Transport Level Security

Similar documents
The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

Transport Layer Security

CSCE 715: Network Systems Security

E-commerce security: SSL/TLS, SET and others. 4.1

Security Protocols. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

The Secure Shell (SSH) Protocol

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

CS 356 Internet Security Protocols. Fall 2013

Chapter 8 Web Security

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

OpenSSH. 24th February ASBL CSRRT-LU (Computer Security Research and Response Team Luxembourg) 1 / 12

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München. ilab. Lab 8 SSL/TLS and IPSec

Transport Layer Security

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Internet security and privacy

Information Security CS 526

Chapter 4: Securing TCP connections

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Chapter 12 Security Protocols of the Transport Layer

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPsec and SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dec. 1st, /43

Overview. SSL Cryptography Overview CHAPTER 1

Cryptography and Network Security

CPSC 467: Cryptography and Computer Security

CSE543 Computer and Network Security Module: Network Security

Displaying SSL Configuration Information and Statistics

Secure Remote Access: SSH & HTTPS

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

(2½ hours) Total Marks: 75

Chapter 6: Security of higher layers. (network security)

Presented by: Ahmed Atef Elnaggar Supervisor: Prof. Shawkat K.Guirguis

Total No. of Questions : 09 ] [ Total No.of Pages : 02

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

Introduction and Overview. Why CSCI 454/554?

8. Network Layer Contents

Key Management and Distribution

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Protocol Comparisons: OpenSSH, SSL/TLS (AT-TLS), IPSec

IPSec Transform Set Configuration Mode Commands

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

CSCE 715: Network Systems Security

Secure channel, VPN and IPsec. stole some slides from Merike Kaeo

Secure Socket Layer. Security Threat Classifications

COSC4377. Chapter 8 roadmap

Lecture 10: Communications Security

Universität Hamburg. SSL & Company. Fachbereich Informatik SVS Sicherheit in Verteilten Systemen. Security in TCP/IP. UH, FB Inf, SVS, 18-Okt-04 2

VPN, IPsec and TLS. stole slides from Merike Kaeo apricot2017 1

Lecture 9: Network Level Security IPSec

Understand the TLS handshake Understand client/server authentication in TLS. Understand session resumption Understand the limitations of TLS

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

IPSec Transform Set Configuration Mode Commands

HTTPS Setup using mod_ssl on CentOS 5.8. Jeong Chul. tland12.wordpress.com. Computer Science ITC and RUPP in Cambodia

TLS/sRTP Voice Recording AddPac Technology

IPsec (AH, ESP), IKE. Guevara Noubir CSG254: Network Security

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited

Chapter 7. WEB Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

Sample excerpt. Virtual Private Networks. Contents

COMPUTER SECURITY. Computer Security Secure Communication Channels (2)

AIT 682: Network and Systems Security

Introduction. INF3510 Information Security. Lecture 10: Communications Security. Outline. Network Security Concepts. University of Oslo Spring 2018

David Wetherall, with some slides from Radia Perlman s security lectures.

L13. Reviews. Rocky K. C. Chang, April 10, 2015

MTAT Applied Cryptography

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Network Encryption 3 4/20/17

Solving HTTP Problems With Code and Protocols NATASHA ROONEY

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2014

BCA III Network security and Cryptography Examination-2016 Model Paper 1

SharkFest 17 Europe. SSL/TLS Decryption. uncovering secrets. Wednesday November 8th, Peter Wu Wireshark Core Developer

iii PPTP... 7 L2TP/IPsec... 7 Pre-shared keys (L2TP/IPsec)... 8 X.509 certificates (L2TP/IPsec)... 8 IPsec Architecture... 11

Chapter 5. Transport Level Security

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Cryptography (Overview)

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1415/ Chapter 16: 1

Security Protocols and Infrastructures. Winter Term 2010/2011

Application Layer. Presentation Layer. Session Layer. Transport Layer. Network Layer. Data Link Layer. Physical Layer

Cipher Suite Configuration Mode Commands

Defining IPsec Networks and Customers

MTAT Applied Cryptography

Introduction to Cryptography Lecture 11

CS November 2018

IP Security IK2218/EP2120

SSH Algorithms for Common Criteria Certification

Glenda Whitbeck Global Computing Security Architect Spirit AeroSystems

Performance Implications of Security Protocols

AccessEnforcer Version 4.0 Features List

Wireless Terminal Emulation Advanced Terminal Session Management (ATSM) Device Management Stay-Linked

Lecture for February 10, 2016

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

Firewalls, Tunnels, and Network Intrusion Detection

Transcription:

2 Transport Level Security : Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l12, Steve/Courses/2013/s2/css322/lectures/transport.tex, r2965 1 Contents Issues Secure Shell

4 Issues Original Internet protocols do not have built-in security (IP, TCP, HTTP,... ) Many threats arise for web and other Internet applications Issues at: client, server and traffic between client and server Cover: SSL/TLS,, IPsec 3 Comparison of Threats on the Web

6 Security Options in TCP/IP IPsec: Security for IP datagrams; general solution for all Internet traffic; implemented in OS SSL/TLS: Security for TCP segments; general solution for all TCP-based applications; implemented in libraries/applications (e.g. OpenSSL) Application-specific: Security for application messages; specific to each applications; implemented in single application 5 Contents Issues Secure Shell

8 SSL and TLS Secure Sockets Layer (SSL) originated in Netscape web browser Transport Layer Security (TLS) standardised by IETF SSLv3 and TLS are almost the same SSL provides security services to application layer protocols using TCP SSL architecture consists of multiple protocols 7 SSL Architecture Record: provides confidentiality and message integrity Handshake: authenticate entities, negotiate parameter values Change Cipher: change cipher for use in connection Alert: alert peer entity of status/warning/error

10 Connections and Sessions SSL connection corresponds with TCP connection Client and server may have multiple connections SSL session is association between client and server Session created with Handshake protocol Multiple connections can be associated with one session Security parameters for session can be shared for connections State information is stored after Handshake protocol Session: ID, certificate, compression, cipher spec, master secret,... Connection: random values, encrypt keys, MAC secrets, IV, sequence numbers,... 9 SSL Record Protocol Operation

SSL Record Protocol I Fragmentation: maximum fragment size is 16384 Bytes I Compression: lossless; algorithm chosen in Handshake I MAC: HMAC applied on compressed data; MAC secret key for connection used; MAC appended to compressed fragment I Encrypt: applied to compressed fragment and MAC; algorithm chosen in Handshake SSL record header: I I I I Content type: higher layer protocol (change cipher spec, alert, handshake, application) Version Compressed length in bytes 11 SSL Record Format 12

14 SSL Record Protocol Payload 13 SSL Handshake Protocol Allow client and server to authenticate each other Negotiate encryption and MAC algorithms, exchange keys Key Exchange: RSA, Diffie-Hellman MAC: HMAC using SHA or MD5 Encryption: RC4, RC2, DES, 3DES, IDEA, AES Multiple phases: 1. Establish security capabilities: client proposes algorithms, server selects one 2. Server authentication and key exchange 3. Client authentication and key exchange 4. Finish setting up connection

16 SSL Handshake Protocol Messages 15 SSL Handshake Protocol Operation

18 Contents Issues Secure Shell 17 : HTTP over SSL (or TLS) URL uses https:// Web server listens on port 443 Encrypt: URL of requested document, contents of document, contents of browser forms, cookies, contents of HTTP header Server is authenticated using certificate (using SSL) Client is authenticated using password (using HTTP)

20 Contents Issues Secure Shell 19 Secure Shell TELNET provides a remote login facility; insecure Secure Shell () designed for secure remote login also supports secure file transfer and tunnelling v2 developed by IETF architecture consists of 3 protocols

22 Protocol Stack 21 Authentication Server Authentication Server has public/private key pair Assume client knows server s public key During key exchange, server signs message with public key Client Authentication Key-based: client has public/private key pair; server knows client public key Password-based: client sends password (encrypted); server knows password

24 Transport Layer Packet Exchange 23 Transport Layer Protocol Identification string exchange: each entity identifies protocol and software version Algorithm negotiation: client and server send list of supported algorithms, in order of preference; first common algorithm chosen Key exchange: Diffie-Hellman End of key exchange: new keys generated from shared secret, e.g. K c2s = Hash(K H C session id) where H = Hash(ID C ID C M C M S PU S Y A Y B K) Service request for User Authentication or Connection Protocol

26 Algorithms 25 Key Exchange with Diffie-Hellman

28 Key Exchange with Diffie-Hellman notation: q = P, α = G, Y A = e, Y B = f ID string for client and server: ID C, ID S ; MSG KEXINIT message from client and server: M C, M S Server key pair: (PU S, PR S ); assume client knows/trusts PU S Client and server have agreed upon hash and encryption algorithms 27 Key Exchange with Diffie-Hellman (see Wireshark capture)

30 Transport Layer Packet Formation 29 TCP Connection a and b are application port numbers

32 Tunnel over TCP Connection x and y are application port numbers, a and b are port numbers used by 31 Tunnels Allow normal (unsecured) applications to securely transfer data Bypass firewalls by using different ports Local forwarding: traffic to local port is sent via client to remote port Remote forwarding: traffic to remote port is sent via server to local port