37
Prof. Shervin Shirmohammadi CEG 4185 13-1 Lecture 13: Security Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa

Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

  • Upload
    hanhu

  • View
    230

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

Lec

ture

13:

Sec

urity

Arc

hitec

ture

Pro

f. S

her

vin

Shirm

oham

mad

i

SIT

E, U

niv

ersity

of O

ttaw

a

Page 2: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

Net

work

Ass

ets an

d S

ecurity

Thre

ats

•A

sset

s:–

Har

dw

are

(PC, w

ork

stat

ion, et

c)

–Ser

ver

s

–N

etw

ork

dev

ices

(ro

ute

rs, hubs, …

)

–Softw

are

(OS, pro

gra

ms, …

)

–Ser

vic

es (ap

plica

tions, n

etw

ork

ing ser

vic

es)

–D

ata

(sto

res, in-tra

nsit, d

atab

ases

, …

)

•Thre

ats:

–U

nau

thorize

d a

cces

s to

ass

ets.

–U

nau

thorize

d d

iscl

osu

re o

f in

form

atio

n

–D

enia

l of se

rvic

e

–Thef

t (d

ata,

har

dw

are,

softw

are

…)

–Corr

uption o

f dat

a, v

iruse

s, w

orm

s

–Physi

cal dam

age

Page 3: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

Sec

urity

•N

etw

ork

Sec

urity

: Pro

tect

ion o

f net

work

and its

ser

vic

es

from

unau

thorize

d a

cces

s, m

odific

atio

n, des

truct

ion, or

dis

closu

re.

•N

eces

sary

for th

e net

work

per

form

ing its

critica

l fu

nct

ions

correc

tly.

•Req

uirem

ents

:–

Confiden

tial

ity: dat

a sh

ould

be

acce

ssib

le to a

uth

orize

d p

arties

only

.

–In

tegrity

: dat

a ca

n o

nly

be

modifie

d b

y a

uth

orize

d p

arties

.

–A

uth

entici

ty: re

ceiv

er should

be

able

to v

erify the

iden

tity

of

sender

.

•Typic

ally

cry

pto

gra

phy

is u

sed for fu

lfilling thes

e re

quirem

ents.

Page 4: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-4

Cry

pto

gra

phy

•The

encr

yption m

odel

for a

sym

met

ric-

key

cipher

.

Page 5: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-5

Pas

sive

Attac

ks

•Eav

esdro

ppin

gon tra

nsm

issions to

obta

in

info

rmat

ion

•Rel

ease

of m

essa

ge

conte

nts

–O

uts

ider

lea

rns co

nte

nt of tran

smis

sion

•Tra

ffic

anal

ysis

–By m

onitoring fre

quen

cy a

nd len

gth

of m

essa

ges

, ev

en e

ncr

ypte

d, nat

ure

of co

mm

unic

atio

n m

ay b

e gues

sed

•D

ifficu

lt to d

etec

t

•Can

be

pre

ven

ted

Page 6: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-6

Act

ive

Attac

ks

•M

asquer

ade

–Pre

tendin

g to b

e a

diffe

rent en

tity

•Rep

lay

•M

odific

atio

nof m

essa

ges

•D

enia

l of Ser

vic

e

•M

ore

eas

y to d

etec

t

–D

etec

tion m

ay lea

d to d

eter

rent

•H

ard to p

reven

t

Page 7: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-7

Subst

itution C

ipher

s

•Tw

o types

of Cip

her

s: substitution; tran

sposition

•Subst

ituti

on: Rep

lace

eac

h sym

bol w

ith a

noth

er

sym

bol

•A

substitution c

ipher

:

–a

b c

d e

f g

h i j k l m

n o

p q

r s t u v

w x

y z

–q w

e r t y u

i o

p a

s d

f g h j k

l z

x c

v b

n m

–at

tack

�Q

ZZQ

EA

•Bro

ken

using sta

tistic

al p

roper

ties

of th

e la

nguag

e.

–English

: e,

t, o, a,

n, i; th, in

, er

, re

, an

; th

e, ing, an

d, io

n

Page 8: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-8

Tra

nsp

osi

tion C

ipher

s

•A

tra

nsp

osi

tion

cipher

:

Page 9: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-9

Sym

met

ric-

Key

Alg

orith

ms

•U

ses a

shar

edse

cret

key

bet

wee

n the

sender

an

d the

rece

iver

.

•D

ES

–The

Dat

a Encr

yption S

tandar

d

•A

ES

–The

Advan

ced E

ncr

yption S

tandar

d

•Eac

h tec

hniq

ue

com

es w

ith a

num

ber

of

diffe

rent C

ipher

Modes

for sp

ecific

si

tuat

ions.

Page 10: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

0

Dat

a Encr

yption S

tandar

d

•1977

stan

dar

d o

f

NSA

.

•U

ses 56-

bit k

eys .

•Tak

es in

64-b

it

pla

inte

xt

segm

ents. (a

)G

ener

al o

utlin

e (b)det

ails

of one

iter

atio

n

Page 11: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

1

DES p

roble

ms

•56-b

it k

ey too short; th

ese

day

s it c

an b

e bro

ken

by a

sub-

million d

ollar

mac

hin

e in

under

1 d

ay.

•N

SA

(N

atio

nal

Sec

urity

Agen

cy) su

spec

ted o

f

inco

rpora

ting “

secr

et d

esig

n”

to e

asily b

reak

DES for

itse

lf. A

ge

of univ

erse

≈20 b

illion y

ears

= 2

×10

10 yea

rs

Page 12: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

2

Ele

ctro

nic

Code

Book M

ode

•Cip

her

Modes

add m

ore

sec

urity

for sp

ecific

si

tuat

ions.

•The

pla

inte

xt of a

file

encr

ypte

d a

s 16 D

ES

blo

cks:

•Con: one

can sw

itch

par

ts o

f ci

pher

textundet

ecta

bly

.

Page 13: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

3

Cip

her

Blo

ck C

hai

nin

g M

ode

•Cip

her

blo

ck c

hai

nin

g.

(a)Encr

yption. (b)D

ecry

ption.

•Con: nee

d to w

ait fo

r co

mple

te C

0(typic

ally

64-b

it) bef

ore

dec

ryption c

an o

ccur

Page 14: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

4

Cip

her

Fee

dbac

k M

ode

•(a

)Encr

yption. (b)D

ecry

ption.

•Con: 1 b

it e

rror w

ill le

ad to a

n 8

-byte

tran

smission e

rror

Page 15: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

5

Strea

m C

ipher

Mode

& C

ounte

r M

ode

•Strea

m C

ipher

Mode:

(a

)Encr

yption. (b)D

ecry

ption.

•Counte

r M

ode:

allow

s fo

r Ran

dom

Acc

ess-

the

ability to d

ecry

pt a

spec

ific

par

t of th

e m

essa

ge.

Page 16: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

6

Public-

Key

Alg

orith

ms

•A

lso k

now

n a

s as

ym

met

ric

algorith

m.

•U

ses a

pai

r of key

s, o

ne

public

and o

ne

privat

e.

•The

idea

is to

giv

e aw

ay y

our public

key

!

•Encr

ypt your m

essa

ges

using the

public

key

and y

ou

can d

ecry

pt it u

sing the

privat

e key

, an

d v

ice

ver

sa!

•Public-

key

alg

orith

m c

an b

e use

d for both

auth

entica

tion

and c

onfiden

tial

ity; al

though

diffe

rently for ea

ch.

•M

ain d

isad

van

tage:

slo

w p

roce

ssin

g.

Page 17: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

7

Dig

ital

Sig

nat

ure

s

•Sim

ilar

to a

sig

nat

ure

on a

docu

men

t, a

dig

ital

si

gnat

ure

val

idat

es the

auth

entici

tyof its si

gnee

:

–It w

as indee

d the signee

(and n

ot so

meo

ne

else

) w

ho

singed

this

docu

men

t

–It w

as indee

d this document(a

nd n

ot so

me

oth

er

docu

men

t), th

at the

signee

sig

ned

.

•U

pon rec

eivin

g such

dig

ital

sig

nat

ure

, one

can

pro

ve,

in a

court o

f la

w, th

at the

docu

men

t is

in

dee

d sig

ned

by the

per

son indic

ated

by h

is/h

er

signat

ure

.

•Typic

ally

use

s M

essa

ge

Dig

ests

Page 18: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

8

Mes

sage

Dig

ests

•Cre

ates

a u

niq

ue,

fixed

-siz

ed,one-

way

dig

est using the

mes

sage.

•M

D5: ta

kes

512 b

it b

lock

s an

d g

ives

a 1

28-b

it d

iges

t

–Ess

ential

ly a

has

h c

onver

ter.

•D

igital

sig

nat

ure

s using m

essa

ge

dig

ests a

nd p

ublic-

key

en

cryption:

12

3

Page 19: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-1

9

SH

A-1

•SH

A: Sec

ure

Has

h A

lgorith

m

•Tak

es 5

12 b

it b

lock

s an

d g

ives

a 1

60-b

it d

iges

t

•U

se o

f SH

A-1

and R

SA

for si

gnin

g n

on-s

ecre

t

mes

sages

.

Page 20: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

0

PK

Man

agem

ent: C

ertifica

tes

•W

ho to g

et the

certific

ate

from

?

–Cer

tifica

te A

uth

ority

(CA

)

•A

poss

ible

cer

tifica

te a

nd its sig

ned

has

h

Issu

ed b

y a

CA

Page 21: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

1

PK

Man

agem

ent: X

.509

•W

hat

form

at to u

se for th

e ce

rtific

ate:

–O

ne

poss

ible

one:

IT

U X

.509

•The

bas

ic fie

lds of an

X.5

09 c

ertifica

te:

Page 22: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

2

PK

Man

agem

ent:

Public-

Key

Infras

truct

ure

s•

Obvio

usl

y w

e ca

n’t h

ave

one

serv

er for th

e CA

for th

e w

hole

pla

net

–Sca

lability p

roble

ms

•Solu

tion: use

multip

le ser

ver

s, b

ut m

ake

sure

ther

e is

a h

iera

rchic

al

infras

truct

ure

to m

ainta

in inte

grity

and rel

iability.

•A

hie

rarc

hic

al P

KI.

Reg

ional

Auth

ority

Page 23: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

3

Sec

urity

Adm

inis

trat

ion

•Sim

ilar

to req

uirem

ents a

nd flo

w a

nal

ysis, it

is im

portan

t to

fin

d o

ut w

hat

sec

urity

thre

ats

affe

ct the

net

work

, an

d h

ow

we

can p

rote

ct

agai

nst them

.

•Consists of tw

o c

om

ponen

ts:

–Thre

at a

nal

ysis

•In

consu

ltat

ion w

ith u

sers

, ad

min

istrat

ors

, an

oper

ators

, as

sets

and ris

ks ar

e re

cord

ed a

nd a

nal

yse

d.

–Polici

es a

nd p

roce

dure

s

•Rule

s of sy

stem

usa

ge

(what

to d

o, an

d w

hat

not to

do)

Page 24: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

4

Thre

at A

nal

ysi

s

D/D

D/D

D/D

C/C

B/C

A/D

Physi

cal

Dam

age

D/D

B/C

B/B

B/B

B/B

B/B

Viruse

s

A/B

D/D

A/B

C/C

B/C

A/C

Corruption

A/B

C/C

A/B

B/B

B/D

A/D

Thef

t

D/D

B/B

B/B

B/B

B/B

B/B

Den

ial of

Ser

vic

e

A/B

B/C

A/B

C/C

B/B

B/C

Unau

thorize

d

Dis

closu

re

A/B

B/C

A/B

C/B

B/B

B/A

Unau

thorize

d

Acc

ess

Data

Servic

es

Soft

ware

Netw

ork

Ele

ments

Servers

Use

r

Devic

es

Eff

ect/

Prob.

Effec

t: A

=D

estruct

ive

B=D

isab

ling C

=D

isru

ptive

D=N

o Im

pac

t

Pro

bab

ility: A

=Cer

tain

B=U

nlikel

y C

=Lik

ely D

=Im

poss

ible

Page 25: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

5

Polici

es a

nd P

roce

dure

s

•Form

al sta

tem

ents

on rule

s fo

r sy

stem

, net

work

, an

d

info

rmat

ion a

cces

s an

d u

se.

•U

nder

stan

d p

oss

ible

sec

urity

bre

aches

, an

d im

ple

men

t

polici

es to d

eal w

ith thes

e bre

aches

•Com

mon sec

urity

philoso

phie

s:

–D

eny spec

ific

s/per

mit a

ll e

lse

(open

net

work

philoso

phy)

–Per

mit spec

ific

s/den

y a

ll e

lse

(clo

sed n

etw

ork

philoso

phy)

•Polici

es should

incl

ude:

–Privac

ystat

emen

t (m

onitoring, lo

ggin

g, ac

cess

)

–A

ccounta

bility

stat

emen

t (a

uditin

g, re

sponsibility)

–A

uth

entica

tion

stat

emen

t (p

assw

ord

polici

es, re

mote

acc

ess)

–Rep

ortin

gvio

lations (p

roce

dure

s, c

onta

ct info

)

Page 26: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

6

Sec

urity

Mec

han

ism

s

1.

Physi

cal Sec

urity

and A

war

enes

s–

Pro

tect

ion o

f dev

ices

fro

m p

hysica

l ac

cess

–Sec

urity

Aw

aren

ess in

ord

er to e

duca

te p

erso

ns

2.

Pro

toco

lan

d A

pplica

tion

Sec

urity

–Pac

ket

filte

rs

–SN

MPv3

–IP

Sec

3.

Encr

yption / D

ecry

ption

4.

Net

work

Per

imet

er–

Firew

alls a

nd N

AT

5.

Rem

ote

Acc

essse

curity

•N

ot al

l m

echan

ism

s ar

e ap

pro

priat

e/nee

ded

for al

l en

vironm

ents

–D

egre

e of pro

tect

ion it pro

vid

es

–Exper

tise

req

uired

for in

stal

lation a

nd c

onfigura

tion

–Cost o

f purc

has

ing, im

ple

men

ting a

nd o

per

atin

g it

–A

mounts o

f ad

min

istrat

ion a

nd m

ainte

nan

ce req

uired

Page 27: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

7

Physi

cal Sec

urity

and A

war

enes

s

•Physi

cal se

curity

–Pro

tect

ed a

cces

s (e

.g. to

ser

ver

room

s et

c.)

–Bac

kup p

ow

er sourc

e an

d p

ow

er c

onditio

nin

g

–O

ff-s

ite

stora

ge

and ret

riev

al

–A

larm

syst

ems (f

ire,

also illeg

al e

ntry)

•A

war

enes

s

–Educa

ting u

sers

and thei

r in

volv

emen

t in

all a

spec

ts o

f

secu

rity

–Tra

inin

g, know

ledge

of bre

aches

–Bullet

ins an

d n

ewsl

ette

rs

Page 28: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

8

Pro

toco

l an

d A

pplica

tion S

ecurity

•M

ost c

om

mon m

echan

ism

s in

this c

ateg

ory

:

–IP

sec

•Sec

ure

s an

yth

ing that

goes

in the

IP d

atag

ram

•A

ll lay

ers ab

ove

and incl

udin

g IP w

ill ben

efit fro

m this

•D

isad

van

tage?

–SN

MPv3

•N

OT S

NM

Pv1 o

r SN

MPv2 (th

ey h

ave

no sec

urity

)

•O

nly

sec

ure

s net

work

man

agem

ent

–Pac

ket

filte

ring

•Port o

r IP

blo

ckin

g.

Page 29: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-2

9

IPse

c

•A

pro

toco

l use

d to e

nhan

ce IP w

ith sec

urity

.

•Est

ablish

es a

sim

ple

x connection, know

n a

s Sec

urity

Ass

oci

atio

n(S

A).

–U

nlike

norm

al IP, th

at is co

nnec

tionle

ss.

–It’s

a sim

ple

x c

onnec

tion, so

we’

d n

eed tw

o S

Asfo

r a

full-d

uple

x sec

ure

connec

tion.

•Pro

vid

es A

uth

entica

tion H

eader

(AH

), a

nd

Enca

psu

lating S

ecurity

Pay

load

(ESP).

•A

H is use

d for au

then

tica

tion, ESP is use

d for :

auth

entica

tion a

nd c

onfiden

tial

ity.

•U

sed in tra

nsp

ort

mode

(host

-to-h

ost

), o

r tu

nnel

mode

(gat

eway

-to-g

atew

ay).

Page 30: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

0

IPse

cA

H

•The

IPse

cau

then

tica

tion h

eader

in tra

nsp

ort m

ode

for

IPv4.

•H

ow

to let

the

rece

iver

know

that

this p

acket

is an

IPse

cpac

ket

?

–Set

the protocolfiel

d in the

IP h

eader

to b

e IP

sec

(val

ue

51)

HM

AC: H

ashed

Mes

sage

Auth

entica

tion C

ode

Pac

ket

, an

d som

e IP

hea

der

fiel

ds, a

re h

ashed

toget

her

with a

privat

ekey

to form

a

“dig

ital

sig

nat

ure

”.

Page 31: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

1

IPse

cESP

(a)ESP in tra

nsp

ort m

ode.

(b)ESP in tunnel

mode.

(Host

to h

ost

) (gat

eway

to g

atew

ay)

•U

sed for both

auth

entica

tion

and c

onfiden

tial

ity.

•ESP h

eader

has

fie

lds si

milar

to the

AH

hea

der

, plu

s

som

e m

ore

for en

cryption p

urp

ose

s.

•H

MA

C is a

trai

ler (r

ather

than

a h

eader

) due

to e

asie

r

har

dw

are

imple

men

tation (like

Eth

ernet

’s C

RC).

Page 32: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

2

SNMP Engine (identified by snmpEngineID)

Dispatcher

Message

Processing

Subsystem

Security

Subsystem

Access

Control

Subsystem

SN

MPv3

•Sec

urity

at th

e m

essa

ge

level

–A

uth

entica

tion

–Privac

yof m

essa

ge

via

sec

ure

com

munic

atio

n

•Fle

xib

leac

cess

control

–W

ho c

an a

cces

s?

–W

hat

can

be

acce

ssed

?

–W

hat

MIB

vie

ws?

Page 33: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

3

Pac

ket

Filte

ring

Page 34: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

4

Encr

yption / D

ecry

ption

•Pro

vid

es p

rote

ctio

n o

f th

e in

form

atio

nfr

om

bei

ng

use

d b

y a

n a

ttac

ker

.–

Oth

er sec

urity

mec

han

ism

s co

nce

ntrat

e on p

rote

ctio

n

agai

nst

unau

thorize

d a

cces

s an

d d

estruct

ion o

f re

sourc

es.

•M

ost

of th

ese

mec

han

ism

s w

ork

on e

ither

sy

mm

etric

key

or as

ym

met

ric

key

encr

yption.

•Cons

–D

egra

des

net

work

per

form

ance

15-8

5%

•H

ardw

are

solu

tion spee

d thin

gs up

–A

dm

inis

trat

ion a

nd m

ainte

nan

ce is re

quired

–Expen

sive

Page 35: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

5

Net

work

Per

imet

er

•Pro

tect

s th

e ex

tern

al inte

rfac

esof your net

work

: th

e co

mponen

ts in y

our net

work

that

act

as co

nnec

tors

to the

exte

rnal

net

work

s.

•N

etw

ork

Addre

ss T

ranslat

ion (N

AT) is

the

most

co

mm

only

use

d tec

hniq

ue

to a

chie

ve

this

sec

urity

•N

AT w

as o

rigin

ally

dev

eloped

to solv

e IP

addre

ss

exhau

stio

n p

roble

m b

y introduci

ng p

rivat

e net

work

s:–

10.0

.0.0

–10.2

55.2

55.2

55 (cl

ass A

)

–172.1

6.0

.0 –

172.3

1.2

55.2

55 (cl

ass B)

–192.1

68.0

.0 –

192.1

68.2

55.2

55 (cl

ass C)

192.1

68.0

.1

NA

T

192.1

68.0

.2

192.1

68.0

.10

Inte

rnet

137.1

22.2

0.1

S-p

ort=8777

S-IP=192.1

68.0

.2

NA

T p

ort =

63211 port=8777 S-IP=192.1

68.0

.2

NA

T p

ort =

63212 port=6522 S-IP=192.1

68.0

.1

NA

T p

ort =

63210 port=5113 S-IP=192.1

68.0

.10

S-p

ort=63211

S-IP=137.1

22.2

0.1

D-p

ort=63211D

-IP=137.1

22.2

0.1

D-p

ort=8777

D-IP=192.1

68.0

2

Route

r

Page 36: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

6

Firew

all

•Firew

alls

are

com

bin

atio

ns of one

or m

ore

sec

urity

m

echan

ism

s , p

lace

d a

t stra

tegic

loca

tions w

ithin

a n

etw

ork

.–

E.g

. port filte

ring, plu

s N

AT

•Can

be

stan

dal

one

dev

ices

, or par

t of oth

er e

quip

men

t (r

oute

rs, gat

eway

s, e

tc.)

•M

ay req

uire

know

ledge

of use

rs’re

quirem

ents

(te

lnet

, ftp,

etc.

)

•N

etw

ork

per

form

ance

deg

radat

ion –

up to 3

0%

•Can

com

plica

te L

AN

/MA

N/W

AN

tro

uble

shooting

Page 37: Prof. Shervin Shirmohammadi CEG 4185 - University of …shervin/courses/ceg4185/lectures/Lecture13f.pdf · Prof. Shervin Shirmohammadi CEG 4185 13-1 ... • Con: need to wait for

Pro

f. S

her

vin

Shirm

oham

mad

iCEG

4185

13-3

7

Rem

ote

Acc

ess Sec

urity

•Rem

ote

acc

ess is

a c

om

mon o

per

atio

n w

her

e use

rs n

eed a

cces

s to

in

tern

al res

ourc

es v

ia d

ial-in

, poin

t-to

-poin

t se

ssio

ns, a

nd V

PN

s.

•Com

monly

know

n a

s A

AA

A•

Auth

entica

tion, A

uth

oriza

tion, A

ccounta

bility, an

d A

lloca

tion

•Consi

der

atio

ns

–Ser

ver

types

and loca

tions (D

MZs)

–In

tera

ctio

ns w

ith D

NS, ad

dre

ss p

ools, oth

er ser

vic

es.

Network

Network

Internet

User Computer

RADIUS

Server

Network Access

Server (NAS)

User Computer

dial

PP

P/P

PP

oE

RA

DIU

SP

PP