Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers

TLS is a commonly used protocol that provides a secure communication channel through the use of encryption and is widely used by HTTPS websites. TLS allows client/server applications to communicate securely in a way that is “designed to prevent eavesdropping, tampering and message forgery” [1]. Howe...

Full description

Bibliographic Details
Main Author: Pathangi Janardhanan Jatinshravan
Other Authors: Alwen Fernanto Tiu
Format: Final Year Project (FYP)
Language:English
Published: 2017
Subjects:
Online Access:http://hdl.handle.net/10356/70367
_version_ 1824455518855364608
author Pathangi Janardhanan Jatinshravan
author2 Alwen Fernanto Tiu
author_facet Alwen Fernanto Tiu
Pathangi Janardhanan Jatinshravan
author_sort Pathangi Janardhanan Jatinshravan
collection NTU
description TLS is a commonly used protocol that provides a secure communication channel through the use of encryption and is widely used by HTTPS websites. TLS allows client/server applications to communicate securely in a way that is “designed to prevent eavesdropping, tampering and message forgery” [1]. However, there are possible ways an attacker can break the security offered by TLS, one of which is a cipher suite downgrade attack, which can take the form of a FREAK attack or a Logjam, both discovered in 2015, wherein a man in the middle can force the client and the server to use a weaker cipher suite which can be broken, thus allowing the attacker access to the communication between the client and the server. In this project, I attempted to defend a TLS virtual server running on a Xen Hypervisor against downgrade attack attempts by intercepting the TLS Client Hello, which is the first message in a TLS communication, and examining the client’s preferred cipher suite, dropping the client hello if the cipher suite is not of the desired standard, thus ensuring that a TLS connection does not take place. This is done by monitoring incoming network packets from the Hypervisor’s netback driver. This solution has the benefit of the user of the virtual machine or virtual server not having to modify or worry about placing restrictions on their TLS server, as TLS Security is handled by the Hypervisor without the interference of the virtual machine. This solution can have positive implications, especially considering that the world is moving more towards virtualization and virtualized servers.
first_indexed 2025-02-19T03:39:29Z
format Final Year Project (FYP)
id ntu-10356/70367
institution Nanyang Technological University
language English
last_indexed 2025-02-19T03:39:29Z
publishDate 2017
record_format dspace
spelling ntu-10356/703672023-03-03T20:30:44Z Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers Pathangi Janardhanan Jatinshravan Alwen Fernanto Tiu School of Computer Science and Engineering DRNTU::Engineering::Computer science and engineering TLS is a commonly used protocol that provides a secure communication channel through the use of encryption and is widely used by HTTPS websites. TLS allows client/server applications to communicate securely in a way that is “designed to prevent eavesdropping, tampering and message forgery” [1]. However, there are possible ways an attacker can break the security offered by TLS, one of which is a cipher suite downgrade attack, which can take the form of a FREAK attack or a Logjam, both discovered in 2015, wherein a man in the middle can force the client and the server to use a weaker cipher suite which can be broken, thus allowing the attacker access to the communication between the client and the server. In this project, I attempted to defend a TLS virtual server running on a Xen Hypervisor against downgrade attack attempts by intercepting the TLS Client Hello, which is the first message in a TLS communication, and examining the client’s preferred cipher suite, dropping the client hello if the cipher suite is not of the desired standard, thus ensuring that a TLS connection does not take place. This is done by monitoring incoming network packets from the Hypervisor’s netback driver. This solution has the benefit of the user of the virtual machine or virtual server not having to modify or worry about placing restrictions on their TLS server, as TLS Security is handled by the Hypervisor without the interference of the virtual machine. This solution can have positive implications, especially considering that the world is moving more towards virtualization and virtualized servers. Bachelor of Engineering (Computer Engineering) 2017-04-21T02:12:44Z 2017-04-21T02:12:44Z 2017 Final Year Project (FYP) http://hdl.handle.net/10356/70367 en Nanyang Technological University 47 p. application/pdf
spellingShingle DRNTU::Engineering::Computer science and engineering
Pathangi Janardhanan Jatinshravan
Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_full Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_fullStr Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_full_unstemmed Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_short Developing a Xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual TLS servers
title_sort developing a xen hypervisor based alternate defense against cipher suite downgrade attacks for virtual tls servers
topic DRNTU::Engineering::Computer science and engineering
url http://hdl.handle.net/10356/70367
work_keys_str_mv AT pathangijanardhananjatinshravan developingaxenhypervisorbasedalternatedefenseagainstciphersuitedowngradeattacksforvirtualtlsservers