11 - TLS & Cyber-Security Flashcards
SSL implements 3 cryptographic assurances
- authentication
- confidentiality
- message integrity
What is used in https?
SSL uses TLS (transport layer security)
What does TLS do?
- Secure the session layer on top of TCP
- Provides stream abstraction like TCP
- Adds confidentiality, integrity, authenticity
What four ciphers does a TLS session have?
- Auth of server and (opt. client)
- key exchange (RSA, DHE)
- symmetric confidentiality (RC4, AES, DES)
- integrity (HMAC-MD5, HMAC -SHA)
What does MAC stand for?
Message Authentication Code
TLS Message Format
TLS breaks down stream of data from apps into records
- 1-2^14 bytes length
- records are compressed
Appl -> record -> segment
Session key Generation
C->S write (encryption) C->S MAC S->C with (encrypt) S->C MAC Client/Server Init Vector
SSL attack procedure
- SSL can be SUBVERTED by a hacker getting a client to connect its site first
- Hacker then creates separate SSL connection to the real site and relays messages
- Client only knows that it has connected to a different has name
Definition of MitM attack
Man in the Middle Attack
Prevention of SSL Stripping?
Servers can uses HSTS (HTTP Strict Transport Security)
Network Attacks (3)
- Listening in: Sniff and record network data
- Modify, delete, insert and actively tamper with data
- Prevent comms (DoS)
Desirability of Network (4)
- Secrecy/confidentiality (encrypt)
- Integrity (MACs)
- Authentication
- Uninterrupted Comm
Layer 2 Attack (3)
- Listening in, promiscuous mode (esp wireless)
- Force packets to broadcast then use passive listening
- Masquerade as DHCP/ARP server, then redirect packets to end host
Layer 2 Attacks in Practice (3)
- MAC Overflow attack; attacks sent packets with new etc addr to flood forwarding tables
- Rogue DHCP server responds faster than real DHCP server
- Rogue ARP server
Layer 3 Attacks (2)
- ICMP to tell source end-hosts to redirect traffic
- IP Hacking, where ISP advertises prefixes belonging to someone else to capture traffic