160 likes | 277 Views
E-voting DITSCAP Project. UCCS POC: Edward Chow Boeing POC: Izzy Rodriguez Team: Samarpita Hurkute Kunal Bele Shin Nam Saroj Patil Chuck Short Rajshri Vispute. DITSCAP Overview.
E N D
E-voting DITSCAP Project UCCS POC: Edward Chow Boeing POC: Izzy Rodriguez Team: Samarpita Hurkute Kunal Bele Shin Nam Saroj Patil Chuck Short Rajshri Vispute DITSCAP
DITSCAP Overview • DITSCAP – DoD Information Technology Security Certification and Accreditation Process • Purpose • Implements policy, assigns responsibilities, and prescribes procedures for Certification and Accreditation (C&A) of IT • Creates a process for security C&A of unclassified and classified IT DITSCAP
SSAA Overview • SSAA – System Security Authorization Agreement • It is a document required by the DITSCAP • What it does • Defines operating environment of the system • Identifies the “system” • Defines risk and countermeasure • Documents agreement among all parties involved in the system DITSCAP
Project Overview • Using the E-voting system to walk through the DITSCAP process/requirements to include penetration testing, threat/vulnerability assessment, and document SSAA which is to be approved by Boeing POC. DITSCAP
E-voting System • E-voting allows single-choice ballots • Election administrator creates election parameters with the help of PTC encryption • The administrator submits election parameters to VotingService • Voters load election parameters and cast encrypted votes • The homomorphic properties of the PTC enable the product to be decrypted to reveal the sum total of all votes DITSCAP
Threat Model • Spoofing – The identity of the voter cannot be trusted • Tampering – The vote for Candidate A could be assigned to Candidate B or vice versa • Repudiation – No authorized identification of parties involved in the E-voting process. • Information Disclosure – Disclosing the tally count • Denial of service – Making the E-voting system unavailable to its intended users • Elevation of privilege – gaining system privileges thru malicious means DITSCAP
Threat Scenarios • Breaking encryption – tampering with the public and private keys • Allocating observation with data • Physical access – can be used for SQL injection • The Electronic Ballot Casting Device: a ‘Trojan horse’ on the voting terminal. • The Voting Protocol – sniffing on the network. • The Electoral Server – depending on the applied voting protocol, the election servers are a vulnerability point • Other Anonymity Threats – the Voter Audit Trail could also be used to link a voter to their vote. DITSCAP
Preliminary Defenses • Configure firewall • iptables rules iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE iptables -t nat -A PREROUTING -p icmp -i eth0 -d 128.198.60.139 -j DNAT --to-destination 10.0.0.2 iptables -t nat -A PREROUTING -p tcp -i eth0 -d 128.198.60.139 --dport 3389 -j DNAT --to-destination 10.0.0.2 iptables -A INPUT -p tcp --dport 25 -j DROP iptables -A FORWARD -p tcp --dport 25 -j DROP DITSCAP
Vulnerability Analysis • Nessus scan • nmap scan • Metasploit DITSCAP
SSAA Contents • System description along with functional diagrams • Highlights sensitivity of data processed • System architecture diagram with firewall • Physical security of the E-voting system • Threats to the E-voting system • Data flow diagram • Data security requirements DITSCAP
Future Work DITSCAP
Lessons Learned • How to make the system more secure • What is involved in creating an SSAA document • What is Concept of Operations (CONOPS) • Learned the basics of Paillier Threshold Cryptography • The security issues surrounding E-voting systems DITSCAP
References • Brett Wilson, UCCS, Implementing a Paillier Threshold Cryptography Scheme as a Web Service. • http://www.nswc.navy.mil/ISSEC/COURSES/Ditscap.ppt • http://www.i-assure.com/ • http://viva.uccs.edu/ditscap/index.php/Image:DITSCAP.pdf • http://viva.uccs.edu/ditscap/index.php/Image:DITSCAP_Application_Manual.pdf • http://viva.uccs.edu/ditscap/index.php/Image:SSAA_Guidance.doc DITSCAP