Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Similar presentations


Presentation on theme: "Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems."— Presentation transcript:

1 Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems as with stand- alone computer systems apply and are more difficult: o User authentication and authorization – determine the identity and privileges of users accessing the system o Access control – limiting what actions are permitted

2 Chapter 9  Network Security 2 Additional Challenges of Network Security  Networking increases message vulnerability to: o Interception o Modification o Destruction o Delay o Reordering o Repetition  Networking implies cooperation, sharing, and trust  Networking exposes a system to a larger pool of potential attackers and decreases the likelihood of intruders getting caught

3 Chapter 9  Network Security 3 Authentication and Authorization  Issues: o For the Server:  Is the Client really who they say they are?  Is the request from the Client fresh?  Will an eavesdropper be able to read my response? o For the Client:  How do I know I’m really talking to the Server?  Will an eavesdropper be able to read my request?

4 Chapter 9  Network Security 4 Kerberos - Overview  Trusted third-party authentication service for computer networks  Developed at the Massachusetts Institute of Technology  Based on the client-server architecture  Capabilities: o A client program requesting a service can prove the identity of the user on whose behalf it is operating o Clients can also (optionally) ask a server program to authenticate itself o Kerberos can protect the privacy and integrity of messages between clients and servers

5 Chapter 9  Network Security 5 How Kerberos Works  Shares a secret DES key with each user  Phase 1: user obtains credentials (from Kerberos) to be used to request access to other services  Phase 2: user requests authentication (from Kerberos) for a specific service  Phase 3: user presents credentials to a server

6 Chapter 9  Network Security 6 Kerberos Credentials  Tickets o Generated by the Kerberos o Valid until expiration o Used to securely pass the identity of the person to whom the ticket was issued from Kerberos to a server o Contains:  Person’s identity  Information to show that the person using the ticket is the person to whom it was issued  Authenticators o Generated by the user o Valid only once o Used to show that the person using the ticket is the person to whom it was issued

7 Chapter 9  Network Security 7 Kerberos Credentials (cont)  Ticket = Encrypt((Server,Client,Addr,Timestamp,Lifetime,K S-C ),K S )  Authenticator = Encrypt((Client,Addr,Timestamp),K S-C ) o Server is the name of the server o Client is the name of the client o Addr is the client’s IP address o Timestamp is the time the ticket was generated o Lifetime is the amount of time for which the ticket is valid o K SC is the session key to be shared between the Server and the Client o K S is the DES key shared between the AS and the Server

8 Chapter 9  Network Security 8 Getting the Initial Ticket  User enters username  Request for ticket for ticket- granting service (TGS) sent to authentication server (AS) ClientAS Client, TGS

9 Chapter 9  Network Security 9 Getting the Initial Ticket (cont)  AS checks that Client is a valid user  Generates a session key, K C-TGS, for the Client and the TGS  Generates a ticket, Encrypt((TGS,Client,Addr, Timestamp, Lifetime,K C-TGS,,),K TGS ), for the Client to use for the TGS  Sends session key and ticket back to Client (encrypted with Client’s key, K C ) ClientAS Encrypt((session key,ticket),K C )

10 Chapter 9  Network Security 10 Getting the Initial Ticket (cont)  User enters password  Password is converted to a DES key and used to decrypt the AS’s reply  Client’s machine: o Stores session key and ticket o Erases the user’s password and DES key from memory

11 Chapter 9  Network Security 11 Getting a Ticket for a Server  Client contacts TGS and requests a ticket for Server: o Name of Server o Client’s TGS ticket, Encrypt((TGS,Client,Addr, Timestamp, Lifetime,K C-TGS,,),K TGS ) o Client’s authenticator, Encrypt((Client,Addr,Timestamp), K C-TGS )  Client’s request is encrypted under its session key with the TGS, K C-TGS ClientTGS Encrypt((Server,ticket,A C ),K C-TGS )

12 Chapter 9  Network Security 12 Getting a Ticket for a Server (cont)  TGS: o Checks the ticket and authenticator o Generates a session key, K C-S, for the Client and the Server o Generates a ticket, Encrypt((Server,Client,Addr, Timestamp, Lifetime,K C-S,,),K S ), for the Client to use for the Server o Sends session key and ticket back to Client (encrypted with session key the Client and TGS share, K C-TGS ) ClientTGS Encrypt((ticket,session key),K C-TGS )

13 Chapter 9  Network Security 13 Requesting a Service  Client: o Builds an authenticator, Encrypt((Client,Addr,Timestamp), K C-S ) o Sends authenticator and ticket, Encrypt((Server,Client,Addr, Timestamp, Lifetime,K C- S,,),K S ), to the Server ClientServer Authenticator, ticket

14 Chapter 9  Network Security 14 The Server’s Response  Server: o Decrypts and checks the ticket (learns the session key) o Decrypts and checks the authenticator o Optionally: increments the Timestamp by one and returns it to the Client encrypted with the session key ClientServer Encrypt(Timestamp+1,K C-S )

15 Chapter 9  Network Security 15 Overview of Kerberos Messages 1.Request for TGS ticket 2.Ticket for TGS 3.Request for Server Ticket 4.Ticket for Server 5.Request for service 6.Server authentication ASServerTGSClient 5 2 6 3 4 1

16 Chapter 9  Network Security 16 Limitations of Kerberos  Applications must be “Kerberized”  Based on: o Client/server model o Synchronized clocks  The TGS could be a bottleneck  Cross-realm operation doesn’t scale well

17 Chapter 9  Network Security 17 Interaction With Other Sites Using Kerberos  Both Site 1 and Site 2 run Kerberos:  Can clients at one site use Kerberos to access servers at the other site securely? Site 1Site 2

18 Chapter 9  Network Security 18 CORBA - Overview  Developed by the Object Management Group (OMG)  Standard that allows distributed applications, running in heterogeneous environments, to interoperate o Objects are entities that provide services to requestors through well-defined encapsulating interfaces o A reference model describes how the objects interoperate by requesting services from one another

19 Chapter 9  Network Security 19 CORBA – Example  Two objects, A and B  Assume that Object B has a method named foo( )  Object A can request service from B by invoking foo()  Problem: A and B might be implemented in different languages  Solution: a translation may be necessary to allow A to understand B’s request o A universal Interface Definition Language (IDL) allows A’s request can be converted from A’s native form into a request understandable to B

20 Chapter 9  Network Security 20 The Object Request Broker (ORB)  The Object Request Broker (ORB) mediates the interaction between the objects

21 Chapter 9  Network Security 21 Functions of the ORB  Deliver A’s request to B and B’s reply to A  Hide “low-level” details from calling objects: o Location (local or remote) o Implementation details (language and platform) o Execution state (currently running or needs to be started) o Communication mechanisms (TCP/IP, shared memory, local method invocation)

22 Chapter 9  Network Security 22 CORBA  The Common Object Request Broker Architecture (CORBA) standard: o Defined by OMG o Allows different ORBs to interoperate  The CORBA Security specification: o Optional o If implemented, the ORB provides basic security functionality to all objects:  Authentication  Communications security  Access control  Auditing

23 Chapter 9  Network Security 23 Services of a Secure ORB

24 Chapter 9  Network Security 24 Secure Interoperability  Problem: A client and target object may be distributed so that their interaction is not mediated by a single ORB  Solution: the secure inter-ORB protocol (SECIOP): o A standard interoperability protocol defined by CORBA o Establishes a secure communication channel between two ORBs o Allows authentication and message-protection data to be exchanged securely and in a format that all compliant ORBs understand

25 Chapter 9  Network Security 25 Interaction Between Two Secure ORBs

26 Chapter 9  Network Security 26 User Authentication and Authorization - Summary  Very difficult in a network environment: o Authentication - determining a user’s identity o Authorization – determining what actions a user can perform  Reasons: o Vulnerability of network communications o May be controlled by several different administrative authorities  Solutions: o Kerberos o Secure ORBs

27 Chapter 9  Network Security 27 Access Control for Networks  Problems: o Enforce an access control policy  Allow trust relationships among machines o Protect local internet from outsiders attempting to:  Obtain information, modify information, disrupt communications  Solution: firewall o Forms a barrier that protects one network from dangers on another  History: o Fireproof walls that are often used in buildings to form a barrier across which fire cannot spread o Helps to contain a fire and limit the amount of damage it can do

28 Chapter 9  Network Security 28 Firewalls  A firewall can: o Partition machines into those inside the organization and those outside the organization o Enforce an access control policy about what types of traffic are allowed in and out

29 Chapter 9  Network Security 29 Implementing a Firewall with a Screening Router  Screening routers perform packet filtering: o Examine some fields in the packet header:  Source and destination IP address  Protocol  Source and destination port numbers o Allow a packet to pass if it meets the screening criteria o Filtering rules are stateless to increase speed

30 Chapter 9  Network Security 30 A Screening Router

31 Chapter 9  Network Security 31 Filtering Rules  Administrator can specify rules regarding which packets should not pass through the firewall  Can block: o Outgoing packets to certain addresses - restrict which outside sites local users can access o Incoming packets from certain addresses - restrict access to specific external sites o Incoming and outgoing requests to specific services o Etc.

32 Chapter 9  Network Security 32 Sample Filter Rules  Row 1: Block incoming packets from any source to any destination for the finger service (TCP port 79) should be blocked  Row 2: Block incoming packets bound for the TFTP service (UDP port 69)  Row 3: Block outgoing packets bound for any machine on network 128.112

33 Chapter 9  Network Security 33 Screening Routers  Advantages: o Relatively cheap o Help improve security by blocking packets from/to dangerous sites and services  Disadvantages: o Still vulnerable to attacks on enabled services o Potential services are large (and growing) requiring frequent maintenance o Decisions must be made statelessly

34 Chapter 9  Network Security 34 Implementing a Firewall with a Proxy Gateway  A proxy gateway is more powerful than a screening router and can therefore do more/better checking: o Examine data (not just header) portion of packets o Remember the past behavior of a connection o Consider context – is this a response from the outside to a request that originated on the inside? o Etc.

35 Chapter 9  Network Security 35 Proxy Gateways  Two barriers: o Outer barrier: blocks all incoming/outgoing traffic not to/from the proxy gateway o Inner barrier: blocks all incoming/outgoing traffic not from/to the proxy gateway Global Internet Organization’s internet Outer Barrier Proxy Gateway Inner Barrier

36 Chapter 9  Network Security 36 Proxy Gateways (cont)  Each barrier is implemented by a screening router: o R2 blocks all traffic not destine for the proxy gateway o R1 blocks all traffic not from the proxy gateway Proxy Gatewa y R1 Global Interne t R2 Organization’ s internet Stub network

37 Chapter 9  Network Security 37 Proxy Gateways (cont)  The proxy gateway typically runs a set of application gateway programs  Act as middlemen between hosts inside and outside the firewall o Internal hosts communicate with the application gateway program running on the proxy gateway o Application gateway program relays request to the external host o The external host’s reply is sent to the application gateway program o Application gateway program performs some checking and then passes the reply on to the internal host

38 Chapter 9  Network Security 38 Proxy Gateway - Example  An FTP server behind a proxy gateway firewall o An external client issues commands to establish a connection and transfer files  Proxy gateway acts as a middleman between the client and server o The proxy can check incoming commands:  Pass only valid FTP commands on to the server  Protects the server from malformed or dangerous input o If the external client attempts to upload a file to the server:  The proxy could pass the file through virus-scanning software

39 Chapter 9  Network Security 39 Proxy Gateways  Advantages: o Can provide better protection than a screening router  Disadvantages: o Additional cost o Proxy gateway could be a:  Bottleneck  Single point of failure  Tempting target for attackers

40 Chapter 9  Network Security 40 Dynamic Firewall Techniques  Screening routers and proxy gateways enforce static security policies  Dynamic filters allow administrators to set up triggers: o Temporarily add, delete, or modify certain rules in response to particular events  Provides additional flexibility: o Permit or deny traffic in special circumstances  Provides additional security: o More stringent rules triggered when suspicious traffic is observed

41 Chapter 9  Network Security 41 Network Access Control - Summary  Access Control – need to protect local machines/networks from outsiders attempting to: o Obtain information o Modify information o Disrupt communications  Solution: firewalls (screening routers, proxy gateways, etc.) o Forms a barrier that protects one network from dangers on another


Download ppt "Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems."

Similar presentations


Ads by Google