Top Banner
Security Threats Policies Encryption Authentication Firewalls
63

Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

Jul 07, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

Security

Threats

Policies

Encryption

Authentication

Firewalls

Page 2: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

2Security Threats

❚ Interception❙ If cannot read, have privacy (AKA

confidentiality)❙ If cannot modify without detection, have

message integrity

Page 3: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

3Security Threats

❚ Impostors❙ Claim to be someone else❙ Need to authenticate the sender--prove that

they are who they claim to be

RealPerson

Impostor

Page 4: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

4Security Threats

❚ Denial of Service Attacks❙ Overload system with a flood of messages❙ Send a single message that crashes the

machine

Page 5: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

5Security Threats

❚ Content Threats

❙ Application layer content may cause problems❘ Viruses

❘ In many ways, most severe security problem incorporations today

❙ May log in to use one service, then sendmessages to another, unauthorized service

❙ Must examine the application PDU

Page 6: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

6Security Policies

❚ Understand the organization’s needs❙ Too much security can hamper❙ To little security can be disastrous❙ Each business has specific needs that must

be understood to be able to set policies

❚ Policies❙ Decisions based on overall knowledge❙ Apply decisions globally in firm❙ Must be implemented in individual devices

Page 7: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

7Policy Servers

❚ Store Policies❙ Distribute them to all security devices❙ Security policies are implemented uniformly❙ Security policies can be changed rapidly to

respond to new threats

PolicyServer

Policy

SecurityDevices

Page 8: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

8Encryption

❚ Encryption: Scramble Message so thatInterceptor Cannot Read it❙ Plaintext (message)❙ Ciphertext (scrambled) for transmission❙ Encryption and Decryption Method and Key

Plaintext Encryption Ciphertext Decryption Plaintext

IBM HAL IBM

MethodKey

MethodKey

Transmitted

Page 9: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

9Encryption

❚ Encryption Method and Key❙ Method is algorithm: Add N letters❙ Key is specific value: N=-1 (I=H, B=A, M=L)❙ Method cannot be kept secret❙ Key must be kept secret

Plaintext Encryption Ciphertext Decryption Plaintext

IBM HAL IBM

MethodKey

MethodKey

Transmitted

Page 10: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

10Encryption: Key Length

❚ Key can be “guessed” by exhaustive search❙ Try all combinations

❚ Key length makes exhaustive search difficult❙ Key is a string of bits (11000100010101)❙ If length is n bits, 2n tries may be needed❙ If 8 bits, only 256 tries❙ Weak security: up to 40 bits❙ Strong security: 128 bits or longer❙ Restrictions on export of strong security

Page 11: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

11Single Key Encryption Methods

❚ Both sides use a single key to encrypt & decrypt❙ Encryption: add N letters❙ Decryption: subtract N letters❙ N is the key

A B

Single Key

Page 12: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

12Single Key Encryption Methods

❚ Simple enough for fast encryption/decryption❙ Can be used even with long messages

A B

Single Key

Page 13: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

13Single Key Encryption

❚ Also called secret key encryption❙ The single key must be kept secret❙ Anyone learning the key can read the

messages

A B

Single Key(Secret Key)

Page 14: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

14Single Key Encryption

❚ Problem: Key must be distributed secretly

❚ Problem: Need a different single key for eachbusiness partner❙ Or other partners could read messages❙ Complicates key distribution

Key A

Key B

A

B

Page 15: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

15Public Key Encryption Methods

❚ Different keys for encryption and decryption❙ Encryption with receiver’s public key❙ Decryption with receiver’s private key❙ Once encrypted, sender cannot decrypt

unless has receiver’s private key (should not)

Plaintext Encryption Ciphertext Decryption Plaintext

IBM IBM

Public Key Private Key

100101

Page 16: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

16Public Key Encryption

❚ Everyone has a public and private key

❙ Keep the private key secret

❙ Distribute the public key to everybodywithout security

PublicKey

PublicKey

PrivateKey

Page 17: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

17Public Key Encryption

❚ Four Keys❙ Each side has a public and a private key❙ Each sends public key to other unsecurely❙ Encrypt with other party’s public key❙ Decrypt with own private key

A BB’sPub Key

B’sPriv Key

A’sPriv Key

A’sPub Key

Page 18: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

18Public Key Encryption

❚ No need for separate secret key with eachbusiness partner❙ Greatly simplifies key management

❚ Unfortunately, highly processing-intensive❙ Can only encrypt small messages❙ Exchanging single keys securely (later)❙ Authentication (later)

Page 19: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

19Combining Public, Single Key

❚ Not competitors--Used Together in Practice❙ Public key is easy and very secure but can

only be used for small messages❙ Single key has key distribution problems but

can be used for long messages

SingleSessionKey

Public Key EncryptionA B

Page 20: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

20Combining Public, Single Key

❚ Begin communicating via public key encryption❙ Including initial authentication

❚ Then one sides randomly generates a single key❙ Sends the single key to other partner with

public key encryption

SingleSessionKey

Public Key EncryptionA B

Page 21: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

21Combining Public, Single Key

❚ Afterward, both sides communicate with thesingle “session” key good only for this session--single flow of communications

❚ If communicate again, generate a new singlesession key

Single Session KeyA B

Page 22: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

22Authentication

❚ The Problem of Impostors

❚ Authentication: proving the sender’ identity

❚ Authentication methods❙ Passwords: weak❙ Biometrics

❘ Fingerprint analysis, iris analysis

❙ Public key authentication❘ Prove that sender holds their private key, which

only they should know

Page 23: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

23Public Key Authentication

❚ Solution: Send a digital signature with eachpacket❙ First create a message digest (MD)

❘ A small binary string calculated on the basis of thebits in the message

Message MessageDigest

Calculation

Page 24: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

24Public Key Authentication

❚ Solution: Send a digital signature with eachpacket❙ Next create a digital signature

❘ Encrypt message digest with sender’s private key,which only the sender should be able to do

❘ Message digest is short, so public key encryptionis not too burdensome

DigitalSignature

Encrypt withSender’s

Private KeyMessageDigest

Page 25: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

25Public Key Authentication

❚ Solution: Send a digital signature with eachpacket❙ Add digital signature to plaintext message❙ Encrypt combined message and digital

signature with the single session key andsend to the receiver

DigitalSignature Message

Encrypt with single session key

Page 26: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

26Public Key Authentication

❚ Solution: Send a digital signature with eachpacket❙ Receiver decrypts ciphertext with single

session key❙ Then decrypts digital signature with sender’s

public key to get the original message digests

DigitalSignature

Decrypt withSender’s

Public KeyMessageDigest

Page 27: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

27Public Key Authentication

❚ Solution: Send a digital signature with eachpacket❙ Receiver recomputes message digest based

on decrypted message❙ If matches decrypted digital signature, the

digital signature was created with sender’sprivate key

❙ Sender is authenticated

Message Digestfrom Digital Signature

Message DigestComputed from Message

Page 28: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

28Digital Certificates

❚ Created by a Certificate Authority

❙ Given to an organization

❙ In other words, a third party providesauthentication for the sender

CertificateAuthority

CertificateAuthority

AuthenticatedParty

DigitalCertificate

Page 29: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

29Digital Certificates

❚ Authenticated party adds the digital certificateto each outgoing message

❙ Still need a digital signature

DigitalSignature

DigitalCertificate

PlaintextMessage

Page 30: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

30Digital Certificates

❚ Problem of Certificate Authorities❙ There is no public regulation of CAs❙ Some CAs offer various levels of certification

❘ The weakest levels only require an e-mail address❘ Receivers may not realize this

❚ Internal Certification Avoids these Problems❙ Company acts as its own CA for internal

devices, software, and users❙ Creates the strength of certification it requires

Page 31: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

31Security Process

❚ When two parties communicate …❙ Their software usually handles the details❙ First, negotiate security methods

❘ Authentication method❘ Encryption method

❙ Then, authenticate one another

❙ Then, exchange single session key

❙ Then can communicate securely using singlesession key

F From Module F

Page 32: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

32Firewalls

❚ Sit between the corporate network and theInternet❙ Prevent unauthorized access from the

Internet❙ Facilitate internal users’ access to the

Internet

OKNo

Firewall

Access only ifAuthenticated

Page 33: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

33Firewalls

❚ IP Firewalls❙ Examine IP addresses of incoming packets❙ Permit only packets from approved hosts❙ Easy to defeat by placing an acceptable

internet address in the IP packet’s sourceaddress (spoofing)

IPFirewall

IP Packet

Page 34: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

34Firewalls

❚ Application (Proxy) Firewalls❙ Work at the application layer❙ Filter based on application behavior

❘ In HTTP, for example, do not accept a responseunless an HTTP request has just gone out to thatsite

Application

Page 35: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

35Firewalls

❚ Application (Proxy) Firewalls❙ Hide internal internet addresses❙ Internal user sends an HTTP request❙ HTTP proxy program replaces user internet

address with a false IP address, sends to thewebserver

HTTPRequest

Request withFalse IP Address

Page 36: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

36Firewalls

❚ Application (Proxy) Firewalls❙ Webserver sends response to proxy server, to

false IP address❙ HTTP proxy server sends the IP packet to the

originating host❙ Proxy program acts on behalf of internal user

Response toFalse IP Address

HTTPResponse

Page 37: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

37Firewalls

❚ Application Firewalls❙ Need a separate program (proxy) for each

application❙ Not all applications have rules that allow

filtering, for instance database applications

❚ Stateful Inspection❙ Rules based on more subtle aspects of

behavior at multiple layers

Page 38: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

Quality of Service

Beyond Best-Effort Service

Prioritization

QoS More Broadly Defined

The ATM Advantage

Tagging Ethernet and IP

C,E N

Page 39: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

39Best-Effort Service

❚ Ethernet and IP are Best-Effort Services

❙ Sender submits IP packets or Ethernet frames

❙ Network does its best to get them through

❙ No guarantee of latency or jitter (variablelatency)

❙ No guarantee of security, etc.

❙ Done because best-effort is inexpensive

❙ Works well if capacity far exceeds demand

Page 40: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

40Prioritization

❚ Some Services are More Sensitive to Latencythan Others❙ Voice is more sensitive than e-mail

❚ Solution: Prioritization

❙ Give higher priority to time-sensitiveapplications

❙ If two frames or packets arrive at a switch orrouter simultaneously, process the one withhigher priority on first

Page 41: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

41Prioritization

❚ Prioritization versus Bandwidth

❚ If have enough transmission capacity, all framesor packets will get through with very low latency

❚ Bandwidth (transmission capacity) may becheaper to add than the logic needed forprioritization

❚ It’s an issue of bandwidth costs versus logiccosts.

Page 42: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

42QoS More Broadly Defined

❚ Controlling Latency is One Service Goal

❚ There are others❙ Security❙ Reliability (downtime, error rates, etc.)❙ Etc.

❚ Quality of Service (QoS)❙ Guarantees of service quality for several

parameters

Page 43: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

43The ATM Advantage

❚ Strong Intrinsic QoS Guarantees for Latency❙ Originally created for voice, which his highly

sensitive to latency and timing❙ Priority for overall latency

❘ Voice and other critical services guaranteed❘ Small cell means low latency at each switch

❙ Guarantee of no jitter (variable latency)❘ Especially important for voice and video❘ Without it, sound and picture will be jittery

Page 44: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

44Tagging Ethernet and IP

❚ Efforts Now Underway to add Tags to Ethernetand IP

❙ Tag will have a priority of service field

❙ If possibilities are 0-7, higher values will gethigher priority

❙ Not full QoS, but improves general latency

Body HeaderTag

Page 45: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

45Tagging Ethernet and IP

❚ Efforts Now Underway

❚ IEEE❙ Adding tags to all LAN MAC Layer Frames❙ Priority level❙ Virtual LAN identifier to standardize VLANs

❚ IETF❙ Differentiated Services initiative❙ Adding features to IP, including security❙ Prioritization is one feature being added

Page 46: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

46Filtering

❚ Filtering is examining an incoming frame orpacket

❚ Purposes❙ Effective, efficient, reliable delivery❙ Access control❙ Quality of Service (QoS)❙ Translation between networks with different

standardsPPPH

IPH

TCPH

ApplicationPDU

Page 47: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

47Filtering

❚ Layer of Filtering❙ Frame (data link)

❘ Switches

❙ Packet (internet)❘ Routers, Firewalls

❙ Transport❘ Identity of application layer program❘ Prioritization, access control

❙ Application❘ Content filtering (viruses, etc.)

❚ For best results, filter at all layers

PPPH

IPH

TCPH

ApplicationPDU

Page 48: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

48Filtering

❚ Now many devices: routers, firewalls, etc.

❚ In future, integrated transmission networks❙ Comprehensive policy servers will store and

distribute policies for central control

Policies

ComprehensivePolicy Server

Page 49: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

49Filtering

❚ In future, integrated transmission networks❙ Comprehensive relay devices will route and

control simultaneously, filtering at all layers

❚ However, security may limit ability to filter byencrypting layers

ComprehensiveRelay

Devices

Page 50: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

50Recap: Servers

❚ Needs of Enterprise Servers

❚ Intel-based Servers

❚ Workstation Servers

❚ Symmetric Multiprocessing (SMP)

❚ Server Clusters

❚ Load Balancing

Page 51: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

51Recap: Directory Servers

❚ Store Information on Locations of Resources

❚ Allow users to look up information

❚ Allow users to log in once to get access to anyauthorized resource

❚ Prevents unauthorized access to resources

Page 52: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

52Recap: Network Management

❚ Network Management System

❙ Network management console

❙ Network management program

❙ Managed devices

❙ Network management agents

❙ Management information bases (MIBs) atboth the agent and console

❙ RMON probes

Page 53: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

53Recap: Network Management

❚ Network Management Standards❙ Govern communication between the network

management program and networkmanagement agent

❙ Requests, responses, and alarms❙ SNMP dominates❙ CMIS/CMIS, carrier standards, proprietary

standards important❙ Comprehensive network management

programs work with multiple types of agents

Page 54: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

54Recap: Network Management

❚ Levels of Management❙ Applications❙ Systems management (computers)❙ Transmission

❚ Concerns (Cut Across Levels)❙ Fault management❙ Configuration management❙ Performance management❙ Security❙ Accounting management

Page 55: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

55Recap: Security

❚ Threats❙ Interception (privacy, confidentiality,

integrity)❙ Impostors (authentication)❙ Denial-of-Service attacks

❚ Need Central Policy

❚ Encryption for privacy (AKA confidentiality)❙ Plaintext and ciphertext❙ Encryption method and key

Page 56: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

56Recap: Security

❚ Single Key Encryption❙ Both sender and receiver use a single key❙ Processing is not intensive❙ Key distribution with each pair of business

partners is difficult

Page 57: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

57Recap: Security

❚ Public Key Encryption

❙ Four keys: private and public key for eachparty

❙ Sender always encrypts with receiver’s publickey

❙ Only the receiver can decrypt the message

❙ Processing is very intensive: can only be usedfor small messages

Page 58: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

58Recap: Security

❚ Combining Single and Public Key Methods

❙ One party creates a single key session key

❙ Creator encrypts the session key with theother part’s public key and sends it

❙ Other partner decrypts the message

❙ Now both parties have the session key

❙ They use it for the remainder of the session

Page 59: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

59Recap: Security

❚ Authentication❙ Proving your identity❙ Passwords, other methods

❚ Public Key Authentication❙ Prove that you hold your private key, which

only you should know❙ Digital signatures❙ Digital certificates

Page 60: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

60Recap: Security

❚ Firewalls❙ Prevent access to internal corporate network

from unauthorized people on the Internet

❚ Levels of Firewall❙ IP❙ Application (proxy)❙ Stateful inspection

Page 61: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

61Recap: QoS

❚ QoS is a Broad Concept. Can Guarantee❙ Maximum latency and variable latency (jitter)❙ Security❙ Etc.❙ If no QoS, only best effort service

❘ IP and Ethernet

❚ Priority❙ Allow latency-sensitive applications to go first❙ Being added to Ethernet, IP in tag fields❙ May be cheaper to buy more bandwidth

Page 62: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

62Recap: Filtering

❚ Filtering: Examine Contents of a Header❙ For delivery (efficient, effective, QoS)❙ For access control❙ Translation between networks

❚ Now, different devices filter at different layersand do different things❙ Switches: Filter MAC addresses for delivery❙ Switches: Filter MAC address for VLANs❙ Routers: Filter internet addresses for delivery❙ Firewalls: Filter for access control

Page 63: Firewalls Authentication Encryptionsignoril/mc363/security.pdf · 2001-12-05 · Filtering Layer of Filtering Frame (data link) Switches Packet (internet) Routers, Firewalls Transport

63Recap: Filtering

❚ In the future, integrated transmission networks

❙ Comprehensive relay devices will both deliverand control access, filtering at all layers

❙ Comprehensive policy servers will maintaincentral policies, distribute them tocomprehensive relay devices

❙ Encryption may limit ability to filter at alllayers