Chap5_2 Flashcards
S-BGP:
Secure BGP
S-BGP makes three major additions to BGP
1-) It introduces a Public Key Infrastructure (PKI)
2-) A new transitive attribute is introduced to BGP updates. That attribute ensures the authorization of routing UPDATEs
3-) All routing message can be secured using IPsec, if routing confidentiality is a requirement.
Address Attestations (AA)
Owner of one or more prefixes certifies that the origin
AS is authorized to advertise the prefixes
Need a public-key infrastructure (PKI)
Route Attestations (RA)
Attestation= proof
Need a ………… public-key infrastructure - Certificates
Router belonging to an AS (autonomous system) certifies that the next AS is authorized to propagate this route to its neighbors
Need a separate public-key infrastructure - Certificates
S-BGP Protocol Operation
When generating an UPDATE, a router
generates a new RA that encompasses the path
and prefixes plus the AS number of the neighbor AS
When receiving an UPDATE from a neighbor, it
Verifies that its AS # is in the first RA
Validates the signature on each RA in the UPDATE,
verifying that the signer represents the AS # in the
path
Checks the corresponding AA to verify that the
origin AS was authorized to advertise the prefix by
the prefix “owner”
Slide 6
TRUE
Limitations of S-BGP
Hierarchical PKI trusted by all participating ISPs.
cryptographically intensive
Routers may need a large memory space
S-BGP cannot prevent “collusion attacks” (or the wormhole attack). Such attacks are possible when two compromised routers fake the presence of a direct link between them. For the rest of the Internet, it then appears as if those two ASes are connected
Which security features most
desirable for e-mail?
Confidentiality
Integrity
Authentication
Confidentiality in E-mail is done by
Secret key cryptography
Public key cryptography
Symmetric session key
Alice wants to send confidential e-mail, m, to Bob
Alice: Generates random symmetric session key, KS . Encrypts message with KS (for efficiency) Also encrypts KS with Bob’s public key. Sends both KS (m) and KB (KS) to Bob. Bob: Uses his private key to decrypt and recover KS Uses KS to decrypt KS(m) to recover m
Alice wants to provide sender authentication, message integrity.
Alice:
Applies a hash function to obtain a message digest
Digitally signs with her private key
Sends both message (in the clear) and digital signature.
Bob:
Applies Alice’s public key to obtain a message digest;
Compares with his own hash of the message;
if same, pretty confident that the message came from Alice
and is unaltered.
Alice wants to provide confidentiality, sender authentication, message integrity.
Note: Alice uses three keys: her private key, Bob’s public key, newly created symmetric key
Secure e-mail
One more important issue
Requires Alice to obtain Bob’s public key Bob to obtain Alice’s public key Public Key management and distribution Publish at web page Send email Certificate authority
Pretty Good Privacy (PGP)
Internet e-mail encryption scheme, de-facto standard
Uses symmetric key cryptography, public key
cryptography, hash function, and digital signature as
described
Provides secrecy, sender authentication, integrity
TRUE
PGP Operational Description
Consist of five services:
Authentication and integrity Confidentiality Compression E-mail compatibility Segmentation