Download presentation
Presentation is loading. Please wait.
Published byFelix Bell Modified over 9 years ago
2
COMP3123 Internet Security Richard Henson University of Worcester November 2011
3
Week 8 Communications: Securing Web Pages n Objectives: Explain how HTTPS/SSL/TLS fits into the OSI seven layer model Take the necessary steps to implement an SSL system on a www server that uses EAP/TLS Apply PKI principles to produce a workable for protecting web pages at the client end
4
Reminder: TCP/IP model TELNETFTP TCP/TLS SMTPHTTPhttp-s Session layer protocols: eg Unix “sockets”, SSL n Zoom in on TCP and the upper layers… Level 7 Level 5 Level 4
5
Secure Sockets and the Session Layer n In the early days of Unix, someone devised the concept of a logical “socket”: protocol between application and transport layers that TCP could plug in to with the help of a TCP port “socket” dealt with network authentication with OSI, concept evolved into the session layer n When Windows (application layer) first interfaced with TCP/IP… Session layer protocol known as WINSOCK
6
“Session” Secure HTTP (https) and the session layer n Application layer protocols communicate with TCP layer through unique TCP logical ports via (optional) session layer logon n Anonymous ftp, http, etc… bypass session layer no authentication Layer 7 Layer 4
7
“Session” Secure HTTP (https) and the session layer n Security can be imposed, by authenticating at the “logon” layer username/password check is required before data can pass the session layer and be displayed by the browser remote logon e.g. by Kerberos authentication Layer 7 Layer 4
8
The Trouble with HTTP n General Internet principle of “anyone can go anywhere” n On a Windows system with www access: TCP can link to HTTP through “Winsock” session layer authentication bypassed HTML data transferred directly to the presentation and application layers for display n Problem (security): the data is visible to anyone else on the Internet who may have access to that machine and the data path to it!
9
Secure HTTP and the user authentication problem n Even http can be set up at the server end to require authentication at the session layer… data not encrypted n SSL protocol can require a username/password combination before data passes through the socket from transport layer to application layer… encrypts by default application transport authentication required
10
SSL-based Authentication n SSL is able to use the PKI (remember that?) n When a user first attempts to communicate with a web server over a secure connection: that server will present the web browser with authentication data presented as a server certificate (remember those?) »verifies that the server is who and what it claims to be n Works both ways… protocol: EAP/TLS server may in return request client authentication via username/password
11
SSL and Encryption n Authenticating the user & server only helps when the data is at its at its source or destination data also needs to be protected in transit… n SSL working at level 5/6 also ensures that it is: »encrypted before being sent »decrypted upon receipt and prior to processing for display
12
Confidentiality & Integrity n Encryption of SSL responses can be standard 40 bit RSA »one time difficult to break confidentiality secure 128 bit RSA »difficult to “crack” even now n Guarantee that the data will not be modified in transit by a third party integrity therefore also maintained
13
Is an SSL Digital Certificate Really Necessary? n Yes: for sites involved in e-commerce and therefore involving digital payment with authentication any other business transaction in which authentication is important n No: if an administrator simply wants to ensure that data being transmitted and received by the server is private and cannot be snooped by anyone eavesdropping on the connection In such cases, a self-signed certificate is sufficient
14
The Web of Trust (PGP) n Based on individual trust networks built up between individuals n Possible to “self sign” a digital certificate if someone trusts you, a self-signature may be all they need OpenPGP identiity certificates are designed to be self-signed
15
Verisign Trust System n Web of Trust OK for academics (“good” people?) but bad” people can do business n Verisign system presented as an alternative developed so that people could trust strangers in business transactions financial institutions provide the “trust”
16
General Tips on Running SSL n Secure websites… designed to be as efficient as securely possible »problem: encryption/decryption is computationally expensive from a performance standpoint not strictly necessary to run an entire Web application over SSL customary for a developer to: »find out which pages require a secure connection and which do not »create secure and non-secure folder structures for the respective web pages
17
When to use SSL n Whenever web pages require a secure connection with the server e.g.: login pages personal information pages shopping cart checkouts any pages where credit card information could possibly be transmitted
18
HTTPS n A client-server service that runs on the Web server (by default, on TCP port 443) uniquely designed so it will not run on a server without an installed and active server certificate n Once the service has been set up, https will require users to establish an encrypted channel with the server i.e. https:// rather than http:// n Until the user does use https they will get an error, rather than the pop up that proceeds the secure web page
19
Why not use HTTPS? n Encryption can interfere with access to data… (i.e. availability) an encrypted channel running https requires … »that the user's Web browser and the Web server BOTH support the same encryption scheme »And have the appropriate key(s) for example: »IF an IIS Web Server is set to use default secure communication settings »THEN the client Web browser must support a session key strength of 40 bits, or greater
20
Accessing a Web Page using HTTPS n If the client is to request a page that needs SSL: in the HTML code that will call that page, prefix the address with https:// instead of http:// and the system will do the rest n Any pages which absolutely require a secure connection should: check the protocol type associated with the page request take the appropriate action if https: is not specified
21
Browser Prompts: Web Page delivered securely using SSL n (depending on browser settings) A pop up appears… informs the client that they are entering a secure client-server connection pop up must be acknowledged to continue n When page is be displayed: https:// will appear before the URL A “lock” symbol appears on the bottom left of the screen
22
“Virtual Hosts” (http) n Useful technology for ISPs n Enables many different folders/websites to be used in conjunction with a web server but all have the same IP address!! n Done by careful mapping with the real domain name that corresponds to the IP address even though the folder names appear to have different URLs they all originate from the same domain name
23
“Virtual Hosts” and SSL n The SSL “handshake”, where the client browser accepts the server certificate, must occur before the HTTP request is accessed i.e. at a lower OSI layer… n Consequences: the request information containing a virtual host name cannot be determined prior to authentication therefore not possible to assign multiple certificates to a single IP address n Using name-based virtual hosts on a secured connection is therefore problematic…
24
Virtual Hosts and SSL n If all the virtual hosts on a single IP address will need to authenticate against the same certificate… multiple “virtual hosts” should not interfere with normal SSL operations on the server n However most client browsers will compare the server's domain name against the domain name listed in the certificate if the domain names don’t match, these browsers will display a warning pop-up message to the client may cause unnecessary alarm at the client end!
25
VPNs using SSL n Http-based applications and access are now potentially available to anyone with a browser browsers how available for portable devices… the whole nature of keeping data secure has changed… n SSL VPN’s developed to: complement existing SSL implementations increase the level of access control and security address the challenge of increased risks of fraud, threats and hacks that could compromise the security of application access
26
The apparent contradiction of SSL VPN n By now, you should understand what SSL and VPN means independently, but what does this new phrase mean together? n To sum up, SSL works at OSI layers 5-7: secures data over the Internet with encryption that is automatically enabled in every browser requires a certificate is needed for the web server, but turning on SSL is relatively straightforward for an application doesn’t work with all applications and changing some links might be needed, but this depends solely on the application
27
The apparent contradiction of SSL VPN n Conventional VPNs, on the other hand: focus around virtually connecting networks always associated with IPSec (level 1, 2, 3) »the de-facto protocol used to encrypt traffic for VPN »ensure privacy of the data and a certain level of access control IPSec VPNs are used to securely connect devices »across the physical network »across two networks »between two end-points
28
So, how can SSL and VPN work together successfully? n Compared to IPSec, SSL VPNs provide the best technological solution to the business problem of: easily and securely connecting end users on the move to critical corporate data n Any machine with a browser can use SSL VPN’s traditional VPN needs to have a physical client installed on every machine used for access SSL provides an easy to use avenue to access information, replacing the difficult to use VPN client/IPsec
29
SSL, multiple machines and the flexible VPN n As SSL is embedded in the browser… no need for client software! if users have several machines (Home, work, client site, mobile device) they use the browser to connect »makes life much easier n Yet VPN describes secure remote access tunnels to individual clients and servers… at an academic level…. »the two concepts of VPN & SSL used together seem to contradict in reality »present a solution to technological demands of the mobile devices & secure remote access
30
SSL VPNs or IPSec VPNs? (horses for courses) n IPsec still seen as the standard for secure inter-office networking (i.e. where there are no complications): common platform of office PCs no need to send data across complex infrastructures or firewalls n As soon as the structure becomes cross- platform, intranetwork, across the firewall to the Internet… SSL VPN using an Internet browser is a more effective solution than IPSec
31
Securely supporting Wireless Users n One of the big issues of the current times: management want users out in “the field” to use wireless devices to communicate with base IT managers worried about security… n Hence articles like this: “IT security is broken, so can companies stay safe?” »BBC business reporter writing about BBC IT network »http://www.bbc.co.uk/news/business-11793436 http://www.bbc.co.uk/news/business-11793436
32
Wireless Protocols n Current standards for wireless connections at lower OSI layers developed by the IEEE (Institute of Electrical and Electronic Engineers) and manufacturers are: IEEE802.11g Bluetooth n The IP protocol is slightly changed to cope with these standards
33
Wireless Data is Broadcast… source destination lurker
34
VPNs use a specified route… e.g. VPN shown in green
35
Protecting Wireless access n Because packets are easily intercepted the data absolutely MUST be encrypted n In the unlikely scenario that the interceptor: works out the encryption method and intercepts the encryption key… data could be further safeguarded by use of VPN techniques »e.g. tunnelling and encapsulation
36
Wireless access and SSL VPNs n Another job for SSL VPNs… allow authentication and authorization of users from anywhere ensure secure access to all resources n Traditional wireless LAN model WEP (Wireless Encryption Protocol) security based on authentication keys: shared by anyone accessing that wireless hub »therefore additional support steps to regularly update and maintain security n More practical alternative: Internet café model »all wireless users in proximity of a wireless hotspot can view a portal n but denied access “inside” unless they confirm authentication
37
Wireless SSL VPNs n In an enterprise wireless network scenario, wireless users can be directed through a suitably configured SSL VPN but denied access to any resources until they log in for authentication n Provides central control of access to resources through a single gateway whether users log in from: »a docked laptop at their desk »an undocked laptop in a conference room »a handheld PDA from elsewhere on the campus
38
A Secure Wireless Network Scenario (1) n The organisation establishes an array of WiFi access points distributed across the campus wireless hubs located in multiple buildings n On entering range of a “hotspot”; all wireless users may connect to the Internet »but no access to any internal or external (public Internet) resources »when wireless network user launches a browser, immediately redirected to a login page for authentication through the SSL VPN
39
A Secure Wireless Scenario (2) n Wireless user uses username/password for authentication n Once authenticated, software agents can quickly do a background scan of user's end point device: »detect its identity and integrity: »check for the presence of valid software certificates »check up-to-dateness of antivirus software & Windows patches
40
A Secure Wireless Scenario (3) n If the device meets the scan criteria: user is fully authorized then presented with a portal for accessing their network files, applications and directories based on their role and privileges n Otherwise the user can be automatically be: Either redirected to a quarantined site offering easy self-remediation steps Or denied access to the network altogether
41
Security Controls on Complex Networks n Group of British security researchers and professionals coined the phrase Information Security Management System (ISMS) British Standard for an ISMS emerged in the 1990s BSI7799 »over 130 information security controls »many not technical »require management control of user behaviour
42
Process-based Information Security n ISMS development process based: uses PCDA »Plan »Do »Check »Act contrast with PCI-DSS check list n ISO27001 Certification awarded to organisations who appropriately use the process model covering the 130+ controls
43
International Standard for ISMS BSI 7799 evolved (2005) into an International Standard ISO27001 Soon became popular in Japan & along Pacific Rim Also in some Eastern European countries »some UK interest »but most companies have not become certificated »WHY???
44
SMEs and Developing an ISMS n ISO27001 difficult for SMEs especially information risk assessment yet if they could engage, could identify greatest risks and reduce controls n IASME (Information Assurance for SMEs) developed by University of Worcester, NCC & experienced consultants assistance from govt funding (Technology Strategy Board) makes risk assessment doable takes into account small business culture released this year… 2011
45
Thanks for Listening Thanks for Listening
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.