Project „ACH“ (Applied Crypto Hardening) www.bettercrypto.org.

Slides:



Advertisements
Similar presentations
Key Management Nick Feamster CS 6262 Spring 2009.
Advertisements

Web security: SSL and TLS
Modelling and Analysing of Security Protocol: Lecture 14 Some Real Life Protocols Tom Chothia CWI.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
Transport Layer Security (TLS) Bill Burr November 2, 2001.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
ITA, , 8-TLS.pptx 1 Internet Security 1 (IntSi1) Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications (ITA) 8 Transport.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
© 2004, The Technology Firm SSL Packet Decodes From Wikipedia, the free encyclopedia.  Secure Sockets Layer (SSL) is a cryptographic.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Encryption An Overview. Fundamental problems Internet traffic goes through many networks and routers Many of those networks are broadcast media Sniffing.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
By Swapnesh Chaubal Rohit Bhat. BEAST : Browser Exploit Against SSL/TLS Julianno Rizzo and Thai Duong demonstrated this attack.
SSH Secure Login Connections over the Internet
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
How HTTPS Works J. David Giese. Hyper Text Transfer Protocol BrowserHTTP Server GET / HTTP/1.1 HOST: edge-effect.github.io HEADERS BODY HTTP/ OK.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Secure Socket Layer (SSL)
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Private Key Algorithms RSA SSL
Www. engineersportal.in. OUTLINES Network & Network Security Need of Network Security Methods of Network Security Firewall Firewall’s Works Firewall’s.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security (CS435) Part Eight (Key Management)
TLS/SSL - How and Why PCI Flags it but why do we care? By: MadHat Unspecific.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
SEC835 Runtime authentication Secure session management Secure use of cryptomaterials.
Internet-security.ppt-1 ( ) 2000 © Maximilian Riegel Maximilian Riegel Kommunikationsnetz Franken e.V. Internet Security Putting together the.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
Ram Santhanam Application Level Attacks - Session Hijacking & Defences
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Potential vulnerabilities of IPsec-based VPN
Cryptography 1 Three methods: Symmetric key Asymmetric key Hashing.
Can SSL and TOR be intercepted? Secure Socket Layer.
David Adrian, Karthikeyan Bhargavan, etc. Presented by Eunyoung Cho.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
SSH/SSL Attacks not on tests, just for fun. SSH/SSL Should Be Secure Cryptographic operations are secure SSL uses certificates to authenticate servers.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Fixing TLS Scott Rea VP GOV/EDU Relations & Sr. PKI Architect.
Can SSL and TOR be intercepted? Secure Socket Layer.
Project „ACH“ (Applied Crypto Hardening)
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
BetterCrypto ⋅ org Applied Crypto Hardening David Durvaux Brussels, 9 th June 2014.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Project „ACH“ (Applied Crypto Hardening)
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Virtual Private Network (VPN)
Basic Network Encryption
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CS 465 TLS Last Updated: Oct 31, 2017.
Public Key Infrastructure
Basic Network Encryption
Advanced Computer Networks
Presentation transcript:

Project „ACH“ (Applied Crypto Hardening)

Motivation (Aaron)

Don‘t give them anything for free It‘s your home, you fight

TL;DR - Quickinfos Website: Git repo: Mailing list: bin/mailman/listinfo/achhttp://lists.cert.at/cgi- bin/mailman/listinfo/ach

Who? Wolfgang Breyha (uni VIE), David Durvaux (CERT.be), Tobias Dussa (KIT.edu CERT), L. Aaron Kaplan (CERT.at), Christian Mock (coretec), Daniel Kovacic (A-Trust), Manuel Koschuch (FH Campus Wien), Adi Kriegisch (VRVis), Ramin Sabet (A-Trust), Aaron Zauner (azet.org), Pepi Zawodsky (maclemon.at), New contributors: IAIK, A-Sit Aaron

Idea Do at least something against the Cryptocalypse Check SSL, SSH, PGP crypto Settings in the most common services and certificates: – Apache, Nginx, lighthttp – IMAP/POP servers (dovecot, cyrus,...) – openssl.conf – Etc. Create easy, copy & paste-able settings which are „OK“ (as far as we know) for sysadmins. Keep it short. There are many good recommendations out there written by cryptographers for cryptographers Many eyes must check this!

Contents so far Disclaimer Methods Elliptic Curve Cryptography Keylengths Random Number Generators Cipher suites – general overview & how to choose one Recommendations on practical settings Tools Links Aaron

Methods How we develop this whitepaper Public review We need your review! Aaron

GENERAL REMARKS ON CRYPTO

Some thoughts on ECC Currently this is under heavy debate Trust the Math “Nothing Up My Sleeve Numbers” – eg. NIST P-256 ( ) –Coefficients generated by hashing the unexplained seed c49d e a6678e1 139d26b7 819f7e90. Might have to change settings tomorrow Most Applications only work with NIST-Curves Ramin, Daniel

Keylengths Recommended Keylengths, Hashing algorithms, etc. Currently: – RSA: >= 2048 bits – ECC: >= 256 – SHA 2+ (SHA 256,…) Ramin, Daniel

Forward Secrecy-Motivation: – Three letter agency (TLA) stores all ssl traffic – Someday TLA gains access to ssl-private key (Brute Force, Physical Force) – TLA can decrypt all stored traffic Ramin, Daniel

Perfect Forward Secrecy DHE: Diffie Hellman Ephemeral Ephemeral: new key for each execution of a key exchange process SSL private-Key only for authentication Alternative new ssl private key every x days months Pro: – Highest Security against future attacks Contra: – Elliptic Curve – Processing costs

RNGs RNGs are important. Nadia Heninger et al / Lenstra et al Entropy after startup: embedded devices

RNGs Weak RNG – Dual EC_DRBG is weak (slow, used in RSA-toolkit) – Intel RNG ? Recommendation: add System- Entropy (Network). Entropy only goes up. Tools (eg. HaveGE ) RTFM – when is the router key generated – Default Keys ? Re-generate keys from time to time Ramin, Daniel

ATTACKS Ramin, Daniel

Attacks - BEAST Browser Exploit Against SSL/TLS (BEAST) attack Predict IV of CBC – Subsequent packet use IV that is the last cyphertext block of the previous packet – Chosen Plaintext Attack (eg. Cookie-name) Ramin, Daniel

Attacks - CRIME Compression Ratio Info-leak Made Easy (CRIME) attack – Sidechannel attack – Information based on compressed size of http requests – MITM, Bruteforce: Client Javascript to Browse to … – Compressed size smaller when secretcookie correct.

CIPHER SUITES

Some general thoughts on settings General – Disable SSL 2.0 (weak algorithms) – Disable SSL 3.0 (BEAST vs IE/XP) – Enable TLS 1.0 or better – Disable TLS-Compression (SSL-CRIME Attack) – Implement HSTS (HTTP Strict Transport Security) Variant A: fewer supported clients Variant B: more clients, weaker settings Ramin, Daniel

Variant A ’EECDH+aRSA+AES256:EDH+aRSA+AES256:!SSLv3’ Compatibility: Only clients which support TLS1.2 are covered by these cipher suites (Chrome 30, Win 7 and Win 8.1, Opera 17, OpenSSL ≥ 1.0.1e, Safari 6 / iOS 6.0.1, Safari 7 / OS X 10.9) Ramin, Daniel

Variant B weaker ciphers, many clients Ramin, Daniel

Variant B: Compatibility End-of-life

Choosing your own cipher string (1) Rolling your own cipher suite string involves a trade-off between: – Compatibility (server client), vs. – Known weak ciphers/hashes/MACs – The choice ECC or not, vs. – Support by different ssl libs (gnutls, openssl,...) vs. – Different versions of ssl libs In case of ssl lib version issues: do you want to re- compile the whole server for a newer version? Be aware of these issues before choosing your own cipher suite Adi

Choosing your own cipher string (2) Complexity Multi-dimensional optimisation Consider strong alternatives to de-facto standards Potential future solution: generator for settings? Adi

PRACTICAL SETTINGS Aaron

What we have so far Web server: Apache, nginx, IIS, lighttpd Mail: Dovecot, cyrus, Postfix, Exim DBs: Mysql Proxies Aaron

What we would like to see Mail: Exchange SSH VPN: OpenVPN, IPSec, PPTP, Cisco IPSec, Juniper Ipsec, L2TP, Racoon PGP IPMI, ILO,... SIP XMPP DBs: Postgresql, Oracle, DB2, Informix Aaron

Example: Apache Selecting cipher suites: Additionally: Aaron

TESTING Aaron

How to test? - Tools openssl s_client (or gnutls-cli) ssllabs.com: checks for servers as well as clients xmpp.net sslscan SSLyze Aaron

Tools: openss s_client openssl s_client -showcerts –connect git.bettercrypto.org:443

Tools: sslscan

Tools: ssllabs Aaron

ssllabs (2)

Ssllabs (3)

WRAP-UP Aaron

Current state as of 2013/11/22 Solid basis with Variant (A) and (B) ToC is in freeze state Section „cipher suites“ still a bit messy, needs more work Section „practical settings“ – WIP. Need more input on VPNs, PGP, SSH, IPMI, SIP, XMPP, DBs Aaron

How to participate 1.We need: cryptologists, sysadmins, hackers 2.Read the document, find bugs 3.Subscribe to the mailing list 4.Understand the cipher strings Variant (A) and (B) before proposing some changes 5.If you add content to a subsection, make a sample config with variant (B) 6.Git repo is world-readable 7.We need: 1.Add content to an subsection from the TODO list  send us diffs 2.Reviewers! Aaron

Links Website: Git repo: Mailing list: bin/mailman/listinfo/achhttp://lists.cert.at/cgi- bin/mailman/listinfo/ach Aaron

Thank you! Authors: Wolfgang Breyha, David Durvaux, Tobias Dussa, L. Aaron Kaplan Manuel Koschuch, Daniel Kovacic, Adi Kriegisch Christian Mock, Ramin Sabet, Aaron Zauner Pepi Zawodsky