Security+ Guide To Network Security Fundamentals, Third Edition
Security+ Guide To Network Security Fundamentals, Third Edition
Security+ Guide To Network Security Fundamentals, Third Edition
Objectives
Define digital certificates List the various types of digital certificates and how they are used Describe the components of Public Key Infrastructure (PKI) List the tasks associated with key management Describe the different cryptographic transport protocols
Digital Certificates
Digital Certificates
Digital certificate
Can be used to associate or bind a users identity to a public key The users public key that has itself been digitally signed by a reputable source entrusted to sign it
Digital certificates make it possible for Alice to verify Bobs claim that the key belongs to him When Bob sends a message to Alice he does not ask her to retrieve his public key from a central site
Instead, Bob attaches the digital certificate to the message
Digital Certificates
A digital certificate typically contains the following information:
Owners name or alias Owners public key Name of the issuer Digital signature of the issuer Serial number of the digital certificate Expiration date of the public key
Certificate Repository
Company must be audited and follow EV standards Company can't be "located in a country or be part of an industry identified on a government prohibited list"
$900 / year, see Link Ch 12b
Dual-sided certificates
Certificates in which the functionality is split between two certificates
Signing certificate Encryption certificate
X.509 Structure
In Windows 7 Beta: Start Internet Options Content Tab Certificates Select a Cerrtificate Export
Trust Models
Trust may be defined as confidence in or reliance on another person or entity Trust model
Refers to the type of trusting relationship that can exist between individuals or entities
Direct trust
A relationship exists between two individuals because one person knows the other person
Web of Trust
Direct trust is not easily scaled to multiple users who each have digital certificates PGP uses a "Web of Trust" in which people trust "friends of friends"
Not very secure or scalable (comic from xkcd.org)
Trust Models
Three PKI trust models that use a CA
Hierarchical trust model Distributed trust model Bridge trust model
One master "root" CA signs all digital certificates with a single key Single point of failure
Managing PKI
Certificate policy (CP)
A published set of rules that govern the operation of a PKI Provides recommended baseline security requirements for the use and operation of CA, RA, and other PKI components
Revocation
Certificate goes on Certificate Revocation List (CRL) When a private key is lost
Expiration
Key Management
Key Storage
Public keys can be stored by embedding them within digital certificates
While private keys can be stored on the users local system
The drawback to software-based storage is that it may leave keys open to attacks Storing keys in hardware is an alternative to software-based storage Private keys can be stored on smart cards or in tokens
Expiration Renewal
M-of-N control
A certain number of people need to agree to recover a key
Suspension Destruction
Vulnerabilities
Usernames, passwords, and files being transferred are in cleartext Files being transferred by FTP are vulnerable to manin-the-middle attacks
One of the ways to reduce the risk of attack is to use encrypted Secure FTP (SFTP)
SSH
A UNIX-based command interface and protocol for securely accessing a remote computer Suite of three utilities: slogin, scp, and ssh Both the client and server ends of the connection are authenticated using a digital certificate
Passwords are protected by being encrypted
SSH Commands
Web Protocols
Another use of SSL is to secure Web HTTP communications between a browser and a Web server Hypertext Transport Protocol over Secure Sockets Layer
Plain HTTP sent over SSL/TLS
VPN Protocols
Point-to-Point Tunneling Protocol (PPTP)
Most widely deployed tunneling protocol Allows IP traffic to be encrypted and then encapsulated in an IP header to be sent across a public IP network such as the Internet Based on the Point-to-Point Protocol (PPP)
PPTP
S/MIME functionality is built into the vast majority of modern e-mail software and interoperates between them