42
Phishing Phishing What is Phishing? A Phish What’s Wrong? The Login Box The URL Bar They Want Data. . . Some Mail Headers Other Issues Tricks with URLs Defenses Against Phishing IPsec IPsec Details 1 / 42

Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Phishing

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

1 / 42

Page 2: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

What is Phishing?

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

2 / 42

■ Spoofed emails, purportedly from a financialinstitution

■ Ask you to login to “reset” or “revalidate”your account

■ Often claim that your account has beensuspended

Page 3: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

A Phish

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

3 / 42

From: [email protected]

To: undisclosed-recipients:;

Subject: YOUR ACCOUNT HAS BEEN SUSPENDED !!!

Date: Fri, 29 Sep 2006 09:29:25 -0500

...

If you fail to provide information about your

account you’ll discover that your account has been

automatically deleted from Flagstar Bank database.

Please click on the link below to start the update

process:

https://www.flagstar.com/Signon.cgi?update

Flagstar Bank

Page 4: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

What’s Wrong?

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

4 / 42

■ The URL is a booby trap:

■ When I clicked on it, I was actually redirectedto a site in Colombia, via yet anotherindirection. . .

■ The login page appears identical to the realone

■ (One of the web sites I visited seemed to haveseveral variant “bank” pages)

Page 5: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

The Login Box

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

5 / 42

Page 6: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

The URL Bar

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

6 / 42

Page 7: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

They Want Data. . .

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

7 / 42

Page 8: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Some Mail Headers

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

8 / 42

Received: from plesk.salesforcefoundation.org

([198.87.81.9])

by cs.columbia.edu (8.12.10/8.12.10)

(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA

bits=256 verify=NOT) for <[email protected]>

Received: from adsl-68-20-44-198.dsl.chcgil.ameritech.net

(68.20.44.198) by 198.87.81.11

Where does plesk.salesforcefoundation.org comefrom? It is asserted by the far side. The 198.87.81.9 isderived from the IP header, and is hard to forge (but staytuned for routing attacks, in a few weeks). A DNS lookupon 198.87.81.9 isn’t very helpful; the mapping iscontrolled by the address owner, not the name owner.

Page 9: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Other Issues

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

9 / 42

■ Why is the email fromflagstarbanking2.com?

■ The domain for the bank is flagstar.com —no “ing” and no “2”.

■ That’s legit! — the real web site for theironline service is flagstarbanking2.com

■ We have trained users to accept weird,seemingly gratuitous differences; it can makelife easier for the phisher

Page 10: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Tricks with URLs

Phishing

What is Phishing?

A Phish

What’s Wrong?

The Login Box

The URL Bar

They Want Data. . .

Some Mail Headers

Other Issues

Tricks with URLs

Defenses AgainstPhishing

IPsec

IPsec Details

10 / 42

■ http://[email protected]/foo

cnn.com is a userid■ http://2151288839/foo

2151288839 is 128.58.16.7,cluster.cs.columbia.edu

http://rds.yahoo.com/_ylt=A0g...http%3a//www.freebsd.o

So the search engine knows what you clickedon

Page 11: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Defenses Against Phishing

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

11 / 42

Page 12: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Why Does Phishing Work?

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

12 / 42

■ Lack of mutual authentication■ Reusable credentials■ Human factors

Page 13: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Mutual Authentication

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

13 / 42

■ Users are typing passwords to the wrong site■ The browser never authenticates the site:

◆ The phishing connection may not beSSL-protected at all

◆ It may be the wrong site◆ It may be a deceptive site (paypa1.com)◆ It isn’t the site the user intended

Page 14: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Examples of Server Authentication

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

14 / 42

■ Certificate (but we’ve talked about thelimitations of that approach)

■ Personalization (user-supplied image, forexample)

■ Others?

Page 15: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

DKIM — Domain-Key Identified Mail

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

15 / 42

■ Another way to sign email■ Keys are stored in the DNS, rather than in

certificates■ (How is the DNS protected? Must use

DNSSEC — digitally-signed DNS records)■ Keys are domain-granularity, but can be

delegated to individual users

Page 16: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Reusable Credentials

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

16 / 42

■ The purpose of a phishing site is to collectpasswords that can be used by the bad guys

■ What if there were no passwords?

Page 17: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Non-Reusable Credentials

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

17 / 42

■ Client-side certificates (more accurately,private keys)

■ Challenge/response devices■ SecurID tokens and the like■ Many other forms

Page 18: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

One-Time Credentials Won’t Suffice

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

18 / 42

■ What about man-in-the-middle attacks?■ Phishing site relays authentication from the

client to the server; when you’re logged in, ittakes over

■ These are already occurring in the wild

Page 19: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Human Factors

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

19 / 42

■ How can a browser reliably tell the user they’reat the wrong site?

■ Most users don’t even notice the pale yellowURL bar for SSL-protected connections

■ Users are accustomed to frequent web siteredesigns, including changes in authenticationstyle

■ We need to co-ordinate behavior of the user,the mailer, and the browser

■ How does the user know that the link in theemail is correct?

Page 20: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Final Thoughts on Phishing

Phishing

Defenses AgainstPhishing

Why Does PhishingWork?MutualAuthenticationExamples of ServerAuthenticationDKIM —Domain-KeyIdentified Mail

Reusable CredentialsNon-ReusableCredentialsOne-TimeCredentials Won’tSuffice

Human FactorsFinal Thoughts onPhishing

IPsec

IPsec Details

20 / 42

■ We have the basic technical mechanisms toauthenticate email and web sites

■ Human interaction with these mechanismsremains a very challenging problem

■ Security is a systems problem

Page 21: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

IPsec

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

21 / 42

Page 22: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

What is IPsec?

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

22 / 42

■ Network-layer security protocol for theInternet.

■ Completely transparent to applications.- Generally must modify protocol stack or kernel;

out of reach of application writers or users.

Page 23: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

History

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

23 / 42

SP3 Layer 3 security protocol for SDNS.NLSP OSIfied version of SP3, with an

incomprehensible spec.swIPe UNIX implementation by Ioannidis and

Blaze.IPsec Many years of design in the IETF

Revised recently

Page 24: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Why IPsec?

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

24 / 42

■ SSL doesn’t protected against certain attacks■ Example: enemy sends forged packet with

RST bit set; tears down connection■ Example: enemy sends bogus data for

connection — SSL detects that, but can’trecover, since TCP has accepted the data

■ Also — SSL can’t (easily) protect UDP

Page 25: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

IPsec Structure

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

25 / 42

■ Nested headers: IP, ESP, AH, maybe anotherIP, TCP or UDP, then data.

■ Cryptographic protection can be host to host,host to firewall, or firewall to firewall.

■ Option for user-granularity keying.■ Works with IPv4 and IPv6.

Page 26: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Some Packet Layouts

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

26 / 42

Transport Mode

IP

ESP

TCP

userdata

Tunnel Mode

IP

ESP

IP

TCP

user data

Page 27: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Tunnel and Transport Mode

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

27 / 42

■ Transport mode protects end-to-endconnections

■ Tunnel mode — much more common — isused for VPNs and telecommuter-to-firewwall

■ The inner IP header can have site-localaddresses

Page 28: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Topologies

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

28 / 42

E1 A1

GW-A

E2 A2

GW-B B2

E3

WAN

E4

C

E5 GW-F

F1

Page 29: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Paths

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

29 / 42

■ A1 to F1:Encryptors E1, E5

■ B2 to F1:Encryptors E3, E5

■ A2 to C:Encryptors E2, E4

Page 30: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Uses for IPsec

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

30 / 42

■ Virtual Private Networks.■ “Phone home” for laptops, telecommuters.■ General Internet security?

Page 31: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Outbound Packet Processing

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

31 / 42

■ Compare packet — src and dst addr, src anddst port numbers — against Security Policy

Database (SPD)■ If packet should be protected, consult Security

Association Database (SADB) to find SA■ Add appropriate IPsec header

Page 32: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Inbound Packet Processing

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

32 / 42

■ If IPsec-protected, look up SA, authenticate,and decrypt

■ Compare packet — src and dst addr, src anddst port numbers, as before — against SPD tosee if it should have been protected, and bywhich SA

■ If the protection characteristics match, acceptthe packet

■ If they do not match, discard it

Page 33: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Typical Rule Characteristics

Phishing

Defenses AgainstPhishing

IPsec

What is IPsec?

History

Why IPsec?

IPsec StructureSome PacketLayouts

Tunnel andTransport Mode

Topologies

Paths

Uses for IPsecOutbound PacketProcessing

Inbound PacketProcessing

Typical RuleCharacteristics

IPsec Details

33 / 42

■ IP address range or subnet: protect everythinggoing to 128.59.0.0/16

■ Port number list or range: 25,110,143■ Protect all addresses and/or all port numbers:

full protection

Page 34: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Authentication Header (AH)

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

34 / 42

■ Based on keyed cryptographic hash function.■ Covers payload and portion of preceeding IP

header.■ Not that useful today, compared to ESP with

null authentication

Page 35: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

AH Layout

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

35 / 42

proto length reserved

SPI

Sequence Number

digest (variable length)

Page 36: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

What is an SPI?

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

36 / 42

■ SPI — Security Parameter Index■ Identifies Security Association

■ Each SA has its own keys, algorithms, policyrules

■ On packet receipt, look up SA from 〈SPI,dstaddr〉 pair

Page 37: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Encapsulating Security Payload

(ESP)

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

37 / 42

■ Carries encrypted packet.■ An SPI is used, as with AH.■ Preferred use of ESP is for AES in CBC mode

with HMAC-SHA1

Page 38: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

ESP Layout

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

38 / 42

SPI

sequence number

data

data padding

padding padlen payload

HMAC digest

HMAC digest

HMAC digest

HMAC digest

HMACrange

Page 39: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Using ESP

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

39 / 42

■ Can be used with null authentication or nullencryption

■ With null encryption, provides authenticationonly

■ Easier to implement than AH

Page 40: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

IPsec and Firewalls

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

40 / 42

■ Encryption is not authentication orauthorization

■ Access controls may need to be applied toencrypted traffic, depending on the source.

■ The source IP address is only authenticated ifit is somehow bound to the certificate.

■ Encrypted traffic can use a different firewall;however, co-ordination of policies may beneeded.

Page 41: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

IPsec and the DNS

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

41 / 42

■ IPsec often relies on the DNS.

◆ Users specify hostnames.◆ IPsec operates at the IP layer, where IP

addresses are used.◆ An attacker could try to subvert the

mapping.

■ DNSSEC may not meet some organizationalsecurity standards.

■ DNSSEC — which isn’t deployed yet, either —uses its own certificates, not X.509.

Page 42: Phishing - Columbia Universitysmb/classes/f06/l10.pdf · A Phish What’s Wrong? The Login Box The URL Bar They Want Data... Some Mail Headers Other Issues Tricks with URLs Defenses

Implementation Issues

Phishing

Defenses AgainstPhishing

IPsec

IPsec DetailsAuthenticationHeader (AH)

AH Layout

What is an SPI?EncapsulatingSecurity Payload(ESP)

ESP Layout

Using ESP

IPsec and Firewalls

IPsec and the DNSImplementationIssues

42 / 42

■ How do applications request cryptographicprotection? How do they verify its existence?

■ How do adminstrators mandate cryptographybetween host or network pairs?

■ We need to resolve authorization issues.