Usable Security Management with Host Identity Protocol

Usable Security Management with Host Identity Protocol

Usable Security Management with Host Identity Protocol Kristiina Karvonen Miika Komu Andrei Gurtov Helsinki Institute for Information Technology [email protected] ABSTRACT the HI is a long-term identifier. A client host obtains the Host Identity Protocol (HIP) proposes a change to the HI of a server typically from the DNS. However, the Internet architecture by introducing cryptographically- infrastructure may not support this in certain scenarios, secured names, called Host Identities (HIs), for hosts. such as in peer-to-peer and ad-hoc environments. In such Applications use HIs instead of IP addresses in transport cases, opportunistic HIP can be used for contacting a peer layer connections, which allows applications to tolerate host- without prior information of the peer's identity. based mobility better. HIP provides IPsec-based, lower- Opportunistic HIP is based on a “leap-of-faith”, which layer security, but the problem is that this type of security is means that it is prone to man-in-the-middle attacks for the invisible for most applications and users. Our main contribution is the implementation and user evaluation of initial connection. It is similar to SSH, where the client several security indicators which inform the user when HIP caches the public key of the server after the first and IPsec are securing the connections of the user. We successful connection. experimented with application and system level security There are many challenges in making HIP understandable indicators at the client-side, as well as with server-side indicators. In this paper, we present implementation to the end users. As an example, users have developed an experience on integrating the identity management automatic response to press “OK” to SSH software Graphical User Interface (GUI) to HIP and results of prompts (meant to verify and accept the key) without usability tests with actual users. consulting the prompts properly, if at all [3]. This is due to many prompts being uninformative to most users that I. INTRODUCTION do not increase the user's security awareness even when read [11]. As we implemented a prompting mechanism A host and its location are identified using Internet for HIP-related connections using our publicly available Protocol (IP) addresses in the current Internet HIP Firefox2 add-on (available also as a firefox3 architecture. However, IP addresses can serve only as extension), we witnessed the same phenomenon. short-term identifiers as a considerable amount of hosts are portable devices and they change their IP addresses Most Internet applications can run unmodified over HIP when moved from one network to another. Short-term [16], although only HIP-aware (new) applications identifiers disrupt long-term transport layer connections, utilizing the extended socket interface [20] can take better such as Internet phone calls, and make locating the peer advantage of the new features provided by HIP. As HIP host more difficult. Impersonation attacks are possible secures application data traffic with IPsec that is located because IP addresses are relatively easy to forge. logically "deep" within the networking stack, the The Host Identity Protocol (HIP) architecture [26, 23] challenge is to provide proper and understandable leverages a so-called identity/locator split to address these security indicators to the user to convince her that the challenges in an integrated approach. It separates the connection, e.g., to a banking web site, is secured. Such identity of a host from its location as illustrated in Figure indicators can be developed as extensions to applications 1. The identity is called the Host Identity (HI) and it is (e.g., a security add-on to Firefox browser) or within a used as a long-term identifier on the upper layers of the host-wide HIP management utility that controls all network stack. The location of host is bound to IP applications. addresses and used for routing packets to the host in the When designing the security indicators, it is important to same way as in the current Internet architecture. decide how and when to apply users’ existing security The HI namespace consists of Host Identifiers, each of habits, and when to break them. For HTTPS, a browser which consists of the public key component of a private- typically illustrates the access to a secure site by a public key pair. Each host is responsible for creating one padlock icon or by changing the color of the address bar. or more public/private key pairs to provide identities for However, recent research has shown that these indicators itself. As the HIs are based on public-key cryptography, might be ineffective as they go unnoticed by most users they are computationally difficult to forge. HIs are [31]. We experimented with the usability of the security location-independent identifiers which allow a mobile indicators with volunteers, who accessed and judged host to preserve its transport layer connections upon security of web pages. Our first implementation prototype changes in the network. On the other hand, the HI can be and GUI (Fig.2) was targeted to and usability tested with used for looking up the current location of a host because technical users who are assumed to be the first adopters 978-1-4244-3806-8/09/$25.00 © 2009 IEEE 279 of HIP. Usability needs to be double-checked in later applications. Before two network applications can phases of the development with non-technical users [2]. communicate with each other using IPsec-protected traffic, the underlying hosts authenticate each other and The rest of the paper is organized as follows. Section 2 negotiate encryption keys for IPsec using HIP [27]. gives background on HIP and usable security. Section 3 describes the implementation of our security model for B. Transport Layer Security HIP. Usability evaluations are presented in Section 4, Transport Layer Security (TLS) provides security for followed by results and usability improvements in applications at the application layer. TLS is usually Section 5. Section 6 concludes the paper with a summary supported by user-space libraries that provide an API for and plans for our future work. the application to communicate securely with a peer application. II. BACKGROUND AND RELATED WORK When TLS is applied to existing legacy applications, it In this section, we compare the security mode provided requires always rewriting both client and server by Host Identity Protocol to the familiar model of applications. In addition, it requires the allocation of a Transport Layer Security. A short overview of related new transport layer port at the server side because plain work on usability of network security completes this TCP and TLS-based TCP connections cannot use the section. same port. With HIP, no changes to the application are A. Host Identity Protocol required and the same transport layer port can be used at In HIP [26], IP addresses are used to route packets, but in the server side. This makes HIP easier to deploy even to the upper parts of the stack the addresses are replaced binary-only legacy applications for which there is no with Host Identifiers. These Host Identifiers form a new source code available. As such, HIP can be considered as Internet-wide name space for hosts. In HIP, each host is a means for extending the lifetime of legacy network directly identified with one or more public keys that each applications which require security or mobility support. corresponds to a private key possessed by the host. Each host generates one or more public/private key pairs to provide identities for itself. For backwards compatibility with networking APIs, applications use shorter representation of the HI. IPv4 applications use 32-bit Local Scope Identifiers (LSIs), and IPv6 applications use 128-bit Host Identity Tags (HITs). A HIT is constructed by calculating a digest over the public key. A HIT binds the application to the public keys used for the communications, which is referred as channel binding. The introduction of new end-point identifiers changes the role of IP addresses. When HIP is used, IP addresses Figure 1. HIP introduces a new layer to the stack become pure topological labels, naming locations in the Internet. One benefit of this identity/locator separation is Although there is some on-going effort to make UDP to that hosts in private address realms (behind NATs) can support TLS [25], currently TLS cannot be used directly name each other in a unique way with HITs [21]. A with UDP because it assumes a reliable transport second benefit is that the hosts can change their IP protocol. This is problematic especially when VoIP calls address without breaking transport layer connections of need to be protected end-to-end., Fortunately, HIP is applications and rely on HIP to manage host mobility. applicable also to UDP. HIP supports end-host mobility Thus, the relationship between location names and which is currently missing from the current TLS identifiers becomes dynamic. specification. The problem of certifying the keys in Public-Key C. Managing Security in a Usable Way Infrastructure (PKI) or otherwise creating trust relationships between hosts has explicitly been left out The success of any application in managing security from the HIP architecture, as it is expected that each depends on its usability; this is also the case with HIP. system using HIP may want to take care of it in a However, usability and security are often seen as different manner. For mere mobility and multi-homing, contradicting goals: what is usable cannot be secure and the systems can work without any explicit trust vice versa [9]. A typical example is an easy-to-remember management, in an opportunistic manner. password that tends to be trivial to break, whereas a strong password is hard to recall but security gets HIP uses IPsec as described in [6] to provide data breached when users write such passwords down or share encryption and integrity protection for network them with others [10, 29].

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us