L6 CommSecurity
L6 CommSecurity
SECURITY
DR. NOR FADZILAH ABDULLAH
JKEES, FKAB
Contents adopted from William Stallings “Cryptography & Network Security” 6th Edition
(Chapter 17, 19 & 20) & other online sources
COURSE STRUCTURE
No. Topic
1 Security principles and practices
2 Classic Ciphers
3 Symmetric Ciphers
4 Asymmetric Ciphers & Public key crytosystems
5 Authentication & Integrity
6 Communication security across different layers
2
SECURITY ON DIFFERENT LAYERS
• Phase 2
• Setting up encryption between devices using Quick Mode IPsec to
coordinate ciphers and key sizes
7
IPSEC MODES
Tunnel Mode
• Entire IP packet is encrypted and becomes the data component of a new (and
larger) IP packet
• Frequently used in an IPsec site-to-site VPN
Transport Mode
• IPsec header is inserted into the IP packet
• No new packet is created
• Works well in networks where increasing a packet’s size could cause an issue
• Frequently used for remote-access VPNs
11
IPSec: AH
• Hash of the packet & a shared key (e.g. MD-5, SHA1 or SHA-2)
• 2 modes of transport:
• Transport mode: header is inserted just after the IP header
• Tunnel mode: whole IP packet is encapsulated with a completely new IP
header e.g. VPN
13
anti-replay provided by sequence number field
IPsec: ESP
• Has ESP header & trailer (padding) & Integrity Check Value (HMAC):
provide integrity & authentication
• Hash (MD5, SHA-1 or SHA-2) & encryption (3DES or AES)
IPSEC: ESP
15
TRANSPORT ADJACENCY
16
IPSEC WITH AH AND ESP
17
IEEE 802.11i WLAN SECURITY
• There is an increased need for robust security services and mechanisms
for wireless LANs
• Capability Discovery
• Authentication
• Association
IEEE 802.1X
ACCESS CONTROL APPROACH
• Port-based network access control
• The authentication protocol that is used, the extensible authentication
protocol (EAP), is defined in the IEEE 802.1X standard
• 802.1X uses:
• Controlled ports
• Allows the exchange of pdus between a supplicant and other systems on the
LAN only if the current state of the supplicant authorizes such an exchange
• Uncontrolled ports
• Allows the exchange of pdus between the supplicant and the other AS,
regardless of the authentication state of the supplicant
IEEE 802.11i Key Hierarchies
TRANSPORT LAYER SECURITY (TLS)
Most browsers come
Can be embedded in equipped with TLS,
One of the most and most Web servers
widely used security specific packages have implemented the
services protocol
Could be provided as
part of the underlying
Defined in RFC 5246 protocol suite and
therefore be transparent
to applications
27
HTTPS (HTTP OVER SSL/TLS)
• Refers to the combination of HTTP and SSL/TLS to implement secure
communication between a web browser and a web server
• A user of a web browser will see URL addresses that begin with https://
rather than http://
31
CHANNEL TYPES
Four channel types are recognized in the SSH Connection Protocol specification
Session
• The remote execution of a program
• The program may be a shell, an application such as file transfer or e-mail, a system command,
or some built-in subsystem
• Once a session channel is opened, subsequent requests are used to start the remote program
X11
• Refers to the X Window System, a computer software system and network protocol that
provides a graphical user interface (GUI) for networked computers
• X allows applications to run on a network server but to be displayed on a desktop machine
Forwarded-TCPIP
• Remote port forwarding
Direct-TCPIP
• Local port forwarding
© 2017 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
E-MAIL SECURITY
Is a text-based client-
server protocol
41
S/MIME: AUTHENTICATION
• Provided by means of a digital signature
1. The sender creates a message
2. SHA-256 is used to generate a 256-bit message digest of the message
3. The message digest is encrypted with RSA using the sender’s private key,
and the result is appended to the message. Also appended is identifying
information for the signer, which will enable the receiver to retrieve the
signer’s public key
4. The receiver uses RSA with the sender’s public key to decrypt and recover
the message digest
5. The receiver generates a new message digest for the message and
compares it with the decrypted hash code. If the two match, the message
is accepted as authentic
• Detached signatures are supported
42
• A detached signature may be stored and transmitted separately from the
message it signs
S/MIME: CONFIDENTIALITY
• S/MIME provides confidentiality by encrypting messages
• Most commonly AES with a 128-bit key is used, with the cipher block
chaining (CBC) mode
• The key itself is also encrypted, typically with RSA
• Each symmetric key, referred to as a content-encryption key, is used only
once
• A new key is generated as a random number for each message
• Because it is to be used only once, the content-encryption key is bound to
the message and transmitted with it
• To protect the key, it is encrypted with the receiver’s public key
• To reduce encryption time, the combination of symmetric and public-key
encryption is used
• Only the recipient is able to recover the session key that is bound to the 43
message
S/MIME: E-MAIL COMPATIBILITY
• Many electronic mail systems only permit the use of blocks consisting of
ASCII text
• To accommodate this restriction, S/MIME provides the service of converting
the raw 8-bit binary stream to a stream of printable ASCII characters
• The scheme used for this purpose is Base-64 conversion
• Each group of three octets of binary data is mapped into four ASCII characters
• The Base-64 algorithm blindly converts the input stream to Base64 format
regardless of content, even if the input happens to be ASCII text
• RFC 5751 recommends that even if outer 7-bit encoding is not used, the
original MIME content should be 7-bit encoded
44
S/MIME: COMPRESSION
• S/MIME offers the ability to compress a message
• This has the benefit of saving space both for email transmission and for
file storage
• Compression can be applied in any order with respect to the signing and
message encryption operations
• RFC 5751 provides these guidelines:
• Compression of binary encoded encrypted data is discouraged, since it will
not yield significant compression; Base64 encrypted data could very well
benefit, however
• If a lossy compression algorithm is used with signing, you will need to
compress first, then sign
45
S/MIME: E-MAIL COMPATIBILITY
• Many electronic mail systems only permit the use of blocks consisting of
ASCII text
• To accommodate this restriction, S/MIME provides the service of converting
the raw 8-bit binary stream to a stream of printable ASCII characters
• The scheme used for this purpose is Base-64 conversion
• Each group of three octets of binary data is mapped into four ASCII characters
• The Base-64 algorithm blindly converts the input stream to Base64 format
regardless of content, even if the input happens to be ASCII text
• RFC 5751 recommends that even if outer 7-bit encoding is not used, the
original MIME content should be 7-bit encoded
46
S/MIME VS. PGP
Key Certification:
• S/MIME uses X.509 certificates that are issued by Certificate Authorities (or local agencies that have
been delegated authority by a CA to issue certificates) trusted if there is a valid PKIX chain to a
trusted root
• In OpenPGP, users generate their own OpenPGP public and private keys and then solicit signatures
for their public keys from known individuals or organizations., trusted if it is signed by another
OpenPGP public key that is trusted by the recipient i.e. Web-of-Trust
Key Distribution:
• OpenPGP does not include the sender’s public key with each message, thus recipients of OpenPGP
messages need to separately obtain the sender’s public key to verify the message. Many
organizations post OpenPGP keys on TLS-protected websites: People who wish to verify digital
signatures or send these organizations encrypted mail need to manually download these keys and
add them to their OpenPGP clients. Keys may also be registered with the OpenPGP public key
servers (maintain a database of PGP public keys organized by email address). Anyone may post a
public key to the OpenPGP key servers, and that public key may contain any email address. There is
no vetting of OpenPGP keys use the Web-of-Trust to decide whether to trust a given public key.
47
EMAIL SECURITY: OTHER COUNTER
THREAT PROTOCOLS
• STARTTLS
• An SMTP security extension that provides authentication, integrity, non-
repudiation and confidentiality for the entire SMTP message by running SMTP
over TLS
• DNS Security Extensions (DNSSEC)
• Provides authentication and integrity protection of DNS data, and is an
underlying tool used by various email security protocols
• DNS-based Authentication of Named Entities (DANE)
• Is designed to overcome problems in the certificate authority (CA) system by
providing an alternative channel for authenticating public keys based on
DNSSEC, with the result that the same trust relationships used to certify IP
addresses are used to certify servers operating on those addresses 48
SUMMARY
• IPsec
• SSL/TLS
• SSH
• S/MIME
49
INTRUDERS
• Significant issue for networked systems is hostile or unwanted access
• Either via network or local
• Can identify classes of intruders:
• Masquerader
• Misfeasor
• Clandestine user
• Rule-based detection
• Attempts to define proper behavior
• Anomaly
• Penetration identification
INTRUSION PREVENTION
• Honeypots
• Password management
64
HONEYPOTS
Decoy security systems to lure potential attackers
Away from accessing critical systems
To collect information of their activities
To encourage attacker to stay on system so administrator can respond
Are filled with fabricated information that appear valuable
Instrumented to collect detailed information on attackers
activities
Single or multiple networked systems
IETF intrusion detection WG standards on-going
PASSWORD MANAGEMENT
• Front-line defense against intruders
• Users supply both:
• Login – determines privileges of that user
• Password – to identify them
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SECURITY DEVICES
FIREWALL TYPE DESCRIPTIONS
Packet filtering (Stateless) firewalls - usually part of a router firewall, which permits or denies
traffic basedon Layer 3 and Layer 4 information.
Stateful firewalls:
• Allows or blocks traffic based on state, port, and protocol.
• Monitors all activity from the opening of a connection until it is closed.
Application gateway firewalls (Proxy firewall) - filters information at Layers 3, 4, 5, and 7 of the
OSI referencemodel.
Host-based (server and personal) firewall - A PC or server with firewall software running on it.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SECURITY DEVICES
PACKET FILTERING FIREWALLS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SECURITY DEVICES
STATEFUL FIREWALLS
The most versatile and common firewall technology in use.
Provides stateful packet filtering by using connection information maintained in a state table.
Classified at the network layer but also analyzes traffic at OSI Layer 4 and Layer 5.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SECURITY DEVICES
NEXT-GENERATION FIREWALLS
Use application awareness and control to see and block risky apps.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
VIRTUAL PRIVATE NETWORKS
• VPN: tunnels can be set up on demand via IPSec (ESP) + each pair of
firewalls has to negotiate parameters e.g. the services, modes,
algorithms, and keys
• Transparent to users (like having a leased-line private network)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SECURITY DEVICES
ADVANTAGES AND DISADVANTAGES OF IDS AND IPS
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SECURITY DEVICES
TYPES OF IPS
Host-based IPS (HIPS):
• Software installed on a single host to monitor and analyze suspicious activity.
• Monitor and protect operating system and critical system processes that are specific to that host.
• Combine antivirus software, antimalware software, and firewall.
Network-based IPS:
• Implemented using a dedicated or non-dedicated IPS device.
• Are a critical component of intrusion prevention.
• Sensors detect malicious and unauthorized activity in real time and can take action when
required.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco identia 41
Conf l
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential