Network Security Protocols: Analysis methods and standards... Network security protocols LY ® Primarily key management a» Cryptography reduces many problems to key management » Also
Trang 1
Network Security Protocols:
Analysis methods and standards
Trang 2
h
TRUST: Team for Research in
Ubiquitous Secure Technologies
Trang 3A a
Team for Research in Ubiquitous Secure Technology
TRUST Research Vision
ocietal Challenges
RUST will address
Critical’ ~~~ -Gomputer and social, economic and
legal challenges
Integrative Efforts
Identity Thett
Project Specific systems that
Electronic Medical Secure Networked represe nt these social
Records Embedded Systems challenges
Component Technologies
Sec Software Complex Inter -
Hy Dependency mod Secure Info Mot
Software Tools Trusted Secure Network -
Embedded Sys econ Public Pol Soé
Applied Crypto - Model -based Forensic
graphic Protocols Security Integration and Privacy Network Secure Compo - HCI and Security nent platforms Security
Component technologies
that will provide solutions
Trang 4Network security protocols
LY
® Primarily key management
a» Cryptography reduces many problems to key
management
» Also denial-of-service, other issues
@ Hard to design and get right
=» People can do an acceptable job, eventually
=» Systematic methods improve results
Practical case for software verification
» Even for standards that are widely used and
carefully reviewed, automated tools find flaws
Trang 5
Recent and ongoing protocol efforts
-
XỬ
@ Wireless networking authentication
a» 802.11i — improved auth for access point
» 802.16e — metropolitan area networks
m Simple config — setting up access point
Trang 7
Station Access Authentication
Point Server
Security capabilities discovery
Trang 9Result: A and B share two private numbers
not known to any observer without Ka™!, Kb"!
Trang 10Evil agent E tricks
honest A into revealing
private key Nb from B
Evil E can then fool B
Trang 12Explicit Intruder Method
Trang 14cI
Automated Finite-State Analysis
LY
@ Define finite-state system
» Bound on number of steps
a Finite number of participants
=» Nondeterministic adversary with finite options
14
@ Pose correctness condition
=» Can be simple: authentication and secrecy
=» Can be complex: contract signing
® Exhaustive search using “verification” tool
a» Error in finite approximation => Error in protocol
=» No error in finite approximation => ???
Trang 15State Reduction on N-S Protocol
Trang 16MOBIKE - IKEv2
Onion Routing Analysis of ZRTP Mobility and Multihoming
Protocol
Distribution Protocols g handshake
Analysis of Octopus
and Related Protocols
tổ http://www.stanford.edu/class/cs259/
Trang 17handshake protocol Onion Routing Electronic Voting
Secure Ad-Hoc An Anonymous Fair
Secure Internet Live Windows file-sharing
4 h†tp://www.stanford.edu/class/cs259/WWWO04/
Trang 19Passive Eavesdropping/ Traffic Analysis
» Easy, most wireless NICs have promiscuous mode
Message Injection/Active Eavesdropping
=» Easy, some techniques to gen any packet with common NIC
Message Deletion and Interception
» Possible, interfere packet reception with directional antennas
Masquerading and Malicious AP
=» Easy, MAC address forgeable and s/w available (HostAP)
Session Hijacking
Man-in-the-Middle
Denial-of-Service: cost related evaluation
Trang 21@ Reuse supplicant nonce
@ Combined solution
Trang 22
summary of larger study
security rollback supplicant manua//y choose security; authenticator restrict
pre-RSNA to only insensitive data
supplicant; if both, use different PMKs
attack on Michael
countermeasures cease connections for a specific time instead of re-key and
deauthentication; update TSC before MIC and after FCS, ICV are validated
adopt random-drop queue, not so effective;
authenticate Message 1, packet format modified;
re-use supplicant nonce, eliminate memory Dos
22
Trang 23Model checking vs proof
Finite state analysis assumes small number of
principals, formal proofs do not need these
assumptions
23
Trang 24Protocol composition logic
Trang 25802.111 correctness proof in PCL
cI LY
@ EAP-TLS
=» Between Supplicant and Authentication Server
=» Authorizes supplicant and establishes access key (PMk)
@ 4-Way Handshake
=» Between Access Point and Supplicant
a» Checks authorization, establish key (PTK) for data transfer
@ Group Key Protocol
a» AP distributes group key (GIK) using KEK to supplicants
#@ AES based data protection using established keys
Formal proof covers subprotocols 1, 2, 3 alone and in various combinations
25
Trang 26SS
switch to negotiated cipher
Finished
———
26
Trang 27Theorems: Agreement and Secrecy
¢ there exists a session
of the intended server
¢ this server session agrees on the values of
all messages
¢ all actions viewed In
same order by client
and server
¢ there exists exactly
one such server session
Similar specification for server
Trang 28Composition
LY
® All necessary invariants are satisfied by basic
blocks of all the sub-protocols
@ The postconditions of TLS imply the
preconditions of the 4-Way handshake
@ The postconditions of 4-Way handshake imply
the preconditions of the Group Key protocol
28
Trang 29Complex Control Flows
Figure 1: The Control Flow of 802.111 RSNA Establishment Procedure
Simple Flow Complex Flow
29
Trang 30study results
@ 802.11i provides
a Satisfactory data confidentiality & integrity with CCMP
a Satisfactory mutual authentication & key management
@ Some implementation mistakes
a security Level Rollback Attack in TSN
=» Reflection Attack on the 4-Way Handshake
® Availability is a problem
=» Simple policies can make 802.111 robust to some known DoS
=» Possible attack on Michael Countermeasures in TKIP a» RSN IE Poisoning/ Spoofing
» 4-Way Handshake Blocking
a Inefficient failure recovery scheme
Trang 31some other case studies
LY
@ Wireless networking
Trang 3333
Microsoft |ech!\et
Microsoft Security Bulletin MS05-042
Vulnerabilities in Kerberos Could Allow Denial of Service,
Information Disclosure, and Spoofing (899587)
Published: August 9, 2005
|
Affected Software:
¢ Microsoft Windows 2000 Service Pack 4
Microsoft Windows XP Service Pack 1 and
Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003 and
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 for Itanium-based Systems and
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Trang 34| Cervesato, A D Jaggard, Kerberos Pro} ect A Scedrov, J.-K Tsay, and
#@ Formal verification of fixes preventing attack
=m Close, ongoing interactions with IETF WG
34
Trang 35Public-Key Kerberos
@ Extend basic Kerberos 5 to use PKI
a» Change first round to avoid long-term shared keys
a Originally motivated by security
¢ If KDC is compromised, don’t need to regenerate shared keys
¢ Avoid use of password-derived keys
=» Current emphasis on administrative convenience
¢ Avoid the need to register in advance of using Kerberized services
@ This extension is called PKINIT
» Current version is PKINIT-29
a Attack found tn -25; fixed tn -27
a» Included in Windows and Linux (called Heimdal)
m Implementation developed by CableLabs (for cable boxes)
35
Trang 36Kerberos server K replies with credentials for I, including: fresh keys SM
I decrypts, re-encrypts with C's public key, and replaces her name with C's:
-C receives K's signature over ‘{msg},., is encryption of msg with key
k,n, and assumes k, AK, etc., "[msg ]¿„y is signature over msg with key
- were generated for C (not I)
Trang 37Fix Adopted in pk-init-27
The KDC signs k, cksum (place of k, n,)
¢ k is replyKey
¢ cksum is checksum over AS-REQ
¢ Easier to implement than signing ©, k, n,
® Formal proof: this guarantees authentication
» Assume checksum is preimage resistant
» Assume KDCGs signature keys are secret
Published proof uses simplified symbolic model Cryptographically sound proofs now exist
37
Trang 38Recent and ongoing protocol efforts
-
XỬ
@ Wireless networking authentication
m 802.11i — improved auth for access point
» 802.16e — metropolitan area networks
m Simple config — setting up access point
m Bluetooth simple pairing protocols
a» PKINIT — public-key method for cross-domain authentication
a» Full cryptographically sound proof recently developed
Trang 39cI
Conclusions
L/
@ Protocol analysis methods
=» Model checking is fairly easy to apply
» Ready for industrial use
=» Logical proofs are feasible, can be made easier
@ Example: Wireless 802.111
39
» Automated study led to improved standard
» Deployment recommendations, more flexible error recovery
® Many ongoing efforts
» Examples: Wireless networking, VoIP, mobility
=» Typical standardization effort takes a couple of years
Achievable goal: systematic methods that can be used
by practicing engineers to improve network, system
security