SlideShare a Scribd company logo
1 of 37
DHCP authentication using
certificates
Plan
• Introduction
• DHCP
• Basic operations
• Importance
• Security
• E-DHCP
• Overview
• Successful exchange scenario
• Service Access scenario
• Advantages
• Conclusion and Future work
2
Introduction
Introduction (1/2)
• Dynamic IP attribution protocol is necessary for 2 reasons:
• The Lack of internet addresses
• The mobility of the equipment is adapted to dynamic addressing
• DHCP (Dynamic Host Configuration Protocol) provides a framework
for passing configuration information to hosts on a TCP/IP network.
4
Introduction (2/2)
• DHCP currently provides no authentication or security mechanisms
• Many security vulnerabilities and shortcomings
• Many contributions exists
• E-DHCP
5
DHCP
Dynamic host configuration protocol
DHCP Basic Operations (1/2)
• Automate and manage the network configuration of network devices
that use TCP/IP protocol.
• Use Client-Server model
• Set on UDP
• Client initiates all interactions, and server replies
7
DHCP Basic Operations (2/2)
• Client Broadcasts DHCPDiscover message
• Servers may returns DHCPOffer messages
• Client chooses one DHCPOffer and broadcasts a DHCPRequest
message
• Server Return DHCPAck or DHCPNAck message
• Client can decline or release address
8
DHCP Importance
• No manual reconfiguration is required
• Reduced amount of work required for large network administration
• Administration can be done from a single point
9
DHCP Shortcomings
• Lack of robust administrative source
• Lack of intelligence
• Limited Security
10
DHCP Vulnerabilities
• No authentication
• Intureders can impersonate the identity of a client or DHCP server
• Unknown hosts can get an IP addresses
11
Existing Contributions
• Authentication via Kerberos
• Token Authentication
• Delayed authentication (symmetric key authentication)
12
E-DHCP
Extended-Dynamic host configuration protocol
Overview
• Stronger authentication process
• Authentication of entities and messages
• Access control authentication
• Based mainly on certificate concept
14
E-DHCP principals
• “E-DHCP authentication” option
• Attribute Authority server functionalities attribution
15
E-DHCP requirements
• Client and Server must have a valid X.509 identity certificate delivered
by a trusted CA
16
E-DHCP architecture (1/2)
• E-DHCP Client
• E-DCHP Server
• Attribute Certificates Database
• Identity Certificate Database
17
E-DHCP architecture (2/2)
18
E-DHCP authentication Option
Code Length Flag URIIdentityCertificate URIAttributeCertificate
AuthenticationInformation
19
E-DHCP Scenario (1/9)
• The client broadcast a DHCPDiscover
message on its local physical subnet.
• This message must include options such as:
• Network address and lease time suggestion
• E-DHCP authentication option
20
Code Length Flag
URIIdentityCertificate =
www.MyWeb.com/Db/Certificate1
URIAttributeCertificate = 0
AuthenticationInformation = Signature value (Flag = 0) Or Sig encryption value (Flag= 1)
Client Server
Time
E-DHCP Scenario (2/9)
• To validate the Client authentication, the E-DHCP server:
• Extract the client X.509 IC from the URIIdentityCertificate field
• Extract the client public key from the X.509 IC
• Verify the value of Flag field
• If Flag = 0 , the server use the client public key to verify the validity of the
signature (contained in AuthenticationInformation)
• IF Flag =1, the server use its private key to decrypt the signature, then use the
client public key to verify its validity
21
E-DHCP Scenario (3/9)
• The server may choose to accept
unauthorized DHCPDiscover message or not
• The Server responds with a DHCPOffer
message including E-DHCP authentication
option
22
Code Length Flag
URIIdentityCertificate =
www.EWeb.com/Db/Certificate2
URIAttributeCertificate = 0
AuthenticationInformation = Signature value (Flag = 0) Or Sig encryption value (Flag= 1)
Client Server
Time
E-DHCP Scenario (4/9)
• To validate the Server authentication, the Client:
• Extract the server X.509 IC from the URIIdentityCertificate field
• Extract the server public key from the X.509 IC
• Verify the value of Flag field
• If Flag = 0 , the client use the server public key to verify the validity of the
signature (contained in AuthenticationInformation)
• IF Flag =1, the client use its private key to decrypt the signature, then use the
server public key to verify its validity
23
E-DHCP Scenario (5/9)
• If authentication is not valid or the offer is
not acceptable, the client can discard it
• Else a DHCPRequest is sent to the server:
• Requesting offered parameters
• Confirming the correctness of previously
allocated address
• Extending the lease time
24
Client Server
Time
E-DHCP Scenario (6/9)
• Same procedure followed in DHCPDiscover
message is used to specify E-DHCP
Authentication option
• URIAttributeCertificate field may contains a
value
25
Code Length Flag
URIIdentityCertificate =
www.EWeb.com/Db/Certificate2
URIAttributeCertificate = 0
AuthenticationInformation = Signature value (Flag = 0) Or Sig encryption value (Flag= 1)
Client Server
Time
E-DHCP Scenario (7/9)
• The E-DHCP server validate the authentication of the client &
DHCPRequest message
• If the validation failed or the server can’t satisfy the client request, a
DHCPNAck message is sent
• Else, the server verifies URIAttributeCertificate field value;
• If value = 0 , server create an AC for the client and save it in AC database
• Else, the server extract the certificate and checks its validity, to renew it or
create a new one.
26
E-DHCP Scenario (8/9)
• The E-DHCP server sends a DHCPAck
message to the client (including a E-DHCP
authentication option)
• The URIAttributeCertificate field contains the
client new (or renewed) AC
27
Code Length Flag
URIIdentityCertificate =
www.EWeb.com/Db/Certificate2
URIAttributeCertificate =
www.EWeb.com/DB/ClCertificate
1
AuthenticationInformation = Signature value (Flag = 0) Or Sig encryption value (Flag= 1)
Client Server
Time
E-DHCP Scenario (9/9)
• The client receive the DHCPAck message and validate the
authentication of the server and the message
• If validated, The client extract configuration information from the
message and use them
• The client uses its attribute certificate
28
E-DHCP Access Scenario (1/3)
• The client uses the IP address allocated by the E-DHCP server to a
connection with Access Control Server
• The Client and Access Control Server uses SSL client authentication
and SSL Server authentication
• Client and Server identity are confirmed
29
E-DHCP Access Scenario (2/3)
• The Access Control Server verifies
• The Idenityt Certificate
• Attribute Certificate
• Validity of the link between X.509 IC and the AC
• Validity of the link between Client IP and the Client Identity
• If verification is successful, the ACS allows the client to be connected
to the authorized device
30
E-DHCP Access Scenario (3/3)
31
E-DHCP Advantages (1/2)
• Avoids changing DHCP protocol
• Provides authentication of entities and messages
• Uses RSA (better security then symmetric)
• Strict control on equipment
32
E-DHCP Advantages (2/2)
• Invulnerable to DOS
• Invulnerable to message interception
• Supports inter-domain authentication
• AC confirms client IP address ownership
33
Conclusion and Future work
Conclusion (1/2)
• E-DHCP is an extension to DHCP
• Uses asymmetric keys encryption + X.509 IC + AC
• Authenticate DHCP messages
• Authenticate access control
35
Conclusion (2/2)
• DHCP open source code base modification
• Attachment the DHCP server to an Attribute authority
36
Future Work
• Validate the interoperability of our proposition with IPSec through
real scale developments and tests
37

More Related Content

Similar to Dhcp authentication using certificates

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9Waqas Ahmed Nawaz
 
VM Console Enhancements
VM Console EnhancementsVM Console Enhancements
VM Console EnhancementsShapeBlue
 
Kerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: SharePointaloozaKerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: SharePointaloozaJ.D. Wade
 
Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: Columbus 2015Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: Columbus 2015J.D. Wade
 
SSL Secure Socket Layer
SSL Secure Socket LayerSSL Secure Socket Layer
SSL Secure Socket Layeromkar bhagat
 
Cryptzone: The Software-Defined Perimeter
Cryptzone: The Software-Defined PerimeterCryptzone: The Software-Defined Perimeter
Cryptzone: The Software-Defined PerimeterCryptzone
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone
 
Cryptography by Afroz haider mir
Cryptography by Afroz haider mirCryptography by Afroz haider mir
Cryptography by Afroz haider mirAFROZ MIR
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
SPS Ozarks 2012: Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival GuideSPS Ozarks 2012: Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival GuideJ.D. Wade
 
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015J.D. Wade
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...DATA SECURITY SOLUTIONS
 
Kerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide - St. Louis Day of .NetKerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide - St. Louis Day of .NetJ.D. Wade
 
SharePoint Saturday Kansas City - Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival GuideSharePoint Saturday Kansas City - Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival GuideJ.D. Wade
 
Subscriber provisioning BWIF conference presentation
Subscriber provisioning   BWIF conference presentationSubscriber provisioning   BWIF conference presentation
Subscriber provisioning BWIF conference presentationSanjay Dhar
 
SecureSocketLayer.ppt
SecureSocketLayer.pptSecureSocketLayer.ppt
SecureSocketLayer.pptPranavUndre1
 

Similar to Dhcp authentication using certificates (20)

CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
1165839977.pptx
1165839977.pptx1165839977.pptx
1165839977.pptx
 
VM Console Enhancements
VM Console EnhancementsVM Console Enhancements
VM Console Enhancements
 
Kerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: SharePointaloozaKerberos Survival Guide: SharePointalooza
Kerberos Survival Guide: SharePointalooza
 
Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: Columbus 2015Kerberos Survival Guide: Columbus 2015
Kerberos Survival Guide: Columbus 2015
 
Remote Console: Say goodbye to RDP
Remote Console: Say goodbye to RDPRemote Console: Say goodbye to RDP
Remote Console: Say goodbye to RDP
 
SSL Secure Socket Layer
SSL Secure Socket LayerSSL Secure Socket Layer
SSL Secure Socket Layer
 
Cryptzone: The Software-Defined Perimeter
Cryptzone: The Software-Defined PerimeterCryptzone: The Software-Defined Perimeter
Cryptzone: The Software-Defined Perimeter
 
Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?Cryptzone: What is a Software-Defined Perimeter?
Cryptzone: What is a Software-Defined Perimeter?
 
Cryptography by Afroz haider mir
Cryptography by Afroz haider mirCryptography by Afroz haider mir
Cryptography by Afroz haider mir
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
SPS Ozarks 2012: Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival GuideSPS Ozarks 2012: Kerberos Survival Guide
SPS Ozarks 2012: Kerberos Survival Guide
 
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015Kerberos Survival Guide: SharePoint Saturday Nashville 2015
Kerberos Survival Guide: SharePoint Saturday Nashville 2015
 
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...The Future of PKI. Using automation tools and protocols to bootstrap trust in...
The Future of PKI. Using automation tools and protocols to bootstrap trust in...
 
Kerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide - St. Louis Day of .NetKerberos Survival Guide - St. Louis Day of .Net
Kerberos Survival Guide - St. Louis Day of .Net
 
SharePoint Saturday Kansas City - Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival GuideSharePoint Saturday Kansas City - Kerberos Survival Guide
SharePoint Saturday Kansas City - Kerberos Survival Guide
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
Subscriber provisioning BWIF conference presentation
Subscriber provisioning   BWIF conference presentationSubscriber provisioning   BWIF conference presentation
Subscriber provisioning BWIF conference presentation
 
Dhcp edu
Dhcp eduDhcp edu
Dhcp edu
 
SecureSocketLayer.ppt
SecureSocketLayer.pptSecureSocketLayer.ppt
SecureSocketLayer.ppt
 

More from Hadi Fadlallah

RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn :  A Scalable and Efficient Platform for Engineering Radiation DataRaDEn :  A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn : A Scalable and Efficient Platform for Engineering Radiation DataHadi Fadlallah
 
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...Hadi Fadlallah
 
What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?Hadi Fadlallah
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data EngineeringHadi Fadlallah
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligenceHadi Fadlallah
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a serviceHadi Fadlallah
 
Risk management and IT technologies
Risk management and IT technologiesRisk management and IT technologies
Risk management and IT technologiesHadi Fadlallah
 
Cloud computing pricing models
Cloud computing pricing modelsCloud computing pricing models
Cloud computing pricing modelsHadi Fadlallah
 
Secure Aware Routing Protocol
Secure Aware Routing ProtocolSecure Aware Routing Protocol
Secure Aware Routing ProtocolHadi Fadlallah
 
Penetration testing in wireless network
Penetration testing in wireless networkPenetration testing in wireless network
Penetration testing in wireless networkHadi Fadlallah
 
Introduction to Data mining
Introduction to Data miningIntroduction to Data mining
Introduction to Data miningHadi Fadlallah
 
Sql parametrized queries
Sql parametrized queriesSql parametrized queries
Sql parametrized queriesHadi Fadlallah
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testingHadi Fadlallah
 
Enhancing the performance of kmeans algorithm
Enhancing the performance of kmeans algorithmEnhancing the performance of kmeans algorithm
Enhancing the performance of kmeans algorithmHadi Fadlallah
 

More from Hadi Fadlallah (20)

RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn :  A Scalable and Efficient Platform for Engineering Radiation DataRaDEn :  A Scalable and Efficient Platform for Engineering Radiation Data
RaDEn : A Scalable and Efficient Platform for Engineering Radiation Data
 
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
ORADIEX : A Big Data driven smart framework for real-time surveillance and an...
 
What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?What makes it worth becoming a Data Engineer?
What makes it worth becoming a Data Engineer?
 
Introduction to Data Engineering
Introduction to Data EngineeringIntroduction to Data Engineering
Introduction to Data Engineering
 
An introduction to Business intelligence
An introduction to Business intelligenceAn introduction to Business intelligence
An introduction to Business intelligence
 
Big data lab as a service
Big data lab as a serviceBig data lab as a service
Big data lab as a service
 
Risk management and IT technologies
Risk management and IT technologiesRisk management and IT technologies
Risk management and IT technologies
 
Fog computing
Fog computingFog computing
Fog computing
 
Inertial sensors
Inertial sensors Inertial sensors
Inertial sensors
 
Big Data Integration
Big Data IntegrationBig Data Integration
Big Data Integration
 
Cloud computing pricing models
Cloud computing pricing modelsCloud computing pricing models
Cloud computing pricing models
 
Marketing Mobile
Marketing MobileMarketing Mobile
Marketing Mobile
 
Secure Aware Routing Protocol
Secure Aware Routing ProtocolSecure Aware Routing Protocol
Secure Aware Routing Protocol
 
Bhopal disaster
Bhopal disasterBhopal disaster
Bhopal disaster
 
Penetration testing in wireless network
Penetration testing in wireless networkPenetration testing in wireless network
Penetration testing in wireless network
 
Cyber propaganda
Cyber propagandaCyber propaganda
Cyber propaganda
 
Introduction to Data mining
Introduction to Data miningIntroduction to Data mining
Introduction to Data mining
 
Sql parametrized queries
Sql parametrized queriesSql parametrized queries
Sql parametrized queries
 
Introduction to software testing
Introduction to software testingIntroduction to software testing
Introduction to software testing
 
Enhancing the performance of kmeans algorithm
Enhancing the performance of kmeans algorithmEnhancing the performance of kmeans algorithm
Enhancing the performance of kmeans algorithm
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Dhcp authentication using certificates

  • 2. Plan • Introduction • DHCP • Basic operations • Importance • Security • E-DHCP • Overview • Successful exchange scenario • Service Access scenario • Advantages • Conclusion and Future work 2
  • 4. Introduction (1/2) • Dynamic IP attribution protocol is necessary for 2 reasons: • The Lack of internet addresses • The mobility of the equipment is adapted to dynamic addressing • DHCP (Dynamic Host Configuration Protocol) provides a framework for passing configuration information to hosts on a TCP/IP network. 4
  • 5. Introduction (2/2) • DHCP currently provides no authentication or security mechanisms • Many security vulnerabilities and shortcomings • Many contributions exists • E-DHCP 5
  • 7. DHCP Basic Operations (1/2) • Automate and manage the network configuration of network devices that use TCP/IP protocol. • Use Client-Server model • Set on UDP • Client initiates all interactions, and server replies 7
  • 8. DHCP Basic Operations (2/2) • Client Broadcasts DHCPDiscover message • Servers may returns DHCPOffer messages • Client chooses one DHCPOffer and broadcasts a DHCPRequest message • Server Return DHCPAck or DHCPNAck message • Client can decline or release address 8
  • 9. DHCP Importance • No manual reconfiguration is required • Reduced amount of work required for large network administration • Administration can be done from a single point 9
  • 10. DHCP Shortcomings • Lack of robust administrative source • Lack of intelligence • Limited Security 10
  • 11. DHCP Vulnerabilities • No authentication • Intureders can impersonate the identity of a client or DHCP server • Unknown hosts can get an IP addresses 11
  • 12. Existing Contributions • Authentication via Kerberos • Token Authentication • Delayed authentication (symmetric key authentication) 12
  • 14. Overview • Stronger authentication process • Authentication of entities and messages • Access control authentication • Based mainly on certificate concept 14
  • 15. E-DHCP principals • “E-DHCP authentication” option • Attribute Authority server functionalities attribution 15
  • 16. E-DHCP requirements • Client and Server must have a valid X.509 identity certificate delivered by a trusted CA 16
  • 17. E-DHCP architecture (1/2) • E-DHCP Client • E-DCHP Server • Attribute Certificates Database • Identity Certificate Database 17
  • 19. E-DHCP authentication Option Code Length Flag URIIdentityCertificate URIAttributeCertificate AuthenticationInformation 19
  • 20. E-DHCP Scenario (1/9) • The client broadcast a DHCPDiscover message on its local physical subnet. • This message must include options such as: • Network address and lease time suggestion • E-DHCP authentication option 20 Code Length Flag URIIdentityCertificate = www.MyWeb.com/Db/Certificate1 URIAttributeCertificate = 0 AuthenticationInformation = Signature value (Flag = 0) Or Sig encryption value (Flag= 1) Client Server Time
  • 21. E-DHCP Scenario (2/9) • To validate the Client authentication, the E-DHCP server: • Extract the client X.509 IC from the URIIdentityCertificate field • Extract the client public key from the X.509 IC • Verify the value of Flag field • If Flag = 0 , the server use the client public key to verify the validity of the signature (contained in AuthenticationInformation) • IF Flag =1, the server use its private key to decrypt the signature, then use the client public key to verify its validity 21
  • 22. E-DHCP Scenario (3/9) • The server may choose to accept unauthorized DHCPDiscover message or not • The Server responds with a DHCPOffer message including E-DHCP authentication option 22 Code Length Flag URIIdentityCertificate = www.EWeb.com/Db/Certificate2 URIAttributeCertificate = 0 AuthenticationInformation = Signature value (Flag = 0) Or Sig encryption value (Flag= 1) Client Server Time
  • 23. E-DHCP Scenario (4/9) • To validate the Server authentication, the Client: • Extract the server X.509 IC from the URIIdentityCertificate field • Extract the server public key from the X.509 IC • Verify the value of Flag field • If Flag = 0 , the client use the server public key to verify the validity of the signature (contained in AuthenticationInformation) • IF Flag =1, the client use its private key to decrypt the signature, then use the server public key to verify its validity 23
  • 24. E-DHCP Scenario (5/9) • If authentication is not valid or the offer is not acceptable, the client can discard it • Else a DHCPRequest is sent to the server: • Requesting offered parameters • Confirming the correctness of previously allocated address • Extending the lease time 24 Client Server Time
  • 25. E-DHCP Scenario (6/9) • Same procedure followed in DHCPDiscover message is used to specify E-DHCP Authentication option • URIAttributeCertificate field may contains a value 25 Code Length Flag URIIdentityCertificate = www.EWeb.com/Db/Certificate2 URIAttributeCertificate = 0 AuthenticationInformation = Signature value (Flag = 0) Or Sig encryption value (Flag= 1) Client Server Time
  • 26. E-DHCP Scenario (7/9) • The E-DHCP server validate the authentication of the client & DHCPRequest message • If the validation failed or the server can’t satisfy the client request, a DHCPNAck message is sent • Else, the server verifies URIAttributeCertificate field value; • If value = 0 , server create an AC for the client and save it in AC database • Else, the server extract the certificate and checks its validity, to renew it or create a new one. 26
  • 27. E-DHCP Scenario (8/9) • The E-DHCP server sends a DHCPAck message to the client (including a E-DHCP authentication option) • The URIAttributeCertificate field contains the client new (or renewed) AC 27 Code Length Flag URIIdentityCertificate = www.EWeb.com/Db/Certificate2 URIAttributeCertificate = www.EWeb.com/DB/ClCertificate 1 AuthenticationInformation = Signature value (Flag = 0) Or Sig encryption value (Flag= 1) Client Server Time
  • 28. E-DHCP Scenario (9/9) • The client receive the DHCPAck message and validate the authentication of the server and the message • If validated, The client extract configuration information from the message and use them • The client uses its attribute certificate 28
  • 29. E-DHCP Access Scenario (1/3) • The client uses the IP address allocated by the E-DHCP server to a connection with Access Control Server • The Client and Access Control Server uses SSL client authentication and SSL Server authentication • Client and Server identity are confirmed 29
  • 30. E-DHCP Access Scenario (2/3) • The Access Control Server verifies • The Idenityt Certificate • Attribute Certificate • Validity of the link between X.509 IC and the AC • Validity of the link between Client IP and the Client Identity • If verification is successful, the ACS allows the client to be connected to the authorized device 30
  • 32. E-DHCP Advantages (1/2) • Avoids changing DHCP protocol • Provides authentication of entities and messages • Uses RSA (better security then symmetric) • Strict control on equipment 32
  • 33. E-DHCP Advantages (2/2) • Invulnerable to DOS • Invulnerable to message interception • Supports inter-domain authentication • AC confirms client IP address ownership 33
  • 35. Conclusion (1/2) • E-DHCP is an extension to DHCP • Uses asymmetric keys encryption + X.509 IC + AC • Authenticate DHCP messages • Authenticate access control 35
  • 36. Conclusion (2/2) • DHCP open source code base modification • Attachment the DHCP server to an Attribute authority 36
  • 37. Future Work • Validate the interoperability of our proposition with IPSec through real scale developments and tests 37