Lecture 10: Network Security Protocols



Similar documents
Web Security Considerations

Network Security Part II: Standards

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Secure Socket Layer. Security Threat Classifications

Chapter 7 Transport-Level Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

SECURE SOCKETS LAYER (SSL)

SECURE SOCKETS LAYER (SSL) SECURE SOCKETS LAYER (SSL) SSL ARCHITECTURE SSL/TLS DIFFERENCES SSL ARCHITECTURE. INFS 766 Internet Security Protocols

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Communication Systems SSL

Communication Security for Applications

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Network Security Essentials Chapter 5

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

CSC Network Security

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

CSC 474 Information Systems Security

Authentication Application

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

The Secure Sockets Layer (SSL)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

IP Security. Ola Flygt Växjö University, Sweden

Transport Layer Security Protocols

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

SSL Secure Socket Layer

Security vulnerabilities in the Internet and possible solutions

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Lecture 10: Communications Security

Transport Level Security

SSL Secure Socket Layer

Chapter 5: Network Layer Security

Secure Sockets Layer

Computer and Network Security

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture

Protocol Security Where?

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

How To Use Kerberos

Cryptography and network security CNET4523

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Internet Security Architecture

Protocol Rollback and Network Security

Network Security. Lecture 3

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Chapter 10. Network Security

Chapter 17. Transport-Level Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Network Security Web Security and SSL/TLS. Angelos Keromytis Columbia University

IPsec Details 1 / 43. IPsec Details

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Lecture 4: Transport Layer Security (secure Socket Layer)

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Securing IP Networks with Implementation of IPv6

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Secure Socket Layer (SSL) and Trnasport Layer Security (TLS)

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

CSCI 454/554 Computer and Network Security. Final Exam Review

Chapter 32 Internet Security

Internet Protocol Security IPSec

Authenticity of Public Keys

IPSec and SSL Virtual Private Networks

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

IP SECURITY (IPSEC) PROTOCOLS

Overview. SSL Cryptography Overview CHAPTER 1

Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng

Using etoken for SSL Web Authentication. SSL V3.0 Overview

CS 356 Lecture 28 Internet Authentication. Spring 2013

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network Security Fundamentals

TLS and SRTP for Skype Connect. Technical Datasheet

Branch Office VPN Tunnels and Mobile VPN

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Internetwork Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)


Lecture 17 - Network Security

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

Bit Chat: A Peer-to-Peer Instant Messenger

Cryptography and Network Security IPSEC

Computer security Lecture 9

Netzwerksicherheit: Anwendungen

Security Protocols/Standards

Internet Privacy Options

T Cryptography and Data Security

CS 494/594 Computer and Network Security

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Application Note: Onsight Device VPN Configuration V1.1

Transcription:

ENTS 689i Lecture 10: Network Security Protocols Part III: Network Security

Part III: Outline November 13 (Today) IP Security (IPSec) Secure Socket Layer (SSL)/Transport Layer Security (TLS) Kerberos DNS Sec Network Anonymity HW Questions 2

Network Security Protocols Cryptographic protocols are the foundation for many security services/mechanisms Network computing environment Services provided at different layers Assumptions about the network (environment) Needs of communication peers Protocols challenges Design (standards) Implementation Environment/threat assumptions 3

IP Security (IPSec) Overview IP Security Protocol Suite Address security concerns in IP (protocols/mechanisms) Eavesdropping, session hijacking, spoofing, etc Implemented at the IP layer Transparent to applications and end users (transport layer) Below transport layer (TCP, UDP) / ICMP Collection of protocols/mechanisms Confidentiality Data origin authentication Message integrity Access control Replay detection 4

IP Security Architecture Authentication Header (AH) Provides support for data integrity and authentication Encapsulating Security Protocol (ESP) Provides support for confidentiality (authentication optional) Security Associations (SA) One way relationship between sender and receiver (sec parameters) Traffic related to SAs (Security Policy Database (SPD)) Transport mode Protection for upper-layer protocols Tunnel mode Protection for entire IP datagram 5

Transport Mode Protects upper-layer protocols Payload of IP datagram (data) IPSec information added between the IP header and the remainder of the packet End-to-end communication between hosts Directly between a server and client Hdr Payload Hdr IPSec Payload 6

Tunnel Mode Protection for entire IP datagram IP datagram (header + data) Adds new outer IP header Original IP datagram intact Between intermediate nodes (security gateway) Firewall to firewall VPN Hdr Payload New Hdr IPSec Hdr Payload 7

Tunnel Mode Host Host Application Application Transport Security Gateway Router Security Gateway Transport Internet IP/IPSec Internet IP/IPSec Internet Physical Physical Physical Physical Physical 8

Security Associations Unidirectional association between peers Describes the security services applied to packets Destination address, security protocol (ESP or AH), Security Parameter Index (SPI) (32-bit) Security Association Database (SAD) Security association parameters Sequence number counter Sequence counter overflow Anti-replay window AH Information ESP Information Association lifespan (time/bytes) IPSec Protocol mode Address of opposite end 9

Security Policy Database Security Policy Database (SPD) Maps IP traffic to SAs (think firewall rules) Selectors IP and upper layer protocol field values Destination 10.1.2.3 to 10.1.2.103,port 25, apply IPSec Dictates how messages are handled Discard Security services (IPSec) Forwarding Bypass 10

Authentication Header (AH) Security services Message integrity Static fields of IP header + IP Payload (Mutable fields?) Prevents undetected modifications Data origin authentication Authenticate user or application Prevents spoofing attacks Anti-replay (optional) Leverages HMAC Integrity Check Value (ICV) MD5, SHA-1 11

Authentication Header (AH) Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 12

AH: Anti-replay Service Replay attack Attacker retransmits a copy of an authenticated packet Disrupt service/undesired consequence Sequence number Initialized to zero/incremented for each packet sent on SA (2 32-1) Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 13

AH: Transport Mode Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 14

AH: Tunnel Mode Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 15

Encapsulating Security Payload Security Services: Confidentiality Traffic flow confidentiality AH services Adds both a header and trailer Authentication does not include IP Header Authentication happens after encryption Encryption and authentication algorithms 3DES, RC5, IDEA,3IDEA, CAST, Blowfish MD5, SHA-1 16

Encapsulating Security Payload Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 17

ESP: Transport Mode Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 18

ESP: Tunnel Mode Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 19

Protocols and Modes AH ESP ESP with authentication Transport Mode Authenticates IP datagram payload and immutable fields of IP header Encrypts IP datagram payload Encrypts IP datagram payload. Authenticates IP datagram payload but not IP header. Tunnel Mode Authenticates entire inner IP datagram plus immutable fields of outer IP header Encrypts inner IP packet Encypts inner IP packet. Authenticates inner IP packet. 20

Key Management Generation and distribution of secret keys Manual: system administrator Automated: on-demand key generation Automated key management protocols Internet Security Association and Key Management Protocol (ISAKMP) Procedures (exchanges) and packet formats Establish, negotiate, modify, delete security associations Oakley Key Determination Protocol Key exchange protocol (similar to Diffie-Hellman) Internet Key Exchange Oakley + SKEME + ISAKMP 21

SSL Overview Secure Socket Layer (SSL) Developed by Netscape (www browsers/servers) SSLv3 Negotiate mutually supported encryption suite Secure reliable end-to-end communication Confidentiality, integrity, authentication Transport Layer Security (TLS) protocol Internet standardization Minor differences/backwards compatible Requires reliable end-to-end communication (TCP) User-level not operating system changes 22

SSL Architecture Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 23

Sessions and Connections SSL session Ongoing association between peers (client/server) Established by SSL Handshake Protocol Specifies cryptographic parameters Shared across multiple connections Expensive public-key crypto SSL connection Set of mechanisms used to transport data in an SSL session Describes how data is sent/received between peers (transient) Type of service Every connection is associated with one SSL session 24

SSL Session State Session identifier Chosen by server to uniquely identify active or resumable session state Peer certificate X509.v3 certificate of peer Compression method Algorithm used to compress data before encryption Cipher spec Specified encryption, hash algorithm, and crypto attributes Master secret 48 byte secret shared between client and server Is resumable Used to indicates if session can be used to initiate new connections 25

SSL Connection State Server and client random Byte sequences chosen for each connection (32-bytes) Server write MAC secret Shared key used to compute MAC on data sent by the server Client write MAC secret Shared key used to compute MAC on data sent by the client Server write key Shared key used to encrypt data sent by the server Client write key Shared key used to encrypt data sent by the client Initialization vectors Required when block cipher in CBC mode is used Sequence numbers Client/server maintain separate sequence numbers for transmitted/received messages 26

SSL Record Protocol Basic security services to higher-layer protocols (SSL connections) Confidentiality Message Integrity Application Message Fragments: 16 Kb (or smaller) Compressed (optional) Message Authentication Code (MAC) Similar to HMAC Encrypted with symmetric encryption Protocol Header Content Type, Major Version, Minor Version, Length Transmits in a TCP segment Retransmission and reliable delivery 27

SSL Record Protocol Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 28

SSL Handshake Protocol Sets up parameters for the SSL record protocol Cryptographic keys, symmetric ciphers, MAC algorithms Authenticate server/client (optional) Before any application data is transmitted Four phases Establish security capabilities Server authentication and key exchange Client authentication and key exchange Finish Messages depend on level of security 29

SSL Handshake Protocol Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 30

Phase 1: Establish Capabilities Initiate a connection and establish security capabilities Client initiates (client_hello) Version: highest supported version of SSL Random: nonce (32-bit ts /28 bytes random) Session ID: session identifier CipherSuite: client supported crypto-algorithms Compression Method: supported compression Server responds (server_hello) Selects parameters 31

Phase 2/3: Key Exchange/Authentication Key exchange methods RSA Fixed Diffie-Hellman Ephemeral Diffie-Hellman Anonymous Diffie-Hellman Verifies identity of peers Phase 2: Server Authentication/Key Exchange Sends certificate/server_key_exchange (if required) Server notifies client (server_done) Phase 3: Client Authentication/Key Exchange Verifies certificate Completes key exchange (client_key_exchange) 32

Phase 4: Finish Completes secure connection setup Notifies peer to use new cipher (change_cipher_spec) Change Cipher Spec Protocol Verifies key exchange and authentication were successful (finished) New keys, algorithms, parameters Handshake is complete! 33

SSL Change Cipher Spec Protocol Simplest SSL protocol Transferred using the SSL record protocol Handshake Protocol Indicates subsequent records will use updated cipher suite (transition) Pending state becomes fixed Message is single byte Carries the value 1 Sent by both client and server Session state is considered agreed 34

SSL Alert Protocol Signals SSL-related alerts between peers Messages (2-bytes) Severity Level (1-byte) Fatal (2): Connection immediately terminated Warning (1): Connection/security unstable Alert code (1-byte) Closure alert (close_notify) (truncation attack) Error alerts Fatal : unexpected_message, bad_record_mac, decompression_failure, handshake_failure, illegal_parameter Warning/Fatal: no_certificate, bad_certificate, unsupported_certificate, certificate_revoked, certificate_expired, certificate_unknown 35

Kerberos Kerberos Developed at MIT Version 4/ Version 5 A centralized network protocol that provides distributed authentication Trusted third-party authentication service Challenge A network environment where users at workstations need to access restricted distributed services (files, printers, etc) Services (symmetric key cryptography) Authentication Confidentiality Data integrity Authorization/Access control 36

Threats Unauthorized user gaining access to services/data Impersonation Pretend to be another user Address spoofing Eavesdropping Replay attack 37

Entities Client (C) Access services on servers throughout network Logs in to workstation (userid/password) Kerberos Authentication Server (AS) Responsible for authenticating users (all passwords) Shares a unique key with each server Issues a ticket-granting ticket (TGT) Ticking-granting Server (TGS) Verifies users authenticated by AS Grants users service-granting tickets for particular services Application Server (V) Authenticates user using service-granting ticket Provides a service (files, printers, emails, etc) 38

Kerberos Realms Networks of servers and clients under control of Authentication Server (administrative domain) Kerberos environment Kerberos server Clients UID and hashed passwords registered Application servers Secret key registered Inter-realm authentication Secret key shared between realms 39

Tickets Ticket Grants a particular authenticated client (user) the authorization to obtain a service from the specified server Types of Tickets Ticket-granting ticket Issued by Authentication Sever (AS) Authenticates client to Ticket Granting Server (TGS) Authorizes ability to ask for a service Lifetime: Once per user logon session Service-granting ticket Issued by Ticket Granting Server (TGS) Authenticates client to server Authorizes ability to use that service Lifetime: Once per type of service 40

Overview of Kerberos Client Kerberos Authentication Server Ticking-granting Server Server Realm Stallings, William. Cryptography and Network Security. New Jersey: Pearson, 2003 41

Kerberos Version 4 Messages Authentication Service Exchange, To obtain Ticket-Granting Ticket (1) C AS: ID c ID tgs TS 1 (2) AS C: E Kc [K c,tgs ID tgs TS 2 Lifetime 2 Ticket tgs ] Ticket tgs = E Ktgs [ K c,tgs ID c AD c ID tgs TS 2 Lifetime 2 ] Ticket-Granting Service Exchange: To obtain Service-Granting Ticket (3) C TGS: ID v Ticket tgs Authenticator c (4) TGS C: E Kc,tgs [K c,v ID v TS 4 Ticket v ] Authenticator c = E Kc,tgs [ID c AD c TS 3 ] Client/Server Authentication Exchange: To Obtain Service (5) C V: Ticket v Authenticator c (6) V C: E Kc,v [TS 5 +1] Ticket v = E Kv [ K c,v ID c AD c ID v TS 4 Lifetime 4 ] Authenticator c = E Kc,v [ID c AD c TS 5 ] 42

Kerberos Version 5 Limitations of version 4 Environmental shortcomings Encryption algorithms, IP dependence, byte ordering, ticket lifetimes, authentication forwarding, inter-realm authentication Technical deficiencies Unnecessary encryption, PCBC CBC, subsession key, password attacks 43

Domain Name Service (DNS) Associates host names and IP addresses Forward record: host name IP address Reverse record: IP address host name Data is distributed (hierarchical: root servers) Caching Vulnerabilities: Denial of service Information disclosure (zone transfers) DNS cache poisoning DNS Spoofing (authoritative) Malware 44

DNS Resolving Default DNS Hosts Denial of Service root Resolver www.umd.edu? 128.8.237.77 Local Name Server Cache Poison umd umd.edu 45

DNSSec Domain Name System Security Extensions (DNSSEC) Leverages public key cryptography (digital signatures) Authenticate servers DNS zone signs its data with private key (offline) Public keys are published in DNS Provides to clients (resolvers) Data origin authentication (authoritative source) Data integrity (not been modified) Authenticated denial of existence Digitally sign query answers DNS resource record (A, MX. PTR) 46

DNSSec Issues Public key storage? Key management Updating keys Information leak Zone enumeration (NSEC3) Secures traffic to local name server Failed validation? Does not address Confidentiality Availability 47

Network Anonymity Protect identity/data association (links) Shield our identity within a group of entities Why would someone want anonymity? Internet censorship Freedom of speech (journalists, whistleblowers, political dissidents) Protects privacy (medical, financial, etc) Negatives ISPs, marketers, etc Criminal attribution (attacks, contraband) Network Anonymity Anonymous Mailers (remailers) Anonymous Routing 48

The Onion Router (TOR) The Onion Router (TOR) Low latency anonymous Internet connections http://www.torproject.org/ Client (Onion Proxy) Transport layer (TCP) (SOCKS) Web browsing, IRC, instant messaging Onion routers Distributed overlay network Virtual circuit Directory servers Sender chooses random sequence of routers Layered cryptography (fixed sized cells) 49

The Onion Router (TOR) K 2 Servers Client R 1 R 2 R 3 K 4 K 2 K 6 Symmetric Keys R 4 R 5 R 6 K 4 K 6 Exit Node K 4 K2 K 6 50

TOR Issues Out of band leaks DNS JavaScript/Flash errors (application layer) Traffic analysis Global passive adversary Enter/exit nodes Delay watermarking (Timing) Congestion (Volume) Exit node eavesdropping Anonymity security Intercept usernames and passwords (2007) Routing Optimizations (adaptation) 51

References Cryptography and Network Security William Stallings Computer Security: Art and Science Matt Bishop Information Security Cristina Nita-Rotaru Security in Computing Charles P. Pfleeger and Shari Lawrence Pfleeger Network Security Charlie Kaufman, Radia Perlman, and Mike Speciner 52