SSL/TLS. Pehr Söderman Natsak08/DD2495

Similar documents
Internet security and privacy

Chapter 4: Securing TCP connections

TLS1.2 IS DEAD BE READY FOR TLS1.3

CSCE 715: Network Systems Security

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2014

Universität Hamburg. SSL & Company. Fachbereich Informatik SVS Sicherheit in Verteilten Systemen. Security in TCP/IP. UH, FB Inf, SVS, 18-Okt-04 2

Transport Layer Security

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Network Security: TLS/SSL. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Transport Layer Security

MTAT Applied Cryptography

Overview. SSL Cryptography Overview CHAPTER 1

Security Protocols. Professor Patrick McDaniel CSE545 - Advanced Network Security Spring CSE545 - Advanced Network Security - Professor McDaniel

Transport Level Security

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

CIS 5373 Systems Security

SSL/TLS. How to send your credit card number securely over the internet

Cryptography (Overview)

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

COSC 301 Network Management. Lecture 15: SSL/TLS and HTTPS

E-commerce security: SSL/TLS, SET and others. 4.1

Securing Network Communications

Overview of TLS v1.3 What s new, what s removed and what s changed?

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Systematic Fuzzing and Testing of TLS Libraries Juraj Somorovsky

IPsec and SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dec. 1st, /43

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

CS 161 Computer Security

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Computer Security. 10r. Recitation assignment & concept review. Paul Krzyzanowski. Rutgers University. Spring 2018

Auth. Key Exchange. Dan Boneh

Securely Deploying TLS 1.3. September 2017

Security Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings)

Introduction and Overview. Why CSCI 454/554?

symmetric cryptography s642 computer security adam everspaugh

CS 356 Internet Security Protocols. Fall 2013

TLS 1.1 Security fixes and TLS extensions RFC4346

Kerberos. Pehr Söderman Natsak08/DD2495 CSC KTH 2008

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

CS 494/594 Computer and Network Security

MTAT Applied Cryptography

Encryption. INST 346, Section 0201 April 3, 2018

Coming of Age: A Longitudinal Study of TLS Deployment

Transport Layer Security

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Information Security CS 526

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

SharkFest 17 Europe. SSL/TLS Decryption. uncovering secrets. Wednesday November 8th, Peter Wu Wireshark Core Developer

Crypto meets Web Security: Certificates and SSL/TLS

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

CSE 127: Computer Security Cryptography. Kirill Levchenko

One Year of SSL Internet Measurement ACSAC 2012

Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks

Secure Socket Layer. Security Threat Classifications

Unit 8 Review. Secure your network! CS144, Stanford University

Cryptography Lecture 9 Key distribution and trust, Elliptic curve cryptography

Real-time protocol. Chapter 16: Real-Time Communication Security

Chapter 8 Web Security

Understand the TLS handshake Understand client/server authentication in TLS. Understand session resumption Understand the limitations of TLS

Secure Internet Communication

ON THE SECURITY OF TLS RENEGOTIATION

Securing IoT applications with Mbed TLS Hannes Tschofenig Arm Limited

Security Protocols and Infrastructures. Winter Term 2010/2011

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

Network Security and Cryptography. 2 September Marking Scheme

COSC4377. Chapter 8 roadmap

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Authentication in real world: Kerberos, SSH and SSL. Zheng Ma Apr 19, 2005

CS 161 Computer Security

Defeating All Man-in-the-Middle Attacks

32c3. December 28, Nick goto fail;

SSL Visibility and Troubleshooting

Lecture 6: Symmetric Cryptography. CS 5430 February 21, 2018

ecure Sockets Layer, or SSL, is a generalpurpose protocol for sending encrypted

Network Security Chapter 8

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Chapter 7. WEB Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Securing Internet Communication: TLS

PROTECTING CONVERSATIONS

Findings for

10/1/2015. Authentication. Outline. Authentication. Authentication Mechanisms. Authentication Mechanisms. Authentication Mechanisms

Network Security and Cryptography. December Sample Exam Marking Scheme

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

Verifying Real-World Security Protocols from finding attacks to proving security theorems

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Outline. 0 Topic 4.1: Securing Real-Time Communications 0 Topic 4.2: Transport Layer Security 0 Topic 4.3: IPsec and IKE

Data Security and Privacy. Topic 14: Authentication and Key Establishment

Security Protocols and Infrastructures. Winter Term 2015/2016

What did we talk about last time? Public key cryptography A little number theory

CPSC 467b: Cryptography and Computer Security

Security issues: Encryption algorithms. Threats Methods of attack. Secret-key Public-key Hybrid protocols. CS550: Distributed OS.

Attack on Sun s MIDP Reference Implementation of SSL

3 Symmetric Key Cryptography 3.1 Block Ciphers Symmetric key strength analysis Electronic Code Book Mode (ECB) Cipher Block Chaining Mode (CBC) Some

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Introduction to Network Security Missouri S&T University CPE 5420 Exam 2 Logistics

AIT 682: Network and Systems Security

AIR FORCE INSTITUTE OF TECHNOLOGY

Transcription:

SSL/TLS Pehr Söderman Pehrs@kth.se Natsak08/DD2495 1

Historical problems No general purpose security wrapper Kerberos doesn't cut it! Each protocol has it's own security layer SNMP, Ktelnet Or none at all Telnet, ftp, gopher... Good cryptography is hard Broken protocols Is even secure communication practical? 2

Enter the web Explosive growth of the Internet from 1990 and forward Security is critical to continue the growth A general purpose security layer is needed 3

Secure Network Programing Effort to create a security wrapper Place the security on the transport layer Why? Identified the requirements Security infrastructure Simple API Transparency SNP: An Interface for Secure Network Programming (Woo, Bindignavle, Su and Lam) 4

Important parts Strong authentication Session keys Integrity protection Perfect forward secrecy DoS resilience Replay protection Session reuse 5

Strong authentication PKI Obvious answer Drawbacks? Self signed Certificates Other solutions? Mutual authentication? Common algorithms: DH, RSA, DSS 6

Session keys We do not use PK for transport Additional cipher and keys are needed Fast, secure symmetric ciphers Common algorithms. DES, 3DES, RC4, AES 7

Integrity protection We need to protect the integrity of the data Even if it's encrypted. Why? Integrity protection have to be done on everything Note that we can't protect TCP! Common algorithms: MD5, SHA-1 8

Perfect forward secrecy Commonly done with a DH exchange Disconnects the session from the authentication material Protects us against later breaches of the authentication keys. The session is still safe Be very very afraid when somebody wants to take away PFS! 9

DoS resilience Secure services are frequently critical services We need protection against DoS attacks PKI is very expensive Avoid doing PK operations when you can Have the attacker do the PK operations also Save reusable values (for example: g^a for DH) 10

Replay protection Very common problem, but not too hard to do Make sure some kind of unique nonce is used in every connection Make sure the nonce is critical for the exchange (for example by basing the keys on it) 11

Session reuse Critical for good performance in some cases HTTP We need to be able to reuse the authentication Create new session keys and start a new session... 12

SSL/TLS History SSLv1 (Netscape, 1993) Badly broken, never published SSLv2 (Netscape, 1994) Some broken parts Dominant for several years SSLv3 (Netscape, 1996) Modern version of SSL TLS (IETF,, 1999) Adds better cryptography Frequently used 13

SSL protocols Handshake Protocol Chooses Cryptographic parameters ChangeChiperSpecs protocol Switches to a new cipher Application data Protocol Secures and transfers data Alert protocol Signaling of errors 14

Basic protocol (ClientHello) First message from the client. Client cipher suits TLS_DHE_DSS_WITH_DES_CBC_SHA Random number 15

Basic protocol (ServerHello) Cipher suit to be used Random number Certificate (Optional) Certificate request (Optional) ServerKeyExchange (Optional) ServerHelloDone Why is the security material optional? 16

Basic protocol (Client tasks) Check server certificate Send own certificate Generate PMS (Pre-Master Secret) Send PMS (Secured according to cipher suit) Calculate MS (Master Secret) ChangeCipherSpecs Finished message Verify Finished message 17

Basic protocol (Server Tasks) Check client certificate Calculate MS from PMS ChangeCipherSpecs Finished message Verify finished message 18

Session resumption Server tells client session ID during initial exchange Client may present session ID when starting a new session Server implementations may choose not to serve clients that forget their session ID's to prevent DoS attacks 19

Encrypted data stream From this point and forward the data stream is encrypted and authenticated Each data package (which must not be a network package) has integrity protection. TCP is still vulnerable TCP sniping 20

Exportability issues SSL still have export ciphers These are NOT computationally secure Typical 512 bit RSA and 40 bit DES Blame America 21

Important SSLv2 Security issues Lack of integrity protection for the handshake Force a weak cipher suit Truncation Attacks Cut data stream short Down grade attacks From v3/tls 22

How secure is SSLv3/TLS? Very secure actually Still there are a few known issues and attacks... 23

Change cipher spec drop attack Change cipher spec is unprotected MitM drops the CCS message in both directions Send the Finished messages. No protection! Easy if no encryption (just strip the authenticity data) Possible if short encryption keys (crack them before the timeout) Impossible if hard encryption is used Read: Analysis of the SSL 3.0 protocol (Wagner and Schneier) 24

Timing attacks Common RSA vulnerability Several implementations have been vulnerable to timing attacks Make sure to use RSA blinding Read: Remote Timing Attacks are Practical (Brumley and Boneh) 25

Attacks on SSL over Tor Tor is based on onion routing Supposed to make traffic analysis harder Sends data through untrusted hosts Makes it easy to get in the middle Chose a server with a self signed certificate Connect to the server through Tor Check if you got the right certificate Repeat Do you think anybody will sit in the middle? 26

Other SSL issues Are the endpoints secure? Is the one we are talking to trustworthy? Information leaks GET string length 27

Various recent attacks Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS# (Bleichenbacher) Rosa T,: Attacking RSA-based Sessions in SSL/TLS (Klima, Pokorny) Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS... (Vaudenay) The vulnerability of ssl to chosen-plaintext attack (Bard) Visual Spoofing of SSL Protected Web Sites and Effective Countermeasures (Adelsbach, Gajek, Schwenk) 28

Deploying SSL Get a real certificate No cheap-certs No self signed Consider server capacity Consider SSL-offloading Clear text data on LAN can be bad Dedicated solutions offers plenty of performance Limit the suits and use SSLv3/TLS only Prevent usage of TLS_RSA_WITH_NULL_MD5 Remember that SSL is not a silver bullet! 29

Lets have a look at SSL 30

On the subject of integrity Personal integrity is a critical part when working in the security field You have to be untouchable You will be working with critical data You will be working with important secrets You will be in the position to bypass security Trust is easier to lose than to build Don't burn your bridges! 31

Common traps Ask first, poke later. Never, ever, assume it's alright to go into a system Make sure you have a written permission Never talk about confidential information Much harder than you think Don't lie, don't worm, don't guess Tell people when you don't know Stick to your principles and gut feelings Give credit were credit is due 32

About Lab 2 Most of the solution was on the net The source of the material was the HoneyNet project The lab explicitly stated that sources should be properly referenced I know the sample solutions well and can easily see when students used information from them How many students do you think used the sample solutions without referencing? 33

Basic research You give credit when you use somebody else's work, even if you replicate it. Giving credit does not diminish the value of your research Giving credit makes it easier for people to confirm the value of your work 34

Integrity Discuss (Any student who wishes to resubmit their Lab 2 may do so until midnight Thursday-Friday. Just mail it to me. I will toss away the first submission) 35