mctls: enabling secure in-network functionality in TLS
|
|
- Jonathan Hill
- 6 years ago
- Views:
Transcription
1 mctls: enabling secure in-network functionality in TLS David Naylor Kyle Schomp Matteo Varvello Ilias Leontiadis Jeremy Blackburn Diego Lopez Dina Papagiannaki Pablo Rodriguez Rodriguez Peter Steenkiste
2 60 Residential ISP, Europe % HTT Dr 2012 DHc HS 2013 Jun 2014 OBSERVATION 1: Use of Encryption is Increasing
3 CACHING COMPRESSION PARENTAL FILTER VIRUS SCANNER PACKET PACING OBSERVATION 2: In-Network Functionality is Widespread
4 GOAL: Encryption & In-Network Functionality
5 Value-Added Services Opt-in services that benefit end users. Administrator-Mandated Help the company/network; for users, just a fact of life. Unauthorized Not necessary for network & not beneficial for user.
6 Value-Added Services Opt-in services that benefit end users. Administrator-Mandated Help the company/network; for users, just a fact of life. Unauthorized Not necessary for network & not beneficial for user.
7 GOAL: Encryption & In-Network Functionality
8 mctls Encryption & In-Network Functionality
9 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
10 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
11 TLS Handshake Protocol for session setup CONSISTS OF: & Record Protocol for data transfer Entity Authentication AND GIVES US THREE SECURITY PROPERTIES: Payload Secrecy Payload Integrity
12 TLS + middleboxes is broken 1 Company installs root cert on client Company 2 Firewall fabricates a cert for foo.com foo.com TLS TLS 3 Client accepts fake cert because it s signed by company s root cert Company Firewall foo.com 4 Firewall opens separate TLS connection to foo.com
13 TLS was designed for 2 parties No mechanism to authenticate middleboxes. Client has no security guarantees past middlebox. Middleboxes have full read/write access.
14 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
15 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
16 Design requirements for mctls MAINTAIN TLS SECURITY PROPERTIES: Entity Authentication Payload Secrecy PLUS TWO NEW ONES: 4 5 Visibility & Control Least Privilege Payload Integrity
17 Design requirements for mctls MAINTAIN TLS SECURITY PROPERTIES: Entity Authentication Payload Secrecy PLUS TWO NEW ONES: 4 5 Visibility & Control Least Privilege Payload Integrity
18 Most middleboxes do not need read/write access to all data HTTP Request HTTP Response Headers Body Headers Body Parental Filter Packet Pacer IDS WAN Optimizer Caching Compression Access all data Write access = read only = read/write
19 Idea #1: Encryption Contexts (for access control) send(data, context) Context 1: Request Headers Context 2: Request Body Context 3: Response Headers Context 4: Response Body Read-Only: Read-Only: Read-Only: Read-Only: Read/Write: Read/Write: Read/Write: Read/Write:
20 Idea #1: Encryption Contexts (for access control) TLS uses one key for encryption and MAC: K encrypt MAC DATA MAC
21 Idea #1: Encryption Contexts (for access control) mctls uses three keys to separate read-only and read/write access: K readers K writers K endpoints encrypt MAC MAC MAC DATA MAC MAC MAC Readers, Writers, & Endpoints check to detect 3 rd party changes Writers & Endpoints check to detect reader changes Endpoints check to detect writer changes
22 Idea #1: Encryption Contexts (for access control) Each context has a read key and a write key: K readers K writers K endpoints K readers K writers K endpoints DATA MAC MAC MAC DATA MAC MAC MAC Context 1: Request Headers Read: Write: Context 2: Request Body Read: Write:
23 Encryption contexts example Context 1: Request Headers Context 2: Request Body Context 3: Response Headers Context 4: Response Body Endpoints Read: Read: Read: Read: Write: Write: Write: Write:
24 Design requirements for mctls MAINTAIN TLS SECURITY PROPERTIES: Entity Authentication Visibility & Control Payload Secrecy PLUS TWO NEW ONES: 4 5 Multiple Least Privilege Payload Integrity Encryption Contexts
25 Design requirements for mctls MAINTAIN TLS SECURITY PROPERTIES: Entity Authentication Payload Secrecy PLUS TWO NEW ONES: Payload Integrity 4 Visibility & Control 5 Multiple Encryption Contexts Least Privilege
26 Idea #1: Contributory Context Keys (for endpoint agreement) Client and server generate part of each context key: CLIENT MIDDLEBOX SERVER Middlebox only learns key if client and server agree on its permissions
27 Design requirements for mctls MAINTAIN TLS SECURITY PROPERTIES: Entity Authentication Payload Secrecy PLUS TWO NEW ONES: Payload Integrity Contributory Context Keys 4 Visibility & Control 5 Multiple Encryption Contexts Least Privilege
28 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
29 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
30 Handshake Goals TLS Authenticate server mctls Authenticate server Authenticate middlebox Establish session key Distribute context keys
31 CLIENT MIDDLEBOX SERVER Hello List of middleboxes, contexts, and permissions
32 Auth server CLIENT MIDDLEBOX SERVER Auth mbox Hello Hello + Cert Hello + Cert Middlebox Key Exchange Middlebox Hello Done Server Key Exchange Server Hello Done
33 Auth server CLIENT MIDDLEBOX SERVER Auth mbox Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Server Key Exchange Server Hello Done
34 Auth server CLIENT MIDDLEBOX SERVER Auth mbox Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Server Key Exchange Server Hello Done
35 Auth server CLIENT MIDDLEBOX SERVER Auth mbox K Endpoints K Endpoints Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Server Key Exchange Server Hello Done
36 Auth server CLIENT MIDDLEBOX SERVER Auth mbox K Endpoints K Client-Mbox K Client-Mbox K Endpoints Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Server Key Exchange Server Hello Done
37 Auth server CLIENT MIDDLEBOX SERVER Auth mbox K Endpoints K Client-Mbox K Client-Mbox K Endpoints client secrets client secrets client secrets Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Middlebox Key Exchange Middlebox Hello Done Context 1: Context 2: Client Context Secrets Hello + Cert Server Key Exchange read secret Server write Hello secret Done read secret K Client-Mbox Server Context 1: Context 2: read secret read secret write secret write secret K Endpoints
38 Auth server CLIENT MIDDLEBOX SERVER Auth mbox K Endpoints K Client-Mbox K Client-Mbox K Endpoints client secrets client secrets client secrets Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Server Key Exchange Server Hello Done
39 Auth server CLIENT MIDDLEBOX SERVER Auth mbox Authenticate middlebox K Endpoints K Client-Mbox K Client-Mbox K Endpoints client secrets client secrets client secrets Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Server Key Exchange Server Hello Done
40 Auth server CLIENT MIDDLEBOX SERVER Auth mbox Authenticate middlebox K Endpoints K Client-Mbox K Client-Mbox K Server-Mbox K Server-Mbox K Endpoints client secrets client secrets client secrets Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Server Key Exchange Server Hello Done
41 Auth server CLIENT MIDDLEBOX SERVER Auth mbox Authenticate middlebox K Endpoints K Client-Mbox K Client-Mbox K Server-Mbox K Server-Mbox K Endpoints client secrets server secrets client secrets server secrets client secrets server secrets Hello Client Key Exchange Client Context Secrets Change Cipher Spec Finished Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Middlebox Key Exchange Middlebox Hello Done Hello + Cert Server Key Exchange Server Hello Done Server Context Secrets Change Cipher Spec Finished
42 Client Key Exchange Client Auth server Context Secrets Auth mbox K Endpoints Middlebox Key Exchange Middlebox Hello Done Server Hello Done CLIENT MIDDLEBOX SERVER K Client-Mbox K Client-Mbox K Server-Mbox Authenticate middlebox K Server-Mbox Change Cipher Spec Hello + Cert client secrets Finished server secrets client secrets server secrets client secrets server secrets Middlebox Compute Key Context Exchange Compute Context Keys Keys Server Compute Context Context Secrets Keys Middlebox Hello Done Change Cipher Spec Finished K Endpoints For each context: client read secret + server read secret client random + server random reader keys client write secret + server write secret client random + server random writer keys PRF PRF read key block write key block
43 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
44 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
45 mctls adds functionality to TLS. Does it add overhead? Data Overhead context key material + certificates CPU Overhead context key generation + key exchange Time Overhead handshake duration
46 mctls increases handshake size mc7l6 7L6 6Lze (kb) Ctxts: 1 0box: 0 Ctxts: 4 0box: 0 Ctxts: 8 0box: 0 Ctxts: 4 0box: 1 Ctxts: 4 0box: 2
47 mctls can increase server load mctl6 TL6 400 ConnectLons Ser 6econd umber of Contexts
48 mctls does not increase time to first byte TLPe to )Lrst Byte (Ps) uPber of Contexts PFTL6 TL6 TC3
49 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
50 TLS + Middleboxes mctls Encryption & In-Network Functionality mctls Design Ideas mctls Handshake Performance Evaluation
51 In the Paper crypto details threat model using encryption contexts application use cases detailed performance evaluation future work
52 mctls.org
53 mctls: enabling secure in-network functionality in TLS David Naylor Kyle Schomp Matteo Varvello Ilias Leontiadis Jeremy Blackburn Diego Lopez Dina Papagiannaki Pablo Rodriguez Rodriguez Peter Steenkiste
And Then There Were More:
David Naylor Carnegie Mellon And Then There Were More: Secure Communication for More Than Two Parties Richard Li University of Utah Christos Gkantsidis Microsoft Research Thomas Karagiannis Microsoft Research
More informationMulti-Context TLS (mctls): Enabling Secure In-Network Functionality in TLS
Multi-Context TLS (mctls: Enabling Secure In-Network Functionality in TLS David Naylor, Kyle Schomp, Matteo Varvello, Ilias Leontiadis, Jeremy Blackburn, Diego Lopez, Konstantina Papagiannaki, Pablo Rodriguez
More informationTransport Level Security
2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex,
More informationTransport Layer Security
CEN585 Computer and Network Security Transport Layer Security Dr. Mostafa Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud University mdahshan@ksu.edu.sa
More informationCryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea
Cryptography SSL/TLS Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 History Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent
More informationShare Count Analysis HEADERS
Measuring Network Privacy with It s 11PM. DO YOU KNOW WHERE YOUR Share Count Analysis HEADERS ARE? David Naylor Peter Steenkiste GOAL measure how private a network architecture or protocol is GOAL measure
More informationChapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,
Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls 32.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 32.2 Figure 32.1 Common structure
More informationSolving HTTP Problems With Code and Protocols NATASHA ROONEY
Solving HTTP Problems With Code and Protocols NATASHA ROONEY Web HTTP TLS TCP IP 7. Application Data HTTP / IMAP 6. Data Presentation, Encryption SSL / TLS 5. Session and connection management - 4. Transport
More informationWAP Security. Helsinki University of Technology S Security of Communication Protocols
WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP
More informationSSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1
SSL/TLS & 3D Secure CS 470 Introduction to Applied Cryptography Ali Aydın Selçuk CS470, A.A.Selçuk SSL/TLS & 3DSec 1 SSLv2 Brief History of SSL/TLS Released in 1995 with Netscape 1.1 Key generation algorithm
More informationThe World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to
1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats
More informationTLS. RFC2246: The TLS Protocol. (c) A. Mariën -
TLS RFC2246: The TLS Protocol What does it achieve? Confidentiality and integrity of the communication Server authentication Eventually: client authentication What is does not do Protect the server Protect
More informationThe Security Impact of HTTPS Interception
The Security Impact of HTTPS Interception Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael Bailey, J. Alex Halderman, Vern Paxson University of Michigan,
More informationProtocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.
P2 Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE 802.11i, IEEE 802.1X P2.2 IP Security IPsec transport mode (host-to-host), ESP and
More informationUnderstand the TLS handshake Understand client/server authentication in TLS. Understand session resumption Understand the limitations of TLS
Last Updated: Oct 31, 2017 Understand the TLS handshake Understand client/server authentication in TLS RSA key exchange DHE key exchange Explain certificate ownership proofs in detail What cryptographic
More informationTOWARDS USABLE AND FINE-GRAINED SECURITY FOR HTTPS WITH MIDDLEBOXES
TOWARDS USABLE AND FINE-GRAINED SECURITY FOR HTTPS WITH MIDDLEBOXES Abhimanyu Khanna A thesis in The Department of Concordia Institute for Information Systems Engineering Presented in Partial Fulfillment
More informationInternet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho
Internet Security - IPSec, SSL/TLS, SRTP - 29th. Oct. 2007 Lee, Choongho chlee@mmlab.snu.ac.kr Contents Introduction IPSec SSL / TLS SRTP Conclusion 2/27 Introduction (1/2) Security Goals Confidentiality
More informationCS 356 Internet Security Protocols. Fall 2013
CS 356 Internet Security Protocols Fall 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter 5
More informationPureVPN's OpenVPN Setup Guide for pfsense (2.3.2)
PureVPN's OpenVPN Setup Guide for pfsense (2.3.2) pfsense is an open source firewall and router that is available completely free of cost. It offers load balancing, unified threat management along with
More informationNetwork Security - ISA 656 IPsec IPsec Key Management (IKE)
Network Security - ISA 656 IPsec IPsec (IKE) Angelos Stavrou September 28, 2008 What is IPsec, and Why? What is IPsec, and Why? History IPsec Structure Packet Layout Header (AH) AH Layout Encapsulating
More informationPerformance Implications of Security Protocols
Performance Implications of Security Protocols Varsha Mainkar Technical Staff Member Network Design & Performance Analysis Advanced Technologies, Joint Work with Paul Reeser 5th INFORMS Telecom Conference
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationBut where'd that extra "s" come from, and what does it mean?
SSL/TLS While browsing Internet, some URLs start with "http://" while others start with "https://"? Perhaps the extra "s" when browsing websites that require giving over sensitive information, like paying
More informationWhen HTTPS Meets CDN
When HTTPS Meets CDN A Case of Authentication in Delegated Service Jinjin Liang 1, Jian Jiang 1, Haixin Duan 1, Kang Li 2, Tao Wan 3, Jianping Wu 1 1 Tsinghua University 2 University of Georgia 3 Huawei
More informationSecurity issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.
Security issues: Threats Methods of attack Encryption algorithms Secret-key Public-key Hybrid protocols Lecture 15 Page 2 1965-75 1975-89 1990-99 Current Platforms Multi-user timesharing computers Distributed
More informationOn the Internet, nobody knows you re a dog.
On the Internet, nobody knows you re a dog. THREATS TO DISTRIBUTED APPLICATIONS 1 Jane Q. Public Big Bank client s How do I know I am connecting to my bank? server s Maybe an attacker...... sends you phishing
More informationCIP Security Phase 1 Secure Transport for EtherNet/IP
CIP Security Phase 1 Secure Transport for EtherNet/IP Brian Batke, Rockwell Automation Dennis Dubé, Schneider Electric Joakim Wiberg, HMS Industrial Networks October 14, 2015 The Need for a Secure Transport
More informationLecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Nils Gruschka University of Oslo Spring 2018 Introduction Nils Gruschka University Kiel (Diploma in Computer Science) T-Systems, Hamburg
More informationConfiguring OpenVPN on pfsense
Configuring OpenVPN on pfsense Configuring OpenVPN on pfsense Posted by Glenn on Dec 29, 2013 in Networking 0 comments In this article I will go through the configuration of OpenVPN on the pfsense platform.
More informationIntroduction. INF3510 Information Security. Lecture 10: Communications Security. Outline. Network Security Concepts. University of Oslo Spring 2018
Introduction INF3510 Information Security Lecture 10: Communications Security Nils Gruschka University of Oslo Spring 2018 Nils Gruschka University Kiel (Diploma in Computer Science) T-Systems, Hamburg
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationUnderstanding Traffic Decryption
The following topics provide an overview of SSL inspection, describe the prerequisites for SSL inspection configuration, and detail deployment scenarios. Traffic Decryption Overview, page 1 SSL Handshake
More informationNetwork Security: IPsec. Tuomas Aura
Network Security: IPsec Tuomas Aura 3 IPsec architecture and protocols Internet protocol security (IPsec) Network-layer security protocol Protects IP packets between two hosts or gateways Transparent to
More informationSecurity: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Final Exam Review Instructor: Dr. Kun Sun Topics covered by Final Topic before Midterm 10% Topic after Midterm 90% Date: 12/13/2017 7:30am 10:15am Place: the same
More informationSharkFest 17 Europe. 20 QUIC Dissection. Using Wireshark to Understand QUIC Quickly. Megumi Takeshita. ikeriri network service
SharkFest 17 Europe 20 QUIC Dissection Using Wireshark to Understand QUIC Quickly ParkSuite Classroom 11 November 2017 11:15am-12:30pm Megumi Takeshita ikeriri network service supplimental files http://www.ikeriri.ne.jp/sharkfest
More informationSecuring IoT applications with Mbed TLS Hannes Tschofenig Arm Limited
Securing IoT applications with Mbed TLS Hannes Tschofenig Agenda Theory Threats Security services Hands-on with Arm Keil MDK Pre-shared secret-based authentication (covered in webinar #1) TLS Protocol
More informationtcpcrypt: real transport-level encryption Andrea Bittau, Mike Hamburg, Mark Handley, David Mazieres, Dan Boneh. UCL and Stanford.
tcpcrypt: real transport-level encryption Andrea Bittau, Mike Hamburg, Mark Handley, David Mazieres, Dan Boneh. UCL and Stanford. What would it take to encrypt the vast majority of TCP traffic? Performance
More informationE-commerce security: SSL/TLS, SET and others. 4.1
E-commerce security: SSL/TLS, SET and others. 4.1 1 Electronic payment systems Purpose: facilitate the safe and secure transfer of monetary value electronically between multiple parties Participating parties:
More informationAuditing IoT Communications with TLS-RaR
Auditing IoT Communications with TLS-RaR Judson Wilson, Henry Corrigan-Gibbs, Riad S. Wahby, Keith Winstein, Philip Levis, Dan Boneh Stanford University Auditing Standard Devices MITM Used for: security
More informationDisplaying SSL Configuration Information and Statistics
CHAPTER 7 Displaying SSL Configuration Information and Statistics This chapter describes the show commands available for displaying CSS SSL configuration information and statistics and an explanation of
More informationSSL/TLS. How to send your credit card number securely over the internet
SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying
More informationInitial connection setup. Adding subflow setup. Three-way handshake with MP_CAPABLE Exchange 64 bit key(key-a, Key-B)
- 2 - Despite the short history, Multipath TCP(MPTCP) prevails drastically As MPTCP was deployed, security concerns increase There have been multiple attempts at verifications to security of MPTCP Initial
More informationAuth. Key Exchange. Dan Boneh
Auth. Key Exchange Review: key exchange Alice and want to generate a secret key Saw key exchange secure against eavesdropping Alice k eavesdropper?? k This lecture: Authenticated Key Exchange (AKE) key
More informationInternet security and privacy
Internet security and privacy SSL/TLS 1 Application layer App. TCP/UDP IP L2 L1 2 Application layer App. SSL/TLS TCP/UDP IP L2 L1 3 History of SSL/TLS Originally, SSL Secure Socket Layer, was developed
More informationreview of the potential methods
Mandatory iscsi Security review of the potential methods IPS Interim Meeting Nashua NH, May 01 2001 Ofer Biran Thanks to: IBM Research Lab in Haifa Bernard Aboba, David Black, Julian Satran, Steve Senum
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationScan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):ekk.worldtravelink.com
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Travolutionary ASV Company: Comodo CA Limited 10-03-2018 Scan expiration date: 01-01-2019 Part 2.
More informationRule based Forwarding (RBF): improving the Internet s flexibility and security. Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs
Rule based Forwarding (RBF): improving the Internet s flexibility and security Lucian Popa, Ion Stoica, Sylvia Ratnasamy UC Berkeley Intel Labs Motivation Improve network s flexibility Middlebox support,
More informationCryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption
and secure channel May 17, 2018 1 / 45 1 2 3 4 5 2 / 45 Introduction Simplified model for and decryption key decryption key plain text X KE algorithm KD Y = E(KE, X ) decryption ciphertext algorithm X
More informationLecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from
Lecture 15 PKI & Authenticated Key Exchange COSC-260 Codes and Ciphers Adam O Neill Adapted from http://cseweb.ucsd.edu/~mihir/cse107/ Today We will see how signatures are used to create public-key infrastructures
More informationCSCE 813 Internet Security Final Exam Preview
CSCE 813 Internet Security Final Exam Preview Professor Lisa Luo Fall 2017 Coverage All contents! Week1 ~ Week 15 The nature of the exam: 12 questions: 3 multiple choices questions 1 true or false question
More informationCOSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS
COSC 301 Network Management Lecture 15: SSL/TLS and HTTPS Zhiyi Huang Computer Science, University of Otago COSC301 Lecture 15: SSL/TLS and HTTPS 1 Today s Focus WWW WWW How to secure web applications?
More informationComputer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1415/ Chapter 16: 1
Computer Security 3e Dieter Gollmann Security.di.unimi.it/sicurezza1415/ Chapter 16: 1 Chapter 16: Communications Security Chapter 16: 2 Agenda Threat model Secure tunnels Protocol design principles IPsec
More informationChapter 8 Web Security
Chapter 8 Web Security Web security includes three parts: security of server, security of client, and network traffic security between a browser and a server. Security of server and security of client
More informationLecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005
Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks
More informationCitrix NetScaler Administration Training
Citrix NetScaler Administration Training Course Duration : 20 Working Days Class Duration : 3 hours per day Fast Track: - Course duration 10days (Per day 8 hours) Get Fee Details Module 1 NetScaler Overview
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More informationNetwork Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2014
Network Security: TLS/SSL Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2014 Outline 1. Diffie-Hellman key exchange (recall from earlier) 2. Key exchange using public-key encryption
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationThe case for ubiquitous transport-level encryption
1/25 The case for ubiquitous transport-level encryption Andrea Bittau, Michael Hamburg, Mark Handley, David Mazières, and Dan Boneh Stanford and UCL November 18, 2010 Goals 2/25 What would it take to encrypt
More informationUniform Resource Locators (URL)
The World Wide Web Web Web site consists of simply of pages of text and images A web pages are render by a web browser Retrieving a webpage online: Client open a web browser on the local machine The web
More informationTransport Layer Security
Transport Layer Security TRANSPORT LAYER SECURITY PERFORMANCE TESTING OVERVIEW Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL), are the most popular cryptographic protocols
More informationSSL/TLS CONT Lecture 9a
SSL/TLS CONT Lecture 9a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 11, 2017 Source of some slides: University of Twente 2 HANDSHAKE PROTOCOL: KEY EXCHANGE AND AUTHENTICATION
More informationSecurity: Focus of Control
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 24a December 2, 2013 CPSC 467, Lecture 24a 1/20 Secure Shell (SSH) Transport Layer Security (TLS) Digital Rights Management and Trusted
More informationApplication Layer. Presentation Layer. Session Layer. Transport Layer. Network Layer. Data Link Layer. Physical Layer
ISO/OSI Model SSL: Security at Transport Layer Application Layer Peer-to-peer Application Layer Network Security Assurance Presentation Layer Session Layer Transport Layer Presentation Layer Session Layer
More informationRTCWEB Working Group. Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future
RTCWEB Working Group Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future Dan Wing dwing@cisco.com IETF83 - March 2012 v2 1 Agenda Scope Upcoming Questions
More informationGrandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide
Grandstream Networks, Inc. GWN7000 Multi-WAN Gigabit VPN Router VPN Configuration Guide Table of Contents SUPPORTED DEVICES... 5 INTRODUCTION... 6 GWN7000 VPN FEATURE... 7 OPENVPN CONFIGURATION... 8 OpenVPN
More informationSecurity Protocols. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel
Security Protocols Professor Patrick McDaniel CSE545 - Advanced Network Security Spring 2011 CSE545 - Advanced Network Security - Professor McDaniel 1 Case Study: Host Access The first systems used telnet
More informationSSL/TLS Vulnerability Detection Using Black Box Approach
Journal of Physics: Conference Series PAPER OPEN ACCESS SSL/TLS Vulnerability Detection Using Black Box Approach To cite this article: D Gunawan et al 2018 J. Phys.: Conf. Ser. 978 012121 View the article
More informationSecuring Your Wireless LAN
Securing Your Wireless LAN Pejman Roshan Product Manager Cisco Aironet Wireless Networking Session Number 1 Agenda Requirements for secure wireless LANs Overview of 802.1X and TKIP Determining which EAP
More informationSet Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers
Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers Objective A Virtual Private Network (VPN) is a private network that is used to virtually
More informationCS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL
CS 393 Network Security Nasir Memon Polytechnic University Module 12 SSL Course Logistics HW 4 due today. HW 5 will be posted later today. Due in a week. Group homework. DoD Scholarships? NSF Scholarships?
More informationChapter 4: Securing TCP connections
Managing and Securing Computer Networks Guy Leduc Chapter 5: Securing TCP connections Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley, March 2012. (section
More informationAbout DPI-SSL. About DPI-SSL. Functionality. Deployment Scenarios
DPI-SSL About DPI-SSL Configuring Client DPI-SSL Settings Configuring Server DPI-SSL Settings About DPI-SSL About DPI-SSL Functionality Deployment Scenarios Customizing DPI-SSL Connections per Appliance
More informationService Provider and Enterprise Security in the Age of Ubiquitous Encryption
Service Provider and Enterprise Security in the Age of Ubiquitous Encryption Humberto LaRoche, Principal Engineer Cisco CTAO, hlaroche@cisco.com Chris O Rourke Principal Engineer Cisco Security Business
More informationNetwork Security: IPsec. Tuomas Aura T Network security Aalto University, Nov-Dec 2014
Network Security: IPsec Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2014 2 IPsec: Architecture and protocols Internet protocol security (IPsec) Network-layer security protocol Protects
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationComputer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1516/ Chapter 16: 1
Computer Security 3e Dieter Gollmann Security.di.unimi.it/sicurezza1516/ Chapter 16: 1 Chapter 16: Communications Security Chapter 16: 2 Agenda Threat model Secure tunnels Protocol design principles IPsec
More informationSecure Socket Layer. Security Threat Classifications
Secure Socket Layer 1 Security Threat Classifications One way to classify Web security threats in terms of the type of the threat: Passive threats Active threats Another way to classify Web security threats
More informationThe case for ubiquitous transport level encryption. Andrea Bittau, Mike Hamburg, Mark Handley, David Mazieres, Dan Boneh. UCL and Stanford.
The case for ubiquitous transport level encryption Andrea Bittau, Mike Hamburg, Mark Handley, David Mazieres, Dan Boneh. UCL and Stanford. What would it take to encrypt all the traffic on the Internet,
More informationScan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 02/18/2018 Scan expiration date: 05/19/2018 Part 2. Component
More informationIPsec and SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dec. 1st, /43
0/43 IPsec and SSL/TLS Applied Cryptography 0 Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dec. 1st, 2016 Cryptography in the TCP/IP stack application layer transport layer network layer data-link
More informationMTAT Applied Cryptography
MTAT.07.017 Applied Cryptography Transport Layer Security (TLS) Advanced Features University of Tartu Spring 2016 1 / 16 Client Server Authenticated TLS ClientHello ServerHello, Certificate, ServerHelloDone
More informationINF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
More informationCPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME:
CPSC 481/681 SPRING 2006 QUIZ #1 7 MAR 2006 NAME: There are 6 questions on this quiz. Each question is individually weighted. If you do not understand the question, please ask for clarification. 1 I. (24
More informationTown Crier. Authenticated Data Feeds For Smart Contracts. CS5437 Lecture by Kyle Croman and Fan Zhang Mar 18, 2016
Town Crier Authenticated Data Feeds For Smart Contracts CS5437 Lecture by Kyle Croman and Fan Zhang Mar 18, 2016 Smart Contract Decentralized App: Programs are executed by all miners who reach consensus
More informationTinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri
TinySec: A Link Layer Security Architecture for Wireless Sensor Networks Chris Karlof, Naveen Sastry,, David Wagner Presented by Paul Ruggieri 1 Introduction What is TinySec? Link-layer security architecture
More informationComputer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 10r. Recitation assignment & concept review Paul Krzyzanowski Rutgers University Spring 2018 April 3, 2018 CS 419 2018 Paul Krzyzanowski 1 1. What is a necessary condition for perfect
More informationCSE543 Computer and Network Security Module: Network Security
CSE543 Computer and Network Security Module: Network Security Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1 2 Communication Security Want to establish a secure channel
More informationDouble-clicking an entry opens a new window with detailed information about the selected VPN tunnel.
The Barracuda NextGen Admin VPN tab provides information on all VPN connections that are configured on the Barracuda NextGen Firewall F-Series. Selecting the icons in the ribbon bar under the VPN tab takes
More informationVirtual Private Networks.
Virtual Private Networks thm@informatik.uni-rostock.de http://wwwiuk.informatik.uni-rostock.de/ Content Virtual Private Networks VPN Basics Protocols (IPSec, PPTP, L2TP) Objectives of VPNs Earlier Companies
More informationTable of Contents. Why doesn t the phone pass 802.1X authentication?... 16
Table of Contents ABOUT 802.1X... 3 YEALINK PHONES COMPATIBLE WITH 802.1X... 3 CONFIGURING 802.1X SETTINGS... 4 Configuring 802.1X using Configuration Files... 4 Configuring 802.1X via Web User Interface...
More informationA Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00)
A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00) IETF 93 / July 2015 Paul E. Jones Nermeen Ismail David Benham Cisco Agenda Security
More informationSecurity Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings)
Security Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings) Lecture Outline Network Attacks Attive Attacks Passive Attacks TCP Attacks Contermeasures IPSec SSL/TLS Firewalls
More informationNetwork Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2010
Network Security: TLS/SSL Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Diffie-Hellman 2. Key exchange using public-key encryption 3. Goals of authenticated key exchange
More informationScan Report Executive Summary
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 11/20/2017 Scan expiration date: 02/18/2018 Part 2. Component
More information