Top Banner
Network Security Chapter 8 8.7 - 8.10
36

Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Dec 25, 2015

Download

Documents

Fay Beasley
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Network Security

Chapter 8

8.7 - 8.10

Page 2: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Authentication Protocols

• Shared secret key

• Establishing a shared key: the Diffie-Hellman key exchange

• Key distribution center

• Kerberos

• Public-key cryptography

Page 3: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Shared Secret Key (1)

Notation for discussing protocols

• A, B are the identities of Alice and Bob.• Ri’s are the challenges, where the subscript

identifies the challenger.• Ki are keys, where i indicates the owner.

• KS is the session key.

Page 4: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Shared Secret Key (2)

Two-way authentication using a challenge-response protocol.

Page 5: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Shared Secret Key (3)

A shortened two-way authentication protocol

Page 6: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Shared Secret Key (4)

The reflection attack.

Page 7: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Shared Secret Key (5)

General design rules

1.Have initiator prove who she is before responder

2.Initiator, responder use different keys

3.Draw challenges from different sets

4.Make protocol resistant to attacks involving second parallel session

Page 8: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Shared Secret Key (6)

A reflection attack on the protocol of Fig. 8-32

Page 9: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Shared Secret Key (7)

Authentication using HMACs

Page 10: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

The Diffie-Hellman Key Exchange (1)

The Diffie-Hellman key exchange

Page 11: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

The Diffie-Hellman Key Exchange (2)

The man-in-the-middle attack

Page 12: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Key Distribution Center (1)

A first attempt at an authentication protocol using a KDC.

Page 13: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Key Distribution Center (2)

The Needham-Schroeder authentication protocol

Page 14: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Key Distribution Center (3)

The Otway-Rees authentication protocol (slightly simplified).

Page 15: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Kerberos

The operation of Kerberos V5

Page 16: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Public-Key Cryptography

Mutual authentication using public-key cryptography

Page 17: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Email Security

• PGP—Pretty Good Privacy

• S/MIME

Page 18: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

PGP—Pretty Good Privacy (1)

PGP in operation for sending a message

Page 19: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

PGP—Pretty Good Privacy (2)

• Casual (384 bits): –Can be broken easily today.

• Commercial (512 bits): b–Breakable by three-letter organizations.

• Military (1024 bits): –Not breakable by anyone on earth.

• Alien (2048 bits): –Unbreakable by anyone on other planets

Page 20: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

PGP—Pretty Good Privacy (3)

A PGP message

Page 21: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Web Security

• Threats

• Secure naming

• SSL—the Secure Sockets Layer

• Mobile code security

Page 22: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Secure Naming (1)

Normal situation

Page 23: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Secure Naming (2)

An attack based on breaking into DNS

and modifying Bob’s record.

Page 24: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Secure Naming (3)

How Trudy spoofs Alice’s ISP.

Page 25: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Secure Naming (4)

DNSsec fundamental services:

• Proof of where the data originated.

• Public key distribution.

• Transaction and request authentication.

Page 26: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Secure Naming (5)

An example RRSet for bob.com. The KEY record is Bob’s public key. The SIG record is the top-level com server’s

signed hash of the A and KEY records to verify their authenticity.

Page 27: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

SSL—The Secure Sockets Layer (1)

Secure connection includes …• Parameter negotiation between client and server.

• Authentication of the server by client.

• Secret communication.

• Data integrity protection.

Page 28: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Layers (and protocols) for a home user browsing with SSL.

SSL—The Secure Sockets Layer (2)

Page 29: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

SSL—The Secure Sockets Layer (3)

A simplified version of the SSL connection establishment subprotocol.

Page 30: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

SSL—The Secure Sockets Layer (4)

Data transmission using SSL

Page 31: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Mobile Code Security

Applets can be interpreted by a Web browser

Page 32: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Social Issues

• Privacy

• Freedom of speech

• Copyright

Page 33: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Privacy

How Alice uses 3 remailers to send Bob a message

Page 34: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Freedom of Speech (1)

Possible banned material:

• Inappropriate for children

• Hate aimed at various groups

• Information about democracy

• History that contradicts government position

• Manuals for potentially illegal activities

Page 35: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

Freedom of Speech (2)

(a)Three zebras and a tree.

(b)Three zebras, a tree, and the complete text of five plays by William Shakespeare.

(a) (b)

Page 36: Network Security Chapter 8 8.7 - 8.10. Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.

Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011

End

Chapter 8