38
Jim Theodoras Feb 2014 In-Flight Encryption

NANOG60 In-Flight Encryption and Network Security

  • Upload
    vumien

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Page 1: NANOG60 In-Flight Encryption and Network Security

Jim Theodoras

Feb 2014

In-Flight Encryption

Page 2: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 2 2

OSI Model

Physical PHY

Data Link MAC

Network Layer IP/MPLS

Transport Layer TCP, UDP

Application Presentation

Session

Bottom of stack

Top of Stack

Bits

Frames

Packets

Segments

Data

1

2

3

4

5

6

7

Page 3: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 3 3

Getting from Point A to Point B

Physical PHY

Data Link MAC

Network Layer IP/MPLS

Transport Layer TCP, UDP

Application Presentation

Session

1

2

3

4

5 6

7

Physical PHY

Data Link MAC

Network Layer IP/MPLS

Transport Layer TCP, UDP

Application Presentation

Session

IPsec IPsec

Page 4: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 4 4

Home Security Analogy

Single layer of security – a locked front door

Key left under front door mat

Neighbor given the key

Lock not re-keyed

Yard not gated

Multiple layers of security

Lockbox for key for maid

Re-keyed before move in

Yard gated

Alarm - Intrusion detection

Page 5: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 5 5

Secure End-to-End Data Transport

Physical PHY

Data Link MAC

Network Layer IP/MPLS

Transport Layer TCP, UDP

1

2

3

4

5 6

7 Application Presentation

Session

Physical PHY

Data Link MAC

Network Layer IP/MPLS

Transport Layer TCP, UDP

Application Presentation

Session

IPsec IPsec

Proper key management

Multiple layers of security

Intrusion detection

Page 6: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 6 6

• Layered security is not just a Hollywood plot device.

• Layered and tiered security works.

Layers of Security

Page 7: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 7 7

Sideways Attacks

Page 8: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 8 8

Mathematical Sleight-of-Hand

• 64,000 possible combinations

• A “sideways attack” reduces that to 100 possible combinations.

• A “backdoor” renders the lock useless.

Page 9: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 9 9

• Copying Encryption Keys

• If stored in DRAM

• Freeze spray slows down decay

• Unplug adjacent linecard

• Put on probe

• Freeze DRAM

• Unplug/Replug linecard

• Read encryption keys

Examples of Sideways Attacks

Page 10: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 10 10

• (not so) Random Number Generation

• Hardware Random Number generation is great, but slow

• Random number only used for seed

• Seed then used for pseudorandom number generation

• Knowing details of process reduces possible solution set

• “lack of entropy” in pseudorandom number

Examples of Sideways Attacks

Page 11: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 11 11

• “Brute Forcing” is using a HPC to go through every combination.

• You do not have to go through every permutation, just every reasonable guess.

• “Relational data” greatly reduces number of potential guesses.

Sidewaysing a Brute Force Attack

Example: AES-256

• A supercomputer that could check 1018 keys/sec would require 1051 years to exhaust 256 bit key space.

• A typical mining rig can brute force 30 billion passwords/sec, cracking all eight-character passwords in just a few hours.

• Relational data reduces this to mere minutes.

F2o<fa!7S7052C5JavW%G.@uQc/0JymD>CA:lsLZ"P+fU3Js6l@]ie9<A{$L3Nh

Page 12: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 12 12

Cryptographic Goals

Page 13: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 13 13

• Confidentiality

• Nobody can read content of message ("Encryption")

• Integrity

• Modification of message will be detected ("Checksum")

• Authenticity

• Verify that I am really connected to whom I expected.

Cryptographic Goals

Page 14: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 14 14

Alice Bob

Eve

Alice Bob

Eve

Alice wants to send Bob a message.

Eve is either listening or is directly intercepting the line and can manipulate all messages to Bob.

Encryption Basics Cryptographic Goals

Page 15: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 15 15

Alice Bob

Eve

Alice Bob

Eve

Confidentiality (privacy) - "Encryption"

• Eve cannot understand message from Alice

• Eve could manipulate message to Bob. - Encryption does not protect against manipulation.

Example: Alice sends message "transfer 10€ to Bob's bank account". When Eve knows the position in the message, where the value is located, she can change the value without knowing anything else.

Encryption Basics Cryptographic Goals

Page 16: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 16 16

Alice Bob

Eve

Integrity - "Cryptographic Checksum"

• Eve cannot manipulate message from Alice, because this will be detected by Bob.

• Cryptographic Checksums add latency, because message must be stored and verified on receiving side.

message chk message' chk

Encryption Basics Cryptographic Goals

Page 17: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 17 17

Alice Bob

Eve

Alice Eve

Authenticity - "Authentication"

• Alice and Bob can detect, whether they are connected.

Encryption Basics Cryptographic Goals

Page 18: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 18 18

Encryption Basics

Page 19: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 19 19

Encryption Basics Symmetric Encryption

Symmetric Encryption:

• Alice and Bob use the same algorithm

• Alice and Bob use the same secret key

Encryption Decryption

secret key secret key

original

message

original

message

encrypted ("secure") message

Disadvantage

Alice and Bob must exchange the secret key and must keep it secret

exchange key

Page 20: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 20 20

AES

input 128 Bit

output 128 Bit

key 128, 192

or 256 Bit

+ + + + + + + + + + + + + + + +

S S S S S S S S S S S S S S S S

round

key

Mix Mix Mix Mix

key

128 Bit = 16 Byte data

14 rounds

for AES 256

Encryption Basics Symmetric Encryption with AES

Page 21: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 21 21

Encryption Basics Asymmetric Encryption

Asymmetric Encryption:

• Alice and Bob generate a key-pair with public and private key.

• The private key must be kept secret, but the public key can be distributed everywhere.

send public key to everyone

A pub

B pub

A priv B priv

Alice can encrypt message with Bob's public key.

Only Bob can decrypt the message, because only he has his private key.

Disadvantage: Asymmetric Encryption is very slow.

Page 22: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 22 22

Encryption Basics Asymmetric Encryption within Diffie Hellman algorithm

Assumption: multiplying is much simpler as calculating logarithm

random

number rA

random

number rB

public key grA

public key grB

(grB)rA = g (rA rB) (grA)rB = g (rA rB)

grA grB

Eve must 1x calculate logarithm

to get the same result

g is a common number, known to Alice, Bob and Eve

Page 23: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 23 23

Asymmetric Encryption

Symmetric Encryption

Requires secure channel for key-exchange

No Yes

Is very slow Yes No

Can be implemented in hardware (FPGA)

No (only partially) Yes

Encrypt large amount of data

No Yes

Combine both methods?

Hybrid approach uses asymmetric method for generation of encryption key ("Diffie-Hellman") and symmetric method for encryption ("AES")

Encryption Basics Symmetric vs. Asymmetric Encryption

Page 24: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 24 24

Encryption Methods

Page 25: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 25 25

WAN

IPsec / MACsec Encryption

WDM-transport WDM-transport

Site B Site A Router

FC switch

Router

FC switch

WAN

Appliance based Encryption

WDM-transport

Site B

WDM-transport

Site A Router

FC switch

Router

FC switch

Optical transmission security Principles of encryption

WAN

Router

FC switch

TDM

Router

FC switch

TDM

Site A Site B

xWDM based Encryption

S

peed

, throu

gh

pu

t an

d s

imp

licity

Page 26: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 26 26

Encryption Method vs Layer

• Overlay Transport Virtualization (OTV) • Traditionally used for VPN services • 82 Bytes overhead • Only select Bytes in header encrypted and authenticated.

• MACsec/TrustSec • Point-to-Point Ethernet encryption • 32/40 Bytes overhead, respectively • Only select Bytes in header encrypted and authenticated.

• Traditional Transport • Point-to-point and multipoint • Zero bytes overhead, so no loss of throughput with shorter packets. • Only select Bytes in header encrypted and authenticated.

• Bulk Transport Encryption • Point-to-point • Zero bytes overhead, so no loss of throughput with shorter packets. • Protocol/ I/F agnostic (Ethernet, FC, IB, Sonet/SDH) • All Bytes in header and checksum are encrypted with payload.

Layered Packet Headers Encryption Header Payload… Checksum

How big is this? How much is

actually encrypted? Is this

included? How many of these are encrypted,

just authenticated, or only plain text?

Page 27: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 27 27

Maximum Throughput Comparison

Throughput

Framesize / Bytes

Max. MTU-Size?

Max. Throughput?

Transport Encryption

MACsec

TrustSec

IPsec

OTV

Page 28: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 28 28

Encryption from 10Gb/s to 100Gb/s

White Noise for key generation

• Applying an AES256 w/ dynamic key exchange to a 10Gb/s line signal of a WDM card generates a multi-protocol encryption solution

• With DC services moving to 16GFC and 40GE/100GE Encryption on 100G WDM technology becomes key

• Complete DC service coverage through combination of 10Gb/s and 100Gb/s WDM solutions

Page 29: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 29 29

100G Encryption – Live Demo

encrypted encrypted

non-encrypted

GbE Cu

GbE Cu

GbE Cu

10GbE FO

10GbE FO

10GbE FO

GbE to 10GbE Converter

Fiber Tap

Video Video

Video ?

Sender Receiver

Intruder

XG210

XG210

XG210

GbE to 10GbE Converter

GbE to 10GbE Converter

100GbE 100GbE

10

0G

bE

Page 30: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 30 30

So why the continuing interest in QKD?

• Transmission of key is non-breakable, as the key is not actually transmitted!

• Intrusion detection: Reading the key changes it.

• Often overlooked: Key is truly random, preventing sidewaysing.

• ADVA will be announcing QKD real-world field results at OFC.

Quantum Key Distribution?

Page 31: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 31 31

Recent Vulnerabilities Exposed

Page 32: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 32 32

• Encryption too hard to break

• Threats have total anonymity

Balancing Act

• Encryption too easy to break

• Threats have access to all data

Page 33: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 33 33

• While in our heads, we envision connecting to the cloud in one way, the reality is much different.

The Reality of Cloud Connectivity

Cloud

User

Page 34: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 34 34

• From Gilmore threads:

• Same initialization vector used throughout a session.

• “null” encryption

• 56-bit DES

• 768-bit Diffie-Hellman

• FreeS/WAN Linux implementation not secure

• Given processing power at the time, there was legitimate concern that undesirables would have total anonymity.

• Problem: Given today’s processing power, the club of entities that can decipher at will has grown too large.

IPsec Compromised from Day 1

Page 35: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 35 35

Fed mandated access

Vulnerabilities inserted into IPsec

OSI Model – Where Vulnerabilities Exist

Physical PHY

Data Link MAC

Network Layer IP/MPLS

Transport Layer TCP, UDP

Application Presentation

Session

Bottom of stack

Top of Stack

Bits

Frames

Packets

Segments

Data

1

2

3

4

5

6

7

Fed mandated backdoors Cookies Malware

Non-random numbers Key intercept

Co-location Inline spoofing Replication

Fiber Optic Cable Taps Undersea Taps Coastal Gateways

Page 36: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 36 36

Secure End-to-End Data Transport

Physical PHY

Data Link MAC

Network Layer IP/MPLS

Transport Layer TCP, UDP

Application Presentation

Session

1

2

3

4

5

6

7

Physical PHY

Data Link MAC

Network Layer IP/MPLS

Transport Layer TCP, UDP

Application Presentation

Session

IPsec IPSEC

MACsec MACsec

In-Flight In-Flight Intrusion Detection

Secure Facilities

Secure Facilities

Page 37: NANOG60 In-Flight Encryption and Network Security

© 2014 ADVA Optical Networking 37 37

• Layer your security

• Encrypt at every layer, when possible

• Encrypt all transport (not client) links, inside and outside of private network.

• If someone else is carrying your traffic, have them encrypt and you keep the keys.

• Encrypt, encrypt, encrypt, but don’t only rely on IPsec.

• Confidentiality

• Integrity

• Authenticity

• Intrusion Detection

• Secure facilities (RF shielding)

• Secure hardware and supply chain

• Physical layer monitoring

• Focus on prevention of sideways attacks

Recommendations