Minimalt: Minimal-Latency Networking Through Better Security W

Total Page:16

File Type:pdf, Size:1020Kb

Minimalt: Minimal-Latency Networking Through Better Security W MinimaLT: Minimal-latency Networking Through Better Security W. Michael Petullo Xu Zhang Jon A. Solworth Daniel J. Bernstein Tanja Lange mike@flyn.org [email protected] [email protected] [email protected] [email protected] University of Illinois at Chicago TU Eindhoven USA Netherlands ABSTRACT all long-term private keys cannot decrypt past packets or identify the parties involved in communication. Tradition- Minimal Latency Tunneling (MinimaLT) is a new net- ally, using Diffie-Hellman key exchange (DH) to achieve work protocol that provides ubiquitous encryption for max- PFS requires a round trip before sending any sensitive imal confidentiality, including protecting packet headers. data. MinimaLT eliminates this roundtrip, instead re- MinimaLT provides server and user authentication, exten- ceiving the server's ephemeral key during a directory ser- sive Denial-of-Service protections, and IP mobility while ap- vice lookup (x4.3.1). To establish connection liveness| proaching perfect forward secrecy. We describe the proto- necessary only if the connection is inactive and the server col, demonstrate its performance relative to TLS and unen- is running out of memory|we invert the normal mandatory crypted TCP/IP, and analyze its protections, including its start-of-connection handshake and replace it with an only- resilience against DoS attacks [56]. By exploiting the prop- when-needed server-originated handshake (x4.3.4). Elimi- erties of its cryptographic protections, MinimaLT is able to nating roundtrips makes MinimaLT faster than unencrypted eliminate three-way handshakes and thus create connections TCP/IP at establishing connections. faster than unencrypted TCP/IP. A second challenge is to make connections portable 1 Introduction across IP addresses to better support mobile computing. allows you to start a connection from home, Our goal is to protect all networking against eavesdropping, MinimaLT travel to work, and continue to use that connection. This modification, and, to the extent possible, Denial of Ser- avoids application recovery overhead and lost work for op- vice (DoS). To achieve this goal, networking must protect erations which would otherwise be interrupted by a move. privacy, perform well, provide strong (i.e., cryptographic) IP mobility does not require intermediary hosts authentication, and be easy to configure. These needs are MinimaLT or redirects, allowing it to integrate cleanly into protocol not met by existing protocols. processing (x4.3.3). To provide better privacy, Hardware and software improvements have eliminated his- MinimaLT blinds third parties to IP-address portability to prevent link- torical cryptographic performance bottlenecks. Now, strong ing a connection across different IP addresses. symmetric encryption can be performed on a single CPU core at Gb/s rates [45], even on resource-constrained mobile A third challenge is DoS. A single host cannot thwart an devices [13]. Public-key cryptography, once so agonizingly attacker with overwhelming resources [36], but MinimaLT slow that systems would try to simulate it with symmetric protects against attackers with fewer resources. In particu- key cryptography [43], is now performed at tens of thousands lar, MinimaLT dynamically increases the ratio of client (i.e., of operations per second on commodity CPUs. But one per- attacker) to server resources needed for a successful attack. formance parameter is a fundamental limitation|network MinimaLT deploys a variety of defenses to maintain propor- latency [33]. Latency is critical for users [58]. For example, tional resource usage between a client and server (x5.3). Google found that a 500ms latency increase resulted in a A fourth challenge is authentication and authorization. 25% dropoff in page searches, and studies have shown that Experience indicates that network-based password authen- user experience degrades when interfaces incur latencies as tication is fraught with security problems [34, 57, 47, 16], small as 100ms [17]. This has prompted several efforts to and that cryptographic authentication is needed. Our reduce TCP and TLS latency [18, 46, 44, 53, 59]. authentication framework supports both identified and We describe here MinimaLT, a secure network protocol non-identified (pseudonym) users (x4.1.1). We designed which delivers protected data on the first packet of a typ- MinimaLT to integrate into systems with strong authoriza- ical client-server connection. MinimaLT provides substan- tion controls. tial protections and is extraordinarily simple to configure To meet these challenges, we have done a clean-slate de- and use. In particular, it provides cryptographic authenti- sign, starting from User Datagram Protocol (UDP), and cation of servers and users; encryption of communication; concurrently considering multiple network layers. We found simplicity of protocol, implementation, and configuration; an unexpected synergy between speed and security. The rea- clean IP-address mobility; and DoS protections. son that the Internet uses higher-latency protocols is that, MinimaLT's design intentionally crosses network layers. historically, low-latency protocols such as T/TCP have al- It does so for two reasons: First, security problems often lowed such severe attacks [18] as to make them undeployable. occur in the seams between layers. For example, Transport It turns out that providing strong authentication elsewhere Layer Security (TLS) is unable to protect against attacks on in the protocol stops all such attacks without adding latency. TCP/IP headers due to its layering; RST and sequence num- In short, MinimaLT provides the features of TCP/IP (re- ber attacks interrupt TLS connections in such a way that is liability, flow control, and congestion control), and adds difficult to correct or even detect [23, 4, 62]. Second, multi- in encryption, authentication, clean IP mobility, and DoS layer design enables MinimaLT to improve performance. protections, all while preserving PFS and reducing latency Particularly challenging has been to provide Perfect For- costs. We describe MinimaLT and its implementation here. ward Secrecy (PFS) at low latency. PFS means that even In x2 we describe related work, x3 describes our threat an attacker who captures network traffic and later obtains model, x4 describes the design, and x5 provides an evalu- ation of the security and performance of MinimaLT. Linux kernel, SELinux, and IPsec, each of which are very complex. Furthermore, IPsec security association granular- 2 Related work ity limits the granularity of controls in labeled IPsec. In TLS provides cryptographic network protections above the contrast, MinimaLT is designed from scratch, significantly transport layer and is normally implemented as a user-space simplifying policy specification, implementation, and use. library [19]. TLS is widely deployed as the primary network Stream Control Transport Protocol (SCTP) is a security layer in web browsers, yet many Internet applica- transport-layer protocol that provides reliable delivery and tions avoid the use of TLS or use weak TLS options [61]. congestion control [60]. SCTP differs from TCP in that Even well-meaning developers routinely misuse complex it can bundle messages from multiple applications (i.e., TLS Application Programming Interfaces (APIs), resulting chunks) into a single packet. MinimaLT borrows this tech- in security holes [31, 26]. Optionally, TLS can provide user- nique. Structured Stream Transport (SST) [29] allows ap- level authentication using client-side certificates but autho- plications to associate lightweight network streams with an rization is left to application logic. ForceHTTPS [38] and existing stream, reducing the number of three-way hand- HTTPS Everywhere [25] attempt to make TLS/HTTP more shakes incurred by applications and providing semantics use- robust; MinimaLT forgoes backwards compatibility to pro- ful for applications that use both data and control connec- vide a simpler, less mistake-prone platform. tions. MinimaLT eliminates the handshake on even the first There have been many attempts to reduce the latency in- connection, and MinimaLT's tunnels do not require a pro- curred by TLS and TCP. Recently, False Start (no longer grammer's explicit use of a lightweight stream API. used), Snap Start, and certificate pre-fetching have accel- Table 1 compares several network protocols with erated establishing a TLS session [46, 44, 59]. TCP Fast MinimaLT. MinimaLT is unique in that it provides encryp- Open (TFO) [53] clients may request a TFO cookie that al- tion and authentication with PFS while allowing a client to lows them to forgo the three-way handshake on future con- include data in the first packet sent to a server (often for- nections. Since any client may request a TFO cookie, a going pre-transmission round trips entirely). MinimaLT is client may spoof its sending Internet Protocol (IP) address also notable in that it includes robust DoS protections di- to mount a DoS attack against a server; under this condi- rectly in the protocol. tion, the server must again require a three-way handshake. To benefit from TFO, a server application must be idempo- 3 Threat model tent, a requirement that MinimaLT does not impose. Data- We are concerned with the confidentiality and integrity gram Transport Layer Security (DTLS) [54] provides TLS of network traffic in the presence of an attacker that can protections on top of UDP, which is useful when reliability is observe or modify arbitrary packets|including a Man-in- not needed. However, DTLS shares TLS' initial
Recommended publications
  • Microsoft DNS
    1 a. Domain Name Service (DNS) encompassing Microsoft DNS From Wikipedia, the free encyclopedia Jump to: navigation, search Microsoft DNS is the name given to the implementation of domain name system services provided in Microsoft Windows operating systems. Contents [hide] 1 Overview 2 DNS lookup client o 2.1 The effects of running the DNS Client service o 2.2 Differences from other systems 3 Dynamic DNS Update client 4 DNS server o 4.1 Common issues 5 See also 6 References 7 External links [edit] Overview The Domain Name System support in Microsoft Windows NT, and thus its derivatives Windows 2000, Windows XP, and Windows Server 2003, comprises two clients and a server. Every Microsoft Windows machine has a DNS lookup client, to perform ordinary DNS lookups. Some machines have a Dynamic DNS client, to perform Dynamic DNS Update transactions, registering the machines' names and IP addresses. Some machines run a DNS server, to publish DNS data, to service DNS lookup requests from DNS lookup clients, and to service DNS update requests from DNS update clients. The server software is only supplied with the server versions of Windows. [edit] DNS lookup client Applications perform DNS lookups with the aid of a DLL. They call library functions in the DLL, which in turn handle all communications with DNS servers (over UDP or TCP) and return the final results of the lookup back to the applications. 2 Microsoft's DNS client also has optional support for local caching, in the form of a DNS Client service (also known as DNSCACHE). Before they attempt to directly communicate with DNS servers, the library routines first attempt to make a local IPC connection to the DNS Client service on the machine.
    [Show full text]
  • Network Working Group T. Pauly Internet-Draft Apple Inc
    Network Working Group T. Pauly Internet-Draft Apple Inc. Intended status: Informational C. Perkins Expires: September 6, 2018 University of Glasgow K. Rose Akamai Technologies, Inc. C. Wood Apple Inc. March 05, 2018 A Survey of Transport Security Protocols draft-pauly-taps-transport-security-02 Abstract This document provides a survey of commonly used or notable network security protocols, with a focus on how they interact and integrate with applications and transport protocols. Its goal is to supplement efforts to define and catalog transport services [RFC8095] by describing the interfaces required to add security protocols. It examines Transport Layer Security (TLS), Datagram Transport Layer Security (DTLS), Quick UDP Internet Connections with TLS (QUIC + TLS), MinimalT, CurveCP, tcpcrypt, Internet Key Exchange with Encapsulating Security Protocol (IKEv2 + ESP), SRTP (with DTLS), and WireGuard. This survey is not limited to protocols developed within the scope or context of the IETF. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on September 6, 2018.
    [Show full text]
  • Automatic Local Area Network Encryption
    Vula: automatic local area network encryption Abstract—This paper introduces Vula, a protocol and suite of will benefit from the use of Vula 2. With Vula’s ability to be Free Software tools for automatically protecting network traffic gradually deployed, every host has a notion of cryptographic between hosts in the same Local Area Network (LAN). Without identity, and we think that with this improvement it will be any configuration, or any user awareness, Vula automatically clearer how to solve the problem of Internet-wide end-to-end blinds passive adversaries. With user awareness and a small encryption without resorting to sending unecrypted IP packets, amount of interaction, it also protects connections using .local encrypted but unauthenticated IP packets, or any of the various hostnames, or any other user supplied domain, against active adversaries. The protocol additionally provides protection against Single Points of Failure (SPOFs) as described in SectionII. a passive adversary who is recording traffic today and who may have a quantum computer tomorrow. Vula’s protections A. Motivation persist with network topology changes which occur naturally over time, allowing users to maintain cryptographic assurances Public and private personal networks are commonly de- while roaming between different LANs. The software operates ployed using wired Ethernet (802.3) or wireless LAN (802.11) without requiring centralized administration, specialized network standards without comprehensive protection against surveil- equipment, or significant performance penalties. lance adversaries. Ethernet networks are commonly deployed in consumer and commercial contexts without encryption of any kind. Authentication [2] of end-user’s computers may be combined with a protocol such as MACsec [48] or WPA for I.
    [Show full text]
  • Building Secure Channels
    Building Secure Channels Kenny Paterson Information Security Group Overview • Why do we need secure channels? • What properties should they have? • Literature on secure channels • Extended Example: TLS 2 Why do we need secure channels? • Secure communications is the most common real- world application of cryptography today. • No, it’s not MPC for sugar beet auctions! • Secure channels are extremely widely-deployed in practice: • SSL/TLS, DTLS, IPsec, SSH, OpenVPN,… • WEP/WPA/WPA2 • GSM/UMTS/LTE • Cryptocat, OTR, SilentCircle,… • (QUIC, MinimalT, TCPcrypt) • Mostly, but not exclusively in the 2-party case. 3 What security properties should they have? • Confidentiality – privacy for data • Integrity – detection of data modification • Authenticity – assurance concerning the source of data • All in the face of active attackers who can modify, delete, inject, re-order network messages. • These three properties are relatively easy to achieve using Authenticated Encryption (AE) or AEAD. • Recall AE notion from Monday. • AEAD: some data encrypted and integrity protected, other data (the header) only integrity protected. • But AE/AEAD were not available at the time many of today’s systems were designed. • Note that authenticated key establishment (AKE) is out-of-scope for this talk. • We assume the keys are already in place. • A major assumption, but a different summer school! 4 What security properties should they have? Less obvious security properties: • Anti-replay – detection that messages have been repeated. • Drop-detection – detection that messages have been deleted by the adversary or dropped by the network. • Particularly acute for the last message on a channel. • Cookie cutter attack. • Prevention of re-0rdering attacks. • Preserving the relative order of messages in each direction.
    [Show full text]
  • TAPS Working Group T. Pauly, Ed. Internet-Draft Apple Inc. Intended Status: Standards Track B
    TAPS Working Group T. Pauly, Ed. Internet-Draft Apple Inc. Intended status: Standards Track B. Trammell, Ed. Expires: 13 January 2022 Google Switzerland GmbH A. Brunstrom Karlstad University G. Fairhurst University of Aberdeen C. Perkins University of Glasgow P. Tiesel SAP SE C.A. Wood Cloudflare 12 July 2021 An Architecture for Transport Services draft-ietf-taps-arch-11 Abstract This document describes an architecture for exposing transport protocol features to applications for network communication, the Transport Services architecture. The Transport Services Application Programming Interface (API) is based on an asynchronous, event-driven interaction pattern. It uses messages for representing data transfer to applications, and it describes how implementations can use multiple IP addresses, multiple protocols, and multiple paths, and provide multiple application streams. This document further defines common terminology and concepts to be used in definitions of Transport Services APIs and implementations. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." Pauly, et al. Expires 13 January 2022 [Page 1] Internet-Draft TAPS Architecture July 2021 This Internet-Draft will expire on 13 January 2022.
    [Show full text]
  • The Case for Ubiquitous Transport-Level Encryption
    The case for ubiquitous transport-level encryption Andrea Bittau Michael Hamburg Mark Handley David Mazieres` Dan Boneh Stanford Stanford UCL Stanford Stanford Abstract • Encryption (and key bootstrap) are too expensive to perform for all but critical traffic. Today, Internet traffic is encrypted only when deemed necessary. Yet modern CPUs could feasibly encrypt most • The standard protocol solutions are a poor match for traffic. Moreover, the cost of doing so will only drop the problem. over time. Tcpcrypt is a TCP extension designed to make We believe that each of these points either is not true, end-to-end encryption of TCP traffic the default, not the or can be directly addressed with well-established tech- exception. To facilitate adoption tcpcrypt provides back- niques. For instance, where users actually have con- wards compatibility with legacy TCP stacks and middle- trol, they demonstrate that they do care about encryp- boxes. Because it is implemented in the transport layer, tion. Four years ago only around half of WiFi basesta- it protects legacy applications. However, it also provides tions used any form of encryption [3]. Today it is rare to a hook for integration with application-layer authentica- find an open basestation, other than ones which charge tion, largely obviating the need for applications to en- for Internet access. crypt their own network traffic and minimizing the need It is clear, though, that application writers have lit- for duplication of functionality. Finally, tcpcrypt mini- tle motivation: encryption rarely makes a difference to mizes the cost of key negotiation on servers; a server us- whether an application succeeds.
    [Show full text]
  • Network Management of Encrypted Traffic Version 1.0 28 February 2015
    GSM Association Non-confidential Official Document WWG.04 - Network Management of Encrypted Traffic Network Management of Encrypted Traffic Version 1.0 28 February 2015 This is a Position Paper of the GSMA Security Classification: Non-confidential Access to and distribution of this document is restricted to the persons permitted by the security classification. This document is confidential to the Association and is subject to copyright protection. This document is to be used only for the purposes for which it has been supplied and information contained in it must not be disclosed or in any other way made available, in whole or in part, to persons other than those permitted under the security classification without the prior written approval of the Association. Copyright Notice Copyright © 2015 GSM Association Disclaimer The GSM Association (“Association”) makes no representation, warranty or undertaking (express or implied) with respect to and does not accept any responsibility for, and hereby disclaims liability for the accuracy or completeness or timeliness of the information contained in this document. The information contained in this document may be subject to change without prior notice. Antitrust Notice The information contain herein is in full compliance with the GSM Association’s antitrust compliance policy. V1.0 Page 1 of 32 GSM Association Non-confidential Official Document WWG.04 - Network Management of Encrypted Traffic Table of Contents Introduction 4 1.1 Overview 4 1.2 Scope 4 1.3 Abbreviations and Definition of Terms 4
    [Show full text]
  • Securing Multipath TCP: Design & Implementation
    Securing MultiPath TCP: Design & Implementation Mathieu Jadin∗, Gautier Tihon, Olivier Pereira∗ and Olivier Bonaventure∗ ∗ICTEAM, Universite´ Catholique de Louvain, Louvain-la-Neuve, Belgium Email: [email protected] Abstract—MultiPath TCP (MPTCP) is a recent TCP extension [8, 9]. However, they assume that a secret is shared between that enables hosts to send data over multiple paths for a single the communicating hosts, which limits their applicability to connection. It is already deployed for various use cases, notably very specific use cases like the protection of BGP sessions. An- on smartphones. In parallel with this, there is a growing de- ployment of encryption and authentication techniques to counter other approach is tcpcrypt [10]. This recent TCP extension various forms of security attacks. Tcpcrypt and TLS are some adds opportunistic authentication and encryption to TCP. In of these security solutions. contrast with application layer solutions such as TLS, it does In this paper, we propose MPTCPsec, a MultiPath TCP not use certificates to authenticate the server, but enables the extension that closely integrates authentication and encryption client and the server to securely negotiate keys. This prevents inside the protocol itself. Our design relies on an adaptation for the multipath environment of the ENO option that is being attacks such as pervasive monitoring [4] but does not address discussed within the IETF tcpinc working group. We then detail man-in-the-middle attacks. The IETF tcpinc working group how MultiPath TCP needs to be modified to authenticate and is currently defining a TCP extension heavily inspired by encrypt all data and authenticate the different TCP options that tcpcrypt [10].
    [Show full text]
  • A Framework to Classify Heterogeneous Internet Traffic With
    A framework to classify heterogeneous Internet traffic with Machine Learning and Deep Learning techniques for satellite communications Fannia Pacheco, Ernesto Expósito, Mathieu Gineste To cite this version: Fannia Pacheco, Ernesto Expósito, Mathieu Gineste. A framework to classify heterogeneous Internet traffic with Machine Learning and Deep Learning techniques for satellite communications. Computer Networks, Elsevier, 2020, 173, pp.107213. 10.1016/j.comnet.2020.107213. hal-02615107 HAL Id: hal-02615107 https://hal.archives-ouvertes.fr/hal-02615107 Submitted on 22 May 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A framework to classify heterogeneous Internet traffic with Machine Learning and Deep Learning techniques for Satellite Communications Fannia Pachecoa, Ernesto Expositoa, Mathieu Ginesteb ff.pacheco,[email protected], [email protected] aUniv Pau & Pays Adour, E2S UPPA, LIUPPA, EA3000, Anglet, 64600, France bD´epartement: Business Line Telecommunication, R&D department, Thales Alenia Space, TOULOUSE, 31100, France. Abstract Nowadays, the Internet network system serves as a platform for communication, transaction, and entertainment, among others. This communication system is characterized by terrestrial and Satellite components that interact be- tween themselves to provide transmission paths of information between endpoints.
    [Show full text]
  • Cisco Catalyst Industrial Ethernet 3X00 Rugged Series
    Cisco Catalyst Industrial Ethernet 3x00 Rugged Series (IE3200, IE3300, IE3400, IE340H) Switches running IOS-XE 17.3 Common Criteria Operational User Guidance and Preparative Procedures Version 1.0 27 May 2021 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA © 2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Cisco Catalyst Industrial Ethernet 3x00 Rugged Series (IE3200, IE3300, IE3400, IE3400H) Switches running IOS-XE 17.3 Common Criteria Operational User Guidance and Preparative Procedures Table of Contents 1. Introduction 10 1.1 Audience 10 1.2 Purpose 10 1.3 Document References 11 1.4 Supported Hardware and Software 14 1.4.1 Supported Configurations 14 1.5 Operational Environment 16 1.6 Excluded Functionality 17 2. Secure Acceptance of the TOE 18 3. Secure Installation and Configuration 21 3.1 Physical Installation 22 3.2 Initial Setup via Direct Console Connection 23 3.2.1 Options to be chosen during the initial setup of the Catalyst IE3K Rugged Series Switches 23 3.2.2 Saving Configuration 24 3.2.3 Secure Remote Management 25 3.2.4 FIPS Mode 25 3.2.5 Administration of Cryptographic Self-Tests 26 3.2.6 Administration of Non-Cryptographic Self-Tests 29 3.2.7 Access Control and Lockout 29 3.2.8 Session Termination 31 Page 2 of 109 Cisco Catalyst Industrial Ethernet 3x00 Rugged Series (IE3200, IE3300, IE3400, IE3400H) Switches running IOS-XE 17.3 Common Criteria Operational User Guidance and Preparative Procedures 3.2.9 User Lockout 32 3.3 Network Protocols and Cryptographic Settings 33 3.3.1 Remote Administration Protocols 33 3.3.2 Routing Protocols 36 3.3.3 X.509 Certificates 37 3.3.4 IPsec Overview 44 3.3.5 Configuration of IPsec 46 3.3.6 Session Protection 55 3.4 Logging Configuration 58 3.4.1 Usage of Embedded Event Manager 61 3.4.2 Remote Logging 61 3.4.3 Logging Protection 62 4.
    [Show full text]
  • Simple Opportunistic Encryption
    Simple Opportunistic Encryption Andrea Bittau Michael Hamburg Mark Handley David Mazieres` Dan Boneh January 15, 2014 Abstract Network traffic encryption is becoming a requirement, not an option. Enabling encryption will be a communal effort so a solution that gives partial benefits un- til fully deployed is needed. A solution that requires little changes to existing infrastructure will also help as it can be quickly deployed to give immediate short- term benefits. We argue that tcpcrypt, a TCP option for opportunistic encryption is the path of least-resistance for a solution against large-scale traffic encryption. Tcpcrypt requires no changes to applications, is compatible with existing networks (works with NATs), and just works by default. It is high performance, so it can be deployed on servers without much concern. tcpcrypt attempts to maximize secu- rity for any given setting. By default, it will protect against passive eavesdropping, and also allows detecting large scale interception. With authentication, tcpcrypt can provide full security against active attackers and so it is a complete solution both for the short-term and long-term. 1 Introduction Cases of large-scale network interception are being uncovered [4] making the public concerned about data privacy. Unfortunately the Internet is clear-text by default (TCP) and only special traffic is encrypted (e.g., with TLS [7]). This is due for reversal, and all traffic will be encrypted by default in future. The first question in finding a solution is: what is the minimum change we need today to enable network encryption? Tackling the problem at the network layer, we could enable IPSec [6] globally, but that comes at the cost of incompatibilities with NATs.
    [Show full text]
  • Security Evaluation of Multipath
    EXAMENSARBETE INOM TEKNIKOMRÅDET INFORMATIONSTEKNIK OCH HUVUDOMRÅDET INFORMATIONS- OCH KOMMUNIKATIONSTEKNIK, AVANCERAD NIVÅ, 30 HP STOCKHOLM, SVERIGE 2016 Security Evaluation of Multipath TCP Analyzing and fixing Multipath TCP vulnerabilities, contributing to the Linux Kernel implementation of the new version of the protocol FABRIZIO DEMARIA KTH SKOLAN FÖR INFORMATIONS- OCH KOMMUNIKATIONSTEKNIK KTH ROYAL INSTITUTE OF TECHNOLOGY Master of Science in Computer Engineering Master's Degree Thesis Security Evaluation of Multipath TCP Analyzing and fixing Multipath TCP vulnerabilities, contributing to the Linux Kernel implementation of the new version of the protocol Supervisor prof. Peter Sj¨odin Candidate Fabrizio Demaria Company tutors Intel Corporation Henrik Svensson Joakim Nordell Shujuan Chen March 2016 Summary Multipath TCP is a major extension for TCP that aims at unlocking multipath benefits in the network by splitting data transferring across multiple subflows, keeping into consideration funda- mental compatibility goals in order to achieve a seamless deployment of the new protocol on current systems and infrastructures. This thesis work is an extensive security evaluation of Multipath TCP, with an in-depth analysis of its major vulnerabilities: in particular, the ADD ADDR vulnerability affecting Multipath TCP version 0 is addressed in this document. After a preliminary partthat involves testing and studying the vulnerability itself, the core value of this thesis work concerns the development of a series of patches for the Linux Kernel implementation of Multipath TCP aimed at fixing the ADD ADDR vulnerability and marking the first step towards the new version of the protocol, Multipath TCP version 1. The paper contains an experimental evaluation of the various steps of the development phase, including a final performance analysis for the modified implemen- tation of Multipath TCP.
    [Show full text]