470 likes | 482 Views
Explore web security requirements, vulnerabilities, and solutions. Learn about SSL, TLS, and web traffic security to protect against passive and active attacks. Understand web server and browser threats and how to secure network traffic at different levels.
E N D
Security and Integration Technologies on the Internet(TANET 2002 Tutorial I-1) Shin-Jer Yang, Associate Professor Dept. of Computer and Information Science Soochow University, Taipei E-mail: sjyang@cis.scu.edu.tw October 30, 2002
Security and Integration Technologies on the Internet • Web Security Review • Web Security Requirements • Web Traffic Security Approaches • SSL and TLS • SSL • TLS • SET • Concepts in Intranet and Extranet • Integrating the Internet, Intranets and Extranets • Intranet Development Tools • Standards • Security (1) Internet Transmission (2) Firewalls (3) Filtering (4) Encryption • Conclusions Security and Intrgartion (S. J. Yang)
Web Security Review • Web Security Requirements • A Comprehensive Network Security Services • Confidentiality • Authentication • Integrity • Non-repudiation • Access • Availability • Responsibility and Control • Accountability: Refers to how an audit trail is kept • Authorization: Refers to responsibility for each item of information and how such responsibility is delegated to others Security and Intrgartion (S. J. Yang)
Web Security Review (cont.) • Web Security Considerations • The Internet is two ways • The Web is increasingly serving as a highly visible outlet for corporate and product information and as the platform for business transaction • Although Web Browser are very easy to use, Web Servers are relatively easy to configure and manage, and Web Content is increasingly easy to develop, the underlying software is extraordinarily complex • A Web Server can be exploited as a launching pad into the corporation’s or agency’s entire computer complex • Causal and untrained users are common Clients for Web-based services Security and Intrgartion (S. J. Yang)
Web Security Review (cont.) • Vulnerabilities of the Web • Unauthorized alteration of data at the Web site • Unauthorized access to the underlying operating system at the Web server • Eavesdropping on messages passed between a Web Server and a Web Browser • Impersonation • Web Security Responsibility • A corporate responsibility • Compounding the problem is that the culture of the Internet: Openness, Ease of access, and Lack of controls • Sociology and Ethics Security and Intrgartion (S. J. Yang)
Web Security Review (cont.) • Web Security Threats • Security threats can be classified as passive attacks and active attacks • Passive attacks: Passive attacks have to do with eavesdropping on, or monitoring, transmissions • Active attacks: Active attacks include the modification of transmitted data and attempts to gain unauthorized access to computer systems • Location of threats • Web Server • Web Browser • Network traffic between Browser and Server Security and Intrgartion (S. J. Yang)
Web Security Review (cont.) • Web Traffic Security Approaches • (1) Network Level HTTP FTP SMTP TCPor UDP IP / IPSec • (2) Transport Level HTTP FTP SMTP SSL or TLS TCPor UDP IP Security and Intrgartion (S. J. Yang)
Web Security Review (cont.) • Web Traffic Security Approaches • (3) Application Level S/MIME PGP SET Kerberos SMTP HTTP TCP or UDP IP Security and Intrgartion (S. J. Yang)
SSL and TLS • SSL (Secure Socket Layer) • SSL Protocol Stack Architecture SSL Handshake Protocol SSL Change Cipher Spec. Protocol SSL Alert Protocol HTTP SSL Record Protocol TCP IP Security and Intrgartion (S. J. Yang)
SSL and TLS (cont.) • Two Important SSL Concepts • SSL Session • An SSL session is an association between a Client and a Server • Sessions are created by the Handshake Protocol • Sessions define a set of cryptographic security parameters • A session state is defined by the following parameters • Session identifier • Peer certificate • Compression method • Cipher spec. function • Master secret • Is resumable Security and Intrgartion (S. J. Yang)
SSL and TLS (cont.) • SSL Connection • A connection is a transport that provides a suitable type of service • For SSL, such connections are peer-to-peer relationships • The connections are transient • Every connection is associated with one session • A connection state is defined by the following parameters • Server and Client random • Server write MAC (Message Authentication Code) secret • Client write MAC secret • Server write key • Client write key • Initialization vectors • Sequence numbers Security and Intrgartion (S. J. Yang)
SSL and TLS (cont.) • SSL Record Protocol • The SSL record protocol provides two services for SSL connection • Confidentiality • Defines a shared secret key that is used for conventional encryption of SSL payloads • Message integrity • Used to form a MAC • SSL Record Operation (See Next) Security and Intrgartion (S. J. Yang)
SSL and TLS (cont.) • SSL Record Protocol Operation • Sender (or Client) • An application message to be transmitted, Fragments the data into manageable blocks • Optionally Compresses the data • Applies a MAC (i.e. Add a MAC) • Encrypts • Appends SSL record header • Transmits the resulting unit in a TCP segment • Receiver (or Server) • Received the data and drop the header • Received data are Decrypted • Verified • Decompressed • Reassembled and then delivered to high-level users Security and Intrgartion (S. J. Yang)
SSL and TLS (cont.) • SSL Handshake Protocol • The most complex part of SSL • This protocol allows the Server and Client to authenticate each other and to negotiate an encryption and MAC algorithm and cryptographic keys to be used to protect data sent in an SSL record • Each message has three fields • Type (1 byte) • Length (3 bytes) • Content (>= 1 byte) Security and Intrgartion (S. J. Yang)
SSL and TLS (cont.) • Handshake protocol action phases • Phase 1: Establish security capabilities • Phase 2: Server authentication and key exchange • Phase 3: Client authentication and key exchange • Phase 4: Finish • Cryptographic computations • Master secret creation • RSA (Rivest-Shamir-Adleman) • Diffie-Hellman • Generation of Cryptographic parameters Security and Intrgartion (S. J. Yang)
SSL and TLS (cont.) • TLS (Transport Layer Security) • TLS is an IETF standardization initiative whose goal is to produce an Internet standard version of SSL • The current version of TLS is very similar to SSL v3 Security and Intrgartion (S. J. Yang)
SET • SET (Secure Electronic Transaction) • SET is an open encryption and security specification designed to protect credit card transactions on the Internet • SET Provides Three Services • Provides a secure communications channel among all parties involved in a transaction • Provides trust by the use of X.509v3 digital certificates • Ensures privacy because the information is only available to parties in a transaction when and where necessary Security and Intrgartion (S. J. Yang)
SET (cont.) • Business Requirements for SET over Internet • Provide confidentiality of payment and order information • Ensure the integrity of all transmitted data • Provide authentication that a cardholder is a legitimate user of a credit card account • Provide authentication that a merchant can accept credit card transactions through its relationship with a financial institution • Ensure the use of the best security practices and system design techniques to protect all legitimate parties in an electronic commerce transactions • Create a protocol that neither depends on transport security mechanisms nor prevents their use • Facilitate and encourage interoperability among software and network providers Security and Intrgartion (S. J. Yang)
SET (cont.) • Key Features of SET • Confidentiality of information • Integrity of data • Cardholder account authentication • Merchant authentication • Payment Processing and SET Participants • Payment processing • Purchase request • Payment authorization • Payment capture • SET participants • Cardholder, Merchant, Issuer, Acquirer, Payment Gateway, Certification Authority (CA) • What are the sequences of events that are required for a transaction? Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet • Intranet • An Intranet is an internal organizational network that is modeled upon WWW technology • Intranet software technology is the same as that of the WWW • The difference between the Internet and an Intranet • Internet is open to anyone • The Intranet is private (VPN – Virtual Private Network) and is protected from public visits by firewalls • VPN: Intranet and Firewalls • Intranet vs. VPN Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet(cont.) • Illustration of Intranets, Firewalls, and Internet Intranet Server Client F I R E W A L L Web Server Web Browser TCP/IP Database Server Internet TCP/IP TCP/IP TCP/IP Web Browser External Clients … Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Factors that drive the growth in the Intranet marketplace • Open standards lead to interoperability • Ease of use • Effective middleware • Intranet Web • Web content: An organization can use the Intranet Web to enhance management-employee communication and to provide job-related information easily and quickly Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Web / Database Applications • Ease of administration • Deployment • Development speed • Flexible information presentation • Intranet Webs vs. Traditional Client/Server • Long development cycles • Difficulty of partitioning applications into Client and Server modules • Effort involved in distributing upgrades to Client • Difficulty in scaling the Servers to respond to increased load in a distributed environment • Continuous requirement for increasingly powerful desktop machine Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Other Intranet Technologies • E-mail • Network News: USENET • Intranet Development Tools • Limitations of Intranets • Intranet cannot replace complex information systems • Appropriate security measures are required for Intranet • Effective Intranets require careful management for planning Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Potential Advantages of Intranets • Access to information • Platform independence • Allowance for multiple data types • Access to data (i.e. Data Warehouses, Databases) • Similar interface • Return on investment (ROI) • Increased productivity • Increased information sharing • Easy of software distribution • Bottom-up approach Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Disadvantages or Challenges of Intranets • Number of active users • Infrastructure • Continuous growth and change • Security • Bandwidth • Scalability • Manageability • Loss of skilled Webmasters and designers • On-going maintenance Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Intranets Are Currently Being Used for the Following Purposes • Facilitate faster internal corporate communications • Facilitate more coordinated work activities • Facilitate easier management of complex operations with On Line Transaction Processing (OLTP) • Facilitate better managerial decision support with On Line Analytical Processing (OLAP) • Facilitate better system management by enabling maintenance and distribution of applications Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Other Intranet Applications • Technology-driven marketing • ERP II or EERP • Logistics and supply chain management • Finance and accounting • Decision support / Workflow management • Company policies and procedure manuals • Product and pricing information • Company forms (organizational directories, employee information, job openings) • On-line polls • Document needing signatures Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Extranet • An Extranet is a network that uses Internet technology to link business with their partners, customers, suppliers and other businesses that share common goals • The Extranet is a derivative of both an Intranet and the Internet • The purpose of an Extranet is to give both internal and external environments access to computer-based information Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Potential Advantages of Extranets • Streamlined business processes • Flexibility and scalability • Reduced traditional barriers • Decreased costs • Ease of use and maintenance • Versatility • Cost and return on investment • Disadvantages or Challenges of Extranets • No support from top management • Maintenance of information • Lack of training • Information overload • Waste of productivity • Security Security and Intrgartion (S. J. Yang)
Concepts in Intranet and Extranet (cont.) • Some Extranet Applications • Private news groups • Collaborative projects • Common business materials • Inter-Organization systems (IOS) • Electronic Commerce (EC) • e-Workflow Management • SCM (Supply Chain Management) • CRM (Customer Relationship Management): Improved customer service and sales Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets • Intranet Development Tools • Advanced features for development tools • Does it allow for connectivity to database? • Does it have a visual-form designer? • Does it generate reports? • Does it support dynamic HTML or XML? • Does it support Java Script or Java? • Does it support version control? • More general issuesfor development tools • How easy is it to use, both for developers and end users? • Is it easy to extend? Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) • Is it easy to manage? Does it have built-in management tools? • What type of performance does it have? • What hardware platforms does it run on? • What network operating systems and operating systems does it work with? • Four common Intranet Development Tools • Visual InterDev from Microsoft Corporation • Visual Café for Java from Symantec Corporation • IntraBuilder from Borland International • Sapphire/Web from Bluestone Software Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) • Standards • TCP/IP • This protocol is the basis for the Internet and it controls the reliable transmission of data from node to node • HTML/XML and HTTP • These support platform-independent content creation and publishing • SMTP • This messaging protocol is used in TCP/IP networks to exchange e-mail messages • IMAP (Internet Message Access Protocol) • IMAP’s features include selective downloading , Server-side folder hierarchies, shared mail, and mail-box synchronization (POP 3 extension version) Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) • MIME • This standard is an extension of SMTP; MIME gives each attachment of an E-mail message its own header • NNTP (Network News Transport Protocol) • UseNet servers transfer news items using this specialized transfer protocol • LDAP Intelligent Directory Services • This protocol will store and deliver contact information, registration data, certificates, configuration data, and Server information • X.509 v3 Digital Certificates • This standard provides for a secure container of validated and digitally signed information Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) • S/MIME (Secure MIME) • This standard uses certificate-based authentication and encryption to transmit messages between users and applications • vCARD • The vCARD is an industry format for describing and displaying information typically found on a business card • Signed Objects • These allow for trusted distribution and execution of software applications and applets as part of an Extranet • EDI INT • This protocol gives a set of guidelines that combine the existing EDI standards for transmission of transaction data with the Internet protocol suite Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) • Security (1) Internet Transmissions • Following security of Internet transmissions actually involves multiple processes • Encryption: Renders data indecipherable to any unauthorized users that might be able to examine packets of data traffic • Authorization: Screens users according to user IDs and passwords and determines by examining Access Control Lists (ACLs) whether a given user is authorized to access requested files or system resources • Authentication: Uses digital signatures attached to transmitted documents to ensure both the authenticity of the author and the document’s message integrity Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) (2) Firewalls • Firewall software usually runs on a dedicated Server that is connected to but outside of the corporate network • All network packets entering the firewall are filtered, or examined, to determine whether those users have authority to access requested files or services • Types of firewalls • Packet-filtering routers (or Packet-filters) • Application-level gateway (or Proxy Server) • Circuit-level gateway • Bastion host servers as a platform for an Application-level or Circuit-level gateway Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) (3) Filtering • A filter is a program that examines the source address and destination address of every incoming packet to the firewall Server • Filter tables are lists of addresses whose data packets and embedded messages are either allowed to proceed or prohibited from proceeding through the firewall Server and into the corporate network • Filter classification • Port-level filters (Network-level filters) • Application-level filters (Assured pipelines) Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) (4) Encryption A.Conventional Encryption • Also referred to as symmetry encryption or single-key encryption • A form of cryptosystem in which encryption and decryption are performed using the same key • This encryption scheme has five ingredients • Plaintext: Readable message or data • Encryption Algorithm: Performs various substitutions and transformations on the plaintext • Secret Key: The secret key is also input to the algorithm • Ciphertext: This is the scrambled message produced as output • Decryption Algorithm: This is essentially the encryption algorithm run in reverse Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) • Two requirements for secure use of conventional encryption • We need a strong encryption algorithm • Sender and receiver must have obtained copies of the secret key in a secure fashion and must keep the key secure • DES (Data Encryption Standards) Algorithm • Triple DES Algorithms • Double DES: Two encryption stages and two keys • Triple DES with two keys: Three encryption stages and two keys • Triple DES with three keys: Three encryption stages and three keys Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) B. Public-Key Encryption • A method in which encryption and decryption are performed using different keys – public key and private key • RSA (Rivest-Shamir-Adlemen) algorithm • Performs Encryption/Decryption, Digital signatures and Key exchange • Three possible approaches to attacking the RSA • Brute force • Mathematical attacks • Timing attacks • Advantage:Public-key encryption provides us with tremendous flexibility to perform a number of security-related functions • Key management • Digital signatures Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) • Public-Key Encryption scheme has six key ingredients • Plaintext: Readable message or data • Encryption Algorithm: Performs various transformations on the plaintext • Public and Private Keys: This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption • Ciphertext: This is the scrambled message produced as output • Decryption Algorithm: This algorithm generates the ciphertext and the matching key and produces the original plaintext Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) C. Digital Signatures Encryption • An authentication mechanisms that enables the creator of a message to attach a code that guarantees the source and integrity of the message • The digital signature process • RSA approach • DSS (Digital Signature Standard) approach: NIST FIP PUB 186 • Public-key certificates Security and Intrgartion (S. J. Yang)
Integrating the Internet, Intranets and Extranets (cont.) D. Encryption Management • Location of encryption devices • Link encryption • End-to-end encryption • Key distribution • Conventional encryption: It relies on KDC (Key Distribution Center); two kinds of key are identified: session key, permanent key • Public-key encryption: To use public-key encryption to authenticate the public key • The primary standards exist for encryption traffic on the WWW • S-HTTP: Secure HyperText Transport Protocol • SSL: Secure Socket Layer • TLS: Transport Layer Security Security and Intrgartion (S. J. Yang)
Conclusions • Securing the Web and Intranets • Security Measures • Access control • Encryption • Troubleshooting • Payload security (e.g. PGY) • Commercial products • Intrusion detecting • Firewalls • Why firewalls? • What firewalls can not do? • Cost Security and Intrgartion (S. J. Yang)
Conclusions (con.) • Integration Issues • Selecting the appropriate Intranet development tool • Using open application standards instead of proprietary standards for extending the Intranet into an Extranet • Two primary standards exist for encryption traffic on the WWW • S-HTTP (Secure Hypertext Transfer Protocol) • SSL (Secure Sockets Layer) Security and Intrgartion (S. J. Yang)