1 / 23

INF 123 SW Arch, dist sys & interop Lecture 17

INF 123 SW Arch, dist sys & interop Lecture 17. Prof. Crista Lopes. Objectives. Trust on the Internet Certificates & certificate authorities Public Key Cryptography SSL. Basic Threat: Domain Name Hijacking.

ima
Download Presentation

INF 123 SW Arch, dist sys & interop Lecture 17

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. INF 123 SW Arch, dist sys & interopLecture 17 Prof. Crista Lopes

  2. Objectives • Trust on the Internet • Certificates & certificate authorities • Public Key Cryptography • SSL

  3. Basic Threat: Domain Name Hijacking • Computers use a variety of methods to accomplish domain name resolution (name  IP address) • Local computer: hosts file • DNS • Trojans may compromise hosts file, LAN router, or even entire ISP’s DNS resolution • Leafs are more vulnerable -- demo • Very serious threat to the integrity of the Internet

  4. Problem Formulation • How can we trust that a domain name is under control of its legitimate owner in the presence of such attacks?

  5. Certificate Authorities Trusted Third Party

  6. Trusted Third Party • A wants to talk to B, but is not sure B is B A B

  7. Trusted Third Party, aka Certificate Authority • In broad strokes: 2 CA 1 6 3 A B 4 5

  8. Trusted Third Party • B requests a digital certificate from CA • CA verifies B in real life • CA gives certificate to Bsome time later… • A contacts B • B sends its digital certificate to A • A verifies it with CA • Finally, A is assured that B is B

  9. Digital Certificate • (non-electronic version: driver’s license) • Binds an identity to a public key • Electronic document signed by an authority • Contains: • Owner’s public key • Owner’s name • Expiration date • Serial number • Name of the issuer • Digital signature of the issuer

  10. Trusted Certificate Authorities • http://www.mozilla.org/projects/security/certs/included/ • Digital certificates from these CAs are expen$ive

  11. Public Key Cryptography

  12. Public Key Cryptography • Asymmetric key algorithms • mathematically related key pair: one secret private key and another key that can be made public • Avoids secure initial exchange of key

  13. Symmetric vs. Asymmetric Symmetric Asymmetric of receiver of receiver

  14. Asymmetric Keys • Data encrypted with a public key can only be decrypted with the corresponding private key • use this to ensure that only the recipient can decrypt the message • Data encrypted with a private key can only be decrypted with the corresponding public key • use this to ensure authenticity of sender (assuming the sender’s public key can be trusted – hence CAs)

  15. Digital Signatures

  16. Password- vs. Certificate-based Authentication Password Certificate

  17. Recap: SSL/TLS • Extra pieces of transport-layer protocol for negotiating cyphers and ensuring authentication of the server • Bottom line: • Payload data is encrypted before sending, decrypted upon reception

  18. Recap: HTTPS = HTTP + SSL/TLS POST /wifi/login HTTP/1.1 Hostname: … Content-Type: … Content-Length: … METHOD=login&firstname=foo&lastname=bar&password=hereismypassword Unintelligible gibberish

  19. Recap: HTTPS = HTTP + SSL/TLS • https:// instead of http:// • Uses port 443 by default instead of port 80

  20. How SSL works • http://video.google.com/videoplay?docid=7130470471741831613

  21. To Learn More on Cryptography • CS 167

  22. Final Remark about CAs • Anyone can create certificates • you can too • Tools choose which certificate authorities to trust • they may or may not trust yours

  23. Alternative: Web of Trust • Decentralized trust model • as opposed to CAs/PKI which are centralized • Phil Zimmerman: • “As time goes on, you will accumulate keys from other people that you may want to designate as trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will gradually accumulate and distribute with their key a collection of certifying signatures from other people, with the expectation that anyone receiving it will trust at least one or two of the signatures. This will cause the emergence of a decentralized fault-tolerant web of confidence for all public keys.”

More Related