1 Reasoning about Concurrency for Security Tunnels Alwyn E. Goodloe University of Pennsylvania Carl A. Gunter University of Illinois Urbana-Champaign.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.2: IPsec.
IPSec.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Symbolic Simulation of Tunneling Protocols Carl A. Gunter, Matthew Jacobs, Gaurav Shah, Mark-Oliver Stehr (UIUC), and Alwyn Goodloe Alwyn Goodloe HCES.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Discovery and Traversal of Security Gateways Alwyn E. Goodloe University of Pennsylvania Contessa NS Protocol eXchange June 10, 2005.
IP Security. IPSEC Objectives n Band-aid for IPv4 u Spoofing a problem u Not designed with security or authentication in mind n IP layer mechanism for.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Intranet, Extranet, Firewall. Intranet and Extranet.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 13 – Network Security
L3A: A Protocol for Layer Three Accounting Alwyn Goodloe, Matthew Jacobs, Gaurav Shah University of Pennsylvania Carl A. Gunter University of Illinois.
Network Security Architectures Part 2 Formalization and Testing Summer School on Software Security Theory to Practice Carl A. Gunter University of Pennsylvania.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Networking Irfan Khan Myo Thein Nick Merante.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Chapter 14 Network Encryption
Mobile IPv6 and Firewalls: Problem Statement Speaker: Jong-Ru Lin
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Virtual Private Network Configuration
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
Securing the Network Perimeter with ISA 2004
Understand Networking Services
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

1 Reasoning about Concurrency for Security Tunnels Alwyn E. Goodloe University of Pennsylvania Carl A. Gunter University of Illinois Urbana-Champaign

2 Security Tunnels A technique in which a pair of nodes share state that enables them to apply transformations to messages to ensure their security.  SSL, IPsec.  Our work assumes network layer tunnels, but not a specific technology. Key-establishment protocols are employed to create a shared key.  Internet Key Exchange Protocol (IKE).  Secrecy and integrity of shared crypto information is typically the focus of formal analysis. Not our focus.

3 Road Warrior Example

4 Hierarchy of Gateways

5 Gateways + Tunnels Tunnels and gateways can ensure that traffic is authenticated and authorized as satisfying some policy.  Firewalls do authorization, but not authentication of packets.  We assume VPN gtateways. The tunnels form a virtual topology where traffic flow governed by the gateway’s high-level policy. Tunnel complex configuration typically requires manual activity.  Discovery protocols that discover gateways and set up tunnels automate this task.  Establishment is a component of such protocols.

6 Authenticated Traversal Ingress traffic to a gateway’s administrative domain must be authenticated and authorized  Want to control what traffic is on your networks.  Protection against denial of service. Egress traffic from an administrative domain must be authenticated and authorized  Wireless gateways that are billing for services.  Protection against exfiltration.

7 Modeling Tunnels A secure tunnel can be viewed “type- theoretically”as a rule for applying a constructor at the source and a destructor at the destination. Security Association – the constructor destructor pair.  Security association database (SAD). Security Parameter Index (SPI) – uniquely identifies association. Security Mechanism - directs traffic into the proper association.  Security mechanism database (SMD). IPsec SPD.

8 Tunnel Example G AB A  B:[In(A,ί 1 )] P(A,G,S(ί 1,P(A,B,S(ί 3,P(A,B,y))))) A  B:[Out(B,ί 2 )] A  B:[In(A,ί, 3 )In(G,ί 2 )] P(G,B,S(ί 2,P(A,B,S(ί 3,P(A,B,y)) P(A,B,S(ί 3,P(A,B,y))) P(A,B,y) ί1ί1 ί2 ί2 ί3ί3 A  B:[Out(B,ί 3 ) Out(G,ί 1 )]

9 Establishment A B P(A,B, X(Req(S, D, ί A, K))) In(A,ί B ) S  D:[in(A, ί B )] Out(A,ί A ) D  S:[Out(A, ί A )] P(B,A, X(Rep(S, D, ί A ί B, K’))) P(B,A, X(Rep(S, D, ί A, ί B, K’))) Out(B,ί B ) S  D:[Out(B, ί B )] In(B,ί A ) D  S:[In(B, ί A )]

10 Friendly Fire A B P(A,B,X(Req)) P(A,B,X(Req)) B  A:[ί A ] A  B:[ί B ] P(B,A,X(Rep)) P(A,B,X(Rep))

11 Preventing Deadlock Each protocol session is assigned a unique session identifier. The packet filter includes the session identifier.  Session identifiers are similar to protocol identifiers.  Session identifiers included in messages. Session matching property. Packets match filters installed for a particular session. Security associations may be shared among different sessions.

12 With SolutionA B P(A,B,X(Req(v 2 ))) P(A,B,X(Req(v 1 ))) B  A:v 1 :[ί A ] A  B:v 2 :[ί B ] P(B,A,X(Rep(v 2 ))) P(A,B,X(Rep(v 1 )))

13 Objective II Want a formal proof that state installed in session u does not interfere with the messages of session v. Introduce the tunnel calculus. Noninterference theorem. Progress theorem.

14 Tunnel Calculus Operational semantics for protocol stack.  Provides an abstract foundation for future tunnel protocols in light of their use in tunnel complexes.  A suitable version could be used to model IPsec, but not our current focus. Based on multiset term rewriting modulo equations. Allows one to reason about interactions between state installed at nodes and protocols.

15 Tunnel Calculus Layers Packet Forwarding Security Processing Authorization Establishment Discovery

16 Grammar Send secure packet Secure message sent Message from the secure layer Pass state from one rule to the next and enforce an order of execution

17 Layer Interaction Node a Node b Higher Layer Sec Fwd

18 Forwarding Layer Rules

19 Secure Layer Find the matching entry in MDB, select bundle, apply the constructors in the bundle, and send the message to forwarding layer

20 Trace Semantics

21 Observing Messages Given a trace M1, M2, M3 we want to observe only the secure send and receive messages in a session. Q(u) – infinite set of secure send/receive terms of session u.

22 Equivalent Traces During each run of the protocol some values are generated by the TC new operator.  SPI, acknowledgement identifiers. t 1 ~t 2 iff they only differ in values generated by new. M 1 ~M 2 T 1 ~T 2

23 Simulation Lemma M1M1M1M1 M2M2M2M2 M’ 2 M’ 1 ~ ~

24 Observational Commutativity Theorem

25 Noninterference Theorem Suppose T= M 1 …M n is a trace in which session v is complete, where v not in Free(M 1 ). Suppose T’ = M’ 1 …M’ m is a trace in which session v is complete, where M 1 ~ M’ 1, Then

26 Progress Theorem

27 Google Tunnel Calculus