CoFee is a modular framework focusing on code security and code robustness by using state-of-the-art software analyzers. Further, error messages are supplemented by meaningful hints suited for novice students. It also follows the theory of situated learning by exposing students to typical software engineering workflows using Gitlab for version control, continuous integration and code quality reports. To check code quality CoFee supports well-established open-source tools which were tested on a purpose build test suite. Its modular architecture allows easy integration of future analyzers.
Automated Detection of Bugs in Error Handling for Teaching Secure C Programming
Max Schrötter, Maximilian Falk and Bettina Schnor
Accepted for the sixth workshop: Automatische Bewertung von Programmieraufgaben (ABP 2023)
Munich, Germany, October 2023
Leveraging Continuous Feedback in Education to Increase C Code Quality
Max Schrötter and Bettina Schnor
9th International Conference on Computational Science and Computational Intelligence (CSCI)
Las Vegas, NV, USA, December 2022
Transport Layer Security (TLS) ist das Standardverfahren zum Verschlüsseln des Datentransports. Über eine PKI können digitale Zertifikate ausgestellt, verteilt und geprüft werden. Die Authentizität der verwendeten Zertifikate ist jedoch nicht immer gewährleistet.
Derzeit sind über 200 verschiedene CAs verfügbar, jede dieser CA kann Zertifikate für jeden beliebigen Hostnamen ausstellen. Wenn eine dieser CAs nachlässig bei der Systemsicherheit oder der Prüfung des Antragsstellers ist, kann sich ein Angreifer ein "gültiges" Zertifikat für einen Host erstellen lassen.
Hier kommt DANE ins Spiel! DANE definiert einen TLSA-Record, der den Hash des öffentlichen Schlüssels einer Domain oder eines Dienstes enthält.
Um Manipulationen des TLSA-RR durch beispielsweise einem MitM-Angriff zu vermeiden, wird DNSSEC vorausgesetzt. Mittels Signaturen garantiert DNSSEC, dass DNS-Informationen zu einer Domain authentisch sind und während der Übertragung nicht gefälscht wurden.
Das Domain Name System Security Extension (DNSSEC) erweitert das Domain Name System hinsichtlich der Transportsicherheit und dient als Grundlage weiterer Sicherheitsanwendungen. Konzipiert wurde DNSSEC zum einen, um eine Datenintegrität bezüglich der im DNS übertragenen Resource Records zu gewährleisten. Zum anderen soll eine Authentizität der Datenherkunft der übertragenen Resource Records sichergestellt sein.
Figure 2 zeigt die Vertrauenskette für die autoritative Zone dnssec-uni-potsdam.de. Der autoritative Nameserver für dnssec-uni-potsdam.de enhält als letzte Instanz der Vertrauenskette in der Zonendatei einen Verweis auf mail.dnssec-uni-potsdam.de. Der öffentliche KSK-Teil liegt als Hash in dem DS-RR der übergeordneten Zone DE-NIC für die .de-Zone. Dieser signiert anschließend mit seinem KSK den DS-Eintrag. Nur der ZSK signiert die Zoneneinträge und stellt deren Integrität und Authentizität sicher. Der Schlüssel der übergeordneten Zonen (.de und root) signiert jeweils nur den DS-Eintrag im KSK. Bei einer Änderung des KSK ist eine out-of-band-Kommunikation mit der übergeordenten Zone nötig.
Figure 3 zeigt den TLSA-Record für mail.dnssec-uni-potsdam.de. Der sendende Mailserver erhält aus dem DNS den MX- und den TLSA-Record des empfangenden Mailserver mail.dnssec-uni-potsdam.de. Mit dem TLSA-Record wird dem SMTP-Sender mitgeteilt, dass eine Kommunikation verschlüsselt erfolgen soll und nur einem Mailserver vertraut werden soll, der ein Zertifikat mit dem entsprechenden Fingerprint vorzeigt.
DNSSEC und DANE in Praxis: [Slides] [Video]
Absicherung von Firmware-Updates im Internet der Dinge mittels DNSSEC/DANE
Miyana Sophie Stange, Masterarbeit
2022
Under the Hood of DANE Mismanagement in SMTP
Hyeonmin Lee, Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung Kwon, Taejoong Chung
2022
Roll, Roll, Roll your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover
M. Müller, W. Hardaker, M. Thomas, T. Chung, R. van Rijswijk-Deij, D. Wessels, W.
2019
The Impact of DNSSEC on the Internet Landscape
Matthäus Wander, Dissertation
Universität Duisburg-Essen
2015
Sicherheit im Domain Name System
Claas Lorenz, Bachelorarbeit
Universität Potsdam
2012
Securing SUIT-conform Firmware Update Management in the IoT with DNSSEC/DANE
Max Schrötter, Miyana Sophie Stange and Bettina Schnor
19th GI/ITG KuVS Fachgespräch: Drahtlose Sensornetze
Berlin, Germany, September 2022
Absicherung von Firmware-Updates im Internet der Dinge mittels DNSSEC/DANE
Miyana Sophie Stange, Masterarbeit
“Security’s worst enemy is complexity.” Ferguson and Schneier
Originally, this famous quote targeted the standardization of the IPsec protocol suite but also bears some universal insight: the more complex a technical system becomes, the harder it gets to ensure its secure functioning as has been confirmed in practice several times. Throughout the recent years, IT landscapes have grown even more complex. Trends like Mobile Computing, Cloud Computing, or the Internet of Things introduced new opportunities for many if not most organizations and their adoption ultimatively increased the complexity of these organizations’ IT landscapes.
Our research aims at the practical reduction of complexity for security officials and administrators to effectively and efficiently handle security on the organizational as well as on the technical level. Particularly, we offer formal tooling to assess the state of network security compliance that can be used in standard workflows in information security management (ISM), e.g., BSI-Grundschutz or ISO 27001.
Figure 1 depicts the general approach on how security officials and administrators can evolve the network towards security compliance and maintain the secure state once reached. It is required to:
(Note: PDCA stands for Plan-Do-Check-Act and is a well-established standard approach in information security management, e.g., in ISO 27001.)
As seen in Figure 2, the compliance verification workflow consists of three major parts – the specification of the security policy, the network modeling, and the compliance verification. At first, the security official needs to specify the security policy (1a). In this specification, access control is defined through reachabilities between organizational entities, e.g., services or network segments, that have been described in an inventory (1b) which is provided by the network administrator. The inventory maps the organizational terms, e.g., the organization’s ERP service or the research department’s network segment, to their technical implementation, e.g., a segment’s IP address range or a service’s protocol and port. Also, the network administrator provides the network’s configurations, e.g., firewall rule sets or routing configuration, that are to be modeled (1c). Then, the network model is verified for conformance with the security specification (2) and, finally, the result is reported (3) for further utilization by the security official and the network administrator.
To enable security officials as well as network security administrators to practically determine the state of network security compliance and to overcome the performance limitations of general model checking approaches, we make the following major contributions:
These contributions enable security officials and administrators to gain and manage compliant network security.
This research is performed in close cooperation with the genua GmbH.
Firewall Management: Rapid Anomaly Detection
Claas Lorenz and Bettina Schnor
IEEE 24th International Conference on High Performance Computing (HPCC)
In this work, we leverage our domain oriented notion of the Header Space Analysis to detect firewall
anomalies at previously unknown pace. Our approach outperforms approaches from literature by a factor of
nearly 115 and analyzes a large real-world firewall rule set in well below a second.
Chengdu, China, December 2022
Continuous Verification of Network Security Compliance
Claas Lorenz and Vera Clemens and Max Schrötter and Bettina Schnor
IEEE Transactions on Network and Service Management (TNSM)
In this work, we present the concept of state shell interweaving to transform a
stateful firewall rule set into a stateless rule set. This allows us to reuse any fast
domain specific engine from the field of data plane verification tools leveraging
smart, very fast, and domain specialized data structures and algorithms including
Header Space Analysis (HSA).
June 2022
Modeling IPv6 Firewalls for Fast Formal Verification
Claas Lorenz, Sebastian Kiekheben and Bettina Schnor
International Conference on Networked Systems (NetSys)
Göttingen, Germany, March 2017
Anomaly Detection for Distributed IPv6 Firewalls
Claas Lorenz and Bettina Schnor
12th International Conference on Security and Cryptography (SECRYPT)
Colmar, France, July 2015
The transition from the currently used internet protocol version IPv4 to the official successor protocol IPv6 is an important technical requirement for the ongoing development of communication and network infrastructures within the next years. Therefore the security of IPv6 networks is of high social relevance and importance.
The project "IPv6 Intrusion Detection System" is realized in collaboration of "University of Potsdam", "Beuth-Hochschule für Technik", "EANTC" and "Strato AG". It is supported by the German "Federal Ministry of Education and Research".
For further information please visit the project website: www.ipv6-ids.de