Security Services

advertisement
Introduction
X.800 – OSI Security Services
• Security Service – a service provided by a
protocol layer of communicating open systems,
which ensures adequate security of the systems or
of data transfers
• RFC 2828 – a processing or communication
service that is provided by a system to give a
specific kind of protection to system resources;
security services implement security policies and
are implemented by security mechanisms.
Security Services
• Authentication – assurance that the communicating entity is who they
say they are
• Access Control – prevent the unauthorized access to some system
resource
– Who can access
– Under what conditions
– What they are allowed to do
• Data Confidentiality – protection of data from unauthorized disclosure
• Data Integrity – insure that data received is exactely what was sent
• Nonrepudiation – protection from denial by one of the entities
involved in a communication of having participated in all or part of the
communication
Authentication
• Peer Entity Authentication – in a connection based
environment; provide confidence in the identity of a
connecting entity
– Logging in with a password
– Gaining access via biological identity verification
• DNA identification, retinal scan, finger/hand print identification
– Access via audio voice identification
• Data Origin Authentication – in a connectionless
environment; provide assurance that the source of received
data is as claimed
– Corroborates the source of the data
– Does not proved assurance against duplicate or modified data
Access Control
• This service provides protection against unauthorized use
of resources accessible via OSI. These may be OSI or nonOSI resources accessed via OSI protocols. This protection
service may be applied to various types of access to a
resource or to all accesses to a resource
– e.g., the use of a communications resource; the reading, the
writing, or the deletion of an information resource; the execution
of a processing resource
Data Confidentiality
• Connection Confidentiality
– Protection of all user data on a connection
• Connectionless Confidentiality
– Protection of all data within a single data block
• Selective-Field Confidentiality
– Insure confidentiality of selected fields with within the user data on
a connection or in a single data block connection
• Traffic-Flow Confidentiality
– Protection of information that might be derived by observing the
traffic flow patterns
Data Integrity
• Connection Integrity with Recovery
– Detect any modification of stream data or replay of data and retry;
• Connection Integrity without Recovery
– Detect any modification and report it, no retry…continue on
• Selective-Field Connection Integrity
– Same except for selected fields
• Connectionless Integrity
– Detect modifications in fixed block connectionless data, may provide
replay detection and protection
• Selective-Field Connectionless Integrity
– Same, except for selected fields
• Total stream protection would encompass all of the above and is
probably the best strategy
Nonrepudiation
• Nonrepudiation, Origin
– Proof that the message was sent by the specified party
• Nonrepudiation, Destination
– Proof that the message was received by the specified party
Security Mechanisms (X.800)
•
•
•
•
•
•
•
Encipherment – algorithmic/mathematical conversion
Digital Signature – appending a secret signature
Access Control Access Control
Data Integrity
Authentication Exchange
Traffic Padding – appending extra chars to foil traffic analysis
techniques
• Routing Control – selection of secure routeds through the network
• Notarization – use a trused 3rd party (like a notary public)
Other Security Mechanisms
(non X.800)
• Trusted Functionality
– That which is perceived to be true by some criteria (policy)
• Security Label
– The marking of (bound to) a resource that names or desiginates the
security attributes of the resource
• Event Detection
– Intrusion detection
– Detection of specific hacks (detector hardware)
– Too many log in attempts
• Security Audit Trail
– Logging of all system events
• Security Recovery
– Recovery based on requests from security mechanisms and/or event
handling.
Network Security Model
Trusted 3rd Party
M
F(s)
M’
Info Channel
M’
s
F(s)
s
Opponent
F(s)-some function that mutates M into M’ based on s
F(s) – some function that reverses the mutation of M’ back into M
M
Internet Organizations
• Internet Architecture Board (IAB) – responsible for the
overall design of the Internet, provides guidance to IETF
• Internet Engineering Task Force (IETF) – protocol
engineering and development of the Internet
– Working groups chartered by IETF do actual development work
• Internet Draft, RFC, Standard
• 8 areas – General, Applications, Internet, Operations and
management, Routing, Security, Transport, User Services
– IETF responsible for actual publishing
• Internet Engineering Steering Group (IESG) – responsible
for technical management if IETF activities and the
Internet Standards process
RFC Publication Process
Internet Draft
Proposed
Standard
Best Current
Practice
Experimental
Draft
Standard
Internet
Standard
Historic
Informational
Download