IP header doesn’t have confidentiality or integrity protection
Faking the sender address is easy to do
Traffic can be analyzed by sniffing packet headers
IP payload doesn’t have confidentiality or integrity protection
Eavesdropping is possible by sniffing packets
Loose coupling with lower layers:
Easy to divert traffic
Availability can be easily attacked
Confidentiality and integrity can’t be guaranteed
Unprotected error signaling via ICMP: Fake error messages can affect
availability
DNS is insecure; i.e. DNS spoofing
1.4.4 TCP Security Issues
TCP header doesn’t have confidentiality or integrity protection
Session hijacking
When sniffing session details, attacker can impersonate a peer in a
TCP connection
Attackers can guess session details and attack remotely using
spoofed IP addresses
RST attack: Attackers can reset/abort attacks by
injecting packets with the RST flag
Port scanning
Find out open ports
Determine software running on port
SYN flooding
Overload system resources by initializing many connections and not
pursuing them
1.4.5 Port Scanning
Objective: Collect information about …
Installed services
Software versions
OS
Firewall
Enumeration based on port
Well-known ports (i.e. SSH → 22)
Invalid connection requests: Different way of error handling can be
used to fingerprint the OS
Possible scanning methods
TCP connect scan
Half-open scan
SYN-ACK scan
ACK scan
1.4.6 TCP Protection
Mechanisms
SYN flood protection
Limit rate of SYN packets
SYN cookies (RFC 4987)
Limit resources
Half-open connections are not stored in the connection table but
instead as a hash in the ISN
Only if the 3rd ACK handshake packet matches the sequence number,
the connection is added to the connection table
Server does not need to maintain any state information on half-open
connections: Resources can’t be exhausted
Connections are only accepted if the sequence numbers are within a
certain range of acceptable values (attackers would have to sniff
sequence numbers or guess them)
1.4.7 Session Hijacking
Attacker takes over existing connection between two peers
Requirement: Attacker has to sniff or guess sequence numbers of the
connection correctly
1.4.8 RST Attacks (In-Connection
DoS)
Inject packet with RST flag into ongoing connection: Connection has
to be aborted immediately
1.4.9 Blind IP Spoofing
Firewall is configured to only allow one source IP address and
destination IP address (A → B).
To circumvent this restriction:
Attackers starts DoS attack on A to prevent A from sending RST
packets to B
Attacker sends TCP connection setup packet with A’s source IP
address to B
B sends SYN+ACK packet to A, but can’t respond due to DoS
Attacker sends TCP connection ACK packet to B with ACK matching the
initial sequence number chosen by B (which has to be guessed, as B sent
the SYN+ACK packet to A, not the attacker)
Only works if B uses a predicable algorithm for it’s ISN and packet
filters aren’t in place.
1.5 Perimeter Defense in
Practice
1.5.1 Architecture
Recommendations
Known from medieval cities, castles etc.
Definition of system boundary between “inside” and “outside”
Different threat models for inside and outside
Inside: Trusted
Outside: Untrusted
Objectives
Create said boundary
Only a defined set of communication relations is allowed
Special security checks
Limited number of interconnection points
Simpler to manage and audit than a completely open architecture
Problems
Requires intelligent selection of system boundaries
May require multiple levels of perimeters
No system/user in the “trusted inside” can truly be trusted
1.5.2 Application in
Networking
Installing security devices at the network border
Seperation of network areas into inside/outside
Prevent sensistive information from being sent to the outside (view
the system in the inside as the potential, probably unintentional
attacker)
Multiple levels can increase security
But: Perimeter security is not sufficient on its own!
The will probably be additional non-secured paths into the network
(i.e. ssh -R)
Some malicious traffic might look like “normal” traffic and can
pass
1.5.3 Stateless Packet Filter
Access Control List (ACL): Applies set of rules to each incoming
packets
Discards (denies, blocks) or forwards (allows, permits) packets
based on ACL
Typically configured by IP and TCP/UDP header fields
Stateless inspection: Established connections can only be detected
with the ACK control flag
Can be easy to misconfigure by forgetting essential protocols
DNS
ICMP
Advantages
Fast/High throughput
Simple to realize
Software-based, can be added as a package
Simple to configure
Disadvantages
Inflexible
Many attacks can only be detected using stateful filtering
Rules and their priorities can easily get confusing
Default discard policy
Block everything which is not explicitly allowed (allowlist)
Issue: The security policy has to be revised for each new protocol
or service
This rule must come last/have the lowest priority, behind all
“allowing” rules
1.5.4 Stateful Packet Filters
Store connection states
Can make decisions based on
TCP connections
UDP replies to previous outgoing packet with same IP:Port relation
(“UDP Connection”)
Application protocol states
Similar to application layer gates/proxy firewalls, but less
intruding in communication
Rules can be more specific than in stateless packet filters
Rules are easier to enforce, i.e. incoming TCP packets don’t have to
be allowed in because they have ACK set
1.5.5 Stateful Firewalls
Tries to fix the problems of stateless inspection
To many packets have to be allowed by default (ACK → No SYN-scanning
protection)
Protocols like FTP or SIP, which dynamically allocate port numbers,
can’t be filtered securely
Create state per TCP or UDP flow
Source and Destination IP:Port
Protocol
Connection state
A packet which is not associated with a state is dropped
immediately
Packets which belong to a previously established TCP/UDP
“connection” are allowed to pass without further checks
State tables have to be cleaned up periodically to prevent resource
starvation
1.5.6 Application Layer
Proxies
Protected host during connection establishment
Different kinds
Application level
Circuit level
Forward proxy (client-side)
Reverse proxy (server-side)
1.5.7 Application Level
Gateways
Conversion between different application layer protocols
Evaluation up to OSI layer 7
Protocol verification
Authentication
Malware scanning
Spam filtering
Attack pattern filtering
Advantage: Security policies can be enforced at application
level
Disadvantage: Computing and memory performance requirements
1.5.8 Circuit Level Gateway
Checks/controls at TCP connection level
Creates separate connection to outside and inside
Checks data before it is being sent to the transport layer
1.5.9 Demilitarized Zone (DMZ)
Outside world: Global Internet
Outside router: Routes packet to and from bastion
host
Bastian host: Proxy server and relay host
Inside router: Routes packets only to and from
bastion host
Inside (protected): Intranet
The DMZ creates 2/3 lines of defense by the use of a stub
network.
Multi-Level DMZs can create even more secure perimeter defenses:
Global Internet → Access Router and Packet Filter → Public Services
Host (offers i.e. public Web services) → Screening Router and Packet
filter (prevents IP spoofing) → Mail host (for external mail
communication) → Bastion host (i.e. proxy for FTP and Web access) →
Intranet
1.5.10 Web Application Firewalls
(WAFs)
Acts on the application layer
Is a reverse proxy
Can protect the web server from “evil” client input
Cross-Site scripting
SQL injection: Filters out JS or SQL commands in client input by
removing special symbols (i.e. <, '
etc)
Cookie poisoning: Stores the hash values of sent cookies
HTML manipulation: Encrypts URL parameters
1.5.11 Cross-Site Scripting
(XSS)
Injection of malicious client-side code (JS, WASM) into site. There
are multiple types:
Reflected/non-persistent XSS: Attacker provides
malicious data i.e. via URL → server adds malicious code to page →
browser executes the malicious code
DOM-based XSS: Attacker provides malicious data
i.e. via URL → client (app running in the browser) adds malicious code
to page → browser then executes the malicious code
Stored (persistent) XSS: Attacker provides
malicious data using i.e. their profile page, POSTs it to
the server → server stores it i.e. in a database → Client then requests
i.e. the attacker’s profile page → server loads the malicious data from
the database → adds the stored malicious code to the page → browser then
executes the malicious code
1.5.12 Cross Site Request Forgery
(CSRF)
Sniffing of cookies/tokens from a connection in another tab.
1.5.13 Intrusion Detection Systems
(IDS)
Security product that is specialized on detecting anomalies during
live operation of networks and computers
Signature based: Use attack signatures/known
malicious communication activity patterns
Anomaly based: Significant deviation from
previously recorded baseline activity
Rule based: Define allowed by behavior by
app-specific set of legitimate actions
Actions
Send out alarm
Logging
Blocking of known patters
Realization
Appliance
Integration in firewall
Integration into host
1.5.14 Injections
SQL injection: SQL commands are sent to the
database because neither server nor client escape
i.e. '
HTML injection: Parameters in HTML forms can also
be sent using a POST request
1.6 Symmetric Encryption
1.6.1 Symmetric Encryption
Overview
Alice:
Creates message
Chooses key
Computes ciphertext
Send ciphertext to Bob
Eve (Attacker):
Copies ciphertext
Tries to guess the key
Bob:
Receives ciphertext
Uses key
Computes plaintext
Reads message
1.6.2 Kerckhoffs’ Principle
From “La Cryptographie Militaire”
Most important point: The security of a crypto system must
lie in the non-disclosure of the key but not in the non-disclosure of
the algorithm
Implementation
Keep secret which function you used for encryption
But a disclosure of the set of functions should not create a
problem
1.6.3 Strong Algorithms
There is no attack that can break it with less effort than a
brute force attack (“complete enumeration”)
There are so many keys that a complete search of key space
is infeasible
1.6.4 Crypto Attack Classes
Active attacks
Most relevant for cryptographic protocols
Active interference (modification, insertion or deletion of
messages)
Man in the middle (MITM) can receive messages and modify them on the
way to the receiver
Passive attacks: Pure eavesdropping, without
interference with communication
1.6.5 Perfect Security
Ciphertext does not give any information you don’t already have about
the plaintext (p(m(c))=p(m))
1.6.6 One-Time-Pad
Vernam Cypher: Create ciphertext by XOR addition of
secret key and plaintext
Mauborgne: Random key, never re-use key (“one
time”)
Shannon: OTP is unbreakable if key is …
Truly random
As large
Never reused
Kept secret
1.6.7 Stream Cyphers
Encryption like one-time-pad, but using pseudo-random bits instead of
true random (using a Crytographically Secure Pseudo-Random
Number Generator (CSPRNG))
1.6.8 True Random Number
Generators
Output can’t be reproduced or predicted
Is based on physical processes
1.6.9 (Cryptographically Secure)
Pseudo-Random Number Generators (CSPRNG)
PSRNGs compute the output based on a seed and an internal state.
A CSPRNG must …
Be unpredictable
Be computationally infeasible to compute the next outputs
… when the initial state of the CSPRNG is not known
1.6.10 Design Principles for Block
Cyphers
Two methods for frustrating a statistical analysis:
Confusion: The ciphertext should depend on the
plaintext in such a complicated way that an attacker cannot gain any
information from the ciphertext (redundancy should not be visible
anymore in the ciphertext)
Diffusion: Each plaintext and key bit should
influence as many ciphertext bits as possible
Changing one bit in plaintext → Many pseudo-random changes in
ciphertext
Changing one bit in the key → Many pseudo-random changes in
ciphertext
1.6.11 Feistel Networks
Described by Horst Feistel
Algorithm
Plaintext block B is divided in 2 halves
Derive r round key keys from key
Feed one half through round function F
Then XOR the result with the other half
Exchange halves
Repeat r times
1.6.12 DES (Tripple DES)
Single DES breakable in less than 24h (complete search of key
space)
Tripple DES is still secure
Three steps of DES on each data block using up to three keys
Decryption in reverse sequence
3 independend keys are the most secure
Three same keys can be used for (insecure) DES compatibility
1.6.13 AES Key Features
FIPS standard 197
Key length: 128/192/256 bit
Block size: 128 bit
Iterative rounds of substitutions and permutation, but no Feistel
structure
10, 12 or 14 rounds
Blocks of 16 bytes arranged in 4x4 state matrix
Components of the round function are invertible and independent of
key
Substitute Bytes: Non-linear substitution of bytes
in state
Shift Rows: Cyclic shifting of rows
Min Columns: Multiplication of state elements with
a fixed 4x4 matrix M
1.6.14 Modes of Operation for Block
Cyphers
Objective: Encrypt multiple plaintext blocks with the same block
cypher
Problem: Patterns in the distribution of plaintext blocks remain
visible
1.6.15 Cypher Block Chaining
(CBC)
Avoids telltale patterns in ciphertext
Decryption fails if a data block is missing or corrupted
Each data block is encrypted in relation to the previous block
1.6.16 Counter Mode (CTR)
Simple and efficient
Random access still possible
No issues if data block is missing
Incrementing counter is involved in randomization per data
block
1.6.17 Padding
Plaintext needs to be a full number of blocks
If plaintext does not fill the last block completely, it must be
padded before encryption
In order to facilitate safe decryption, the last block is always
padded: For example for a block size of n bytes, there are 1…n bytes
added to the plaintext before encryption
Decryption can check last bytes and strip them off
correspondingly
Always need to pad with at least one byte!
Common methods
Pad with bytes of the same value as the number of padding bytes
(PKCS#5; i.e. if there are three bytes to be padded, add
0x03 0x03 0x03)
Pad with 0x80 followed by 0x00 bytes
Pad with zeroes except for the last byte that indicates the number
of padding bytes
Pad with zeroes
Pad with space characters (0x20)
1.6.18 Key Length
Considerations
Cryptography is always a matter of complexity
With enough time and/or space, all schemes can theoretically be
broken
“brute force” attacks
Example: 56bit keys DES can be broken in <24h since 1999
Meanwhile
128bit keys have to be replaced in the coming years
192bit keys are secure in medium term
256bit keys are hard to crack due to physical boundaries (“state of
the art”)
Quantum computers might be able to crack keys much more quickly
Numbers refer to unbroken algorithms in symmetric cryptography
Broken algorithm is one where an n bit key can be determined trying
out significantly less than 2n keys
1.7 Message Authentication
1.7.1 Message Authentication Codes
(MACs)
Objectives
Integrity protection: Prevent unauthorized
manipulation of data
Message authentication: Prevent unauthorized
origination on behalf of others
Idea: Compute a cryptographic chesum (MAC)
Required Properties
Cannot be counterfeited; without having the sender’s secret, it is
to complex to …
Find another message matching the same MAC
Construct a suitable MAC for another message
Even smallest changes to message cause a big change of the MAC
1.7.2 General Scenario
Alice:
m = "I love you. Alice"
Select secret key K
Compute MAC_K(m)
Bob:
Receives m'
Selects secret key K
Computes MAC_K(m')
Compares computed MAC with received MAC → Matches!
Assertion: If computed MAC equals the MAC included
in the received message, an owner of the key (Alice) really sent this
message and it was not changed on the way.
Alice can obtain the plaintext message m by computing m=D_{SK_{Alice}}(c)=c^d\mod n = m^{ed} \mod
n
1.8.5 RSA Security
RSA problem: Given e, n and
c = m^e \mod n, find m
Most efficient approach to solve the RSA problem is currently the
integer factorization of n: An upper
limit to the complexity of the problem; can be used to derive the
private key from the prime factors
Quantum computers will be more efficient in doing integer
factorization (Shor’s algorithm)
RSA problem and integer factorization still lack mathematical proof
for their complexity
Organizational properties
Authenticity of the public key (e,n)
Confidentiality of the secret key (d,p,q)
Mathematical properties
Complexity of factoring the modulus n
Complexity of solving the RSA problem
Failure of any properties will compromise the security of the
method!
1.8.6 Hybrid Method
Combination of asymmetric and symmetric key methods.
Alice:
Generates key pair (PK_{Alice},
SK_{Alice})
Publishes PK_{Alice} at
Trent’s
c received → Decrypts K=D_{SK_{Alice}}(c)
Alice and bob switch over to the symmetric key algorithm with key
K
Trent:
Stores public keys
Provides public keys on request
Bob:
Obtains PK_{Alice} from Trent
Generates symmetric key K
Computes c=E_{PK_{Alice}}(K)
Sends c to Alice
1.8.7 Discrete Logarithms
Primitive element: Let p be a prime number. An element g\leq p-1 is called primitive element \mod p if for each A \in \{1,2,...,p-1\} there is an x such that A=g^x
\mod p
Discrete logarithm: Let p be a prime number and let g \leq p-1 be a primitive element \mod p. Then an element x is called discrete logarithm of A to base g \mod
p if A=g^x \mod p.
Discrete logarithm problem: Given A, g, p, find x \leq
p-1 with A=g^x \mod p
1.8.8 One-Way Functions
“Trap-door” functions
Easy to compute in one direction (i.e. f(x)=g^x \mod p)
Hard to invert
Ideally only possible using complete enumeration of all possible
inputs
I.e. for a given y you need to try
out all possible values x=0,1,...,p-1
to find one x_0:f(x_0)=y
Definition of complexity often of the P and NP complexity classes
P: Answer of a problem can be found in polynomial
time (b bits of problem size →
algorithm takes time b^k)
NP: Answer of problem cannot be found in polynomial
time (b bits of problem size →
algorithm takes time k^b), but the
correctness of given answer can be checked in polynomial time
1.8.9 Diffie-Hellman Key Exchange
Protocol
Purpose: Allow communication partners without prior
knowledge of another to establish a shared secret key over an insecure
communication channel
title TLS Handshake
Client->Server: Hello
Server->Client: Hello
Server->Client: Cert public key
Server->Client: Hello Done
note over Client: Pre-master secret
note over Client: Symmetric key
Client->Server: Change cypher key exchange
Client->Server: Client finished
note over Server: Pre-master secret
note over Server: Symmetric key
Server->Client: Change cypher sec
Server->Client: Finished
Client<->Server: Encrypted data transfer
1.10.3 TLS Record Protocol
Sender:
Fragmentation
Compression (optional)
MAC computation (Key dependent; MD5, SHA-1, SHA-256 etc.)
Encryption
Receiver:
Decryption
MAC verification
Decompression (optional)
Reassembly
1.10.4 Connection States
Each side has four connection states
One for each direction (read/write)
One current and one pending set of states
Parameters negotiated by the TLS handshake protocol
Pending states made current by the change cypher spec protocol
Security parameters
Connection end (client/server)
Bulk encryption algorithm
MAC algorithm
Compression algorithm
Master secret
Client random
Server random
Security items for both directions (client write/server write)
Encryption keys
MAC secrets
Initialization vectors (in case of block cypher)
Sequence numbers (no wrapping)
1.10.5 SSH Transport Layer
Protocol
Tasks
Server authentication
Negotiation of algorithms and keys
Confidentiality and integrity protection (for application data)
Prerequisites
Server has a public key (“host key”)
Client has a trustworthy copy of the host key
Reliable transport protocol (TCP) between client and server
1.11 Frequently Asked
Questions
1.11.1 Phishing Attacks
Attacker tries to get a user to log in with a fake mail and a fake
site
Attacker steals the login information of the user in order to get
access to bank accounts or credit card info
Many options in addition to mail
Malware (Keylogger)
DNS-based phishing (Redirection to fake site)
Man-in-the-middle Phishing
XSS
Violated security objectives
Authenticity: Attacker pretends to be a different
company
Confidentiality: Non-secured connection
Authorization: The attacker can steal
credentials
Privacy: The attacker can get identity-related info
by access to the user’s account
Non-repudation: The attacker can transfer
money
1.11.2 Phishing Attack
Prevention
Spam filters: Most phishing mails can be filtered using a spam
filter
A link’s text should be compared to the actual URL (the
href tag)
Check the URL in the address bar
Antivirus-Apps
Using an up-to-date system
Checking the certificates of a site
Using HTTPS
1.11.3 Certificates and CAs
Certifies properties of people or objects and their authenticity and
integrity using cryptographic processes
A public key certificate provides the public key of a person or
organization and confirms it
Certificates are signed by the service provider/certificate
authority (CA) or a government authority (i.e. COVID-19), which adds to
trust
1.11.4 Certificate Revocation
As soon as a cert’s private key has been leaked, it needs to be
revoked by putting it on a certificate revocation list
Before a cert should be used it should be checked if it has not been
revoked yet
There are also other reasons for cert revocation
Change of certificate metadata (i.e. name change)
Dissolution of the organization
Removal of privileges
1.11.5 Validation of
Certificates
Certificate has the service provider’s/CA’s signature
The signature is a hash of the certificate encrypted with the CA’s
private key, which can be validated by decrypting it with the CA’s known
public key
Date validity needs to be checked
Revocation needs to be checked
Risks
Revocation checks are crucial because they allow a user to verify
the identity of the owner of the site and discover whether the
certificate authority still considers the digital certificate
trustworthy
Attacker could fake a site using a revoked certificate
1.11.6 Why can DES be decrypted
even though F is not invertible?
DES uses a Feistel Network
Key is divided and only one half is put through the round
function
Both halves are joined using XOR
In order to decrypt a block, the same algorithm is used, but the
divided keys are used in the opposite order
1.11.7 SQL Injection
Inputs from forms, API requests etc. are passed to the database
without any validation for embedded snippets
Embedded SQL snippets will run on the DB, allowing the attacker to
run any snippet on the database
Violated security objectives
Authorization: Access is granted without
authorization
Confidentiality: Access to info in database
Integrity: Data can be manipulated
Privacy: Access to potentially identity-related
private info
Availability: Database could be dropped, which
would take the system down (no schema after attack)
1.11.8 DNS Spoofing
Attacker sends fake DNS answers and pretends to be the relevant
nameserver
Attacker needs to send the fake answer before the relevant
nameserver can; this is for example possible by a DoS attack
Attacker can also add a fake entry to /etc/hosts
Violated security objectives
Authenticity: Attacker pretends to be someone
else
Confidentiality: Attacker eavesdrops on
communication with DNS server
1.11.9 Replay Attacks and
Signatures
Attacker tries to communicate using a packet which they sniffed
beforehand
Can be provided by using a random number or nonce, which is also
being encrypted; the number would have to be guessed
Encryption and signatures don’t help prevent replay attacks as
decryption is not required to replay the attack
Violated security objectives
Authenticity: Attacker can pretend to be someone
else
Authorization: If sniffed packet contains login
info
1.11.10 VPN Access from Intranet to
external Mail Server
VPN gateway is required
IPSec tunnel mode can be used
Firewall rules, VPN connection and routing tables need to be
configured
1.11.11 Stateless vs. Stateful
Packet Filters/Firewalls
Stateless: Decides what to do with packets based on
static values
IP:Port of source/destination
TCP flags
Stateful: Decides what to do using a state table
Keeps track of connections using a state table
(new/established/related/…)
Can detect MTU changes and packet fragmentation
Can’t secure application layer from viruses
Decides what to do with packets based on dynamic values
TCP connections
UDP replies to previous outgoing packet with same IP:Port relation
(“UDP connection”)
Application protocol states
Drops unsolicited requests: Packets which don’t match known criteria
or are part of a DoS attack
1.11.12 Hash Functions and their
Applications
Cryptographic hash functions are a special type of hash function
which is collision resistant and a one-way function
Maps a string of any length to a string of fixed length
It is an asymmetric challenge-response protocol which is used to
provide authentication by checking authentication factors. It does so by
sending a hash of a random number, which has been encrypted using
Alice’s public key/cert, to Alice, who then decrypts the hash and sends
it to Bob.
1.11.15 Plaintext Awareness
It is hard, even with an efficient algorithm, to create a valid
ciphertext if plaintext is not taken into account
If an attacker tries to send a message to Bob using ciphertext and
Alice accepts it as valid, it is not plaintext aware
In the example
above, Alice has more ways to check its validity however (hash
etc.), which would not be the case if it were a symmetric
response-challenge protocol
Known Plaintext Attack
Attacker sniffs the challenge and the response
Tries to use cryptographic methods to get the used password
Worked in GSM systems
1.11.16 Key Reuse in the One-Time
Pad
The following is no longer true (C =
Cypher, K = Key, M = Message):
C1=M1+K C2=M2+K D=C1-C2=(M1+K)-(M2+K)=M1-M2
The difference D now has the same
characteristics like M1-M2; this means
that frequency analysis can be used.
1.11.17 Ingress and Egress
Ingress Filtering: Incoming packets are not allowed
to have IP from internal address range to protect against spoofing
Egress Filtering: Packets leaving internal networks
have to have a source IP from internal range to protect against spoofing
and to prevent packets from the internal network from leaking to outer
network
1.11.18 Caesar Cypher
Vulnerability
Key range is way too small (26)
Frequency analysis can be used (i.e. checking for
e)
1.11.19 Authentication
vs. Authorization
Authentication: Communication partners can proof
their identity to one another
Authorization: Access is only available to those
with specific permission
1.11.20 TCP Vulnerabilities if PRNG
is predicable
Attacker can generate a sequence number, which can be used in an
existing session between two communication partners → Enables session
hijacking
1.11.21 Analog Examples for
Security Objectives
Authenticity: Checking the student ID card
Integrity: Writing with a ball pen instead of a
pencil
Availability: Storing an additional copy of the
exam questions at the examination office
1.11.22 Server vs. Client
Authentication in HTTPS
A web server is typically accessible to anyone; it is not important
who accesses it. A client however wants to know that a site is
trustworthy/authentic, which is why typically only the server is
authenticated.
1.11.23 Vulnerabilities of
non-revoked, faked Certs
Anyone can impersonate who the cert has been given too
To prevent this, the certs need to be added to a CRL
1.11.24 Applied Security
Objectives
A person is communicating with amazon.com.
Validating that they are actually communicating with
amazon.com: amazon.com needs a certificate,
which is to be checked by the client →
Authentication
Making sure that credit card info can’t be eavesdropped on: Needs
encryption, i.e. HTTPS → Confidentiality,
Privacy
Ensuring that nobody can buy something using their information:
Needs to be behind i.e. a Password, i.e. HTTPS with HTTP digest
authentication → Authorization
Validating that a mail to many employees has actually been sent by
the CEO: Digital signature, combined with a certificate to verify the
signature → Authenticity, Integrity,
Non-Repudiation
Air traffic control can’t be offline: DoS protection and failovers →
Availability
1.11.25 Firewall Appliance
vs. Personal Firewall
Appliance: Can’t filter by application
Personal: Can’t protect against OS vulnerabilities and is easily
misconfigured
1.11.26 Diffie-Hellman vs. RSA
Diffie-Hellman allows creating a shared secret key for symmetric
encryption over an insecure communication channel
RSA uses public and private keys for asymmetric encryption; only
public keys need to be exchanged
1.11.27 Indirect Blocklisting
Sender’s mail address is faked and used to send spam, which leads the
recipient to block the sender’s address, despite them never having sent
any spam themselves. Can be fixed by checking signature and certificate
instead and blocking based on signature or blocking all messages without
signature or certificate.