Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data...

39
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data

Transcript of Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data...

Page 1: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Securing Data at the Application Layer

Planning Authenticity and Integrity of Transmitted Data

Planning Encryption of Transmitted Data

Page 2: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Planning Authenticity and Integrity of Transmitted Data

Providing authenticity and integrity of transmitted data

Planning Server Message Block (SMB) signing Planning digital signing

Page 3: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Two Methods That Provide Authenticity and Integrity of Transmitted Data at the Application Layer SMB signing Secure/Multipurpose Internet Mail Extensions

(S/MIME) and Pretty Good Privacy (PGP)

Page 4: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Planning SMB Signing SMB signing is also known as Common Internet File

System (CIFS). SMB signing ensures the authenticity and integrity of

packets transmitted between a client and a server. Each packet is signed as it is transmitted and then

verified at the recipient computer. SMB signing is implemented in high-security

networks to prevent impersonation of clients and servers.

SMB signing authenticates the user and the server hosting the data.

If authentication fails on either side, data transmission will not take place.

Page 5: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

SMB Signing Process

Page 6: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Message Digest v5 (MD5) Algorithm

MD5 is used to create the key that is used to create the digest.

The MD5 algorithm breaks the data into 512-bit blocks and produces a 128-bit message digest for each 512-bit block of the data.

The key is computed from the session key established between the client and the server and the initial response sent by the client to the server's challenge.

Page 7: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

When to Use SMB Signing

Use SMB signing in networks that implement both Microsoft Windows 2000–based clients and down-level Windows clients.

IPSec Authentication Headers (AH) are supported only in a pure Windows 2000 network.

SMB signing is supported by Windows 2000, Microsoft Windows NT 4.0 (Service Pack 3), and Microsoft Windows 98–based clients.

Windows 95–based clients do not support SMB signing.

Page 8: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Deployment of SMB Signing

Page 9: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

SMB Signing: Windows 2000–Based Clients

Workgroup environment Deploy the security template file by using the

Secedit command. Copy the completed security template locally to each

computer. Create a batch file that calls the Secedit command,

using the /configure option to apply the security template

Page 10: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

SMB Signing: Windows 2000–Based Clients (Cont.)

Domain environment

Page 11: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

SMB Signing: Windows 2000–Based Clients (Cont.)

Choosing domain or workgroup settings depends on

The role of the Windows 2000–based computer The security requirements for SMB signing defined

for the network

Page 12: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

SMB Signing: Windows NT 4.0–Based Clients Windows NT 4.0 introduced support for SMB signing in

Service Pack 3 (SP3). Requires editing of the registry. Create a custom template file and apply the settings with

the System Policy Editor. If Windows NT 4.0 is operating in a domain environment,

apply the settings to a Ntconfig.pol configuration file. Registry key for clients functioning as a server

HKEY_LOCAL_MACHINE \System\CurrentControlSet\Services\LanManServer\Parameters

Registry key for clients functioning as a client HKEY_LOCAL_MACHINE \System\CurrentControlSet\Services\Rdr\Parameters

Page 13: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

SMB Signing: Windows 98–Based Clients

Windows 98 includes an updated version of the SMB protocol.

Requires editing of the registry. Deploy these settings by e-mailing a .reg file

containing the desired settings. Registry key for clients

HKEY_LOCAL_MACHINE \System\CurrentControlSet\

Services\VxD\Vnetsup

Page 14: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Making the Decision: Planning SMB Signing Security

Require that all communications to a server use SMB signing.

Allow SMB signing to fall back to unsigned communications.

Deploy SMB signing configuration for Windows 2000–based clients.

Deploy SMB signing configuration for Windows NT 4.0–based clients.

Deploy SMB signing configuration for Windows 98–based clients.

Page 15: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Applying the Decision: Planning SMB Signing Security for Fabrikam Inc.

Implement SMB signing for the Radar System project, using different methods depending on the computer's OS.

The HELIOS server Windows 2000 clients Windows NT 4.0 clients Windows 98 clients

SMB signing is not required for the Sonar System project.

Page 16: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Applying the Decision: Proposed OU Structure for Windows 2000–Based Clients for Fabrikam Inc.

Page 17: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Planning Digital Signing

Digital signatures ensure the authenticity and integrity of e-mail messages between clients.

Public Key Infrastructure (PKI) is required to deploy the necessary public/private key pairs to participating clients.

Digital signatures function by applying a digest function to the contents of the message to create a message digest.

If the contents of the message are modified, the message digest output will also change.

Page 18: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Digital Signature Process

Page 19: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Determining Protocol Choices for Digital Signing

Two protocols provide digital signatures for e-mail applications:

S/MIME PGP

Determine which protocol to use based on the e-mail application deployed.

Page 20: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Deploying Public Keys

Ensure the availability of public keys when implementing digital signatures.

Without a public key, the digest encrypted with the sender's private key cannot be decrypted to verify message integrity.

The digital certificate must be issued by a Certificate Authority (CA) that the recipient trusts.

The Certificate Revocation List (CRL) must be accessible to any recipients so the revocation status of the digital certificate can be verified.

If the CRL cannot be accessed, the certificate is assumed to be revoked.

Page 21: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Ensuring the Availability of Public Keys

Configure e-mail clients to include their certificate with all signed messages.

Implement the Key Management Service (KMS) in Microsoft Exchange Server 5.5 or Microsoft Exchange 2000 Server.

Page 22: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Making the Decision: Digital Signature Design

Choose which protocol to use for digitally signing e-mail messages within the organization.

Ensure that important messages are digitally signed.

Ensure that digital signatures are validated. Limit which users can use digital signatures.

Page 23: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Applying the Decision: Digital Signature Design for Fabrikam Inc.

Provide the ability to digitally sign messages. Defense Department price quotes The Radar System project The Sonar System project

Determine which users need to acquire certificates for digitally signed e-mail.

Determine whether the partners of the Defense Department and A. Datum Corporation use PGP or S/MIME for their e-mail packages.

Page 24: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Planning Encryption of Transmitted Data

Planning secure e-mail encryption Planning application-level encryption with

Secure Sockets Layer/Transport Layer Security (SSL/TLS)

Page 25: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Planning Secure E-Mail Encryption

Contents of e-mail messages are vulnerable to inspection.

Digital signing does not prevent someone from inspecting e-mail messages during transmission across the network.

Simple Mail Transfer Protocol (SMTP) is the default protocol used for sending e-mail messages.

SMTP does not include any extensions for the encryption of e-mail.

Page 26: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

E-Mail Encryption Process

Page 27: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Encryption Levels for E-Mail

Algorithms supported in Microsoft Outlook 2000 Rivest's Cipher v2 (RC2) Data Encryption Standard (DES) Triple DES (3DES)

Encryption import and export laws RC2 (128 bit) and 3DES require the Windows 2000

High Encryption Pack to be installed. The Windows 2000 High Encryption Pack is subject to

import and export laws. The United States allows the export of the high

encryption to nonembargoed nations.

Page 28: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Protocol Choices for E-Mail Encryption

Choose between S/MIME and PGP for the encryption protocol.

Encryption protocols for e-mail cannot be mixed.

Page 29: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Making the Decision: Deploying E-Mail Encryption

Determine all approved e-mail applications that are in use.

Determine who can use secure e-mail. Determine where the private/public keys will be

acquired. Establish guidelines for the distribution of public

keys to recipients outside the organization. Establish an external public point for CRLs if

using an internal CA. Train users on when to encrypt messages.

Page 30: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Applying the Decision: Deploying E-Mail Encryption for Fabrikam Inc. Require encryption of e-mail sent to the Defense

Department and between project members on the Sonar System project.

The same infrastructure that is required for digitally signing e-mail messages works for encrypting e-mail messages.

It is recommended that Mail certificates be acquired from a public CA, or ensure that the CAs have their CRLs available on the Internet.

The users in the two projects should be trained on how to encrypt messages when the messages are sent to recipients in other companies.

The process may require that a digitally signed message is first sent between the two users who require encrypted mail.

The public key of the recipient is used to encrypt messages sent to that recipient.

Page 31: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Application-Level Encryption with SSL/TLS

Page 32: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Secure Sockets Layer (SSL)

SSL provides encryption services by using public and private keys to encrypt data transmitted between a server and a client.

SSL is commonly associated with Web browsers. The application must be programmed to support

SSL. SSL is implemented between the TCP and

application layer. SSL-enabled applications listen for client

connections on a different port than the usual port.

Page 33: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

SSL Provides Encryption Services to Other Protocols

Lightweight Directory Access Protocol (LDAP) Network News Transfer Protocol (NNTP) Post Office Protocol v3 (POP3) Internet Message Access Protocol v4 (IMAP4)

Page 34: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Transport Layer Security (TLS)

Similar to SSL in that TLS provides communications privacy, authentication, and message integrity by using a combination of public key and symmetric encryption

Uses different encryption algorithms than SSL Is an IETF draft standard Used by Windows 2000 to encrypt smart card

authentication information transmitted when using Extended Authentication Protocol (EAP)

Supports the option of reverting to SSL support if needed

May replace SSL in the future

Page 35: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Deploying SSL and TLS

The server hosting the application that uses SSL or TLS must acquire a private/public key pair for encrypting the data.

The benefit of using application-level security is that the encryption requires no additional work by the user.

The only noticeable change is https: in the URL rather than http:.

Page 36: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Encryption Process for Web-Based Applications

Page 37: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Making the Decision: Designing Application-Level Encryption Using SSL and TLS Enable secure Web communications. Enable secure Web communications for a public Web

site. Enable secure communications for a private Web site. Secure authentication to a Web site and support any

browser. Define the level of encryption to use for a Web site. Enable strong encryption at a Windows 2000 Web

server. Enable strong encryption at a Windows client. Minimize reduction in performance due to encryption

of transmitted data.

Page 38: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Applying the Decision: Designing Application-Level Encryption for Fabrikam Inc. Ensure that information entered into or

downloaded from Web pages stored on the three separate Web sites is not compromised during transmission.

Defense Department bidding Web site Sonar project time sheet Web site The Sonar System project server

Page 39: Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.

Chapter Summary

Providing authenticity and integrity of transmitted data

Planning SMB signing Planning digital signing Planning secure e-mail encryption Planning application-level encryption with

SSL/TLS