network security: threats and goals

26
Network Security: Threats and goals Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2011

Upload: caden

Post on 24-Feb-2016

48 views

Category:

Documents


0 download

DESCRIPTION

Network Security: Threats and goals. Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2011. Outline. Network security Basic network threats: sniffing and spoofing Role of cryptography Security and the network protocol stack First security protocols: replay and freshness. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Network Security: Threats and goals

Network Security:Threats and goals

Tuomas AuraT-110.5240 Network security

Aalto University, Nov-Dec 2011

Page 2: Network Security: Threats and goals

2

Outline

1. Network security2. Basic network threats: sniffing and spoofing3. Role of cryptography4. Security and the network protocol stack5. First security protocols: replay and freshness

Page 3: Network Security: Threats and goals

Network security

3

Page 4: Network Security: Threats and goals

What is network securityNetwork security protects against intentional bad things done to communication

Protect messages (data on wire) and communication infrastructure

Network security goals:Confidentiality — no sniffing Authentication and integrity — no spoofing of data or signaling, no man-in-the-middle attacksAccess control — no unauthorized use of network resourcesAvailability — no denial of service by preventing communicationPrivacy — no traffic analysis or location tracking

Page 5: Network Security: Threats and goals

6

Who is the attacker?We partition the world into good and bad entities

Honest parties vs. attackersGood ones follow specification, bad ones do notDifferent partitions lead to different perspectives on the security of the same system

Typical attackers:Curious or dishonest individuals — for personal gainHackers, crackers, script kiddies — for challenge and reputationPolitical activists — for political pressureCompanies — for business intelligence and marketingSecurity agencies — NSA, FAPSI, GCHQ, DGSE, etc.Military SIGINT — strategic and tactical intelligence, cyber-warOrganized criminals — for money

Often, not all types of attackers matterE.g. would you care if NSA/university/mom read your email?

Page 6: Network Security: Threats and goals

Basic network threats: sniffing and spoofing

7

Page 7: Network Security: Threats and goals

8

Traditional network-security threat model

End are nodes trusted, the network is unreliableEnd nodes send messages to the network and receive messages from itNetwork will deliver some messages but it can read, delete, modify and replay themMetaphors: unreliable postman, notice board, rubbish basket

Network =

Attacker

MessagesMessages

Page 8: Network Security: Threats and goals

10

Basic network security threatsTraditional major threats:

Sniffing = attacker listens to network trafficSpoofing = attacker sends unauthentic messagesData modification (man in the middle) = attacker intercepts and modifies data

Corresponding security requirements:Data confidentialityData-origin authentication and data integrity

Page 9: Network Security: Threats and goals

18

Man in the middle (MitM)In the man-in-the-middle attack, the attacker is between the honest endpoints

Attacker can intercept and modify data → combines sniffing and spoofingOn the Internet, a MitM attacker must

be at the local network of one of the end pointsbe at a link or router on the route between them, or change routing to redirect the packets via its own location

Note: Just forwarding data between two endpoints (like a piece of wire) is not an attack. What does the attacker gain?

Page 10: Network Security: Threats and goals

19

Other network threatsWhat other threats and security requirements are there on open networks?Other threats:

Unauthorized resource use (vs. access control)Integrity of signalling and communications metadataDenial of service (DoS) (vs. availability)Traffic analysis, location trackingLack of privacySoftware security

Not captured well by the traditional network-security model

Page 11: Network Security: Threats and goals

Role of cryptography

20

Page 12: Network Security: Threats and goals

Cryptographic primitivesSymmetric (shared-key) encryption for data confidentiality

Block and stream ciphers, e.g. AES-CBC, RC4

Cryptographic hash functionE.g. SHA-1, SHA256

Message authentication code (MAC) for data authentication and integrity

E.g. HMAC-SHA-1

Public-key (or asymmetric) encryptionE.g. RSA

Public-key signaturesE.g. RSA, DSA

Diffie-Hellman key exchangeRandom number generation

Page 13: Network Security: Threats and goals

22

Crypto Wars – some historyUntil ‘70s, encryption was military technology

In ‘70s and ‘80s, limited commercial applicationsAmerican export restrictions and active discouragement prevented wide commercial and private use

Reasons to ban strong encryption:Intelligence agencies (e.g. NSA) cannot spy on encrypted international communicationsCriminals, terrorists and immoral people use encryption

In ‘90s: PGP, SSL, SSH and other commercial and open-source cryptography became widely available

Activists argued that cryptography was a tool for freedom Researchers argued that weak crypto is like no crypto

Most export restrictions were lifted in 2000

Page 14: Network Security: Threats and goals

Security and the network protocol stack

25

Page 15: Network Security: Threats and goals

26

Protocol Stack and Security

Security solutions exist for every protocol layerLayers have different security and performance trade-offs, trust relations and endpoint identifiers

Application

Middleware

TCP, UDP, ... (transport)

IP (network)

Ethernet protocol

Physical network

E.g. XML Encryption

E.g. email: PGP, S/MIME

TLS/SSL, SSH

IPSec

802.1X, WEP

Page 16: Network Security: Threats and goals

28

End-to-end securitySecurity should be implemented between the endpoints of communication. All intermediaries are part of the untrusted networkEnd-to-end security only depends on the end nodes

Hop-by-hop (link-layer) security assumes all routers are trusted and secure

End-to-end security protocols are independent of the network technology at intermediate links

Link-layer security is different for each link type

Confidentiality and authentication are usually user or application requirements

Network or link layer only cannot know application-level requirements

But link and network layer infrastructure and signalling need protection, too

Page 17: Network Security: Threats and goals

29

Endpoint namesAuthentication and integrity depend on names (identifiers)Each protocol layer has its own way of naming endpoints:

Ethernet (MAC) addresses in the link layer(e.g. 00-B0-D0-05-04-7E)IP address in the network layer (e.g. 157.58.56.101)TCP port number + IP addressDNS or NetBIOS name in the higher layers (e.g. vipunen.tkk.fi)URI in web pages and services(e.g. http://www.example.org/myservice)

Page 18: Network Security: Threats and goals

First security protocols:replay and freshness

31

Page 19: Network Security: Threats and goals

32

The first broken protocolMeet Alice and Bob!A → B: M, SA(M)E.g., SA(“Attack now!”)What is wrong with this protocol?

Page 20: Network Security: Threats and goals

33

Replay and freshnessReplay problem:A → B: M, SA(M) // SA(“Attack now!”)Authentication is usually not enough in network security! Need to also check freshness of the message “Fresh” may mean that the message was sent recently, or that has not been received before(exact definition depends on application)Freshness mechanisms:

TimestampNonceSequence number

Page 21: Network Security: Threats and goals

34

TimestampsChecking freshness with A’s timestamp:A → B: TA, M, SA(TA, M)E.g. SA(“2010-11-03 14:15 GMT”, “Attack now!”)Timestamp implementations:

Sender’s clock value and time zone (validity ends after fixed period)Validity period start and end times (or start and length)Validity period end time

Q: What potential problems remain?Timestamps require clocks at the signer and receiver, and secure clock synchronizationSecure fine-grained synchronization is hard to achieve; loose synchronization (accuracy from minutes to days) is easierAlso, fast replays possible: SA(TA, “Transfer £10.”)

Page 22: Network Security: Threats and goals

35

NoncesWhat if there are no synchronized clocks?Checking freshness with B’s nonce:A → B: “Hello, I’d like to send you a message.”B → A: NB

A → B: NB, M, SA(NB, M)Alice’s nonce is a bit string selected by Alice, which is never reused and (usually) must be unpredictableNonce implementations:

128-bit random number (unlikely to repeat and hard to guess)timestamp concatenated with a random number (protects against errors in RNG initialization and/or clock hash of a timestamp and random number

Problematic nonces: sequence number, deterministic PRNG output, timestampNonces require extra messages and are not well suited for asynchronous or broadcast communication

Page 23: Network Security: Threats and goals

36

Sequence numbersWhat if there are no synchronized clocks and nonces do not fit into the protocol design?Sequence numbers in authenticated messages allow the recipient to detect message deletion, reordering and replayA → B: seq, M, SA(seq, M)E.g. SA(44581, “Transfer 30€ to account 1006443.”)Dangerous, but can sometimes ensure that messages are not processes out of order or twiceGood combination: timestamp from a loosely synchronized clock and sequence number

Page 24: Network Security: Threats and goals

39

Puzzle of the dayWhat should be the order of signing, compression and encryption?

Page 25: Network Security: Threats and goals

40

Related readingWilliam Stallings, Network security essentials: applications and standards, 3rd ed.: chapter 1William Stallings, Cryptography and Network Security, 4th ed.: chapter 1Dieter Gollmann, Computer Security, 2nd ed.: chapter 13Ross Anderson, Security Engineering, 2nd ed.: chapter 6

Page 26: Network Security: Threats and goals

41

ExercisesDesign a more spoofing-resistant acknowledgement scheme to replace TCP sequence numbers. Hint: use random numbers (and maybe hashes) to ensure that acknowledgements can only be sent by someone who has really seen the packetsWhich applications of hash functions in network protocols require strong collision resistance? Which do not?Why is link-layer security needed e.g. in WLAN or cellular networks, or is it?To what extent are the identifiers in each protocol layer of the TCP/IP unique? Does one layer in the protocol stack know the identifiers of other layers?How do the properties of these identifiers differ: IP address, DNS name, email address, person’s name, national identity number (HETU)