140 likes | 216 Views
Introduction. CS-480b Dick Steflik. X.800 – OSI Security Services. Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers
E N D
Introduction CS-480b Dick Steflik
X.800 – OSI Security Services • Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers • RFC 2828 – a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented bt security mechanisms.
Security Services • Authentication – assurance that the communicating entity is who they say they are • Access Control – prevent the unauthorized access to some system resource • Who can access • Under what conditions • What they are allowed to do • Data Confidentiality – protection of data from unauthorized disclosure • Data Integrity – insure that data received is exactely what was sent • Nonrepudiation – protection from denial by one of the entities involved in a communication of having participated in all or part of the communication
Authentication • Peer Entity Authentication – in a connection based environment; provide confidence in the identity of a connecting entity • Logging in with a password • Gaining access via biological identity verification • DNA identification, retinal scan, finger/hand print identification • Access via audio voice identification • Data Origin Authentication – in a connectionless environment; provide assurance that the source of received data is as claimed • Corroborates the source of the data • Does not proved assurance against duplicate or modified data
Access Control • This service provides protection against unauthorized use of resources accessible via OSI. These may be OSI or non-OSI resources accessed via OSI protocols. This protection service may be applied to various types of access to a resource or to all accesses to a resource • e.g., the use of a communications resource; the reading, the writing, or the deletion of an information resource; the execution of a processing resource
Data Confidentiality • Connection Confidentiality • Protection of all user data on a connection • Connectionless Confidentiality • Protection of all data within a single data block • Selective-Field Confidentiality • Insure confidentiality of selected fields with within the user data on a connection or in a single data block connection • Traffic-Flow Confidentiality • Protection of information that might be derived by observing the traffic flow patterns
Data Integrity • Connection Integrity with Recovery • Detect any modification of stream data or replay of data and retry; • Connection Integrity without Recovery • Detect any modification and report it, no retry…continue on • Selective-Field Connection Integrity • Same except for selected fields • Connectionless Integrity • Detect modifications in fixed block connectionless data, may provide replay detection and protection • Selective-Field Connectionless Integrity • Same, except for selected fields • Total stream protection would encompass all of the above and is probably the best strategy
Nonrepudiation • Nonrepudiation, Origin • Proof that the message was sent by the specified party • Nonrepudiation, Destination • Proof that the message was received by the specified party
Security Mechanisms (X.800) • Encipherment – algorithmic/mathematical conversion • Digital Signature – appending a secret signature • Access Control - • Access Control • Data Integrity • Authentication Exchange • Traffic Padding – appending extra chars to foil traffic analysis techniques • Routing Control – selection of secure routeds through the network • Notarization – use a trused 3rd party (like a notary public)
Other Security Mechanisms (non X.800) • Trusted Functionality • That which is perceived to be true by some criteria (policy) • Security Label • The marking of (bound to) a resource that names or desiginates the security attributes of the resource • Event Detection • Intrusion detection • Detection of specific hacks (detector hardware) • Too many log in attempts • Security Audit Trail • Logging of all system events • Security Recovery • Recovery based on requests from security mechanisms and/or event handling.
Network Security Model Trusted 3rd Party M F(s) M’ Info Channel M’ F(s) M s s Opponent F(s)-some function that mutates M into M’ based on s F(s) – some function that reverses the mutation of M’ back into M
Internet Organizations • Internet Architecture Board (IAB) – responsible for the overall design of the Internet, provides guidance to IETF • Internet Engineering Task Force (IETF) – protocol engineering and development of the Internet • Working groups chartered by IETF do actual development work • Internet Draft, RFC, Standard • 8 areas – General, Applications, Internet, Operations and management, Routing, Security, Transport, User Services • IETF responsible for actual publishing • Internet Engineering Steering Group (IESG) – responsible for technical management if IETF activities and the Internet Standards process
RFC Publication Process Internet Draft Proposed Standard Best Current Practice Experimental Informational Draft Standard Internet Standard Historic