Intro To Secure Comm. Exercise 6. Problem A vendor wishes to incorporate the following:  Upon any login/change the vendor updates the cookie Cookie(SessionTime||{Item||Price})

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Secure Mobile IP Communication
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Intro To Secure Comm. Exercise 7. Solution (review of last lesson) Assuming  CEO1:  CEO2: Use both transport mode and tunnel mode IPSec.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Intro To Secure Comm. Exercise 2. Problem  You wish for your users to access a remote server via user and password.  All of the users have modems and.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CS682 – Network Management and Security Session 7.
Telnet/SSH Tim Jansen, Mike Stanislawski. TELNET is short for Terminal Network Enables the establishment of a connection to a remote system, so that the.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 17 Jonathan Katz.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
SSH Secure Login Connections over the Internet
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 13 – Network Security
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Krerk Piromsopa. Network Security Krerk Piromsopa. Department of Computer Engineering. Chulalongkorn University.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
CHAPTER 9 Sniffing.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
IP Security
CSCI 465 Data Communications and Networks Lecture 26
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
NET 536 Network Security Firewalls and VPN
CSE 4905 IPsec.
IPSec IPSec is communication security provided at the network layer.
Network Security (contd.)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Virtual Private Networks (VPNs)
Advanced Computer Networks
Presentation transcript:

Intro To Secure Comm. Exercise 6

Problem A vendor wishes to incorporate the following:  Upon any login/change the vendor updates the cookie Cookie(SessionTime||{Item||Price}) What kind of attacks may be done? What kind of attackers may do it? How does SSL help protect against certain attacks/adversaries?

Solution The interrogative adversary may easily change the cookie. The attacks may be  extending the session time indefinitely  Changing products’ prices SSL may prevent sniffing/active adversaries from intercepting the cookies and/or changing them while they’re transmitted

Problem The following is a cookie based login process  User Login to server, provide user/password  Server Set Cookie(username||h(password)) The login process is protected with SSL. The rest sessions are not. Against what types of adversaries is this scheme effective?

Solution This scheme is immune to spoofing attacks, as no spoofer can generate the cookie This scheme is immune to sniffing attacks as the secret is not sent in the clear. However, active adversaries may do replay attacks after the initial login. How may you defend against active adversaries? Dictionary attacks are still possible, use SALT against them.

Solution (2) The simplest thing would be to protect the entire client-server protocol using SSL. Developing a proprietary protocol may lead to more complex client-side applications.

Problem The following identifier is put into a cookie after user logon (to identify the session)  Cookie(GlobalId++) What types of adversaries may attack this scheme? What is the attack?

Solution The interrogative adversary may attack this easily. The attack would be to guess the sequence number of another session. Since this uses sequential numbers it is quite easy. How will you mend this flaw?  Use cryptographic randomness PRF(GlobalId||Date)

IP-SEC

Scenario An organization connects to the Internet from multiple offices, and is concerned about:  Denial of service attacks from the Internet  Protect data on few key applications (mostly web) from unauthorized exposure  Efficiency and cost of solution The organization considers employing IPSec as a solution

Problem When is IPSec not able to secure the connection under the previous conditions

Solution IPSec connections may not be reliable when an attack is orchestrated from inside the network (where IP sec is not utilized) Using IPSec in tunnel mode enables such an attack from inside the network when a virus/worm attacks the computers.

Problem Few companies create extranet (shared VPN over Internet) using IP-sec. How can they (securely and efficiently)…  Prevent network attacker from counting CEO- to-CEO messages  Prevent insiders from eavesdropping on CEO- to-CEO messages

Solution Assuming  CEO1:  CEO2: Use both transport mode and tunnel mode IPSec. First use Transport mode IPSec  CEO1 SP : To CEO2 -> Encrypt Transport Mode  CEO2 SP : To CEO1 -> Encrypt Transport Mode

Solution Second, use IPSec tunnel mode between routers such that ALL messages are encrypted using tunnel mode (no differentiation between CEO messages and users’ messages) This way, messages between CEOs are protected from being noticed from the internet (this is because the messages are designated to the routers) Inside the network, the messages are still encrypted.

Scenario

Problem The company enables IPSec in tunnel mode between each branch of the company. Users are allowed to browse the internet freely. How can a virus expose information sent from branch A to B?

Solution By sniffing the network, the virus can sniff packets sent between the branches. The virus can then send the information to a host located on the internet. Since the information between the branches is sent on the clear (until it reaches the VPN host) it is easily viewed.

Attack explenation Say computer A from office A send information to computer B in office B. The virus sniffs the network and gets a hold of the message. The virus sends the message using a connection to the internet, to an internet host.

Problem What if the routers are configured only to allow secured IPSec communication?  i.e. no internet forwarding. Is the attack viable now?

Solution YES!!! Through subliminal channels, the virus can communicate with the sniffer  Through timings  Through length of packets In conjunction with the SPI field.  Assuming the SPI is different than other programs.  The eavesdropper can then identify the messages from the virus and identify them using timings/length of packets.

Problem (Test Question) חברה מעונינת להבטיח מספר יישומים קריטיים (משכורות, כח אדם, דו"חות מכירות) מפני תוקף חיצוני או פנימי. ההנחה היא שהתוקף עלול להשתלט על מחשב אחד או מחשבים מעטים, ובפרט מניחים שלא יוכל להשתלט על שרתים (שמאובטחים היטב) אלא רק על תחנות עבודה. מעונינים למנוע מהתוקף, אפילו אם הוא שולט על מחשב אחד שנמצא ברשת מקומית מסוימת, מלחשוף או לשנות הודעות בין מחשבים ברשת שאינם נשלטים על ידיו ובין אחד משרתי היישומים הקריטיים. מוצע להגן ע"י שימוש ב-IP-sec בשיטת ESP ומצב Transport, בין כל תחנת עבודה לבין השרתים שמריצים את אותם שירותים קריטיים.  הראה שפתרון זה עשוי שלא למנוע התקפה, ותוקף ששולט במחשב אחד ברשת עלול להיות מסוגל להתחזות לשרת היישום הקריטי. רמז: שרתים אחרים ברשת, שאינם מריצים את היישומים הקריטיים, אינם מריצים IP-sec.

Solution The key idea is that only application servers are protected with IPSec. What about DNS servers? (or any other naming servers) The following attack may happen  ADV takes control over some computer (a client/DNS) which are not protected.  ADV changes DNS record to point to the controlled computer  When the application needs to transmit information, it transmits to the wrong IP thus not protecting the data with IPSec.  The application is UNAWARE of it.