Chapter 4. Copyright Pearson Prentice-Hall 2010 Chapter 3 introduces cryptographic elements that...

Preview:

Citation preview

Chapter 4

Copyright Pearson Prentice-Hall 2010

Chapter 3 introduces cryptographic elements that may be needed in a dialogue

Chapter 4 focuses on important cryptographic system standards, such as SSL/TLS, IPsec, and wireless security standards

Future chapters will use the cryptographic concepts you are learning in these chapters

2

Copyright Pearson Prentice-Hall 20103

Transmission across Un-trusted Networks

◦ Internet, Wireless LAN’s, etc.

◦ Companies will (should) apply Cryptographic Systems Virtual Private Network (VPN)

SSL/TLS

◦ Secure Socket Layer/Transport Layer Security

◦ Non-Transparent, doesn’t automatically protect application messages.

◦ Only messages from applications that are SSL/TSL aware Web Browsers/Web Servers; Many email

◦ But there’s a problem

IPsec

◦ Operates on the Internet layer

◦ Everything in IP packet data file is protected

◦ Transparent protection – applications and transport layer are protected (see Module A)

Copyright Pearson Prentice-Hall 20104

Copyright Pearson Prentice-Hall 20105

SSL/TSLOr

IPsec

SSL/TSLOr

IPsec SSL/TSLSSL/TSL

IPsecIPsec

Connect one Client to one Server

Copyright Pearson Prentice-Hall 20106

Copyright Pearson Prentice-Hall 20107

Connects a single Client to a Network

Connection is to a VPN Gateway◦ Used for Authentication and Access Control

◦ Depending on Access Authorization connection can be to multiple computers on the network.

Uses SSL/TSL between Browser and Gateway◦ The Gateway is a WebServer to SSL/TSL

◦ SSL/TSL protects messages between client and Gateway

◦ Gateway authenticates with the client via Public Key Authentication

Copyright Pearson Prentice-Hall 20108

Web server

Database server◦ Gateway translates browser requests to Queries

to database

◦ Gateway translates database response to web pages “webifies”

Router◦ Connection to subnet of network

Copyright Pearson Prentice-Hall 20109

Copyright Pearson Prentice-Hall 201010

Copyright Pearson Prentice-Hall 201011

Step Sender Name of Message

Semantics (Meaning)

1 Client Client Hello Client requests secure connection.

Client lists cipher suites it supports.

2 Server Server Hello Server indicates willingness to proceed.

Selects a cipher suite to use in the session.

3 Server Certificate Server sends its digital certificate containing its public key.

(Client should check the certificate’s validity.)

4 Server ServerHelloDone Server indicates that its part in the initial introduction is finished.

Stage 1Stage 1

Stage 2 & 3 ???Stage 2 & 3 ???

Copyright Pearson Prentice-Hall 201012

Step Sender Name of Message

Semantics (Meaning)

5 Client ClientKeyExchange

Client generates a random symmetric session key. Encrypts it with the server’s public key.

It sends this encrypted key to the server. Only the server can decrypt the key, using the server’s own private key.

The server decrypts the session key.

Both sides now have the session key.

6 Client ChangeCipherSpec*

Client changes selected cipher suite from pending to active.

7 Client Finish Client indicates that its part in the initial introduction is finished.

*Not cipher suite.

Key Exchangeusing public key encryption

for confidentiality

Key Exchangeusing public key encryption

for confidentiality

Stage 2 & 3Stage 2 & 3

Copyright Pearson Prentice-Hall 201013

Step Sender Name of Message Semantics (Meaning)

8 Server ChangeCipherSpec* Server changes selected cipher suite from pending to active.

9 Server Finish Server indicates that its role in selecting options is finished.

10 Ongoing communication stage begins

*Not cipher suite.

Protects all traffic between two sites

VPN Gateway on both ends of transmission

VPN Gateway’s encrypt/decrypt messages

Copyright Pearson Prentice-Hall 201014

Transport (Host-to-Host)◦ Protects messages from host-to-host

Over the internet and Internet

◦ Requires installing IPsec on each client/server (not built into browser)

◦ Costly

◦ Eliminates ability of Firewall to filter content as it is encrypted

Tunnel (Site-to-Site)◦ Protects messages between VPN Gateways over the

Internet

◦ Less Costly than Transport

◦ Firewall can filter content

Copyright Pearson Prentice-Hall 201015

Copyright Pearson Prentice-Hall 201016

1.End-to-End

Security(Good)

1.End-to-End

Security(Good)

2.Security in

Site Network(Good)

2.Security in

Site Network(Good)

3.Setup Cost

On Each Host(Costly)

3.Setup Cost

On Each Host(Costly)

Copyright Pearson Prentice-Hall 201017

2.No Security inSite Network

(Bad)

2.No Security inSite Network

(Bad)

3.No Setup

CostOn Each Host

(Good)

3.No Setup

CostOn Each Host

(Good)

Copyright Pearson Prentice-Hall 201018

Characteristic Transport Mode Tunnel ModeUses an IPsec VPN Gateway?

No Yes

Cryptographic Protection

All the way from the source host to the destination host, including the Internet and the two site networks.

Only over the Internet between the IPsec gateways. Not within the two site networks.

Setup Costs High. Setup requires the creation of a digital certificate for each client and significant configuration work.

Low. Only the IPsec gateways must implement IPsec, so only they need digital certificates and need to be configured.

Copyright Pearson Prentice-Hall 201019

Characteristic Transport Mode Tunnel Mode

Firewall Friendliness Bad. A firewall at the border to a site cannot filter packets because the content is encrypted.

Good. Each packet is decrypted by the IPsec gateway. A border firewall after the IPsec gateway can filter the decrypted packet.

The “Bottom Line” End-to-end security at high cost.

Low cost and protects the packet over the most dangerous part of its journey.

Copyright Pearson Prentice-Hall 201020

SSL/TLS IPsec

Cryptographic security standard Yes Yes

Cryptographic security protections Good Gold Standard

Supports central management No Yes

Complexity and expense Lower Higher

Layer of operation Transport Internet

Transparently protects all higher-layer traffic

No Yes

Works with IPv4 and IPv6 NA Yes

Modes of operation NA Transport, Tunnel

Copyright Pearson Prentice-Hall 201021

Kind of like a cipher suite

Enables Central

Management

Enables Central

Management

Copyright Pearson Prentice-Hall 201022

Copyright Pearson Prentice-Hall 201023

Protections from 3rd parties

Copyright Pearson Prentice-Hall 201024

Copyright Pearson Prentice-Hall 201025

Copyright Pearson Prentice-Hall 201026

Router does not need to make a complex decision

for each packet

Router does not need to make a complex decision

for each packet

Copyright Pearson Prentice-Hall 201027

Cryptographic VPNs Routed VPNsExamples SSL/TLS

IPsec

Carrier PSDNs

Carrier TCP/IP MPLS VPNs

Cryptographic protections

Confidentiality, integrity, authentication, etc.

None

Other protections Limiting customer access

Limiting access to routing supervisory protocols

Customer actions to improve protection

Create a cryptographic VPN to run over carrier services

Wired and Wireless Protection

Copyright Pearson Prentice-Hall 201028

Copyright Pearson Prentice-Hall 201029

Used to Authenticate Users connecting to wired-LAN◦ By definition they are “in the building”

User connects to a Workgroup Switch vs. Core Switch (Review Module A)◦ Specifically User connects to a port on the

workgroup switch Port is in Unauthorized status Switches after supplicant is verified; Access

Granted Verification provided by Authentication Server (RADIUS)

Copyright Pearson Prentice-Hall 201030

1. Supplicant

2. Workgroup Switch (Authenticator)

3. Authentication Server

Copyright Pearson Prentice-Hall 201031

Copyright Pearson Prentice-Hall 201032

1. Workgroup switch senses a port connection

2. Sends EAP Start

3. Authentication Server sends EAP Request to client

◦ Specifies expected credentials

◦ If client doesn’t have credentials EAP Response of negative acknowledgement sent back to server

4. Client EAP Response with correct credentials

5. EAP Success if supplicant authenticated or

6. EAP Failure if suppliant is not

Copyright Pearson Prentice-Hall 201033

Copyright Pearson Prentice-Hall 201034

Copyright Pearson Prentice-Hall 201035

RADIUS Functionality

Authentication Authorizations Auditing

Uses EAP Uses RADIUS authorization functionality

Uses RADIUS auditing

functionality

Copyright Pearson Prentice-Hall 201036

802.1X can’t be used for Wireless connections

EAP assumes secure connection between supplicant and Authenticator◦ UTP has low interception rate (need to tap line)

◦ Wireless has high interception rate

◦ EAP messages need to be secured – 802.11i

Copyright Pearson Prentice-Hall 201037

Copyright Pearson Prentice-Hall 201038

EAP-TLSUses TLS for authenticatio

n

EAP-TLSUses TLS for authenticatio

n

PEAP uses any authentication

standard allowed by EAP

PEAP uses any authentication

standard allowed by EAP

802.11i, WPA, WEP

Security extends between Wireless Client and Access Point

Copyright Pearson Prentice-Hall 201039

Copyright Pearson Prentice-Hall 201040

Cryptographic Characteristic

WEP WPA 802.11i (WPA2)

Cipher for Confidentiality

RC4 with a flawed implementation

RC4 with 48-bit initialization vector (IV)

AES with 128-bit keys

Automatic Rekeying

None Temporal Key Integrity Protocol (TKIP), which has been partially cracked

AES-CCMP Mode

Overall Cryptographic Strength

Negligible Weaker but no complete crack to date

Extremely strong

Copyright Pearson Prentice-Hall 201041

Cryptographic Characteristic

WEP WPA 802.11i (WPA2)

Operates in 802.1X

(Enterprise) Mode?

No Yes Yes

Operates in Pre-SharedKey (Personal) Mode?

No Yes Yes

Not practical / Expensive

Pre-Shared Key’s used in◦ 802.11i and WPA

Each Wireless client uses the same shared Key for authentication◦ This is your passphrase on your wireless network

Once authenticated Access Point provides an unshared Session Key

Copyright Pearson Prentice-Hall 201042

Copyright Pearson Prentice-Hall 201043

Copyright Pearson Prentice-Hall 2010

Origin of WEP◦ Original core security standard in 802.11, created

in 1997

Uses a Shared Key◦ Each station using the access point uses the same

(shared) key

◦ The key is supposed to be secret, so knowing it “authenticates” the user

◦ All encryption uses this key

44

Copyright Pearson Prentice-Hall 2010

Problem with Shared Keys◦ If the shared key is learned, an attacker near an

access point can read all traffic

◦ Shared keys should at least be changed frequently But WEP had no way to do automatic rekeying Manual rekeying is expensive if there are

many users Manual rekeying is operationally next to

impossible if many or all stations use the same shared key because of the work involved in rekeying many or all corporate clients

45

Copyright Pearson Prentice-Hall 2010

Problem with Shared Keys◦ Because “everybody knows” the key, employees

often give it out to strangers

◦ If a dangerous employee is fired, the necessary rekeying may be impossible or close to it

46

Copyright Pearson Prentice-Hall 2010

RC4 Initialization Vectors (IV)

◦ WEP uses RC4 for fast and therefore cheap encryption

◦ But if two frames are encrypted with the same RC4 key are compared, the attacker can learn the key

◦ To solve this, WEP encrypts with a per-frame key that is the shared WEP key plus an initialization vector (IV)

◦ However, many frames “leak” a few bits of the key

◦ With high traffic, an attacker using readily available software can crack a shared key in two or three minutes

◦ (WPA uses RC4 but with a 48-bit IV that makes key bit leakage negligible)

47

Copyright Pearson Prentice-Hall 2010

Conclusion◦ Corporations should never use WEP for security

48

Copyright Pearson Prentice-Hall 201049

Copyright Pearson Prentice-Hall 201050

Copyright Pearson Prentice-Hall 201051

Copyright Pearson Prentice-Hall 2010

Spread Spectrum Operation and Security◦ Signal is spread over a wide range of frequencies

◦ NOT done for security, as in military spread spectrum transmission.

52

Copyright Pearson Prentice-Hall 2010

Turning Off SSID Broadcasting◦ Service set identifier (SSID) is an identifier for an

access point

◦ Users must know the SSID to use the access point

◦ Drive-by hacker needs to know the SSID to break in

◦ Access points frequently broadcast their SSIDs

53

Copyright Pearson Prentice-Hall 2010

Turning off SSID Broadcasting

◦ Some writers favor turning off of this broadcasting

◦ But turning off SSID broadcasting can make access more difficult for ordinary users

◦ Will not deter the attacker because he or she can read the SSID, which is transmitted in the clear in each

transmitted frame

54

Copyright Pearson Prentice-Hall 2010

MAC Access Control Lists

◦ Access points can be configured with MAC access control lists

◦ Only permit access by stations with NICs having MAC addresses on the list

◦ But MAC addresses are sent in the clear in frames, so attackers can learn them

◦ Attacker can then spoof one of these addresses

55

Copyright Pearson Prentice-Hall 2010

Perspective

◦ These “false” methods, however, may be sufficient to keep out nosy neighbors

◦ But drive-by hackers hit even residential users

◦ Simply applying WPA or 802.11i provides much stronger security and is easier to do

56

57

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic,

mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.

Copyright © 2010 Pearson Education, Inc.  Copyright © 2010 Pearson Education, Inc.  Publishing as Prentice HallPublishing as Prentice Hall

Recommended