版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、 Zhang Bing Sept. 2021Information Security (involved concepts)Confidentiality ( C of CIA-Triad)Integrity ( I of CIA-Triad)Availability ( A of CIA-Triad)Identification (Access Control)Authentication (Access Control)Authorization (Access Control)Non-repudiationAuditConfidentialityensuring that informa
2、tion is accessible only to those authorized to have accessto prevent the disclosure of information to unauthorized individuals or systemsexamples: the credit card number, passwordIntegritysimply, data integrity is the assurance that data are consistent and correctthat data cannot be modified without
3、 authorizationin cryptography and information security, integrity refers to the validity of dataexample: referential integrity in databases, man-in-middle, check sum, Message Authentication CodeAvailabilitythe information must be available when it is neededHigh availability systems aim to remain ava
4、ilable at all timesexamples: denial-of-service attackIdentification/Identityan assertion of who someone is or what something isaims to map a known identifier(ID) to an unknown entity so as to make it knownthe ID must be uniqueIDs may be scopedexamples: usernameAuthenticationthe act of establishing o
5、r confirming something (or someone) as authentic (genuine)to validate that both parties involved are who they claim they arethree different types of information that can be used for authentication: something you know, something you have, or something you areexamples: password, server authentication
6、in TLS, mutual authentication in TLSAuthorizationto determine what informational resources they are permitted to access and what actions they will be allowed to performto specify access rights to resourcesapproaches: the non-discretionary approach, the discretionary approach, the mandatory access co
7、ntrol approach(security classification)examples: Role-Based Database Management Systems, the simple access control lists used in many firewalls and routersNon-repudiationensuring that a party in a dispute cannot repudiate, or refute the validity of a statement or contractimplies that one party of a
8、transaction cannot deny having received a transaction nor can the other party deny having sent a transactionexamples: digital signatureAuditmanual or systematic measurable technical assessment of a system or applicationexamples: review the access control list, analyze the logsWeb Service Security Sp
9、ecifications (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-AddressXML EncryptionWeb Services PolicyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityWeb Service Security Specifications (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-Add
10、ressXML EncryptionWeb Services PolicyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityHow to prevent the data be changed by others ?XML Digital Signature (1)W3C: XML Signature Syntax and Processing (Second Edition), /TR/xmldsig-cor
11、e/XML Signature can be used to sign the data and represent the result in XMLXML Signatures can be applied to any digital content (data object), including XMLa combination of Digital Signature and XMLenveloped signature, enveloping signature, detached signatureXML Digital Signature (2)structure(main
12、elements) ( ()? )+ ()? ()* XML Digital Signature (3)exampleXML Digital Signature (4)conclusion (Integrity)to ensure the data integrity between sender and receiverif the algorithm of signature is asymmetric, the message sender cant repudiate his actionif the algorithm of signature is asymmetric, the
13、subject of the message sender can be decided (may be used as Authentication)API and implementationsJava XML Digital Signatures APIs(JSR 105)Apache Santuario(XML Security) project(java and c+), used both in WSS4J、 Axis2 and CXFWeb Service Security Specifications (S)XML/Schema XML Digital SignatureSOA
14、P/WSDL/WS-AddressXML EncryptionWeb Services PolicyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityHow to prevent the data be seen by others ?XML Encryption(1)W3C: XML Encryption Syntax and Processing, /TR/xmlenc-core/XML Encryptio
15、n can be used to encrypt the data and represent the result in XMLThe data may be arbitrary data (including an XML document), an XML element, or XML element contenta EncryptedData element replaces the element or content in the encrypted version of the XML documenta EncryptedKey Element is used to tra
16、nsport encrypted keys for the originator to a known receiversAlso can be used to encrypt the external dataXML Encryption(2)structure ? ? ? ? ? ? ? ? ? EncryptionProperties? XML Encryption(3)exampleXML Encryption(4)conclusion(Confidentiality)to ensure the data confidentiality between the sender and t
17、he receiver symmetric keys are always used to encrypt data, asymmetric keys are always used to encrypt symmetric keyAPIs and implementationsJava XML Digital Encryption APIs(JSR 106)Apache Santuario(XML Security) project(java and c+), used both in WSS4J、Axis2 and CXFWeb Service Security Specification
18、s (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-AddressXML EncryptionWeb Services PolicyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityHow to send security information? How to enable signature and encryption with SOAP message? Web Se
19、rvices Security(1)OASIS: /specs/#wssv1.1 , including a SOAP Message security and several Token Profilesto secure web services based on XML signature 、XML encryption and existing security technologies (kerberos, X.509, SAML etc.)to send security tokens as part of SOAP messageto signatur
20、e security tokens and message partsto encrypt security tokens and message partsto provide end-to-end message level securityWeb Services Security(2)security token conceptsA claim is a declaration made by an entity(name, identity, key, group, privilege, capability, etc.)A security token represents a c
21、ollection of claims, it may be signed or unsignedsecurity tokensUser Name Token: providing a usernameBinary Security Tokens:(X.509 certificates and Kerberos Tickets etc.), need to be encodedXML Tokens: XML based security tokens , SAML etc.EncryptedData Token: the tokens encryption formId attribute u
22、nder a specified namespace may be used for referenceWeb Services Security(3)security token referenceprovides an extensible mechanism for referencing security tokens and other key bearing elementssecurity token reference mechanicsDirect References: using URIKey Identifiers: using a opaque valueKey Na
23、mes: using a name assertedEmbed References: embeddedthe references may be encrypted Web Services Security(4)signatures and encryption can be used both for message parts and security tokenssecurity timestampsto avoid replay problemfor recipient to determine the freshness of the security semanticsthe
24、contents: creation time or/and expiration timeclock synchronization is out of scopeWeb Services Security(5)exampleWeb Services Security(6)example(continue)Web Services Security(7)example(continue)Web Services Security(8)example(continue)Web Services Security(9)example(continue)Web Services Security(
25、10)security headerheader element is added to the front of the existing elements, for example to decide the order of signature step and encryption stepkey-bearing element should be ordered to precede the key-using elementmore about username tokens (extensions)two types of password: PasswordText and P
26、asswordDegistto avoid replay attacks: Nonce(a random value) and Created (timestamp)Password_Degest=Base64(SHA-1(nouce+created+password)key derivation: Salt and Iteration act on a shared secret key to generate a new key for the Message Authentication Code and EncryptionWeb Services Security(11)exampl
27、e (username token)Web Services Security(12)conclusion(Integrity, Confidentiality and Authentication)use encryption to ensure SOAP Messages Confidentiality use signature to ensure SOAP Messages Integrityuse security tokens to provide authentication information , key information and other extended inf
28、ormationuse timestamps to avoid replay attackimplementationsApache WSS4J, used both in Axis2 and CXF, it seems not support all tokens defined by the specification groupWeb Service Security Specifications (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-AddressXML EncryptionWeb Services PolicyWS Trust
29、WSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityHow to obtain Security Token and make the token trustable?WS-Trust(1)OASIS: /specs/#wstrustv1.4based on web services security discussed aboveTrust is the characteristic that one enti
30、ty is willing to rely upon a second entity to execute a set of actions and /or to make set of assertions about a set of subjects and /or scopesto issue, renew, cancel and validate security tokensto establish the presence of, and broker trust relationshipsWS-Trust(2)Security Token Service (STS)a web
31、service that issues security tokensmakes assertions based on evidence it trusts to whoever trust itrequest /ws-sx/ws-trust/201912/Issue /ws-sx/ws-trust/201912/R/ws-sx/ws-trust/201912/Cancel /ws-sx/ws-trust/201912/Va
32、lidaterequest-response styleWS-Trust(3)Security Token Service(continue)WS-Trust(4)example (request)WS-Trust(5)example (response)WS-Trust(6)Negotiation and Challengeprior to returning a security token from STS, a set of exchanges between parties is required, not just simple request-responseseveral ex
33、changes of challenge-answer may be neededWS-Trust(7)conclusion (Trust)to ensure the security tokens are trustedimplementationsCXF supports (as a client to access STS)Microsofts WSE, IBM, SUNs Metro supportWeb Service Security Specifications (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-AddressXML
34、EncryptionWeb Services PolicyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityHow to establish a secure session to allow conversation?WS-SecureConversation(1)OASIS: /specs/#wssecconv1.4to establish a security contextto amen
35、d security contextto compute and pass derived keysSecurity Context Token (extensions of WSS Tokens)identifier: a globally unique value in time and spacekey instance (without reveal the actual key)the token is obtained from STS, STS need to support amend, renew and cancel actionWS-SecureConversation(
36、2)example (request token)WS-SecureConversation(3)example (response token)WS-SecureConversation(4)derived keyswithin the context, use one or more shared secret keys to sign and encrypt messagedifferent algorithms can be used to generate derived keye.g., P_SHA1 (secret, label + seed) exampleWS-SecureC
37、onversation(5)conclusion (secure session)to provide a shared security context among the communicating parties to exchange multiple messagesto promote performance if multiple messages need to be exchanged during one logic request implementationsCXF ( based on WS-SecurityPolicy, in “wsdl-first” case)W
38、eb Service Security Specifications (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-AddressXML EncryptionWeb Services PolicyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityHow to express services requirements and capabilities?Web Service
39、s Policy(1)W3C: /2019/ws/policy/ , including framework and attachmenta machine-readable language for representing the capabilities and requirements of a web service which called policiesfour elements: Policy, All, ExactlyOne and PolicyReferencetwo attributes: Optional and IgnorableWeb Services
40、 Policy(2)Policy basic conceptspolicy: a potentially empty collection of policy alternativespolicy alternative: a potentially empty collection of policy assertionspolicy assertion: represents a requirement, a capability, or other property of a behaviorpolicy expression: an XML Infoset representation
41、 of a policy, either in a normal form or in an equivalent compact formWeb Services Policy(3)Policy Data ModelWeb Services Policy(4)example (policy expression)Web Services Policy(5)policy attachmentpolicy attachment: a mechanism for associating policy with one or more policy scopespolicy scope: a col
42、lection of policy subjects to which a policy may applypolicy subject: an entity (e.g., an endpoint, message, resource, operation) with which a policy can be associatedattach policies with existing technologies: WSDL and UDDIWeb Services Policy(6)Policy scopes in WSDL Web Services Policy(7)conclusion
43、 (custom metada)to solve how to express the services requirements , capabilities and constraints to service clientimplementations:Apache Neethi project, used both in Aixs2 and CXFWeb Service Security Specifications (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-AddressXML EncryptionWeb Services Pol
44、icyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityHow to express security aspects requirements and capabilities?WS-SecurityPolicy(1)OASIS: /specs/#wssecpolv1.3base on Web Services Policydefine a base set of assertions that
45、 describe how messages are to be securedto provide enough information of compatibility and interoperability for web service participantsWS-SecurityPolicy(2)assertions definedProtection AssertionsIntegrity AssertionsConfidentiality AssertionsRequired elements AssertionsToken AssertionsSecurity Bindin
46、g AssertionsTransportBindingAssertionSymmetricBindingAssertionAsymmetricBindingAssertionWss AssertionWS-Trust Assertionthe above assertions attached scopes in WSDLWS-SecurityPolicy(3)exampleWS-SecurityPolicy(4)conclusion (security related metadata)to supply all information necessary of building a se
47、cure message exchanging environment between the participants implementationsAxis2 and CXFWeb Service Security Specifications (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-AddressXML EncryptionWeb Services PolicyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLang
48、uageWeb Services SecurityHow to make trust across realms?WS-Federation (1)OASIS: /specs/#wsfedv1.2, Web Service Federation Languageto federate different realmsintegrating existing security infrastructuresleveraging the WS-* specificationsrequirements and capabilities are described by p
49、oliciesWS-Federation (2)conceptsFederation: a collection of realms that have established a producer-consumer relationship whereby one realm can provide authorized access to a resource it manages based on an identity, and possibly associated attributes, that are asserted in another realmIdentity Prov
50、ider (IP): an entity that acts as an authentication service to end requestors and a data origin authentication service to service providers. It need to be trusted both by the requestor and the service providerAttribute Service: a Web service that maintains information (attributes) about principals w
51、ithin a trust realm or federationWS-Federation (3)concepts (continue)Authorization Service: A specialized type of Security Token Service (STS) that makes authorization decisions Digital Identity A digital representation of a principal that is unique to that principalRealm or Domain: A representation
52、 of a single unit of security administration or trust Federation Metadata: a description of a single federation which is helpful for partnersPseudonym Service : a Web service that maintains alternate identity information about principals within a trust realm or federationWS-Federation (4)an alternat
53、ive illustrationWS-Federation (5)another alternative illustrationWS-Federation (6)conclusion ( focus on authentication and authorization)to enable trust across different security realms in a federationimplementationsthis specification was initial by Microsoft and IBMWeb Service Security Specificatio
54、ns (S)XML/Schema XML Digital SignatureSOAP/WSDL/WS-AddressXML EncryptionWeb Services PolicyWS TrustWSFederationWS SecureConversationWS Security PolicySecurity AssertionMarkupLanguageWeb Services SecurityWhat is XML-base Security Language for security information?Security Assertion Markup Language(1)OASIS: /specs/#samlv2.0, including SAMLCore, SAMLBind, SAMLProf,
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- Target-Protein-Ligand-Linker-Conjugates-4-生命科學(xué)試劑-MCE-5926
- 1-2-Dihexanoyl-sn-glycero-3-PS-sodium-生命科學(xué)試劑-MCE-8684
- 二零二五年度離婚協(xié)議書中共同財(cái)產(chǎn)清算起訴狀
- 2025年度電力市場(chǎng)交易購(gòu)售電合同
- 二零二五年度大型賽事活動(dòng)合作2025年度營(yíng)銷合同
- 二零二五年度私人住宅裝修質(zhì)量與安全雙保障協(xié)議
- 2025年度離婚子女債務(wù)償還與財(cái)產(chǎn)分割執(zhí)行協(xié)議
- 2025年度煙酒企業(yè)社會(huì)責(zé)任履行與公益合作合同
- 二零二五年度文化創(chuàng)意產(chǎn)業(yè)銀行擔(dān)保協(xié)議
- 2025年度智慧社區(qū)建設(shè)采購(gòu)合同智能設(shè)備配置規(guī)范
- 北京市海淀區(qū)2024-2025學(xué)年八年級(jí)上學(xué)期期末考試數(shù)學(xué)試卷(含答案)
- 2025年廣西柳州市中級(jí)人民法院招錄聘用工作人員17人高頻重點(diǎn)提升(共500題)附帶答案詳解
- 2024年全國(guó)職業(yè)院校技能大賽高職組(研學(xué)旅行賽項(xiàng))考試題庫(kù)(含答案)
- 十八項(xiàng)核心制度
- 2025年物業(yè)公司安全生產(chǎn)工作計(jì)劃(5篇)
- 2025社保政策培訓(xùn)
- 電器儀表人員培訓(xùn)課件
- 2025年中小學(xué)春節(jié)安全教育主題班會(huì)課件
- 2023年工程制圖習(xí)題集
- 計(jì)量經(jīng)濟(jì)學(xué)練習(xí)題
- 2025年全國(guó)高考體育單招考試模擬政治試卷試題(含答案詳解)
評(píng)論
0/150
提交評(píng)論