Security Architecture for IP (IPsec)
|
|
|
- Dina Harvey
- 10 years ago
- Views:
Transcription
1 Security Architecture for IP (IPsec) Security Association (SA), AH-Protocol, ESP-Protocol Operation-Modes, Internet Key Exchange Protocol (IKE) Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) IPsec / IKEv1 Problems IP_Sec, v4.7 2 Page 97-1
2 IP Security Discussion Raise with IPv6 End-to-end security will become more and more important when Internet goes to the commercial world e.g. shopping in the Internet (save transmission of credit card numbers, electronic money, identity of the sender in case of an order via Internet, integrity of electronic bills etc.) Question was if the next generation IP protocol (IPv6) should provide end-to-end security as integral part of itself IP_Sec, v4.7 3 Which Layer for Security? Application must be aware of new application programming interface Application can use standard application programming interface Application Application new API SSL TCP IP Lower Layers Application OS TCP IPsec IP Lower Layers standard API IP_Sec, v4.7 4 Page 97-2
3 IPv6 Security Aspects After heated discussions IESG decided basic building blocks (without non-repudiation) of network security should be part of IPv6 functionality a vendor of an IPv6 implementation must include support of these basic building blocks in order to be standardcompliant does not mean that the use of authentication and encryption blocks is required; only support must be guaranteed IPv6 security follows the general IPsec recommendations RCF 2401 (Former RFC 1825) Security Architecture for IP (IPv4 and IPv6) difference of security aspects between IPv4 and IPv6 security in IPv6 is an integral part of it security in IPv4 must is an add on IP_Sec, v4.7 5 End-to-End Security Basic building blocks for end-to-end security authentication and integrity authentication provides identity of sender integrity ensures that senders message was not changed on the way through the network confidentiality or privacy message cannot be read by others than authorized receiver non-repudiation (!!! not covered by IPsec!!!) the sender cannot later repudiate the contents of the message Techniques used for these building blocks HMAC and Digital Signature (CA, RSA) encryption (DES, 3DES, IDEA, AES) key distribution techniques (DH, CA, IKE, KDC) IP_Sec, v4.7 6 Page 97-3
4 Security Architecture for IP The goal of the IPsec architecture provision of various security services for traffic at the IP layer in both IPv4 and IPv6 environments in a standardized and universal way Security Framework Before IPsec existing solutions were mostly on the application layer (SSL, S/MIME, ssh, ) existing solutions on the network layer were all propriety e.g. it was complicated, time demanding and expensive to establish multi-application or multi-vendor virtual private networks (VPNs) IP_Sec, v4.7 7 Elements of IPsec 1 Security Architecture for IP originally defined in RFC 2401 obsoleted by RFC 4301 since Dec 2005 describes how to provide a set of security services for traffic at the IP layer describes the requirements for systems that implement IPsec, the fundamental elements of such systems, and how the elements fit together and fit into the IP environment it also describes the security services offered by the IPsec protocols, and how these services can be employed in the IP environment. Security Associations (SA) what they are and how they work, how they are managed and their associated processing Security Policy Database (SPD) Security Association Database (SAD) IP_Sec, v4.7 8 Page 97-4
5 Elements of IPsec 2 Security Protocols (for traffic security) Authentication Header (AH) defined in RFC 2402 obsoleted by RFC 4302, 4305 since Dec 2005 Encapsulating Security Payload (ESP) defined in RFC 2406 obsoleted by RFC 4303, 4305 since Dec 2005 Cryptographic Algorithm Implementation Requirements for ESP and AH RFC > mandatory algorithm are defined Secret-key algorithms are used so far because of performance reasons HMAC-SHA1, HMAC-MD5, AES-XCBC-MAC, DES-CBC, 3DES- CBC, AES-CBC, AES-CTR defined in a lot separate RFC s (see 4305, 2403, 2404, 2405, 2451, 3566, 3602, 3686) IP_Sec, v4.7 9 Elements of IPsec 3 Management of Security Associations and Keys manual for static and small environments automatic for scalable environments by ISAKMP ISAKMP (Internet Security Association and Key Management Protocol) defined in RFC 2408 obsoleted by RFC 4306 since Dec 2005 Internet Key Exchange (IKE) for ISAKMP defined in RFC 2409 (aka IKEv1) obsoleted by RFC 4306 since Dec > IKEv2!!! Domain of Interpretation (DOI) defined in RFC 2407 obsoleted by RFC 4306 since Dec 2005 IP_Sec, v Page 97-5
6 What IPsec does? IPsec enables a system to select required security protocols, determine the algorithm's to use for the services, and put in place any cryptographic keys required to provide the requested services IPsec can be used to protect one or more "paths" between a pair of hosts, between a pair of security gateways (VPN), or between a security gateway and a host security gateway could be for example, a router or a firewall implementing IPsec VPN concentrator is another name for such a device if several SA pairs are terminated at the same point VPN is by far the most usual application of IPsec IP_Sec, v What IPsec does? The set of security services that IPsec can provide includes access control prevents unauthorized use of a resource the resource to which access is being controlled is for a host -> computing cycles or data for a security gateway -> network behind the gateway or bandwidth on that network connectionless integrity detects modification of individual IP datagram's data origin authentication rejection of replayed packets (optional) detects arrival of duplicate IP datagram's within a constrained window confidentiality (encryption) all these services are provided at the IP layer hence they can be used by any higher layer protocol e.g., TCP, UDP, ICMP, BGP, etc. IP_Sec, v Page 97-6
7 IPsec Headers IP Data Packet IP L4 Data Authentication Header (AH) Encapsulation Security Payload (ESP) IP AH L4 Data AND/OR IP ESP L4 Data ESP ESP Header Trailer Auth Encrypted AH Authenticated Authentication only ESP Authenticated Optional authentication. AH + ESP together: first perform ESP then AH computation IP AH ESP Header L4 Data ESP Trailer Encrypted ESP Authenticated ESP Auth AH Authenticated IP_Sec, v IPsec Modes 1 Transport Mode - Only one IP header. - Used for end-to-end sessions - Does not hide communication statistics because of network header (IP addresses of the end systems) is sent in clear text IP AH L4 Data (AH) IP ESP Header L4 Data ESP Trailer ESP Auth (ESP) IP_Sec, v Page 97-7
8 IPsec Modes 2 Tunnel Mode for Site-to-Site VPN - Whole original IP packet is IPsec-encapsulated. - Used for VPNs. - Does hide traffic patterns! IP IP AH ESP Header IP IP L4 L4 Data Data (AH) ESP Trailer ESP Auth (ESP) Additional outer IP header Original inner IP header maintains private addresses (inner address) (outer address) (outer address) IP_Sec, v IPsec Modes 3 Tunnel Mode and Transport Mode (ESP only) A FW1 FW2 B IP (FW1,FW2) ESP Header IP (A,B) ESP Header L4 Data ESP Trailer ESP Auth ESP Trailer ESP Auth Tunnel Mode for Client-to-Site VPN (outer address) PC with VPN Client-SW (inner address) IP ( , ) ESP Header (outer address) VPN Concentrator IP ( , ) L4 Data ESP Trailer ESP Auth IP_Sec, v Page 97-8
9 IPsec in Praxis "IPsec used anywhere" Firewall, Router, Hosts VPN Site-to-Site Remote-to-Site Client-to-Site Scalable solutions available Easy to implement Defined for end-to-end security but not frequently used between end systems Encryption performance Original standards: DES and Triple-DES Today migration to AES already done (more efficient, longer keys) HW versus SW encryption power e.g. crypto engines on router for higher performance IP_Sec, v Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) IPsec / IKEv1 Problems IP_Sec, v Page 97-9
10 AH Security Service (RFC 2402, 4302) AH provides IP datagram sender authentication by HMAC or MAC IP datagram integrity assurance by HMAC or MAC replay detection and protection via sequence number (optional) AH does not provide non-repudiation because of usage of secret-keys (shared keys) for HMAC or MAC note: a real Digital Signature needs usage of public-key technique by signing a message with the private-key confidentiality (encryption) authentication for IP fragments therefore IP fragments must be assembled before authentication is checked (better avoid it by MTU path discovery) IP_Sec, v IPv4 and AH Vers.=4 HLEN ToS or DSCP Total Length Fragment Identifier Flags Fragment Offset TTL protocol = 51 Header Checksum Source Address Destination Address IP Options Pad First 32 bits of AH... Last 32 bits of AH Payload... IP_Sec, v Page 97-10
11 Authentication Header (AH) Next Header Length Reserved Security Parameters Index (SPI) Sequence Number Authentication Data (variable number of 32-bit words) note: AH was originally defined as extension header for IPv6 and later same structure was also used for IPv4 IP_Sec, v Authentication Header (AH) Next Header (8 bits) indicates the next header following the AH header same values allowed as protocol field in IPv4 header IP in IP (4), TCP (6), UDP (17), ICMP (1), OSPF (89), etc next header value of immediately preceding header = 51 (AH) Length length of AH header number of 32-bit words Security Parameter Index a 32-bit number identifying (together with IP destination address) the security association for this IP datagram SPI value 0 is reserved for local implementation specific use and must not be sent on the wire IP_Sec, v Page 97-11
12 Authentication Header (AH) Sequence number: monotonically increasing counter value (mandatory and always present) defined in RFC 2085 prevention against replay attacks enabled by default mandatory for transmitter but the receiver need not act upon it every new SA resets this number to zero (thus first packet = 1), no cycling: after sending the 2 32nd packet, a new SA must be established RFC 4302 allows usage of 64 bit sequence numbers IP_Sec, v Authentication Header (AH) Authentication Data: contains Integrity Check Value (ICV) all fields behind AH header plus predictable field of IP header before AH (that means TTL, checksum, ToS/DSCP fields are regarded to be zero for ICV calculation) the algorithm for authentication is free and must be negotiated mandatory default calculation of the authentication data must be supported HMAC with keyed-md5 (RFC 2403), 128 bit secret-key HMAC with keyed-sha-1 (RFC 2404), 160 bit secret-key alternative DES-CBC based MAC non-repudiation (IP datagram signing) is not supported! IP_Sec, v Page 97-12
13 Refresher: HMAC in Action (Sender) 1 message of arbitrary length sent in plaintext Hash-Function Secret Key authenticated fingerprint of fixed length sent in plaintext IP_Sec, v Refresher: HMAC in Action (Receiver) 2 received plaintext message fingerprint Hash-Function Secret Key fingerprint computed compared IP_Sec, v Page 97-13
14 Refresher: MAC CBC Residue 1 m1 m2 m3 mlast E E E. E c1 c2 c3 CBC Residue Encryption at sender to create CBC residue Same done at the receiver to check IP_Sec, v Refresher: MAC CBC Residue 2 message m1, m2, mlast sent DES CBC Secret Key sent CBC Residue IP_Sec, v Page 97-14
15 Refresher: MAC CBC Residue 3 received plaintext message CBC Residue DES - CBC Secret Key CBC Residue computed compared IP_Sec, v Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) IPsec / IKEv1 Problems IP_Sec, v Page 97-15
16 ESP Security Service (RFC 2406, 4303) ESP provides confidentiality (encryption of payload with secret-key algorithm) replay detection and protection via sequence number (optional) IP datagram sender authentication by HMAC (optional) IP datagram integrity assurance by HMAC (optional) ESP does not provide key distribution encryption of IP fragments therefore IP fragments must be assembled before decryption IP_Sec, v IPv4 and ESP Vers.=4 HLEN ToS Total Length Fragment Identifier Flags Fragment Offset TTL protocol = 50 Header Checksum Source Address Destination Address IP Options Pad ESP Header with ESP Parameters Encrypted Data ESP Trailer IP_Sec, v Page 97-16
17 Encapsulating Security Payload (ESP) Security Parameters Index (SPI) Sequence Number Payload Data Field (variable length) maybe starting with cryptographic synchronization data (e.g. Initialization Vector IV for DES-CBC) Padding (0-255 bytes) Padding (0-255 bytes) Pad Length Next Header ESP Authentication Data (optional) note: ESP was originally defined as extension header for IPv6 and later same structure was used also for IPv4 IP_Sec, v ESP Header, Payload SPI and Sequence Number used for same functions as in the AH header defining SA and prevention of replay attack this are the only fields of ESP transmitted in cleartext RFC 4303 allows usage of 64 bit sequence numbers Payload Field of ESP is encrypted actual format depends on encryption method e.g. location of Initialization Vector (IV) for DES-CBC note: in such a case every IP datagram must contain an IV because IP datagram's may arrive out of sequence IP_Sec, v Page 97-17
18 ESP Trailer Padding Field is used to fill the plaintext to the size required by the encryption algorithm (e.g. the block size of a block cipher) is used to align 4 byte boundaries Pad Length pointer to end of data Next Header identifies the type of data contained in the Payload Data Field, e.g., an extension header in IPv6 or an upper layer protocol identifier same values allowed as protocol field in IPv4 header IP_Sec, v ESP Encryption Methods Mandatory default transformation of the data DES-CBC (Data Encryption Standard - Cipher Block Chaining) parameter field contains Initialization Vector (IV) field Triple-DES, Blowfish, IDEA, RC5 and AES as alternative see RFC 2451 An ESP Null algorithm must be supported see RFC 2401 see RFC 2410 where it is praised for ease of implementation, great speed and simplicity ;-) Optional authentication HMAC with keyed-md5 or HMAC with keyed-sha-1 IP_Sec, v Page 97-18
19 Refresher DES Mode - CBC Encryption 1 m1 m2 m3 m4 m5 IV E E E E E c1 c2 c3 c4 c5 Encryption with CBC IP_Sec, v Refresher DES Mode - CBC Decryption 2 c1 c2 c3 c4 c5 D D D D D IV m1 m2 m3 m4 m5 Decryption with CBC IP_Sec, v Page 97-19
20 Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) IPsec / IKEv1 Problems IP_Sec, v Requirements Authentication and encryption techniques require that sender and receiver agree on a key or keys an authentication or encryption algorithm other parameters e.g. lifetime of a key Set of agreements forms a security association between sender and receiver If a packet is received it can be verified or decrypted if the receiver can link it with the context of a security association Security Parameter Index (SPI) field of AH or ESP headers is used as such a link value negotiated as part of the key-exchange procedure IP_Sec, v Page 97-20
21 Security Association (SA) SA is a fundamental concept of IPsec prerequisite for any IPsec services SA define the policy used between the peers for certain traffic flows Traffic (Peers Identity, Access List) Header (AH or ESP) Algorithms (For authentication and encryption) Keys For telnet sessions with host A use 3DES with keys K1, K2, and K3 for payload encryption, SHA with key K4 for authentication... IP_Sec, v Security Association (SA) What is a SA in context of IPsec? it is a cryptographically protected simplex connection between two peers affording security services note: for a bidirectional connection between two peers two SA s are necessary, one for each direction for every method (AH or ESP) a separate SA is necessary SA is uniquely identified by the triple Security Parameter Index (SPI) IP Destination Address of peer Security Protocol Identifier (AH or ESP) note: these are components of the received IP datagram IP_Sec, v Page 97-21
22 Security Association (SAD) Associated with each end of an SA are cryptographic parameters algorithms keys, lifetime of keys sequence number counter sequence counter overflow anti-replay window lifetime of the SA mode of the SA (transport or tunnel) These are maintained in binary format in the memory of a peer s computing engine as the Security Association Database (SAD) IP_Sec, v Security Associations Example SAs are unidirectional! Thus multiple SAs are typically established between two peers One SA per direction and so called transform ( AH or ESP method) Security policies can be totally asymmetric! Identified by the Security Parameter Index (SPI) and peer's IP address SPI is a 32-bit value 4 SAs defined on peer A AH: A to B (SPI=5422) alg=sha, key = K1, peer=b AH: B to A (SPI=9999) alg=sha, key = K2, peer=b ESP: A to B (SPI=15) alg=des, key = K3, peer=b ESP: B to A (SPI=12345) alg=des, key = K4, peer=b SPI 5422 SPI 9999 SPI 15 SPI SAs defined on peer B AH: A to B (SPI=5422) alg=sha, key = K1, peer=a AH: B to A (SPI=9999) alg=sha, key = K2, peer=a ESP: A to B (SPI=15) alg=des, key = K3, peer=a ESP: B to A (SPI=12345) alg=des, key = K4, peer=a IP_Sec, v Page 97-22
23 Inbound/Outbound Traffic Security Policy Database (SPD) contains policy for handling of IP datagram's to be sent (outbound) or received (inbound) on an interface given category of IP datagram should be dropped given category of IP datagram should be forwarded without IPsec given category of IP datagram should be forwarded with IPsec categories are identified by selectors (traffic selectors) e.g. Access Control List (ACL) entries for outbound traffic pointer to SAD entry entries for inbound traffic note: for inbound datagram's corresponding SAD entry is found based on IP destination address, SPI and Service Profile Identifier of packet IP_Sec, v Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v Page 97-23
24 Introduction IPsec works if SAs are set up between peers the algorithms are determined, the session key are established, and so on SA management and key exchange techniques are necessary either manual distribution or automatic on demand distribution Automatic solution for IPsec IKE (Internet Key Exchange, RFC 2409) protocol for doing mutual authentication in a secure way and establishing a shared secret in order to create IPsec SAs took many years to come out of IETF IP_Sec, v History 1 Original contenders for such a protocol Photuris (RFC 2522) signed anonymous DH stateless cookies SKIP (Simple Key-Management for Internet Protocols) perfect forward secrecy avoid long term DH values While fighting ISAKMP (Internet Security Association and Key Management Protocol, RFC 2408) emerged it is not a protocol it is a framework in which message fields could be exchanged in order to create such a key exchange protocol IP_Sec, v Page 97-24
25 History 2 IETF decides that solution for IPsec must be compliant to ISAKMP Photuris and SKIP were not ISAKMP compliant and hence died Further protocols were developed Oakley (RFC 2412) SKEME (Secure Key Exchange MEchanism) both were ISAKMP compliant Then IKE appeared Internet Key Exchange (RFC2409) which combines Oakley and SKEME using ISAKMP syntax IP_Sec, v History 3 But IKE was incomplete hence another document was created The Internet IP Security Domain of Interpretation (DOI) for ISAKMP (RFC2407) DOI specifies a particular use of ISAKMP like a profile defining which parameters could be chosen In order to implement IKE you must know RFCs 2407 (DOI), 2408 (ISAKMP) and 2409 (IKE) very confusing, complex, inconsistent and unreadable note IETF will come out with an consolidated RFC for replacement although the world did manage to have interoperable implementations IP_Sec, v Page 97-25
26 IKE General Aspects IKE complexity to guard against a number of attacks: base for key determination is DH number exchange DH must be protected against man-in-the-middle-attack and therefore a form of an authenticated DH exchange is needed denial of service attack cookies: the messages are constructed with unique cookies that can be used to quickly identify and reject invalid messages without the need to execute processor-intensive cryptographic operations man-in-the-middle attack: protection is provided against the common attacks, such as deletion of messages, modification of messages, reflecting messages back to the sender, replaying of old messages, and redirection of messages to unintended recipients IP_Sec, v Refresher: Diffie-Hellman Key Exchange Alice Private Value S A Public Value P A Bob Private Value S B Public Value P B S P A =g A mod p S P B = g B mod p S A Shared secret : S A S B P B mod p = g mod p = P A mod p S B IP_Sec, v Page 97-26
27 Refresher: DH Man-in-the-middle Attack Alice Intruder Bob SA p, g, T A = g SA mod p SZ SB p, g, T A = g SZ mod p T B = g SB mod p T B = g SZ mod p computes (g SZ mod p) SA = g SZSA mod p uses for messages to Alice (g SA mod p) SZ = g SASZ mod p uses for messages to Bob (g SB mod p) SZ = g SBSZ mod p computes (g SZ mod p) SB = g SZSB mod p IP_Sec, v IKE General Aspects IKE complexity to guard against a number of attacks (cont.): perfect forward secrecy (PFS): compromise of past keys provides no useful clues for breaking any other key, whether it occurred before or after the compromised key; each refreshed key will be derived without any dependence on predecessor keys Transport of IKE messages runs on top of UDP port number 500 on both sides starts with ISAKMP header followed by payloads header fields and payload types defined by ISAKMP protocol procedures defined by IKE IP_Sec, v Page 97-27
28 IKE General Aspects IKE messages IP UDP ISAKMP Header Payloads Payloads IKE phase 1 establishing a secure channel -> IKE SA IKE phase 2 establishing requested IPsec SAs on demand protected by IKE SA of phase 1 IP_Sec, v IKE General Aspects Establishes an authenticated and encrypted tunnel IKE SA main mode (bidirectional), UDP port 500 Creates unidirectional IPsec SAs on demand Also keys are exchanged 1 Want to send a packet, but no IPsec SA formed Okay, IPsec SA established 3 A IPsec SA (SPI 3728) 4 IP packet + IPsec header IPsec B IKE SA Open IPsec SA with following parameters 2 IKE SA IP_Sec, v Page 97-28
29 IKE Phases 1 Phase 1 does mutual authentication and establishes session keys (initial DH keying material) between two entities authentication is based on identities such as names and secrets such as public-key pairs or pre-shared secrets exchanges are known as ISAKMP SA or IKE SA main mode versus aggressive mode Phase 2 multiple phase 2 SAs between the two entities can be established (e.g. an ESP SA or AH SA) based on session keys established in phase 1 (initial DH keying material) quick mode IP_Sec, v IKE Phases 2 Phase 1 modes main mode provides integrity protection aggressive mode uses fewer rounds SA of phase 1 (= IKE SA) is used to do further negotiations In phase 2 establishment of SA for data communication protected by SA of phase 1 (IKE SA) Perfect Forward Secrecy (PFS) new DH exchange performed for each new phase 2 SA without PFS DH values of phase 1 are used IP_Sec, v Page 97-29
30 IKE Phase 1 - Modes Main mode do mutual authentication and establishment of session keys in six messages additional functionality hide endpoint identifiers (usernames) from eavesdropper more flexibility in negotiating of cryptographic parameters Aggressive mode do mutual authentication and establishment of session keys in three messages IP_Sec, v IKE Phase 1 - Keys Key types used for authentication public signature key public key encryption (original specification) public key encryption (revised specification) pre-shared secret key 8 possibilities for doing phase 1!!! main and aggressive mode for each of the four Session keys for IKE SA integrity key encryption key both are secret-keys used for symmetric algorithms IP_Sec, v Page 97-30
31 Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v Main-Mode Public Signature Keys 1 Ic, CP Alice Ic, Rc, CPA Bob Ic, Rc, p, g, g a mod p, nonce A Ic, Rc, g b mod p, nonce B! DH-Exchange! Alice and Bob compute shared key K = f(g ab mod p, nonce A, nonce B ) Ic Initiator Cookie, Rc Responder Cookie -> IKE connection Identifier CP crypto proposal (encryption, hash, authentication key method, DH group) CPA crypto proposal accepted g a mod p, g b mod p public DH values a, b private DH values of Alice, Bob nonce A, nonce B quantity which any given user of a protocol uses only once IP_Sec, v Page 97-31
32 Main-Mode Public Signature Keys 2 f E (K, Alice, Proof I m Alice, [DC(P A )]) Alice f E (K, Bob, Proof I m Bob, [DC(P B )])! Identity Reveal!! Proof knowing the relevant secret S A or S B!! and Integrity Protection on previous messages! Bob DS A = Proof I am Alice = f E (S A, H(Alice, nonce A, nonce B, Ic, Rc, CP, public DH values)) DS B = Proof I am Bob = f E (S B, H(Bob, nonce A, nonce B, Ic, Rc, CP, public DH values)) DC(P A ) = P A +f E (S Cert, P A ) Digital Certificate of Alice s Public Key P A,, optional DC(P B ) = P B + f E (S Cert, P B ) Digital Certificate of Bob s Public Key P B,, optional S cert Private Key of Certificate Authority S A Private Key Alice, S B Private Key Bob Proof ok if f D (P A, DS A ) = own Hash of (Alice, nonce A, nonce B, Ic, Rc, CP, public DH values) Proof ok if f D (P B, DS B ) = own Hash of (Bob, nonce A, nonce B, Ic, Rc, CP, public DH values) IP_Sec, v Public Signature Keys - Session Keys for IKE SA Session Key Preparation SKEYID = prf (nonces, g ab mod p) prf pseudo random function like a hash function note: SKEYID depends on authentication keys used SKEYID is the seed for all other keys IKE SA and IPsec SAs!!! SKEYID_d = prf (SKEYID, ( g ab mod p, cookies, 0) secret bits to create the other keys IKE SA Session Key Building integrity key SKEYID_a = prf (SKEYID, (SKEYID_d ( g ab mod p, cookies, 1)) encryption key SKEYID_e = prf (SKEYID, (SKEYID_a ( g ab mod p, cookies, 2)) IP_Sec, v Page 97-32
33 Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v Aggressive Mode Public Signature Keys Ic, CP, p, g, g a mod p, nonce A, Alice Alice! DH-Exchange! Ic, Rc, CPA, g b mod p, nonce B, Bob, Proof I m Bob, [DC(P B )]) Bob Ic, Rc, Proof I m Alice, [DC(P A )] Ic Initiator Cookie, Rc Responder Cookie CP crypto proposal, CPA crypto proposal accepted g a mod p, g b mod p public DH values, a, b private DH values of Alice, Bob nonce A, nonce B quantity which any given user of a protocol uses only once DS A = Proof I am Alice = f E (S A, H(Alice, nonce A, nonce B, Ic, Rc, CP, public DH values)) DS B = Proof I am Bob = f E (S B, H(Bob, nonce A, nonce B, Ic, Rc, CP, public DH values)) DC(P A ) = P A + f E (S Cert, P A ) Digital Certificate of Alice s Public Key P A DC(P B ) = P B + f E (S Cert, P B ) Digital Certificate of Bob s Public Key P B, S A Private Key Alice, S B Private Key Bob Proof ok if f D (P A, DS A ) = own Hash of (Alice, noncea, nonceb, Ic, Rc, CP, public DH values) Proof ok if f D (P B, DS B ) = own Hash of (Bob, noncea, nonceb, Ic, Rc, CP, public DH values) IP_Sec, v Page 97-33
34 Public Signature Keys - Session Keys for IKE SA Session Key Preparation SKEYID = prf (nonces, g ab mod p) prf pseudo random function like a hash function note: SKEYID depends on authentication keys used SKEYID is the seed for all other keys IKE SA and IPsec SAs!!! SKEYID_d = prf (SKEYID, ( g ab mod p, cookies, 0) secret bits to create the other keys IKE SA Session Key Building integrity key SKEYID_a = prf (SKEYID, (SKEYID_d ( g ab mod p, cookies, 1)) encryption key SKEYID_e = prf (SKEYID, (SKEYID_a ( g ab mod p, cookies, 2)) IP_Sec, v Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v Page 97-34
35 Main-Mode Pre-shared Secret-Key 1 shared secret J Ic, CP Alice Ic, Rc, CPA Bob Ic, Rc, p, g, g a mod p, nonce A Ic, Rc, g b mod p, nonce B! DH-Exchange! Alice and Bob compute shared key K = f(j, g ab mod p, nonce A, nonce B ) Ic Initiator Cookie, Rc Responder Cookie -> IKE connection Identifier CP crypto proposal (encryption, hash, authentication key method, DH group) CPA crypto proposal accepted g a mod p, g b mod p public DH values a, b private DH values of Alice, Bob nonce A, nonce B quantity which any given user of a protocol uses only once IP_Sec, v Main-Mode Pre-shared Secret-Key 2 Alice and Bob computed shared key K = f(j, g ab mod p, nonce A, nonce B ) f E (K, Alice, Proof I m Alice) Alice f E (K, Bob, Proof I m Bob)! Identity Reveal!! Proof knowing the relevant secret J! and Integrity Protection on previous messages! Bob Proof I am Alice = f E (J, H(Alice, noncea, nonceb, Ic, Rc, CP, public DH values)) Proof I am Bob = f E (J, H(Bob, noncea, nonceb, Ic, Rc, CP, public DH values)) IP_Sec, v Page 97-35
36 Pre-shared Secret-Key - Session Keys for IKE SA Session Key Preparation SKEYID = prf (J, nonces) prf pseudo random function like a hash function SKEYID_d = prf (SKEYID, ( g ab mod p, cookies, 0) secret bits to create the other keys IKE SA Session Key Building integrity key SKEYID_a = prf (SKEYID, (SKEYID_d ( g ab mod p, cookies, 1)) encryption key SKEYID_e = prf (SKEYID, (SKEYID_a ( g ab mod p, cookies, 2)) IP_Sec, v Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v Page 97-36
37 Aggressive Mode Pre-shared Secret-Key shared secret J Alice Ic, CP, p, g, g a mod p, nonce A, Alice Ic, Rc, CPA, g b mod p, nonce B, Bob, Proof I m Bob Bob Ic, Rc, Proof I m Alice Ic Initiator Cookie, Rc Responder Cookie CP crypto proposal, CPA crypto proposal accepted g a mod p, g b mod p public DH value, a, b private DH values of Alice, Bob nonce A, nonce B quantity which any given user of a protocol uses only once Proof I am Alice = f E (J, H(Alice, nonce A, nonce B, Ic, Rc, CP, public DH value)) Proof I am Bob = f E (J, H(Bob, nonce A, nonce B, Ic, Rc, CP, public DH value)) IP_Sec, v Pre-shared Secret-Key - Session Keys for IKE SA Session Key Preparation SKEYID = prf (J, nonces) prf pseudo random function like a hash function SKEYID_d = prf (SKEYID, ( g ab mod p, cookies, 0) secret bits to create the other keys IKE SA Session Key Building integrity key SKEYID_a = prf (SKEYID, (SKEYID_d ( g ab mod p, cookies, 1)) encryption key SKEYID_e = prf (SKEYID, (SKEYID_a ( g ab mod p, cookies, 2)) IP_Sec, v Page 97-37
38 Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v Main-Mode Public Encryption Keys 1 (revised) Ic, CP Alice Ic, Rc, CPA Ka = H(Ic, nonce A ) Ic, Rc, f E (P B, nonce A ), f E (Ka, g a mod p), f E (Ka, Alice ), [f E (Ka,DC(P A )] Kb = H(Rc, nonce B ) Ic, Rc, f E (P A, nonce B ), f E (Kb, g b mod p), f E (Kb, Bob ) Bob Alice and Bob compute shared key K K = f(g ab mod p, Ic, Rc, nonce A, nonce B ) Ic Initiator Cookie, Rc Responder Cookie -> IKE connection Identifier CP crypto proposal, CPA crypto proposal accepted g a mod p, g b mod p public DH value, a, b private DH values of Alice, Bob nonce A, nonce B quantity which any given user of a protocol uses only once P A Public Key Alice, P B Public Key Bob IP_Sec, v Page 97-38
39 Main-Mode Public Encryption Keys 2 (revised) Alice Alice and Bob computed shared key K K = f(g ab mod p, Ic, Rc, nonce A, nonce B ) f E (K, Proof I am Alice ) Bob f E (K, Proof I m Bob) Proof I am Alice = H(Alice, nonce A, nonce B, Ic, Rc, CP, public DH values)) Proof I am Bob = H(Bob, nonce A, nonce B, Ic, Rc, CP, public DH values)) Proof ok if f D (K, Proof I m Alice) = own Hash of (Alice, nonce A, nonce B, Ic, Rc, CP, public DH values) Proof ok if f D (K, Proof I m Bob) = own Hash of (Bob, nonce A, nonce B, Ic, Rc, CP, public DH values) IP_Sec, v Public Encryption Keys - Session Keys for IKE SA Session Key Preparation SKEYID = prf (hash(nonces), cookies) prf pseudo random function like a hash function note: SKEYID depends on authentication keys used SKEYID_d = prf (SKEYID, ( g ab mod p, cookies, 0) secret bits to create the other keys IKE SA Session Key Building integrity key SKEYID_a = prf (SKEYID, (SKEYID_d ( g ab mod p, cookies, 1)) encryption key SKEYID_e = prf (SKEYID, (SKEYID_a ( g ab mod p, cookies, 2)) IP_Sec, v Page 97-39
40 Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v Aggressive Mode Public Encryption Keys (original) Ic, CP, p, g, g a mod p, f E (P B, nonce A ), f E (P B, Alice ) Alice Ic, Rc, CPA, g b mod p, f E (P A, nonce B ), f E (P A, Bob ), Proof I m Bob Ic, Rc, Proof I m Alice Bob Ic Initiator Cookie, Rc Responder Cookie CP crypto proposal, CPA crypto proposal accepted g a mod p, g b mod p public DH values, a, b private DH values of Alice, Bob nonce A, nonce B quantity which any given user of a protocol uses only once P A Public Key Alice, P B Public Key Bob Proof I am Alice = H(nonce B, Ic, Rc, public DH values) Proof I am Bob = H(nonce A, Ic, Rc, public DH values) Proof ok if Proof I m Alice = own Hash of (nonce B, Ic, Rc, public DH values) Proof ok if Proof I m Bob = own Hash of (nonce A, Ic, Rc, public DH values) IP_Sec, v Page 97-40
41 Public Encryption Keys - Session Keys for IKE SA Session Key Preparation SKEYID = prf (hash(nonces), cookies) prf pseudo random function like a hash function note: SKEYID depends on authentication keys used SKEYID_d = prf (SKEYID, ( g ab mod p, cookies, 0) secret bits to create the other keys IKE SA Session Key Building integrity key SKEYID_a = prf (SKEYID, (SKEYID_d ( g ab mod p, cookies, 1)) encryption key SKEYID_e = prf (SKEYID, (SKEYID_a ( g ab mod p, cookies, 2)) IP_Sec, v Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v Page 97-41
42 IKE Phase 2 - Quick Mode All messages in phase 2 are encrypted by encryption key SKEYID_e = E integrity protected by integrity key SKEYID_a = A E and A were built in IKE phase 1 Phase 2 exchange again some new nonces and other information are sent which get shuffled into the SKEYID of phase 1 in order to generate a new pair of encryption and integrity key similar procedure as for IKE-SA but with another start value this generated keys then can be used for a requested IPsec SA (either AH, ESP or ESP/AH) note for next slide: SA is initiated by Alice to open an simplex SA from Alice to Bob Traffic-selector is used by Alice to signal which type of traffic will use this SA towards Bob IP_Sec, v IKE Phase 2 - Quick Mode f E (E, X, Y, CP, traffic-sel.a, SPI A, nonce A, [g a mod p]), f E (A, Msg) Alice f E (E, X, Y, CPA, traffic-sel.a, SPI A, nonce B, [g b mod p]), f E (A, Msg) f E (E, X, Y, ack) f E (A, Msg) Bob X = (Ic, Rc), Ic Initiator Cookie, Rc Responder Cookie of IKE phase1 Y distinguisher for initiator, if several setups are performed at the same time CP crypto proposal, CPA crypto proposal accepted nonce A, nonce B quantity which any given user of a protocol uses only once Msg is the actual message sent g a mod p, g b mod p new generated public DH values, a, b new generated private DH values of Alice, Bob (note: this is optional in phase 2; only required if perfect forward secrecy (PFS) is wanted, otherwise DH values of phase 1 are used for generation of key material for IPsec SA) IP_Sec, v Page 97-42
43 Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) Introduction Public Signature Keys Main-Mode Public Signature Keys Aggressive-Mode Pre-shared Keys Main-Mode Pre-shared Keys Aggressive-Mode Public Encryption Keys Main-Mode (Revised) Public Encryption Keys Aggressive-Mode (Original) IKE Phase 2 ISAKMP / IKE Encoding IPsec / IKEv1 Problems IP_Sec, v IKE Encoding - ISAKMP Message Formats All messages have a fixed header ISAKMP header and a sequence of so called payloads Fixed header contains type of next payload Every payload starts with type of next payload length of this payload last payload element has type of next payload set = 0 IP fixed variable UDP ISAKMP Header Payloads Payloads IP_Sec, v Page 97-43
44 Payload Types 1 0 = end no next payload 1 = SA (security association) identifies Domain Of Interpretation (DOI), in our case just simple IP must be followed by type 2 and 3 2 = P (proposal) phase 1: Initiator cookie, Responder cookie phase 2: SPI value 3 = T (transform) cryptographic choices encryption type, hash type, DH group (g, p) IP_Sec, v Payload Types 2 4 = KE (key exchange) public DH value 5 = ID phase 1: endpoint identifier (e.g. Alice, Bob) phase 2: traffic descriptor (traffic selector ) 6 = CERT (certificate) 7 = CR (certificate request) 8 = hash 9 = signature 10 = nonce random number IP_Sec, v Page 97-44
45 Payload Types 3 11 = notification 12 = delete e.g. closing SA (SPI) 13 = vendor ID reserved for future use reserved for private use IP_Sec, v Fixed Header number of bytes initiator s cookie responder s cookie next payload version number exchange type flags message ID message length (in bytes) IP_Sec, v Page 97-45
46 Fixed Header Fields 1 Exchange Type: 1 = base (not used by IKE) 2 = identity protection = IKE main mode 3 = authentication only (not used by IKE) 4 = aggressive = IKE aggressive mode 5 = informational single message e.g. informing other side about a problem (refusal because of wrong version number) 6-31 = reserved values for future ISAKMP exchange types defined within a particular DOI for private use IP_Sec, v Fixed Header Fields 2 Flags: bit 0: if set then following payloads are encrypted bit 1: commit (confusing naming) ISAKMP -> receiver should wait until sender issues a I am ready message (Bob tells Alice to wait for Bob s Ack) IKE -> receiver is requested to acknowledge this message (Bob tells Alice to send an ACK) bit 2: authentication only, if set then following payloads are not encrypted only set in phase 2 to specify a message is in cleartext Message ID: used in phase 2 to tie together related packets IP_Sec, v Page 97-46
47 Payload Type SA, P and T 1 The SA payload for IKE contains the P (proposal) and T (transform) payloads T must be carried within P, P must be carried within SA e.g. payloads for 2 Proposals with 4 and 2 Transforms will look SA P T T T T P T T P indicates also the protocol to be negotiated phase 1 IKE phase 2 AH phase 2 ESP IP compression (PCP) IP_Sec, v Payload Type SA, P and T 2 Usage of P in phase 1 -> only one proposal -> phase 1 IKE in phase 2 -> could be several proposals e.g. AH only, ESP only, AH+ESP, or any of these plus IP compression T indicates a complete suite of cryptographic algorithms/parameters in phase 1 you need 4 (5) algorithms/parameters authentication type hash type encryption type DH group (g/p or elliptic curve) optional lifetime of IKE SA (default is 8 hours) IP_Sec, v Page 97-47
48 Payload Type SA, P and T 3 Usage of T Transform ID contains the number for a method defined within DOI numbers defined in RFC 2407 for IKE Key-IKE (Oakley) for AH MD5, SHA, DES (CBC residue) for ESP DES, 3DES RC4, RC5 IDEA, 3IDEA CAST, Blowfish Null IP_Sec, v Transforms Overview AH ESP Encryption ESP Auth. PCP AH-MD5 ESP-NULL ESP-MD5 PCP-LZS AH-SHA... ESP-DES ESP-3DES ESP-IDEA... ESP-SHA... IP_Sec, v Page 97-48
49 Payload Compression Protocol (PCP) Problem: encrypted datagram's cannot be compressed efficiently encryption introduces randomness PCP reduces IP datagram size before encryption hence must be a component of IPsec Increases the overall communication performance RFC 2393 IP_Sec, v Agenda Overview AH Protocol ESP Protocol Security Association (RFC 2401) Internet Key Exchange Protocol (IKEv1, RFC 2409) IPsec / IKEv1 Problems IP_Sec, v Page 97-49
50 NAT and IPsec AH, ESP AH hash includes the whole IP header Cannot work together with NAT ESP Transport mode: authentication excludes IP but not TCP/UDP header for hash calculation! but TCP checksum includes the Pseudo-IP header therefore turn off TCP checksum verification in the receiver Tunnel mode: Outer IP header is neither encrypted nor authenticated no problems with NAT note: N(P)AT (NAT with port address translation) will modify TCP port numbers if TCP + Payload is ESP encrypted that is not possible propriety Cisco solution -> encapsulate ESP in UDP or TCP See RFC 3715 NAT Traversal for ongoing work IP_Sec, v NAT and IPsec IKE Internet Key Exchange (IKE) Problem if exchanged keys or certificates are bound to gateway's IP address avoid it by using other identifier of the endpoint e.g. User- ID or FQDN Expiration of Security Association (SA) Re-key request is sent to the initial UDP port 500 Problems with multiple security gateways behind a N(P)AT device See RFC 4306 (IKEv2) for ongoing work IP_Sec, v Page 97-50
51 Apply NAT before IPsec! Recommended NAT (1st)+IPsec(2nd) NAT IPsec IPsec IPsec IPsec IPsec Not Recommended: IPsec IPsec NAT IPsec IP_Sec, v Problems with IPsec / IKEv1 1 IPsec for Site-to-Site VPN Often uses pre-shared secrets for authentication of IKE peers Why? certificates means maintaining a PKI (Public Key Infrastructure) at least a private CA (Certification Authority) server is needed VPN router/concentrator can often be physically protected IPsec for Client-to-Site VPN Different situation Mobile PCs calling from insecure places Pres-hared secret may be compromised hence configuration and maintenance overhead if number of clients is high Therefore combination of IPsec, well-known RAS Authentication Techniques (PPP with EAP, RFC 3748) and X-AUTH Client dials-in, authenticates itself at a authentication server (VPN concentrator) and then the necessary IPsec configuration is pushed from the VPN concentrator to the client sometimes even enhanced with activation of a host based FW function at the client side of IPsec Client gets an IP address from the VPN concentrator and all client traffic may be forced to go exclusively to the VPN concentrator solved with X-AUTH exchange as add-on to IKEv1 X-AUTH exchange is an inherent optional part of IKEv2 IPsec Tunnel mode is used IP_Sec, v Page 97-51
52 Problems with IPsec / IKEv1 2 IPsec for End-to-End VPN (Client-to-Client VPN in transport mode Some inherent problems when using certificates caused by the fact that certificates normally deals with names but IPsec (especially the SPD) knows only about IP addresses Binding of certificates to IP addresses not possible or not wanted See the following documents for more information about some basic problems of IPsec and IKEv1: A Cryptographic Evaluation of IPsec Niels Ferguson and Bruce Schneier -> Experiences with Host-to-Host IPsec Tuomas Aura, Michael Roe, and Anish Mohammed Key Exchange in IPSec: Analysis of IKE Charlie Kaufman, Radia Perlman IEEE Internet Computing Volume 4 Issue 6 (2000) page =50&ared=56&arAuthor=Perlman%2C+R.%3B+Kaufman%2C+C. Analysis of the IPsec Key Exchange Charlie Kaufman, Radia Perlman This leads to an adaptation of the original IPsec RFCs (IPsec Architecture, AH and ESP Headers) and to an completely rework of the IKE protocol -> IKEv2 IP_Sec, v Page 97-52
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Chapter 5: Network Layer Security
Managing and Securing Computer Networks Guy Leduc Mainly based on Network Security - PRIVATE Communication in a PUBLIC World C. Kaufman, R. Pearlman, M. Speciner Pearson Education, 2002. (chapters 17 and
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
IPSEC: IKE. Markus Hidell [email protected]. Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers
IPSEC: IKE Markus Hidell [email protected] Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers 1 Reading Kaufman, chapter 18 (and some of 16) 2 Secure Key Establishment
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Internetwork Security
Internetwork Security Why Network Security Layers? Fundamentals of Encryption Network Security Layer Overview PGP Security on Internet Layer IPSec IPv6-GCAs SSL/TLS Lower Layers 1 Prof. Dr. Thomas Schmidt
Chapter 49 IP Security (IPsec)
Chapter 49 IP Security (IPsec) Introduction...49-3 IP Security (IPsec)...49-4 Security Protocols and Modes... 49-4 Compression Protocol... 49-5 Security Associations (SA)... 49-5 ISAKMP/IKE...49-6 ISAKMP...
IPSec and SSL Virtual Private Networks
IPSec and SSL Virtual Private Networks ISP Workshops Last updated 29 June 2014 1 Acknowledgment p Content sourced from n Merike Kaeo of Double Shot Security n Contact: [email protected] Virtual
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Branch Office VPN Tunnels and Mobile VPN
WatchGuard Certified Training Branch Office VPN Tunnels and Mobile VPN Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Notice to Users Information
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Dr. Arjan Durresi. Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/
Set of Problems 2 Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana State University
Computer and Network Security
Computer and Network Security c Copyright 2000 R E Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 nemo@ciseufledu Network Security Protocols
Chapter 8 Virtual Private Networking
Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
VPNs Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
IP SECURITY (IPSEC) PROTOCOLS
29 IP SECURITY (IPSEC) PROTOCOLS One of the weaknesses of the original Internet Protocol (IP) is that it lacks any sort of general-purpose mechanism for ensuring the authenticity and privacy of data as
The BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Configuring Internet Key Exchange Security Protocol
Configuring Internet Key Exchange Security Protocol This chapter describes how to configure the Internet Key Exchange (IKE) protocol. IKE is a key management protocol standard that is used in conjunction
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
CS 494/594 Computer and Network Security
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Exercise: Chapters 13, 15-18 18 1. [Kaufman] 13.1
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
Internet Security Architecture
accepted for publication in Computer Networks and ISDN Systems Journal Internet Security Architecture Refik Molva Institut Eurécom 2229, route des Crêtes F-06904 Sophia-Antipolis [email protected] Abstract
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security Securing communications (SSL/TLS and IPSec) Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network communication Who are you
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
This paper is a follow-on to an earlier paper 1 and. An architecture for the Internet Key Exchange Protocol. by P.-C. Cheng
An architecture for the Internet Key Exchange Protocol by P.-C. Cheng In this paper we present the design, rationale, and implementation of the Internet Key Exchange (IKE) Protocol. This protocol is used
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
FortiOS Handbook IPsec VPN for FortiOS 5.0
FortiOS Handbook IPsec VPN for FortiOS 5.0 IPsec VPN for FortiOS 5.0 26 August 2015 01-504-112804-20150826 Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard, are registered
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
FortiOS Handbook - IPsec VPN VERSION 5.2.2
FortiOS Handbook - IPsec VPN VERSION 5.2.2 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT
SonicOS Enhanced 3.2 IKE Version 2 Support
SonicOS Enhanced 3.2 IKE Version 2 Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Internet Key Exchange protocol version 2 (IKEv2). This document contains the
Laboratory Exercises V: IP Security Protocol (IPSec)
Department of Electronics Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture (FESB) University of Split, Croatia Laboratory Exercises V: IP Security Protocol (IPSec) Keywords:
Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway
Fireware How To VPN How do I set up a manual branch office VPN tunnel? Introduction You use Branch Office VPN (BOVPN) with manual IPSec to make encrypted tunnels between a Firebox and a second IPSec-compliant
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Lab14.8.1 Configure a PIX Firewall VPN
Lab14.8.1 Configure a PIX Firewall VPN Complete the following lab exercise to practice what you learned in this chapter. Objectives In this lab exercise you will complete the following tasks: Visual Objective
NetScreen Concepts & Examples
NetScreen Concepts & Examples ScreenOS Reference Guide Volume 5: VPNs ScreenOS 5.1.0 P/N 093-1370-000 Rev. A Copyright Notice Copyright 2004 Juniper Networks, Inc. All rights reserved. Juniper Networks,
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms
Chapter 11 Security Protocols Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Network Security
Chapter 5 Virtual Private Networking Using IPsec
Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham In part two of NetCertLabs Cisco CCNA Security VPN lab series, we explored setting up a site-to-site VPN connection where one side
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
Using IPSec in Windows 2000 and XP, Part 2
Page 1 of 8 Using IPSec in Windows 2000 and XP, Part 2 Chris Weber 2001-12-20 This is the second part of a three-part series devoted to discussing the technical details of using Internet Protocol Security
Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Overview. Protocols. VPN and Firewalls
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls VPN-Definition VPNs (Virtual Private Networks)
CS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang [email protected]
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang [email protected] Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Real-Time Communication Security: SSL/TLS. Guevara Noubir [email protected] CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir [email protected] CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
VPN Solutions. Lesson 10. etoken Certification Course. April 2004
VPN Solutions Lesson 10 April 2004 etoken Certification Course VPN Overview Lesson 10a April 2004 etoken Certification Course Virtual Private Network A Virtual Private Network (VPN) is a private data network
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
CSCI 454/554 Computer and Network Security. Final Exam Review
CSCI 454/554 Computer and Network Security Final Exam Review Topics covered by Final Topic before Midterm 20% Topic after Midterm 80% Date: 05/13/2015 9:00am noon Place: the same classroom Open book/notes
Secure Sockets Layer
SSL/TLS provides endpoint authentication and communications privacy over the Internet using cryptography. For web browsing, email, faxing, other data transmission. In typical use, only the server is authenticated
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
Chapter 3. Network Domain Security
Communication System Security, Chapter 3, Draft, L.D. Chen and G. Gong, 2008 1 Chapter 3. Network Domain Security A network can be considered as the physical resource for a communication system. This chapter
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Netzwerksicherheit: Anwendungen
Internet-Technologien (CS262) Netzwerksicherheit: Anwendungen 22. Mai 2015 Christian Tschudin & Thomas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 8 Security in Computer Networks
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson
Chapter 8 Network Security Slides adapted from the book and Tomas Olovsson Roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity Security protocols and measures: Securing
Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products
Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089
Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces
Introduction An Overview of the D Industrial Router Product Line Secure Access with VPN Technology in Industrial Networks Outlining the IPsec and VPN capabilities available in the GarrettCom D series of
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
FortiOS Handbook - IPsec VPN VERSION 5.2.4
FortiOS Handbook - IPsec VPN VERSION 5.2.4 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls
Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls Computer Net Lab/Praktikum Datenverarbeitung 2 1 VPN - Definition VPNs (Virtual Private Networks) allow secure data transmission
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
