COMP3123 Internet Security Richard Henson University of Worcester November 2011.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
HIPAA Security Standards What’s happening in your office?
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Layer 7- Application Layer
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Internet Protocol Security (IPSec)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
Virtual Private Network
CSCI 6962: Server-side Design and Programming
Course 201 – Administration, Content Inspection and SSL VPN
COMP2121 Internet Technology Richard Henson April 2011.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Basic Technology for Electronic Commerce Fan Fan address: GUANGXI UNIVERSITY BUSINESS SCHOOL 2005.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Chapter 7: Using Windows Servers to Share Information.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
COMP3123 Internet Security Richard Henson University of Worcester November 2010.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
CHAPTER 9 Sniffing.
COMP1321 Digital Infrastructures Richard Henson University of Worcester April 2013.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
K. Salah1 Security Protocols in the Internet IPSec.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
COMP1321 Digital Infrastructure Richard Henson March 2016.
COMP2322 Networks in Organisations Richard Henson University of Worcester April 2016.
APACHE Apache is generally recognized as the world's most popular Web server (HTTP server). Originally designed for Unix servers, the Apache Web server.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester December 2009.
Chapter 7: Using Windows Servers
TOPIC: HTTPS (Security protocol)
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Using SSL – Secure Socket Layer
COMP3371 Internet Security
Goals Introduce the Windows Server 2003 family of operating systems
COMP1321 Digital Infrastructures
Cengage Learning: Computer Networking from LANs to WANs
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

COMP3123 Internet Security Richard Henson University of Worcester November 2011

Week 8 Communications: Securing Web Pages n Objectives:  Explain how HTTPS/SSL/TLS fits into the OSI seven layer model  Take the necessary steps to implement an SSL system on a www server that uses EAP/TLS  Apply PKI principles to produce a workable for protecting web pages at the client end

Reminder: TCP/IP model TELNETFTP TCP/TLS SMTPHTTPhttp-s Session layer protocols: eg Unix “sockets”, SSL n Zoom in on TCP and the upper layers… Level 7 Level 5 Level 4

Secure Sockets and the Session Layer n In the early days of Unix, someone devised the concept of a logical “socket”:  protocol between application and transport layers that TCP could plug in to with the help of a TCP port  “socket” dealt with network authentication  with OSI, concept evolved into the session layer n When Windows (application layer) first interfaced with TCP/IP…  Session layer protocol known as WINSOCK

“Session” Secure HTTP (https) and the session layer n Application layer protocols communicate with TCP layer through unique TCP logical ports via (optional) session layer logon n Anonymous ftp, http, etc… bypass session layer  no authentication Layer 7 Layer 4

“Session” Secure HTTP (https) and the session layer n Security can be imposed, by authenticating at the “logon” layer  username/password check is required before data can pass the session layer and be displayed by the browser  remote logon e.g. by Kerberos authentication Layer 7 Layer 4

The Trouble with HTTP n General Internet principle of “anyone can go anywhere” n On a Windows system with www access:  TCP can link to HTTP through “Winsock”  session layer authentication bypassed  HTML data transferred directly to the presentation and application layers for display n Problem (security):  the data is visible to anyone else on the Internet who may have access to that machine and the data path to it!

Secure HTTP and the user authentication problem n Even http can be set up at the server end to require authentication at the session layer… data not encrypted n SSL protocol can require a username/password combination before data passes through the socket from transport layer to application layer… encrypts by default application transport authentication required

SSL-based Authentication n SSL is able to use the PKI (remember that?) n When a user first attempts to communicate with a web server over a secure connection:  that server will present the web browser with authentication data  presented as a server certificate (remember those?) »verifies that the server is who and what it claims to be n Works both ways…  protocol: EAP/TLS  server may in return request client authentication via username/password

SSL and Encryption n Authenticating the user & server only helps when the data is at its at its source or destination  data also needs to be protected in transit… n SSL working at level 5/6 also ensures that it is: »encrypted before being sent »decrypted upon receipt and prior to processing for display

Confidentiality & Integrity n Encryption of SSL responses can be  standard 40 bit RSA »one time difficult to break confidentiality  secure 128 bit RSA »difficult to “crack” even now n Guarantee that the data will not be modified in transit by a third party  integrity therefore also maintained

Is an SSL Digital Certificate Really Necessary? n Yes:  for sites involved in e-commerce and therefore involving digital payment with authentication  any other business transaction in which authentication is important n No:  if an administrator simply wants to ensure that data being transmitted and received by the server is private and cannot be snooped by anyone eavesdropping on the connection  In such cases, a self-signed certificate is sufficient

The Web of Trust (PGP) n Based on individual trust networks built up between individuals n Possible to “self sign” a digital certificate  if someone trusts you, a self-signature may be all they need  OpenPGP identiity certificates are designed to be self-signed

Verisign Trust System n Web of Trust  OK for academics (“good” people?)  but bad” people can do business n Verisign system presented as an alternative  developed so that people could trust strangers in business transactions  financial institutions provide the “trust”

General Tips on Running SSL n Secure websites…  designed to be as efficient as securely possible »problem: encryption/decryption is computationally expensive from a performance standpoint  not strictly necessary to run an entire Web application over SSL  customary for a developer to: »find out which pages require a secure connection and which do not »create secure and non-secure folder structures for the respective web pages

When to use SSL n Whenever web pages require a secure connection with the server e.g.:  login pages  personal information pages  shopping cart checkouts  any pages where credit card information could possibly be transmitted

HTTPS n A client-server service that runs on the Web server (by default, on TCP port 443)  uniquely designed so it will not run on a server without an installed and active server certificate n Once the service has been set up, https will require users to establish an encrypted channel with the server  i.e.  rather than n Until the user does use https they will get an error, rather than the pop up that proceeds the secure web page

Why not use HTTPS? n Encryption can interfere with access to data… (i.e. availability)  an encrypted channel running https requires … »that the user's Web browser and the Web server BOTH support the same encryption scheme »And have the appropriate key(s)  for example: »IF an IIS Web Server is set to use default secure communication settings »THEN the client Web browser must support a session key strength of 40 bits, or greater

Accessing a Web Page using HTTPS n If the client is to request a page that needs SSL:  in the HTML code that will call that page, prefix the address with instead of and the system will do the rest n Any pages which absolutely require a secure connection should:  check the protocol type associated with the page request  take the appropriate action if https: is not specified

Browser Prompts: Web Page delivered securely using SSL n (depending on browser settings) A pop up appears…  informs the client that they are entering a secure client-server connection  pop up must be acknowledged to continue n When page is be displayed:  will appear before the URL  A “lock” symbol appears on the bottom left of the screen

“Virtual Hosts” (http) n Useful technology for ISPs n Enables many different folders/websites to be used in conjunction with a web server  but all have the same IP address!! n Done by careful mapping with the real domain name that corresponds to the IP address  even though the folder names appear to have different URLs  they all originate from the same domain name

“Virtual Hosts” and SSL n The SSL “handshake”, where the client browser accepts the server certificate, must occur before the HTTP request is accessed  i.e. at a lower OSI layer… n Consequences:  the request information containing a virtual host name cannot be determined prior to authentication  therefore not possible to assign multiple certificates to a single IP address n Using name-based virtual hosts on a secured connection is therefore problematic…

Virtual Hosts and SSL n If all the virtual hosts on a single IP address will need to authenticate against the same certificate…  multiple “virtual hosts” should not interfere with normal SSL operations on the server n However  most client browsers will compare the server's domain name against the domain name listed in the certificate  if the domain names don’t match, these browsers will display a warning pop-up message to the client  may cause unnecessary alarm at the client end!

VPNs using SSL n Http-based applications and access are now potentially available to anyone with a browser  browsers how available for portable devices…  the whole nature of keeping data secure has changed… n SSL VPN’s developed to:  complement existing SSL implementations  increase the level of access control and security  address the challenge of increased risks of fraud, threats and hacks that could compromise the security of application access

The apparent contradiction of SSL VPN n By now, you should understand what SSL and VPN means independently, but what does this new phrase mean together? n To sum up, SSL works at OSI layers 5-7:  secures data over the Internet with encryption that is automatically enabled in every browser  requires a certificate is needed for the web server, but turning on SSL is relatively straightforward for an application  doesn’t work with all applications and changing some links might be needed, but this depends solely on the application

The apparent contradiction of SSL VPN n Conventional VPNs, on the other hand:  focus around virtually connecting networks  always associated with IPSec (level 1, 2, 3) »the de-facto protocol used to encrypt traffic for VPN »ensure privacy of the data and a certain level of access control  IPSec VPNs are used to securely connect devices »across the physical network »across two networks »between two end-points

So, how can SSL and VPN work together successfully? n Compared to IPSec, SSL VPNs provide the best technological solution to the business problem of:  easily and securely connecting end users on the move to critical corporate data n Any machine with a browser can use SSL VPN’s  traditional VPN needs to have a physical client installed on every machine used for access  SSL provides an easy to use avenue to access information, replacing the difficult to use VPN client/IPsec

SSL, multiple machines and the flexible VPN n As SSL is embedded in the browser…  no need for client software!  if users have several machines (Home, work, client site, mobile device) they use the browser to connect »makes life much easier n Yet VPN describes secure remote access tunnels to individual clients and servers…  at an academic level…. »the two concepts of VPN & SSL used together seem to contradict  in reality »present a solution to technological demands of the mobile devices & secure remote access

SSL VPNs or IPSec VPNs? (horses for courses) n IPsec still seen as the standard for secure inter-office networking (i.e. where there are no complications):  common platform of office PCs  no need to send data across complex infrastructures or firewalls n As soon as the structure becomes cross- platform, intranetwork, across the firewall to the Internet…  SSL VPN using an Internet browser is a more effective solution than IPSec

Securely supporting Wireless Users n One of the big issues of the current times:  management want users out in “the field” to use wireless devices to communicate with base  IT managers worried about security… n Hence articles like this:  “IT security is broken, so can companies stay safe?” »BBC business reporter writing about BBC IT network »

Wireless Protocols n Current standards for wireless connections at lower OSI layers developed by the IEEE (Institute of Electrical and Electronic Engineers) and manufacturers are:  IEEE802.11g  Bluetooth n The IP protocol is slightly changed to cope with these standards

Wireless Data is Broadcast… source destination lurker

VPNs use a specified route… e.g. VPN shown in green

Protecting Wireless access n Because packets are easily intercepted the data absolutely MUST be encrypted n In the unlikely scenario that the interceptor:  works out the encryption method  and intercepts the encryption key…  data could be further safeguarded by use of VPN techniques »e.g. tunnelling and encapsulation

Wireless access and SSL VPNs n Another job for SSL VPNs…  allow authentication and authorization of users from anywhere  ensure secure access to all resources n Traditional wireless LAN model  WEP (Wireless Encryption Protocol) security based on authentication keys:  shared by anyone accessing that wireless hub »therefore additional support steps to regularly update and maintain security n More practical alternative:  Internet café model »all wireless users in proximity of a wireless hotspot can view a portal n but denied access “inside” unless they confirm authentication

Wireless SSL VPNs n In an enterprise wireless network scenario, wireless users can be directed through a suitably configured SSL VPN  but denied access to any resources until they log in for authentication n Provides central control of access to resources through a single gateway  whether users log in from: »a docked laptop at their desk »an undocked laptop in a conference room »a handheld PDA from elsewhere on the campus

A Secure Wireless Network Scenario (1) n The organisation establishes an array of WiFi access points distributed across the campus  wireless hubs located in multiple buildings n On entering range of a “hotspot”;  all wireless users may connect to the Internet »but no access to any internal or external (public Internet) resources »when wireless network user launches a browser, immediately redirected to a login page for authentication through the SSL VPN

A Secure Wireless Scenario (2) n Wireless user uses username/password for authentication n Once authenticated, software agents can quickly do a background scan of user's end point device: »detect its identity and integrity: »check for the presence of valid software certificates »check up-to-dateness of antivirus software & Windows patches

A Secure Wireless Scenario (3) n If the device meets the scan criteria:  user is fully authorized  then presented with a portal for accessing their network files, applications and directories based on their role and privileges n Otherwise the user can be automatically be:  Either redirected to a quarantined site offering easy self-remediation steps  Or denied access to the network altogether

Security Controls on Complex Networks n Group of British security researchers and professionals coined the phrase  Information Security Management System (ISMS)  British Standard for an ISMS emerged in the 1990s  BSI7799 »over 130 information security controls »many not technical »require management control of user behaviour

Process-based Information Security n ISMS development process based:  uses PCDA »Plan »Do »Check »Act  contrast with PCI-DSS check list n ISO27001 Certification awarded to organisations who appropriately use the process model covering the 130+ controls

International Standard for ISMS  BSI 7799 evolved (2005) into an International Standard ISO27001  Soon became popular in Japan & along Pacific Rim  Also in some Eastern European countries »some UK interest »but most companies have not become certificated »WHY???

SMEs and Developing an ISMS n ISO27001 difficult for SMEs  especially information risk assessment  yet if they could engage, could identify greatest risks and reduce controls n IASME (Information Assurance for SMEs) developed by University of Worcester, NCC & experienced consultants assistance from govt funding (Technology Strategy Board)  makes risk assessment doable  takes into account small business culture  released this year… 2011

Thanks for Listening Thanks for Listening