02-Network Security Protocols
02-Network Security Protocols
Review
• Chapter 1: Basic Concepts and Terminology
• Chapter 2: Basic Cryptographic Tools
• Chapter 3 – User Authentication
• Chapter 4 – Access Control Lists
• Chapter 5 – Database Security (skipped)
• Chapter 6 – Malicious Software
• Networking Basics (not in book)
• Chapter 7 – Denial of Service
• Chapter 8 – Intrusion Detection
• Chapter 9 – Firewalls and Intrusion Prevention
• Chapter 10 – Buffer Overflow
• Chapter 11 – Software Security
• Chapter 12 – OS Security
• Chapter 22 – Internet Security Protocols
Chapter 22
Internet Security
Protocols and Standards
MIME and S/MIME
MIME S/MIME
• extension to the old RFC
822 specification of an • Secure/Multipurpose
Internet mail format Internet Mail Extension
– RFC 822 defines a simple • security enhancement to
heading with To, From, the MIME Internet e-mail
Subject format
– assumes ASCII text format – based on technology from
RSA Data Security
– provides a number of new
header fields that define – provides the ability to sign
and/or encrypt e-mail
information about the body of
messages
the message
MIME
Content
Types
S/MIME Content Types
Typical S/MIME Process
Bob's private Alice's public
key One-time key
session key
DhYz949avHVA
t5UpjUXn8L79o
ADnluV3vpuhE
HMEcMBB1K9
This is an This is an Y8ZoJOYAmF2
S/MIME S/MIME BsIpLbjDkNJQR
message from message from j98IklSSmju650
Bob to Alice. Bob to Alice. SoDlFkYYtTqw
Bob will sign Bob will sign po9812KKlmHx
and encrypt the and encrypt the cFGIU8700qQrR
message before message before sdfgIUYTp0m8
sending it to sending it to H7G4FF32jkoN
NNmj78uqwplH
Plaintext message Digital signature Message with Encrypted copy Document converted
(unisigned) added signature encrypted of session key to Radix-64 format
(DSS/SHA) with one-time added
session key (El Gamal)
(Triple DES)
encrypted cleartext
encoded nesting of
content message +
message + signed and
and encoded
signed encrypted
associated signed
digest entities
keys digest
DomainKeys Identified Mail
(DKIM)
• specification of cryptographically signing
e-mail messages permitting a signing
domain to claim responsibility for a
message in the mail stream
• proposed Internet Standard (RFC 4871:
DomainKeys Identified Mail (DKIM)
Signatures)
• has been widely adopted by a range of
e-mail providers
Message transfer Message transfer Message transfer
agent (MTA) agent (MTA) agent (MTA)
SMTP SMTP
SMTP (SMTP,
local)
(SMTP,
SMTP
local) Internet
Message user Message Message store Mail
agent (MUA) (MS)
author
Architecture
(IMAP, POP,
local)
MTA
MTA
SMTP
SMTP
MDA
MSA
DNS
Example of
Signer Verifier
POP, IMAP
DKIM
SMTP
MUA
MUA
Deployment
Mail origination Mail delivery
network network
RFC2246: Transport
Layer Security (TLS) embedded in
specific
packages
SSL Protocol Stack
SSL SSL Change
Handshake Cipher Spec SSL Alert HTTP
Protocol Protocol Protocol
TCP
IP
Fragment
Compress
Add MAC
Encrypt
Append SSL
Record Header
SSL
hello
server_ compression method, and initial random
numbers.
te
certifica
server_
key_exc
certifica
te_requ
hange
es t
Phase 2
Server may send certificate, key exchange,
and request certificate. Server signals end
of hello message phase.
Handshake
Protocol
one
hello_d
server_
Time
certifica
te
client_k Phase 3
ey_exch
ange Client sends certificate if requested. Client
sends key exchange. Client may send
certifica
te_verif certificate verification.
y
change_
cip her_spe
c
finished
Phase 4
Change cipher suite and finish
spec
cipher_ handshake protocol.
change_
finished
Sequence Number
Authentication Coverage
Confidentiality Coverage