerify] switch to negotiated cipher Finished S switch to negotiated cipher Finished 26

Theorems: Agreement and Secrecy Client is guaranteed: there exists a session of the intended server this server session agrees on the values of all messages all actions viewed in same order by client and server there exists exactly one such server session 27 Similar specification for server

Composition All necessary invariants are satisfied by basic blocks of all the sub-protocols The postconditions of TLS imply the preconditions of the 4-Way handshake The postconditions of 4-Way handshake imply the preconditions of the Group Key protocol 28

Complex Control Flows Simple Flow Complex Flow 29

Study results 802.11i provides Satisfactory data confidentiality & integrity with CCMP Satisfactory mutual authentication & key management Some implementation mistakes Security Level Rollback Attack in TSN Reflection Attack on the 4-Way Handshake Availability is a problem Simple policies can make 802.11i robust to some known DoS Possible attack on Michael Countermeasures in TKIP RSN IE Poisoning/Spoofing 4-Way Handshake Blocking Inefficient failure recovery scheme Improved 802.11i 30

Some other case studies Wireless networking 802.11i wireless access point auth 802.16e metropolitan area networking Simple config access point configuration SSL Found version rollback attack in resumption protocol Kerberos PKINIT public-key method for cross-domain authentication IPSec IKEv1, JFK, IKEv2 improved key management Kerberos Mobility Mobile IPv6 update IP addr to avoid triangle rte VoIP SIP issues with call referral, currently under study OTRv2 Student project in CS259 this winter 31

{C, Ticket Kt} Ktgs 1 {C, Ticket Ks} Kv 2 32 Kerberos Protocol KDC {C} Kt S {C, Ticket Kt} Ktgs 1 Client {Ks} Kt {C, Ticket Ks} Kv 2 Service TGS Ktgs C TGS Kc Kv {Kt} Kc {C} Ks

Microsoft Security Bulletin MS05-042 Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing (899587) Published: August 9, 2005 Affected Software: Microsoft Windows 2000 Service Pack 4 Microsoft Windows XP Service Pack 1 and Microsoft Windows XP Service Pack 2 Microsoft Windows XP Professional x64 Edition Microsoft Windows Server 2003 and Microsoft Windows Server 2003 Service Pack 1 Microsoft Windows Server 2003 for Itanium-based Systems and Microsoft Windows Server 2003 with SP1 for Itanium-based Systems Microsoft Windows Server 2003 x64 Edition 33

Kerberos Project I. Cervesato, A. D. Jaggard, A. Scedrov, J.-K. Tsay, and C. Walstad Formal analysis of Kerberos 5 Several steps Detailed core protocol Cross-realm authentication Public-key extensions to Kerberos Attack on PKINIT Breaks association of client request and the response Prevents full authentication and confidentiality Formal verification of fixes preventing attack Close, ongoing interactions with IETF WG 34

Public-Key Kerberos Extend basic Kerberos 5 to use PKI Change first round to avoid long-term shared keys Originally motivated by security If KDC is compromised, don t need to regenerate shared keys Avoid use of password-derived keys Current emphasis on administrative convenience Avoid the need to register in advance of using Kerberized services This extension is called PKINIT Current version is PKINIT-29 Attack found in -25; fixed in -27 Included in Windows and Linux (called Heimdal) Implementation developed by CableLabs (for cable boxes) 35

C The Attack At time t C, client C requests a ticket for ticket server T (using nonces n 1 and n 2 ): Cert C, [t C, n 2 ] skc, C, T, n 1 I The attacker I intercepts this, puts her name/signature in place of C s: I Cert I, [t C, n 2 ] ski, I, T, n 1 K Kerberos server K replies with credentials for I, including: fresh keys k and AK, a ticket-granting ticket TGT, and K s signature over k,n 2 : (Ignore most of enc-part) I {[k, n 2 ] skk } pki, I, TGT, {AK, } k I decrypts, re-encrypts with C s public key, and replaces her name with C s: K C {[k, n 2 ] skk } pkc, C, TGT, {AK, } k I 36 I knows fresh keys k and AK C receives K s signature over k,n 2 and assumes k, AK, etc., were generated for C (not I) Principal P has secret key skp, public key pkp {msg} key is encryption of msg with key [msg] key is signature over msg with key

Fix Adopted in pk-init-27 The KDC signs k, cksum (place of k, n 2 ) k is replykey cksum is checksum over AS-REQ Easier to implement than signing C, k, n 2 Formal proof: this guarantees authentication Assume checksum is preimage resistant Assume KDC s signature keys are secret Published proof uses simplified symbolic model Cryptographically sound proofs now exist 37

Recent and ongoing protocol efforts 38 Wireless networking authentication 802.11i improved auth for access point 802.16e metropolitan area networks Simple config setting up access point Bluetooth simple pairing protocols Mobility Mobile IPv6 update IP addr to avoid triangle routing VoIP SIP call referral feature, other issues Kerberos PKINIT public-key method for cross-domain authentication Full cryptographically sound proof recently developed IPSec IKEv1, JFK, IKEv2 improved key management OTRv2 student project in CS259 this winter ZPhone??

Conclusions Protocol analysis methods Model checking is fairly easy to apply Ready for industrial use Logical proofs are feasible, can be made easier Example: Wireless 802.11i Automated study led to improved standard Deployment recommendations, more flexible error recovery Many ongoing efforts Examples: Wireless networking, VoIP, mobility Typical standardization effort takes a couple of years 39 Achievable goal: systematic methods that can be used by practicing engineers to improve network, system security

40