Security: Certificates, SSL Banking, Monitoring
Security: Certificates, SSL Banking, Monitoring
Security: Certificates, SSL Banking, Monitoring
264 Lecture 18
Security: certificates, SSL Banking, monitoring
Case study 3
Network attack and defense
List 4 strategies that firewalls and SSL dont address List measures to mitigate these risks
Case study 4
What is the credit card fraud rate in various countries? What is the merchant discount? What fraction of merchant discount goes to
Fraud costs Interest costs Incentives
Digital signatures
Sender Sender signature Senders private key Digital signature Senders public key Recipient Sender signature
Use public/private key in opposite fashion from message encryption to provide sender authentication
Sender signs document with her private key Receiver decrypts with senders public key If the decryption is correct, message must have been sent by sender
Compare:
Encryption:
Sender signs message with receiver public key and sends Receiver decrypts with her private key This allows any sender to send secure messages to any receiver Secure Sockets Layer(SSL) distributes public keys covered next
Digital signature:
Sender signs message with own private key and sends Receiver decrypts with senders public key This allows any receiver to verify the sender of any message
Digital envelopes
To solve performance problems with public key encryption
1. Client generates session key, a secret symmetric key, at random 2. Client encrypts msg using session key and symmetric algorithm 3. Client encrypts session key with receivers public key: digital envelope 4. Client sends encrypted message and digital envelope to receiver 5. Receiver uses her private key to decrypt envelope and get session key 6. Receiver uses session key to decrypt message 7. When session is over, both parties discard session key 8. Optionally, digital certificate could be used at start of session to verify client identity
Client and server negotiate strongest common protocol SSL has built-in compression
Encrypted message has no patterns and cant be compressed, so compression must be done before or within SSL, or not at all
7. CertificateVerify: Optional, rarely done. Can authenticate client 8. ChangeCipherSpec: Confirm session key and cipher to be used 9. Finished: Client and server message digest entire conversation to ensure all messages were received intact 10. Client and server switch to encrypted mode using symmetric session key
SET protocol
3. Pay CA fee 4. CA verifies your identity, cursorily or extensively 5. If you are ok, CA creates certificate body with your public key and ID info:
Server (site) certificate has URL Browser (personal) certificate has name and email address
6. CA generates message digest from certificate and signs it with its private key, creating the actual certificate 7. CA sends certificate to you.
Its reasonable to generate and administer your own public and private keys when number of sites is limited
Certificate problems
Events invalidating public/private key pair
Theft, change of ID info, compromise of key Disk corruption (private key is encrypted via password on disk) Certificate revocation list (CRL) intended but often not implemented
Technically, should check against CRL before communicating
Banking systems
Double entry bookkeeping Clark-Wilson security model (see text)
Formal definitions of electronic bookkeeping Separation of duties is most troublesome principle
Prevent-detect-recover model
Fraud occurred disproportionately in situations where the standard assumptions didnt hold
These were known beforehand
Banking, cont
Bank-bank transfers handled by SWIFT
Protection through substantial manual supervision
Automatic teller machines (ATMs) and point of sale terminals (POS) and transit ticket machines
Hardware security modules used for PINs, encryption Dual channels to send card, PINs, generate PINs, etc.
Data processing errors (high volume, some errors) Thefts of cards from the mail system Fraud by bank staff Almost no sophisticated technical fraud has occurred
Internet Explorer:
Malicious Web page vulnerability, memory corruption
Windows libraries Office and Outlook Express Windows weak/default passwords Backup software: compromised to obtain sensitive data Antivirus software: buffer overflows and evasion software PHP software: many weaknesses, very popular framework Databases: buffer overflows, SQL injection, weak passwords P2P software DNS: cache poisoning, open recursive servers Media players Instant messaging
Network attack
Motivations for attack:
Spam (roughly 1 cent per message sent)
Perhaps 30% of consumer PCs are compromised and are used as spam servers Bots and zombies
Firewall configuration
Workstations Internet Firewall
DMZ
Firewall
LAN
Firewall: Filters based on TCP/IP headers (source, destination) Disallows direct connections across firewall (proxy) Application level firewall inspects packet contents E.g., scans email for viruses, HTTP for binaries Audit
Security Realities
People are the major issue
Tiger team results Simple passwords, on post-it notes. Etc.
Security is based on
Prevention: client, server, network configuration Detection: firewall and other analysis Response: software, hardware, configuration changes
More information
Practical Cryptography, Schneier comp.risks newsgroup Proceedings of the Annual IEEE Symposia on Security and Privacy
Applied security Available online (MIT libraries)
www.cert.org
Advisories, patches