Amit Kulkarni February 17, 2004

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Internet Security Protocols
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Http Web Authentication Web authentication is used to verify a users identity before allowing access to certain web pages On web browsers you get a login.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
Cryptography 101 Frank Hecker
CSCI 6962: Server-side Design and Programming
Chapter 31 Network Security
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Web Security Chapter 6. Learning Objectives Understand SSL/TLS protocols and their implementation on the Internet Understand HTTPS protocol as it relates.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
Top Five Web Application Vulnerabilities Vebjørn Moen Selmersenteret/NoWires.org Norsk Kryptoseminar Trondheim
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 9 Securing internet messaging.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
Unit 3 Section 6.4: Internet Security
The Secure Sockets Layer (SSL) Protocol
TOPIC: HTTPS (Security protocol)
Web Security CS-431.
TMG Client Protection 6NPS – Session 7.
Unit 3 Section 6.4: Internet Security
WWW and HTTP King Fahd University of Petroleum & Minerals
World Wide Web policy.
Cryptography and Network Security
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Secure Sockets Layer (SSL)
Cryptographic Hash Function
Information Security message M one-way hash fingerprint f = H(M)
Information Security message M one-way hash fingerprint f = H(M)
Using SSL – Secure Socket Layer
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Pooja programmer,cse department
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Protocol ap1.0: Alice says “I am Alice”
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Security+ All-In-One Edition Chapter 15 – Web Components
Lecture 10: Network Security.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Designing IIS Security (IIS – Internet Information Service)
Electronic Payment Security Technologies
Module 4 System and Application Security
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
Cryptography and Network Security
Chapter 8 roadmap 8.1 What is network security?
Unit 6.10 – L3 Internet Security
Presentation transcript:

Amit Kulkarni February 17, 2004 Web Security Amit Kulkarni February 17, 2004

SSL / TLS Developed by Netscape, supported by Microsoft and other developers TLS is latest version of SSL Works on top of TCP/IP, below higher-level protocols (e.g. HTTP, ICMP, etc.) Based on Symmetric / Asymmetric Encryption

How SSL Works Using Public Key Cryptography A  B random-message B  A {random-message}bob’s-private-key [Alice uses Bob’s public key to decrypt the message and authenticate Bob]

How SSL Works (contd.) Handing out public keys A  B hello B  A Hi, I am Bob, bob’s-certificate A  B prove it B  A Alice, this is Bob {digest[Alice, This is Bob]}bob’s-private-key Certificate is a way to bind public key to a name. It also has Issuer’s name, expiration date, etc.

How SSL Works (contd.) How Digital Certificate guards against “Man-in-the-middle” attack A  M hello M  A Hi, I am Bob, bob’s-certificate A  M prove it M  A ??? But, asymmetric key cryptography works slower than symmetric key cryptography. There is a workaround…

How SSL Works (contd.) Exchanging a secret A  B hello B  A Hi, I am Bob, bob’s-certificate A  B prove it B  A Alice, this is Bob {digest[Alice, This is Bob]}bob’s-private-key A  B ok bob, here is a secret {secret}bob’s public-key B  A {some message}secret-key

How SSL Works (contd.) One more loophole A  M hello M  B hello B  M Hi, I am Bob, bob’s-certificate M  A Hi, I am Bob, bob’s-certificate A  M prove it M  B prove it B  M Alice, this is Bob {digest[Alice, This is Bob]}bob’s-private-key M  A Alice, this is Bob A  M ok bob, here is a secret {secret}bob’s public-key M  B ok bob, here is a secret {secret}bob’s public-key B  M {some message}secret-key B  M Garble[{some message}secret-key] Note that Alice will try to interpret this garbled message

How SSL Works (contd.) Use of Message Authentication Code [MAC] MAC := Digest[some message, secret key] A  B hello B  A Hi, I am Bob, bob’s-certificate A  B prove it B  A Alice, this is Bob {digest[Alice, This is Bob]}bob’s-private-key A  B ok bob, here is a secret {secret}bob’s public-key B  A {some message, MAC}secret-key Now Alice can detect the tampering and will stop the conversation!!

SSL / TLS Size of key decides strength of encryption. (40-bit, 56-bit encryptions are considered weak. They can be cracked in about a week) Private Certificate Authorities: Used when certain kind of trust relation exists between the client and the server Public Certificate Authorities: Used when no other relation exists between the client and the server

HTTPS Secure Hypertext Transfer Protocol Client requests a secure transaction by accessing an HTTPS URL and informs server about the encryption algorithm and key sizes it supports Server sends back its digital certificate issued by CA Client verifies the certificate, generates a session key, encrypts t with server’s public key and sends it back to server Server decrypts the session key and uses it for symmetric encryption during further communication in the session

Instant Messaging Security Issues IM systems can transport sensitive and confidential data over public networks in unencrypted form. IM systems do not prevent transportation of files containing viruses Misconfigured file sharing can vide access to system files, passwords, etc. To monitor and prevent IM traffic network can be configured to deny access to certain domains (e.g. block yahoo.com for Yahoo messenger)

Vulnerabilities of Web Tools JavaScript Code embedded in HTML document. Downloaded to and executed on client side. Security loopholes exist in browsers, which could be exploited by JavaScript code in following ways: Monitoring Web Browsing Read System files, passwords Read browser’s preferences (like email id, mail server, etc.) Most browsers provide patches to fix JavaScript related vulnerabilities.

Vulnerabilities of Web Tools (contd.) ActiveX This is a Microsoft technology that provides tools for linking desktop applications to WWW content. e.g. MS Office applications An attacker could embed harmful macros into MS Office documents, which get executed without client’s knowledge. These macros could gain access to sensitive information, edit registry settings, use client system to target other systems, etc. Patches are available to address vulnerabilities exposed by ActiveX.

Vulnerabilities of Web Tools (contd.) Cookies: Text files created by web server, stored on Web surfer’s disk drive They contain information about user’s personal preferences, authentication information, browsing statistics, etc. Any Web Server can access all the cookies apart from his own, and thus can gain access to sensitive information. Browser has option not to accept cookies.

Vulnerabilities of Web Tools (contd.) Buffer Overflow: Can be triggered by sending large amounts of data that receives capacity of receiving application within a given field 2 prerequisite objectives to corrupt receiving buffer and alter program’s control flow to trigger desired action: Place the necessary code into program’s address space Direct the application to read and execute embedded code by manipulating registers and memory In this attacker can gain access to system prompt, examine System variables, read file system, etc. These are not easy to coordinate Caused by poor application programming that does not check the size of input field.

Vulnerabilities of Web Tools (contd.) Signed Applets Unsigned applets operate within a set of restrictions called “Sandbox Model” (e.g. accessing system properties, files on the hard disk, connecting to other web servers, etc.) Digitally signed applets do not have these restrictions. (Configurable by the user) Providing digital signature with applet code involvs generating private/ public key pair and obtaining a certificate.

Vulnerabilities of Web Tools (contd.) CGI Client passes data to the server and requests execution of a script (perl, shell script, etc) 1. Send HTML Form to client Client Web Server 2. Fill out form on Client 3. Submit request 4. Execute program on Server

Vulnerabilities of Web Tools (contd.) CGI Malicious user can modify the parameters to be passed to the executable script. In this way, user can gain access to sensitive files on the server. To protect against these, use Intrusion Detection system, create user groups with different permissions to access files, validate security of the CGI scripts before deploying them.

Vulnerabilities of Web Tools (contd.) SMTP Relay SMTP is standard Internet protocol for global e-mail communication. Simple by design because of high utilization SMTP relay occurs when a SMTP server has to forward mail to client using some other SMTP server. (e.g. mail from abc@hotmail.com to pqr@yahoo.com ) Malicious user can exploit this concept and hide the real origin of the message

Vulnerabilities of Web Tools (contd.) Transaction between 2 SMTP Servers HELO mail.example.com 250 mail.anotherexample.com Hello mail.example.com MAIL FROM: person1@xample.com 250 person1@xample.com Sender ok RCPT TO: person2@anotherexample.com 250 person2@anotherexample.com Recipient ok DATA 354 Enter mail, end with “.” on a line by itself From: To: . 250 0AA08757 Message accepted for delivery A Malicious user can forge variables to hide its identity

Vulnerabilities of Web Tools (contd.) An email message is “stamped” by every SMTP server along its way to destination. This could be used to track the real origin of the message. The following is a typical “Received” header From forged-address@example.com Received: from example.com ([172.16.35.44]) by mail.anotherexample.com (8.8.5) for <receiver@anotherexample.com> DNS lookup can verify if 172.16.35.44 is same as example.com

References How SSL Works SMTP Command Syntax Fundamentals of Network Security, Canavan John http://www.howstuffworks.com