![【VIP專享】第十一講-協(xié)議安全課件(2)_第1頁](http://file4.renrendoc.com/view/baf1783658a63e1bd09ecc6df938b557/baf1783658a63e1bd09ecc6df938b5571.gif)
![【VIP專享】第十一講-協(xié)議安全課件(2)_第2頁](http://file4.renrendoc.com/view/baf1783658a63e1bd09ecc6df938b557/baf1783658a63e1bd09ecc6df938b5572.gif)
![【VIP專享】第十一講-協(xié)議安全課件(2)_第3頁](http://file4.renrendoc.com/view/baf1783658a63e1bd09ecc6df938b557/baf1783658a63e1bd09ecc6df938b5573.gif)
![【VIP專享】第十一講-協(xié)議安全課件(2)_第4頁](http://file4.renrendoc.com/view/baf1783658a63e1bd09ecc6df938b557/baf1783658a63e1bd09ecc6df938b5574.gif)
![【VIP專享】第十一講-協(xié)議安全課件(2)_第5頁](http://file4.renrendoc.com/view/baf1783658a63e1bd09ecc6df938b557/baf1783658a63e1bd09ecc6df938b5575.gif)
版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、Protocols and Security()school of computermengbomengscuecgIPSecSecurity Issues in IPsource spoofingreplay packetsno data integrity or confidentiality DOS attacks Replay attacks Spying and moreFundamental Issue: Networks are not (and will never be) fully secureIPSec and SSLIPSec lives at the network
2、layerIPSec is transparent to applicationsapplicationtransportnetworklinkphysicalSSLOSUserNICIPSecAn IPSec scenarioIPSec and ComplexityIPSec is a complex protocolOver-engineeredLots of generally useless extra featuresFlawedSome serious security flawsInteroperability is serious challengeDefeats the pu
3、rpose of having a standard!ComplexDid I mention, its complex?IPSec ArchitectureESPAHIKEIPSec Security PolicyEncapsulating SecurityPayloadAuthentication HeaderThe Internet Key ExchangeIKE and ESP/AHTwo parts to IPSecIKE: Internet Key ExchangeMutual authenticationEstablish shared symmetric keyTwo “pha
4、ses” like SSL session/connectionESP/AHESP: Encapsulating Security Payload for encryption and/or integrity of IP packetsAH: Authentication Header integrity onlyIPsec servicesIKESecurity Associationsa one-way relationship between sender & receiver that affords security for traffic flowIf a peer relati
5、onship is needed, for two-way secure exchange, then two security associations are required. uniquely identified by 3 parameters:Security Parameters Index (SPI)IP Destination AddressSecurity Protocol Identifierhas a number of other parametersseq no, AH & EH info, lifetime etchave a database of Securi
6、ty AssociationsSecurity services are afforded to an SA for the use of AH or ESP, but not both.Authentication Header (AH)provides support for data integrity & authentication of IP packetsend system/router can authenticate user/appprevents address spoofing attacks by tracking sequence numbersbased on
7、use of a MACHMAC-MD5-96 or HMAC-SHA-1-96parties must share a secret keyEncapsulating Security Payload (ESP)provides message content confidentiality & limited traffic flow confidentialitycan optionally provide the same authentication services as AHsupports range of ciphers, modes, paddingincl. DES, T
8、riple-DES, RC5, IDEA, CAST etcCBC & other modespadding needed to fill block size, fields, for traffic flowIKEIKE has 2 phasesPhase 1 IKE security association (SA)Phase 2 AH/ESP security associationPhase 1 is comparable to SSL session Phase 2 is comparable to SSL connection Not an obvious need for tw
9、o phases in IKEIf multiple Phase 2s do not occur, then it is more expensive to have two phases!IKE Phase 1Four different “key” optionsPublic key encryption (original version)Public key encryption (improved version)Public key signatureSymmetric keyFor each of these, two different “modes”Main modeAggr
10、essive modeThere are 8 versions of IKE Phase 1!Evidence that IPSec is over-engineered?IKE Phase 1Well discuss 6 of 8 phase 1 variantsPublic key signatures (main and aggressive modes)Symmetric key (main and aggressive modes)Public key encryption (main and aggressive)Why public key encryption and publ
11、ic key signatures?Always know your own private keyMay not (initially) know other sides public keyIKE Phase 1Uses ephemeral Diffie-Hellman to establish session keyAchieves perfect forward secrecy (PFS)Let a be Alices Diffie-Hellman exponentLet b be Bobs Diffie-Hellman exponentLet g be generator and p
12、 primeRecall p and g are publicIKE Phase 1: Digital Signature (Main Mode)CP = crypto proposed, CS = crypto selectedIC = initiator “cookie”, RC = responder “cookie”K = h(IC,RC,gab mod p,RA,RB)SKEYID = h(RA, RB, gab mod p)proofA = h(SKEYID,ga,gb,IC,RC,CP,“Alice”)AliceAliceBobIC, CPIC,RC, CSIC,RC, ga m
13、od p, RAIC,RC, E(“Alice”, proofA, K)IC,RC, gb mod p, RBIC,RC, E(“Bob”, proofB, K)IKE Phase 1: Public Key Signature (Aggressive Mode)Main difference from main modeNot trying to protect identitiesCannot negotiate g or pAliceBobIC, “Alice”, ga mod p, RA, CPIC,RC, “Bob”, RB, gb mod p, CS, proofBIC,RC, p
14、roofAMain vs Aggressive ModesMain mode MUST be implementedAggressive mode SHOULD be implementedIn other words, if aggressive mode is not implemented, “you should feel guilty about it”Might create interoperability issuesFor public key signature authenticationPassive attacker knows identities of Alice
15、 and Bob in aggressive modeActive attacker can determine Alices and Bobs identity in main modeIKE Phase 1: Symmetric Key (Main Mode)Same as signature mode exceptKAB = symmetric key shared in advance K = h(IC,RC,gab mod p,RA,RB,KAB)SKEYID = h(K, gab mod p)proofA = h(SKEYID,ga,gb,IC,RC,CP,“Alice”)Alic
16、eBobIC, CPIC,RC, CSIC,RC, ga mod p, RAIC,RC, E(“Alice”, proofA, K)IC,RC, gb mod p, RBIC,RC, E(“Bob”, proofB, K)Problems with Symmetric Key (Main Mode)Catch-22Alice sends her ID in message 5Alices ID encrypted with KTo find K Bob must know KABTo get KAB Bob must know hes talking to Alice!Result: Alic
17、es ID must be IP address!Useless mode for the “road warrior”Why go to all of the trouble of trying to hide identities in 6 message protocol?IKE Phase 1: SymmetricKey (Aggressive Mode)Same format as digital signature aggressive modeNot trying to hide identitiesAs a result, does not have problems of m
18、ain modeBut does not (pretend to) hide identitiesAliceBobIC, “Alice”, ga mod p, RA, CPIC,RC, “Bob”, RB, gb mod p, CS, proofBIC,RC, proofAIKE Phase 1: Public Key Encryption (Main mode)CP = crypto proposed, CS = crypto selectedIC = initiator “cookie”, RC = responder “cookie”K = h(IC,RC,gab mod p,RA,RB
19、)SKEYID = h(RA, RB, gab mod p)proofA = h(SKEYID,ga,gb,IC,RC,CP,“Alice”)AliceBobIC, CPIC,RC, CSIC,RC, ga mod p, RABob, “Alice”BobIC,RC, E(proofA, K)IC,RC, gb mod p, RBAlice, “Bob”AliceIC,RC, E(proofB, K)IKE Phase 1: Public Key Encryption (Aggressive Mode)K, proofA, proofB computed as in main modeNote
20、 that identities are hiddenThe only aggressive mode to hide identitiesThen why have main mode?AliceBobIC, CP, ga mod p,“Alice”Bob, RABobIC,RC, CS, gb mod p, “Bob”Alice, RBAlice, proofBIC,RC, proofAPublic Key Encryption Issue?Public key encryption, aggressive modeSuppose Trudy generatesExponents a an
21、d bNonces RA and RBTrudy can compute “valid” keys and proofs: gab mod p, K, SKEYID, proofA and proofBAlso true of main modePublic Key Encryption Issue?Trudyas AliceTrudyas BobTrudy can create exchange that appears to be between Alice and BobAppears valid to any observer, including Alice and Bob!IC,R
22、C, CS, gb mod p, “Bob”Alice, RBAlice, proofBIC,RC, proofAIC, CP, ga mod p,“Alice”Bob, RABobPlausible DeniabilityTrudy can create “conversation” that appears to be between Alice and BobAppears valid, even to Alice and Bob!A security failure?In this mode of IPSec, it is a featurePlausible deniability:
23、 Alice and Bob can deny that any conversation took place!In some cases it might be a security failureIf Alice makes a purchase from Bob, she could later repudiate it (unless she had signed) IKE Phase 1 CookiesCookies (or “anti-clogging tokens”) supposed to make denial of service more difficultNo rel
24、ation to Web cookiesTo reduce DoS, Bob wants to remain stateless as long as possibleBut Bob must remember CP from message 1 (required for proof of identity in message 6)Bob must keep state from 1st message on!These cookies offer little DoS protection!IKE Phase 1 SummaryResult of IKE phase 1 is Mutua
25、l authenticationShared symmetric keyIKE Security Association (SA)But phase 1 is expensive (in public key and/or main mode cases)Developers of IKE thought it would be used for lots of things not just IPSecPartly explains over-engineeringIKE Phase 2Phase 1 establishes IKE SAPhase 2 establishes IPSec S
26、AComparison to SSL SSL session is comparable to IKE Phase 1SSL connections are like IKE Phase 2IKE could be used for lots of thingsBut in practice, its not!IKE Phase 2Key K, IC, RC and SA known from Phase 1Proposal CP includes ESP and/or AHHashes 1,2,3 depend on SKEYID, SA, RA and RBKeys derived fro
27、m KEYMAT = h(SKEYID,RA,RB,junk)Recall SKEYID depends on phase 1 key methodOptional PFS (ephemeral Diffie-Hellman exchange)AliceBobIC,RC,CP,E(hash1,SA,RA,K)IC,RC,CS,E(hash2,SA,RB,K)IC,RC,E(hash3,K)IPSecAfter IKE Phase 1, we have an IKE SAAfter IKE Phase 2, we have an IPSec SABoth sides have a shared
28、symmetric keyNow what?We want to protect IP datagramsBut what is an IP datagram?From the perspective of IPSecIP ReviewWhere IP header is IP headerdataIP datagram is of the form IP and TCPConsider HTTP traffic (over TCP)IP encapsulates TCPTCP encapsulates HTTPIP headerTCP hdrHTTP hdrapp dataIP header
29、dataIP data includes TCP header, etc.IPSec Transport ModeIPSec Transport ModeIP headerdataIP headerESP/AHdataTransport mode designed for host-to-hostTransport mode is efficientAdds minimal amount of extra headerThe original header remainsPassive attacker can see who is talkingIPSec Tunnel ModeIPSec
30、Tunnel ModeIP headerdatanew IP hdrESP/AHIP headerdataTunnel mode for firewall to firewall trafficOriginal IP packet encapsulated in IPSecOriginal IP header not visible to attackerNew header from firewall to firewallAttacker does not know which hosts are talkingComparison of IPSec ModesTransport Mode
31、Tunnel ModeIP headerdataIP headerESP/AHdataIP headerdatanew IP hdrESP/AHIP headerdataTransport ModeHost-to-hostTunnel ModeFirewall-to-firewallTransport mode not necessaryTransport mode is more efficientCombining Security AssociationsSAs can implement either AH or ESPto implement both need to combine
32、 SAsform a security association bundlemay terminate at different or same endpointscombined bytransport adjacencyiterated tunnelingissue of authentication & encryption order IPSec ModesTransport Mode vs. Tunnel Mode EncryptionTransport Mode vs. Tunnel Mode EncryptionCombining Security AssociationsCom
33、bining Security AssociationsCombining Security AssociationsCombining Security AssociationsIPSec SecurityWhat kind of protection?Confidentiality?Integrity?Both?What to protect?Data?Header?Both?ESP/AH do some combinations of theseSSL vs IPSecIPSec discussed in next sectionLives at the network layer (p
34、art of the OS)Has encryption, integrity, authentication, etc.Is overly complex (including serious flaws)SSL (and IEEE standard known as TLS)Lives at socket layer (part of user space)Has encryption, integrity, authentication, etc.Has a simpler specificationSSL vs IPSecIPSec implementationRequires cha
35、nges to OS, but no changes to applicationsSSL implementationRequires changes to applications, but no changes to OSSSL built into Web application early on (Netscape)IPSec used in VPN applications (secure tunnel)Reluctance to retrofit applications for SSLReluctance to use IPSec due to complexity and i
36、nteroperability issuesResult? Internet less secure than it should be!KerberosKerberos trusted key server system from MIT provides centralised symmetric encryption third-party authentication in a distributed network allows users access to services distributed through network without needing to trust
37、all workstations rather all trust a central authentication server two versions in use: 4 & 5Kerberos Requirements its first report identified requirements as: secure reliable transparent scalable implemented using an authentication protocol based on Needham-SchroederMotivation for KerberosAuthentica
38、tion using public keysN users N key pairsAuthentication using symmetric keysN users requires about N2 keysSymmetric key case does not scale!Kerberos based on symmetric keys but only requires N keys for N usersBut must rely on TTPAdvantage is that no PKI is requiredKerberos KDCKerberos Key Distributi
39、on Center or KDCActs as a TTPTTP must not be compromised!KDC shares symmetric key KA with Alice, key KB with Bob, key KC with Carol, etc.Master key KKDC known only to KDCKDC enables authentication and session keysKeys for confidentiality and integrityIn practice, the crypto algorithm used is DESKerb
40、eros TicketsKDC issues a ticket containing info needed to access a network resourceKDC also issues ticket-granting tickets or TGTs that are used to obtain ticketsEach TGT containsSession keyUsers IDExpiration timeEvery TGT is encrypted with KKDCTGT can only be read by the KDCKerberized LoginAlice en
41、ters her passwordAlices workstationDerives KA from Alices passwordUses KA to get TGT for Alice from the KDCAlice can then use her TGT (credentials) to securely access network resourcesPlus: Security is transparent to AliceMinus: KDC must be secure its trusted!Kerberized LoginAliceAlicesAlice wantspa
42、ssword a TGTE(SA,TGT,KA)KDCKey KA derived from Alices passwordKDC creates session key SAWorkstation decrypts SA, TGT, forgets KATGT = E(“Alice”,SA, KKDC)ComputerAlice Requests Ticket to BobAliceTalk to BobI want totalk to BobREQUESTREPLYKDCREQUEST = (TGT, authenticator) whereauthenticator = E(timest
43、amp,SA)REPLY = E(“Bob”,KAB,ticket to Bob, SA)ticket to Bob = E(“Alice”,KAB,KB)KDC gets SA from TGT to verify timestampComputerAlice Uses Ticket to Bobticket to Bob, authenticatorE(timestamp + 1,KAB)ticket to Bob = E(“Alice”,KAB, KB)authenticator = E(timestamp, KAB)Bob decrypts “ticket to Bob” to get
44、 KAB which he then uses to verify timestampAlices ComputerBobKerberosSession key SA used for authentication Can also be used for confidentiality/integrityTimestamps used for mutual authenticationRecall that timestamps reduce number of messagesActs like a nonce that is known to both sidesNote: time is a security-critical parameter!Kerberos v4 Overview a basic third-party authentication scheme have an Authentication Server (AS) users initially negotiate with AS to identify self AS provides a non-corruptible authentication credentia
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年產(chǎn)品營(yíng)銷協(xié)議(2篇)
- 2025年個(gè)人果園承包合同(4篇)
- 2025年產(chǎn)品供應(yīng)與銷售代合同(三篇)
- 2025年買房書面合同協(xié)議范文(2篇)
- 2025年個(gè)人租房的合同常用版(4篇)
- 2025年產(chǎn)品委托銷售合同經(jīng)典版(三篇)
- 2025年個(gè)人工程合作協(xié)議范文(2篇)
- 農(nóng)業(yè)項(xiàng)目股權(quán)投資居間合同
- 旅游巴士燃油供應(yīng)協(xié)議
- 文化用品店裝修合同范本
- 2025年初中語文:春晚觀后感三篇
- Unit 7 第3課時(shí) Section A (Grammar Focus -4c)(導(dǎo)學(xué)案)-【上好課】2022-2023學(xué)年八年級(jí)英語下冊(cè)同步備課系列(人教新目標(biāo)Go For It!)
- 《教育強(qiáng)國(guó)建設(shè)規(guī)劃綱要(2024-2035年)》解讀講座
- 預(yù)算績(jī)效評(píng)價(jià)管理機(jī)構(gòu)入圍投標(biāo)文件(技術(shù)方案)
- 重大事故隱患判定標(biāo)準(zhǔn)與相關(guān)事故案例培訓(xùn)課件
- 2024年度節(jié)后復(fù)工建筑施工安全培訓(xùn)交底
- 民法原理與實(shí)務(wù)課程教學(xué)大綱
- 2019北師大版高中英語選擇性必修四單詞表
- 鋼筋混凝土框架結(jié)構(gòu)工程監(jiān)理的質(zhì)量控制
- 變更戶主情況登記表
- 民族主義與民粹主義
評(píng)論
0/150
提交評(píng)論