And Then There Were More:
Secure Communication for More Than Two Parties
David Naylor
Carnegie Mellon
Thomas Karagiannis
Microsoft Research
Christos Gkantsidis
Microsoft Research
Peter Steenkiste
Carnegie Mellon
Richard Li
University of Utah
And Then There Richard Li University of Utah Were More: Christos - - PowerPoint PPT Presentation
David Naylor Carnegie Mellon And Then There Richard Li University of Utah Were More: Christos Gkantsidis Microsoft Research Secure Communication for More Than Two Parties Thomas Karagiannis Microsoft Research Peter Steenkiste Carnegie
David Naylor
Carnegie Mellon
Thomas Karagiannis
Microsoft Research
Christos Gkantsidis
Microsoft Research
Peter Steenkiste
Carnegie Mellon
Richard Li
University of Utah
Web Cache Compression Proxy Intrusion Detection System Virus Scanner Parental Filter Load Balancer
In most networks,
[Making Middleboxes Someone Else’s Problem. SIGCOMM ’12]
In most networks,
New Security Properties
Other Properties
Extend TLS Security Properties
Data Secrecy Data Authentication Entity Authentication
1 2 3
Granularity of Data Access
Headers Body Headers
vs Definition of “Party” vs Definition of “Identity” vs
New Security Properties
Granularity of Data Access
Headers Body Headers
vs
Definition of “Party”
vs
Definition of “Identity”
vs
Other Properties
Extend TLS Security Properties
Authorization Path Integrity Data Change Secrecy
1 2 3
Granularity of Data Access
Headers Body Headers
vs
Definition of “Party”
vs
Definition of “Identity”
vs
Path Integrity
1 2 3
Data Change Secrecy Authorization
Properties
Extend TLS Security Properties
Other Properties
Computation Legacy Endpoints In-Band Discovery
v1.2 Arbitrary Limited
vs
Granularity of Data Access
Headers Body Headers
vs
Definition of “Party”
vs
Definition of “Identity”
vs
Path Integrity
1 2 3
Data Change Secrecy Authorization Legacy Endpoints
v1.2
In-Band Discovery Computation Arbitrary Limited vs
New Security Properties
Extend TLS Security Properties
Other Properties
New Security Properties
Extend TLS Security Properties
Other Properties
There’s a big design space for secure, multi-entity communication protocols
There’s a big design space for secure, multi-entity communication protocols There is no one-size-fits-all solution.
v1.2
vs
two legacy endpoints
endpoint authentication (owner or code)
v1.2
fine-grained data access
legacy support
Headers Body Headers
vs
[SIGCOMM ’15]
functional crypto (minimal data access)
arbitrary computation
Headers Body Headers
vs
Arbitrary Limited vs
[SIGCOMM ’15]
There’s a big design space for secure, multi-entity communication protocols There is no one-size-fits-all solution.
Interoperate with one legacy endpoint
Protect session data from middlebox infrastructure
(in addition to traditional network attackers)
Residential ISP Upgraded Server Server-Side Proxy Legacy Clients Legacy Endpoint
Outsourced Middlebox
Cloud Compute Provider Upgraded Client Client-Side Proxy Legacy Servers Legacy Endpoint
Outsourced Middlebox
Interoperate with one legacy endpoint
Protect session data from middlebox infrastructure
(in addition to traditional network attackers)
Protect session data from middlebox infrastructure
(in addition to traditional network attackers) Client R/W access Server R/W access Middlebox Infrastructure No access Middlebox Software R/W access Everyone Else No access
Interoperate with one legacy endpoint
Protect session data from middlebox infrastructure
(in addition to traditional network attackers)
Primary TLS Connection Secondary TLS Connection
Supports legacy endpoints ✔ Data and keys visible in RAM ✗
Program code, data, and stack encrypted. Prove to remote party that is working.
1
Primary TLS Connection Secondary TLS Connection
Supports legacy endpoints ✔ Data and keys visible in RAM ✗
SGX Enclave
TLS Handshake + Attestation
Supports legacy endpoints ✔ Data and keys encrypted in RAM ✔ Primary TLS Connection
ClientHello + MiddleboxSupportExtension ServerHello MiddleboxAnnouncement + MboxHello
MbtlsEncap
Original session key “bridges” client- and server-side middleboxes.
From SGX? From crypto?
Will existing network devices drop mbTLS handshake messages?
512 1K 2K 4K 8K 12K Record Size (Bytes) 2 4 6 8 10 Throughput (Gbps) No Enclave Enclave
Server 0.0 0.5 1.0 1.5 2.0 2.5 Server Computation Time (ms) TLS (no mbox) mbTLS (1 server mbox) mbTLS (2 server mboxes) mbTLS (3 server mboxes)
TLS
no mbox
mbTLS
1 mbox
mbTLS
2 mbox
mbTLS
3 mbox
Drop handshake?
No handshakes were dropped.
enterprise
networks
networks
networks
networks
colocation
networks
public
network
networks
data center
networks
unlabeled
networks
David Naylor
Carnegie Mellon
Thomas Karagiannis
Microsoft Research
Christos Gkantsidis
Microsoft Research
Peter Steenkiste
Carnegie Mellon
Richard Li
University of Utah