Lecture 11 Page 1 CS 136, Fall 2012 Network Security, Continued CS 136 Computer Security Peter Reiher November 6, 2012.

Slides:



Advertisements
Similar presentations
IPSec.
Advertisements

Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Lecture 18 Page 1 CS 236 Online DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
K. Salah1 Security Protocols in the Internet IPSec.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Lecture 10 Page 1 CS 136, Fall 2014 Network Security, Continued Computer Security Peter Reiher November 13, 2014.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Issues in Internet Security. Securing the Internet How does the internet hold up security-wise? How does the internet hold up security-wise? Not well:
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Lecture 13 Page 1 CS 136, Spring 2009 Network Security: Firewalls continued, VPNS, Honeypots CS 136 Computer Security Peter Reiher May 14, 2009.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Lecture 13 Page 1 CS 136, Fall 2010 Network Security: Virtual Private Networks, Wireless Networks, and Honeypots CS 136 Computer Security Peter Reiher.
Lecture 12 Page 1 CS 236 Online Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite coasts.
Lecture 12 Page 1 CS 136, Fall 2011 Network Security: Con’t CS 136 Computer Security Peter Reiher November 3, 2011.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Lecture 11 Page 1 CS 136, Spring 2009 Network Security CS 136 Computer Security Peter Reiher May 7, 2009.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Lecture 18 Page 1 CS 236, Spring 2008 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
K. Salah1 Security Protocols in the Internet IPSec.
Lecture 12 Page 1 CS 136, Fall 2011 Network Security, Continued CS 136 Computer Security Peter Reiher November 1, 2011.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Outline Routing security DNS security. Securing Key Internet Technologies Computer Security Peter Reiher March 14, 2017.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Network Security: Firewalls, Network Cryptography, and Honeypots Computer Security Peter Reiher February 9, 2017.
DNS Security Advanced Network Security Peter Reiher August, 2014
Network Security Mechanisms
CSE 4905 IPsec.
Encryption and Network Security
Wireless Network Security
IT443 – Network Security Administration Instructor: Bo Sheng
Virtual Private Networks
Firewall Configuration and Administration
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
The Issue We all depend on the Internet
Virtual Private Networks (VPNs)
Outline Using cryptography in networks IPSec SSL and TLS.
Virtual Private Networks (VPNs)
Outline Basics of network security Definitions Sample attacks
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
Presentation transcript:

Lecture 11 Page 1 CS 136, Fall 2012 Network Security, Continued CS 136 Computer Security Peter Reiher November 6, 2012

Lecture 11 Page 2 CS 136, Fall 2012 Encryption and Network Security Relies on the kinds of encryption algorithms and protocols discussed previously Can be applied at different places in the network stack With different effects and costs

Lecture 11 Page 3 CS 136, Fall 2012 Link Level Encryption SourceDestination plaintext Let’s say we want to send a message using encryption ciphertext plaintextciphertext plaintextciphertext plaintextciphertext plaintext Different keys (maybe even different ciphers) used at each hop

Lecture 11 Page 4 CS 136, Fall 2012 End-to-End Encryption SourceDestination plaintextciphertext plaintext Cryptography only at the end points Only the end points see the plaintext Normal way network cryptography done When would link encryption be better?

Lecture 11 Page 5 CS 136, Fall 2012 Where Are the Endpoints, Anyway? If you do end-to-end encryption, where are the endpoints? The network layer end points? The transport layer end points? The application layer end points? Maybe not even end machine to end machine (e.g., VPNs)? Has serious implications for where you do cryptography –And keying and trust issues

Lecture 11 Page 6 CS 136, Fall 2012 IPsec Standard for applying cryptography at the network layer of IP stack Provides various options for encrypting and authenticating packets –On end-to-end basis –Without concern for transport layer (or higher)

Lecture 11 Page 7 CS 136, Fall 2012 What IPsec Covers Message integrity Message authentication Message confidentiality

Lecture 11 Page 8 CS 136, Fall 2012 What Isn’t Covered Non-repudiation Digital signatures Key distribution Traffic analysis Handling of security associations Some of these covered in related standards

Lecture 11 Page 9 CS 136, Fall 2012 Some Important Terms for IPsec Security Association - “ A Security Association (SA) is a simplex ‘connection’ that affords security services to the traffic carried by it.” –Basically, a secure one-way channel SPI (Security Parameters Index) – Combined with destination IP address and IPsec protocol type, uniquely identifies an SA

Lecture 11 Page 10 CS 136, Fall 2012 General Structure of IPsec Really designed for end-to-end encryption –Though could do link level Designed to operate with either IPv4 or IPv6 Meant to operate with a variety of different encryption protocols And to be neutral to key distribution methods Has sub-protocols –E.g., Encapsulating Security Payload

Lecture 11 Page 11 CS 136, Fall 2012 Encapsulating Security Payload (ESP) Protocol Encrypt the data and place it within the ESP The ESP has normal IP headers Can be used to encrypt just the payload of the packet Or the entire IP packet

Lecture 11 Page 12 CS 136, Fall 2012 ESP Modes Transport mode –Encrypt just the transport-level data in the original packet –No IP headers encrypted Tunnel mode –Original IP datagram is encrypted and placed in ESP –Unencrypted headers wrapped around ESP

Lecture 11 Page 13 CS 136, Fall 2012 ESP in Transport Mode Extract the transport-layer frame –E.g., TCP, UDP, etc. Encapsulate it in an ESP Encrypt it The encrypted data is now the last payload of a cleartext IP datagram

Lecture 11 Page 14 CS 136, Fall 2012 ESP Transport Mode Original IP header ESP Hdr Normal Packet Payload ESP Trlr ESP Auth Encrypted Authenticated

Lecture 11 Page 15 CS 136, Fall 2012 Using ESP in Tunnel Mode Encrypt the IP datagram –The entire datagram Encapsulate it in a cleartext IP datagram Routers not understanding IPsec can still handle it Receiver reverses the process

Lecture 11 Page 16 CS 136, Fall 2012 ESP Tunnel Mode New IP hdr ESP Hdr Original Packet Payload ESP Trlr ESP Auth Orig. IP hdr Encrypted Authenticated

Lecture 11 Page 17 CS 136, Fall 2012 Uses and Implications of Tunnel Mode Typically used when there are security gateways between sender and receiver –And/or sender and receiver don’t speak IPsec Outer header shows security gateway identities –Not identities of real parties Can thus be used to hide some traffic patterns

Lecture 11 Page 18 CS 136, Fall 2012 What IPsec Requires Protocol standards –To allow messages to move securely between nodes Supporting mechanisms at hosts running IPsec –E.g., a Security Association Database Lots of plug-in stuff to do the cryptographic heavy lifting

Lecture 11 Page 19 CS 136, Fall 2012 The Protocol Components Pretty simple Necessary to interoperate with non-IPsec equipment So everything important is inside an individual IP packet’s payload No inter-message components to protocol –Though some security modes enforce inter-message invariants

Lecture 11 Page 20 CS 136, Fall 2012 The Supporting Mechanisms Methods of defining security associations Databases for keeping track of what’s going on with other IPsec nodes –To know what processing to apply to outgoing packets –To know what processing to apply to incoming packets

Lecture 11 Page 21 CS 136, Fall 2012 Plug-In Mechanisms Designed for high degree of generality So easy to plug in: –Different crypto algorithms –Different hashing/signature schemes –Different key management mechanisms

Lecture 11 Page 22 CS 136, Fall 2012 Status of IPsec Accepted Internet standard Widely implemented and used –Supported in Windows 2000, XP, Vista, Windows 7 –In Linux 2.6 (and later) kernel The architecture doesn’t require everyone to use it RFC 3602 on using AES in IPsec still listed as “proposed” AES will become default for ESP in IPsec

Lecture 11 Page 23 CS 136, Fall 2012 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite coasts of the US How can you have secure cooperation between them? Could use leased lines, but...

Lecture 11 Page 24 CS 136, Fall 2012 Encryption and Virtual Private Networks Use encryption to convert a shared line to a private line Set up a firewall at each installation’s network Set up shared encryption keys between the firewalls Encrypt all traffic using those keys

Lecture 11 Page 25 CS 136, Fall 2012 Actual Use of Encryption in VPNs VPNs run over the Internet Internet routers can’t handle fully encrypted packets Obviously, VPN packets aren’t entirely encrypted They are encrypted in a tunnel mode –Often using IPSec Gives owners flexibility and control

Lecture 11 Page 26 CS 136, Fall 2012 Key Management and VPNs All security of the VPN relies on key secrecy How do you communicate the key? –In early implementations, manually –Modern VPNs use IKE or proprietary key servers How often do you change the key? –IKE allows frequent changes

Lecture 11 Page 27 CS 136, Fall 2012 VPNs and Firewalls VPN encryption is typically done between firewall machines –VPN often integrated into firewall product Do I need the firewall for anything else? Probably, since I still need to allow non-VPN traffic in and out Need firewall “inside” VPN –Since VPN traffic encrypted –Including stuff like IP addresses and ports –“Inside” means “later in same box” usually

Lecture 11 Page 28 CS 136, Fall 2012 VPNs and Portable Computing Increasingly, workers connect to offices remotely –While on travel –Or when working from home VPNs offer secure solution –Typically as software in the portable computer Usually needs to be pre-configured

Lecture 11 Page 29 CS 136, Fall 2012 VPN Deployment Issues Desirable not to have to pre-deploy VPN software –Clients get access from any machine Possible by using downloaded code –Connect to server, download VPN applet, away you go –Often done via web browser –Leveraging existing SSL code –Authentication via user ID/password –Implies you trust the applet... Issue of compromised user machine

Lecture 11 Page 30 CS 136, Fall 2012 Wireless Network Security Wireless networks are “just like” other networks Except... –Almost always broadcast –Generally short range –Usually supporting mobility –Often very open

Lecture 11 Page 31 CS 136, Fall 2012 Types of Wireless Networks networks –Variants on local area network technologies Bluetooth networks –Very short range Cellular telephone networks Line-of-sight networks –Dedicated, for relatively long hauls Satellite networks

Lecture 11 Page 32 CS 136, Fall 2012 The General Solution For Wireless Security Wireless networks inherently less secure than wired ones So we need to add extra security How to do it? Link encryption –Encrypt traffic just as it crosses the wireless network Decrypt it before sending it along

Lecture 11 Page 33 CS 136, Fall 2012 Why Not End-to-End Encryption? Some non-wireless destinations might not be prepared to perform crypto –What if wireless user wants protection anyway? Doesn’t help wireless access point provide exclusive access –Any eavesdropper can use network

Lecture 11 Page 34 CS 136, Fall Security Originally, protocols didn’t include security Once the need became clear, it was sort of too late –Huge number of units in the field –Couldn’t change the protocols So, what to do?

Lecture 11 Page 35 CS 136, Fall 2012 WEP First solution to the security problem Wired Equivalency Protocol Intended to provide encryption in networks –Without changing the protocol –So all existing hardware just worked The backward compatibility worked The security didn’t

Lecture 11 Page 36 CS 136, Fall 2012 What Did WEP Do? Used stream cipher (RC4) for confidentiality –With 104 bit keys –Usually stored on the computer using the wireless network –24 bit IV also used Used checksum for integrity

Lecture 11 Page 37 CS 136, Fall 2012 What Was the Problem With WEP? Access point generates session key from its own permanent key plus IV –Making replays and key deduction attacks a problem IV was intended to prevent that But it was too short and used improperly In 2001, WEP cracking method shown –Took less than 1 minute to get key

Lecture 11 Page 38 CS 136, Fall 2012 WPA and WPA2 Generates new key for each session Can use either TKIP or AES mode Various vulnerabilities in TKIP mode AES mode hasn’t been cracked yet –May be available for some WPA –Definitely in WPA2

Lecture 11 Page 39 CS 136, Fall 2012 Honeypots and Honeynets A honeypot is a machine set up to attract attackers Classic use is to learn more about attackers Ongoing research on using honeypots as part of a system’s defenses

Lecture 11 Page 40 CS 136, Fall 2012 Setting Up A Honeypot Usually a machine dedicated to this purpose Probably easier to find and compromise than your real machines But has lots of software watching what’s happening on it Providing early warning of attacks

Lecture 11 Page 41 CS 136, Fall 2012 What Have Honeypots Been Used For? To study attackers’ common practices There are lengthy traces of what attackers do when they compromise a honeypot machine Not clear these traces actually provided much we didn’t already know

Lecture 11 Page 42 CS 136, Fall 2012 Honeynets A collection of honeypots on a single network –Maybe on a single machine with multiple addresses –More often using virtualization Typically, no other machines are on the network Since whole network is phony, all incoming traffic is probably attack traffic

Lecture 11 Page 43 CS 136, Fall 2012 What Can You Do With Honeynets? Similar things to honeypots –But at the network level Also good for tracking the spread of worms –Worm code typically visits them repeatedly Main tool for detecting and analyzing botnets Gives evidence on of DDoS attacks –Through backscatter –Based on attacker using IP spoofing

Lecture 11 Page 44 CS 136, Fall 2012 Honeynets and Botnets Honeynets widely used by security researchers to “capture” bots Honeynet is reachable from Internet Intentionally weakly defended Bots tend to compromise them Researcher gets a copy of the bot

Lecture 11 Page 45 CS 136, Fall 2012 Issues With Honeynet Research Don’t want captured bot infecting others –Or performing other attack activities So you need to prevent it from attacking out But you also need to see its control traffic

Lecture 11 Page 46 CS 136, Fall 2012 What To Do With a Bot? When the bot is captured, what do you do with it? Typically, analyze it –Especially for new types of bots –To find weaknesses –And to track rest of botnet Analysis helpful for tracing “ancestry”

Lecture 11 Page 47 CS 136, Fall 2012 Do You Need A Honeypot? Not in the same way you need a firewall Only useful if your security administrator spending a lot of time watching things –E.g., very large enterprises Or if your job is observing hacker activity Something that someone needs to be doing –Particularly, security experts watching the overall state of the network world –But not necessarily you

Lecture 11 Page 48 CS 136, Fall 2012 DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses –E.g., thesiger.cs.ucla.edu translates to –DNS also provides other similar services It wasn’t designed with security in mind

Lecture 11 Page 49 CS 136, Fall 2012 DNS Threats Threats to name lookup secrecy –Definition of DNS system says this data isn’t secret Threats to DNS information integrity –Very important, since everything trusts that this translation is correct Threats to DNS availability –Potential to disrupt Internet service

Lecture 11 Page 50 CS 136, Fall 2012 What Could Really Go Wrong? DNS lookups could be faked –Meaning packets go to the wrong place The DNS service could be subject to a DoS attack –Or could be used to amplify one Attackers could “bug” a DNS server to learn what users are looking up

Lecture 11 Page 51 CS 136, Fall 2012 Where Does the Threat Occur? Unlike routing, threat can occur in several places –At DNS servers –But also at DNS clients Which is almost everyone Core problem is that DNS responses aren’t authenticated

Lecture 11 Page 52 CS 136, Fall 2012 The DNS Lookup Process ping thesiger.cs.ucla.edu Should result in a ping packet being sent to lookup thesiger.cs.ucla.edu answer If the answer is wrong, in standard DNS the client is screwed

Lecture 11 Page 53 CS 136, Fall 2012 How Did the DNS Server Perform the Lookup? Leaving aside details, it has a table of translations between names and addresses It looked up thesiger.cs.ucla.edu in the table And replied with whatever the address was

Lecture 11 Page 54 CS 136, Fall 2012 Where Did That Table Come From? Ultimately, the table entries are created by those owning the domains And stored at servers that are authoritative for that domain –Cached temporarily at other DNS servers In this case, the UCLA Computer Science Department DNS server ultimately stored it Other servers use a hierarchical lookup method to find the translation when needed

Lecture 11 Page 55 CS 136, Fall 2012 Doing Hierarchical Translation lookup thesiger.cs.ucla.edu DNS root server Where’s edu? edu root server Where’s ucla.edu? ucla.edu root servercs.ucla.edu root server Where’s thesiger.cs.ucla.edu? Where’s cs.ucla.edu?

Lecture 11 Page 56 CS 136, Fall 2012 Where Can This Go Wrong? Someone can spoof the answer from a DNS server –Relatively easy, since UDP is used One of the DNS servers can lie Someone can corrupt the database of one of the DNS servers

Lecture 11 Page 57 CS 136, Fall 2012 The Spoofing Problem lookup thesiger.cs.ucla.edu answer answer Unfortunately, most DNS stub resolvers will take the first answer The client will cache and use the bad answer for a long time DNS Cache Poisoning

Lecture 11 Page 58 CS 136, Fall 2012 What About Server Caching? Intermediate DNS servers also cache lookups If the hacker poisons their cache, they tell clients the wrong information Much wider impact than poisoning the cache of a single client machine

Lecture 11 Page 59 CS 136, Fall 2012 The DNSSEC Solution Sign the translations Who does the signing? –The server doing the response? –Or the server that “owns” the namespace in question? DNSSEC uses the latter solution

Lecture 11 Page 60 CS 136, Fall 2012 Implications of the DNSSEC Solution DNS databases must store signatures of resource records There must be a way of checking the signatures The protocol must allow signatures to be returned

Lecture 11 Page 61 CS 136, Fall 2012 Checking the Signature Basically, use certificates to validate public keys for namespaces Who signs the certificates? –The entity controlling the higher level namespace This implies a hierarchical solution

Lecture 11 Page 62 CS 136, Fall 2012 The DNSSEC Signing Hierarchy In principle, ICANN signs for itself and for top level domains (TLDs) –Like.com,.edu, country codes, etc. Each TLD signs for domains under it Those domains sign for domains below them And so on down

Lecture 11 Page 63 CS 136, Fall 2012 An Example Who signs the translation for thesiger.cs.ucla.edu to ? The UCLA CS DNS server How does someone know that’s the right server to sign? Because the UCLA server says so –Securely, with signatures The edu server verifies the UCLA server’s signature Ultimately, hierarchical signatures leading up to ICANN’s attestation of who controls the edu namespace Where do you keep that information? –In DNS databases

Lecture 11 Page 64 CS 136, Fall 2012 A Major Issue When you look up something like cs.ucla.edu, you get back a signed record What if you look up a name that doesn’t exist? How can you get a signed record for every possible non-existent name?

Lecture 11 Page 65 CS 136, Fall 2012 The DNSSEC Solution Names are alphabetically orderable Between any two names that exist, there are a bunch of names that don’t Sign the whole range of non-existent names If someone looks one up, give them the range signature

Lecture 11 Page 66 CS 136, Fall 2012 For Example, lasr.cs.ucla.edu pelican.cs.ucla.edu toucan.cs.ucla.edu pelican.cs.ucla.edu toucan.cs.ucla.edu lbsr.cs.ucla.edu – pd.cs.ucla.edu NOT ASSIGNED > host last.cs.ucla.edu You get authoritative information that the name isn’t assigned Foils spoofing attacks

Lecture 11 Page 67 CS 136, Fall 2012 Status of DNSSEC Working implementations available Beginning to get out there –ICANN has signed the root –.com,.gov,.edu,.org,.net signed at top level –Not everyone below has signed, though Many “islands” of DNSSEC signatures –Signing for themselves and those below them Utility depends on end machines checking signatures