Network Security Protocols: Analysis methods and standards John - - PowerPoint PPT Presentation

network security protocols analysis methods and standards
SMART_READER_LITE
LIVE PREVIEW

Network Security Protocols: Analysis methods and standards John - - PowerPoint PPT Presentation

Network Security Protocols: Analysis methods and standards John Mitchell Stanford University Joint work with many students, postdocs, collaborators TRUST : Team for Research in Ubiquitous Secure Technologies NSF Science and Technology Center


slide-1
SLIDE 1

Network Security Protocols: Analysis methods and standards

John Mitchell Stanford University Joint work with many students, postdocs, collaborators

slide-2
SLIDE 2

TRUST: Team for Research in

Ubiquitous Secure Technologies

NSF Science and Technology Center Multi-university multi-year effort Research, education, outreach

http://trust.eecs.berkeley.edu/

slide-3
SLIDE 3

3

TRUST Research Vision

Privacy Computer and Network Security

Electronic Medical Records Identity Theft Project Secure Networked Embedded Systems

Software Security Trusted Platforms Applied Crypto

  • graphic Protocols

Network Security Secure Network Embedded Sys Forensic and Privacy Complex Inter

  • Dependency mod.

Model -based Security Integration. Econ., Public Pol. Soc. Chall. Secure Compo

  • nent platforms

HCI and Security Secure Info Mgt. Software Tools

Component Technologies Societal Challenges Integrative Efforts

TRUST will address social, economic and legal challenges Specific systems that represent these social challenges.

Component technologies that will provide solutions

Critical Infrastructure

slide-4
SLIDE 4

4

Network security protocols

Primarily key management

Cryptography reduces many problems to key

management

Also denial-of-service, other issues

Hard to design and get right

People can do an acceptable job, eventually Systematic methods improve results

Practical case for software verification

Even for standards that are widely used and

carefully reviewed, automated tools find flaws

slide-5
SLIDE 5

5

Recent and ongoing protocol efforts

Wireless networking authentication

  • 802.11i – improved auth for access point
  • 802.16e – metropolitan area networks
  • Simple config – setting up access point

Mobility

  • Mobile IPv6 – update IP addr to avoid triangle routing

VoIP

  • SIP – call referral feature, other issues

Kerberos

  • PKINIT – public-key method for cross-domain authentication

IPSec

  • IKEv1, JFK, IKEv2 – improved key management
slide-6
SLIDE 6

6

Mobile IPv6 Architecture

Mobile Node (MN) Corresponding Node (CN) Home Agent (HA)

Direct connection via binding update

Authentication is a requirement Early proposals weak

slide-7
SLIDE 7

7

Wireless Authentication

slide-8
SLIDE 8

8

Supplicant UnAuth/UnAssoc 802.1X Blocked No Key 802.11 Association

802.11i Protocol

MSK EAP/802.1X/RADIUS Authentication 4-Way Handshake Group Key Handshake Data Communication Supplicant Auth/Assoc 802.1X UnBlocked PTK/GTK

slide-9
SLIDE 9

9

Needham-Schroeder Protocol

{ A, NonceA } { NonceA, NonceB } { NonceB}

Ka Kb

Result: A and B share two private numbers not known to any observer without Ka-1, Kb-1

A B

Kb

slide-10
SLIDE 10

10

Anomaly in Needham-Schroeder

A E B

{ A, Na } { A, Na } { Na, Nb } { Na, Nb } { Nb }

Ke Kb Ka Ka Ke

Evil agent E tricks honest A into revealing private key Nb from B. Evil E can then fool B. [Lowe]

slide-11
SLIDE 11

11

Needham-Schroeder Lowe

{ A, NonceA } { NonceA, B, NonceB } { NonceB}

Ka Kb

A B

Kb

Authentication? Secrecy? Replay attack Forward secrecy? Denial of service? Identity protection?

slide-12
SLIDE 12

12

Explicit Intruder Method

Intruder Model Analysis Tool Formal Protocol Informal Protocol Description

Find error

slide-13
SLIDE 13

13

Run of protocol

A B Initiate Respond C D

Correct if no security violation in any run

Attacker

slide-14
SLIDE 14

14

Automated Finite-State Analysis

Define finite-state system

Bound on number of steps Finite number of participants Nondeterministic adversary with finite options

Pose correctness condition

Can be simple: authentication and secrecy Can be complex: contract signing

Exhaustive search using “verification” tool

Error in finite approximation ⇒ Error in protocol No error in finite approximation ⇒ ???

slide-15
SLIDE 15

15

State Reduction on N-S Protocol

1706 17277 514550 980 6981 155709 58 222 3263

1 10 100 1000 10000 100000 1000000

1 init 1 resp 2 init 1 resp 2 init 2 resp

Base: hand

  • ptimization
  • f model

CSFW: eliminate net, max knowledge Merge intrud send, princ reply

slide-16
SLIDE 16

16

CS259 Term Projects - 2006

Analysis of Octopus and Related Protocols

Analysis of the IEEE 802.16e 3-way handshake

Short-Password Key Exchange Protocol 802.16e Multicast- Broadcast Key Distribution Protocols

MOBIKE - IKEv2 Mobility and Multihoming Protocol

Analysis of ZRTP Onion Routing

Security analysis of SIP

Formalization of HIPAA Security Analysis of OTRv2

http://www.stanford.edu/class/cs259/

slide-17
SLIDE 17

17

CS259 Term Projects - 2004

Windows file-sharing protocols Secure Internet Live Conferencing Key Infrastructure An Anonymous Fair Exchange E-commerce Protocol Secure Ad-Hoc Distance Vector Routing Electronic Voting Onion Routing IEEE 802.11i wireless handshake protocol XML Security Electronic voting iKP protocol family

http://www.stanford.edu/class/cs259/WWW04/

slide-18
SLIDE 18

18

Supplicant UnAuth/UnAssoc 802.1X Blocked No Key 802.11 Association

802.11i Protocol

MSK EAP/802.1X/RADIUS Authentication 4-Way Handshake Group Key Handshake Data Communication Supplicant Auth/Assoc 802.1X UnBlocked PTK/GTK

slide-19
SLIDE 19

19

Wireless Threats

Passive Eavesdropping/Traffic Analysis

  • Easy, most wireless NICs have promiscuous mode

Message Injection/Active Eavesdropping

  • Easy, some techniques to gen. any packet with common NIC

Message Deletion and Interception

  • Possible, interfere packet reception with directional antennas

Masquerading and Malicious AP

  • Easy, MAC address forgeable and s/w available (HostAP)

Session Hijacking Man-in-the-Middle Denial-of-Service: cost related evaluation Changhua He

slide-20
SLIDE 20

20

4-Way Handshake Blocking

AA, ANonce, AA RSN IE, GTK, sn+1, msg3, MIC SPA, sn+1, msg4, MIC PTK Derived PTK Derived PTK confirmed 802.1X Unblocked PTK confirmed 802.1X Unblocked AA, ANonce, sn, msg1 SPA, SNonce, SPA RSN IE, sn, msg2, MIC AA, ANonce, sn, msg1

slide-21
SLIDE 21

21

Countermeasures

Random-Drop Queue

  • Randomly drop a stored entry if the queue is full
  • Not so effective

Authenticate Message 1

  • Use the share PMK; must modify the packet format

Reuse supplicant nonce

  • Reuse SNonce, derive correct PTK from Message 3
  • Performance degradation, more computation in supplicant

Combined solution

  • Supplicant reuses SNonce
  • Store one entry of ANonce and PTK for the first Message 1
  • If nonce in Message 3 matches the entry, use PTK directly
  • Eliminate memory DoS, only minor change to algorithm
  • Adopted by TGi
slide-22
SLIDE 22

22

Summary of larger study

adopt random-drop queue, not so effective; authenticate Message 1, packet format modified; re-use supplicant nonce, eliminate memory DoS. 4-way handshake blocking Authenticate Beacon and Probe Response frame; Confirm RSN IE in an earlier stage; Relax the condition of RSN IE confirmation. RSN IE poisoning cease connections for a specific time instead of re-key and deauthentication; update TSC before MIC and after FCS, ICV are validated. attack on Michael countermeasures each participant plays the role of either authenti-cator or supplicant; if both, use different PMKs. reflection attack supplicant manually choose security; authenticator restrict pre-RSNA to only insensitive data. security rollback

SOLUTIONS ATTACK

slide-23
SLIDE 23

23

Model checking vs proof

Finite-state analysis

Attacks on model ⇒ Attack on protocol

Formal proof

Proof in model ⇒ No attack using only these attacker capabilities Finite state analysis assumes small number of principals, formal proofs do not need these assumptions

slide-24
SLIDE 24

24

Protocol composition logic

Alice’s information

  • Protocol
  • Private data
  • Sends and receives

Honest Principals, Attacker Send Receive Protocol

Private Data

Logic has symbolic and computational semantics

slide-25
SLIDE 25

25

802.11i correctness proof in PCL

EAP-TLS

  • Between Supplicant and Authentication Server
  • Authorizes supplicant and establishes access key (PMK)

4-Way Handshake

  • Between Access Point and Supplicant
  • Checks authorization, establish key (PTK) for data transfer

Group Key Protocol

  • AP distributes group key (GTK) using KEK to supplicants

AES based data protection using established keys Formal proof covers subprotocols 1, 2, 3 alone and in various combinations

slide-26
SLIDE 26

26

SSL/TLS

C

ClientHello ServerHello, [Certificate], [ServerKeyExchange], [CertificateRequest], ServerHelloDone

S

[Certificate], ClientKeyExchange, [CertificateVerify] Finished switch to negotiated cipher Finished switch to negotiated cipher

slide-27
SLIDE 27

27

Theorems: Agreement and Secrecy

Client is guaranteed:

  • there exists a session
  • f the intended server
  • this server session

agrees on the values of all messages

  • all actions viewed in

same order by client and server

  • there exists exactly
  • ne such server session

Similar specification for server

slide-28
SLIDE 28

28

Composition

All necessary invariants are satisfied by basic blocks of all the sub-protocols The postconditions of TLS imply the preconditions of the 4-Way handshake The postconditions of 4-Way handshake imply the preconditions of the Group Key protocol

slide-29
SLIDE 29

29

Complex Control Flows

Simple Flow Complex Flow

slide-30
SLIDE 30

30

Study results

802.11i provides

Satisfactory data confidentiality & integrity with CCMP Satisfactory mutual authentication & key management

Some implementation mistakes

Security Level Rollback Attack in TSN Reflection Attack on the 4-Way Handshake

Availability is a problem

Simple policies can make 802.11i robust to some known DoS Possible attack on Michael Countermeasures in TKIP RSN IE Poisoning/Spoofing 4-Way Handshake Blocking Inefficient failure recovery scheme

Improved 802.11i

slide-31
SLIDE 31

31

Some other case studies

Wireless networking

  • 802.11i – wireless access point auth
  • 802.16e – metropolitan area networking
  • Simple config – access point configuration

SSL

  • Found version rollback attack in resumption protocol

Kerberos

  • PKINIT – public-key method for cross-domain authentication

IPSec

  • IKEv1, JFK, IKEv2 – improved key management Kerberos

Mobility

  • Mobile IPv6 – update IP addr to avoid triangle rte

VoIP

  • SIP – issues with call referral, currently under study

OTRv2

  • Student project in CS259 this winter
slide-32
SLIDE 32

32

Ticket 2 Ticket 2 Ticket 1 Ticket 1

Kerberos Protocol

Client KDC Service TGS {Kt}

K c

C T G S {Ks}Kt {C}Kt S { C }Ks Ktgs Kc Kv {C, Ks}Kv {C, Kt}Ktgs {C, Ks}Kv {C, Kt}Ktgs

slide-33
SLIDE 33

33

Microsoft Security Bulletin MS05-042

Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing (899587)

Published: August 9, 2005

Affected Software:

  • Microsoft Windows 2000 Service Pack 4
  • Microsoft Windows XP Service Pack 1 and

Microsoft Windows XP Service Pack 2

  • Microsoft Windows XP Professional x64 Edition
  • Microsoft Windows Server 2003 and

Microsoft Windows Server 2003 Service Pack 1

  • Microsoft Windows Server 2003 for Itanium-based Systems and

Microsoft Windows Server 2003 with SP1 for Itanium-based Systems

  • Microsoft Windows Server 2003 x64 Edition
slide-34
SLIDE 34

34

Kerberos Project

Formal analysis of Kerberos 5

Several steps

Detailed core protocol Cross-realm authentication Public-key extensions to Kerberos

Attack on PKINIT

Breaks association of client request and the response Prevents full authentication and confidentiality

Formal verification of fixes preventing attack

Close, ongoing interactions with IETF WG

  • I. Cervesato, A. D. Jaggard,
  • A. Scedrov, J.-K. Tsay, and
  • C. Walstad
slide-35
SLIDE 35

35

Public-Key Kerberos

Extend basic Kerberos 5 to use PKI

Change first round to avoid long-term shared keys Originally motivated by security

If KDC is compromised, don’t need to regenerate shared keys Avoid use of password-derived keys

Current emphasis on administrative convenience

Avoid the need to register in advance of using Kerberized services

This extension is called PKINIT

Current version is PKINIT-29 Attack found in -25; fixed in -27 Included in Windows and Linux (called Heimdal) Implementation developed by CableLabs (for cable boxes)

slide-36
SLIDE 36

36

C C I I K K

CertC, [tC, n2]skC, C, T, n1 CertI, [tC, n2]skI, I, T, n1 {[k, n2]skK}pkC, C, TGT, {AK, …}k

  • Principal P has secret key skP, public key pkP
  • {msg}key is encryption of msg with key
  • [msg]key is signature over msg with key

{[k, n2]skK}pkI, I, TGT, {AK, …}k At time tC, client C requests a ticket for ticket server T (using nonces n1 and n2): The attacker I intercepts this, puts her name/signature in place of C’s:

I

Kerberos server K replies with credentials for I, including: fresh keys k and AK, a ticket-granting ticket TGT, and K’s signature over k,n2: I decrypts, re-encrypts with C’s public key, and replaces her name with C’s:

I

  • I knows fresh keys k and AK
  • C receives K’s signature over

k,n2 and assumes k, AK, etc., were generated for C (not I) (Ignore most of enc-part)

The Attack

slide-37
SLIDE 37

37

Fix Adopted in pk-init-27

The KDC signs k, cksum (place of k, n2)

k is replyKey cksum is checksum over AS-REQ Easier to implement than signing C, k, n2

Formal proof: this guarantees authentication

Assume checksum is preimage resistant Assume KDC’s signature keys are secret

Published proof uses simplified symbolic model Cryptographically sound proofs now exist

slide-38
SLIDE 38

38

Recent and ongoing protocol efforts

Wireless networking authentication

  • 802.11i – improved auth for access point
  • 802.16e – metropolitan area networks
  • Simple config – setting up access point
  • Bluetooth simple pairing protocols

Mobility

  • Mobile IPv6 – update IP addr to avoid triangle routing

VoIP

  • SIP – call referral feature, other issues

Kerberos

  • PKINIT – public-key method for cross-domain authentication
  • Full cryptographically sound proof recently developed

IPSec

  • IKEv1, JFK, IKEv2 – improved key management

OTRv2

  • student project in CS259 this winter
  • ZPhone ??
slide-39
SLIDE 39

39

Conclusions

Protocol analysis methods

Model checking is fairly easy to apply Ready for industrial use Logical proofs are feasible, can be made easier

Example: Wireless 802.11i

Automated study led to improved standard Deployment recommendations, more flexible error recovery

Many ongoing efforts

Examples: Wireless networking, VoIP, mobility Typical standardization effort takes a couple of years

Achievable goal: systematic methods that can be used by practicing engineers to improve network, system security

slide-40
SLIDE 40

40