Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks...

55
Network and Communica1on Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: WyaJ Lloyd and Jeff Terrace hJp://www.cs.princeton.edu/courses/archive/spring09/cos461/ 1

Transcript of Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks...

Page 1: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Network and Communica1on Security 

COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) 

Mike Freedman Teaching Assistants: WyaJ Lloyd and Jeff Terrace 

hJp://www.cs.princeton.edu/courses/archive/spring09/cos461/ 

1

Page 2: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Overview 

•  Network security and defini1ons •  Brief introduc1on to cryptography –  Cryptographyic hash hunc1ons 

–  Symmetric‐key crypto –  Public‐key crypto 

•  IP‐Sec 

•  DNS‐Sec 

       (Slides par1ally from Nick Feamster’s GATech network security course) 

2

Page 3: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Internet’s Design: Insecure 

•  Designed for simplicity •  “On by default” design 

•  Readily available zombie machines 

•  AJacks look like normal traffic 

•  Internet’s federated opera1on obstructs coopera1on for diagnosis/mi1ga1on 

3

Page 4: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Security: Defini1on 

•  Security is a state of well‐being of informa1on and infrastructures in which the possibility of successful yet undetected the`, tampering, and disrup1on of informa1on and services is kept low or tolerable 

•  Security rests on confiden1ality, authen1city, integrity, and availability 

4

Page 5: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Basic Components 

•  Confiden'ality: concealment of informa1on or resources 

•  Authen'city: iden1fica1on and assurance of the origin of info 

•  Integrity: the trustworthiness of data or resources in terms of preven1ng improper and unauthorized changes 

•  Availability the ability to use the info or resource desired 

•  Non‐repudia'on: offer of evidence that a party indeed is the sender or a receiver of certain informa1on 

•  Access control: facili1es to determine and enforce who is allowed access to what resources (host, so`ware, network, …) 

5

Page 6: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Eavesdropping ‐ Message Intercep1on (AJack on Confiden1ality) 

•  Unauthorized access to informa1on •  Packet sniffers and wiretappers •  Illicit copying of files and programs 

A B

Eavesdropper

6

Page 7: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Eavesdropping AJack: Example 

•  tcpdump with promiscuous network interface – On a switched network, what can you see? 

•  What might the following traffic types reveal about communica1ons? – DNS lookups (and replies) –  IP packets without payloads (headers only) – Payloads 

7

Page 8: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Integrity AJack ‐ Tampering 

•  Stop the flow of the message •  Delay and op1onally modify the message 

•  Release the message again 

A B

Perpetrator

8

Page 9: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Authen1city AJack ‐ Fabrica1on 

•  Unauthorized assump1on of other’s iden1ty •  Generate and distribute objects under this iden1ty 

A B

Masquerader: from A

9

Page 10: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

AJack on Availability 

•  Destroy hardware (cuing fiber) or so`ware •  Modify so`ware in a subtle way •  Corrupt packets in transit 

•  Blatant denial of service (DoS): –  Crashing the server – Overwhelm the server (use up its resource) 

A B

10

Page 11: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Impact of AJacks 

•  The` of confiden1al informa1on •  Unauthorized use of – Network bandwidth – Compu1ng resource 

•  Spread of false informa1on 

•  Disrup1on of legi1mate services 

All a3acks can be related and are dangerous! 

11

Page 12: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

12

Introduc1on to Cryptography 

Page 13: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

13

What is Cryptography? 

•  Comes from Greek word meaning “secret” – Primi1ves also can provide integrity, authen1ca1on 

•  Cryptographers invent secret codes to aJempt to hide messages from unauthorized observers 

•  Modern encryp1on: – Algorithm is public, key is secret and provides security – May be symmetric (secret) or asymmetric (public) 

plaintext ciphertext plaintext encryption decryption

Page 14: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

14

Cryptographic Algorithms: Goal 

•  Given key, rela1vely easy to compute 

•  Without key, hard to compute (invert) 

•  “Level” of security o`en based on “length” of key 

Page 15: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

15

Three Types of Func1ons 

•  Cryptographic hash Func1ons – Zero keys 

•  Secret‐key func1ons – One key 

•  Public‐key func1ons – Two keys 

Page 16: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

16

Cryptographic hash func1ons 

Page 17: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

17

Cryptography Hash Func1ons 

•  Take message, m, of arbitrary length and produces a smaller (short) number, h(m) 

•  Proper1es – Easy to compute h(m) – Pre‐image resistance: Hard to find an m, given h(m) 

•  “One‐way func@on” – Second pre‐image resistance:  Hard to find two values that hash to the same h(m) •  E.g. discover collision:  h(m) == h(m’) for m != m’ 

– O`en assumed:  output of hash fn’s “looks” random 

Page 18: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Hash Algorithm Structure 

18

Page 19: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Hash and MAC Algorithms 

•  Hash Func1ons – Condense arbitrary size message to fixed size – By processing message in blocks – Through some compression func1on – Either custom or block cipher based 

•  Message Authen1ca1on Code (MAC) – Fixed sized authen1cator for some message – To provide authen1ca1on for message – By using block cipher mode or hash func1on 

19

Page 20: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

How hard to find collisions?  Birthday Paradox 

•  Compute probability of different birthdays 

•  Random sample of n people taken from k=365 days •  Probability of no repe11on: 

–  P = 1 ‐  (1)(1 ‐ 1/365)(1 – 2/365)(1 – 3/365) … (1 – (n‐1)/365) –  P ~ 1 – e^‐(n(n‐1)/2k –  Let k=n, P ~ 2^N/2 

20

Page 21: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

How Many Bits for Hash? 

•  If m bits, takes 2m/2 to find weak collision – S1ll takes 2m to find strong (pre‐image) collision 

•  64 bits, takes 232 messages to search (easy!) 

•  Now, MD5 (128 bits) considered too liJle 

•  SHA‐1 (160 bits) geing old 

21

Page 22: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

22

Example use 

•  Password hashing – Can’t store passwords in a file that could be read 

•  Concerned with insider aJacks! – Must compare typed passwords to stored passwords 

•  Does hash (typed) == hash (password) ? – Actually, a “salt” is o`en used:   hash (input || salt) 

•  File‐sharing so`ware (Freenet, BitTorrent) – File named by Fname = hash (data) 

– Par1cipants verify that  hash (downloaded) == Fname 

Page 23: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

23

Example use #2:  TCP SYN cookies 

•  General idea – Client sends SYN w/ ACK number 

– Server responds to Client with SYN‐ACK cookie •  sqn = f (1me, rand nonce, src ip, src port, dest ip, dest port) 

•  Server does not save state – Honest client responds with ACK (sqn) – Server checks response  –  If matches SYN‐ACK, establishes connec1on 

•  Prevents resource‐exhaus1ng aJack by clients 

Page 24: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

24

•  TCP SYN/ACK seqno encodes a cookie – 32‐bit sequence number 

•  t mod 32: counter to ensure sequence numbers increase every 64 seconds 

• MSS: encoding of server MSS (can only have 8 seings) 

•  Cookie: easy to create and validate, hard to forge –  Includes 1mestamp, nonce, 4‐tuple 

t mod 32

32 0

5 bits

MSS

3 bits

Cookie=HMAC(t, Ns, SIP, SPort, DIP, DPort)

Example use #2:  TCP SYN cookies 

Page 25: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

25

Symmetric (Secret) Key Cryptography 

Page 26: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

26

Symmetric Encryp1on 

•  Also: “conven1onal / private‐key  / single‐key” – Sender and recipient share a common key 

– All classical encryp1on algorithms are private‐key 

•  Was only type of encryp1on prior to inven1on of public‐key in 1970’s – And by far most widely used – Typically more computa1onally efficient  

Page 27: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

27

Symmetric Cipher Model 

Page 28: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

28

Requirements 

•  Two requirements –  a strong encryp1on algorithm –  a secret key known only to sender / receiver 

•  Mathema1cally:  Y = EK(X)       ;      X = DK(Y) 

•  Goal:  Given key, generate a 1‐to‐1 mapping to ciphertext that looks random if key unknown 

•  Assume encryp1on algorithm is known •  Implies a secure channel to distribute key 

Page 29: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Block vs. Stream Ciphers 

•  Block ciphers process messages in blocks, each of which is then en/decrypted  – Each block 64‐bits or more  – DES, AES, etc… 

•  Stream ciphers process messages a bit or byte at a 1me when en/decryp1ng  (e.g., MD4) 

29

Page 30: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

30

Public‐Key Cryptography 

Page 31: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Why Public‐Key Cryptography? 

•  Developed to address two key issues: – Key distribu'on – how to secure communica1on without having to trust a KDC with your key 

– Digital signatures – how to verify msg comes intact from claimed sender (w/o prior establishment) 

•  Public inven1on due to Whiwield Diffie & Mar1n Hellman in 1976 – known earlier in classified community 

31

Page 32: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Public‐Key Cryptography •  Public‐key/two‐key/asymmetric cryptography involves the use of two keys:  –  A public‐key, which may be known by anybody, and can be used to encrypt messages, and verify signatures  

–  A private‐key, known only to the recipient, used to decrypt messages, and sign (create) signatures 

•  Is asymmetric because –  Those who encrypt messages or verify signatures cannot decrypt messages or create signatures 

–  If “one‐way func1on” goes  c  F(m), then public‐key encryp1on is a “trap‐door” func1on: •  Easy to compute c  F(m) •  Hard to compute m  F‐1(m) without knowing k •  Easy to compute m  F‐1(m,k) by knowing k  32

Page 33: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Public‐Key Cryptography 

33

Page 34: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Security of Public Key Schemes •  Like private key schemes brute force exhaus've search aJack is always theore1cally possible  –  But keys used are too large (> 1024bits)  

•  Security relies on a large enough difference in difficulty between easy (compute) and hard (invert without trapdoor) problems – More generally the hard problem is known, but is made hard enough to be imprac1cal to break  

•  Requires the use of very large numbers –  Hence is slow compared to private key schemes  

34

Page 35: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

RSA 

•  Rivest, Shamir, & Adleman in 1977  –  best known & widely used public‐key scheme  

•  Based on exponen1a1on in a finite field over integers modulo a prime  –  Exponen1a1on takes O((log n)3) opera1ons (easy)  –  Uses large integers (e.g., 1024 bits) 

•  Security due to cost of factoring large numbers  –  factoriza1on takes O(e log n log log n) opera1ons (hard)  

35

Page 36: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

RSA Algorithm •  Key genera1on 

–  Generate two large primes  p and  q ;   compute n=p*q –  Find  e,d such that  e*d = 1 mod (p-1)(q-1) 

•  To encrypt a message M the sender: –  Obtain public key of recipient PU={e,n}  –  Compute  C = Me mod n, where  0 ≤ M < n 

•  To decrypt the ciphertext C the owner: –  Uses private key PR={d,n}  –  Computes   M = Cd mod n  

•  Note that msg M must be smaller than the modulus n –  Otherwise, hybrid encryp1on: 

•  Generate random symmetric key r •  Use public key encryp1on to encrypt r •  Use symmetric key encryp1on under r to encrypt M 

36

Page 37: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

37

IP Security 

Page 38: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

IP Security 

•  There is range of app‐specific security mechanisms –  eg. S/MIME, PGP, Kerberos, SSL/HTTPS 

•  However there are security concerns that cut across protocol layers 

•  Implement by the network for all applica1ons? 

            Enter IPSec! 

38

Page 39: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

IPSec 

•  General IP Security mechanisms •  Provides – authen1ca1on – confiden1ality – key management 

•  Ppplicable to use over LANs, across public & private WANs, and for the Internet 

39

Page 40: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

IPSec Uses 

40

Page 41: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Benefits of IPSec 

•  If in a firewall/router: – Provides strong security to all traffic crossing the perimeter 

– Resistant to bypass •  Is below transport layer, hence transparent to applica1ons 

•  Can be transparent to end users •  Can provide security for individual users •  Secures rou1ng architecture 

41

Page 42: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

IP Security Architecture 

•  Specifica1on is quite complex •  Defined in numerous RFC’s –  Incl. RFC 2401 / 2402 / 2406 / 2408 

•  Mandatory in IPv6, op1onal in IPv4 

•  Have two security header extensions: – Authentication Header (AH) – Encapsulating Security Payload (ESP) 

42

Page 43: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

IPSec Services 

•  Access control •  Connec1onless integrity •  Data origin authen1ca1on •  Rejec1on of replayed packets – A form of par1al sequence integrity via seq #’s – But not as robust as if on top of TCP (why not?) 

•  Confiden1ality (encryp1on) •  Limited traffic flow confiden1ality 

43

Page 44: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Transport vs. Tunnel Mode ESP 

•  Transport mode is used to encrypt & op1onally authen1cate IP data – Data protected but header le` in clear – Can do traffic analysis but is efficient – Good for host‐to‐host traffic 

•  Tunnel mode encrypts en1re IP packet – Add new header for next hop – Good for VPNs, gateway‐to‐gateway security 

44

Page 45: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

45

DNS Security 

Page 46: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Source: http://nsrc.org/tutorials/2009/apricot/dnssec/dnssec-tutorial.pdf 46

Page 47: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Root level DNS aJacks 

•  Feb. 6, 2007: – Botnet aJack on the 13 Internet DNS root servers 

– Lasted 2.5 hours – None crashed, but two performed badly: 

•  g‐root (DoD),   l‐root  (ICANN) •  Most other root servers use anycast 

47

Page 48: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Do you trust the TLD operators? 

•  Wildcard DNS record for all .com and .net domain names not yet registered by others – September 15 – October 4, 2003 – February 2004: Verisign sues ICANN 

•  Redirec1on for these domain names to Verisign web portal:  “to help you search” – and serve you ads…and get “sponsored” search 

48

Page 49: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Defense: Replica1on and Caching 

source: wikipedia 49

Page 50: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

DNS Amplifica1on AJack 

580,000 open resolvers on Internet  (Kaminsky‐Shiffman’06) 

DNS Server 

DoS Source 

DoS Target 

DNS Query SrcIP:  DoS Target 

    (60 bytes) 

EDNS Reponse 

(3000 bytes) 

DNS Amplifica1on aJack:   ( ×40  amplifica1on ) 

50 

Page 51: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

aSacker 

Solu1ons 

ip spoofed packets

victim

open amplifier 

prevent ip spoofing 

disable open amplifiers 

51

Page 52: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

But should we believe it?  Enter DNSSEC 

•  DNSSEC protects against data spoofing and corrup1on 

•  DNSSEC also provides mechanisms to authen1cate servers and requests 

•  DNSSEC provides mechanisms to establish authen1city and integrity 

52

Page 53: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

PK‐DNSSEC (Public Key) 

•  The DNS servers sign the hash of resource record set with its private (signature) keys 

•  Public keys can be used to verify the SIGs •  Leverages hierarchy: 

–  Authen1city of nameserver’s public keys is established by a signature over the keys by the parent’s private key 

–  In ideal case, only roots’ public keys need to be distributed out‐of‐band 

53

Page 54: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Verifying the tree 

stub  resolver 

Ques'on:  www.cnn.com   ? 

www.cnn.com A ? 

resolver 

.(root)           ask .com server  SIG (ip addr and PK of .com server) 

.com www.cnn.com A ? 

ask cnn.com server    SIG (ip addr and PK of cnn.com server) 

cnn.com 

xxx.xxx.xxx.xxx 

add to cache 

src.cs.princeton.edu dns.cs.princeton.edu�

transac'on  

signatures 

slave servers transac'on  signatures 

54 

Page 55: Network and Communicaon Security...Network and Communicaon Security COS 461: Computer Networks Spring 2009 (MW 1:30‐2:50 in COS 105) Mike Freedman Teaching Assistants: Wya Lloyd

Summary 

•  Network security and defini1ons •  Introduc1on to cryptography –  Cryptographic hash func1ons:   •  Zero keys, hard to invert, hard to find collisions 

–  Symmetric‐key crypto •  One key, hard to invert, requires key distribu1on  

–  Public‐key crypto •  Two keys, hard to invert, more expensive 

•  Applica1on to crypto to help secure IP communica1on and DNS lookup 

55