DOC PREVIEW
MIT 6 033 - Lecture 24 Protocols and Authorization

This preview shows page 1-2-3-4 out of 13 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 13 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1Slide 2Slide 3Slide 4Slide 5How confidential is traffic in this lecture room?Example Data Inside a PacketSlide 8GMail is not encrypted by defaultFacebook is Plaintext Authentication CookiesSlide 12MIT OpenCourseWarehttp://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.6.033 Lecture 24 Protocols and Authorization Nickolai ZeldovichDenning-Sacco Protocol Charlie A, B {A:Ka}, SIGN( {A:Ka}, Kc) {B:Kb}, SIGN( {B:Kb}, Kc) Kab Alice Bob {A:Ka}, SIGN( {A:Ka}, Kc), ENC( { Kab, SIGN(Kab, Ka) }, Kb)Denning-Sacco Protocol Charlie A, B {A:Ka}, SIGN( {A:Ka}, Kc) {B:Kb}, SIGN( {B:Kb}, Kc) Kab Alice Bob Victim {A:Ka}, SIGN( {A:Ka}, Kc), {A:Ka}, SIGN( {A:Ka}, Kc), ENC( { Kab, SIGN(Kab, Ka) }, Kb) ENC( { Kab, SIGN(Kab, Ka) }, Kv)Denning-Sacco Protocol Charlie A, B {A:Ka}, SIGN( {A:Ka}, Kc) {B:Kb}, SIGN( {B:Kb}, Kc) Kab Alice Bob Victim {A:Ka}, SIGN( {A:Ka}, Kc), ENC( { Kab, SIGN( {A,B,Kab}, Ka) }, Kb) {A:Ka}, SIGN( {A:Ka}, Kc), ENC( { Kab, SIGN( {A,B,Kab}, Ka) }, Kv)Diagram of SSL handshake with two-way authentication removed due to copyright restrictions. See the Wikipedia page instead.How confidential is traffic in this lecture room? ● sudo tcpdump -s 0 -Ai en1 ● Complete trace of all packets on wireless network ● You shouldn’t do this ● 14:04:59.999646 IP HSI-KBW-091-089-230-121.hsi2.kabel-badenwuerttemberg.de.45843> dhcp-18-111-20-195.dyn.mit.edu.39211: P127234932:127234940(8) ack 4112680742win 65429 <nop,nop,timestamp 634569218015400>ML, like Gecko>) Version/3.2.1 Safari/525.27.1/png,*/*;q=0.5>Example Data Inside a Packet GET /6.033/2007/wwwdocs/ HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_6; en-us) AppleWebKit/525.27.1 (KHT Referer: http://mit.edu/6.033/2008/wwwdocs/schedule.htmlAccept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,imageAccept-Language: en-usAccept-Encoding: gzip, deflateConnection: keep-aliveHost: mit.eduML, like Gecko>) Version/3.2.1 Safari/525.27.1/png,*/*;q=0.5>Example Data Inside a Packet GET /6.033/2007/wwwdocs/ HTTP/1.1User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_6; en-us) AppleWebKit/525.27.1 (KHT Referer: http://mit.edu/6.033/2008/wwwdocs/schedule.htmlAccept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,imageAccept-Language: en-usAccept-Encoding: gzip, deflateConnection: keep-aliveHost: mit.edu HTTP/1.1 200 OK Date: Wed, 29 Apr 2009 18:56:00 GMT Server: MIT Web Server Apache/1.3.26 Mark/1.5 (Unix) mod_ssl/2.8.9 OpenSSL/0.9.7c Last-Modified: Fri, 25 May 2007 17:15:48 GMT ETag: "b884046-46a4-465719c4" Accept-Ranges: bytes Content-Length: 18084 Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <head> <title>6.033 / Spring 2007 / Welcome</title> …faulthwartrmly stored58GMail is not encrypted by de Passed in the clear: Gzipped text: •Contacts lists •Inbox entries •Calendar events •Mail messages ["112677a23fed4887",0,0,"12:58 pm","\u003cspan id\u003d\"_upro_ \"\>Richard Stallman\u003c/span\>","&nbsp;","[csail- related] T big brother--trade charlie cards. 13:45 Tuesday at 381","I have a charlie card with zero value current on on it which I used for a couple of &hellip;", [],"","112677a23fed4887",0,"Mon May 7 2007_12: PM",0,"",0,0,1] Hint: Change http:// to https://Facebook is Plaintext (as is AIM, Google Docs, iChat, etc…) {"name": ”XX XXXX","firstName": ”XX", "thumbSrc”: "XXX.jpg","status": "says a man shouldalways dress for the job hewants. So why am I dressed uplike a pirate in this restaurant?It's all because some hacker stole my identity, now I sithere every evening servingchowder and iced tea. Should've gone to FreeCreditReport.com, I could've seen this coming atme like an atom bomb. Theymonitor your credit and sendyou e-mail alerts, so you don'tend up selling fish to tourists in t-shirts.", "statusTime":1240674216, "statusTimeRel":"on Saturday","enableVC":false} Screenshot of Facebook page removed due to copyright restrictions.Authentication Cookies HTTP/1.1 200 OK Set-Cookie: C AL=XX XXXXXXXXXX;Domain=www.google.com;Path=/calendar; Expires=Tue, 19-May-2009 18:23:37 GMTCache-Control: no-cache, no-store, max-age=0, must-revalidatePragma: no-cache Screenshot of Google Calendar removed due to copyright restrictions.Authentication Cookies HTTP/1.1 200 OK Date: Mon, 04 May 2009 18:20:10 GMT ... Set-Cookie: _twitter_sess=XXXXXXXXXXXX; domain=.t wi tter.com; path=/ HTTP/1.1 200 OK Date: Mon, 04 May 2009 18:06:24 GMT ... Set-Cookie: xs=XXXXXXXXXXXX; path=/; domain=.facebook.com; HTTP/1.1 200 OK Date: Mon, 04 May 2009 18:19:19 GMT ... Set-Cookie: itsessionid=XXXXXXXXXXXX; path=/; domain=.analytics.yahoo.com etc etc


View Full Document

MIT 6 033 - Lecture 24 Protocols and Authorization

Documents in this Course
TRIPLET

TRIPLET

12 pages

End Layer

End Layer

11 pages

Quiz 1

Quiz 1

4 pages

Threads

Threads

18 pages

Quiz I

Quiz I

15 pages

Atomicity

Atomicity

10 pages

QUIZ I

QUIZ I

7 pages

Load more
Download Lecture 24 Protocols and Authorization
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture 24 Protocols and Authorization and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture 24 Protocols and Authorization 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?