刘振 上海交通大学 计算机科学与工程系 电信群楼3-509

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
1 SSL/TLS 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
CMSC 414 Computer (and Network) Security Lecture 26 Jonathan Katz.
IPsec – IKE CS 470 Introduction to Applied Cryptography
CS470, A.SelcukReal-Time Communication Issues1 Real-Time Communication Security IPsec & SSL Issues CS 470 Introduction to Applied Cryptography Instructor:
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
Anish Arora CSE651 Introduction to Network Security
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Protocols Part 3  Protocols 1.
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 Number Theory and Advanced Cryptography 9. Authentication Protocols Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced.
Computer Science Lecture 23, page 1 CS677: Distributed OS Security: Focus of Control Three approaches for protection against security threats a)Protection.
Identify Friend or Foe (IFF) Chapter 9 Simple Authentication protocols Namibia Angola 1. N 2. E(N,K) SAAF Impala Russian MIG 1 Military needs many specialized.
Chapter 9 Simple Authentication Protocols Simple Security Protocol Authentication Protocols Authentication and TCP Chapter 9 Simple Authentication protocols.
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
Chapter eight: Authentication Protocols 2013 Term 2.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
Network Security and It’s Issues
Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography (confidentiality) 8.3 Message integrity 8.4 End-point authentication.
17- 1 Last time ● Internet Application Security and Privacy ● Link-layer security: WEP, WPA, WPA2 ● Network-layer security: VPN, IPSec.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Virtual Private Networks and IPSec
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Chapter 5 Network Security Protocols in Practice Part I
Reviews Rocky K. C. Chang 20 April 2007.
Encryption and Network Security
Cryptography and Network Security
Chapter 18 IP Security  IP Security (IPSec)
CSE 4905 IPsec II.
IT443 – Network Security Administration Instructor: Bo Sheng
Network Security.
Secure Sockets Layer (SSL)
Internet Security CS457 Seminar Zhao Cheng
IPSec VPN Chapter 13 of Malik.
CSE 4095 Transport Layer Security TLS
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Slides have been taken from:
0x1A Great Papers in Computer Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Strong Password Protocols
Cryptographic Protocols
Virtual Private Networks (VPNs)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Protocol ap1.0: Alice says “I am Alice”
Unit 8 Network Security.
Guevara Noubir CSG254: Network Security
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Integrated Security System
Network Security Standards
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Chapter 8 roadmap 8.1 What is network security?
Network Security Tutorial-14 Design Fundamentals IPSEC, KERBEROS
Part III: Protocols Part 3  Protocols 1.
Lecture 6.2: Protocols - Authentication and Key Exchange II
Presentation transcript:

刘振 上海交通大学 计算机科学与工程系 电信群楼3-509 liuzhen@sjtu.edu.cn 网络安全技术 刘振 上海交通大学 计算机科学与工程系 电信群楼3-509 liuzhen@sjtu.edu.cn

Secure Socket Layer SSL and IPSec 2

Socket layer “Socket layer” lives between application and transport layers SSL usually lies between HTTP and TCP application transport network link physical User Socket “layer” OS NIC SSL and IPSec 3

What is SSL? SSL is the protocol used for most secure transactions over the Internet For example, if you want to buy a book at amazon.com… You want to be sure that you are dealing with Amazon (one-way authentication) Your credit card information must be protected in transit (data confidentiality) As long as you have money, Amazon doesn’t care who you are (authentication need not to be mutual) SSL and IPSec 4

Simple SSL-like Protocol I’d like to talk to you securely CertB {KAB}Bob encrypted HTTP using KAB Bob Alice Is Alice sure she’s talking to Bob? Achieve Data Confentiality? Forward secrecy? SSL and IPSec 5

Simplified SSL Protocol RA CertB, RB {S}B, E(K, h(msgs || K)) h(msgs || K) Data encrypted under K Bob Alice S is randomly chosen by Alice K = h(S,RA,RB) msgs = all previous messages Forward secrecy? SSL and IPSec 6

SSL Sessions vs Connections SSL designed for use with HTTP 1.0 HTTP 1.0 usually opens multiple simultaneous (parallel) connections SSL session establishment is costly Due to public key operations SSL has an efficient protocol for opening new connections given an existing session SSL and IPSec 7

SSL Connection RA RB, h(msgs || K) h(msgs || K) Data encrypted under K Bob Alice Assuming SSL session exists So S is already known to Alice and Bob Again, K = h(S,RA,RB) No public key operations! (relies on known S) SSL and IPSec 8

IPSec SSL and IPSec 9

IPSec and SSL IPSec lives at the network layer IPSec is transparent to applications application transport network link physical User SSL OS IPSec NIC SSL and IPSec 10

IKE and ESP/AH In SSL, it also has these two parts Two parts to discuss Establish a session key – IKE (Internet Key Exchange) How a secure channel works – ESP or AH (Encapsulating Security Payload, Authentication Header ) In SSL, it also has these two parts We have only discussed the first part – establishing a session key We didn’t discuss how the secure channel works SSL and IPSec 11

IKE IKE has 2 phases Phase 1 is comparable to SSL session Phase 1  master session key setup Phase 2  ESP and/or AH key setup Phase 1 is comparable to SSL session Phase 2 is comparable to SSL connection In this course, we don’t cover Phase 2 SSL and IPSec 12

IKE Phase 1 Three ways to run phase 1 Public key encryption based Signature based Symmetric key based For each of these, there are two different “modes” to choose from Main mode Aggressive mode There are 6 variants of IKE Phase 1! Evidence that IPSec is over-engineered? SSL and IPSec 13

IKE Phase 1 According to the IKE specification, Main mode MUST be implemented Aggressive mode SHOULD be implemented In other words, if aggressive mode is not implemented, “you should feel guilty about it” SSL and IPSec 14

IKE Phase 1: Signature Based (Main Mode) CP CS ga mod p, RA gb mod p, RB E(K, “Alice” || proofA) Alice Bob E(K, “Bob” || proofB) CP = crypto proposed, CS = crypto selected K = h(gab mod p, RA, RB) SKEYID = h(RA, RB, gab mod p) proofA = [h(SKEYID, ga mod p, gb mod p, CP, “Alice”)]Alice SSL and IPSec 15

IKE Phase 1: Signature Based (Aggressive Mode) “Alice”, ga mod p, RA, CP “Bob”, RB, gb mod p, CS, proofB proofA Alice Bob Main difference from main mode Not trying to protect identities Cannot negotiate g or p SSL and IPSec 16

IKE Phase 1: Symmetric Key Based (Main Mode) CP CS ga mod p, RA gb mod p, RB E(K, “Alice” || proofA) Alice Bob E(K, “Bob” || proofB) KAB = symmetric key shared in advance K = h(gab mod p, RA, RB, KAB) SKEYID = h(K, gab mod p) proofA = h(SKEYID,ga mod p, gb mod p, CP,“Alice”) SSL and IPSec 17

Problems with Symmetric Key Based (Main Mode) Catch Alice sends her ID in message 5 Alice’s ID encrypted with K To find K Bob must know KAB To get KAB Bob must know he’s talking to Alice! Result: Alice’s ID must be IP address! SSL and IPSec 18

IKE Phase 1: Symmetric Key Based (Aggressive Mode) “Alice”, ga mod p, RA, CP “Bob”, RB, gb mod p, CS, proofB proofA Alice Bob Same format as digital signature aggressive mode Not trying to hide identities… As a result, does not have problems of main mode SSL and IPSec 19

IKE Phase 1: Public Key Encryption Based (Main Mode) CP CS ga mod p, {RA}Bob, {“Alice”}Bob gb mod p, {RB}Alice, {“Bob”}Alice E(K, proofA) Alice Bob E(K, proofB) K = h(gab mod p, RA, RB) SKEYID = h(RA, RB, gab mod p) proofA = h(SKEYID, ga mod p, gb mod p, CP,“Alice”) SSL and IPSec 20

IKE Phase 1: Public Key Encryption Based (Aggressive Mode) CP, ga mod p, {“Alice”}Bob, {RA}Bob CS, gb mod p, {“Bob”}Alice, {RB}Alice, proofB proofA Bob Alice K, proofA, proofB computed as in main mode Note that identities are hidden The only aggressive mode to hide identities Then why have main mode? SSL and IPSec 21

Public Key Encryption Issue? Public key encryption, aggressive mode Suppose Trudy generates Exponents a and b Nonces RA and RB Trudy can compute “valid” keys and proofs: gab mod p, K, SKEYID, proofA and proofB Also true of main mode SSL and IPSec 22

Public Key Encryption Issue? CP, ga mod p, {“Alice”}Bob, {RA}Bob CS, gb mod p, {“Bob”}Alice, {RB}Alice, proofB Trudy as Alice proofA Trudy as Bob Trudy can create exchange that appears to be between Alice and Bob Appears valid to any observer, including Alice and Bob! SSL and IPSec 23

Plausible Deniability A security failure? In this mode of IPSec, it is a feature! Plausible deniability: Alice and Bob can deny that any conversation has taken place! In some cases it might be a security failure If Alice makes a purchase from Bob, she could later repudiate it (unless she had signed) SSL and IPSec 24

Summary SSL IPSec