26
Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman http://www.cis.ksu.edu/~eyv/CIS755_S 14/

Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

  • Upload
    akiva

  • View
    24

  • Download
    0

Embed Size (px)

DESCRIPTION

Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014. Eugene Vasserman http://www.cis.ksu.edu/~eyv/CIS755_S14/. Administrative stuff. Office hours moved on Monday Will be 3 – 4:30 Quiz today (last 15 minutes). Multiple Join/Bootstrap Attack. A, B, C. Join. - PowerPoint PPT Presentation

Citation preview

Page 1: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Class 16Deniable Authentication

CIS 755: Advanced Computer SecuritySpring 2014

Eugene Vasserman

http://www.cis.ksu.edu/~eyv/CIS755_S14/

Page 2: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Administrative stuff

• Office hours moved on Monday– Will be 3 – 4:30

• Quiz today (last 15 minutes)

Page 3: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Multiple Join/Bootstrap Attack

A,B,C

D,E,F

Join Join

Never let nodes re-join/get more contacts!

Page 4: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Harvesting Attack

Never contact anyone except neighbors!

Page 5: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Confirmation Attack

Yes

Are you in the secret network?

Never respond to anyone except neighbors!

Page 6: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

secretsecret Covert Auth.!!

Hi? Hi!

XX

Hi? ??

Page 7: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

BridgeSPA Bridges

Page 8: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Ongoing problems

• SilentKnock MitM vulnerability• Bridge TLS distinguishability

• Other solutions?– TCP fragmentation, apparently– obfsproxy

Page 9: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

SilentKnock

• Software has exploitable bugs (!)• Firewalls can not protect services that

should be externally accessible• Can we prevent unauthorized users from

accessing the service?• Can we prevent them from even detecting the service?

Page 10: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Problem Overview

BUG

Big evil untrusted Internet

Big evil untrusted Internet

Page 11: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

TCP 3-way handshake

ServerSYN (25)

SYN-ACK

Client

SMTP(port 25)

Web(port 80)

Mailsoftware ACK (25)

Data (25)

Page 12: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

What is Port Knocking?

ServerSYN (666)SYN (777)SYN (888)SYN (25)

SYN-ACK

Client

SMTP(closed)

Web(port 80)

Mailsoftware

SYN (25)

Code:666,777,888

Code:666,777,888

SMTP(port 25)

Page 13: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Covert Authentication

• Dining Freemasons:

– Alice is able to authenticate to Bob using a shared secret without Mallory being aware that an authentication took place

– Bob is unaware that Alice tries to authenticate if Bob does not share a secret with Alice

Page 14: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Problem Statement

• Design a port knocking system that provides– Authentication– Replay protection–Non-detection– Practical implementation– Formal threat model– Provable security

Page 15: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Security of Port Knocking

• Computationally bounded adversary may:– observe many authenticated sessions– arbitrarily inject, delete, and reorder messages

• Cannot distinguish a port knocking client/server pair from those using ordinary TCP/IP, plus some out-of-band authentication mechanism

E. Vasserman, N. Hopper, J. Laxson, and J. Tyra – SilentKnock: practical, provably undetectable authentication

Page 16: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Security Definition

Hidden world

(implementation)

Plausible world

(ideal security)

SC

A

Queue SC

A

keyed

Page 17: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Implementation Overview

• “Simulate” shared signaling by steganographically embedding a MAC into TCP SYN packet

• Application-transparent proxies:– sknockproxy (client) automatically detects

“protectable” streams– sknockd (server) decodes/verifies embedded

MAC

• Userspace implementation

Page 18: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

System OverviewClient Server

Page 19: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Packet Filter Hooks

• sknockd– Listen for SYN, FIN, RST– Passively examines only those packets

• sknockproxy– Listen for all packets going to given IP/port

pair– Modifies all packets in stream of interest

• Server-optimized

Page 20: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Steganographic Embedding

Linux 2.6 TCP SYN packet header with embedded MAC

Page 21: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Timestamp Encoding Details

• Only get to modify lowest byte• Must delay packet dispatch• Re-transmitted SYN packets must have the

same sequence number but different timestamp– Re-encode retransmitted packets and delay

dispatch again

Page 22: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Replay Protection

• Two-field counter (C1 || C2)

• C1 = C2 = 0 at first server connection

• De-synchronization can occur if SYN or SYN-ACK is lost

• Auto-resynchronization using timed counter field

Page 23: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Optimizations

• MAC pre-computation for first connection• Background MAC computations for future

connections (not yet implemented)– Counter values and passwords are known for

future connections, can AES-encrypt them while waiting for connection

– Can even store in config file!

Page 24: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

sknockd Timing Results

Experiment SSH only sknockd without commit

Average response time (μs)

242.86

± 8.59

389.33

± 13.36

295.44

± 8.64

Slowdown factor

1 1.60 1.22

Page 25: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Known Limitations

• Only protects start of connection (TCP hijacking still possible)

• Limited MAC size• Identity binding: IP addresses• Distinguishability by packet-modifying

adversary

Page 26: Class 16 Deniable Authentication CIS 755: Advanced Computer Security Spring 2014

Questions?

Reading discussion