13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode



Similar documents
Chapter 9. IP Secure

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Network Security. Lecture 3

Network Security Part II: Standards

Securing IP Networks with Implementation of IPv6

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Cisco Which VPN Solution is Right for You?

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Site to Site Virtual Private Networks (VPNs):

Master Course Computer Networks IN2097

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Introduction to IP v6

Lecture 10: Communications Security

Protocol Security Where?

Lecture 17 - Network Security

Virtual Private Networks

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Virtual Private Networks: IPSec vs. SSL

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Network Access Security. Lesson 10

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Firewalls and Virtual Private Networks

MPLS Environment. To allow more complex routing capabilities, MPLS permits attaching a

Security vulnerabilities in the Internet and possible solutions

VPN. VPN For BIPAC 741/743GE

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

APPLICATION NOTE 211 MPLS BASICS AND TESTING NEEDS. Label Switching vs. Traditional Routing

IPv6 Fundamentals Ch t ap 1 er I : ntroducti ti t on I o P IPv6 Copyright Cisco Academy Yannis Xydas

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

VPN. Date: 4/15/2004 By: Heena Patel

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Overview. Protocols. VPN and Firewalls

Internet Protocol Version 6 (IPv6)

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

CCNA Security 1.1 Instructional Resource

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Chapter 10. Network Security

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

IP Security. Ola Flygt Växjö University, Sweden

Internetworking II: VPNs, MPLS, and Traffic Engineering

Internet Architecture and Philosophy

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Network Security Fundamentals

Secure Network Design: Designing a DMZ & VPN

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

Network virtualization

21.4 Network Address Translation (NAT) NAT concept

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Ethernet. Ethernet. Network Devices

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Internet Protocol Security IPSec

Virtual Private Network and Remote Access Setup

IP SECURITY (IPSEC) PROTOCOLS

Application Note: Onsight Device VPN Configuration V1.1

High Performance VPN Solutions Over Satellite Networks

Quidway MPLS VPN Solution for Financial Networks

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Implementing and Managing Security for Network Communications

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

Chapter 5: Network Layer Security

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Computer Networks. Secure Systems

The BANDIT Products in Virtual Private Networks

Lecture 8. IP Fundamentals

Virtual Private Networks

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Security issues with Mobile IP

MPLS over Various IP Tunnels. W. Mark Townsley

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

IPV6 vs. SSL comparing Apples with Oranges

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Network layer: Overview. Network layer functions IP Routing and forwarding

MPLS and IPSec A Misunderstood Relationship

Chapter 7 Transport-Level Security

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

2. IP Networks, IP Hosts and IP Ports

A PPENDIX L TCP/IP and OSI

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Transcription:

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4 VPNs Layer 2 tunneling protocol (L2TP) compulsory mode / voluntary mode Layer 3 tunnel based on IPsec L2TP over IPsec Layer 4 tunnel based on SSL/TLS Layer 2/3/4 VPNs Pros and cons 13.3 Multi-Protocol Label Switching MPLS-based virtual private networks, MPLS layer 2 shim header 13.4 IPsec Transport Mode IPsec authentication header (AH) IPsec encapsulating security payload (ESP) 13.5 IPsec Tunnel Mode IPsec-based virtual private networks IPsec encapsulating security payload (ESP) IPsec ESP overhead IPsec authentication header (AH) 1

2

3

4

5

6

7

LAC: L2TP Access Concentrator LNS: L2TP Network Server 8

9

10

11

12

13

14

Virtual Private Network (VPN) based on MPLS By prepending a user label LA in front of each IP packet the whole IP-traffic from user A can be transported from ingress node E1 (e.g. home office) to egress node E3 (e.g. company headquarters) without examining the IP headers along the route. Even private network addresses (e.g. 10.x.x.x) could be transported. From hop to hop an outer switching label (L1, L3, L5) that defines the label switched path is pushed onto the label stack at the beginning of a hop and popped again after the switching decision at the end of a hop. Labelling client traffic also allows efficient billing based on the number of transmitted IP-packets. 15

Shim Header The shim header is carried after the data link layer header (layer 2) and before the IP header (layer 3). Label Multiple encapsulations may exist, i.e. labels may be stacked to an arbitrary depth: Stacking maintains identity of several streams when they are aggregated into a single Label Switched Path (LSP) Labels are a generalization of ATM s concept of a dual hierarchy established by VPCs and VCCs. Class of Service The Class of Service (CoS) field is similar to the seldom used Type of Service (TOS) field in the IP header. MPLS uses these experimental bits for QoS purposes. Time to Live The Time to Live (TTL) field takes over the function of the TTL field in the IP header hidden by encapsulation. Source: Hans Weibel, ZHW Course Kommunikationsnetze, May 2000 16

17

Authenticity of IP connections In order to prevent IP spoofing and connection hijacking, as well as to secure the content of IP datagrams against any unauthorized modifications, all IP datagrams sent over the Internet should be authenticated. Privacy of IP connections In order to guarantee privacy, all IP datagrams sent over the Internet should be encrypted by employing strong cryptography. Encryption and Authentication Encryption without authentication is vulnerable to various attacks. Therefore encryption must always be combined with authentication. 18

IP Authentication Header (AH) The IPsec AH Protocol is specified in RFC 4302. AH protects both IP header and IP payload against modifications by computing a keyed message authentication code (MAC) over most octets of the IP datagram. Excluded from the cryptographic checksum are the following mutable header fields: Type of Service (TOS) Fragment Offset (always zero since AH is applied to non-fragmented packets, only) Flags Time to Live (TTL) IP header checksum The above header fields could possibly get modified by intermediate routers en-route from source to destination. The secured checksum is transmitted in the AH header, together with an arbitrary 32 bit Secure Parameters Index (SPI) uniquely identifying the Security Association and a 32 bit Sequence Number preventing replay attacks. The AH header has the structure of an IPv6 extension header but can also be carried over IPv4. Not only TCP and UDP but any transport layer protocol can be protected by AH. The Protocol field in the original IP header is set to the decimal value 51, designating the AH protocol and the Next Header field in the AH header carries the original protocol number(e.g. 1 for ICMP, 6 for TCP, 17 for UDP), identifying the transport layer payload carried in the IP datagram. 19

IP Encapsulating Security Payload (ESP) The IPsec ESP Protocol is specified in RFC 4303. ESP encrypts the transport payload of the IP datagram using a strong symmetric encryption algorithm, (AES, CAMELLIA, 3DES, etc.). An ESP trailer is appended prior to encryption in order to align the payload data to a 4-byte boundary required by the ESP packet format. It may also be used to adapt the plaintext size to the block size of the block cipher (e.g. 64 bits for 3DES). Since IP packets could get lost, the encrypted payload is usually preceded by an initialization vector (IV) that is used by the receiver to initialize the block cipher algorithm used for the decryption of each IP payload. The ESP header has the structure of an IPv6 extension header but can also be carried over IPv4. Similar to the AH header it contains a 32 bit Secure Parameters Index (SPI) and a 32 bit Sequence Number. Any transport layer protocol can be encapsulated by ESP. The Protocol field in the original IP header is set to the decimal value 50, designating the ESP protocol and the Next Header field in the ESP header carries the original protocol number identifying the transport layer protocol carried in the encrypted IP payload. Optionally the ESP payload can be authenticated by computing a keyed message digest over the body of the IP datagram and appending the MAC value as authentication data at the end of the encrypted payload. The IP header is not included in the checksum and therefore is not protected. In the case of an IPsec transport mode application where besides encryption also the protection of the IP header is required, the ESP and AH protocols can be cascaded by first encrypting the original IP payload using ESP and then authenticating both the original IP header and the ESP payload using AH. 20

21

Virtual Private Networks A Virtual Private Network (VPN) can be used by an enterprise to connect its subnets or individual hosts located at various sites over shared public or semi-public communication channels. Compared to dedicated leased lines a VPN solution can offer significant cost savings without incurring any compromises regarding security requirements. VPNs can be realised using the Layer 2 Tunneling Protocol (L2TP) defined by the IETF or the now obsolete Point-to-Point Tunneling Protocol (PPTP). Layer 2 tunnels are often transported over IP based networks using UDP as a transport medium but emulating a link layer dial-in line from source to destination. An elegant and increasingly popular VPN solution is based on layer 3 mechanisms using secure IP tunnels based on the IPsec protocol suite. IPsec Tunnels Two enterprise subnets can be securely connected with each other over the public Internet using an encrypted and authenticated IPsec tunnel. IP packets from a host on the local subnet to a host on the remote subnet are forwarded to the local Security Gateway (SEGW) which in turn tunnels the IP packets to the Security Gateway on the remote end of the IPsec tunnel where they are delivered to the destination host. The hosts belonging to the subnets are not aware of any security mechanisms. For them the Security Gateways have the function of simple routers. The encapsulation provided by the IPsec tunnels allows the use of private network addresses (e.g. 10.0.1.0/24 in one subnet and 10.0.2.0/24 in the second subnet) which are normally not routable over the Internet. 22

23

ESP Overhead 3DES AES SPI 4 4 Sequence Number 4 4 IV 8 16 Padding (worst-case) 7 15 Pad Length / Next Header 2 2 Authentication Data 12 12 -- -- IPsec Transport Mode 37 53 bytes Outer IP Header 20 20 -- -- IPsec Tunnel Mode 57 73 bytes MTU 1443 1427 bytes ==== ==== Usually Path MTU discovery based on "fragmentation needed" ICMP messages" automatically reduces the MTU from a standard LAN MTU of 1500 bytes down to a payload data size that does not lead to fragmentation when the IPsec overhead is added. 24

25

NIST Special Publication 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, November 2007 http://csrc.nist.gov/publications/nistpubs/800-38d/sp-800-38d.pdf This Recommendation specifies an algorithm called Galois/Counter Mode (GCM) for authenticated encryption with associated data. GCM is constructed from an approved symmetric key block cipher with a block size of 128 bits, such as the Advanced Encryption Standard (AES) algorithm. Thus, GCM is a mode of operation of the AES algorithm. GCM provides assurance of the confidentiality of data using a variation of the Counter mode of operation for encryption. GCM provides assurance of the authenticity of the confidential data (up to about 64 gigabytes per invocation) using a universal hash function that is defined over a binary Galois (i.e., finite) field. GCM can also provide authentication assurance for additional data (of practically unlimited length per invocation) that is not encrypted. If the GCM input is restricted to data that is not to be encrypted, the resulting specialization of GCM, called GMAC, is simply an authentication mode on the input data. In the rest of this document, statements about GCM also apply to GMAC. The two functions of GCM are called authenticated encryption and authenticated decryption. Each of these functions is relatively efficient and parallelizable; consequently, high-throughput implementations are possible in both hardware and software. IPsec ESP Overhead: 8 octet IV, 16/12/8 octet authentication tag RFC 4106 The Use of Galois/Counter Mode (GCM) in IPsec ESP RFC 4309 Using AES CCM Mode with IPsec ESP RFC 4312 The Camellia Cipher Algorithm and Its Use With IPsec 26

27

28