Professional Documents
Culture Documents
Security
Security
Security
Distributed Systems
Vrizlynn L. L. Thing
Office: 502
Email: vlt@doc.ic.ac.uk
Webpage: www.doc.ic.ac.uk/~vlt
Security
Securing Availability
Time Service
Peer-to-Peer Systems
What is Security
Security
Threat Analysis
Military vs. Commercial Security
Access Control
Authentication
Digests and Signatures
Security References
Network Security Essentials 2nd ed. W. Stallings Prentice Hall 2003.
Identify:
What security breaches can occur
Where they can occur
How they occur
Denial of
service
attack
File
Store
Processor
Switching
Node
Data
Data
Link
Link
Unauthorised Access,
Hacking,
Worms, viruses,
trojan horses
4
Security
Information or Resources
Recording,
Unauthorised usage
Threat Analysis 2
Security
Threat Analysis 1
Taps,
Radiation,
Crosstalk
Terminal
Passive Attack
Observe information in network without interference
Message content break confidentiality
Message traffic analysis frequency, length, source,
destination
Could have military significance
Active Attack
Modify message contents or message stream
Delete, delay, reorder, replay, insert valid or invalid
messages
Masquerade as authorised user
Denial of service by flooding servers with valid requests
Passwords gained through passive attack can be used for
active attack
Security
Threat Analysis 3
Require:
Security Threats 1
vulnerability detected
Risk Analysis: analyse the potential consequences of problems arising
from security breach + estimate cost of a successful attack
e.g. loss of revenue.
Prevention techniques: what can be done to prevent security breaches
and what are their cost?
Cost benefit analysis: do the consequences of security breaches justify
the cost of protection?
If security controls cause too much inconvenience or loss in performance
they will be bypassed.
Recovery: may be less costly than prevention??
8
Security
Virus
Trojan Horse
Performs a useful function, but contains hidden code to perform a
malicious function e.g. via compiler. Often produced by in-house
programmer.
May be triggered at a particular time or particular conditions
e.g. programmer no longer on payroll Logic Bomb
Require management of development process code inspection
Worm
Invades a workstation via the network, using a security loophole
(e.g. in remote login or Email) and implants a virus or Trojan horse.
Require monitoring to prevent, and patching known security bugs
Security
Security Threats 2
Hacker Detection
Statistical anomaly
Rule based expert systems
Security
10
Techniques
Try default passwords for standard accounts shipped with system
may not have been changed.
Password guessing copy password file; use known system
encryption algorithm with dictionary, names of users family, phone
numbers, sports etc; compare with stored encrypted password
Line tapping to capture passwords sent unencrypted or above
methods with encrypted passwords
Trojan horse e.g. in login program to capture passwords
Password Cracking
Unattended Terminal
Solution
Controlled format: 6 characters, Mixed upper and lower case +
some non-alphabetic characters.
No dictionary words or names.
Regular change by user validity time
One way encrypted storage, with date and time of last change also
encrypted.
Security
11
12
Security Policies
Mandatory Policy
The security rules which are built into the system and cannot
be changed by users i.e. they cannot be trusted to enforce
security policy.
E.g. no information from a high security level can flow to a
low security level.
Subjects labelled with clearances defining their privileges
Targets labelled with classification defining sensitivity
Discretionary Policy
Policy
Security
Classification level
of Subjects
Classification level
of Target Objects
top secret
top secret
secret
secret
confidential
confidential
unclassified
unclassified
write
Security
14
Security
Write up
Read down
read
15
Security
16
Security
Access Control
Access Control
Needed for
confidentiality: protect resources from being read
integrity: protect resources from being modified
availability: prevent denial of authorised access
18
Security
19
Firewalls
Firewall
External
Networks
Based on packet filters user defined filtering rules for both incoming and
outgoing messages.
Filtering criteria
Address only permit access from selected sites or hosts e.g. remote
sites of the same organisation, or collaborators.
Could be based on combinations of IP port address
Message type permit incoming Email & HTML (Web) messages but
prevent Telnet or FTP
Rule Action
In/
Source IP Source Dest IP
Dest
Description
Out
port
Port
in
8.2.3.1 *
*
*
Trust this set of hosts
8.2.3.255
allow
block
in
8.2.3.177
513
allow
out
80
allow
in
8.5.3.2
3024
6.5.2.1
1500
10
block
20
Security
Security
Identification
Personal Authentication
= Verification of identity of subject
Who are
You
Computer
Resource
Recommendations:
Use name/initials not numbers
Same ID for ALL systems & email
Individual accountability unique ID for each user
Identify users in logs and audit trails
No sharing of ID
Security
22
Authentication
21
Are you
who you say
you are?
23
Smart Cards
Embedded
microprocessor +
storage
Preprogrammed with
Key in PROM
Require possession
+ knowledge of PIN
No. generator
key
Challenge = r
Trust Issues
Workstations have promiscuous mode where they listen to all messages
F
y/n
Pin
HOST
Security
When logging into own workstation but servers will not trust it.
Re-authenticate for each server used inconvenient if many servers
are used.
Use trusted Authentication Service
25
Security
Authorisation
Access Matrix
object
User/
Subject
F1
mss
read, write
jnd
read
F2
Printer
O1
O2
a, b c
i, j
execute
b, c
read
jk
Any subject or user object should be given the minimum access rights
required to permit it to carry out its assigned task. This principle is
violated if a server has to take on the users identity in order to perform a
function on its behalf.
Security
26
xyz
Security
append
read, write
27
a, b
i, j, k
i
Authorisation Policy
User View
c
a
e
d
f
28
Security
(prohibited) to do to a target.
Specify:
Security
Authorisation Policy
Examples
Subject
Line Units
Target
Implementation
30
29
Operators
Security
31
Capabilities
A capability is a token or ticket which refers to a particular object and
Owner
GroupA
GroupB
fred
World
r
r
r
-
w
-
x
x
-
opa
opa
opa
-
opb
-
opc
opc
opc
Object Reference
Server
Object
Address Type
64
16
Operations
Object
Instance
32
16
Check
Field
64 bits
Security
32
Security
Capabilities
Security
34
Revocation of Capabilities
33
Security
35
Cryptography
Launch missiles at 10:00
M = Dk(C)
k
i.e. E = D
56 bit key applied to blocks of 64 bits of data easily cracked
36
Security
Key Management
Key Escrow
US Govt designed a chip for en/decryption called clipper
Secret keys should be held (in 2 halves) by trusted authorities so
that they can tap conversations & messages between criminal,
terrorists ( and political opponents??)
Very controversial
Security
C = Ek(M)
Decryption:
Security
M
k
Encryption:
Key K
Transformation of information based on:
Substitution e.g. table look up
Transposition e.g. exchange bytes 1 & 3, 2 & 4 etc.
Combine with a key which specifies what substitution or transposition to
use
Decryption
38
z
z
Public Key Kp sent out over network and stored with name servers
used by sender for encryption
Secret Key Ks used by recipient for decryption
Cannot deduce secret key from public key
Kp = (e, n)
Security
Ks = (d, n)
39
Encryption
E
M
Decryption
Kp = (e, n)
Decryption
C= EKpb{EKsa{M}}
D
C = M e (mod n)
M = DKpa{DKsb{C}}
M = C d (mod n)
Ks = (d, n)
Secret Key
Public Key
Security
Security
41
Message Digest
A one way function on a message a code which can be used to check
re-computes to check
Given message m it is easy to compute H(m)
Given H(m) it is impossible to compute m
No 2 messages can generate same H(m)
Use cryptographic hashing or encrypt digest.
Hashing is faster than encryption eg MD5 or Secure Hashing Algorithm
(SHA)
Pad message to multiple of 512 bits & mangle blocks of 512 bits to
Security
42
Security
43
Certification Problem
Alice has generated a new electronic work of art in the form of
a large 50MB file. She wants to be able to prove that she is
the originator of the work so requires a certificate from a
certification authority (CA).
Certification Solution
Alice CA :
Kcs{Alice, H(file), t}
Digital signature includes Alices ID and
time stamp of when it was generated. This
can be checked with the CAs public key.
Security
44
45
Security
Digital Signature
Notarised Signatures
E.g. Joe sends message to stockbroker to buy 10,000 shares in HAL Plc
which goes bust next day.
Joe may deny sending message or stockbroker may change number to
100,000 to offload other shares he had bought for himself.
Verify author, date and time of signature
non-repudiation of origin
Verify contents at time of signature
receiver or someone else cannot modify contents or forge
message claiming it came from sender.
Signature must be verifiable by third party to resolve dispute.
Signature must be unforgeable
Must be practical to retain copy of digital signature in storage.
Alice (A)
Bob (B)
z
z
Notary (N)
Security
Security
Notarised Signatures
In case of dispute Bob sends the following to the Notary
The notary can then verify the time, the sender and that the digest of
the encrypted message is valid so m has not been changed.
X 509 Certificates
Associate public key with user or service
Signed by a certification authority (CA)
Not forgeable can be stored in a directory
Issuer can revoke specific certificates hold revocation list.
Proof of receipt
N holds the original message until the receipt is received and checks
the digest H (Kab{m} ), adds its timestamp and Bs identity, then
forwards the receipt to A.
48
Security
Security
KAS stores identities, server private keys and encrypted user passwords
Kerberos
Authentication
Server (KAS)
ID, S
User
for S
t
e
k
Tic
Request ticket to B
Ticket for B
Client A
workstation
Security
Service R
equest
Serve
r Auth
entica
tor
50
Ticket
Service
S
Server
B
Once per
login
Once per
type of
service
Once per
service
session
Provide
user ID &
password
49
Security
51
Kerberos Interactions
A logs in and provides userid & password.
Security
Kerberos (Contd.)
Kerberos database can be replicated with master and multiple slaves kept
Security
54
Kerberos V5
Tickets have initial authentication time, ticket start-time, end time and
renew until time.
Better inter-realm authentication
Authenticators can include authorisation data
Multiple Realms
Remote realm ticket service (TS) must be registered with local TS.
Local TS gives tickets to remote TS which then gives ticket to remote
server.
does not scale to large numbers of realms
53
Security
Security
55
TLS Architecture
ServerHello
TLS
Handshake
protocol
TLS Change
Cipher Spec
TLSL Alert
Protocol
HTTP
Telnet
Certificate
Optionally send server certificate,
and request client certificate
Certificate Request
TLS Record Protocol
ServerHelloDone
Client
Certificate
Server
Certificate Verify
TLS protocols:
Other protocols:
Finished
Change Cipher Spec
Finished
Security
56
Handshake Protocol
58
57
Security
59
Summary
Physical security impossible in Distributed Systems
Networks inherently less secure than centralised computer systems as
Require:
Authentication
Access Control
Data confidentiality and integrity Service
Notarisation Service
Notation for specification of Authorisation policy
Encryption is an important mechanism for these services.
Security features attract hackers to try to break them
Commonsense in choice of passwords and careful management may be
adequate for many non-military applications
May be able to isolate critical components from network or use firewalls
Security
60