distributed systems
play

Distributed Systems Principles and Paradigms Chapter 09 (version - PDF document

Distributed Systems Principles and Paradigms Chapter 09 (version April 7, 2008 ) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20. Tel: (020) 598 7784 E-mail:steen@cs.vu.nl,


  1. Distributed Systems Principles and Paradigms Chapter 09 (version April 7, 2008 ) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.20. Tel: (020) 598 7784 E-mail:steen@cs.vu.nl, URL: www.cs.vu.nl/ ∼ steen/ 01 Introduction 02 Architectures 03 Processes 04 Communication 05 Naming 06 Synchronization 07 Consistency and Replication 08 Fault Tolerance 09 Security 10 Distributed Object-Based Systems 11 Distributed File Systems 12 Distributed Web-Based Systems 13 Distributed Coordination-Based Systems 00 – 1 /

  2. Overview • Introduction • Secure channels • Access control • Security management 09 – 1 Security/

  3. Security: Dependability Revisited Basics: A component provides services to clients . To provide services, the component may require the services from other components ⇒ a component may depend on some other component. Property Description Availability Accessible and usable upon demand for authorized entities Reliability Continuity of service delivery Safety Very low probability of catastrophes Confidentiality No unauthorized disclosure of information Integrity No accidental or malicious alterations of information have been performed (even by authorized entities) Observation: In distributed systems, security is the combination of availability, integrity, and confidential- ity. A dependable distributed system is thus fault tol- erant and secure. 09 – 2 Security/9.1 Introduction

  4. Security Threats Subject: Entity capable of issuing a request for a ser- vice as provided by objects Channel: The carrier of requests and replies for ser- vices offered to subjects Object: Entity providing services to subjects. Channels and objects are subject to security threats : Threat Channel Object Interruption Preventing message Denial of service transfer Inspection Reading the content Reading the data of transferred contained in an messages object Modification Changing message Changing an object’s content encapsulated data Fabrication Inserting messages Spoofing an object 09 – 3 Security/9.1 Introduction

  5. Security Mechanisms Issue: To protect against security threats, we have a number of security mechanisms at our disposal: Encryption: Transform data into something that an attacker cannot understand (confidentiality). It is also used to check whether something has been modified (integrity). Authentication: Verify the claim that a subject says it is S : verifying the identity of a subject. Authorization: Determining whether a subject is per- mitted to make use of certain services. Auditing: Trace which subjects accessed what, and in which way. Useful only if it can help catch an attacker. Note: authorization makes sense only if the request- ing subject has been authenticated 09 – 4 Security/9.1 Introduction

  6. Security Policies (1/2) Policy: Prescribes how to use mechanisms to protect against attacks. Requires that a model of possible attacks is described (i.e., security architecture ). Example: Globus security architecture • There are multiple administrative domains • Local operations subject to local security policies • Global operations require requester to be globally known • Interdomain operations require mutual authenti- cation • Global authentication replaces local authentica- tion • Users can delegate privileges to processes • Credentials can be shared between processes in the same domain 09 – 5 Security/9.1 Introduction

  7. Security Policies (2/2) Policy statements leads to the introduction of mech- anisms for cross-domain authentication and making users globally known ⇒ user proxies and resource proxies Protocol 3: Allocation of a resource Proxy creates by a process in remote domain process Domain Domain Resource proxy Resource proxy Process Process Local security Local security policy and policy and mechanisms mechanisms Process Process Global-to-local Global-to-local mapping of IDs mapping of IDs Process User must be Protocol 4: spawns known in domain Making user known child process in remote domain Protocol 2: User proxy Allocation of a resource by the user in a remote domain Protocol 1: Creation of user proxy Domain User 09 – 6 Security/9.1 Introduction

  8. Design Issue: Focus of Control Essence: What is our focus when talking about pro- tection: (a) data, (b) invalid operations, (c) unautho- rized users Data is protected against Data is protected against wrong or invalid operations unauthorized invocations State Object Invocation Method (a) (b) Data is protected by checking the role of invoker (c) Note: We generally need all three, but each requires different mechanisms 09 – 7 Security/9.1 Introduction

  9. Design Issue: Layering of Mechanisms and TCB Essence: At which logical level are we going to im- plement security mechanisms? Application Application High-level protocols Middleware Middleware OS Services OS Services Transport Transport OS kernel OS kernel Network Network Low-level protocols Datalink Datalink Hardware Hardware Physical Physical Network Important: Whether security mechanisms are actu- ally used is related to the trust a user has in those mechanisms. No trust ⇒ implement your own mech- anisms. Trusted Computing Base: What is the set of mech- anisms needed to enforce a policy. The smaller, the better. 09 – 8 Security/9.1 Introduction

  10. Cryptography Passive intruder Active intruder Active intruder only listens to C can alter messages can insert messages Encryption Ciphertext Decryption Plaintext, P Plaintext method method C = E (P) K Encryption Decryption key, E key, D Receiver Sender K K Symmetric system: Use a single key to (1) encrypt the plaintext and (2) decrypt the ciphertext. Re- quires that sender and receiver share the secret key. Asymmetric system: Use different keys for encryp- tion and decryption, of which one is private , and the other public . Hashing system: Only encrypt data and produce a fixed-length digest. There is no decryption; only comparison is possible. 09 – 9 Security/9.1 Introduction

  11. Cryptographic Functions (1/2) Essence: Make the encryption method E public, but let the encryption as a whole be parameterized by means of a key S (Same for decryption) One-way function: Given some output m out of E S , it is (analytically or) computationally infeasible to find m in : E S ( m in ) = m out Weak collision resistance: Given a pair � m , E S ( m ) � , it is computationally infeasible to find an m ∗ � = m such that E S ( m ∗ ) = E S ( m ) Strong collision resistance: It is computationally in- feasible to find any two different inputs m and m ∗ such that E S ( m ) = E S ( m ∗ ) 09 – 10 Security/9.1 Introduction

  12. Cryptographic Functions (2/2) One-way key: Given an encrypted message m out , mes- sage m in , and encryption function E , it is analyti- cally and computationally infeasible to find a key K such that m out = E K ( m in ) Weak key collision resistance: Given a triplet � m , S , E � , it is computationally infeasible to find an K ∗ � = K such that E K ∗ ( m ) = E K ( m ) Strong key collision resistance: It is computation- ally infeasible to find any two different keys K and K ∗ such that for all m : E K ( m ) = E K ∗ ( m ) Note: Not all cryptographic functions have keys (such as hash functions) 09 – 11 Security/9.1 Introduction

  13. Secure Channels • Authentication • Message Integrity and confidentiality • Secure group communication 09 – 12 Security/9.2Secure Channels

  14. Secure Channels Goal: Set up a channel allowing for secure communi- cation between two processes: A B Confidential channel D C B Authenticated and� A C tamperproof channel D Secure channel A B • They both know who is on the other side (authen- ticated). • They both know that messages cannot be tam- pered with (integrity). • They both know messages cannot leak away (con- fidentiality). 09 – 13 Security/9.2Secure Channels

  15. Authentication versus Integrity Note: Authentication and data integrity rely on each other: Consider an active attack by Trudy on the com- munication from Alice to Bob. Authentication without integrity: Alice’s message is authenticated, and intercepted by Trudy, who tam- pers with its content, but leaves the authentication part as is. Authentication has become meaning- less. Integrity without authentication: Trudy intercepts a message from Alice, and then makes Bob believe that the content was really sent by Trudy. Integrity has become meaningless. Question: What can we say about confidentiality ver- sus authentication and integrity? 09 – 14 Security/9.2Secure Channels

  16. Authentication: Secret Keys 1 A 2 R B Alice 3 ( ) K A,B R B Bob 4 R A 5 ( ) K A,B R A 1: Alice sends ID to Bob 2: Bob sends challenge R B (i.e. a random number) to Alice 3: Alice encrypts R B with shared key K A,B . Now Bob knows he’s talking to Alice 4: Alice send challenge R A to Bob 5: Bob encrypts R A with K A,B . Now Alice knows she’s talking to Bob Note: We can “improve” the protocol by combining steps 1&4, and 2&3. This costs only the correctness. 09 – 15 Security/9.2Secure Channels

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend