Lecture 4
Lecture 4
Lecture 4 – Applications
DNS, SSL
Outline
• Security: Authentication
• DNS
Lecture 4: 09-09-2002 2
What is Network Security?
Lecture 4: 09-09-2002 3
Friends and Enemies: Alice, Bob,
Trudy
• Well-known in network security world
• Bob & Alice want to communicate “securely”
• Trudy (intruder) may intercept, delete, add messages
Alice Bob
channel data, control
messages
Trudy
Lecture 4: 09-09-2002 4
Who might Bob, Alice be?
Lecture 4: 09-09-2002 5
There are bad Guys (and Girls) Out
There!
Q: What can a “bad guy” do?
A: A lot!
• Eavesdrop: intercept messages
• Actively insert messages into connection
Lecture 4: 09-09-2002 6
The Language of Cryptography
Alice’s Bob’s
KA encryption KB decryption
key key
Lecture 4: 09-09-2002 7
Symmetric Key Cryptography
plaintext: abcdefghijklmnopqrstuvwxyz
ciphertext: mnbvcxzasdfghjklpoiuytrewq
Lecture 4: 09-09-2002 8
Symmetric Key Cryptography
KA-B
KA-B
Lecture 4: 09-09-2002 9
Public Key Cryptography
Lecture 4: 09-09-2002 10
Public Key Cryptography
Lecture 4: 09-09-2002 11
Public Key Encryption Algorithms
Requirements:
+ -
1 Need KB( ) and KB ( ) such that
-
KB (KB+ (m)) = m
Lecture 4: 09-09-2002 12
RSA: Another Important Property
- + + -
KB(KB(m)) = m = KB (KB(m))
Lecture 4: 09-09-2002 13
Outline
• Security: Authentication
• DNS
Lecture 4: 09-09-2002 14
Authentication
Lecture 4: 09-09-2002 15
Authentication
In a network,
Bob can not “see” Alice,
so Trudy simply
“I am Alice” declares
herself to be Alice
Lecture 4: 09-09-2002 16
Authentication: Another Try
Alice’s
IP address
“I am Alice”
Failure scenario??
Lecture 4: 09-09-2002 17
Authentication: Another Try
Alice’s
IP address
“I am Alice”
Lecture 4: 09-09-2002 18
Authentication: Another Try
Alice’s Alice’s
“I’m Alice”
IP addr password
Lecture 4: 09-09-2002 19
Authentication: Another Try
Alice’s Alice’s
“I’m Alice”
IP addr password
Playback attack: Trudy
Alice’s records Alice’s packet
OK
IP addr and later
plays it back to Bob
Alice’s Alice’s
“I’m Alice”
IP addr password
Lecture 4: 09-09-2002 20
Authentication: Yet Another Try
Alice’s encrypted
“I’m Alice”
IP addr password
Lecture 4: 09-09-2002 21
Authentication: Another Try
Alice’s encrypted
“I’m Alice” Record
IP addr password
and
Alice’s
OK playback
IP addr
still works!
Alice’s encrypted
“I’m Alice”
IP addr password
Lecture 4: 09-09-2002 22
Authentication: Yet Another Try
“I am Alice”
R
KA-B(R) Alice is live, and
only Alice knows
key to encrypt
nonce, so it must
Failures, drawbacks? be Alice!
Lecture 4: 09-09-2002 23
Authentication: ap5.0
“I am Alice”
Bob computes
R + -
- KA(KA(R)) = R
KA(R)
and knows only Alice
“send me your public key”
could have the private
key, that encrypted R
KA+ such that
+ -
KA(KA(R)) = R
Lecture 4: 09-09-2002 24
ap5.0: Security Hole
“I am Alice”
Bob computes
R + -
- KT(KT(R)) = R
KT (R)
and authenticates
“send me your public key” Trudy
+
KT
Lecture 4: 09-09-2002 25
Outline
• Security: Authentication
• DNS
Lecture 4: 09-09-2002 26
Trusted Intermediaries
Lecture 4: 09-09-2002 27
Key Distribution Center (KDC)
KA-KDC KP-KDC
KX-KDC
KP-KDC KB-KDC
KY-KDC
KZ-KDC
KA-KDC KB-KDC
Lecture 4: 09-09-2002 28
Key Distribution Center (KDC)
Lecture 4: 09-09-2002 29
Certification Authorities
Bob’s digital +
public signature KB
+
key KB (encrypt)
CA
certificate for
K-
Bob’s private
identifying key CA Bob’s public key,
information signed by CA
Lecture 4: 09-09-2002 30
Certification Authorities
CA
public +
KCA
key
Lecture 4: 09-09-2002 31
Certificate Contents
• Serial number (unique to issuer)
• info about certificate owner, including algorithm and
key value itself (not shown) • Info about certificate
issuer
• Valid dates
• Digital signature by
issuer
Lecture 4: 09-09-2002 32
Secure Sockets Layer (SSL)
Lecture 4: 09-09-2002 33
SSL (continued)
Lecture 4: 09-09-2002 34
Network Security (Summary)
Lecture 4: 09-09-2002 35
Outline
• Security: Authentication
• DNS
Lecture 4: 09-09-2002 36
Naming
Lecture 4: 09-09-2002 37
Obvious Solutions (1)
• Doesn’t scale!
Lecture 4: 09-09-2002 38
Obvious Solutions (2)
Lecture 4: 09-09-2002 39
Domain Name System Goals
Lecture 4: 09-09-2002 40
DNS Records
FOR IN class:
• Type=A • Type=CNAME
• name is hostname • name is an alias name for some
“canonical” (the real) name
• value is IP address
• value is canonical name
• Type=NS
• Type=MX
• name is domain (e.g. foo.com) • value is hostname of mailserver
• value is name of authoritative associated with name
name server for this domain
Lecture 4: 09-09-2002 41
Hierarchical Name Space
• Administrative hierarchy
barracuda.cmcl.cs.cmu.edu • “.” as separator
• Host name to address section
• Top-level domains edu, gov, ca, us,
root etc.
org ca • Sub-domains = subtrees
net edu com uk • Human readable name = leaf root path
cs ece
cmcl
barracuda
Lecture 4: 09-09-2002 42
DNS Design: Zone Definitions
• Zone = contiguous
section of name space
root
• E.g., Complete tree,
org ca
single node or subtree
net edu com uk • A zone has an associated
set of name servers
gwu ucb cmu bu mit
Subtree
cs ece
cmcl Single node
barracuda
Complete
Tree
Lecture 4: 09-09-2002 43
DNS Design: Cont.
Lecture 4: 09-09-2002 44
Servers/Resolvers
Lecture 4: 09-09-2002 45
DNS: Root Name Servers
• Responsible for
“root” zone
• Approx. dozen root
name servers
worldwide
• Currently {a-m}.root-
servers.net
• Local name servers
contact root servers
when they cannot
resolve a name
• Configured with well-
known root servers
Lecture 4: 09-09-2002 46
Next Lecture
Lecture 4: 09-09-2002 47