secure communication over untrusted networks...virtual private network •a virtual private network...

35
Secure Communication over Untrusted Networks Jan Vossaert

Upload: others

Post on 10-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure Communication

over Untrusted

Networks

Jan Vossaert

Page 2: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Overview

• Introduction

• Secure communication basics

• Secure communication technologies

o Transport layer security

o Virtual private network

• Seminar in September

• Concluding remarks

Page 3: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Introduction

…00II0I000II0I…

passive attacker

Page 4: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Introduction

• Desired security properties:

o Confidentiality

o Authenticity

…00II00II0II000II0I…

passive attackeractive attacker

0II0I

Page 5: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Introduction

• Message confidentiality

• Message authentication

Page 6: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Introduction

untrusted network

Internet

• Message confidentiality

• Message authentication

Page 7: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Introduction

• Remote access to local network

remote monitoringremote servicing

Internet

Page 8: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Introduction

• Access to devices on remote sites

Internet

Page 9: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Introduction

Page 10: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Secure channel between both parties

o Symmetric cryptography

• Algorithm: AES, 3DES, Camellia, IDEA

• Key lengths: 128-256

• Mode:

• Confidentiality: CBC, OFB, CFB, CTR, XTS

• Confidentiality & authenticity: CBC-MAC, GCM, OCB,…

I00111010111

Confidentiality?

Authenticity?

Relies on hash

functions

(MD5, SHA1)

Page 11: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Secure channel between both parties

o Symmetric cryptography

o Session key?

Page 12: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Goal:

• Set up a shared secret in a dynamic on-demand manner

o Properties:

• Both parties learn the value of the session key

• No other parties should know the value of the session key

• Unilateral or mutual authentication

• Both parties are ensured the key is freshly generated

Page 13: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Types

• Pre-shared keys (PSK)

• Public-key infrastructure (PKI)

Page 14: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Pre-shared keys (PSK)

“is a shared secret which was previously shared between the two parties

using some secure channel before it needs to be used.”

public infopublic infopublic info

Page 15: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Pre-shared keys (PSK)

• required to generate

• Both parties know the identity of the other party who holds

“is a shared secret which was previously shared between the two parties

using some secure channel before it needs to be used.”

Page 16: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Pre-shared keys (PSK)

• required to generate

• Both parties know the identity of the other party who holds

“is a shared secret which was previously shared between the two parties

using some secure channel before it needs to be used.”

Scalability?

Page 17: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Pre-shared keys (PSK)

o Public-key infrastructure (PKI)

“is a system to bind public keys with respective user identities by means

of a certificate (e.g. X.509 certificate).”

public key public key

private keyprivate key

Page 18: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Pre-shared keys (PSK)

o Public-key infrastructure (PKI) It’s . I vouch for it.

“is a system to bind public keys with respective user identities by means

of a certificate (e.g. X.509 certificate).”

public key public key

private keyprivate key

Page 19: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Pre-shared keys (PSK)

o Public-key infrastructure (PKI) It’s . I vouch for it.

“is a system to bind public keys with respective user identities by means

of a certificate (e.g. X.509 certificate).”

public key

private keyprivate key

Page 20: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Pre-shared keys (PSK)

o Public-key infrastructure (PKI)

“is a system to bind public keys with respective user identities by means

of a certificate (e.g. X.509 certificate).”

public info public infopublic info

Page 21: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Session key establishment

o Pre-shared keys (PSK)

o Public-key infrastructure (PKI)

• can only be generated if possession of either or

• Identities of the owners of and is certified in

• Unilateral authentication also possible

“is a system to bind public keys with respective user identities by means

of a certificate (e.g. X.509 certificate).”

Page 22: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication basics

• Summary:

o Symmetric cryptography to protect confidentiality &

authenticity of data

o (Authenticated) key establishment protocols for session

key

• Pre-shared key: for devices that have a long-term association

• Public-key infrastructure: for devices that need to communicate

with a large set of devices

Page 23: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Secure communication technologies

• System level

o Why rely on security at application level?

o Securing legacy applications in new environments

o No distinction between traffic types

• Application-aware

o More control by application

o Feedback to user

Page 24: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Transport Layer Security (TLS)

• One of the most widely deployed security protocols

• History

o Netscape developed SSL protocol

o SSL 3.0 published in 1996

• No longer secure!

o IETF standardization based on SSL 3.0 (RFC 5246)

• TLS 1.0 (1999)

• TLS 1.2 (2008)

• TLS 1.3 (TBD)

Page 25: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Transport Layer Security (TLS)

• Intermediate layer between Transport and

Application Layer

• Two phases:

o Handshake

• Client and/or server authentication

• Establish cryptographic keys and parameters

o Secure exchange of information

Page 26: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Transport Layer Security (TLS)

• Use in industrial network equipment

o Secure management of network devices

• Remote configuration (often via HTTPS - example)

• User authentication over secure session

• Secure transfer of software/firmware updates

o Secure network communication in dedicated

applications

Page 27: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Virtual private network

• A Virtual Private Network (VPN) extends a private network

across a public network (e.g. the Internet)

• The client can access resources as if it would be directly

connected to the private network

o Traffic from device is routed over secure connection

o Network-level component (i.e. no application support

required)

Page 28: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Virtual private network

• Different setups:

o Gateway-to-gateway

• Secure branch office connectivity over the Internet

Page 29: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Virtual private network

• Different setups:

o Gateway-to-gateway

o Host-to-gateway

• Secure remote access to intranet services

Page 30: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Virtual private network

• RFC standardization

• Fixed ports

o UDP 500: key exchange

o UDP 50: encrypted data

o UDP 1701: initial configuration

o UDP 4500: NAT traversal

• Uncertain

• Standardized IPsec protocol

• Open source initiative (GPL)

o Based on SSL/TLS

• Configurable ports

o UDP

o TCP

o TCP:443 to bypass

restrictive firewalls

• Usually good

• OpenSSL

IPsec OpenVPN

origin

ports

compatibility

encryption

Page 31: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Virtual private network

• Use in industrial network equipment

o Remote servicing/monitoring of equipment

o Connecting remote sites in a secure network

o Teleworking

Page 32: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Seminar in September

• Basic security concepts & algorithms

• Public-key infrastructure

o Self-signed certificates vs commercial CAs

o Certificate pinning/trust stores

o Establishment & management of PKI

o Revocation

Page 33: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Seminar in September

• Hands-on experience: secure communication technologies

in industrial networking devices

o Different approaches from different vendors

• Cloud-based vs end-to-end security

• Only compatible with devices from same vendor?

• Vendor certificates or own PKI infrastructure?

o Configuration

• Encapsulation security payload (ESP) vs Authentication Header

(AH)

• Tunnel mode vs transport mode

• Cryptographic parameters

Page 34: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

Concluding remarks

• Certificates mainly for device authentication

• Secure session authentication often complemented with

application-level authentication for access control

o Username/password

o Authentication server

o Hardware tokens

Page 35: Secure Communication over Untrusted Networks...Virtual private network •A Virtual Private Network (VPN) extends a private network across a public network (e.g. the Internet) •The

questions