EMTM 553: E-commerce Systems Lecture 7: Implementing Security Insup Lee Department of Computer and Information Science University of Pennsylvania lee@cis.upenn.edu www.cis.upenn.edu/~lee 12/15/00 EMTM 553 1 Objectives • Security measures that can reduce or eliminate intellectual property theft • Securing client computers from attack by viruses and by ill-intentioned programs and scripts downloaded in Web pages • Authenticate users to servers and authenticate servers 12/15/00 EMTM 553 2 Objectives • Available protection mechanisms to secure information sent between a client and a server • Message integrity security, preventing another program from altering information as it travels across the Internet • Safeguards that are available so commerce servers can authenticate users • Protecting intranets with firewalls and corporate servers against being attacked through the Internet • The role Secure Socket Layer, Secure HTTP and secure electronic transaction protocols play in protecting ecommerce 12/15/00 EMTM 553 3 Protecting Electronic Commerce Assets • You cannot hope to produce secure commerce systems unless there is a written security policy – – – – 12/15/00 What assets are to be protected What is needed to protect those assets Analysis of the likelihood of threats Rules to be enforced to protect those assets EMTM 553 4 Protecting Electronic Commerce Assets • Both defense and commercial security guidelines state that you must protect assets from – Unauthorized disclosure – Modification – Destruction • Typical security policy concerning confidential company information – Do not reveal company confidential information to anyone outside the company 12/15/00 EMTM 553 5 Minimum Requirements for Secure Electronic Commerce Figure 6-1 12/15/00 EMTM 553 6 Protecting Intellectual Property • The dilemma for digital property is how to display and make available intellectual property on the Web while protecting those copyrighted works 12/15/00 EMTM 553 7 Companies Providing Intellectual Property Protection Software • ARIS Technologies (part of verance.com) – Digital audio watermarking systems o Embedded code in audio file uniquely identifying the intellectual property • Digimarc Corporation – Watermarking for various file formats – Controls software and playback devices 12/15/00 EMTM 553 8 Companies Providing Intellectual Property Protection Software • SoftLock Services – Allows authors and publishers to lock files containing digital information for sale on the Web – Posts files to the Web that must be unlocked with a purchased ‘key’ before viewing • Digitalgoods.com – infrastructure and integrated services necessary to securely market and distribute multimedia digital content to its maximum audience 12/15/00 EMTM 553 9 Protecting Client Computers • Active content, delivered over the Internet in dynamic Web pages, can be one of the most serious threats to client computers • Threats can hide in – Web pages – Downloaded graphics and plug-ins – E-mail attachments 12/15/00 EMTM 553 10 Protecting Client Computers • Cookies – Small pieces of text stored on your computer and contain sensitive information that is not encrypted – Anyone can read and interpret cookie data – Do not harm client machines directly, but potentially could still cause damage • Misplaced trust – Web sites that aren’t really what they seem and trick the user into revealing sensitive data 12/15/00 EMTM 553 11 Monitoring Active Content • Netscape Navigator and Microsoft Internet Explorer browsers are equipped to allow the user to monitor active content before allowing it to download • Digital certificates provide assurance to clients and servers that the participant is authenticated 12/15/00 EMTM 553 12 Digital Certificates • • • • Also known as a digital ID An attachment to an e-mail message Embedded in a Web page Serves as proof that the holder is the person or company identified by the certificate • Encoded so that others cannot read or duplicate it 12/15/00 EMTM 553 13 VeriSign -- A Certification Authority Figure 6-3 12/15/00 EMTM 553 14 VeriSign • Oldest and best-known Certification Authority (CA) • Offers several classes of certificates – Class 1 (lowest level) o Bind e-mail address and associated public keys – Class 4 (highest level) o Apply to servers and their organizations o Offers assurance of an individual’s identity and relationship to a specified organization 12/15/00 EMTM 553 15 Structure of a VeriSign Certificate Figure 6-4 12/15/00 EMTM 553 16 Microsoft Internet Explorer • Provides client-side protection right inside the browser • Reacts to ActiveX and Java-based content • Authenticode verifies the identity of downloaded content • The user decides to ‘trust’ code from individual companies 12/15/00 EMTM 553 17 Security Warning and Certificate Validation Figure 6-5 12/15/00 EMTM 553 18 Internet Explorer Zones and Security Levels Figure 6-6 12/15/00 EMTM 553 19 Internet Explorer Security Zone Default Settings Figure 6-7 12/15/00 EMTM 553 20 Netscape Navigator • User can decide to allow Navigator to download active content • User can view the signature attached to Java and JavaSript • Security is set in the Preferences dialog box • Cookie options are also set in the Preferences dialog box 12/15/00 EMTM 553 21 Setting Netscape Navigator Preferences Figure 6-8 12/15/00 EMTM 553 22 A Typical Netscape Navigator Java Security Alert Figure 6-9 12/15/00 EMTM 553 23 Viewing a Content Provider’s Certificate Figure 6-10 12/15/00 EMTM 553 24 Dealing with Cookies • Can be set to expire within 10, 20, or 30 days • Retrievable only by the site that created them • Collect information so that the user doesn’t have to continually enter usernames and passwords to access Web sites • Earlier browsers simply stored cookies without comment • Today’s browsers allow the user to – Store cookies without permission or warning – Receive a warning that a cookie is about to be stored – Unconditionally disallow cookies altogether 12/15/00 EMTM 553 25 Protecting Electronic Commerce Channels • Protecting assets while they are in transit between client computers and remote servers • Providing channel security includes – – – – 12/15/00 Channel secrecy Guaranteeing message integrity Ensuring channel availability Authentication EMTM 553 26 Providing Transaction Privacy • Encryption – The coding of information by using a mathematically based program and secret key to produce unintelligible characters – Steganography o Makes text invisible to the naked eye – Cryptography o Converts text to strings that appear to have no meaning 12/15/00 EMTM 553 27 Encryption • 40-bit keys are considered minimal,128-bit keys provide much more secure encryption • Encryption can be subdivided into three functions – Hash Coding o Calculates a number from any length string – Asymmetric (Public-key) Encryption o Encodes by using two mathematically related keys – Symmetric (Private-key) Encryption o Encodes by using one key, both sender and receiver must know 12/15/00 EMTM 553 28 Hash Coding, Private-key, and Public-key Encryption Figure 6-11 12/15/00 EMTM 553 29 Significant Encryption Algorithms and Standards Figure 6-12 12/15/00 EMTM 553 30 Secure Sockets Layer (SSL) Protocol • Secures connections between two computers • Provides a security handshake in which the client and server computers exchange the level of security to be used, certificates, among other things • Secures many different types of communications between computers 12/15/00 EMTM 553 31 Secure Sockets Layer (SSL) Protocol • Provides either 40-bit or 128-bit encryption • Session keys are used to create the cipher text from plain text during the session • The longer the key, the more resistant to attack 12/15/00 EMTM 553 32 SSL Handshake The SSL handshake consists of nine steps that authenticate the two parties and create aEMTM shared 12/15/00 553 session key. [Stein] 33 SSL Web Server Information Figure 6-14 12/15/00 EMTM 553 34 Secure HTTP (S-HTTP) Protocol • Developed by CommerceNet Consortium • Extension to HTTP that provides numerous security features – Client and server authentication – Spontaneous encryption – Request/response nonrepudiation • Provides symmetric and public-key encryption, and message digests (summaries of messages as integers) • Whereas SSL is designed to establish a secure connection between two computers, S-HTTP is designed to send individual messages securely. 12/15/00 EMTM 553 35 Ensuring Transaction Integrity Figure 6-15 12/15/00 EMTM 553 36 Guaranteeing Transaction Delivery • Neither encryption nor digital signatures protect packets from theft or slowdown • Transmission Control Protocol (TCP) is responsible for end-to-end control of packets • TCP requests that the client computer resend data when packets appear to be missing 12/15/00 EMTM 553 37 Protecting the Commerce Server • Access control and authentication – Controlling who and what has access to the server – Requests that the client send a certificate as part of authentication – Server checks the timestamp on the certificate to ensure that it hasn’t expired – Can use a callback system in which the client computer address and name are checked against a list 12/15/00 EMTM 553 38 Protecting the Commerce Server • Usernames and passwords are the most common method of providing protection for the server • Usernames are stored in clear text, while passwords are encrypted • The password entered by the user is encrypted and compared to the one on file 12/15/00 EMTM 553 39 Logging On With A Username And Password Figure 6-16 12/15/00 EMTM 553 40 Operating System Controls • Most operating systems employ username and password authentication • A common defense is a firewall – All traffic from inside to outside and outside to inside must pass through it – Only authorized traffic is allowed – The firewall itself must be immune to penetration 12/15/00 EMTM 553 41 Firewalls • Should be stripped of any unnecessary software • Categories of firewalls include – Packet filters o Examine all packets flowing through the firewall – Gateway servers o Filter traffic based on the requested application – Proxy servers o Communicate on behalf of the private network o Serve as a huge cache for Web pages 12/15/00 EMTM 553 42 Traffic Cop Firewalls Internet Site 1 Site 2 OSI Application Presentation Session Transport Network Data Link Physical 12/15/00 EMTM 553 43 Check Point Software’s Firewall-1 Web Page Figure 6-17 12/15/00 EMTM 553 44