Chapter 1 Security Problems in Computing
Download
Report
Transcript Chapter 1 Security Problems in Computing
Chapter 9
Networking &
Distributed Security
(Part C)
Outline
Overview of Networking
Threats
Wiretapping, impersonation, message
interruption/modification, DoS
Controls
Encryption, authentication, distributed
authentication, traffic control, integrity control
Email privacy: PEM, PGP
Firewalls
csci5233 computer security &
integrity (Chap. 9)
2
Electronic Mails
Security Goals vs Threats
Goals
Threats
confidentiality
1.
interception
integrity
2.
interception and subsequent replay
content modification
content forgery by outsider
content forgery by recipient
origin forgery by recipient
3.
4.
5.
6.
authenticity
7.
8.
nonrepudiation
reliable delivery
origin modification
origin forgery by outsider
Threats 2 through 8 above
interception (blocked delivery)
denial of message transmission
csci5233 computer security &
integrity (Chap. 9)
3
Privacy-enhanced E-Mails (PEM)
Internet standards
1987: RFC989 (PEM version 1)
1989: RFC1113 (version 2)
1993: RFC1421, 1422, 1423, 1424 (Part I, II, III, IV), version 3
Protection of privacy-enhanced emails occurs in the body of the
message. The header of the message is not changed to
ensure compatibility with the then existing email systems.
Overview: Fig. 9-27, 9-28 (p.424)
1) The message header and body is encrypted under a
symmetric key, K E (message, K)
2) K is encrypted by the recipient’s public key Rpub (K)
3) A duplicate header is prepended to the message, which
contains both Rpub(K) and E(message, K).
Q: In step 2, can symmetric key, instead of the recipient’s public
key, be used to encrypt the message key?
csci5233 computer security &
integrity (Chap. 9)
4
Privacy-enhanced E-Mails (PEM)
The answer: YES. See p.425.
Q: What would be the requirements if symmetric key is used?
Proc-Type field: processing type
DEK-Info field: data exchange key field
Key-Info: key exchange
Message encryption: DES
Key exchange: DES or RSA
In principle, any encryption algorithms can be used.
csci5233 computer security &
integrity (Chap. 9)
5
Privacy-enhanced E-Mails (PEM)
Security features:
Confidentiality – message encryption
Authenticity - ?
Nonrepudiability - ?
Integrity - ?
Answers: p.425
csci5233 computer security &
integrity (Chap. 9)
6
Privacy-enhanced E-Mails (PEM)
Advantages:
The user may choose to use PEM or not in sending an email.
PEM provide strong end-to-end security for emails.
Problems?
1.
Key management
2.
The end points may not be secure.
Yet another privacy enhanced email protocol:
PGP: p.426
csci5233 computer security &
integrity (Chap. 9)
7
Firewalls
Q: Which is more important, protection of emails or
protection of network-connected resources?
(see argument on p.427)
A firewall works in a way similar to a filter, which lets through
only desirable interactions while keeping all others out of the
protected network.
Analogy: a gate keeper, a security gateway
A firewall is a device or a process that filters all traffic
between a protected (inside) network and a less trustworthy
(outside) network.
Scenarios:
o
Internal users sending company secrets outside
o
Outside people breaking into systems inside
csci5233 computer security &
integrity (Chap. 9)
8
Firewalls
Alternative security policies:
•
To block all incoming traffic, but allow outgoing traffic to
pass.
•
To allow accesses only from certain places
•
To allow accesses only from certain users
•
To allow accesses for certain activities (such as specific port
numbers)
o Port 79: finger; Port 23: telnet; Port 513: rlogin;
o Port 21: ftp; Port 177: X Windows
o ICMP messages: the PROTOCOL field of IP header = 1
o
Each of these mechanisms is a potential back door into
the system.
csci5233 computer security &
integrity (Chap. 9)
9
Types of Firewalls
Screening Routers
•
The simplest, but may be the most effective type of
firewalls.
•
A router plays the role of a ‘gateway’ between two
networks. (Fig. 9-31, p.429)
•
A screening router takes advantage of a router’s ability of
“screening” passing-through packets and forwards only
packets that are desirable.
•
Example: Fig. 9-32.
•
A router has a unique advantage because it sits between
an outside and the inside network. (Fig. 9-33)
csci5233 computer security &
integrity (Chap. 9)
10
Types of Firewalls
Proxy Gateways
•
“proxy”: authority or power to act for another
•
A firewall that simulates the effects of an application by
running “pseudo-applications”.
•
To the inside it implements part of the application protocol
to make itself look as if it is the outside connection.
•
To the outside it implements part of the application
protocol to act just like the inside process would.
•
It examines the content, not just the header, of a packet.
•
Examples of using proxy firewalls: pp.431-432
csci5233 computer security &
integrity (Chap. 9)
11
Types of Firewalls
Guards
•
A “sophisticated” proxy firewall
•
A guard firewall examines and interprets the content of a
packet.
•
A guard usually implements and enforces certain
business policies.
•
Example: enforcing an email “quota” (p.433)
•
Other examples
•
Trade-offs?
•
Table 9-3 (p.434) Comparing the types of firewalls
csci5233 computer security &
integrity (Chap. 9)
12
Firewalls
Examples of Firewall Configurations
•
Screening router only: Fig. 9-35
•
Proxy firewall only: Fig. 9-36
•
A combined approach: Fig. 9-37
Q: Does it make sense to reverse the position of the
screening router and the proxy firewall in Fig. 9-37?
csci5233 computer security &
integrity (Chap. 9)
13
DMZ (Demilitarized zone)
The segment in a network bounded by two firewalls.
csci5233 computer security &
integrity (Chap. 9)
14
Considerations about Firewalls
Firewalls provide perimeter protection of a network, if the
network’s perimeter is clearly defined and can be controlled
by the firewall.
A firewall is a prime target to attack.
A firewall does not solve all security problems. Why not?
A firewall may have a negative effect on software portability.
(See VM: Ch. 16 – Through the firewall)
csci5233 computer security &
integrity (Chap. 9)
15
Summary
Network security is a rich area, in terms of complexity
of the problem and research opportunities.
•
•
•
•
Intrusion detection
Honeypots
Security versus performance
…
Next:
– Buffer overflow (VM: Ch 7)
– Applying cryptography (VM: Ch 11)
csci5233 computer security &
integrity (Chap. 9)
16