© 2008 Andreas Haeberlen, MPI-SWS 1 Pretty Good Packet Authentication Andreas Haeberlen MPI-SWS / Rice University Rodrigo Rodrigues MPI-SWS Peter Druschel.

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

Network Security Essentials Chapter 11
Expressive Privacy Control with Pseudonyms Seungyeop Han, Vincent Liu, Qifan Pu, Simon Peter, Thomas Anderson, Arvind Krishnamurthy, David Wetherall University.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
© 2003 By Default! A Free sample background from Slide 1 SAVE: Source Address Validity Enforcement Protocol Authors: Li,
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
IP Traceback With Deterministic Packet Marking Andrey Belenky and Nirwan Ansari IEEE communication letters, VOL. 7, NO. 4 April 2003 林怡彣.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
July 2008IETF 72 - NSIS1 Permission-Based Sending (PBS) NSLP: Network Traffic Authorization draft-hong-nsis-pbs-nslp-01 Se Gi Hong & Henning Schulzrinne.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Hash-Based IP Traceback Alex C. Snoeren, Craig Partidge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, and W. Timothy Strayer.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Practical Network Support for IP Traceback Internet Systems and Technologies - Monitoring.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Anonymizing Network Technologies Some slides modified from Dingledine, Mathewson, Syverson, Xinwen Fu, and Yinglin Sun Presenter: Chris Zachor 03/23/2011.
Characterizing Residential Broadband Networks Marcel Dischinger †, Andreas Haeberlen †‡, Krishna P. Gummadi †, Stefan Saroiu* † MPI-SWS, ‡ Rice University,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
SSH Secure Login Connections over the Internet
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
Distributed Denial of Service CRyptography Applications Bistro Presented by Lingxuan Hu April 15, 2004.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Network Security David Lazăr.
Denial-of-Service, Address Ownership,and,Early Authentication in IPv6 World (An Approach) Aditya Vutukuri From article by Pekka Nikander Ericsson Research.
Packet-Marking Scheme for DDoS Attack Prevention
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
K. Salah1 Security Protocols in the Internet IPSec.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
Improving Security Over Ipv6 Authentication Header Protocol using IP Traceback and TTL Devon Thomas, Alex Isaac, Majdi Alharthi, Ali Albatainah & Abdelshakour.
© 2006 Andreas Haeberlen, MPI-SWS 1 Monarch: A Tool to Emulate Transport Protocol Flows over the Internet at Large Andreas Haeberlen MPI-SWS / Rice University.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Chapter 5 Network and Transport Layers
Outline The basic authentication problem
IT443 – Network Security Administration Instructor: Bo Sheng
Transmission of IPv6 Packets over IEEE OCB Networks
IT443 – Network Security Administration Instructor: Bo Sheng
Computer Data Security & Privacy
Defending Against DDoS
Introduction to Networking
A DoS-limiting Network Architecture
Defending Against DDoS
Preventing Internet Denial-of-Service with Capabilities
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Outline Using cryptography in networks IPSec SSL and TLS.
DDoS Attack and Its Defense
COEN 351 Authentication.
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

© 2008 Andreas Haeberlen, MPI-SWS 1 Pretty Good Packet Authentication Andreas Haeberlen MPI-SWS / Rice University Rodrigo Rodrigues MPI-SWS Peter Druschel MPI-SWS Krishna Gummadi MPI-SWS

2 © 2008 Andreas Haeberlen, MPI-SWS Packet authentication Internet packets cannot be authenticated Example: Alice receives P, source address X Can Alice be sure that P was sent by the host with address X? (no, addresses can be spoofed!) Can Alice convince a third party that P was sent by this host? (no, packets can be forged!) Alice Bob Foo.net Bar.net Internet Assigns IP address X Packet P (source address X) Admin

3 © 2008 Andreas Haeberlen, MPI-SWS The Internet needs packet authentication The lack of packet authentication is causing a variety of problems, e.g.: Bypassing spam blacklists [SIGCOMM'06] Eve Bar.net Foo.net Innocen t.net Mail server No more mail from bar.net! Innocent.net Internet

4 © 2008 Andreas Haeberlen, MPI-SWS The Internet needs packet authentication The lack of packet authentication is causing a variety of problems, e.g.: Bypassing spam blacklists [SIGCOMM'06] False accusations [HotSec'08] Alice Eve Bar.net Foo.net Innocen t.net Tracker "Hi, I am Alice"

5 © 2008 Andreas Haeberlen, MPI-SWS The Internet needs packet authentication The lack of packet authentication is causing a variety of problems, e.g.: Bypassing spam blacklists [SIGCOMM'06] False accusations [HotSec'08] Unverifiable complaints, plausible deniability Can we add authentication to the Internet? Alice Eve Bar.net Foo.net Admin "Alice has been portscanning me!" ?!?

6 © 2008 Andreas Haeberlen, MPI-SWS Which properties do we want? There is a spectrum of possible solutions Strength vs. other goals (such as privacy) Strength vs. feasibility/practicability Can we find a good compromise? Strong Weak Internet today More ingress filtering Clean-slate designs (e.g. AIP) Crypto+ biometrics Brain scanner PGPA IP traceback Infeasible / too strong Deployment path?

7 © 2008 Andreas Haeberlen, MPI-SWS Proposed solution: PGPA We propose Pretty Good Packet Authentication PGPA provides the following capability: Given a packet, a source address and timestamp, the ISP that owns the source address can verify whether the packet was sent at approximately that time Alice Bob Foo.net Bar.net Internet Address X assigned here Packet (source address X) Judy Has X sent at 4:11pm today? Yes Has X sent at 4:11pm today?

8 © 2008 Andreas Haeberlen, MPI-SWS Privacy and anonymity PGPA protects users' privacy To ask a question about a packet, the requester must already know the entire packet PGPA is compatible with anonymity Standard techniques (such as onion routing) can still be applied Given a packet, a source address and timestamp, the ISP that owns the source address can verify whether the packet was sent at approximately that time

9 © 2008 Andreas Haeberlen, MPI-SWS Outline Introduction Pretty Good Packet Authentication (PGPA) How PGPA could be used A simple implementation Conclusion

10 © 2008 Andreas Haeberlen, MPI-SWS How PGPA could be used PGPA could be used to solve each of the motivating problems: Bypassing spam blacklists Eve Bar.net Foo.net Innocen t.net Mail server Innocent.net Was this traffic sent from Innocent.net? No

11 © 2008 Andreas Haeberlen, MPI-SWS How PGPA could be used PGPA could be used to solve each of the motivating problems: Bypassing spam blacklists False accusations Alice Eve Bar.net Foo.net Innocen t.net Tracker "Hi, I am Alice" Was this sent from ? No

12 © 2008 Andreas Haeberlen, MPI-SWS How PGPA could be used PGPA could be used to solve each of the motivating problems: Bypassing spam blacklists False accusations Unverifiable complaints, plausible deniability Alice Eve Bar.net Foo.net Admin "Alice has been portscanning me!" Is that true?

13 © 2008 Andreas Haeberlen, MPI-SWS PGPA tradeoffs Associates packets with addresses, not users Reveals that packets were sent, but not why Assumes that ISPs and users do not collude Very simple Effective against real-world problems Compatible with anonymity Protects users' privacy Straightforward implementation Plausible deployment path Limitations: Advantages: Rest of this talk

14 © 2008 Andreas Haeberlen, MPI-SWS Outline Introduction Pretty Good Packet Authentication (PGPA) How PGPA could be used A simple implementation Conclusion

15 © 2008 Andreas Haeberlen, MPI-SWS Keeping records of past traffic PGPA needs to 'remember' past traffic A set of traffic monitors keep a record of transmitted packets Storing (timestamp, hash) per packet is sufficient Where should the traffic monitors be placed? Natural choice: Access link Backbone is not modified  much easier to deploy Access links Alice Bob A.net B.net Internet Charlie

16 © 2008 Andreas Haeberlen, MPI-SWS Where to place the traffic monitor? A.net User's premises: Inexpensive; good scalability User can physically destroy the device At the ISP: Easy to deploy User has to trust the ISP Secure channel Monitor Both: No trust user  ISP required More overhead Modem Router

17 © 2008 Andreas Haeberlen, MPI-SWS Calculating digests Monitor stores only a digest of each packet Saves space; preserves privacy if monitor is compromised What if packet is transformed in the network? Examples: TTL, ECN bits, IP fragmentation, header options Digest must be invariant to transformations [Snoeren02] Reassemble packet before hashing; zero out certain fields Hash: 0x4711 Hash: 0xD1FF TTL: 63 CONTENT 58 A.net

18 © 2008 Andreas Haeberlen, MPI-SWS PGPA preserves users' privacy Can PGPA be used to snoop on users' traffic? Seen earlier: PGPA only confirms specific packets But what if the attacker tries to guess a packet? Infeasible - attacker would have to correctly guess the transmission time plus TCP seq. no., IPID field, etc. (≥80 bits) What if the monitor is stolen or compromised? Only reveals digests, not actual packets Can include a salt in each digest (against dictionary attacks) Spy Monitor Did you send traffic to cnn.com earlier today? Did you send packet X at time t? Yes

19 © 2008 Andreas Haeberlen, MPI-SWS Traffic monitors are feasible How much storage does a monitor need? Example: DSL connection Assume worst case: 1 Mbps upstream, fully utilized with 40- byte packets at all times  3,125 packets/sec Monitor stores SHA-1 hash, 32-bit timestamp per packet  Need 187 GB/month Single harddisk per user in the worst case Likely to hold in the future (storage grows faster than bw) Many set-top boxes already contain storage

20 © 2008 Andreas Haeberlen, MPI-SWS Summary The Internet needs a mechanism to authenticate packets Pretty Good Packet Authentication (PGPA) is a compromise between power and feasibility PGPA is simple, easy to implement, and has a plausible deployment path Thank you!