Spring 2008 – 22c:169 Computer Security Fall 2010 – CS 686 Security and Privacy Assignment 4 due by Thursday, May 8 Assignment 3 - due by 11:59pm on Wednesday, Nov 24. Problem 1: 1: IPSec, IPSec, which which mode? Problem mode? (25 (25 points) points) 1. 1. IPSec IPSec has has two two modes, modes, Transport Transport and and Tunnel. Tunnel. For For each attack below, answer which mode(s) can defend against this attack, if any mode(s) can, each attack below, answer which mode(s) can defend against this attack, if any mode(s) can, or or none none ofof the above above if if not. not. Explain Explain your your answer, the answer, including including where where IPSec IPSec needs needs to to be be installed installed among among sender, sender,receiver, receiver, sender gateway, and receiver gateway in the Figure 1 below. sender gateway, and receiver gateway in the Figure 1 below. Figure 1: A sample configuration Problem 1a 1a (5 (5 points) points) An Problem An attacker attacker between between gateways gateways records records packets packets in in transit transit to to find find sender sender and and receiver of of certain certain flow. flow. receiver Problem 1b 1b (5 (5 points) points) An Problem An attacker attacker between between gateways gateways records records packets packets in in transit transitto tofind findcontent contentofofcertain certain communication. communication. Problem 1c 1c (5 (5 points) points) An Problem An attacker attacker in in the the same same intranet intranet as as the the sender sender records recordspackets packetsto tofind findthe thereceiver. receiver. Problem 1d 1d (5 (5 points) points) An Problem An attacker attacker in in the the same same intranet intranet as as the the sender sender impersonates impersonates the thesender. sender. Problem 1d 1d (5 (5 points) points) An Problem An attacker attacker in in the the same same intranet intranet as as the the receiver receiver also also receives receives the the packets packets and and find content of any communication coming to the receiver. find content of any communication coming to the receiver. Problem 2: 2: IPSec, IPSec, which which extension? Problem extension? (25 (25 points) points) IPSec IPSec has has two two extensions extensionsto tothe theoriginal originalIP IPheader, header, Authentication Header and Encapsulating Security Payload. For each attack above, explain which Authentication Header and Encapsulating Security Payload. For each attack above, explain which one one defends against each attack, if any can, or none of the above if not. Explain your answer. (Write your defends against each attack, if any can, or none of the above if not. Explain your answer. (Write your answer separately as 2a, 2b, ... , 2d.) answer separately as 2a, 2b, ... , 2d.) Problem 3: Carol’s IKE (15 points) Carol decides to study IKE with the course slides, and read up Problem 3: Carol’s IKE (15 points) Carol decides to study IKE with the course slides, and read up to ”Almost-IKE” protocol on slide 17. Then she found out that B(Bob) needed to remember a secret value to ”Almost-IKE” protocol on slide 17. Then she found out that B(Bob) needed to remember a secret value b for each connection, which leaves the defense against DoS attack not quite perfect despite using hashes. b for each connection, which leaves the defense against DoS attack not quite perfect despite using hashes. She changes the protocol as follows: She changes the protocol as follows: A → B : ga , A B computes b = hashKb (g a , A) B → A : g b , hashKb (g b , g a ) and now B forgets b A → B : g a , g b , hashKb (g b , g a ), EncK (sigA (g a , g b , B)) 0 B computes b0 = hashKb (g a , A), and computes g b . 0 If g b that A sent is the same as g b , then B proceeds. B → A : g b , EncK (sigB (g a , g b , A)) Carol argues that this is as secure as the original protocol since the hashKb (g a , A) cannot be computed by anyone but Bob, as Kb is a secret. Would you agree with her or disagree? Explain your answer. Problem 4: Overflowing (15 points) Present an attack scenario using buffer overflow, and show two defense mechanisms that can prevent this attack from happening. Explain why these defenses would be effective.
© Copyright 2026 Paperzz