Project „ACH“ (Applied Crypto Hardening) www.bettercrypto.org.

Slides:



Advertisements
Similar presentations
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Advertisements

17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
COMP043-Cryptology Week 4 – Certs and Sigs. Digital Signatures Digital signatures provide –Integrity –Authenticity and –Non-repudiation How do they work?
CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
Bradley Cowie, Barry Irwin and Richard Barnett Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING.
Securing Network Communication. 2 Security Issues in Communication Privacy  Anyone can see content Integrity  Someone might alter content Authentication.
Introduction to PKI, Certificates & Public Key Cryptography Erwan Lemonnier.
A Survey of WAP Security Architecture Neil Daswani
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
© 2004, The Technology Firm SSL Packet Decodes From Wikipedia, the free encyclopedia.  Secure Sockets Layer (SSL) is a cryptographic.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
 Key exchange o Kerberos o Digital certificates  Certificate authority structure o PGP, hierarchical model  Recovery from exposed keys o Revocation.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
FIT3105 Smart card based authentication and identity management Lecture 4.
Dr. Sarbari Gupta Electrosoft Services Tel: (703) Security Characteristics of Cryptographic.
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
By Swapnesh Chaubal Rohit Bhat. BEAST : Browser Exploit Against SSL/TLS Julianno Rizzo and Thai Duong demonstrated this attack.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
Course 201 – Administration, Content Inspection and SSL VPN
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University MANAGEMENT, PROCESSING AND.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Security in WAP Sanket Naik, Ameya Varde CS590F Fall 2000.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
SSL/TLS after DigiNotar and BEAST
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
Russian cryptographic algorithms (GOST) in Cryptographic Message Syntax and S/MIME Grigory Chudov CRYPTO-PRO, Russia draft-leontiev-cryptopro-cpcms-00.txt.
Cryptography and Network Security (SSL)
TLS/SSL - How and Why PCI Flags it but why do we care? By: MadHat Unspecific.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 3: Securing TCP.
Logjam: new dangers for secure protocols Dmitry Belyavskiy, TCI ENOG 9, Kazan, June 9-10, 2015.
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
Topic 14: Secure Communication1 Information Security CS 526 Topic 14: Key Distribution & Agreement, Secure Communication.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
David Adrian, Karthikeyan Bhargavan, etc. Presented by Eunyoung Cho.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Course web page: ECE 646 Cryptography and Computer Network Security ECE web page  Courses  Course web pages  ECE 646.
Cryptography and Network Security Chapter 16 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Network and Internet Security Prepared by Dr. Lamiaa Elshenawy
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Web Security. Introduction Webserver hacking refers to attackers taking advantage of vulnerabilities inherent to the web server software itself These.
A Cross-Protocol Attack on the TLSProtocol Nikos Mavrogiannopoulos, Frederik Vercauteren, VesselinVelichkov, Bart Preneel. Presented by: Nitin Subramanian.
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Russian cryptographic algorithms (GOST) in Internet X.509 Public Key Infrastructure Grigory Chudov Crypto-Pro Ltd., Russia draft-leontiev-cryptopro-cppk-00.txt.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training What’s New in Fireware v
Project „ACH“ (Applied Crypto Hardening)
Fixing TLS Scott Rea VP GOV/EDU Relations & Sr. PKI Architect.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Project „ACH“ (Applied Crypto Hardening)
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Cryptography CSS 329 Lecture 13:SSL.
BetterCrypto ⋅ org Applied Crypto Hardening David Durvaux Brussels, 9 th June 2014.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Page 1 of 17 M. Ufuk Caglayan, CmpE 476 Spring 2000, SSL and SET Notes, March 29, 2000 CmpE 476 Spring 2000 Notes on SSL and SET Dr. M. Ufuk Caglayan Department.
Redmond Protocols Plugfest 2016 The role of the Message Analyzer parsers and network captures Windows Protocols Overview Documents Althea Champagnie, Senior.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Security at the Transport Layer
Presentation transcript:

Project „ACH“ (Applied Crypto Hardening)

Motivation

Don‘t give them anything for free It‘s your home, you fight

TL;DR - Quickinfos Website: Git repo: Mailing list: bin/mailman/listinfo/achhttp://lists.cert.at/cgi- bin/mailman/listinfo/ach

Idea Do at least something against the Cryptocalypse Check SSL, SSH, PGP crypto Settings in the most common services and certificates: – Apache, Nginx, lighthttp – IMAP/POP servers (dovecot, cyrus,...) – openssl.conf – Etc. Create easy, copy & paste-able settings which are „OK“ (as far as we know) for sysadmins. Keep it short. There are many good recommendations out there written by cryptographers for cryptographers Many eyes must check this! (Aaron)

Table of contents so far Disclaimer Methods PKIs Elliptic Curve Cryptography Key lengths Random Number Generators Cipher suites Recommendations on practical settings Tools Links Reviewers

Additionally covered in this talk Attacks: BEAST, CRIME etc.

METHODS (Aaron)

Previous work (Aaron) Qualys blog / book (Ivan Rstic): – SSL/TLS Deployment Best Practices – OpenSSL Cookbook ENISA recommendations: Algorithms, Key Sizes and Parameters Report BSI: Technische Richtlinie TR , Kryptographische Verfahren: Empfehlungen und Schlüssellängen. Jan G-sec.lu (Thierry Zoller): TLS/SSL hardening and compatibility Report 2011 NIST: Recommendation for Key Management, July 2013

SOME THOUGHTS ON ECC (Azet)

Some general thoughts on settings General – Disable SSL 2.0 (weak algorithms) – Disable SSL 3.0 (BEAST vs IE/XP) – Enable TLS 1.0 or better – Disable TLS-Compression (SSL-CRIME Attack) – Implement HSTS (HTTP Strict Transport Security) Variant A: fewer supported clients Variant B: more clients, weaker settings Ramin

Strong settings. Variant A

Weaker, compatible settings, Variant B

RANDOM NUMBER GENERATORS Azet

KEYLENGTHS (cm, Azet)

A BRIEF OVERVIEW OF COMMON CRYPTO SOFTWARE: LIBRARIES (cm, Adi)

ATTACKS: BEAST, CRIME ETC. (Azet)

TESTING TESTING TESTING

How to test? - Tools (Pepi) ssllabs.com xmpp.net Sslscan (CLI tool) What can people do to test themselves? What does a test result mean? Potential for a config file generator (as discussed)?

Ssllabs.com Example

Recommendations on practical settings – our findings so far Apache (Adi, Azet) Nginx (Adi, Pepi) MS IIS (Ramin) Postfix, dovecot (cm) Opportunistic TLS, what is that? (cm) ssh (Azet)

Current state as of 2013/11/13 Initial ongoing work in the git repository More testing needed. Especially compatibility with clients and when to simply ignore old clients (RC4,...) Need to fill in other sections (PGP, Exchange server,...)

Practical settings – still missing UW, Cyrus Exim4 OpenVPN – troubles on mac (pepi) IPSec vendor specific applications: Juniper VPN, Cisco... Proxies (squid) Exchange PGP

Participation Authors: cryptologists, sysadmins, hackers Apply for write-perms World-readable Variantes: – (A) reviewer: the harder job ;-) – (B) co-author: add a section

Links Website: Git repo: master.githttps://git.bettercrypto.org/ach- master.git Mailing list: bin/mailman/listinfo/achhttp://lists.cert.at/cgi- bin/mailman/listinfo/ach

Git Repo

Thank you! Authors: L. Aaron Kaplan Manuel Koschuch Adi Kriegisch Christian Mock Ramin Sabet Aaron Zauner Pepi Zawodsky