1
04832250 – Computer Networks (Honor Track)
- Prof. Chenren Xu(许辰人)
04832250 Computer Networks (Honor Track) A Data Communication and - - PowerPoint PPT Presentation
04832250 Computer Networks (Honor Track) A Data Communication and Device Networking Perspective A Data Communication and Device Networking Perspective Module 6: Network Security Prof. Chenren Xu Center for Energy-efficient
1
2
q
http://courses.csail.mit.edu/6.857/
q
http://css.csail.mit.edu/6.858/
q
http://mews.sv.cmu.edu/teaching/14829/
3
4
5
§ Borisov, Nikita, et al., “Intercepting mobile communications: the insecurity of 802.11.” ACM MobiCom, 2001
Design flaws Implementation bug Weak password, etc.
Thread Model Old WiFi (WEP) New WiFi (WPA2) Break encryption from outside Very easy Very diffucult Guess WiFi password Often possible Often possible Get password from computer May be possible May be possible
6
§ Prove message came from real sender § Prove remote party is who they say § Prove message hasn’t been altered
§ Use approved design in approved way
7
8
9
10
§ All algorithms must be public: only the keys are secret
§ Alice and Bob share secret key § Encryption is a bit mangling box
§ Alice and Bob each have a key in two parts: a public part (widely known), and a private part (only owner knows) § Encryption is bases on mathematics (e.g., RSA is based
11
§ The algorithm must be a symmetric block cipher § The full design must be public § Key lengths of 128, 192, 256 bits must be supported § Both software and hardware implementations must be possible. § The algorithm must be public or licensed on nondiscriminatory terms.
12
%𝟐)
%𝟐; only he can do so
13
§ Often want to talk to new parties
§ Have to first set up shared secret
§ Need trusted directory service § We’ll look at certificates later
§ Want the best of both!
§ It’s a key! (Say 256 bits.)
§ Using the key they now share
§ Generated for short-term use
Property Symmetric Public key Key Distribution Hard – share serect per pair of users Easier – publish public key per user Runtime Performance Fast – good for high data rate Slow – few, small messages
14
§ This is called integrity/authenticity
§ Trudy is an active adversary (interferes)
§ Bob will decrypt it, and will receive an altered message
§ Bob will receive altered message § “Stop, don’t buy it now” -> …
15
16
%𝟐, Bob verifies with public key, 𝑳𝑩
17
18
19
20
21
22
23
§ 𝑳𝑻 lets client talk to AP § 𝑳𝑯 lets AP talk to all clients, needs to be updated as clients leave and join the network § MIC (Message Integrity Check), another name for MAC
The 802.11i key setup handshake
24
25
§ Clients encounter malicious content § Web servers are target of break-ins § Fake content/servers trick users § Data sent over network is stolen …
1. Eavesdropping client/server traffic 2. Tampering with client/server traffic 3. Impersonating web servers
26
§ SSL (Secure Sockets Layer) precedes TLS (Transport Layer Security)
§ Can be used by any app, not just HTTP
§ Client must authenticate server § Server typically doesn’t identify client
§ But how does client get server’s key?
q
With certificates
27
28
I certified the ABC website
29
Certificate lets Alice check Bob Switch to Alice’s session key Negotiate ciphers, send certificate, … Real Bob can compute session key Encrypted data
30
31
32
§ Assumes cache server has no entry for bob.com and the query response from top level server comes later
§ Put IP of authoritative nameserver as the source IP address
q
Reply ID that matches the request
§ There is no outstanding query after fake reply is accepted, so real reply will be discarded
33
§ Part of DNS client configuration
§ Replies include signatures/keys
34
35
§ There’s nasty stuff out there …
§ Private network with leased lines § Physically separated from Internet
§ Logically separated from Internet … § This is a Virtual Private Network (VPN)
§ Threat is Trudy may access VPN and intercept or tamper with messages
36
37
38
39
40
§ You can send to any other host
§ Any host can send packets to you! § There’s nasty stuff out there …
§ You can talk to hosts as intended § Trudy can’t talk to you over network
§ NAT box, Firewall / Intrusion Detection System
41
42
§ Reject outsider’s initialtives
43
44
§ You can send to any other host
§ Any host can send packets to you!
§ Host may become unresponsive § This is a form of denial-of-service
45
46
§ “Ping of death” malformed packet – bug driven § “SYN flood” sends many TCP connect requests and never follows up
§ Read about “SYN cookies” for interest
§ To saturate network links and cause high congestion/loss
q
Hosts send traffic flood to victim
q
Network saturates near victim
47
§ Ingress filtering is a best practice, but deployment has been slow
48
49