Chapter 16: 1
Computer Security 3e
Dieter Gollmann
Security.di.unimi.it/sicurezza1415/
Computer Security 3e Dieter Gollmann - - PowerPoint PPT Presentation
Computer Security 3e Dieter Gollmann Security.di.unimi.it/sicurezza1415/ Chapter 16: 1 Chapter 16: Communications Security Chapter 16: 2 Agenda Threat model Secure tunnels Protocol design principles IPsec SSL/TLS EAP
Chapter 16: 1
Security.di.unimi.it/sicurezza1415/
Chapter 16: 2
Chapter 16: 3
Chapter 16: 4
we talk about eavesdropping, wiretapping, or sniffing.
may be possible even when attacker cannot read individual messages.
Chapter 16: 5
Chapter 16: 6
attacker may wait at the other side of the tunnel.
Chapter 16: 7
Chapter 16: 8
Application Presentation Session Transport Network Data Link Physical Application TCP IP Network Interface 1 2 3 4 5 1 2 3 4 6 5 7
Hardware
Chapter 16: 9
(N)-PDU header trailer payload
(N)-PDU header trailer payload
Chapter 16: 10
to the security facilities provided.
Chapter 16: 11
techniques for limited privacy.
protocols above.
Chapter 16: 12
by intermediate gateways or host OS.
Chapter 16: 13
IP datagram
Header Payload
IP datagram
Header Payload
Chapter 16: 14
datagram.
Chapter 16: 15
Inner IP datagram
Header Payload
Inner IP datagram
Header Payload Payload Outer Header Header Payload Outer Header Header
Chapter 16: 16
protocol in the 1990s have faded.
Chapter 16: 17
Chapter 16: 18
not protected by encryption.
header.
Chapter 16: 19
and keys are to be used for IPsec processing (more later).
disguise payload length).
Chapter 16: 20
Authentication Data (variable number of 32-bit words) Security Parameters Index (SPI) Sequence Number Payload data (variable) Padding (0 – 255 bytes) Length Next header
Chapter 16: 21
ESP hdr
SPI, seqno
Payload (eg TCP, UDP, ICMP)
MAC scope Original IP header ESP trlr ESP auth Encryption scope ESP hdr
SPI, seqno
Payload (eg TCP, UDP, ICMP) Inner IP header
Outer IP header ESP trlr ESP auth MAC scope Encryption scope
Chapter 16: 22
sender to this receiver.
Chapter 16: 23
datagram without tunnelling.
tunnels; each level has its own SA; each tunnel can begin/end at different IPsec site along route.
Chapter 16: 24
Local network
Outer Tunnel
Security Gateway
Inner tunnel
Internet server remote host
Chapter 16: 25
{ESP,AH} {tunnel,transport} {sender, receiver}.
hopeless for reasonably sized networks of IPsec-aware hosts; requires manual re-keying.
Chapter 16: 26
and MAC algorithms, hash algorithms.
Chapter 16: 27
MACed?
(ranges of addresses), transport layer protocol, transport layer port numbers,…
Chapter 16: 28
indicate whether the SA lookup makes use of the destination, or destination and source IP addresses in addition to the SPI.
that the entry that matches the “longest” SA identifier is found.
address}; if an SAD entry matches, then process the inbound packet with that entry.
address}; if an SAD entry matches, then process the inbound packet with that entry.
has chosen to maintain a single SPI space for AH and ESP, or on {SPI, protocol} otherwise; if an SAD entry matches, then process the inbound packet with that entry.
Chapter 16: 29
Look up SPD to find policy for packet Create new SA if needed Encrypt/MA C using keys from SA Pass packet down to Link Layer Pass packet to next instance of IPsec processing More IPsec processing required? Drop, pass through
packet?
Chapter 16: 30
Chapter 16: 31
Chapter 16: 32
second layer.
Specification Protocol, Alert Protocol, HTTP, any other application protocols.
Chapter 16: 33
Protocol.
Chapter 16: 34
hash algorithm, master secret, certificates).
expensive handshake protocol.
encryption, IVs, sequence numbers.
secret created during handshake protocol.
Chapter 16: 35
encryption key from Server certificate.
pre_master_secret, and construct correct finished message.
Chapter 16: 36
Chapter 16: 37
algorithms, hash functions.
Chapter 16: 38
acceptable root of trust.
Chapter 16: 39
Chapter 16: 40
pre_master_secret in M3.
Chapter 16: 41
pre_master_secret the server’s private key is needed to decrypt ClientKeyExchange
using key derived from pre_master_secret.
Chapter 16: 42
Chapter 16: 43
Chapter 16: 44
implements EAP.
authentication, an EAP method such as EAP-TLS or EAP- TTLS has to be defined.
Chapter 16: 45
Chapter 16: 46
Repeat as many rounds as needed to complete EAP- methods Identity exchange message (can be skipped). Success/Failure message EAP peer Authentication server EAP-Request/Identity EAP-Response/Identity EAP-Request/EAP-Type = X (...) (method specific payload) EAP-Response/EAP-Type = X (...) (method specific payload) EAP-Success/EAP-Failure
Chapter 16: 47
Chapter 16: 48
EAP peer Authentication server
Certificate, Server Key Exchange, ServerHelloDone)
(ClientKeyExchange, ChangeCipherSpec, Finished)
(ChangeCipherSpec, finished)
({UserName}, {CHAP-Challenge}, {CHAP-Password})