Computer Security: Principles and Practice, 1/e

Download Report

Transcript Computer Security: Principles and Practice, 1/e

Computer Security:
Principles and Practice
Chapter 21 – Internet Security
Protocols and Standards
First Edition
by William Stallings and Lawrie Brown
Lecture slides by Lawrie Brown
Objectives
The student should be able to
 Define VPN, intranet VPN, extranet VPN, tunnel.
 Describe the advantages of link versus end-to-end encryption.
 Define the protection provided by SSL, TLS, IPsec.
 Show where the following protocols exist in the protocol stack, and describe
which applications they can be used with: SSL, TLS, IPSec, S-MIME.
 Show a diagram of what happens to a packet during Tunnel versus
Transport mode concerning the packet format.
 Describe the difference between IPSec’s Authentication Header and
.
Encapsulated Security Payload protocols
Internet Security Protocols
and Standards
 Secure
Sockets Layer (SSL) / Transport
Layer Security (TLS)
 IPv4 and IPv6 Security
 S/MIME (Secure/Multipurpose Internet
Mail Extension)
VPNs
Virtual Private Network (VPN): A means of carrying private traffic
over a public network
 Uses link encryption to give users sense that they are operating on a
private network when they are actually transmitting over a public
network
 Communications pass through an encrypted tunnel
Intranet VPN: Connects two or more private networks within the same
company
Extranet VPN: Connects two or more private networks between
different companies
 E.g., B2B or business-to-business communication.
Remote Access VPN: A roaming user has access to a private network
via wireless, hotel room, etc.
Encryption Types
Source
Destination
Router
End-to-End Encryption
Link Encryption
Importance of
Encryption Location: MAC
A P L I C
A P L I C
TCP
TCP
IP
IP
IP
LLC
MAC
LLC
MAC
LLC
MAC
LLC
MAC
Physical
Physical
Physical
Physical
Wireless
MAC
LLC IP
Wired
TCP
App - Data
CRC
Importance of
Encryption Location: IP
A P L I C
A P L I C
TCP
VPN Router/Firewall
may unencrypt
IPSEC/
IP
LLC
MAC
IPSEC/
IP
LLC
LLC
MAC
MAC
Physical
MAC
Physical
LLC IP
TCP
Physical
App - Data
TCP
IP
LLC
MAC
Physical
CRC
Importance of
Encryption Location: App.
HTTPS
HTTPS
HTTP
HTTP
A P L I C
A P L I C
TCP
TCP
IP
IP
IP
LLC
MAC
LLC
MAC
LLC
MAC
LLC
MAC
Physical
Physical
Physical
Physical
MAC
LLC IP
TCP
App - Data
CRC
Link versus End-to-End
Encryption
Use when LINK is vulnerable: Packet
sniffers & eavesdroppers
Use when Intermediate nodes may be
compromised
Link-Specific: All packets transmitted on
the single link are encrypted
Connection-Specific: A connection is
encrypted across all its links
Encrypted for all protocol layers (at or
above encryption layer)
Encrypted for upper layer protocols only
Intermediate nodes decrypt
Intermediate nodes cannot decrypt
Provides node authentication
Provides user authentication
Transparent to user: One key per link
Not user-transparent: One key per
connection
One algorithm for all users
User selects encryption algorithm
Encryption done in hardware
Encryption done in hardware or software
Virtual Private Network (VPN)
IP Security (IPsec)
Secure Shell (SSH)
Secure Socket Layer (SSL)
Encryption Protocols
HTTP
FTP
SMTP
TCP or UDP
HTTP
HTTP
SSL or TLS
TCP
IPSec
IP
IP
VPN
HTTPS
Secure Sockets Layer (SSL)

transport layer security service






originally developed by Netscape
version 3 designed with public input
subsequently became Internet
standard RFC2246: Transport
Layer Security (TLS)
use TCP to provide a reliable endto-end service
may be provided in underlying
protocol suite
or embedded in specific packages

SSL + HTTP used together = HTTPS
HTTP
SSL or TLS
TCP
IP
SSL Protocol Stack

Record: Fragmentation, compression, MAC, encryption
 Handshake: Setup: Negotiation of security
 Alert: Notifications of warnings or serious problems
 Change Cipher Spec: Change state to active
SSL Record Protocol
Services
 message


integrity
using a MAC with shared secret key
similar to HMAC but with different padding
 confidentiality



using symmetric encryption with a shared
secret key defined by Handshake Protocol
AES, IDEA, RC2-40, DES-40, DES, 3DES,
Fortezza, RC4-40, RC4-128
message is compressed before encryption
SSL Record Protocol
Operation
SSL Change Cipher Spec
Protocol
 one
of 3 SSL specific protocols which use
the SSL Record protocol
 a single message
 causes pending state to become current
 hence updating the cipher suite in use
SSL Alert Protocol

conveys SSL-related alerts to peer entity
 severity
• warning or fatal

specific alert
• fatal: unexpected message, bad record mac,
decompression failure, handshake failure, illegal
parameter
• warning: close notify, no certificate, bad certificate,
unsupported certificate, certificate revoked,
certificate expired, certificate unknown

compressed & encrypted like all SSL data
SSL Handshake Protocol
allows server & client to:




authenticate each other
to negotiate encryption & MAC algorithms
to negotiate cryptographic keys to be used
comprises a series of messages in phases

1.
2.
3.
4.
Establish Security Capabilities
Server Authentication and Key Exchange
Client Authentication and Key Exchange
Finish
SSL
Handshake
Protocol
First 3 phases:
Handshake Protocol
Phase 4: Change
Cipher Spec
Public Key Infrastructure
(PKI)
7. Tom confirms
Sue’s DS
5. Tom requests Sue’s DC 
6. CA sends Sue’s DC 
Tom
4. Sue sends
Tom message
signed with
Digital Signature
Digital
Certificate
User: Sue
Public Key:
2456
Certificate Authority
(CA)
3. Send approved
Digital Certificates
1. Sue registers with
CA through RA
Sue
Register(Owner, Public Key)
2. Registration Authority
(RA) verifies owners
IP Security
 various
application security mechanisms
exist

eg. S/MIME, PGP, Kerberos, SSL/HTTPS
 security
concerns cross protocol layers
 hence would like security implemented by
the network for all applications
 authentication & encryption security
features included in next-generation IPv6
 also usable in existing IPv4
IPSec
 general
IP Security mechanisms
 provides



authentication
confidentiality
key management
 applicable
to use over LANs, across public
& private WANs, & for the Internet
IPSec Uses
Tunnel vs. Transport Mode
Encrypted:
Transport Mode: End-to-End Encryption
Host D
Host A
IP=D | ESP | Data
Internet
Gtwy
B
Gtwy
C
IP=D | ESP | Data
IP=D | ESP | Data
Host D
Host A
IP=D | Data
Internet
Gtwy
B
Gtwy
C
IP=D | Data
IP=C | ESP | IP=D | Data
Tunnel Mode: Encryption between two gateways: Virtual Private Network
(A form of link encryption)
Benefits of IPSec
 in
a firewall/router provides strong security
to all traffic crossing the perimeter
 in a firewall/router is resistant to bypass
 is below transport layer, hence transparent
to applications
 can be transparent to end users
 can provide security for individual users
 secures routing architecture
IP Security Architecture
 mandatory
in IPv6, optional in IPv4
 have two security header extensions:



Authentication Header (AH)
Encapsulating Security Payload (ESP)
Key Exchange function
 VPNs

want both authentication/encryption
hence usually use ESP
 specification

is quite complex
numerous RFC’s 2401/2402/2406/2408
Two Modes
(From Network Security Essentials 2nd Ed., W. Stallings, Prentice Hall)
Authentication
Header
(AH)
Encapsulated Security
Payload
(ESP encryption &
authentication)
Access control
X
X
Connectionless integrity
X
X (AH opt.)
Data Origin
Authentication
X
X (AH opt.)
Rejection of Replayed
Packets
X
X
Confidentiality
X
Limited Traffic Flow
Confidentiality
X
Security Associations
a
one-way relationship between sender &
receiver that affords security for traffic flow
 defined by 3 parameters:



Security Parameters Index (SPI): SA
IP Destination Address: Unicast
Security Protocol Identifier: AH or EH
 has

a number of other parameters
seq no, AH & EH info, lifetime etc
 have

a database of Security Associations
Holds data for each SA
Authentication Header (AH)
 provides
support for data integrity &
authentication of IP packets


end system/router can authenticate user/app
prevents address spoofing attacks by tracking
sequence numbers
 based

on use of a MAC
HMAC-MD5-96 or HMAC-SHA-1-96
 parties
must share a secret key
Authentication Header
SPI = Security Association #
Authentication Data = Message Authentication Code
Encapsulating Security
Payload (ESP)
Key Management
 handles
key generation & distribution
 typically need 2 pairs of keys

2 per direction for AH & ESP
 manual

key management
sysadmin manually configures every system
 automated


key management
automated system for on demand creation of
keys for SA’s in large systems
has Oakley & ISAKMP elements
S/MIME (Secure/Multipurpose
Internet Mail Extensions)
 security




original Internet RFC822 email was text only
MIME provided support for varying content
types and multi-part messages
with encoding of binary data to textual form
S/MIME added security enhancements
 have

enhancement to MIME email
S/MIME support in many mail agents
eg MS Outlook, Mozilla, Mac Mail etc
S/MIME Process
S/MIME Cryptographic
Algorithms
 digital
signatures: DSS & RSA
 hash functions: SHA-1 & MD5
 session key encryption: ElGamal & RSA
 message encryption: AES, 3DES, etc
 MAC: HMAC with SHA-1
 must map binary values to printable ASCII

use radix-64 or base64 mapping
S/MIME Public Key Certificates
 S/MIME
has effective encryption and
signature services
 but also need to manage public-keys
 S/MIME uses X.509 v3 certificates
 each client has a list of trusted CA’s certs
 and own public/private key pairs & certs
 certificates must be signed by trusted CA’s
Summary
 Secure
Sockets Layer (SSL) / Transport
Layer Security (TLS)
 IPsec: IPv4 and IPv6 Security
 S/MIME (Secure/Multipurpose Internet
Mail Extension)