40 likes | 167 Vues
Chapter 5 explores the vulnerabilities associated with conventional encryption, highlighting risks from in-house threats such as compromised workstations and routers, as well as external attacks like man-in-the-middle and DNS spoofing. It discusses various encryption points, focusing on link encryption capabilities, user authentication, and the importance of end-to-end encryption for maintaining traffic confidentiality. The chapter also addresses defensive strategies, including traffic padding and packet tunneling to obscure communication patterns, thereby protecting sensitive information from traffic analysis.
E N D
Vulnerability points • In-house • Corrupted workstation • Extra machine with sniffer • Wiring closet • Sneaky rewiring – for example to phone line • Corrupted server/router • Hacked – routed to man-in-the middle • Interception on external network • Wireless interception • Interception in external packet network • DNS attack • IP spoofing
Encryption points • Link encryption • IP and higher headers are encrypted – less traffic analysis • Requires trust in packet network • Many keys required • Host authentication only • End-to-end encryption • Link headers must be in clear • Packets show link headers • One key per user pair • User responsible and can decide not to encrypt • Can be either protocol (TCP layer) or application layer
Traffic Confidentiality • Defends against traffic analysis • Partner identity • How much communication • Message characteristics – length, response patterns • Relation with external events • Defenses • Link encryption hides users’ headers • Traffic padding (send useless random patterns) – used for end-to-end • Packet tunneling (real thing hidden within innocent-looking packet)