Slides for lecture 16

Download Report

Transcript Slides for lecture 16

CMSC 414
Computer (and Network) Security
Lecture 16
Jonathan Katz
Trust
 How much to trust a particular certificate?
 Based on:
– CA authentication policy
– Rigor with which policy is followed
– Assumptions inherent in the policy
Example…
 Certificate issued based on a passport
 Assumptions:
– Passport not forged
– Passport issued to the right person
– Person presenting passport is the right person
– CA actually checked the passport when issuing
the certificate
Anonymity vs. pseudonymity
 Anonymity
– No one can identify the source of any messages
– Can be achieved via the use of “persona”
certificates (with “meaningless” DNs)
 Pseudonymity
– No one can identify the source of a set of
messages…
– …but they can tell that they all came from the
same person
Levels of anonymity
 There is a scale of anonymity
– Ranges from no anonymity (complete
identification), to partial anonymity (e.g.,
crowds),to complete anonymity
– Pseudonymity is tangential to this…
Anonymizers
 Proxies that clients can connect to, and use
to forward their communication
– Primarily used for email, http
 Can also provide pseudonymity
– This may lead to potential security flaws if
mapping is compromised
 Must trust the anonymizer…
– Can limit this by using multiple anonymizers
Traffic analysis
 If messages sent to remailers are not
encrypted, it is easy to trace the sender
 Even if encrypted, may be possible to
perform traffic analysis
– Timing
– Message sizes
– Replay attacks
Http anonymizers
 Two approaches
– Centralized proxy/proxies
– “Crowds…”
Implications of anonymity?
 Is anonymity good or bad?
– Unclear…
– Can pseudonymity help?
Identity on the Web
 Certificates are not (yet?) ubiquitous for
individuals
 Other means for assigning identities?
Host identity
 E.g., in the context of the OSI model
– Potentially different “names” at each layer
• MAC address (data link layer)
• IP address (network layer)
• hostname (application layer)
 In general, it is easy to spoof these identities
Static/dynamic identifiers
 E.g., Domain Name Service (DNS)
– Associates hostnames and IP addresses (static)
 E.g., DHCP servers
– When laptop connects to network, the network
assigns the laptop an unused IP address
– Local identifier = identifier used between client
and server
– Global identifier = identifier used by client in
other contexts
E.g., address translation
 Company with more computers than IP
addresses
– Each computer has a fixed local address used
internally
– When a computer sends a packet to the Internet,
those packets are assigned a valid IP address by
a gateway
– The gateway keeps track of the correspondence
“Cookies”
 Cookies are tokens containing state
information about a transaction
 May contain (for example):
– Name/value; expiration time
– Intended domain (cookie is sent to any server in
that domain)
• No requirement that cookie is sent by that domain
Security violations?
 Cookies potentially violate privacy
– E.g., connecting to one server results in a
cookie that will be transmitted to another
 Storing authentication information in a
cookie is also potentially dangerous (unless
cookie is kept confidential, or other
methods are used)