1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 11 Nov 15, 2007 Network Security, Authentication, Identity.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

IPSec.
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 8 Nov 2, 2010 Key Management Network Security.
Chapter 5 Network Security Protocols in Practice Part I
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
K. Salah1 Security Protocols in the Internet IPSec.
Courtesy of Professors Chris Clifton & Matt Bishop INFSCI 2935: Introduction of Computer Security1 October 30, 2003 Network Security Assurance Lecture.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Csci5233 Computer Security1 Bishop: Chapter 12 Authentication.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security
1 IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Lecture 2 Sept 4, 2013 Key Management Network Security.
1 Chapter 11: Authentication Basics Passwords. 2 Establishing Identity Authentication: binding of identity to subject One or more of the following –What.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Digital Certificates (X.509, OpenPGP), Security Protocols James Joshi, Associate Professor University of Pittsburgh.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1IS 2150/TEL 2810: Introduction of Computer Security November 8, 2005 Network Security Authentication & Identity Lecture 9.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
IP Security
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
IPSecurity.
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IPSec IPSec is communication security provided at the network layer.
Authentication.
Virtual Private Networks (VPNs)
NET 536 Network Security Lecture 5: IPSec and VPN
Virtual Private Networks (VPNs)
Presentation transcript:

1 IS 2150 / TEL 2810 Introduction to Security James Joshi Assistant Professor, SIS Lecture 11 Nov 15, 2007 Network Security, Authentication, Identity

2 Objectives Understand/explain the issues related to, and utilize the techniques Security at different levels of OSI model Privacy Enhanced IPSec Misc. Authentication and identification password

3 ISO/OSI Model Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Network Layer Data Link Layer Physical Layer Peer-to-peer Flow of bits

4 Protocols End-to-end protocol Communication protocol that involves end systems with one or more intermediate systems Intermediate host play no part other than forwarding messages Example: telnet Link protocol Protocol between every directly connected systems Example: IP – guides messages from a host to one of its immediate host Link encryption Encipher messages between intermediate host Each host share a cryptographic key with its neighbor Attackers at the intermediate host will be able to read the message End-to-end encryption Example: telnet with messages encrypted/decrypted at the client and server Attackers on the intermediate hosts cannot read the message

5 Electronic Mail UA interacts with the sender UA hands it to a MTA MTA UA MTA UA MTA UA Message Transfer Agents User Agent Attacker can read on any of the computer with MTA Forgery possible

6 Security at the Application Layer: Privacy-enhanced Electronic Mail Study by Internet Research Task Force on Privacy or Privacy Research Group to develop protocols with following services Confidentiality, by making the message unreadable except to the sender and recipients Origin authentication, by identifying the sender precisely Data integrity, by ensuring that any changes In the message are easy to detect Non-repudiation of the origin (if possible)

7 Design Considerations/goals for PEM Not to redesign existing mail system protocols To be compatible with a range of MTAs, UAs and other computers To make privacy enhancements available separately so they are not required To enable parties to use the protocol to communicate without prearrangement

8 PEM Basic Design Defines two keys Data Encipherment Key (DEK) to encipher the message sent Generated randomly Used only once Sent to the recipient Interchange key: to encipher DEK Must be obtained some other way than through the message

9 Protocols Confidential message (DEK: k s ) Authenticated, integrity-checked message Enciphered, authenticated, integrity checked message AliceBob {m}k s || {k s }k Bob AliceBob m || {h(m)}k Alice AliceBob ??

10 ISO/OSI Model IPSec: Security at Network Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Network Layer Data Link Layer Physical Layer Peer-to-peer Flow of bits

11 IPSec Protocols Authentication header (AH) protocol Message integrity Origin authentication Anti-replay services Encapsulating security payload (ESP) protocol Confidentiality Message integrity Origin authentication Anti-replay services Internet Key Exchange (IKE) Exchanging keys between entities that need to communicate over the Internet What authentication methods to use, how long to use the keys, etc.

12 Cases where IPSec can be used Internet/ Intranet End-to-end security between two hosts Internet/ Intranet SG End-to-end security between two security gateways

13 Cases where IPSec can be used (2) Internet SG Intranet Internet SG Intranet End-to-end security between two hosts + two gateways End-to-end security between two hosts during dial-up

14 Security Association (SA) Unidirectional relationship between peers Specifies the security services provided to the traffic carried on the SA Security enhancements to a channel along a path Identified by three parameters: IP Destination Address Security Protocol Identifier Specifies whether AH or ESP is being used Security Parameters Index (SPI) Specifies the security parameters associated with the SA

15 Security Association (2) Each SA uses AH or ESP (not both) If both required two SAs are created Multiple security associations may be used to provide required security services A sequence of security associations is called SA bundle Example: We can have an AH protocol followed by ESP or vice versa

16 Security Association Databases IP needs to know the SAs that exist in order to provide security services Security Policy Database (SPD) IPSec uses SPD to handle messages For each IP packet, it decides whether an IPSec service is provided, bypassed, or if the packet is to be discarded Security Association Database (SAD) Keeps track of the sequence number AH information (keys, algorithms, lifetimes) ESP information (keys, algorithms, lifetimes, etc.) Lifetime of the SA Protocol mode MTU et.c.

17 IPSec Modes Two modes Transport mode Encapsulates IP packet data area IP Header is not protected Protection is provided for the upper layers Usually used in host-to-host communications Tunnel mode Encapsulates entire IP packet in an IPSec envelope Helps against traffic analysis The original IP packet is untouched in the Internet

18 Authentication Header (AH) Next header Identifies what protocol header follows Payload length Indicates the number of 32-bit words in the authentication header Security Parameters Index Specifies to the receiver the algorithms, type of keys, and lifetime of the keys used Sequence number Counter that increases with each IP packet sent from the same host to the same destination and SA Authentication Data SequenceNumber Security Parameters Index Payload length Next Header parameters

19 Preventing replay Using 32 bit sequence numbers helps detect replay of IP packets The sender initializes a sequence number for every SA Receiver implements a window size of W to keep track of authenticated packets Receiver checks the MAC to see if the packet is authentic

20 Transport Mode AH Internet/ Intranet Original IP Header TCP Header Payload Data Without IPSec Original IP Header TCP Header Payload Data Auth Header Next Header Payload Length SPI Seq. No. MAC Authenticate IP Payload

21 Tunnel Mode AH Internet SG Intranet Original IP Header TCP Header Payload Data Without IPSec Next Header Payload Length SPI Seq. No. MAC Original IP Header TCP Header Payload Data Auth Header New IP Header Authenticate Entire IP Packet

22 ESP – Encapsulating Security Payload Creates a new header in addition to the IP header Creates a new trailer Encrypts the payload data Authenticates the security association Prevents replay Security Parameters Index (SPI) – 32 bits Sequence Number 32 bits Payload Data Padding/ Next Header Authentication Data

23 Details of ESP Security Parameters Index (SPI) Specifies to the receiver the algorithms, type of keys, and lifetime of the keys used Sequence number Counter that increases with each IP packet sent from the same host to the same destination and SA Payload Application data carried in the TCP segment Padding 0 to 255 bytes of data to enable encryption algorithms to operate properly To mislead sniffers from estimating the amount of data transmitted Authentication Data MAC created over the packet

24 Transport mode ESP Original IP Header TCP Header Payload Data Without IPSec Original IP Header TCP Header Payload Data ESP Header ESP Trailer ESP Auth Encrypted Authenticated

25 Tunnel mode ESP Original IP Header TCP Header Payload Data Without IPSec Encrypted Authenticated Original IP Header TCP Header Payload Data ESP Header ESP Trailer ESP Auth New IP Header

26 Perimeter Defense Organization system consists of a network of many host machines – the system is as secure as the weakest link Use perimeter defense Define a border and use gatekeeper (firewall) If host machines are scattered and need to use public network, use encryption Virtual Private Networks (VPNs)

27 Perimeter Defense Is it adequate? Locating and securing all perimeter points is quite difficult Less effective for large border Inspecting/ensuring that remote connections are adequately protected is difficult Insiders attack is often the most damaging

28 Firewalls Total isolation of networked systems is undesirable Use firewalls to achieve selective border control Firewall Is a configuration of machines and software Limits network access Come “for free” inside many devices: routers, modems, wireless base stations etc. Alternate: a firewall is a host that mediates access to a network, allowing and disallowing certain type of access based on a configured security policy

29 What Firewalls can’t do They are not a panacea Only adds to defense in depth If not managed properly Can provide false sense of security Cannot prevent insider attack Firewalls act at a particular layer(s)

30 Virtual Private Networks What is it? It is a private network that is configured within a public network A VPN “appears” to be a private national or international network to a customer The customer is actually “sharing” trunks and other physical infrastructure with other customers Security?

31 What is a VPN? (2) A network that supports a closed community of authorized users There is traffic isolation Contents are secure Services and resources are secure Use the public Internet as part of the virtual private network Provide security! Confidentiality and integrity of data User authentication Network access control IPSec can be used

32 Tunneling in VPN

33 Authentication and Identity

34 What is Authentication? Authentication: Binding identity and external entity to subject How do we do it? Entity knows something (secret) Passwords, id numbers Entity has something Badge, smart card Entity is something Biometrics: fingerprints or retinal characteristics Entity is in someplace Source IP, restricted area terminal

35 Authentication System: Definition A: Set of authentication information used by entities to prove their identities (e.g., password) C: Set of complementary information used by system to validate authentication information (e.g., hash of a password or the password itself) F: Set of complementation functions (to generate C) f : A → C Generate appropriate c  C given a  A L: set of authentication functions l: A  C → { true, false } verify identity S: set of selection functions Generate/alter A and C e.g., commands to change password

36 Authentication System: Passwords Example: plaintext passwords A = C = alphabet* f returns argument: f(a) returns a l is string equivalence: l(a, b) is true if a = b Complementation Function Null (return the argument as above) requires that c be protected; i.e. password file needs to be protected One-way hash – function such that Complementary information c = f(a) easy to compute f -1 (c) difficult to compute

37 Passwords Example: Original Unix A password is up to eight characters each character could be one of 127 possible characters; A contains approx. 6.9 x passwords Password is hashed using one of 4096 functions into a 11 character string 2 characters pre-pended to indicate the hash function used C contains passwords of size 13 characters, each character from an alphabet of 64 characters Approximately 3.0 x strings Stored in file /etc/passwd (all can read)

38 Authentication System Goal: identify the entities correctly Approaches to protecting Hide enough information so that one of a, c or f cannot be found Make C readable only to root Make F unknown Prevent access to the authentication functions L root cannot log in over the network

39 Attacks on Passwords Dictionary attack: Trial and error guessing Type 1: attacker knows A, f, c Guess g and compute f(g) for each f in F Type 2: attacker knows A, l l returns True for guess g Counter: Difficulty based on |A|, Time Probability P of breaking in time T G be the number of guesses that can be tested in one time unit |A| ≥ TG/P Assumptions: time constant; all passwords are equally likely

40 Password Selection Random Depends on the quality of random number generator; size of legal passwords 8 characters: humans can remember only one Will need to write somewhere Pronounceable nonsense Based on unit of sound (phoneme) “Helgoret” vs “pxnftr” Easier to remember User selection (proactive selection) Controls on allowable Reasonably good: At least 1 digit, 1 letter, 1 punctuation, 1 control character Obscure poem verse

41 Password Selection Reusable Passwords susceptible to dictionary attack (type 1) Salting can be used to increase effort needed makes the choice of complementation function a function of randomly selected data Random data is different for different user Authentication function is chosen on the basis of the salt Many Unix systems: A salt is randomly chosen from Complementation function depends on the salt

42 Password Selection Password aging Change password after some time: based on expected time to guess a password Disallow change to previous n passwords Fundamental problem is reusability Replay attack is easy Solution: Authenticate in such a way that the transmitted password changes each time

43 Authentication Systems: Challenge-Response Pass algorithm authenticator sends message m subject responds with f(m) f is a secret encryption function Example: ask for second input based on some algorithm

44 Authentication Systems: Challenge-Response One-time password: invalidated after use f changes after use S/Key uses a hash function (MD4/MD5) User chooses an initial seed k Key generator calculates k 1 = h(k), k 2 = h(k 1 ) …, k n = h(k n-1 ) Passwords used in the order p 1 = k n, p 2 = k n-1, …, p n =k 1 Suppose p 1 = k n is intercepted; the next password is p 2 = k n-1 Since h(k n-1 ) = k n, the attacker needs to invert h to determine the next password

45 Authentication Systems: Biometrics Used for human subject identification based on physical characteristics that are tough to copy Fingerprint (optical scanning) Camera’s needed (bulky) Voice Speaker-verification (identity) or speaker-recognition (info content) Iris/retina patterns (unique for each person) Laser beaming is intrusive Face recognition Facial features can make this difficult Keystroke interval/timing/pressure

46 Attacks on Biometrics Fake biometrics fingerprint “mask” copy keystroke pattern Fake the interaction between device and system Replay attack Requires careful design of entire authentication system