Lecture 24 Secure Communications CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Ian Goldberg.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Secure Mobile IP Communication
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
SCSC 455 Computer Security Virtual Private Network (VPN)
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
VPNs  IETF developing IPsec security standards IP securityIP security At the internet layerAt the internet layer Protects all messages at the transport.
Guide to Network Defense and Countermeasures Second Edition
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Web server security Dr Jim Briggs WEBP security1.
Internet Protocol Security (IPSec)
K. Salah1 Security Protocols in the Internet IPSec.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Web Server Administration Chapter 10 Securing the Web Environment.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Secure Socket Layer (SSL)
Chapter 13 – Network Security
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Lecture 24 Secure Communications CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Ian Goldberg.
CSCE 715: Network Systems Security
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Other Security Issues Multi-Layer Security Firewalls Total Security Intrusion Detection Trust.
IPsec  IPsec (IP security)  Security for transmission over IP networks The InternetThe Internet Internal corporate IP networksInternal corporate IP.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Secure  Message interception (confidentiality)  Message interception (blocked delivery)  Message interception and subsequent replay  Message.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Replay Attacks.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Chapter 5 Network Security Protocols in Practice Part I
What Makes a Network Vulnerable?
Integrated Security System
Presentation transcript:

Lecture 24 Secure Communications CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Ian Goldberg

Who Attacks Networks Hackers break into organizations from the outside – Challenge – Fame – Money & Espionage – Ideology However, most security breaches are internal, by employees and ex-employees

Threat Precursors Port Scan Social Engineering – Reconnaissance – Bulletin Board / Chat – Docs Packet Sniffers (telnet/ftp in cleartext)

Network Security Threats Interception – If interceptor cannot read, have confidentiality (privacy) – If cannot modify without detection, have message integrity

Network Security Threats Impostors (Spoofing/ Masquerade) – Claim to be someone else – Need to authenticate the sender--prove that they are who they claim to be True Person Impostor

Network Security Threats Remotely Log in as Root User – Requires cracking the root login password – Then control the machine – Read and/or steal information – Damage data (erase hard disk) – Create backdoor user account that will let them in easily later Root Login Command

Security Threats Content Threats – Application layer content may cause problems Viruses In many ways, most severe security problem in corporations today Must examine application messages

Replay Attack First, attacker intercepts a message – Not difficult to do

Replay Attack Later, attacker retransmits (replays) the message to the original destination host – Does not have to be able to read a message to replay it

Replay Attack Why replay attacks? – To gain access to resources by replaying an authentication message – In a denial-of-service attack, to confuse the destination host

Thwarting Replay Attacks Put a time stamp in each message to ensure that the message is “fresh” – Do not accept a message that is too old Place a sequence number in each message – Do not accept a duplicated message Message Sequence Number Time Stamp

Thwarting Replay Attacks In request-response applications, – Sender of request generates a nonce (random number) – Places the nonce in the request – Server places the nonce in the response – Neither party accepts duplicate nonces Nonce RequestResponse

Network Security Threats Denial of Service (DOS) Attacks – Overload system with a flood of messages – Or, send a single message that crashes the machine

Denial of Service (DOS) Attacks Transmission Failure Connection Flooding – Echo-Chargen – Ping of Death – Smurf – Syn Flood – Traffic Redirection – DNS Attacks Distributed Denial of Service

VPNs IETF developing IPsec security standards – IP security – At the internet layer – Protects all messages at the transport and application layers IPsec TCPUDP , WWW, Database, etc.

VPNs IPsec Transport Mode – End-to-end security for hosts Local Network Internet Local Network Secure Communication

VPNs IPsec Tunnel Mode – IPsec server at each site – Secure communication between sites Local Network Internet Local Network Secure Communication IPsec Server

VPNs IPsec Modes Can be Combined – End-to-end transport mode connection – Within site-to-site tunnel connection Local Network Internet Local Network Tunnel Mode Transport Mode

VPNs Another Security System for VPNs is the Point- to-Point Tunneling Protocol (PPTP) – For dial-up connections, based on PPP – Connects user with securely to a remote access server at a site Internet Local Network Remote Access Server Dial-Up Connection PPTP Connection

PKIs To use public key methods, an organization must establish a comprehensive Public Key Infrastructure (PKI) – A PKI automates most aspects of using public key encryption and authentication – Uses a PKI Server PKI Server

PKIs PKI Server Creates Public Key-Private Key Pairs – Distributes private keys to applicants securely – Often, private keys are embedded in delivered software PKI Server Private Key

PKIs PKI Server Provides CRL Checks – Distributes digital certificates to verifiers – Checks certificate revocation list before sending digital certificates PKI Server Digital Certificate

PKIs CRL (Certificate Revocation List) Checks – If applicant gives verifier a digital certificate, – The verifier must check the certificate revocation list PKI Server OK? OK or Revoked CRL

Integrated Security System When two parties communicate … – Their software usually handles the details – First, negotiate security methods – Then, authenticate one another – Then, exchange symmetric session key – Then can communicate securely using symmetric session key and message-by-message authentication

SSL Integrated Security System SSL – Secure Sockets Layer – Developed by Netscape TLS (now) – Netscape gave IETF control over SSL – IETF renamed it TLS (Transport Layer Security) – Usually still called SSL

Location of SSL Below the Application Layer – IETF views it at the transport layer – Protects all application exchanges – Not limited to any single application WWW transactions, , etc. SSL WWW WWW

SSL Operation Browser & Webserver Software Implement SSL – User can be unaware

SSL Operation SSL ISS Process – Two sides negotiate security parameters – Webserver authenticates itself – Browser may authenticate itself but rarely does – Browser selects a symmetric session key, sends to webserver – Adds a digital signature and encrypts all messages with the symmetric key

Importance of SSL Supported by Almost All Browsers – De facto standard for Internet application security Problems – Relatively weak security – Does not involve security on merchant server – Does not validate credit card numbers – Viewed as an available but temporary approach to consumer security

Other ISSs SSL is merely an example integrated security system Many other ISSs exist – IPsec – PPP and PPTP – Etc.

Other ISSs All ISSs have the same general steps – Negotiate security parameters – Authenticate the partners – Exchange a session key – Communicate with message-by-message privacy, authentication, and message integrity

IPsec IPsec (IP security) Security for transmission over IP networks – The Internet – Internal corporate IP networks – IP packets sent over public switched data networks (PSDN) Local Network Internet Local Network

IPsec Why do we need IPsec? – IP has no security – Add security to create a virtual private network (VPN) to give secure communication over the Internet or another IP network Local Network Internet Local Network

IPsec Genesis – Being created by the Internet Engineering Task Force – For both IP version 4 and IP version 6

IPsec Two Modes of operation Tunnel Mode – IPsec server at each site – Secures messages going through the Internet Local Network Internet Local Network Secure Communication IPsec Server

IPsec Tunnel Mode – Hosts operate in their usual way Tunnel mode IPsec is transparent to the hosts – No security within the site networks Local Network Internet Local Network Secure Communication IPsec Server

IPsec Two Modes of operation Transport Mode – End-to-end security between the hosts – Security within site networks as well – Requires hosts to implement IPsec Local Network Internet Local Network Secure Communication

IPsec Transport Mode – Adds a security header to IP packet – After the main IP header – Source and destination addresses of hosts can be learned by interceptor – Only the original data field is protected Protected Original Data Field Original IP Header Transport Security Header

IPsec Tunnel Mode – Adds a security header before the original IP header – Has IP addresses of the source and destination IPsec servers only, not those of the source and destination hosts – Protects the main IP header Protected Original Data Field Protected Original IP Header Tunnel Security Header

IPsec Can combine the two modes – Transport mode for end-to-end security – Plus tunnel mode to hide the IP addresses of the source and destination hosts during passage through the Internet Local Network Internet Local Network Tunnel Mode Transport Mode

IPsec Two forms of protection Encapsulating Security Protocol (ESP) security provides confidentiality as well as authentication Authentication Header (AH) security provides authentication but not confidentiality – Useful where encryption is forbidden by law – Provides slightly better authentication by providing authentication over a slightly larger part of the message, but this is rarely decisive

IPsec Modes and protection methods can be applied in any combination Tunnel Mode Transport Mode ESPSupportedSupported AHSupportedSupported

IPsec Security Associations (SAs) are agreements between two hosts or two IPsec servers, depending on the mode “Contracts” for how security will be performed Negotiated Governs subsequent transmissions Host AHost B Negotiate Security Association

IPsec Security Associations (SAs) can be asymmetrical – Different strengths in the two directions – For instance, clients and servers may have different security needs Host AHost B SA for messages From A to B SA for messages From B to A

IPsec Policies may limit what SAs can be negotiated – To ensure that adequately strong SAs for the organization’s threats – Gives uniformity to negotiation decisions Host AHost B Security Association Negotiations Limited By Policies

IPsec First, two parties negotiate IKE (Internet Key Exchange) Security Associations – IKE is not IPsec-specific – Can be used in other security protocols Host AHost B Communication Governed by IKE SA

IPsec Under the protection of communication governed by this IKE SA, negotiate IPsec- specific security associations Host AHost B Communication Governed by IKE SA IPsec SA Negotiation

IPsec Process of Creating IKE SAs (and other SAs) – Negotiate security parameters within policy limitations – Authenticate the parties using SA-agreed methods – Exchange a symmetric session key using SA-agreed method – Communicate securely with confidentiality, message-by-message authentication, and message integrity using SA-agreed method

IPsec IPsec has mandatory security algorithms – Uses them as defaults if no other algorithm is negotiated – Other algorithms may be negotiated – But these mandatory algorithms MUST be supported

IPsec Diffie-Hellman Key Agreement – To agree upon a symmetric session key to be used for confidentiality during this session – Also does authentication Party AParty B

IPsec Diffie-Hellman Key Agreement – Each party sends the other a nonce (random number) – The nonces will almost certainly be different – Nonces are not sent confidentially Party AParty B Nonce B Nonce A

IPsec Diffie-Hellman Key Agreement – From the different nonces, each party will be able to compute the same symmetric session key for subsequent use – No exchange of the key; instead, agreement on the key Party AParty B Symmetric Key From nonces, independently compute same symmetric session key

Multi-Layer Security Security Can be Applied at Multiple Layers Simultaneously – Application layer security for database, , etc. – Transport layer: SSL – Internet layer: IPsec – Data link layer: PPTP, L2TP – Physical layer: locks

Multi-Layer Security Applying security at 2 or more layers is good – If security is broken at one layer, the communication will still be secure However, – Security slows down processing – Multi-Layer security slows down processing at each layer

Total Security Network Security is Only Part Server Security – Hackers can take down servers with denial-of- service attack – Hacker can log in as root user and take over the server – Steal data, lock out legitimate users, etc.

Total Security Server Security – Occasionally, weakness are discovered in server operating systems – This knowledge is quickly disseminated – Known security weaknesses

Total Security Server Security – Server operating system (SOS) vendors create patches – Many firms do not download patches – This makes them vulnerable to hackers, who quickly develop tools to probe for and then exploit known weaknesses

Total Security Client PC Security – Known security weaknesses exist but patches are rarely downloaded – Users often have no passwords or weak passwords on their computer – Adversaries take over client PCs and can therefore take over control over SSL, other secure communication protocols

Total Security Application Software – May contain viruses Must filter incoming messages – Database and other applications can add their own security with passwords and other protections

Total Security Managing Users – Often violate security procedures, making technical security worthless – Social engineering: attacker tricks user into violating security procedures

Defense in Depth Firewalls Antivirus Intrusion Detection Systems Intrusion Protection Systems