1. Trang chủ
  2. » Công Nghệ Thông Tin

Network Security Protocols: Analysis methods and standards potx

40 605 0
Tài liệu được quét OCR, nội dung có thể không chính xác
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Network Security Protocols: Analysis methods and standards
Trường học Stanford University
Chuyên ngành Network Security Protocols
Thể loại essay
Thành phố Stanford
Định dạng
Số trang 40
Dung lượng 397,51 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Network Security Protocols: Analysis methods and standards... Network security protocols LY ® Primarily key management a» Cryptography reduces many problems to key management » Also

Trang 1

Network Security Protocols:

Analysis methods and standards

Trang 2

h

TRUST: Team for Research in

Ubiquitous Secure Technologies

Trang 3

A a

Team for Research in Ubiquitous Secure Technology

TRUST Research Vision

ocietal Challenges

RUST will address

Critical’ ~~~ -Gomputer and social, economic and

legal challenges

Integrative Efforts

Identity Thett

Project Specific systems that

Electronic Medical Secure Networked represe nt these social

Records Embedded Systems challenges

Component Technologies

Sec Software Complex Inter -

Hy Dependency mod Secure Info Mot

Software Tools Trusted Secure Network -

Embedded Sys econ Public Pol Soé

Applied Crypto - Model -based Forensic

graphic Protocols Security Integration and Privacy Network Secure Compo - HCI and Security nent platforms Security

Component technologies

that will provide solutions

Trang 4

Network security protocols

LY

® Primarily key management

a» Cryptography reduces many problems to key

management

» Also denial-of-service, other issues

@ Hard to design and get right

=» People can do an acceptable job, eventually

=» Systematic methods improve results

Practical case for software verification

» Even for standards that are widely used and

carefully reviewed, automated tools find flaws

Trang 5

Recent and ongoing protocol efforts

-

XỬ

@ Wireless networking authentication

a» 802.11i — improved auth for access point

» 802.16e — metropolitan area networks

m Simple config — setting up access point

Trang 7

Station Access Authentication

Point Server

Security capabilities discovery

Trang 9

Result: A and B share two private numbers

not known to any observer without Ka™!, Kb"!

Trang 10

Evil agent E tricks

honest A into revealing

private key Nb from B

Evil E can then fool B

Trang 12

Explicit Intruder Method

Trang 14

cI

Automated Finite-State Analysis

LY

@ Define finite-state system

» Bound on number of steps

a Finite number of participants

=» Nondeterministic adversary with finite options

14

@ Pose correctness condition

=» Can be simple: authentication and secrecy

=» Can be complex: contract signing

® Exhaustive search using “verification” tool

a» Error in finite approximation => Error in protocol

=» No error in finite approximation => ???

Trang 15

State Reduction on N-S Protocol

Trang 16

MOBIKE - IKEv2

Onion Routing Analysis of ZRTP Mobility and Multihoming

Protocol

Distribution Protocols g handshake

Analysis of Octopus

and Related Protocols

tổ http://www.stanford.edu/class/cs259/

Trang 17

handshake protocol Onion Routing Electronic Voting

Secure Ad-Hoc An Anonymous Fair

Secure Internet Live Windows file-sharing

4 h†tp://www.stanford.edu/class/cs259/WWWO04/

Trang 19

Passive Eavesdropping/ Traffic Analysis

» Easy, most wireless NICs have promiscuous mode

Message Injection/Active Eavesdropping

=» Easy, some techniques to gen any packet with common NIC

Message Deletion and Interception

» Possible, interfere packet reception with directional antennas

Masquerading and Malicious AP

=» Easy, MAC address forgeable and s/w available (HostAP)

Session Hijacking

Man-in-the-Middle

Denial-of-Service: cost related evaluation

Trang 21

@ Reuse supplicant nonce

@ Combined solution

Trang 22

summary of larger study

security rollback supplicant manua//y choose security; authenticator restrict

pre-RSNA to only insensitive data

supplicant; if both, use different PMKs

attack on Michael

countermeasures cease connections for a specific time instead of re-key and

deauthentication; update TSC before MIC and after FCS, ICV are validated

adopt random-drop queue, not so effective;

authenticate Message 1, packet format modified;

re-use supplicant nonce, eliminate memory Dos

22

Trang 23

Model checking vs proof

Finite state analysis assumes small number of

principals, formal proofs do not need these

assumptions

23

Trang 24

Protocol composition logic

Trang 25

802.111 correctness proof in PCL

cI LY

@ EAP-TLS

=» Between Supplicant and Authentication Server

=» Authorizes supplicant and establishes access key (PMk)

@ 4-Way Handshake

=» Between Access Point and Supplicant

a» Checks authorization, establish key (PTK) for data transfer

@ Group Key Protocol

a» AP distributes group key (GIK) using KEK to supplicants

#@ AES based data protection using established keys

Formal proof covers subprotocols 1, 2, 3 alone and in various combinations

25

Trang 26

SS

switch to negotiated cipher

Finished

———

26

Trang 27

Theorems: Agreement and Secrecy

¢ there exists a session

of the intended server

¢ this server session agrees on the values of

all messages

¢ all actions viewed In

same order by client

and server

¢ there exists exactly

one such server session

Similar specification for server

Trang 28

Composition

LY

® All necessary invariants are satisfied by basic

blocks of all the sub-protocols

@ The postconditions of TLS imply the

preconditions of the 4-Way handshake

@ The postconditions of 4-Way handshake imply

the preconditions of the Group Key protocol

28

Trang 29

Complex Control Flows

Figure 1: The Control Flow of 802.111 RSNA Establishment Procedure

Simple Flow Complex Flow

29

Trang 30

study results

@ 802.11i provides

a Satisfactory data confidentiality & integrity with CCMP

a Satisfactory mutual authentication & key management

@ Some implementation mistakes

a security Level Rollback Attack in TSN

=» Reflection Attack on the 4-Way Handshake

® Availability is a problem

=» Simple policies can make 802.111 robust to some known DoS

=» Possible attack on Michael Countermeasures in TKIP a» RSN IE Poisoning/ Spoofing

» 4-Way Handshake Blocking

a Inefficient failure recovery scheme

Trang 31

some other case studies

LY

@ Wireless networking

Trang 33

33

Microsoft |ech!\et

Microsoft Security Bulletin MS05-042

Vulnerabilities in Kerberos Could Allow Denial of Service,

Information Disclosure, and Spoofing (899587)

Published: August 9, 2005

|

Affected Software:

¢ Microsoft Windows 2000 Service Pack 4

Microsoft Windows XP Service Pack 1 and

Microsoft Windows XP Service Pack 2

Microsoft Windows XP Professional x64 Edition

Microsoft Windows Server 2003 and

Microsoft Windows Server 2003 Service Pack 1

Microsoft Windows Server 2003 for Itanium-based Systems and

Microsoft Windows Server 2003 with SP1 for Itanium-based Systems

Microsoft Windows Server 2003 x64 Edition

Trang 34

| Cervesato, A D Jaggard, Kerberos Pro} ect A Scedrov, J.-K Tsay, and

#@ Formal verification of fixes preventing attack

=m Close, ongoing interactions with IETF WG

34

Trang 35

Public-Key Kerberos

@ Extend basic Kerberos 5 to use PKI

a» Change first round to avoid long-term shared keys

a Originally motivated by security

¢ If KDC is compromised, don’t need to regenerate shared keys

¢ Avoid use of password-derived keys

=» Current emphasis on administrative convenience

¢ Avoid the need to register in advance of using Kerberized services

@ This extension is called PKINIT

» Current version is PKINIT-29

a Attack found tn -25; fixed tn -27

a» Included in Windows and Linux (called Heimdal)

m Implementation developed by CableLabs (for cable boxes)

35

Trang 36

Kerberos server K replies with credentials for I, including: fresh keys SM

I decrypts, re-encrypts with C's public key, and replaces her name with C's:

-C receives K's signature over ‘{msg},., is encryption of msg with key

k,n, and assumes k, AK, etc., "[msg ]¿„y is signature over msg with key

- were generated for C (not I)

Trang 37

Fix Adopted in pk-init-27

The KDC signs k, cksum (place of k, n,)

¢ k is replyKey

¢ cksum is checksum over AS-REQ

¢ Easier to implement than signing ©, k, n,

® Formal proof: this guarantees authentication

» Assume checksum is preimage resistant

» Assume KDCGs signature keys are secret

Published proof uses simplified symbolic model Cryptographically sound proofs now exist

37

Trang 38

Recent and ongoing protocol efforts

-

XỬ

@ Wireless networking authentication

m 802.11i — improved auth for access point

» 802.16e — metropolitan area networks

m Simple config — setting up access point

m Bluetooth simple pairing protocols

a» PKINIT — public-key method for cross-domain authentication

a» Full cryptographically sound proof recently developed

Trang 39

cI

Conclusions

L/

@ Protocol analysis methods

=» Model checking is fairly easy to apply

» Ready for industrial use

=» Logical proofs are feasible, can be made easier

@ Example: Wireless 802.111

39

» Automated study led to improved standard

» Deployment recommendations, more flexible error recovery

® Many ongoing efforts

» Examples: Wireless networking, VoIP, mobility

=» Typical standardization effort takes a couple of years

Achievable goal: systematic methods that can be used

by practicing engineers to improve network, system

security

Ngày đăng: 05/03/2014, 21:20

TỪ KHÓA LIÊN QUAN