Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers

TLS is a commonly used protocol that provides a secure communication channel through the use of encryption and is widely used by HTTPS websites. TLS allows client/server applications to communicate securely in a way that is “designed to prevent eavesdropping, tampering and message forgery” [1]. Howe...

Full description

Saved in:
Bibliographic Details
Main Author: Pathangi Janardhanan Jatinshravan
Other Authors: Alwen Fernanto Tiu
Format: Final Year Project
Language:English
Published: 2017
Subjects:
Online Access:http://hdl.handle.net/10356/70367
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-70367
record_format dspace
spelling sg-ntu-dr.10356-703672023-03-03T20:30:44Z Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers Pathangi Janardhanan Jatinshravan Alwen Fernanto Tiu School of Computer Science and Engineering DRNTU::Engineering::Computer science and engineering TLS is a commonly used protocol that provides a secure communication channel through the use of encryption and is widely used by HTTPS websites. TLS allows client/server applications to communicate securely in a way that is “designed to prevent eavesdropping, tampering and message forgery” [1]. However, there are possible ways an attacker can break the security offered by TLS, one of which is a cipher suite downgrade attack, which can take the form of a FREAK attack or a Logjam, both discovered in 2015, wherein a man in the middle can force the client and the server to use a weaker cipher suite which can be broken, thus allowing the attacker access to the communication between the client and the server. In this project, I attempted to defend a TLS virtual server running on a Xen Hypervisor against downgrade attack attempts by intercepting the TLS Client Hello, which is the first message in a TLS communication, and examining the client’s preferred cipher suite, dropping the client hello if the cipher suite is not of the desired standard, thus ensuring that a TLS connection does not take place. This is done by monitoring incoming network packets from the Hypervisor’s netback driver. This solution has the benefit of the user of the virtual machine or virtual server not having to modify or worry about placing restrictions on their TLS server, as TLS Security is handled by the Hypervisor without the interference of the virtual machine. This solution can have positive implications, especially considering that the world is moving more towards virtualization and virtualized servers. Bachelor of Engineering (Computer Engineering) 2017-04-21T02:12:44Z 2017-04-21T02:12:44Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/70367 en Nanyang Technological University 47 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Computer science and engineering
spellingShingle DRNTU::Engineering::Computer science and engineering
Pathangi Janardhanan Jatinshravan
Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
description TLS is a commonly used protocol that provides a secure communication channel through the use of encryption and is widely used by HTTPS websites. TLS allows client/server applications to communicate securely in a way that is “designed to prevent eavesdropping, tampering and message forgery” [1]. However, there are possible ways an attacker can break the security offered by TLS, one of which is a cipher suite downgrade attack, which can take the form of a FREAK attack or a Logjam, both discovered in 2015, wherein a man in the middle can force the client and the server to use a weaker cipher suite which can be broken, thus allowing the attacker access to the communication between the client and the server. In this project, I attempted to defend a TLS virtual server running on a Xen Hypervisor against downgrade attack attempts by intercepting the TLS Client Hello, which is the first message in a TLS communication, and examining the client’s preferred cipher suite, dropping the client hello if the cipher suite is not of the desired standard, thus ensuring that a TLS connection does not take place. This is done by monitoring incoming network packets from the Hypervisor’s netback driver. This solution has the benefit of the user of the virtual machine or virtual server not having to modify or worry about placing restrictions on their TLS server, as TLS Security is handled by the Hypervisor without the interference of the virtual machine. This solution can have positive implications, especially considering that the world is moving more towards virtualization and virtualized servers.
author2 Alwen Fernanto Tiu
author_facet Alwen Fernanto Tiu
Pathangi Janardhanan Jatinshravan
format Final Year Project
author Pathangi Janardhanan Jatinshravan
author_sort Pathangi Janardhanan Jatinshravan
title Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_short Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_full Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_fullStr Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_full_unstemmed Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_sort developing a xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual tls servers
publishDate 2017
url http://hdl.handle.net/10356/70367
_version_ 1759858079004884992