S Institut für Kommunikationsnetze Technische Universität Wien DI Christian Ploninger IPSec & i-Share secure WLAN solutions.

Slides:



Advertisements
Ähnliche Präsentationen
Link Layer Security in BT LE.
Advertisements

Peter Marwedel TU Dortmund, Informatik 12
Konfiguration eines VPN Netzwerkes
1 Proseminar Thema: Network Security Network Security Proseminar Thema: Network Security.
Virtual Private Networks
VPN Virtual Private Network
Wo - Komponisten Deutsch macht Spaß mit Frau Boyle!
Video Streaming mit Silverlight
Dariusz Parys Developer Evangelist Microsoft Deutschland GmbH Christian Weyer Solutions Architect thinktecture.
Ein Projekt des Technischen Jugendfreizeit- und Bildungsvereins (tjfbv) e.V. kommunizieren.de Blended Learning for people with disabilities.
Passiv What are these sentences expressing?
Universität StuttgartInstitut für Wasserbau, Lehrstuhl für Hydrologie und Geohydrologie Copulas (1) András Bárdossy IWS Universität Stuttgart.
Virtual Private Network
Da - Komponisten Deutsch macht Spaß mit Frau Boyle!
GZ der Informatik / Sicherheit 1 GZ der Informatik VIII Kryptografie, Digitale Signaturen, SET Univ.-Ass. DI. Markus Seidl University of Vienna
VPN – Virtual Private Network
Institut für Angewandte Mikroelektronik und Datentechnik Course and contest Results of Phase Selected Topics in VLSI Design (Module 24513) ©
Präsentiert von Riccardo Fuda.  Klassische (symmetrische) Kryptographie  Der weg zur modernen Kryptographie  Message Authentification Codes  Asymmetrische.
Institut für Angewandte Mikroelektronik und Datentechnik Phase 5 Architectural impact on ASIC and FPGA Nils Büscher Selected Topics in VLSI Design (Module.
Networking on local area knowledge of territory-continuous presence in community (family-centre – people centre – key locations)
SiPass standalone.
Stephanie Müller, Rechtswissenschaftliches Institut, Universität Zürich, Rämistrasse 74/17, 8001 Zürich, Criminal liability.
Ralf M. Schnell Technical Evangelist Microsoft Deutschland GmbH
Ralf M. Schnell Technical Evangelist Microsoft Deutschland GmbH.
Literary Machines, zusammengestellt für ::COLLABOR:: von H. Mittendorfer Literary MACHINES 1980 bis 1987, by Theodor Holm NELSON ISBN
Arbeiten in einem agilen Team mit VS & TFS 11
Welcome to Web Services & Grid Computing Jens Mache
3rd Review, Vienna, 16th of April 1999 SIT-MOON ESPRIT Project Nr Siemens AG Österreich Robotiker Technische Universität Wien Politecnico di Milano.
Nachweis von B 0 s -Oszillationen mit dem ATLAS Detektor am LHC B. Epp 1, V.M. Ghete 2, E. Kneringer 1, D. Kuhn 1, A. Nairz 3 1 Institut für Experimentalphysik,
GERMAN 1013 Kapitel 5 Review. terminology Word types: –nouns, pronouns, verbs, adjectives, prepositions … Functions: –subject, predicate, object … Form.
QUIZZ to keep to receive to need to buy to give (present) to sell
COMMANDS imperative 1. you (formal): Sie 2. you (familiar plural): ihr
1 Konica Minolta IT Solutions Prinzip Partnerschaft MANAGED MONITORING ÜBERWACHJUNG DER SERVERINFRASTRUKTUR UND ANWENDUNGEN DIREKT AUS DER CLOUD.
Gregor Graf Oracle Portal (Part of the Oracle Application Server 9i) Gregor Graf (2001,2002)
Kapitel 4 Grammar INDEX 1.Ordinal Numbers 2.Relative Pronouns and Relative Clauses 3.Conditional Sentences 4.Posessive: Genitive Case.
EUROPÄISCHE GEMEINSCHAFT Europäischer Sozialfonds EUROPÄISCHE GEMEINSCHAFT Europäischer Fonds für Regionale Entwicklung Workpackage 5 – guidelines Tasks.
Berliner Elektronenspeicherring-Gesellschaft für Synchrotronstrahlung m.b.H., Albert-Einstein-Straße 15, Berlin frontend control at BESSY R. Fleischhauer.
Phonics Lessons Grade 1 Adapted from: Phonics Lessons by Gay Su Pinnell & Irene C. Fountas Grade 1, page 431 caatt If you knowIt helps you know.
10.3 Lektion 10 Geschichte und Gesellschaft STRUKTUREN © and ® 2012 Vista Higher Learning, Inc Der Konjunktiv I and indirect speech —Ich komme.
Kapitel 9 Grammar INDEX 1.Formal Sie- Command 2.There Is/There Are 3.Negation: Nicht/Klein.
© 2012 IBM Corporation © 2013 IBM Corporation IBM Storage Germany Community Josef Weingand Infos / Find me on:
German “ da - compounds ” Provided by deutschdrang. com for individual and classroom use only. May not be reproduced for any other purposes.
Kapsch Smart Energy GmbH ||Titel der PräsentationUntertitel der Präsentation1 Kapsch Smart Energy Eaton Sicherheit im Smart Metering Umfeld am Beispiel.
Technische Universität München Institute of Aeronautical Engineering Prof. Dr.-Ing. Horst Baier Presentation of the Institute (December 2009)
Technische Universität München Alexander Neidhardt Forschungseinrichtung Satellitengeodäsie 1 Concepts for remote control of VLBI-telescopes: on the way.
(Name of presenter) (Short title of presentation).
1. Halbjahr 2016 Englisch am Abend (A2-6) A, Di, – Uhr New textbook: Next B1/1 ISBN: €23.49.
Essay structure Example: Die fetten Jahre sind vorbei: Was passiert auf der Almhütte? Welche Bedeutung hat sie für jede der vier Personen? Intro: One or.
LINUX II Unit 9 Network File Server NFS. NFS Überblick ● Zugriff von lokalen Rechner über Netzwerk auf Dateien oder Ordnern auf entfernten Servern ● Entwickelt.
Fitness. An english presentation.
Azure Active Directory und Azure Active Directory Domain Services
Othmar Gsenger Erwin Nindl Christian Pointner
you: ihr ( familiar plural ) you: du ( familiar singular)
Motivationswettbewerb für SchülerInnen von 10-18
Azure Countdown Wenn der Freund und Helfer Freunde und Helfer braucht: Sichere Content-Upload-Plattform für Bürger.
Grundlagen Englisch Passive voice HFW Bern.
Sentence Structure Connectives
Vorlesung Völkerrecht Diplomatischer Schutz
IETF 80 Prague DISPATCH WG
Students have revised SEIN and HABEN for homework
Metadata - Catalogues and Digitised works
“wish” “as if” “if only it were so”
THE PERFECT TENSE IN GERMAN
„Förderwolke“ A Cloud-based exchange platform for the qualitative enhancement and improvement of inclusive education Dipl. Reha-Päd. Hanna Linke scientific.
ELECTR IC CARS Karim Aly University of Applied Sciences.
Official Statistics Web Cartography in Germany − Regional Statistics, Federal and European Elections, Future Activities − Joint Working Party meeting.
The Conversational Past
The Conversational Past
Integrating Knowledge Discovery into Knowledge Management
- moodle – a internet based learning platform
 Präsentation transkript:

s Institut für Kommunikationsnetze Technische Universität Wien DI Christian Ploninger IPSec & i-Share secure WLAN solutions

s & Page 2 DI Christian Ploninger  Security Threats  Counter Measurements  i-Share: secure WLAN Vortragsübersicht

s & Page 3 DI Christian Ploninger Interception: An unauthorized party (a person, a program, or a computer) gains access to the communication. This is an attack on confidentiality. Interruption: An asset of the system is destroyed or becomes unavailable or unusable. This is an attack on availability. Modification: An unauthorized party not only gains access to but tampers with an asset. This is an attack on integrity. Fabrication: An unauthorized party inserts counterfeit objects into the system. This is an attack on authenticity. Interruption Interception Modification Fabrication Angriffskonzepte [Stallings, 1995]: Network and Internetwork Security: Principals and Practice. Prentice Hall International, ISBN

s & Page 4 DI Christian Ploninger Angriffe und Bedrohungen Generally attacks may be categorized in passive and active attacks. While passive attacks can be defined as read-only attacks, active attacks include data generation, modification, or destruction.

s & Page 5 DI Christian Ploninger Passive Angriffe Passive attacks are based on interception. This attack type aims at message confidentiality. Release of Message Contents (Eavesdropping): An attacker may read messages while they are in transfer. Eavesdropping on data transmission could result in the disclosure of sensitive information such as passwords, data, and procedures for performing functions, etc. Traffic analysis: Traffic analysis is a form of passive attack in which an intruder observes data being transmitted. An attacker may make inferences of information from observation and analysis of the presence, absence, amount, direction, and frequency of the traffic flow. Passive attacks are difficult to detect since they do not involve any alteration of data. The emphasis is on prevention rather than detection. [2382-pt.8] ISO/IEC , Information Technology - Vocabulary: Control, integrity, and security, 1998

s & Page 6 DI Christian Ploninger Aktive Angriffe Masquerading (Spoofing): In such attacks, a person (or machine) impersonates someone else to gain access to a resource. Replay Attack: Often attacks are based on re-sending packets, or streams of packets, that have already been accepted by a recipient. The fact that it is not necessary to understood the received packets makes this attack quite dangerous. Tampering (Packet Alteration): Instead of spoofing an identity, an attacker may choose to use a valid connection for his or her needs by altering the message content. Denial of Service (DoS): DoS attacks aim to prevent access to network resources. Typical attacks involve flooding the network with traffic.

s & Page 7 DI Christian Ploninger Authentication Data Transfer Establish ConnectionClose Connection Communication Process Message Tampering Masquerade, Replay Denial of Service Eavesdropping Active Attacks Passive Attacks States of Attack

s & Page 8 DI Christian Ploninger Gegenmaßnahmen Passive AngriffeGegenmaßnahmen Release of Message Contents (Eavesdropping) Message Encryption Traffic AnalysisTraffic Padding Aktive AngriffeGegenmaßnahmen Denial of Service Message Tampering (Packet Alteration) Key Derivation (Cryptographic Binding) Replay AttacksKey Freshness Challenge-Response (Challenge Entropy) Masquerading (Spoofing)Pre-Shared Secret Challenge-Response (Zero-Knowledge-Proof)

s & Page 9 DI Christian Ploninger Countering Passive Attacks Release of Message Contents (Eavesdropping): Using encryption cannot prevent from interception, but it protects the transmitted content and guarantees data confidentiality. Traffic analysis: An appropriate counter measurement against this kind of attack is traffic padding. Traffic padding describes the generation of fake communications or data units to disguise the amount of real data units being sent.

s & Page 10 DI Christian Ploninger Denial of Service (DoS): Especially in wireless communication it seems that there is no counter measurement against DoS attacks. Attackers easily can send noise traffic on the used radio frequencies making communication impossible. Tampering (Packet Alteration): After the successful authentication of a valid user, an attacker may modify the transmitted data. This can be countered by the cryptographically binding of authentication and data transmission phase. Ordinary this is achieved by deriving session keys for the data transfer phase. Countering Active Attacks

s & Page 11 DI Christian Ploninger Replay Attacks: Cryptographic keys have to change frequently to protect against unauthorized key reuse (key freshness). Additionally challenge-response-protocols can be used to prevent from packet reuse. Masquerading (Spoofing): Appropriate counter measurements against spoofing are: pre-shared secrets, challenge-response protocols. Pre-shared secrets: The identity of a communication party can only be verified, if the party is known a-priori. Challenge-Response-Protocols: The party’s identity has to be proofed without the transmission of the party‘s secret. Countering Active Attacks (Cont.)

s & Page 12 DI Christian Ploninger i-Share i-Security i-Motion Wireless LAN Connectivity Security Usability Application Projekt i-Share i-Share: Intelligente, von der Verfügbarkeit der Mitglieder abhängige Freigabe von dezentralen Daten über ein virtuelles Share. i-Security: Schutz der über die Luftschnittstelle übertragenen Daten in Bezug auf Vertraulichkeit, Authentizität und Integrität. i-Motion: Automatisiertes Handover zwischen verfügbaren Accesspoints ohne Datenverlust während Übertragungen. Ziele der Unterprojekte: Gesamtprojekt i-Share

s & Page 13 DI Christian Ploninger Design Goals Schutz der über die Luftschnittstelle übertragenen Daten in Bezug auf Vertraulichkeit, Authentizität und Integrität. WLAN als ist ein unsicheres Extranet  End-to-End Security zwischen Host und Security-GW Einbindung in das Firmennetz  Tunnelling Protocol zwischen Host und Security-GW Schutz der Vertraulichkeit von firmeninternen Daten  Einsatz von Verschlüsselung Schutz vor unbefugten Benutzern  Einsatz von User Authentication Schutz vor Passwort Attacken  Einsatz von Device Authentication

s & Page 14 DI Christian Ploninger Internet Protocol Security (IPSec)

s & Page 15 DI Christian Ploninger IPSec AH/ESP [RFC 2402]: IP Authentication Header (AH) [RFC 2406]: IP Encapsulating Security Payload (ESP)

s & Page 16 DI Christian Ploninger Standard auf vielen Plattformen kein festgelegter Algorithmus (NEW: AES, Rijndeal) unterstützt als sicher geltende Algorithmen (Twofish, AES, 3DES, IDEA, MD5, SHA,....) keinerlei bekannte Design-Schwächen NT: Client muss korrekt konfiguriert sein IPSec gilt als zukunftssicher fixer Bestandteil von IPv6 Vorteile von IPSEC

s & Page 17 DI Christian Ploninger IP Traffic PPP Connection Layer 2 Tunneling Protocol Encrypted Data Transfer Intranet Wireless Accesspoint + Firewall VPN Server Wirless User IPSEC Transport IEEE g IEEE a IEEE b IEEE IP Traffic Sicher gegen Rouge APs Sicher gegen Man-in-the-Middle Attacken (pre-shared secret) Sicher gegen Eavesdropping (IPSEC-ESP) State-of-the-art Algorithmen (3DES, AES) (kein WEP!) [RFC 1171]: The Point-to-Point Protocol [RFC 2661]: Layer Two Tunneling Protocol "L2TP"

s & Page 18 DI Christian Ploninger Packet Encapsulation

s & Page 19 DI Christian Ploninger Authentication Process VPN Server Wirless User Internet Key Exchange (Phase 1) Generation of Master Key Mutual Device Authentication PPP Authentication MS-CHAPv2 Mutual User Authentication PW-File Password Generation of IPSec Session Key Internet Key Exchange (Phase 2) ISAKMP SA Master Key IPSEC-ESP IPSEC SA IPSec Key Kombinierte Device/User Authentication Beidseitige Authentifizierung (Mutual Authentication) [RFC 2406]: IP Encapsulating Security Payload (ESP) [RFC 2409]: The Internet Key Exchange (IKE) [RFC 2759]: Microsoft PPP CHAP Extensions Version 2

s & Page 20 DI Christian Ploninger Evaluation Chart IKEMS-CHAPv2 Eavesdropping Protection Encryption (Auth.)3-DES Encryption (Trans.)3-DES Spoofing Protection Pre-Shared SecretPassphrasePassword Device AuthenticationX User AuthenticationX Zero-Knowledge-ProofXX Mutual AuthenticationXX Tampering Protection Key DerivationX Replay Protection Key FreshnessXX

s & Page 21 DI Christian Ploninger Schutz des firmeninternen Daten Sicherheit gegen Man-in-the-Middle (pre-shared secrets) Sicherheit gegen Rouge APs (End-to-End Security zwischen Host und Security-Gateway) Sicherheit gegen Tampering (IKE Key Derivation) Sicherheit gegen Eavesdropping (IPSEC-3DES) Sicherheit gegen Spoofing (IKE Device Authentication, MS-CHAPv2 User Authentication, Mutual Authentiction, Zero-Knowledge-Proofs) Sicherheit gegen Replay (IKE Key Lifetimes, MS-CHAPv2 Challenges) Summary

s & Page 22 DI Christian Ploninger IEEE b VPN / IPSec Intranet VPN Server + Firewall WWW Server WLAN Host x Secured WLAN Demonstrations Szenario

s & Page 23 DI Christian Ploninger Vielen Dank für Ihre Aufmerksamkeit s DI Christian Ploninger (1)