CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Kerberos and X.509 Fourth Edition by William Stallings
CSCE 815 Network Security Lecture 10 KerberosX.509 February 13, 2003.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Network Security Essentials Chapter 11
Cryptography and Network Security Chapter 14
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
Firewalls Uyanga Tserengombo
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Authentication Applications We cannot enter into alliance with neighbouring princes until we are acquainted with their designs. —The Art of War, Sun Tzu.
Network Security Essentials Chapter 4
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Cryptography and Network Security (CS435) Part Eleven (Digital Signatures and Authentication Protocols)
Security Firewall Firewall design principle. Firewall Characteristics.
—On War, Carl Von Clausewitz
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Chapter 11 Firewalls.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Cryptography and Network Security Chapter 20 Fourth Edition by William Stallings.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Cryptography and Network Security Chapter 20 Firewalls
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
The Security Aspect of Social Engineering Justin Steele.
CSCE 815 Network Security Lecture 23 Jails and such April 15, 2003.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz.
Unit 1: Protection and Security for Grid Computing Part 2
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
1 Authentication Applications Behzad Akbari Fall 2010 In the Name of the Most High.
Cryptography and Network Security Chapter 14 Authentication Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed and extended by.
Module 4 Network & Application Security: Kerberos – X509 Authentication service – IP security Architecture – Secure socket layer – Electronic mail security.
KERBEROS. Introduction trusted key server system from MIT.Part of project Athena (MIT).Developed in mid 1980s. provides centralised private-key third-party.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Lecture 25 Presented by: Dr. Munam Ali Shah.
Cryptography and Network Security Chapter 14
Cryptography and Network Security
Computer Security Firewalls and Intrusion Prevention Systems.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Cryptography and Network Security Chapter 14
Cryptography and Network Security
Authentication Applications
* Essential Network Security Book Slides.
Cryptography and Network Security Chapter 14
Firewalls Purpose of a Firewall Characteristic of a firewall
Cryptography and Network Security Chapter 14
POOJA Programmer, CSE Department
Digital Certificates and X.509
Firewalls.
Cryptography and Network Security Chapter 14
Kerberos and X.509 Fourth Edition by William Stallings
Cryptography and Network Security Chapter 14
Presentation transcript:

CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina

10/25/20052 Certificates An instrument signed by an authority to certify something about a subject Original function is to bind names to keys or keys to names Now it can contain authorization, delegation, and validity conditions

10/25/20053 Types of Certificates ID certificates name  key Attribute certificates authorization  name Authorization certificates authorization  key An attribute certificate needs to combine with an ID certificate to be used for authorization

10/25/20054 X.509 Authentication Service Part of CCITT X.500 directory service standards distributed servers maintaining some info database Define framework for authentication services directory may store public-key certificates with public key of user signed by certification authority Also define authentication protocols Use public-key cryptography and digital signatures algorithms not standardised, but RSA recommended

10/25/20055 X.509 Certificates Issued by a Certification Authority (CA), containing: version (1, 2, or 3) serial number (unique within CA) identifying certificate signature algorithm identifier issuer X.500 name (CA) period of validity (from - to dates) subject X.500 name (name of owner) subject public-key info (algorithm, parameters, key) issuer unique identifier (v2+) subject unique identifier (v2+) extension fields (v3) signature (of hash of all fields in certificate) Notation CA > denotes certificate for A signed by CA

10/25/20056 X.509 Certificates

10/25/20057 Obtaining a Certificate Any user with access to CA can get any certificate from it Only the CA can modify a certificate Certificates can be placed in a public directory since they cannot be forged

10/25/20058 CA Hierarchy If both users share a common CA then they are assumed to know its public key Otherwise CA's must form a hierarchy Use certificates linking members of hierarchy to validate other CA's each CA has certificates for clients (forward) and parent (backward) each client trusts parents certificates enable verification of any certificate from one CA by users of all other CAs in hierarchy

10/25/20059 CA Hierarchy Use

10/25/ Certificate Revocation Certificates have a period of validity May need to revoke before expiry, eg: 1. user's private key is compromised 2. user is no longer certified by this CA 3. CA's certificate is compromised CA’s maintain list of revoked certificates the Certificate Revocation List (CRL) Users should check certs with CA’s CRL

10/25/ Authentication Procedures X.509 includes three alternative authentication procedures One-Way Authentication Two-Way Authentication Three-Way Authentication All use public-key signatures

10/25/ One-Way Authentication 1 message (A->B) used to establish the identity of A and that message is from A message was intended for B integrity & originality of message message must include timestamp, nonce, B's identity and is signed by A

10/25/ Two-Way Authentication 2 messages (A->B, B->A) which also establishes in addition: the identity of B and that reply is from B that reply is intended for A integrity & originality of reply reply includes original nonce from A, also timestamp and nonce from B

10/25/ Three-Way Authentication 3 messages (A->B, B->A, A->B) which enables above authentication without synchronized clocks has reply from A back to B containing signed copy of nonce from B means that timestamps need not be checked or relied upon

10/25/ X.509 Version 3 It has been recognized that additional information is needed in a certificate /URL, policy details, usage constraints Define a general extension method rather than naming new fields Components of extensions extension identifier criticality indicator extension value

10/25/ Certificate Extensions Key and policy information convey info about subject & issuer keys, plus indicators of certificate policy Certificate subject and issuer attributes support alternative names, in alternative formats for certificate subject and/or issuer Certificate path constraints allow constraints on use of certificates by other CA’s

10/25/ Need of Firewalls Everyone want to be on the Internet and to interconnect networks Persistent security concerns cannot easily secure every system in organization Use firewall to provide “harm minimization”

10/25/ Functions of Firewalls A choke point of control and monitoring Interconnect networks with differing trust Impose restrictions on network services only authorized traffic is allowed Auditing and controlling access can implement alarms for abnormal behavior Immune to penetration Provide perimeter defence

10/25/ What Firewalls Can Do Service control Direction control User control Behavior control

10/25/ What Firewalls Cannot Do Cannot protect from attacks bypassing it e.g. sneaker net, utility modems, trusted organisations, trusted services (e.g. SSL/SSH) Cannot protect against internal threats e.g. disgruntled employee Cannot protect against transfer of all virus infected programs or files because of huge range of OS and file types

10/25/ Types of Firewalls Three common types Packet-filtering router Application-level gateway Circuit-level gateway

10/25/ Packet-filtering Router

10/25/ Packet-filtering Router Foundation of any firewall system Examine each IP packet (no context) and permit or deny according to rules Restrict access to services (ports) Possible default policies prohibited if not expressly permitted permitted if not expressly prohibited

10/25/ Examples of Rule Sets

10/25/ Attacks on Packet Filters IP address spoofing fake source address to be trusted add filters on router to block Source routing attacks attacker sets a route other than default block source routed packets Tiny fragment attacks split header info over several tiny packets either discard or reassemble before check

10/25/ Stateful Packet Filters Examine each IP packet in context keep tracks of client-server sessions check each packet validly belongs to one Better able to detect bogus packets out of context

10/25/ Application Level Gateway

10/25/ Application Level Gateway Use an application specific gateway / proxy Has full access to protocol user requests service from proxy proxy validates request as legal then actions request and returns result to user Need separate proxies for each service some services naturally support proxying others are more problematic custom services generally not supported

10/25/ Circuit Level Gateway

10/25/ Circuit Level Gateway Relay two TCP connections Impose security by limiting which such connections are allowed Once created, usually relays traffic without examining contents Typically used when trust internal users by allowing general outbound connections SOCKS commonly used for this

10/25/ Bastion Host Highly secure host system Potentially exposed to "hostile" elements, so need to be secured to withstand this May support 2 or more net connections May be trusted to enforce trusted separation between network connections Run circuit / application level gateways or provide externally accessible services

10/25/ Firewall Configurations

10/25/ Firewall Configurations

10/25/ Firewall Configurations

10/25/ Next Class Presentation of paper “A Framework for Classifying Denial of Service Attack” Submit your review through dropbox before class