DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Last Class: The Problem BobAlice Eve Private Message Eavesdropping.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
8.1 Learning Objectives To become familiar with the range of security threats faced by networked and distributed systems (DSs); To examine various cryptographic.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Security Strategies for securing Distributed Systems
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 Network Security Chapter 8.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Security Chapter 8.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 30 Message Security, User Authentication, and Key Management.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Computer and Network Security - Message Digests, Kerberos, PKI –
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 Distributed Systems Distributed Object-Based Systems Chapter 10.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Security. Cryptography (1) Intruders and eavesdroppers in communication.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
The Secure Sockets Layer (SSL) Protocol
Security Outline Encryption Algorithms Authentication Protocols
Advanced Computer Networks
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
CMSC 414 Computer and Network Security Lecture 15
CS480 Cryptography and Information Security
Chapter 15 Key Management
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Public-Key Cryptography and RSA
Chapter 8 Network Security.
Chapters 14,15 Security.
Introduction to Security
Chapter 9.3 Security Access Control
Message Security, User Authentication, and Key Management
Public Key Infrastructure
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
9.2 SECURE CHANNELS Medisetty Swathy.
Chapter 8 Network Security.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9
The Secure Sockets Layer (SSL) Protocol
Chapters 14,15 Security.
CDK: Chapter 7 TvS: Chapter 9
Public-Key, Digital Signatures, Management, Security
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 29 Cryptography and Network Security
Advanced Computer Networks
Network Security Chapter 8.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Secure Diffie-Hellman Algorithm
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
AIT 682: Network and Systems Security
Presentation transcript:

DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S. TANENBAUM MAARTEN VAN STEEN Chapter 9 Security Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Security Threats, Policies, and Mechanisms Types of security threats to consider: Interception Interruption Modification Fabrication Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Example: The Globus Security Architecture (1) The environment consists of multiple administrative domains. Local operations are subject to a local domain security policy only. Global operations require the initiator to be known in each domain where the operation is carried out. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Example: The Globus Security Architecture (2) Operations between entities in different domains require mutual authentication. Global authentication replaces local authentication. Controlling access to resources is subject to local security only. Users can delegate rights to processes. A group of processes in the same domain can share credentials. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Example: The Globus Security Architecture (2) Figure 9-1. The Globus security architecture. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Focus of Control (1) Figure 9-2. Three approaches for protection against security threats. (a) Protection against invalid operations Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Focus of Control (2) Figure 9-2. Three approaches for protection against security threats. (b) Protection against unauthorized invocations. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Focus of Control (3) Figure 9-2. Three approaches for protection against security threats. (c) Protection against unauthorized users. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Layering of Security Mechanisms (1) Figure 9-3. The logical organization of a distributed system into several layers. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Layering of Security Mechanisms (2) Figure 9-4. Several sites connected through a wide-area backbone service. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Distribution of Security Mechanisms Figure 9-5. The principle of RISSC as applied to secure distributed systems. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-6. Intruders and eavesdroppers in communication. Cryptography (1) Figure 9-6. Intruders and eavesdroppers in communication. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-7. Notation used in this chapter. Cryptography (2) Figure 9-7. Notation used in this chapter. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Symmetric Cryptosystems: DES (1) Figure 9-8. (a) The principle of DES. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Symmetric Cryptosystems: DES (2) Figure 9-8. (b) Outline of one encryption round. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Symmetric Cryptosystems: DES (3) Figure 9-9. Details of per-round key generation in DES. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Public-Key Cryptosystems: RSA Generating the private and public keys requires four steps: Choose two very large prime numbers, p and q. Compute n = p × q and z = (p − 1) × (q − 1). Choose a number d that is relatively prime to z. Compute the number e such that e × d = 1 mod z. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-10. The structure of MD5. Hash Functions: MD5 (1) Figure 9-10. The structure of MD5. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Hash Functions: MD5 (2) Figure 9-11. The 16 iterations during the first round in a phase in MD5. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Authentication Based on a Shared Secret Key (1) Figure 9-12. Authentication based on a shared secret key. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Authentication Based on a Shared Secret Key (2) Figure 9-13. Authentication based on a shared secret key, but using three instead of five messages. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Authentication Based on a Shared Secret Key (3) Figure 9-14. The reflection attack. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Authentication Using a Key Distribution Center (1) Figure 9-15. The principle of using a KDC. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Authentication Using a Key Distribution Center (2) Figure 9-16. Using a ticket and letting Alice set up a connection to Bob. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Authentication Using a Key Distribution Center (3) Figure 9-17. The Needham-Schroeder authentication protocol. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Authentication Using a Key Distribution Center (4) Figure 9-18. Protection against malicious reuse of a previously generated session key in the Needham-Schroeder protocol. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Authentication Using a Key Distribution Center (5) Figure 9-19. Mutual authentication in a public-key cryptosystem. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-20. Digital signing a message using public-key cryptography. Digital Signatures (1) Figure 9-20. Digital signing a message using public-key cryptography. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-21. Digitally signing a message using a message digest. Digital Signatures (2) Figure 9-21. Digitally signing a message using a message digest. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Secure Replicated Servers Figure 9-22. Sharing a secret signature in a group of replicated servers. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-23. Authentication in Kerberos. Example: Kerberos (1) Figure 9-23. Authentication in Kerberos. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-24. Setting up a secure channel in Kerberos. Example: Kerberos (2) Figure 9-24. Setting up a secure channel in Kerberos. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

General Issues in Access Control Figure 9-25. General model of controlling access to objects. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Access Control Matrix (1) Figure 9-26. Comparison between ACLs and capabilities for protecting objects. (a) Using an ACL. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Access Control Matrix (2) Figure 9-26. Comparison between ACLs and capabilities for protecting objects. (b) Using capabilities. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Protection Domains Figure 9-27. The hierarchical organization of protection domains as groups of users. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-28. A common implementation of a firewall. Firewalls Figure 9-28. A common implementation of a firewall. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Protecting the Target (1) Figure 9-29. The organization of a Java sandbox. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Protecting the Target (2) Figure 9-30. (a) A sandbox. (b) A playground. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Protecting the Target (3) Figure 9-31. The principle of using Java object references as capabilities. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Protecting the Target (4) Figure 9-32. The principle of stack introspection. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-33. The principle of Diffie-Hellman key exchange. Key Establishment Figure 9-33. The principle of Diffie-Hellman key exchange. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Key Distribution (1) Figure 9-34. (a) Secret-key distribution. [see also Menezes et al. (1996)]. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Key Distribution (2) Figure 9-34. (b) Public-key distribution [see also Menezes et al. (1996)]. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Secure Group Management Figure 9-35. Securely admitting a new group member. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Capabilities and Attribute Certificates (1) Figure 9-36. A capability in Amoeba. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Capabilities and Attribute Certificates (2) Figure 9-37. Generation of a restricted capability from an owner capability. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Figure 9-38. The general structure of a proxy as used for delegation. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5

Delegation (2) Figure 9-39. Using a proxy to delegate and prove ownership of access rights. Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved. 0-13-239227-5