630 likes | 776 Views
563.1 Fundamentals. Carl A. Gunter University of Illinois Fall 2007. Warm-Up Presentation. Public Key Infrastructure (PKI) Security and network layers Security tunnel protocols. Public Key Infrastructure.
E N D
563.1 Fundamentals Carl A. Gunter University of Illinois Fall 2007
Warm-Up Presentation • Public Key Infrastructure (PKI) • Security and network layers • Security tunnel protocols
Public Key Infrastructure • Mutual authentication of participants in a transaction requires a system of identities • Principals are identified by public keys • These keys can be used for authentication, but only if “spoofing” is prevented • PKI provides a basis for establishing trust
PKI Systems • Three Philosophies • Hierarchy • ITU X.509 (DAP, PKIX) • DNS • Web of Trust • PGP • Ad hoc • SSH • Most research studies
Subject Name Subject Public Key CA Name CA Signature X.509 Certificates X.509 certificates bind a subject to a public key. This binding is signed by a Certificate Authority (CA). Subject Name Subject Public Key CA Name CA Signature
Joe Smith Subject Joe’s Key Subject’s Key Urbana CA Issuer Urbana CA Urbana CA Key Illinois CA Illinois CA Illinois CA Key USA CA Chaining
Distribution: How to find a certificate Certificate accompanying signature or as part of a protocol Directory service DAP LDAP DNS Email Cut and paste from web pages Revocation: Terminate certificates before their expiration time. How does the relying party know that the certificate has been revoked? Many CRL distribution strategies proposed Mitre report for NIST suggests certificate revocation will be the largest maintenance cost for PKIs Certificate Management
Semantics of CRL’s • Three certificates. • Q says P is the public key of Alice. • R says P is the public key of Alice. • Q says R is the public key of Bob. • Three kinds of revocation. • P is not the public key of Alice. (3 not 2.) • Q no longer vouches for whether P is the public key of Alice. (2 and 3.) • The key of Q has been compromised. (2 not 3.) Revoke Fox and LaMacchia 98
Problems Revocation User ability to deal with keys Registration (challenge for all authentication techniques) Weak business model Areas of Progress SSL Authenticode SSH Smart cards for government employees Web services Adoption of PKI
Challenges for Network Security • Sharing • Complexity • Scale • Unknown perimeter • Anonymity • Unknown paths
Physical Link Network Transport Application Internet Layers
Physical Locked doors Spread spectrum Tempest Link WEP GSM Network Filtering firewalls IPsec Transport Circuit firewalls SSL and TLS Application Proxy firewalls S/MIME XMLDSIG and WS security Security at Layers
Network Layer Security HTTP FTP SMTP TCP IP / IPsec
Transport Layer Security HTTP FTP SMTP SSL or TLS TCP IP
Application Layer Security PGP SET S/MIME Kerberos SMTP HTTP TCP UDP IP
Division of Labor in the Internet Hosts Routers Networks
TCP/IP Protocol Stack Host Router Router Host Application Application Transport Transport Network Network Network Network Link Link Link Link Physical Physical Physical Physical
Communication Processing Flow App1 App2 App1 App2 Transport Transport Network Network Network Network Link Link Link Link Link Link Physical Phys Phys Phys Phys Physical
Physical Layer Protection Issues • Hide signal • Spread spectrum • Emission security • Radio emissions (Tempest) • Power emissions
Encapsulation Link Layer Frame IP TCP Application Link Link Network Layer Header Transport Layer Header Application Layer Payload
One Hop Link Layer Encryption Host Router Router Host Application Application Transport Transport Network Network Network Network Link Link Link Link Link Link
Link Layer Encryption Encrypted IP TCP Application Link Link
End-to-End Network Security Host Router Router Host Application Application Transport Transport Network Network Network Network Link Link Link Link
Network Layer Transport Mode IP TCP Application Link Link Encrypted IP Hdr TCP Application Tlr Link Link
VPN Gateway Host Router Router Host Application Application Transport Transport Network Network Network Network Link Link Link Link
Network Layer Tunnel Mode IP TCP Application Link Link Encrypted New IP Hdr IP TCP Application Tlr Link Link
Layer 3 Implementation Options • Location • Host • Network • Style • Integrated • Modular (for tunnel mode)
Bump In The Stack (BITS) App1 App2 App1 App2 Transport Network Transport Security Network Net + Sec Network Link Link Link Link
Bump In The Wire (BITW) App1 App2 App1 App2 Transport Security Security Transport Network Network Network Network Link Link Link Link
Integrated on Host App1 App2 App1 App2 Transport Transport Net + Sec Network Network Net + Sec Link Link Link Link
Integrated on Router App1 App2 App1 App2 Transport Transport Network Net + Sec Net + Sec Network Link Link Link Link
Network Security Location Options Application Application End-to-End Transport Transport Transport Network Network Network Network Link Link Link Link Application Application Transport Transport Voluntary Tunnel Network Network Network Network Link Link Link Link Application Application Transport Transport Involuntary Tunnel Network Network Network Network Link Link Link Link
Transport Layer Security Host Router Router Host Application Application Transport Transport Network Network Network Network Link Link Link Link
Transport Layer Encryption IP TCP Application Link Link Encrypted IP TCP RH Application Link Link IP TCP App Link Link
Message Processing Sequence App1 App2 App1 App2 App2 Sec App2 Sec Transport Transport Network Network Network Network Link Link Link Link
IP TCP Application Link Link Application Layer Security Encrypted IP Key ID TCP Application Link Link
Link Layer Security • Advantages • Transparent to applications • Hardware solution possible • Can address especially vulnerable links (viz. wireless) • Disadvantages • Hop-by-hop protection causes multiple applications of crypto operations. • Typically does not provide end-to-end security.
Network Layer Security • Advantages • Transparent to applications • Amenable to hardware • Flexible • Disadvantages • Adds complexity for routing, MTUs, NATs • Flexibility introduces policy management and compatibility challenges.
Transport Layer Security • Advantages • Transparent to applications and may be packaged with applications • Exposing TCP enables compression and QoS classification. • Disadvantages • Probably implemented in software • DoS vulnerabilities from TCP
Application Layer Security • Advantages • Customized to application • Requires no special protocol stack (transparent to networking) • Disadvantages: • Hard to share between applications (viz. standardization challenge)
Protocols to Software • There are important differences between theoretical descriptions, standards and software: • Evolution (versions, extensibility) • Interoperability (options, negotiation) • Error modes. • Two brief case studies • Transport Layer Security (TLS) • Network layer security (IPsec)
Secure Socket Layer (SSL) • Session protocol with • Server authentication • Client authentication optional • Integrity checksum • Confidentiality. • Possibly the most important security-related ecommerce protocol • Session sets up security parameters • Many connections possible within a given session • Current version is TLS 1.1 (RFC 4346).
X.509 Strong Two-Pass Exchange • Let DA = rA, LA, B, • Let DB = rB, LB, rA, A, PA(k) • Two messages: • A → B : certA, DA, SA(DA) Check that LA is not expired and that rA has not been seen in that lifetime. Remember rA for this lifetime. • B → A : certB, DB, SB(DB) Check rA and A. Check that LB is not expired and rB has not been seen in that lifetime. Use k to encrypt and decrypt bulk traffic.
Establish Security Capabilities Client Server Client Hello Time Server Hello
Server Key Exchange Server Hello Done Certificate Request Certificate Server Auth & Key Exchange Client Server Time Optional
Client Auth & Key Exchange Client Server Time Certificate Client Key Exchange Optional Certificate Verification Optional
Client Auth & Key Exchange Client Server Change Cipher Spec Time Finish Change Cipher Spec Finish
IETF RFCs 4301-4309 from Dec 05 define the standard Modes Tunnel Transport Protocols Authenticated Header (AH) Encapsulated Security Payload (ESP) Configurations End-to-end Concatenated Nested Principal elements Security Associations (SAD) Internet Key Exchange (IKE) Policy (SPD) IPsec
Typical Case S Client Internet G ESP S ESP Gateway Corporate Network S Server
ESP Packet Format 0-7 8-15 16-23 23-31 Security Parameter Index (SPI) Sequence Number Initialization Vector Protected Data Pad Pad Length Next Header Authentication Data