Top Banner
CSCE 715: Network Systems Security Chin-Tser Huang [email protected] University of South Carolina
21

CSCE 715: Network Systems Security

Mar 18, 2016

Download

Documents

zelia

CSCE 715: Network Systems Security. Chin-Tser Huang [email protected] University of South Carolina. Network Security Designs. After discussion of cryptographic tools, we turn to look at various network security designs at different layers in protocol stack - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CSCE 715: Network Systems Security

CSCE 715:Network Systems Security

Chin-Tser [email protected]

University of South Carolina

Page 2: CSCE 715: Network Systems Security

02/18/2009 2

Network Security Designs After discussion of cryptographic tools, we

turn to look at various network security designs at different layers in protocol stack

Link layer – secure address resolution Network layer – IPsec, hop integrity Transport layer – SSL/TLS Application layer – Kerberos, X.509

certificate, firewall design

Page 3: CSCE 715: Network Systems Security

02/18/2009 3

Ethernet Most widely used LAN technology Low cost and high flexibility Versions of different speed:

10Mbps, 100Mbps, Gigabit Use globally unique media access

control (MAC) address (hardware address) for every interface card

Page 4: CSCE 715: Network Systems Security

02/18/2009 4

Use of Hardware Address Need an address to send a message

to receiver on same Ethernet IP address is not usable because the

data link does not recognize IP address

Use hardware address to identify receiver’s interface

Need to resolve receiver’s hardware address from receiver’s IP address

Page 5: CSCE 715: Network Systems Security

02/18/2009 5

Address Resolution Protocol ARP maps each IP address to corresponding

hardware address in subnetwork For computer i to get hardware address of computer

j, i broadcasts a rqst message with IP address of j to the subnetwork

Internet

i

j

r

defaultrouterswitch

rqst(ipa.j)

Page 6: CSCE 715: Network Systems Security

02/18/2009 6

Address Resolution If j sees a rqst message from i with its IP

address, j sends a rply message with its IP address and hardware address to i

Internet

i

j

r

defaultrouterswitch

rply(ipa.j,hda.j)

Page 7: CSCE 715: Network Systems Security

02/18/2009 7

Functions of ARP Three functions of ARP

Resolving IP addresses Supporting dynamic assignment of

addresses Detecting destination failures

Page 8: CSCE 715: Network Systems Security

02/18/2009 8

ARP Spoofing Attack To stop traffic from i to j, an adversary sends

to i a spoofed rply message with IP address of j and a non-existent hardware address

Internet

i

j

A

r

defaultrouterswitch

rply(ipa.j,hda.x)

Page 9: CSCE 715: Network Systems Security

02/18/2009 9

Another ARP Spoofing Attack To stop traffic from i to default router r,

an adversary sends to i a spoofed rply message with IP address of r and its own hardware address

Internet

i

j

A

r

defaultrouterswitch

rply(ipa.r,hda.A)

Page 10: CSCE 715: Network Systems Security

02/18/2009 10

Countering ARP Spoofing Attacks Proposed solutions include ARPWATCH

and static ARP caches ARPWATCH monitors transmission of rqst

and rply messages over Ethernet and check them against a database of (IP addr, hardware addr) pairings

Static ARP cache stores permanent (IP addr, hardware addr) pairings of trusted hosts to avoid sending rqst and rply messages over Ethernet

Page 11: CSCE 715: Network Systems Security

02/18/2009 11

Insufficiencies of Proposed Solutions ARPWATCH does not support

dynamic assignment of IP addresses

Static ARP caches does not support dynamic assignment of IP addresses and detection of destination failures

Page 12: CSCE 715: Network Systems Security

02/18/2009 12

Need for Secure Address Resolution When a computer receives a message

m, it needs to determine whether m was indeed sent by claimed source, or was inserted, modified, or replayed by an adversary

Use secure address resolution protocol between each computer and a secure address resolution server

Page 13: CSCE 715: Network Systems Security

02/18/2009 13

Architecture of Secure Address Resolution Protocol

Interface

hr[i]

hn[i]

Applications Transport Network

Interface

sr

sn

Applications Transport Network

invite-accept protocol Subnetwork Subnetwork

Ethernet

write arrays ipa, hda, valid

h[i] s

request-reply protocol

Page 14: CSCE 715: Network Systems Security

02/18/2009 14

Adversary Adversary can perform three types

of actions to disrupt communication between server s and any computer h[i] on the Ethernet Message loss Message modification Message replay

Page 15: CSCE 715: Network Systems Security

02/18/2009 15

Secure Address Resolution Protocol Use three mechanisms to counter

adversarial actions timeouts to counter message loss shared secrets to counter message

modification nonces to counter message replay

Page 16: CSCE 715: Network Systems Security

02/18/2009 16

Invite-Accept Protocol Periodically, server s sends out an invt

message to every computer on Ethernet Every up computer is required to send

back an acpt message including its IP address and hardware address

s updates its address database according to received acpt messages

Page 17: CSCE 715: Network Systems Security

02/18/2009 17

Invite-Accept Protocols h[0..n-1]: invt(nc, md)

where md=MD(nc;scr[0])||MD(nc;scr[1])||…||MD(nc;scr[n-1])

h[i] s: acpt(nc, ipa[i], hda[i], d)where d=MD(nc;ipa[i];hda[i];scr[i])

Page 18: CSCE 715: Network Systems Security

02/18/2009 18

Request-Reply Protocol When a computer needs to resolve a

destination’s hardware address, it sends a rqst message to server s

If destination’s hardware address is still valid, s sends back a rply message with address information

If destination’s hardware address is not valid anymore, s sends back a rply message with no address information

Page 19: CSCE 715: Network Systems Security

02/18/2009 19

Request-Reply Protocolh[i] s: rqst(nc, ipa[j], d)

where d=MD(nc;ipa[j];scr[i])

If found,s h[i]: rply(nc, ipa[j], hda[j], d)

where d=MD(nc;ipa[j];hda[j];scr[i])If not found,s h[i]: rply(nc, ipa[j], 0, d)

where d=MD(nc;ipa[j];0;scr[i])

Page 20: CSCE 715: Network Systems Security

02/18/2009 20

Extensions Four extensions of secure address

resolution protocol Insecure address resolution Backup server System diagnosis Address resolution across multiple

Ethernets

Page 21: CSCE 715: Network Systems Security

02/18/2009 21

Next Class IPsec

Authentication Header (AH) Encapsulation Security Payload (ESP) key management

Read Chapter 16