CSE543 Computer and Network Security Module: Network Security

Similar documents
CSE543 Computer and Network Security Module: Network Security

CSE443 - Introduction to Computer and Network Security Network Security

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

Module: Network Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Transport Level Security

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

IP Security IK2218/EP2120

Internet security and privacy

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Network Encryption 3 4/20/17

Transport Layer Security

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

IPSec. Overview. Overview. Levente Buttyán

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München. ilab. Lab 8 SSL/TLS and IPSec

Virtual Private Network

CNT Computer and Network Security: BGP Security

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Firewalls, Tunnels, and Network Intrusion Detection

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Introduction to IPsec. Charlie Kaufman

IPsec (AH, ESP), IKE. Guevara Noubir CSG254: Network Security

Chapter 6: Security of higher layers. (network security)

CS 356 Internet Security Protocols. Fall 2013

The IPsec protocols. Overview

Secure channel, VPN and IPsec. stole some slides from Merike Kaeo

Lecture 7 - Applied Cryptography

CSC 4900 Computer Networks: Security Protocols (2)

Internet security and privacy

Security Protocols. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel

Advanced Security and Mobile Networks

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

Chapter 8 Network Security

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1415/ Chapter 16: 1

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Cisco Exam Questions & Answers

VPN, IPsec and TLS. stole slides from Merike Kaeo apricot2017 1

Security Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings)

L13. Reviews. Rocky K. C. Chang, April 10, 2015

CSCE 715: Network Systems Security

Data Security and Privacy. Topic 14: Authentication and Key Establishment

IPsec and SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dec. 1st, /43

Application Layer. Presentation Layer. Session Layer. Transport Layer. Network Layer. Data Link Layer. Physical Layer

CPSC 467b: Cryptography and Computer Security

HP Instant Support Enterprise Edition (ISEE) Security overview

On the Internet, nobody knows you re a dog.

CIT 480: Securing Computer Systems

Network Security. Thierry Sans

IP Security. Have a range of application specific security mechanisms

Chapter 4: Securing TCP connections

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Creating VPN s with IPsec

CPSC 467: Cryptography and Computer Security

Secure Networking with NAT Traversal for Enhanced Mobility

IP Security. Cunsheng Ding HKUST, Kong Kong, China

Sample excerpt. Virtual Private Networks. Contents

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

COSC4377. Chapter 8 roadmap

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Lecture 13 Page 1. Lecture 13 Page 3

Virtual Private Networks (VPN)

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples

Chapter 5: Network Layer Security

Lecture 10: Communications Security

E-commerce security: SSL/TLS, SET and others. 4.1

Introduction and Overview. Why CSCI 454/554?

CSC 6575: Internet Security Fall 2017

Cryptography and Network Security

Introduction. INF3510 Information Security. Lecture 10: Communications Security. Outline. Network Security Concepts. University of Oslo Spring 2018

Information Security CS 526

Network Security: IPsec. Tuomas Aura

INDEX. Symbols. 3DES over4 mechanism to4 mechanism...101

Chapter 11 The IPSec Security Architecture for the Internet Protocol

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Numerics I N D E X. 3DES (Triple Data Encryption Standard), 48

Administrator's Guide

VPN Ports and LAN-to-LAN Tunnels

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

David Wetherall, with some slides from Radia Perlman s security lectures.

Cisco Exam Implementing Cisco Network Security Version: 12.0 [ Total Questions: 186 ]

14. Internet Security (J. Kurose)

Distributed Systems. 27. Firewalls and Virtual Private Networks Paul Krzyzanowski. Rutgers University. Fall 2013

Administrator's Guide

AIT 682: Network and Systems Security

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Fundamentals of Linux Platform Security

The IPSec Security Architecture for the Internet Protocol

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Computer Security. 12. Firewalls & VPNs. Paul Krzyzanowski. Rutgers University. Spring 2018

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

Configuration of an IPSec VPN Server on RV130 and RV130W

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

REMOTE ACCESS IPSEC. Course /14/2014 Global Technology Associates, Inc.

Cryptography (Overview)

Sharing IPsec with Tunnel Protection

Transcription:

CSE543 Computer and Network Security Module: Network Security Professor Trent Jaeger CSE543 - Introduction to Computer and Network Security 1

2 Communication Security Want to establish a secure channel to remote hosts over an untrusted network Users - when logging in to a remote host Applications - when communicating across network Hosts - when logically part of the same network The protection service must Authenticate the end-points (each other) Negotiate what security is necessary (and how achieved) Establish a secure channel (e.g., key distribution/agreement) Process the traffic between the end points Also known as communications security.

3 Users Communications Security Login to a host over an untrusted network Using unauthenticated login - telnet, rsh - up to this point Problems How does user authenticate host? How does host authenticate user?

4 SSH Secure communication protocol Between user s client and remote machine (server) Used to implement remote login Runs on any transport layer (TCP/IP) Setup Authentication agent on client To produce and process messages on behalf of the user SSH Server To handle user logins to that host Forward X and TCP communications Remote machine use approximates local

SSH Protocol (1) Client opens connection to server (2) Server responds with its host key and server key Public keys identifying server and enabling communication (3) Client generates random number and encrypts with host and server keys (4) Server extracts random number (key) and can use Server is authenticated (5) Server authenticates user Password and RSA authentication (6) Preparatory phase To setup TCP/IP, X11 forwarding, etc. (7) Interactive session phase CSE543 - Introduction to Computer and Network Security 5

6 SSHv2 Protocol A number of improvements were made to the SSHv2 protocol (see Section 5) Flexible use of crypto - more algorithms Performance - 1.5 round trips on average Prevent eavesdropping - encrypt all SSH traffic Prevent IP spoofing - always validates server identity Prevent hijacking - integrity checking using HMAC Not backwards compatible with SSHv1

Application Comm Security Applications may want to construct secure communication channels transparently to users How can they do that? CSE543 - Introduction to Computer and Network Security 7

Application (Web) Security: SSL Secure socket Layer (SSL/TLS) Used to authenticate servers Uses certificates, root CAs Can authenticate clients HTTP Inclusive security protocol Security at the socket layer SSL Transport Layer Security (TLS) Provides authentication confidentiality integrity TCP IP CMPSC443 - Introduction to Computer and Network Security 8

SSL Handshake Client Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) Client Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) (2) Server Hello (alg. selection, ) Client Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) (2) Server Hello (alg. selection, ) (3) Server Certificate Client Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) (2) Server Hello (alg. selection, ) (3) Server Certificate Client Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) (2) Server Hello (alg. selection, ) (3) Server Certificate (4) ClientKeyRequest Client Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) (2) Server Hello (alg. selection, ) (3) Server Certificate (4) ClientKeyRequest Client (5) ChangeCipherSuite Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) (2) Server Hello (alg. selection, ) (3) Server Certificate (4) ClientKeyRequest Client (5) ChangeCipherSuite (6) ChangeCipherSuite Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) (2) Server Hello (alg. selection, ) (3) Server Certificate (4) ClientKeyRequest Client (5) ChangeCipherSuite (6) ChangeCipherSuite (7) Finished Server CMPSC443 - Introduction to Computer and Network Security 9

SSL Handshake (1) Client Hello (algorithms, ) (2) Server Hello (alg. selection, ) (3) Server Certificate (4) ClientKeyRequest Client (5) ChangeCipherSuite (6) ChangeCipherSuite (7) Finished (8) Finished Server CMPSC443 - Introduction to Computer and Network Security 9

Simplified Protocol Detail Participants: Alice/A (client) and Bob/B (server) Crypto Elements : Random R, Certificate C, k + i Public Key (of i) Crypto Functions : Hash function H(x), Encryption E(k, d), Decryption D(k, d), Keyed MAC HMAC(k, d) 1. Alice! Bob R A 2. Bob! Alice R B, C B Alice pick pre-master secret S Alice calculate master secret K = H(S, R A, R B ) 3. Alice! Bob E(k + B, S), HMAC(K,0 CLNT 0 + [#1, #2]) Bob recover pre-master secret S = D(k B, E(k + B, S)) Bob calculate master secret K = H(S, R A, R B ) 4. Bob! Alice HMAC(K, 0 SRV R 0 + [#1, #2]) Note: Alice and Bob : IV Keys, Encryption Keys, and Integrity Keys 6 keys,where each key k i = g i (K, R A, R B ), and g i is key generator function. CMPSC443 - Introduction to Computer and Network Security 10

SSL Tradeoffs Pros Server authentication* GUI clues for users Built into every browser Easy to configure on the server Protocol has been analyzed like crazy Cons Users don t check certificates Too easy to obtain certificates Too many roots in the browsers Some settings are terrible CMPSC443 - Introduction to Computer and Network Security 11

12 IPsec (not IPSec!) Host-level protection service IP-layer security (below TCP/UDP) De-facto standard for host level security Developed by the IETF (over many years) Available in most operating systems/devices E.g., XP, Vista, OS X, Linux, BSD*, Implements a wide range of protocols and cryptographic algorithms Selectively provides. Confidentiality, integrity, authenticity, replay protection, DOS protection

13 IPsec and the IP protocol stack IPsec puts the two main protocols in between IP and the other protocols HTTP TCP FTP SMTP UDP AH - authentication header ESP - encapsulating security payload AH IP ESP Other functions provided by external protocols and architectures

14 Modes of operation Transport : the payload is encrypted and the nonmutable fields are integrity verified (via MAC) MACed encrypted Header Payload Header Payload Tunnel : each packet is completely encapsulated (encrypted) in an outer IP packet Hides not only data, but some routing information MACed encrypted Header Payload Header Header Payload

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer

15 Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

16 IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB IPsec Network (IP) Data Link Physical

Authentication Header (AH) Authenticity and integrity via HMAC over IP headers and data Advantage: the authenticity of data and IP header information is protected it gets a little complicated with mutable fields, which are supposed to be altered by network as packet traverses the network some fields are immutable, and are protected Confidentiality of data is not preserved Replay protection via AH sequence numbers note that this replicates some features of TCP (good?) CSE543 - Introduction to Computer and Network Security 17

18 Authentication Header (AH) Modifications to the packet format IP Header Payload IP Header AH Header MAC Payload AH Packet Authenticated Encrypted

19 Encapsulating Security Payload (ESP) Confidentiality, authenticity and integrity via encryption and HMAC over IP payload (data) Advantage: the security manipulations are done solely on user data TCP packet is fully secured simplifies processing Use null encryption to get authenticity/integrity only Note that the TCP ports are hidden when encrypted good: better security, less is known about traffic bad: impossible for FW to filter/traffic based on port

20 Encapsulating Security Payload (ESP) Modifications to packet format IP Header Payload IP Header ESP Header Payload ESP Trailer MAC ESP Packet Authenticated Encrypted

Practical Issues and Limitations IPsec implementations Large footprint resource poor devices are in trouble New standards to simplify (e.g, JFK, IKE2) Slow to adopt new technologies Configuration is really complicated/obscure Issues IPsec tries to be everything for everybody at all times Massive, complicated, and unwieldy Policy infrastructure has not emerged Large-scale management tools are limited (e.g., CISCO) Often not used securely (common pre-shared keys) CSE543 - Introduction to Computer and Network Security 21

22 Network Isolation: VPNs Idea: I want to create a collection of hosts that operate in a coordinated way E.g., a virtual security perimeter over physical network Hosts work as if they are isolated from malicious hosts Solution: Virtual Private Networks Create virtual network topology over physical network Use communications security protocol suites to secure virtual links tunneling Manage networks as if they are physically separate Hosts can route traffic to regular networks (split-tunneling)

23 VPN Example: RW/Telecommuter (network edge) Internet LAN Physical Link Logical Link (IPsec)

24 VPN Example: Hub and Spoke (network edge) Internet LAN Physical Link Logical Link (IPsec)

25 VPN Example: Mesh (network edge) Internet LAN Physical Link Logical Link (IPsec)

26 Virtual LANs (VLANs) VPNs built with hardware Physically wire VPN via soft configuration of a switch crossbar No encryption none needed wire based isolation Many switches support VLANs Allows networks to be reorganized without rewiring Example usage: two departments in same hallway Each office is associated with department Configuring the network switch gives physical isolation Note: often used to ensure QoS A B C D E A B C D E VLAN 1: A,B VLAN 2: C,D,E