Title: Security
1Security
- Yih-Kuen Tsay
- Dept. of Information Management
- National Taiwan University
2Introduction
- Security Needs
- Secrecy (confidentiality), integrity, etc.
- Arise from the desire to share resources
- Security Policies
- Specify who are authorized to access what
resources - Independent of the technology used
- Security Mechanisms
- Enforce security policies
- Security Models
- Help understand and analyze the above
3Components of a Security Model
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
4The Enemy in Network Security
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
5Familiar Names in the Security Literature
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
6Classes of Security Threats
- Leakage
- Acquisition of information by unauthorized
parties - Tampering (Modification)
- Unauthorized alteration of information
- Vandalism
- Interference with the proper operation without
gain to the perpetrator
7Methods of Attack
- Eavesdropping
- Release of message contents and traffic analysis
- Masquerading
- Message Tampering (Modification)
- Man-in-the-middle attack
- Replaying
- Denial of Service
- Mobile Code
8Designing Secure Systems
- Use best standards available
- Informal analysis and checks
- Formal validation
- Security logs and auditing
9Security Requirements
- Secrecy (Confidentiality)
- Data Integrity
- Authentication
- Non-repudiation
- Availability
-
10The Secret-Key Encryption Model
Source W. Stallings, Cryptography and Network
Security
11The Public-Key Encryption Model
Source W. Stallings, Cryptography and Network
Security
12The Public-Key Authentication Model
Source W. Stallings, Cryptography and Network
Security
13Notational Conventions
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
14Alices Bank Account Certificate
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
15A Public Key Certificate of Bobs Bank
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
16A Scheme of Cipher Block Chaining
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
17A Stream Cipher
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
18Digital Signatures with Secret Keys
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
19Digital Signatures with Public Keys
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
20Performance of Encryption Algorithms
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
21The Needham-Schroeder Authentication Protocol
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
22Kerberos
- Developed at MIT (Project Athena)
- For protecting networked services
- Based on the Needham-Schroeder protocol
- Current version Kerberos Version 5
- Source code available
- Also used in OSF DCE, Windows 2000, ...
- Probable extension for the initial authentication
of principals
23Kerberos Architecture
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
24The Kerberos Protocol
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
25The Kerberos Protocol (cont.)
auth(C) contains C,t. ticket(C,S) contains
C,S,t1,t2,KCS.
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
26Critiques of Kerberos
- Synchronization of clients and servers clocks
(Version 4) - Unique timestamps or sequence numbers as nonces
- Limited session lifetimes
27TLS/SSL
- The Secure Sockets Layer (SSL) protocol
originated from Netscape, now a nonproprietary
standard (SSLv3) - An extension of SSL became the Transport Layer
Security (TLS) protocol (RFC 2246) - Provides secure end-to-end communications
- Operates between TCP/IP (or any other reliable
transport protocol) and the application - Built into most browsers and servers
28The TLS/SSL Protocol Stack
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
29How SSL/TLS Works
- Sessions between a client and a server are
established by the Handshake Protocol - A session defines a set of security parameters,
including peer certificate, cipher spec, and
master secret - Multiple connections can be established within a
session, each defining further security
parameters such as keys for encryption and
authentication - Security parameters dictate how application data
are processed by the SSL Record Protocol into TCP
segments
30Security Functions of SSL/TLS
- Confidentiality using one of DES, Triple DES,
IDEA, RC2, RC4, - Integrity using MAC with MD5 or SHA-1
- Authentication using X.509v3 digital certificates
31The SSL/TLS Handshake Protocol
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
32SSL/TLS Handshake Configuration Options
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
33The SSL/TLS Record Protocol
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
34Wired Equivalent Privacy (WEP)
- Access control by a challenge-response protocol
- A single key shared by the base station and all
authorized devices - Encryption based on RC4
- The access key also used for encryption
35RC4 in IEEE 802.11 WEP
- Note The IV is only 24-bit long and is sent in
clear.
Source G. Coulouris et al., Distributed Systems
Concepts and Design, Fourth Edition.
36Weaknesses in WEP
- The sharing of a single key
- Base stations never authenticated
- Inappropriate use of a stream cipher
- Key lengths of 40 bits and 64 bits
- Weakness of RC4
- The users likely lack of awareness
- Solution WPA (Wi-Fi Protected Access)
- and 802.11i WPA2
37Micropayments
- The price of some goods may be lower than the
standard transaction fees - Micropayments offer a way for selling small-value
products and services - Technology providers eCharge (via phone bills),
Qpass (monthly bills), Millicent (prepay
electronic cash), ...