Top Banner
Chapter 9 Network Security 1 Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer systems apply and are more difficult: o User authentication and authorization – determine the identity and privileges of users accessing the system o Access control – limiting what actions are permitted
41

Chapter 9 Network Security 1 Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems.

Dec 21, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 1

Overview

Network security involves protecting a host (or a group of hosts) connected to a network

Many of the same problems as with stand-alone computer systems apply and are more difficult:o User authentication and authorization –

determine the identity and privileges of users accessing the system

o Access control – limiting what actions are permitted

Page 2: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 2

Additional Challenges of Network Security

Networking increases message vulnerability to:o Interceptiono Modificationo Destructiono Delayo Reorderingo Repetition

Networking implies cooperation, sharing, and trust

Networking exposes a system to a larger pool of potential attackers and decreases the likelihood of intruders getting caught

Page 3: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 3

Authentication and Authorization

Issues:o For the Server:

Is the Client really who they say they are? Is the request from the Client fresh? Will an eavesdropper be able to read my

response?

o For the Client: How do I know I’m really talking to the Server? Will an eavesdropper be able to read my request?

Page 4: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 4

Kerberos - Overview

Trusted third-party authentication service for computer networks

Developed at the Massachusetts Institute of Technology

Based on the client-server architecture Capabilities:

o A client program requesting a service can prove the identity of the user on whose behalf it is operating

o Clients can also (optionally) ask a server program to authenticate itself

o Kerberos can protect the privacy and integrity of messages between clients and servers

Page 5: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 5

How Kerberos Works

Shares a secret DES key with each user Phase 1: user obtains credentials (from

Kerberos) to be used to request access to other services

Phase 2: user requests authentication (from Kerberos) for a specific service

Phase 3: user presents credentials to a server

Page 6: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 6

Kerberos Credentials Tickets

o Generated by the Kerberoso Valid until expirationo Used to securely pass the identity of the person to whom

the ticket was issued from Kerberos to a servero Contains:

Person’s identity Information to show that the person using the ticket is the

person to whom it was issued

Authenticatorso Generated by the usero Valid only onceo Used to show that the person using the ticket is the person

to whom it was issued

Page 7: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 7

Kerberos Credentials (cont)

Ticket = Encrypt((Server,Client,Addr,Timestamp,Lifetime,KS-C),KS)

Authenticator = Encrypt((Client,Addr,Timestamp),KS-C)o Server is the name of the servero Client is the name of the cliento Addr is the client’s IP addresso Timestamp is the time the ticket was generatedo Lifetime is the amount of time for which the ticket is

valido KSC is the session key to be shared between the

Server and the Cliento KS is the DES key shared between the AS and the

Server

Page 8: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 8

Getting the Initial Ticket

User enters username Request for ticket for ticket-

granting service (TGS) sent to authentication server (AS)

Client ASClient, TGS

Page 9: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 9

Getting the Initial Ticket (cont)

AS checks that Client is a valid user Generates a session key, KC-TGS, for the Client

and the TGS Generates a ticket, Encrypt((TGS,Client,Addr,

Timestamp, Lifetime,KC-TGS,,),KTGS), for the Client to use for the TGS

Sends session key and ticket back to Client (encrypted with Client’s key, KC)Client AS

Encrypt((session key,ticket),KC)

Page 10: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 10

Getting the Initial Ticket (cont)

User enters password Password is converted to a DES

key and used to decrypt the AS’s reply

Client’s machine:o Stores session key and ticketo Erases the user’s password and DES

key from memory

Page 11: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 11

Getting a Ticket for a Server

Client contacts TGS and requests a ticket for Server:o Name of Servero Client’s TGS ticket, Encrypt((TGS,Client,Addr,

Timestamp, Lifetime,KC-TGS,,),KTGS)

o Client’s authenticator, Encrypt((Client,Addr,Timestamp), KC-TGS)

Client’s request is encrypted under its session key with the TGS, KC-TGSClient TGS

Encrypt((Server,ticket,AC),KC-TGS)

Page 12: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 12

Getting a Ticket for a Server (cont)

TGS:o Checks the ticket and authenticator

o Generates a session key, KC-S, for the Client and the Server

o Generates a ticket, Encrypt((Server,Client,Addr, Timestamp, Lifetime,KC-S,,),KS), for the Client to use for the Server

o Sends session key and ticket back to Client (encrypted with session key the Client and TGS share, KC-TGS)Client TGS

Encrypt((ticket,session key),KC-TGS)

Page 13: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 13

Requesting a Service

Client:o Builds an authenticator,

Encrypt((Client,Addr,Timestamp), KC-S)

o Sends authenticator and ticket, Encrypt((Server,Client,Addr, Timestamp, Lifetime,KC-

S,,),KS), to the Server

Client ServerAuthenticator, ticket

Page 14: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 14

The Server’s Response

Server:o Decrypts and checks the ticket (learns the session

key)o Decrypts and checks the authenticatoro Optionally: increments the Timestamp by one and

returns it to the Client encrypted with the session key

Client ServerEncrypt(Timestamp+1,KC-S)

Page 15: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 15

Overview of Kerberos Messages

1. Request for TGS ticket2. Ticket for TGS3. Request for Server Ticket4. Ticket for Server5. Request for service6. Server authentication

AS

Server

TGS

Client5

2

6

3

41

Page 16: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 16

Limitations of Kerberos

Applications must be “Kerberized” Based on:

o Client/server modelo Synchronized clocks

The TGS could be a bottleneck Cross-realm operation doesn’t

scale well

Page 17: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 17

Interaction With Other Sites Using Kerberos

Both Site 1 and Site 2 run Kerberos:

Can clients at one site use Kerberos to access servers at the other site securely?

Site 1 Site 2

Page 18: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 18

CORBA - Overview

Developed by the Object Management Group (OMG)

Standard that allows distributed applications, running in heterogeneous environments, to interoperateo Objects are entities that provide services to

requestors through well-defined encapsulating interfaces

o A reference model describes how the objects interoperate by requesting services from one another

Page 19: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 19

CORBA – Example

Two objects, A and B Assume that Object B has a method named

foo( ) Object A can request service from B by

invoking foo() Problem: A and B might be implemented in

different languages Solution: a translation may be necessary to

allow A to understand B’s requesto A universal Interface Definition Language (IDL)

allows A’s request can be converted from A’s native form into a request understandable to B

Page 20: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 20

The Object Request Broker (ORB)

The Object Request Broker (ORB) mediates the interaction between the objects

Page 21: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 21

Functions of the ORB

Deliver A’s request to B and B’s reply to A Hide “low-level” details from calling

objects:o Location (local or remote)o Implementation details (language and platform)o Execution state (currently running or needs to

be started)o Communication mechanisms (TCP/IP, shared

memory, local method invocation)

Page 22: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 22

CORBA

The Common Object Request Broker Architecture (CORBA) standard:o Defined by OMGo Allows different ORBs to interoperate

The CORBA Security specification:o Optionalo If implemented, the ORB provides basic security

functionality to all objects: Authentication Communications security Access control Auditing

Page 23: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 23

Services of a Secure ORB

Page 24: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 24

Secure Interoperability

Problem: A client and target object may be distributed so that their interaction is not mediated by a single ORB

Solution: the secure inter-ORB protocol (SECIOP):o A standard interoperability protocol defined by CORBAo Establishes a secure communication channel between

two ORBso Allows authentication and message-protection data to

be exchanged securely and in a format that all compliant ORBs understand

Page 25: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 25

Interaction Between Two Secure ORBs

Page 26: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 26

User Authentication and Authorization - Summary

Very difficult in a network environment:o Authentication - determining a user’s identityo Authorization – determining what actions a user can

perform Reasons:

o Vulnerability of network communicationso May be controlled by several different administrative

authorities Solutions:

o Kerberoso Secure ORBs

Page 27: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 27

Access Control for Networks

Problems:o Enforce an access control policy

Allow trust relationships among machineso Protect local internet from outsiders attempting to:

Obtain information, modify information, disrupt communications

Solution: firewallo Forms a barrier that protects one network from dangers

on another History:

o Fireproof walls that are often used in buildings to form a barrier across which fire cannot spread

o Helps to contain a fire and limit the amount of damage it can do

Page 28: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 28

Firewalls

A firewall can:o Partition machines into those inside the organization

and those outside the organizationo Enforce an access control policy about what types of

traffic are allowed in and out

Page 29: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 29

Implementing a Firewall with a Screening Router

Screening routers perform packet filtering:o Examine some fields in the packet header:

Source and destination IP address Protocol Source and destination port numbers

o Allow a packet to pass if it meets the screening criteria

o Filtering rules are stateless to increase speed

Page 30: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 30

A Screening Router

Page 31: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 31

Filtering Rules

Administrator can specify rules regarding which packets should not pass through the firewall

Can block:o Outgoing packets to certain addresses - restrict

which outside sites local users can accesso Incoming packets from certain addresses -

restrict access to specific external siteso Incoming and outgoing requests to specific

serviceso Etc.

Page 32: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 32

Sample Filter Rules

Row 1: Block incoming packets from any source to any destination for the finger service (TCP port 79) should be blocked

Row 2: Block incoming packets bound for the TFTP service (UDP port 69)

Row 3: Block outgoing packets bound for any machine on network 128.112

Page 33: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 33

Screening Routers

Advantages:o Relatively cheapo Help improve security by blocking packets

from/to dangerous sites and services Disadvantages:

o Still vulnerable to attacks on enabled serviceso Potential services are large (and growing)

requiring frequent maintenanceo Decisions must be made statelessly

Page 34: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 34

Implementing a Firewall with a Proxy Gateway

A proxy gateway is more powerful than a screening router and can therefore do more/better checking:o Examine data (not just header) portion of

packetso Remember the past behavior of a connection o Consider context – is this a response from the

outside to a request that originated on the inside?

o Etc.

Page 35: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 35

Proxy Gateways

Two barriers:o Outer barrier: blocks all incoming/outgoing traffic not

to/from the proxy gatewayo Inner barrier: blocks all incoming/outgoing traffic not

from/to the proxy gateway

Global Internet Organization’s internet

Outer Barrier

Proxy Gateway

Inner Barrier

Page 36: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 36

Proxy Gateways (cont)

Each barrier is implemented by a screening router:o R2 blocks all traffic not destine for the proxy

gatewayo R1 blocks all traffic not from the proxy

gateway

Proxy Gatew

ayR1

Global Internet R2

Organization’s internet

Stub network

Page 37: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 37

Proxy Gateways (cont)

The proxy gateway typically runs a set of application gateway programs

Act as middlemen between hosts inside and outside the firewallo Internal hosts communicate with the application

gateway program running on the proxy gatewayo Application gateway program relays request to the

external hosto The external host’s reply is sent to the application

gateway programo Application gateway program performs some checking

and then passes the reply on to the internal host

Page 38: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 38

Proxy Gateway - Example

An FTP server behind a proxy gateway firewallo An external client issues commands to establish

a connection and transfer files Proxy gateway acts as a middleman between the client

and server

o The proxy can check incoming commands: Pass only valid FTP commands on to the server Protects the server from malformed or dangerous input

o If the external client attempts to upload a file to the server: The proxy could pass the file through virus-scanning

software

Page 39: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 39

Proxy Gateways

Advantages:o Can provide better protection than a

screening router Disadvantages:

o Additional costo Proxy gateway could be a:

Bottleneck Single point of failure Tempting target for attackers

Page 40: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 40

Dynamic Firewall Techniques

Screening routers and proxy gateways enforce static security policies

Dynamic filters allow administrators to set up triggers:o Temporarily add, delete, or modify certain rules in

response to particular events Provides additional flexibility:

o Permit or deny traffic in special circumstances Provides additional security:

o More stringent rules triggered when suspicious traffic is observed

Page 41: Chapter 9  Network Security 1 Overview  Network security involves protecting a host (or a group of hosts) connected to a network  Many of the same problems.

Chapter 9 Network Security 41

Network Access Control - Summary

Access Control – need to protect local machines/networks from outsiders attempting to:o Obtain informationo Modify informationo Disrupt communications

Solution: firewalls (screening routers, proxy gateways, etc.)o Forms a barrier that protects one network

from dangers on another