Part III-b Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Contents Part III-b Secure Applications and Security Protocols n Practical Security Measures n Internet Security n IPSEC, IKE n SSL/TLS n Virtual Private Networks n Firewall n Kerberos n SET Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Security Measures (1) n Smart-Cards Siemens Corporate Smartcard, SICRYPT n Biometry FingerTip Mouse n Crypto Chips n Secured PC SCENIC PC Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Security Measures (2) n Security Protocols Netscape TLS n Crypto Algorithms and Toolkits DES/AES, Crypto Library ACRYL n Secured Applications Trusted MIME n Secure Operating Systems Windows2000, SINIX Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Security Measures (3) n Crypto Boxes TopSec, optiSet Privacy Module n Firewalls n Anti Virus Software n Security Audit, Security Threat Analysis n Security Infrastructure Trusted CA Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Internet Security Protocol Layers Electronic ElectronicCommerce CommerceLayer Layer SET, SET, Ecash, Ecash, ... ... S-HTTP S-HTTP PGP PGP PEM PEM Transport Transport Layer Layer Security Security (SSH, SSL, TLS) (SSH, SSL, TLS) Datagram Datagram Security SecurityProtocol Protocol (WTLS, DSP) (WTLS, DSP) Transmission TransmissionControl Control Protocol Protocol (TCP) (TCP) User User Datagram DatagramProtocol Protocol (UDP) (UDP) IP/ IP/ IPSec IPSec(Internet (InternetProtocol Protocol Security) Security) n S/MIME S/MIME PKIX PKIX Public-Key Public-Key Infrastructure Infrastructure The security services provided by security mechanisms or protocols depend on the layer of integration: ð the mechanisms can only protect the payload and/or header information available at this layer ð header information of lower layers is not protected Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Placement of Security Functions n Higher Layers K K K K application specific, technology independent, end-to-end security possible usually software implementations higher layer security does not protect lower layers n Middle Layers K attractive when balancing security concepts from higher and lower layers n Lower Layers K K K K link/point-to-point security suited for crypto hardware lower layer can provide security services for and protect higher layers security functions inside the operating systems Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Internet Protocol Security (IPSEC) n IP Authentication Header (AH) ð for IP packet integrity and partial replay protection n Encapsulating Security Payload (ESP) ð for IP packet confidentiality and integrity Application Application // IKE IKE n AH, ESP can operate in a Transport and in a Tunnel mode ð application for Transport mode is secure host-to-host transport ð application for Tunnel mode is secure Virtual private networking (VPN) with security gateways TCP/UDP TCP/UDP n IKE is the default key-management protocol for IPSEC ð various key-exchange/keyestablishment protocols defined based on Diffie-Hellman Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 Application Data SA SAEstablishment Establishment Authentication Authentication Key KeyEstablishment Establishment Handshake IP/IPSec IP/IPSec Encapsulation Encapsulation Decapsulation Decapsulation Protected Data See IETF RFC 2401 - 2409 © Siemens AG 2001, ICN M NT IPSEC Transport and Tunnel mode Original IP packet IP Header TCP Header Data encrypted Transport Mode protected packet IP ESP Header header TCP Header ESP trailer Data Authenticated encrypted Tunnel Mode protected packet IP ESP Header header IP Header TCP Header Data ESP trailer Authenticated Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Internet Key Management (IKE) Peer A IKE IKE phase 1: Create secure IKE channel IKE phase 2: Create IPSEC SA supply IPsec SA AH/ESP Peer B IKE supply IPsec SA AH/ESP protected channel Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 AH/ESP © Siemens AG 2001, ICN M NT IKE Phases n IKE operates in two phases ð Phase 1 sets up a secure channel (referenced as ISAKMP SA). This requires a key exchange (Diffie-Hellman algorithm) with authentication (based on preshared symmetric keys, public key encryption or digital signatures). ð Phase 2 negotiates IPsec SAs over this secure channel. Derivation of several IPsec SAs or re-negotiation is possible without a new Phase 1 exchange. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Transport Layer Security (TLS) Secure Socket Layer (SSL) Secure WWW Server Browser Application Data Application Application http:// TLS TLS Negotiation Encapsulation Encapsulation Authentication Decapsulation DecapsulationKey Establishment TCP TCP https:// SSL SSL Transport System Protected Data Transport System Handshake HTTP IP IP HTTP over SSL n SSL/TLS provide optional client and server authentication with keymanagement and connection-oriented data confidentiality and integrity.. n There are only minor differences between SSL and TLS but they are not interoperable. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT SSL/TLS Handshake protocol Client Handshake: ClientHello(supported ciphers, Random) Server Handshake: ServerHello(chosen cipher, Random) Handshake: Certificate Handshake: ServerHelloDone Compute session keys Handshake: ClientKeyExchange ChangeCipherSpec(encrypted Master Secret) Handshake: Finished (session MAC) Compute session keys ChangeCipherSpec(encrypted Master Secret) Handshake: Finished(session MAC) application_data application_data Alert: warning, close_notify Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Some SSL/TLS applications n secure WWW communication (HTML/XML over TLS) n secure LDAP (LDAPS) n secure mobile WAP communication with WTLS n secured network management (SNMP over TLS) n secure e-commerce transactions (protected credit-card number) n secure login (server certificate + user password or with client certificate) n other secured Internet Applications (IMAP/POP3, NNTP, FTP, over TLS, ...) n secured multimedia/Voice-over-IP signaling (H.235) Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT SSL/TLS building blocks Application layer protocol SSL/TLS SSL/TLS SSL/TLS handshake change alert cipher protocol layer spec protocol protocol SSL/TLS record layer protocol TCP/IP layer protocol lower layer protocol Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT SSL/TLS record layer encapsulation Plaintext application layer PDU Content TLS/ SSL Type version length Application layer PDU CBC CBC MAC padding padding length encrypted protected SSL/TLS record layer PDU Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT SSL/TLS References n IETF RFC 2246 “The TLS Protocol Version 1.0”, 1999. n IETF RFC 2487 “SMTP Service Extension for Secure SMTP over TLS”, 1999. n IETF RFC 2595 “Using TLS with IMAP, POP3 and ACAP”, 1999. n IETF RFC 2817 “Upgrading to TLS Within HTTP/1.1”, 2000. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Virtual Private Networks (VPN) Intranet FW (Corporate Network) Secured VPN FW Client Intranet FW (Corporate Network) Internet Intranet Client (Corporate Network) Client Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT VPN n are secure, private overlay networks over the Internet. n secure tunneling protects any transmitted traffic between secure islands. n IPSEC, L2TP, PPP and SSL are the most widely used VPN techniques. n a VPN can be built on its own or be provided externally as a network service. n Firewalls or cryptoboxes can provide VPNs. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Firewall Mail Authentication Logging NEWS Accounting Client Anti Virus WWW Proxy Intranet Internet NAT DNS IPSEC Crypto box other Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 (Corporate Network) Client VPN © Siemens AG 2001, ICN M NT Firewall n are security gateways that are placed at the perimeter of a security domain. n control in/outgoing access to/from Intranet, Extranets and the Internet. n help enforcing a security policy. n Policies rules can be built using K packet filter K stateful inspection K application level gateway (ALG) n typically provide auxiliary security functions such as remote authentication, VPN, Anti Virus filter, proxies, logging/accounting and network address translation (NAT). n are a potential bottleneck. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Kerberos Architecture Ticket Granting Server Kerberos Server 2. TGS ticket 4. Server ticket 3. Request a server ticket 1. Request a TGS TGS ticket 5. Service Request Client Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 Application Server © Siemens AG 2001, ICN M NT Kerberos n was developed by MIT in 1970s for large campus computer networks. n uses a central, trusted key management center for authentication and as a key distribution facility. n is based entirely on symmetric keys (master keys, authentication keys, session keys) and synchronized time clocks. n Tickets convey shielded session keys and granted permission. n provides (authenticated) single-sign on and access control services to authorized resources. n supports reliable accounting for used services. n the core crypto protocols had several weaknesses, some caution is still necessary. n there is also a public-key variant of Kerberos. n there is a UNIX version in the public-domain. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT Secure Electronic Transaction (SET) Scenario Bank accepts and processes payment offer from Merchant Secure financial network Bank issues a credit card for the customer Issuer (Customer’s bank) Customer relationship Certification Authority (CA) Payment Gateway (PG) Issues certificates Processes payment offer owns a credit card purchases and pays digitally Acquirer (Merchant’s bank) Cardholder (customer) Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 Internet Monetary transfer Customer relationship Merchant (shop) sells goods via Internet accepts digital payments © Siemens AG 2001, ICN M NT SET Transaction 1. Customer queries shop 2. Merchant sends order form 3. Customer chooses payment method Issuer (Customer’s bank) 4. Customer sends purchase order and payment authorization (SET) SET Payment Gateway (PG) 8 7. Merchant delivers goods 10. Customer’s bank sends bill to customer. 6a 6 6. Authorization Request, acquirer bank confirms customer’s payment authorization (SET) 9. Acquirer bank performs clearing with customer’s bank Acquirer (Merchant’s bank) 10 5. Merchant confirms purchase order (SET) 8. Merchant requests payment from acquirer bank (SET) 9 1 2 3 Cardholder (customer) SET Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 4 5 7 Merchant (shop) SET © Siemens AG 2001, ICN M NT SET Certificate Hierarchy Root Signature SET Brand Signature Visa, MasterCard, ... Geopolitical Signature Deutsche Bank, ... Issuer Signature Jochen Müller, ... Cardholder Signature Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 Deutschland, USA, ... Acquirer Signature ASK, ... Merchant Signature Commerzbank, ... Payment GW Signature © Siemens AG 2001, ICN M NT SET Security n Hash-Algorithms ð SHA-1 (160 bit has length) n Encryption ð DES-56 in CBC mode, exportable DES-40 (CDMF) ð RSA (1024 bit key length, Root CA 2048 bit) n X.509 certificates n RSA for digital envelopes and digital signatures (PKCS#7) n Dual signatures: Sign (MD (MD (payment auth.) ° MD (offer desc.))) n idempotent messages, multiple send possible ð nonces allow detection of duplicates Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001 © Siemens AG 2001, ICN M NT