Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in...

57
Encryption and Firewalls Chapter 7
  • date post

    15-Jan-2016
  • Category

    Documents

  • view

    226
  • download

    0

Transcript of Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in...

Page 1: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Encryption and Firewalls

Chapter 7

Page 2: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Learning Objectives

Understand the role encryption plays in firewall architectureKnow how digital certificates work and why they are important security toolsAnalyze the workings of SSL, PGP, and other popular encryption schemesEnable Internet Protocol Security (IPSec) and identify its protocols and modes

Page 3: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Encryption

Process of encoding and decoding information to: Preserve its integrity Maintain privacy Ensure identity of users participating in the

encrypted data session

Page 4: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Why Firewalls Need to Use Encryption

Hackers take advantage of a lack of encryption

Encryption: Preserves data integrity Increases confidentiality Is relied upon by user authentication Plays a fundamental role in enabling VPNs

Page 5: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Hackers Take Advantage of a Lack of Encryption

Page 6: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Hackers Take Advantage of a Lack of Encryption

Page 7: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

The Cost of Encryption

CPU resources and timeBastion host that hosts the firewall should be robust enough to manage encryption and other security functionsEncrypted packets may need to be padded to uniform length to ensure that some algorithms work effectivelyCan result in slowdownsMonitoring can burden system administrator

Page 8: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Preserving Data Integrity

Even encrypted sessions can go wrong as a result of man-in-the-middle attacks

Encryption can perform nonrepudiation using a digital signature

Page 9: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Maintaining Confidentiality

Encryption conceals information to render it unreadable to all but intended recipients

Page 10: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Authenticating Network Clients

Firewalls need to trust that the person’s claimed identity is genuine

Firewalls that handle encryption can be used to identify individuals who have “digital ID cards” that include encrypted codes Digital signatures Public keys Private keys

Page 11: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Enabling VPNs

As an integral part of VPNs, encryption: Enables the firewall to determine whether the

user who wants to connect to the VPN is actually authorized to do so

Encodes payload of information to maintain privacy

Page 12: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Digital Certificates and Public and Private Keys

Digital certificate Electronic document that contains a digital signature

(encrypted series of numerals and characters), which authenticates identity of person sending certificate

Keys Basis of digital certificates and signatures Enable holders of digital certificates to encrypt

communications (using their private key) or decrypt communications (using sender’s public key)

Page 13: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Digital Certificates

Transport encrypted codes (public and private keys) through the firewall from one host to another

Help ensure identity of the individual who owns the digital certificate

Provide another layer of security in firewall architecture

Page 14: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Aspects of Digital Certificates

Establishment of an infrastructure for exchanging public and private keys

Need to review and verify someone’s digital certificate

Difference between client- and server-based digital certificates

Page 15: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

The Private Key Infrastructure

Lightweight Directory Access Protocol (LDAP) Publicly available database that holds names of

users and digital certificates

Public-Key Infrastructure (PKI) Enables distribution of digital certificates and

public and private keys Underlies many popular and trusted security

schemes (eg, PGP and SSL)

Page 16: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Viewing a Digital Certificate

Page 17: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Viewing a Digital Certificate

Page 18: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Types of Digital Certificates a Firewall Will Encounter

Client-based digital certificates Obtained by users from a Certification

Authority (CA), which issues them and vouches for owner’s identity

Server-based digital certificates Issued by a CA to a company that issues them

to individuals

Page 19: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Keys

Value generated by an algorithm that can also be processed by an algorithm to encrypt or decrypt text

Length of the key determines how secure the level of encryption is

Page 20: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Aspects of Keys That Pertain to Firewall-Based Encryption

Public and private keys

Need to generate public keys

Need to securely manage private keys

Need to use a key server either on network or Internet

Differences between private and public key servers

Page 21: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Public and Private Keys

Private key Secret code generated by an algorithm Never shared with anyone

Public key Encoded information generated when private

key is processed by the same algorithm Can be exchanged freely with anyone online

Page 22: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

A Public Key Generated by PGP

Page 23: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

An Encrypted Communication Session

Page 24: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Choosing the Size of Keys

Page 25: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Generating Keys

Page 26: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Managing Keys

Manual distribution

Use of a CA

Use of a Key Distribution Center (KDC)

Page 27: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Using a Key Server That Is on Your Network

Page 28: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Using an Online Key Server

Page 29: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Analyzing Popular Encryption Schemes

Symmetric key encryption

Asymmetric key encryption

Pretty Good Privacy (PGP)

Secure Sockets Layer (SSL)

Page 30: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Symmetric Encryption

Use of only one key to encrypt information, rather than a public-private key system Same key is used to encrypt/decrypt a message Both sender and recipient must have same key

Not scalable

Page 31: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Symmetric Key Encryption

Page 32: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Asymmetric Encryption

Uses only one user’s public key and private key to generate unique session keys that are exchanged by users during a particular session Only the private key must be kept secret

Scales better than symmetric encryptionDisadvantages Slower Only a few public key algorithms are available (eg,

RSA and EIGamal) that are secure and easy to use for both encryption and key exchange

Page 33: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Asymmetric Key Encryption

Page 34: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

PGP

Hybrid system that combines advantages of asymmetric (scalability) and symmetric (speed) encryption systems

Page 35: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

PGP

Process File/message is encrypted Session key is encrypted using public key half of

asymmetric public-private key pair Recipient of encrypted message uses his/her private key

to decode the session key Session key is used to decode message/file

Encryption schemes used to generate public and private key pairs Rivest-Shamir-Adleman (RSA) encryption Diffie-Hellman encryption

Page 36: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Using PGP

Page 37: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Using PGP

Page 38: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

X.509

Standard set of specifications for assembling and formatting digital certificates and encrypting data within them

A commonly used type of PKI

Widely used and well trusted

Page 39: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

X.509 and PGP Compared

X.509 Perception of trust

PGP Does not make use of the CA concept Gives users ability to wipe files from hard disk

(and delete permanently) Available both in freeware and commercial

versions

Page 40: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

X.509 and PGP Compared

Page 41: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

SSL

Secure way to transmit data

Uses both symmetric and asymmetric keys Asymmetric keys start an SSL session Symmetric keys are dynamically generated for

the bulk of the transfer

Page 42: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Using Internet Protocol Security (IPSec) Encryption

Creates a secure IP connection between two computers

Operates under the Application layer

Transparent to users

Page 43: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Understanding IPSec

Set of standards and software tools that encrypt IP connections between computers

Allows a packet to specify a mechanism for authenticating its origin, ensuring data integrity, and ensuring privacy

Page 44: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Modes of IPSec

Transport mode

Tunnel mode

Choice depends on type of network and whether it uses NAT

Page 45: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Transport Mode

IPSec authenticates two computers that establish a connection

Can optionally encrypt packets

Does not use a tunnel

Page 46: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Tunnel Mode

IPSec encapsulates IP packets and can optionally encrypt them

Encrypts packet headers rather than the data payload

Incompatible with NAT

Page 47: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

IPSec Protocols

Authentication Header (AH)

Encapsulation Security Payload (ESP)

Page 48: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Authentication Header (AH)

Adds a digital signature to packets to protect against repeat attacks, spoofing, or other tampering

Verifies that parts of packet headers have not been altered between client and IPSec-enabled host

Incompatible with NAT

Page 49: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

AH

Page 50: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Encapsulation Security Payload (ESP)

More robust than AH; encrypts data part of packets as well as the headersProvides confidentiality and message integrityCan cause problems with firewalls that use NAT

Page 51: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Components of IPSec

Two modes: transport and tunnel

Two protocols: AH and ESP

IPSec driver

Internet Key Exchange (IKE)

Internet Security Association Key Management Protocol (ISAKMP)

Oakley

IPSec Policy Agent

Page 52: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Choosing the Best IPSec Mode for Your Organization

Page 53: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Choosing the Best IPSec Mode for Your Organization

ESP plus tunnel mode provides best level of protection ESP conceals IP header information Tunnel mode can both encapsulate and encrypt

packets

Page 54: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Enabling IPSec

Select group policy security setting for computers that need to communicate with enhanced security Define at group policy level in Windows 2000 Define at local policy level if not in Windows 2000

Predefined IPSec policy levels in Windows 2000 or XP: Client (Respond only) Server (Request Security) Secure Server (Require Security)

Page 55: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Defining IPSec Policy at Local Policy Level

Page 56: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Limitations of IPSec

If machine that runs IPSec-compliant software has been compromised, communications from that machine cannot be trustedEncrypts IP connection between two machines—not the body of e-mail messages or content of other communicationsNot an end-to-end security methodAuthenticates machines, not usersDoesn’t prevent hackers from intercepting encrypted packets

Page 57: Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.

Chapter Summary

How and why encryption is used in a networkHow to use encryption to complement the firewall’s activitiesEncryption applications PGP SSL IPSec

Schemes that can form part of a firewall architecture