COMP3123 Internet Security Richard Henson University of Worcester October 2010.

Slides:



Advertisements
Similar presentations
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Cryptography and Network Security
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Lecture 23 Internet Authentication Applications
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Topic 11: Key Distribution and Agreement 1 Information Security CS 526 Topic 11: Key Distribution & Agreement, Secure Communication.
Chapter 8 Web Security.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Secure Electronic Transaction (SET)
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Unit 1: Protection and Security for Grid Computing Part 2
Configuring Directory Certificate Services Lesson 13.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
COMP3123 Internet Security Richard Henson University of Worcester October 2011.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Infrastructure (PKI)
Cryptography and Network Security
Authentication Applications
Pooja programmer,cse department
Cryptography and Network Security
Presentation transcript:

COMP3123 Internet Security Richard Henson University of Worcester October 2010

Week 3: Cryptography, Securing the Internet, & the PKI n Objectives:  Explain the intended of the various components that make up the PKI and allow secure internetwok communications  Explain what Kerberos Authentication is, and how Kerberos can be used to securely authenticate users on remote networks  Apply principles of public-private key encryption and digital signatures to obtain a digital certificate via Internet and then use the PKI to send/receive encrypted messages

The Need for a Secure Architecture n As discussed last week: The Internet was designed to be an “open” system”  anyone with a little knowhow can read /http communications…  no-one should therefore even think of asking people to send credit card details without using encryption  just as no-one (hopefully…) would leave their credit card details on someone’s voic ! n For secure data transfer, PKE (public key encryption) of sent through the Internet became an attractive option

The PKI (Public Key Infrastructure) n Developed in late 1990s through IETF;  shared as RFCs n Essential to provide support for Internet Encryption techniques and demand for services increased:  e.g. the distribution & identification of public keys n PKI is made up of:  Digital Signatures  Digital Certificates (DC)  Certificate Authorities (CA)  Repository for digital certificates  Authentication across networks n RFCs included contributions from the first CA – Verisign  #2459 in February 1999 :  v1 digital certificates; v1 revocation lists

Digital Certificates (or Digital IDs) n To support secure , the PKI needed a way to ensure that the public key belongs to the entity to which the certificate was issued n Verisign provided this through the digital certificate:  the public key  information about the algorithms used  owner or subject data  the digital signature of a Certificate Authority that has verified the subject data  a date range during which the certificate can be considered valid

Providing Digital Certificates n IETF/Verisign agreed DCs should be made available via the www  IETF decided to use Directory Services compliant with the OSI X500 standard »result: LDAP (Lightweight Directory Access Protocol) »problem: the LDAP fields were not right for the Internet… n Developments (starting 1995) carefully controlled as RFCs:  RFC1777 – defined LDAP  RFC2585 – http accessible repository for certificates  RFC2587 – perfected X509 schema for LDAP v2  RFC2251 – defined LDAP v3  RFC2256 – X509 schema for LDAP v3… »still not complete: issues with authentication n Final Agreement (year 2006)  RFC 4510 – technical spec and roadmap for LDAP v3

Crucial Role of the Digital Certificate n Without certificates, it would not be possible to  1. create a new key pair  2. distribute the public key, claiming that it is the public key for almost anyone n Data could be sent encrypted with the private key and the public key would be used to decrypt the data…  but there would be no assurance that the data was originated by anyone in particular  all the receiver would know is that a valid key pair was used…

PKI & Certificate Authorities n Certificate Authority (CA)  guarantees that the individual granted the unique certificate is, in fact, who he or she claims to be  guarantee that the two parties exchanging information are really who they claim to be n CAs are “trusted” (e.g. banks) third-party organizations that issue digital certificates used to create digital signatures and public-private key pairs  contrast with PGP “web of trust” n This means that the CA must have an arrangement with a financial institution that provides it with information to confirm an individual's claimed identity n CAs are, and were intended to be, a critical component in the security transfer of information & electronic commerce

The Four Types of Digital Certificate… n Personal Certificates n Server Certificates n Software publisher Certificates n Certificate Authority certificates

Personal Certificates n Identify individuals n Authenticate users with a server, or to enable secure using S-Mime n If a Windows password list file (.pwl) becomes damaged or missing:  the personal certificate is not available for use  you may therefore receive an error message when you try to send ! n It is the responsibility of the user to back up this file so passwords can be recovered n Microsoft offered encryption for this file as far back as Windows 95 & 98 systems!

Server Certificates n Identify servers that participate in secure communications with other computers…  using secure communication protocols such as SSL (secure sockets layer) n Allow a server to verify its identity to clients n Follow the X.509 certificate format  As defined by the Public-Key Cryptography Standards (PKCS)

Software Publisher Certificates n Used are used to sign software that will be distributed over the Internet  Internet browsers are capable of trusting software that is signed with a publisher's certificate n Example:  Microsoft use a system called Authenticode  requires a software publisher certificate to sign Microsoft ActiveX and other compiled code.  Authenticode does not guarantee that signed code is safe to run, but rather informs the user whether or not the publisher is participating in the infrastructure of trusted publishers and CAs  Trusted software publishers appear in a list provided in Internet Explorer

Root (class 1) Certificate Authorities n Trusted organisations set up specifically for the purpose of awarding digital certificates  e.g. Verisign n Usually associated with banks, or credit card companies, who can reliably authenticate the name of anyone requesting a digital certificate

Root and Intermediate Certification Authorities & their certificates n Root certificates are self-signed…  subject of the certificate is also the signer of the certificate n Root CAs can also assign certificates for “Intermediate Certification Authorities” n The hierarchy can continue downwards:  Intermediate Certification Authorities can issue: »server certificates »personal certificates »publisher certificates »certificates for other Intermediate Certification Authorities…

Verisign Digital Certificates n Included “by default” with Internet Explorer n Issued and signed by the Class 1 Public Primary Certificate Authority, and therefore root certificates n Intermediate Certification Authorities option also available:  listed as "VeriSign Class 1 CA“ »means that Verisign (as Root certificate authority) issued these certificates »created for the purpose of issuing and validating personal digital certificates  if a person has obtained a Class 1 personal digital certificate from VeriSign, it will be issued by one of these Intermediate CAs

Verification Chains n The system of root and intermediate certificate authorities creates what is known as a verification chain  root authority is always at the top  could be a number of intermediate authorities  verification chains can contain a large number of certificates depending upon the number of intermediates in the chain

How a Certificate Is Issued - 1 n Key Generation  The person requesting certification sets the process in motion that will automatically generate key pairs of public and private keys n Matching of Policy Information  anyone requesting a CA is required to send additional information requested by the CA to issue the certificate, before the certificate is generated »tax ID number » address »etc…

How a Certificate Is Issued – 2 How a Certificate Is Issued – 2 n Verification of Information  The CA applies whatever policy rules it requires in order to verify the information gathered n If verification is successful…  Public Keys and Information is sent (often encrypted using the CA's public key) to the CA  the CA may wish to make it available on the Internet through a repository  a process then begins whereby the applicant should receive their certificate

How a Certificate Is Issued - 3 n Certificate Creation  The CA creates a digital document with the appropriate information (public keys, expiration date, and other data) and signs it using the CA's private key n Sending/Posting of Certificate »The CA may the certificate to the applicant, or post it publicly as appropriate »The certificate is installed on the individual's computer

Certificate Revocation n Typical reasons:  The certificate holder's private key may have been compromised  false information may have been used to apply for the certificate n CAs publish certificate revocation lists (CRLs) containing certificates that have been revoked by the CA  provide a way of withdrawing a certificate after it has been issued  available for downloading or online viewing by client programs

Verifying a Certificate n Verification of a certificate requires the public key of the CA and a check against the CRL published by that CA  certificates and CAs reduce the public-key distribution problem of verifying and trusting one (or more) public keys per individual  instead, only the CA's public key must be trusted and verified, and then that can be relied on to allow verification of other certificates

Certificate Repository A system or collection of distributed systems that store digital certificates and CRLs and serves as a means of distributing these certificates and CRLs to end entities A system or collection of distributed systems that store digital certificates and CRLs and serves as a means of distributing these certificates and CRLs to end entities n Covers the use of FTP and HTTP to obtain and download:  X509 Digital Certificates (recommend saved as.cer, but could also be.p7c)  CRLs (recommend saved as.crl) from PKI repositories

What is x509? n PKI standard for managing digital certificate information, defined by RFC 2459  also integrated with the OpenSSL infrastructure n OpenSSL consists of an “open source” implementation of:  SSL (secure sockets layer)  TLS (transport layer security) n OpenSSL architecture can:  display certificate information  convert certificates to various forms  sign certificate requests like a "mini CA“  edit certificate trust settings

Logging On Remotely using Kerberos Authentication n Kerberos was (is) a very clever system developed at MIT to support secure remote network logon  it became part of the PKI thanks to IETF support and RFC 1510  It was subsequently adopted by Microsoft to provide authentication for remote Windows 2000 logons to support logon across domain trees and forests (RFC 3244)

The Kerberos System n A number of components are needed:  Central coordination/distribution centre (KDC) as a “trusted centre”  Link between each participating network user (client) and the distribution centre for the sharing of secret keys  Shared secret key generation when a computer joins a domain n Client-server trust can then be established  theory is that both parties (client and server) trust the KDC, so they trust each other!

Mechanism of Kerberos Authentication  All based on the KDC  Client requests valid logon credentials from KDC  NOT the server it is logging on to!  Logon info provides the KDC with username/password client-ID info and the domain that it is requesting to log on to

Role of the KDC n Looks up secret keys of both client and server that client is trying to log on to n Then creates a “ticket” containing 1.expiration time, determined by the security policy 2.random session key 3.current KDC time 4.the SID – secure identifier  The ticket is then encrypted using the client’s secret key

Role of the KDC n The KDC then creates a second “session ticket” containing:  the session key  optional further authentication data that is encrypted with the server’s key n Both tickets are transmitted to the client (server doesn’t even need to be involved – only a valid client can encrypt the ticket anyway!)

Client-Server Communication n Once the client has a valid ticket and session key for a server, it can communicate directly with that server n To do this, the client constructs an authenticator:  Clients name  Optional checksum  Randomly generated number/session subkey  Encrypted using the session key, and transmitted with the session ticket n Authenticators can only be used once

Server actions n When the ticket is received:  Decrypts session ticket using the servers shared secret key  Retrieves the session key  Uses this to decrypt the authenticator – and prove that it was received from the KDC using the shared secret key  Authenticator proves that the key is recent and not a replay attack

Diagram of a KDC system: client-side client KDC Retrieve secret key for client & server Create ticket Encrypt ticket with clients secret key Create session ticket & encrypt with server key ticket Request for ticket Generate authenticator & encrypt using session key SERVER

Diagram of a KDC system: server-side ticket & authenticator server Decrypt session ticket using server secret key Decrypt authenticator using session key Validate authentication Grant access, service requests CLIENT KDC

Revision of Domain Relationships (NT) n Covered in COMP2122 n Windows NT domains (pre-W2K):  Each domain can be set up to “trust” other domains: »users and groups then get access to trusted domain »potentially a security threat, through the trusted domain Domain A Domain B trusts

Revision of Domain Relationships (Active Dir) n Windows 2000 etc allow “domain tree” structures:  a whole 2D structure of domains with a trust relationship can be set up  potentially a HUGE security threat, if authentication is compromised…

Kerberos and Trust Relationships between Domains n Any domain name that is connected to the Internet is actually part of the Domain Name system  e.g. there was once an NT domain called bandit (Business and IT) here at Worcester  Thanks to active directory, it became bandit.worc.ac.uk in the Internet naming system n Domains that are linked within an Active directory domain tree work within a system that automatically creates interdomain keys for Kerberos through a system involving local and “foreign” KDCs

So now you know! That’s all folks… Plenty more PKI-related RFCs on the IETF website…