Evaluating Network Security Using Internet-wide Measurements Oliver - - PowerPoint PPT Presentation

evaluating network security using internet wide
SMART_READER_LITE
LIVE PREVIEW

Evaluating Network Security Using Internet-wide Measurements Oliver - - PowerPoint PPT Presentation

Chair of Network Architectures and Services Department of Informatics Technical University of Munich Evaluating Network Security Using Internet-wide Measurements Oliver Gasser Ph. D. Defense, Friday 24 th May, 2019 Chairman: Prof. Dr. Jrg


slide-1
SLIDE 1

Chair of Network Architectures and Services Department of Informatics Technical University of Munich

Evaluating Network Security Using Internet-wide Measurements

Oliver Gasser

  • Ph. D. Defense, Friday 24th May, 2019

Chairman: Prof. Dr. Jörg Ott Examiners: Prof. Dr.-Ing. Georg Carle

  • Prof. Anja Feldmann, Ph. D.
slide-2
SLIDE 2

Motivation

2

slide-3
SLIDE 3

Motivation

3

slide-4
SLIDE 4

Motivation

3

slide-5
SLIDE 5

Motivation

3

slide-6
SLIDE 6

Motivation

The Internet

  • Internet measurements can be leveraged to empirically assess security of
  • protocols,
  • devices,
  • implementations, and
  • configurations
  • Vast IPv6 address space poses big challenge for Internet measurements

4

slide-7
SLIDE 7

Motivation

The Internet

  • Internet measurements can be leveraged to empirically assess security of
  • protocols,
  • devices,
  • implementations, and
  • configurations
  • Vast IPv6 address space poses big challenge for Internet measurements

Goals

  • Improve measurement methodology for Internet-wide security measurements
  • IPv4 and IPv6
  • Empirically assess security of three different protocols
  • HTTPS
  • BACnet
  • IPMI

4

slide-8
SLIDE 8

Research questions

5

slide-9
SLIDE 9

Research questions

RQ I RQ II RQ III RQ IV RQ V

6

slide-10
SLIDE 10

Research questions

RQ I: How can we perform Internet-scale IPv6 measurements? ZMapv6 goscanner RQ II RQ III RQ IV RQ V

6

slide-11
SLIDE 11

Research questions

RQ I: How can we perform Internet-scale IPv6 measurements? ZMapv6 goscanner RQ II: How biased are address sources for IPv6 hitlists? Passive sources Active sources Biases in sources IPv6 Hitlist Service RQ III RQ IV RQ V

6

slide-12
SLIDE 12

Research questions

RQ I: How can we perform Internet-scale IPv6 measurements? ZMapv6 goscanner RQ II: How biased are address sources for IPv6 hitlists? Passive sources Active sources Biases in sources IPv6 Hitlist Service RQ III: Are HTTPS servers still vulnerable to MitM attacks? Certificate security HTTPS security RQ IV RQ V

6

slide-13
SLIDE 13

Research questions

RQ I: How can we perform Internet-scale IPv6 measurements? ZMapv6 goscanner RQ II: How biased are address sources for IPv6 hitlists? Passive sources Active sources Biases in sources IPv6 Hitlist Service RQ III: Are HTTPS servers still vulnerable to MitM attacks? Certificate security HTTPS security RQ IV: Are BACnet devices vulnerable to amplification attacks? Deployment Amplification Notification RQ V

6

slide-14
SLIDE 14

Research questions

RQ I: How can we perform Internet-scale IPv6 measurements? ZMapv6 goscanner RQ II: How biased are address sources for IPv6 hitlists? Passive sources Active sources Biases in sources IPv6 Hitlist Service RQ III: Are HTTPS servers still vulnerable to MitM attacks? Certificate security HTTPS security RQ IV: Are BACnet devices vulnerable to amplification attacks? Deployment Amplification Notification RQ V: Are IPMI devices vulnerable to MitM attacks? Deployment TLS security

6

slide-15
SLIDE 15

Research questions

RQ I: How can we perform Internet-scale IPv6 measurements? Chapter 3 ZMapv6 goscanner RQ II: How biased are address sources for IPv6 hitlists? Chapter 4 Passive sources Active sources Biases in sources IPv6 Hitlist Service RQ III: Are HTTPS servers still vulnerable to MitM attacks? Chapter 5 Certificate security HTTPS security RQ IV: Are BACnet devices vulnerable to amplification attacks? Chapter 6 Deployment Amplification Notification RQ V: Are IPMI devices vulnerable to MitM attacks? Chapter 7 Deployment TLS security

6

slide-16
SLIDE 16

Research questions

RQ I: How can we perform Internet-scale IPv6 measurements? Chapter 3 ZMapv6 goscanner RQ II: How biased are address sources for IPv6 hitlists? Chapter 4 Passive sources Active sources Biases in sources IPv6 Hitlist Service RQ III: Are HTTPS servers still vulnerable to MitM attacks? Chapter 5 Certificate security HTTPS security RQ IV: Are BACnet devices vulnerable to amplification attacks? Chapter 6 Deployment Amplification Notification RQ V: Are IPMI devices vulnerable to MitM attacks? Chapter 7 Deployment TLS security

6

slide-17
SLIDE 17

RQ II: How biased are address sources for IPv6 hitlists?

7

slide-18
SLIDE 18

RQ II: How biased are address sources for IPv6 hitlists?

Motivation

  • IPv6 address space too large to perform brute-force measurements
  • Assemble lists of IPv6 target addresses: IPv6 hitlists

8

slide-19
SLIDE 19

RQ II: How biased are address sources for IPv6 hitlists?

Motivation

  • IPv6 address space too large to perform brute-force measurements
  • Assemble lists of IPv6 target addresses: IPv6 hitlists

Measurements & analyses

  • Passive and active measurements
  • Empirical analysis of different types of biases
  • Weekly patterns
  • Different host populations
  • Different number of addresses
  • Over-representation of certain prefixes

8

slide-20
SLIDE 20

RQ II: How biased are address sources for IPv6 hitlists?

IPv6 hitlist passive sources: new IPv6 addresses per day

2 1 5

  • 9
  • 3

2 1 5

  • 9
  • 4

2 1 5

  • 9
  • 5

2 1 5

  • 9
  • 6

2 1 5

  • 9
  • 7

2 1 5

  • 9
  • 8

2 1 5

  • 9
  • 9

2 1 5

  • 9
  • 1

2 1 5

  • 9
  • 1

1 2 1 5

  • 9
  • 1

2 2 1 5

  • 9
  • 1

3 2 1 5

  • 9
  • 1

4 2 1 5

  • 9
  • 1

5 2 1 5

  • 9
  • 1

6 Date 10 20 30 40 50 60 70 80 90 100 % of unique IPs per day that are new Weekend Weekend Weekend Weekend 10 20 30 40 50 60 70 80 90 100

IXP MWN

9

slide-21
SLIDE 21

RQ II: How biased are address sources for IPv6 hitlists?

IPv6 hitlist passive sources: new IPv6 addresses per day

2 1 5

  • 9
  • 3

2 1 5

  • 9
  • 4

2 1 5

  • 9
  • 5

2 1 5

  • 9
  • 6

2 1 5

  • 9
  • 7

2 1 5

  • 9
  • 8

2 1 5

  • 9
  • 9

2 1 5

  • 9
  • 1

2 1 5

  • 9
  • 1

1 2 1 5

  • 9
  • 1

2 2 1 5

  • 9
  • 1

3 2 1 5

  • 9
  • 1

4 2 1 5

  • 9
  • 1

5 2 1 5

  • 9
  • 1

6 Date 10 20 30 40 50 60 70 80 90 100 % of unique IPs per day that are new Weekend Weekend Weekend Weekend 10 20 30 40 50 60 70 80 90 100

IXP MWN

  • Large share of new addresses each day hints at privacy extensions

9

slide-22
SLIDE 22

RQ II: How biased are address sources for IPv6 hitlists?

IPv6 hitlist passive vs. active sources: Hamming weight distribution

2 4 6 8 10 40 42

N (31.5, 15.75)

Frequency [%] 10 20 30 40 50 60 Number of IID bits set to '1' (IXP)

10

slide-23
SLIDE 23

RQ II: How biased are address sources for IPv6 hitlists?

IPv6 hitlist passive vs. active sources: Hamming weight distribution

2 4 6 8 10 40 42

N (31.5, 15.75)

Frequency [%] 10 20 30 40 50 60 Number of IID bits set to '1' (IXP)

N (31.5, 15.75)

Number of IID bits set to '1' (Traceroute) 2 4 6 8 10 40 42 Frequency [%] 10 20 30 40 50 60

10

slide-24
SLIDE 24

RQ II: How biased are address sources for IPv6 hitlists?

IPv6 hitlist passive vs. active sources: Hamming weight distribution

2 4 6 8 10 40 42

N (31.5, 15.75)

Frequency [%] 10 20 30 40 50 60 Number of IID bits set to '1' (IXP)

N (31.5, 15.75)

Number of IID bits set to '1' (Traceroute) 2 4 6 8 10 40 42 Frequency [%] 10 20 30 40 50 60

  • Different host populations: clients at IXP (privacy extensions) vs. routers (manually as-

signed addresses)

10

slide-25
SLIDE 25

RQ II: How biased are address sources for IPv6 hitlists?

IPv6 hitlist active sources: Cumulative address runup

Domainlists DNS ANY CT AXFR Bitnodes RIPE Atlas Traceroute 60 M 50 M 40 M 30 M 10 M 20 M 2 1 7

  • 8

2 1 7

  • 1

2 1 7

  • 1

2 2 1 8

  • 2

2 1 8

  • 4

11

slide-26
SLIDE 26

RQ II: How biased are address sources for IPv6 hitlists?

IPv6 hitlist active sources: Cumulative address runup

Domainlists DNS ANY CT AXFR Bitnodes RIPE Atlas Traceroute 60 M 50 M 40 M 30 M 10 M 20 M 2 1 7

  • 8

2 1 7

  • 1

2 1 7

  • 1

2 2 1 8

  • 2

2 1 8

  • 4
  • Many addresses from domainlists, CT, and traceroutes
  • Rapid increase of traceroute addresses due to CPE routers

11

slide-27
SLIDE 27

RQ II: How biased are address sources for IPv6 hitlists?

Taxonomy

  • Alias: another address of the same host
  • Aliased prefix: whole prefix bound to the same host
  • Bias: some hosts overrepresented due to aliased prefixes

2001:0db8:0407:8000::/64

2001:0db8:0407:8000: 0 151:2900:77e9:03a8 2001:0db8:0407:8000: 1 5ab:3855:92a0:2341 2001:0db8:0407:8000: e aae:cb10:9321:ba76 2001:0db8:0407:8000: f 693:2443:915e:1d2e 16 branches (random IPs)

12

slide-28
SLIDE 28

RQ II: How biased are address sources for IPv6 hitlists?

Taxonomy

  • Alias: another address of the same host
  • Aliased prefix: whole prefix bound to the same host
  • Bias: some hosts overrepresented due to aliased prefixes

Aliased prefix detection

2001:0db8:0407:8000::/64

2001:0db8:0407:8000: 0 151:2900:77e9:03a8 2001:0db8:0407:8000: 1 5ab:3855:92a0:2341 2001:0db8:0407:8000: e aae:cb10:9321:ba76 2001:0db8:0407:8000: f 693:2443:915e:1d2e 16 branches (random IPs)

12

slide-29
SLIDE 29

RQ II: How biased are address sources for IPv6 hitlists?

Detected aliased prefixes

13

slide-30
SLIDE 30

RQ II: How biased are address sources for IPv6 hitlists?

Detected aliased prefixes

  • Only 3.2 % of prefixes are aliased
  • But 46.6 % of addresses are in aliased prefixes → bias

13

slide-31
SLIDE 31

RQ II: How biased are address sources for IPv6 hitlists?

14

slide-32
SLIDE 32

RQ II: How biased are address sources for IPv6 hitlists?

  • Daily publication
  • Responsive IPv6 addresses for 5 protocol-port combinations
  • Aliased and non-aliased IPv6 prefixes
  • Dozens of fellow researchers have access

14

slide-33
SLIDE 33

RQ II: How biased are address sources for IPv6 hitlists?

Summary

  • Identified different types of biases in IPv6 hitlist sources
  • Distort targets by almost 50 %
  • Biases can be detected
  • IPv6 Hitlist Service provides fellow researchers with access to daily IPv6 address data

Publications (this research question)

  • Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, and Georg Carle, “Clusters

in the Expanse: Understanding and Unbiasing IPv6 Hitlists”, IMC’18.

  • Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle, “Scanning the IPv6 Internet: Towards a Comprehensive Hitlist”, TMA’16.

15

slide-34
SLIDE 34

Research questions

RQ I: How can we perform Internet-scale IPv6 measurements? Chapter 3 ZMapv6 goscanner RQ II: How biased are address sources for IPv6 hitlists? Chapter 4 Passive sources Active sources Biases in sources IPv6 Hitlist Service RQ III: Are HTTPS servers still vulnerable to MitM attacks? Chapter 5 Certificate security HTTPS security RQ IV: Are BACnet devices vulnerable to amplification attacks? Chapter 6 Deployment Amplification Notification RQ V: Are IPMI devices vulnerable to MitM attacks? Chapter 7 Deployment TLS security

16

slide-35
SLIDE 35

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

17

slide-36
SLIDE 36

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

18

slide-37
SLIDE 37

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

Motivation

  • HTTPS ecosystem experienced many security issues which allow for MitM attacks (e.g.,

misissued certificates, weak keys, CA breaches)

  • A number of HTTPS security extensions have been proposed to make the HTTPS ecosys-

tem more secure

19

slide-38
SLIDE 38

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

Motivation

  • HTTPS ecosystem experienced many security issues which allow for MitM attacks (e.g.,

misissued certificates, weak keys, CA breaches)

  • A number of HTTPS security extensions have been proposed to make the HTTPS ecosys-

tem more secure Measurements & analyses

  • Active measurements
  • Empirical analysis of different HTTPS ecosystem weaknesses
  • Insecure certificates
  • Downgrade from HTTPS to HTTP
  • Misissued certificates

19

slide-39
SLIDE 39

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

Baseline Requirements (BRs)

  • Rules regarding certificates and issuing processes which CAs adhere to
  • Devised within the CA/Browser Forum
  • Each requirement has an enforcement date

20

slide-40
SLIDE 40

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

Baseline Requirements (BRs)

  • Rules regarding certificates and issuing processes which CAs adhere to
  • Devised within the CA/Browser Forum
  • Each requirement has an enforcement date

Analyze BR adherence of all certificates in Certificate Transparency (CT) logs

  • Must not use 1024 bit keys
  • Must not use SHA-1 signature algorithm
  • Must contain SAN in addition to CN

20

slide-41
SLIDE 41

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

BR violations of certificates in CT logs

1 9 9 6

  • 1

1 9 9 8

  • 1

2

  • 1

2 2

  • 1

2 4

  • 1

2 6

  • 1

2 8

  • 1

2 1

  • 1

2 1 2

  • 1

2 1 4

  • 1

2 1 6

  • 1

2 1 8

  • 1

2 2

  • 1

Time 101 102 103 104 105 106 107 108 Valid CT certificates at time 1024-bit RSA keys SHA-1 sig. alg. Only CN, no SAN

21

slide-42
SLIDE 42

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

BR violations of certificates in CT logs

1 9 9 6

  • 1

1 9 9 8

  • 1

2

  • 1

2 2

  • 1

2 4

  • 1

2 6

  • 1

2 8

  • 1

2 1

  • 1

2 1 2

  • 1

2 1 4

  • 1

2 1 6

  • 1

2 1 8

  • 1

2 2

  • 1

Time 101 102 103 104 105 106 107 108 Valid CT certificates at time 1024-bit RSA keys SHA-1 sig. alg. Only CN, no SAN

  • Enforcement of stricter rules helps curb the number of insecure certificates
  • But: Many valid insecure certificates are found in CT logs

21

slide-43
SLIDE 43

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

HTTP Strict Transport Security (HSTS) deployment

22

slide-44
SLIDE 44

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

HTTP Strict Transport Security (HSTS) deployment

  • Significant usage among top domains
  • Preloading highly used among top domains, smaller usage among general population

22

slide-45
SLIDE 45

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

HTTP Public Key Pinning (HPKP) deployment

23

slide-46
SLIDE 46

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

HTTP Public Key Pinning (HPKP) deployment

  • Low usage among general population
  • High usage through preloading among top domains

23

slide-47
SLIDE 47

RQ III: Are HTTPS servers still vulnerable to MitM attacks?

Summary

  • Thousands of insecure certificates are still valid
  • High usage of HSTS and HPKP among top domains, mostly due to preloading
  • Insecure certificates and lack of HTTPS security techniques make hosts vulnerable to

Man-in-the-Middle attacks

Publications (this research question)

  • Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, and Georg Carle, “In Log We Trust: Revealing

Poor Security Practices with Certificate Transparency Logs and Internet Measurements”, PAM’18.

  • Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C.

Schmidt, and Matthias Wählisch, “The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem”, IMC’18.

  • Johanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, and Ralph Holz, “Mission Accomplished?

HTTPS Security after DigiNotar”, IMC’17.

24

slide-48
SLIDE 48

Comparison to related work

25

slide-49
SLIDE 49

Comparison to related work

Holz (2014) [8] Durumeric (2017) [2] Fiebig (2017) [3] Hendriks (2019) [7] IPv6 measurements ✗ ✗ ✓ ✓ Bias analyses ✗ ✗ ✓ ✗ HTTPS security analyses ✓ ✓ ✗ ✗ Reproducibility efforts ✗ ✗ ✓ ✗ Measurement service ✗ ✓ ✗ ✗

26

slide-50
SLIDE 50

Comparison to related work

Holz (2014) [8] Durumeric (2017) [2] Fiebig (2017) [3] Hendriks (2019) [7] This dissertation IPv6 measurements ✗ ✗ ✓ ✓ ✓ Bias analyses ✗ ✗ ✓ ✗ ✓ HTTPS security analyses ✓ ✓ ✗ ✗ ✓ Reproducibility efforts ✗ ✗ ✓ ✗ ✓ Measurement service ✗ ✓ ✗ ✗ ✓

26

slide-51
SLIDE 51

Key contributions

27

slide-52
SLIDE 52

Key contributions

  • Internet measurement methodology
  • Largest IPv6 hitlist to date
  • Extensive bias analyses in hitlist sources
  • IPv6 Hitlist Service
  • HTTPS security
  • Thousands of insecure certificates
  • Millions of domains lacking HTTPS security extensions
  • Man-in-the-Middle attacks still possible

28

slide-53
SLIDE 53

Key contributions

  • Internet measurement methodology
  • Largest IPv6 hitlist to date
  • Extensive bias analyses in hitlist sources
  • IPv6 Hitlist Service
  • HTTPS security
  • Thousands of insecure certificates
  • Millions of domains lacking HTTPS security extensions
  • Man-in-the-Middle attacks still possible

Publications (this talk)

  • Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, and Georg Carle, “In Log We Trust: Revealing Poor Security Practices

with Certificate Transparency Logs and Internet Measurements”, PAM’18. Best Paper Award.

  • Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, and Georg Carle, “Clusters

in the Expanse: Understanding and Unbiasing IPv6 Hitlists”, IMC’18.

  • Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, and Matthias Wäh-

lisch, “The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem”, IMC’18.

  • Johanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, and Ralph Holz, “Mission Accomplished? HTTPS Security after

DigiNotar”, IMC’17. Community Contribution Award, IRTF Applied Networking Research Prize.

  • Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle, “Scanning the IPv6 Internet: Towards a Comprehensive Hitlist”, TMA’16.

28

slide-54
SLIDE 54

Bibliography

[1] Johanna Amann, Oliver Gasser, Quirin Scheitle, Lexi Brent, Georg Carle, and Ralph Holz. “Mission Accomplished? HTTPS Security after DigiNotar”. In: IMC’17. Community Contribution Award, IRTF Applied Networking Research Prize. ACM. London, United Kingdom, Nov. 2017, pp. 325–340. [2] Zakir Durumeric. “Fast Internet-Wide Scanning: A New Security Perspective”. PhD thesis. University

  • f Michigan, 2017.

[3] Tobias Fiebig. “An Empirical Evaluation of Misconfiguration in Internet Services”. PhD thesis. Technische Universität Berlin, 2017. [4] Oliver Gasser, Benjamin Hof, Max Helm, Maciej Korczynski, Ralph Holz, and Georg Carle. “In Log We Trust: Revealing Poor Security Practices with Certificate Transparency Logs and Internet Measurements”. In: PAM’18. Best Paper Award. Springer. Berlin, Germany, Mar. 2018, pp. 173–185. [5] Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, and Georg Carle. “Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists”. In: IMC’18. ACM. Boston, MA, USA, Nov. 2018. DOI: 10.1145/3278532.3278564. [6] Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle. “Scanning the IPv6 Internet: Towards a Comprehensive Hitlist”. In: TMA’16. IFIP. Louvain-la-Neuve, Belgium, Apr. 2016. [7] Luuk Hendriks. “Measuring IPv6 Resilience and Security”. PhD thesis. University of Twente, 2019. [8] Ralph-Günther Holz. “Empirical Analysis of Public Key Infrastructures and Investigation of Improvements”. PhD thesis. Technical University of Munich, 2014.

29

slide-55
SLIDE 55

Bibliography

[9] IMC’18. ACM. Boston, MA, USA, Nov. 2018. [10] Quirin Scheitle, Oliver Gasser, Theodor Nolte, Johanna Amann, Lexi Brent, Georg Carle, Ralph Holz, Thomas C. Schmidt, and Matthias Wählisch. “The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem”. In: IMC’18. ACM. Boston, MA, USA, Nov. 2018,

  • pp. 343–349. ISBN: 978-1-4503-5619-0. DOI: 10.1145/3278532.3278562.

30