Secure Sessions. Dave Otway. 12 November ANSA Consortium

Similar documents
Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

The Secure Sockets Layer (SSL)

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Architecture of a Distributed Object Firewall Proxy. Abstract

Chapter 17. Transport-Level Security

Chapter 10. Network Security

Network Security Technology Network Management

Compter Networks Chapter 9: Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Information Security

Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong

SSL A discussion of the Secure Socket Layer

Content Teaching Academy at James Madison University

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur

Security vulnerabilities in the Internet and possible solutions

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Midterm. Name: Andrew user id:

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Authentication Application

CSE/EE 461 Lecture 23

T Cryptography and Data Security

Web Security Considerations

Client Server Registration Protocol

COMMMUNICATING COOPERATING PROCESSES

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Secure Network Communications FIPS Non Proprietary Security Policy

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Overview. SSL Cryptography Overview CHAPTER 1

CS 356 Lecture 28 Internet Authentication. Spring 2013

z/os Firewall Technology Overview

Architecture and Design for a Secure IM -Team 04: Discovery. Carl Nayak, Swanand Abhyankar Snowvee Gonsalves Sonali Kudtarkar

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

TLS/SSL in distributed systems. Eugen Babinciuc

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

OS/390 Firewall Technology Overview

Division of Informatics, University of Edinburgh

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

VPN. Date: 4/15/2004 By: Heena Patel

Network Security. Chapter 14. Security Aspects of Mobile Communications

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 7: Network security

Tutorial 3. June 8, 2015

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

GoToMyPC Corporate Advanced Firewall Support Features

Security: Focus of Control. Authentication

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Public Key Infrastructure (PKI)

Network Security. Network Security. Security in Computer Networks

Authentication in WLAN

Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University

ISM/ISC Middleware Module

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

Secure Socket Layer. Security Threat Classifications

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Cleaning Encrypted Traffic

Chapter 7 Transport-Level Security

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Lab 7. Answer. Figure 1

Secure data storage. André Zúquete Security 1

SECURITY IN NETWORKS

WIRELESS LAN SECURITY FUNDAMENTALS

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Lecture 9 - Network Security TDTS (ht1)

OOo Digital Signatures. Malte Timmermann Technical Architect Sun Microsystems GmbH

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Network Security. HIT Shimrit Tzur-David

Security Service Specification 15

Using RADIUS Agent for Transparent User Identification

Chapter 9. IP Secure

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS

Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.

Encryption and Decryption for Secure Communication

How To Write A Network Operating System For A Network (Networking) System (Netware)

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Key Management and Distribution

CS 416: Opera-ng Systems Design

Web Security. Mahalingam Ramkumar

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Chapter 8. Network Security

Introducing Secure Data Transmission Scheme in a Heterogeneous Environment

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Communications Access Methods for SAS/CONNECT 9.3 and SAS/SHARE 9.3 Second Edition

Communication Security for Applications

T Cryptography and Data Security

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

CS 665: Computer System Security. Crypto Services. Hashing. Cryptographic Hash Functions. Information Assurance Module

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

How to Secure a Groove Manager Web Site

Transcription:

Secure Sessions Dave Otway 12 November 97 1

Progression Kamae (MoD) Secure RMI (Java) cipher and (2 level) digest sessions active labels E2S (Esprit) retrofitted (in Java) onto OrbixWeb with (2 level) digesting at application level then translated into C++ on Orbix Flexinet (ANSA) fully recursive application level digests automatically serialized or explicitly marshalled integrated with Flexinet cipher sessions 2

Securing Distributed Objects Client Supervisor Site Signer Server Back-end Servers 3

Assumptions and Principles Assume necessary and sufficient infrastructure for: strong object and process encapsulation process encapsulation is OS dependent object encapsulation is language dependent application processes being responsible for their own protection Assume emerging smart card technology Maximize transparency of mechanism Apply same principles and protocols everywhere including security service objects 4

Secure RMI Objectives Applications in total control Fully transparent engineering in conflict conflict handled by separating concerns Allow interworking with non-secured applications Allow local or remote control of policy 5

Minimal Protocol Mechanisms Mechanisms necessary and sufficient for purpose keyed digests for integrity and authentication XORed keyed digests for key distribution symmetric encryption for confidentiality (asymmetric signed digests for non-repudiation) Hash functions fixed length output faster less legal problems in commerce (COTS) 6

Secure RMI Structure Session Session Buffering Cipher Digest Digest Cipher Buffering 7

Secure RMI Engineering An application security manager added to the server Client bound to security manager instead of server use digest session to manager to open server use cipher session to access server Server application can take control or delegate to third party security servers No security parameters in server methods check access called before each method 8

Opening a Server Authorisation Authentication Security Manager Server Digest Protocol stack 9

Per Method Authorisation Authorisation Check Access Server Cipher Protocol stack 10

Protocol Properties Generalisation to client-server chains recursive protocol session keys returned to each pair of participants Overlay of authentication and delegation Symmetric call and return engineering Simplifies federation of administrative domains its just another indirection 11

Protocol Description a -> b : b -> c : Da = [a, b, Na, --]Ka Db = [b, c, Nb, Da]Kb c -> k : [c, k, Nc, Db]Kc k -> c : [c, b, Nc, Nb, Kcb <c,b,nc,nb>kc, Eb]Kcb c -> b : Eb = [b, c, Nb, Nc, Kbc <b,c,nb,nc>kb, [b, a, Nb, Na, Kba <b,a,nb,na>kb,ea]kba]kbc b -> a : Ea = [a, b, Na, Nb, Kab <a,b,na,nb>ka, --]Kab 12

Lessons Learned from Kamae it is feasable to transparently security a remote interface but its hard to nest and unnest digests as byte arrays and its very hard to add and extract applications arguments it is possible to almost hide the distinction between digest and cipher references but not between them and clear references the application managers have to be aware of digest and cipher sessions 13

Conclusion Do digesting and session management at the application level (in management classes alongside the client and server classes) 14

Migration to OrbixWeb OrbixWeb has 3 protocol hooks (But they don t all work with IIOP) Transformers only access to byte stream (encryption) only other info is remote host name and direction Per-Object Filters only on server side (per method authorization?) Per-Process Filters (digesting) 8 versions pre or post marshalled client or server request or reply 15

encrypt in the transformers Approach cipher sessions indexed by remote host name if session found then en/de-cipher else pass in clear (for authentication digests) add random IV to each cipher message authenticate, authorize and distibute session keys in application security managers explicit marshalling of digests into byte arrays explicit session setup 16

Invocation Path client outrequestpremarshal client transformer outgoing server transformer incoming server inrequestpremarshal server application server outreplypremarshal server transfomer outgoing client transformer incoming client inreplypremarshal 17

Problems 1) an attacker can invoke a server in clear 2) if a client s host machines are behind an IP address translating firewall a second client s transformer would transmit a digest request in clear but server s transformer would decipher it 3) server needs to call back-end servers in clear 18

Lessons Learned from E2S implement sessions for all remote calls add session IDs to all messages plaintext, ciphertext and digested can then have different session key for each user provide digest sessions as well as cipher sessions for ensuring integrity when encryption is not allowed or cooperation with the encryption mechanism is difficult provide flexible application level digests which: can be automatically serialized or explicitly marshalled can be nested to any depth can enclose application data in both directions 19

Flexinet sessions are fully engineered into the protocol stack CipherSession & DigestSession are subclasses of Session no other security engineering in the protocol stack fully nested application level protocol for authentication, authorization and key distribution using keyed digests using classes which can be serialized or explicitly marshalled and can carry application data in both directions explicit binding of CipherSession & DigestSession interfaces bound to a CipherSession or DigestSession cannot be bound to any other type of session 20