CSC574: Computer and Network Security Module: Network Security



Similar documents
Lecture 17 - Network Security

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Security vulnerabilities in the Internet and possible solutions

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Network Security. Lecture 3

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Protocol Security Where?

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Securing IP Networks with Implementation of IPv6

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security Fundamentals

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

IP Security. Ola Flygt Växjö University, Sweden

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Laboratory Exercises V: IP Security Protocol (IPSec)

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Using IPSec in Windows 2000 and XP, Part 2

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Lecture 10: Communications Security

CS5008: Internet Computing

Network Security Part II: Standards

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Firewalls, Tunnels, and Network Intrusion Detection

Chapter 5: Network Layer Security

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Chapter 7 Transport-Level Security

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Chapter 8 Security Pt 2

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

A S B

My FreeScan Vulnerabilities Report

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

IPsec Details 1 / 43. IPsec Details

IINS Implementing Cisco Network Security 3.0 (IINS)

Computer Networks. Secure Systems

CS 4803 Computer and Network Security

Exam Questions SY0-401

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Securing DNS Infrastructure Using DNSSEC

Implementing Cisco IOS Network Security

How do I get to

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

CCNA Security 1.1 Instructional Resource

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

Virtual Private Networks

INTRUSION DETECTION SYSTEMS and Network Security

Chapter 17. Transport-Level Security

Site to Site Virtual Private Networks (VPNs):

Gigabit SSL VPN Security Router

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Linux Network Security

Computer and Network Security Exercise no. 4

Chapter 9. IP Secure

Gigabit Multi-Homing VPN Security Router

Case Study for Layer 3 Authentication and Encryption

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Network Access Security. Lesson 10

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Chapter 10. Network Security

21.4 Network Address Translation (NAT) NAT concept

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

Introduction to Security and PIX Firewall

Client Server Registration Protocol

- Basic Router Security -

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Computer Networks: Domain Name System

Bit Chat: A Peer-to-Peer Instant Messenger

Topics in Network Security

Introduction to Computer Security

Internet Protocol Security IPSec

IP SECURITY (IPSEC) PROTOCOLS

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Implementing and Managing Security for Network Communications

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Chapter 4 Virtual Private Networking

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

CS 494/594 Computer and Network Security

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Remote Access Security

CS 3251: Computer Networking 1 Security Protocols I

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Computer security Lecture 9

Transcription:

CSC574: Computer and Network Security Module: Network Security Prof. William Enck Spring 2013 1

Networking Fundamentally about transmitting information between two devices Direct communication is now possible between any two devices anywhere (just about) Lots of abstraction involved Lots of network components Standard protocols Wired and wireless Works in protection environment What about ensuring security? 2

Network Security Every machine is connected What is trust model of the network? Not just limited to dogs as users What other dogs are out there? 3

Exploiting the network... The Internet is extremely vulnerable to attack it is a huge open system... which adheres to the end-to-end principle smart end-points, dumb network Can you think of any large-scale attacks that would be enabled by this setup? 4

The End-to-End Argument Clark et. al discussed a property of good systems that says features should be placed as close to resources as possible In communication, this means that we want the middle of the network to be simple, and the end-points to be smart (e.g., do everything you can at the end-points Dumb, minimal network This is the guiding principle of IP (Internet) Q: Does this have an effect on security? Note: this is a departure from the early networks which smart network, dumb terminals 5

Network security: the high bits? a collection of interconnected computers with resources that must be protected from unwanted inspection or modification while maintaining adequate quality of service. The network is Another way of seeing network security is...... securing the network infrastructure such that the integrity, confidentiality, and availability of the resources is maintained. 6

The network (edge) (perimeter) Internet LAN (remote hosts/ (server) servers) (hosts/desktops) 7

The big picture. Internet Protocol (IP) Really refers to a whole collection of protocols making up the vast majority of the Internet Routing How these packets move from place to place Network management Administrators have to maintain the services and infrastructure supporting everyone s daily activities 8

Security Problems in the TCP/IP Protocol Suite Bellovin s observations about security problems in IP Not really a study of how IP is misused, e.g., IP addresses for authentication, but really what is inherently bad about the way in which IP is setup A really, really nice overview of the basic ways in which security and the IP design is at odds 9

Sequence number prediction TCP/IP uses a three-way handshake to establish a connection 1. C -> S: Q C 2. S -> C: Q S, ack(q C ) where sequence number Q S is nonce 3. C -> S: ack(q S ) then send data 2. However assume the bad guy does not hear msg 2, if he can guess Q S, then he can get S to accept whatever data it wants (useful if doing IP authentication, e.g., rsh ) Client Server Adversary 10

Sequence Number Prediction (fixes) The only way you really fix this problem to stop making the sequence numbers predictable: Randomize them -- you can use DES or some other mechanism to generate them randomly There is an entire sub-field devoted to the creation and management of randomness in OSes Also, you could look for inconsistencies in timing information Assumption: the adversary has different timing than OK, maybe helpful, but far from definitive 11

Routing Manipulation RIP - routing information protocol Distance vector routing protocol used for local network Routers exchange reachability and distance vectors for all the subnetworks within (a typically small) domain Use vectors to decide which is best, notification of changes is propagated quickly So, the big problem is that you receive vast amounts of data that a router uses to form the routing table So, just forge that, and the game is up Manipulate paths, DOS, hijack connections, etc. Solutions: Authenticate data, but this is less than obvious how to do this efficiently (a whole lot of people are trying) 12

Internet Control Message Protocol (ICMP) ICMP is used as a control plane for IP messages Ping (connectivity probe) Destination Unreachable (error notification) Time-to-live exceeded (error notification) These are largely indispensable tools for network management and control Error notification codes can be used to reset connections without any Solution: verify/sanity check sources and content ICMP returned packets Real solution: filter most of ICMP, ignore it 13

The ping of death In 1996, someone discovered that many operating systems, routers, etc. could be crash/rebooted by sending a single malformed packet It turns out that you can send a IP packet larger than 65,535 (2 16 ), it would crash the system The real reason lies in the way fragmentation works It allows somebody to send a packet bigger than IP allows Which blows up most fixed buffer size implementations and dumps core, blue screen of death, etc. Note: this is not really ICMP specific, but easy (try it)!% ping -l 65510 your.host.ip.address This was a popular pastime of early hackers 14

Address Resolution Protocol (ARP) Protocol used to map IP address onto the physical layer addresses (MAC) 1) ARP request: who has x.x.x.x? 2) ARP response: me! Policy: last one in wins Used to forward packets on the appropriate interfaces by network devices (e.g., bridges) Q: Why would you want to spoof an IP address? 15

ARP poisoning Attack: replace good entries with your own Leads to Session hijacking Man-in-the-middle attacks Denial of service, etc. Lots of other ways to abuse ARP. Nobody has really come up with a good solution Except smart bridges, routers that keep track of MACs However, some not worried If adversary is in your perimeter, you are in big trouble You should never should validate the source of each pack independently (e.g., via IPsec) 16

Legacy flawed protocols/services Finger user identity (my advisor hated this) host gives up who is logged in, existence of identities % finger will Login: will Name: Will Enck Directory: /Users/will Shell: /bin/zsh Last login Thu Feb 10 23:58 (EST) on ttys000 No Mail. No Plan. % This is horrible in a distributed environment Privacy, privacy, privacy Lots of information to start a compromise of the user. 17

POP/SMTP/FTP Post office protocol - mail retrieval Passwords passed in the clear (duh) Solution: SSL, SSH, Kerberos Simple mail transport protocol (SMTP) - email Nothing authenticated: SPAM Nothing hidden: eavesdropping Solution: your guess is as good as mine File Transfer protocol - file retrieval Passwords passed in the clear (duh) Solution: SSL, SSH, Kerberos 18

DNS - The domain name system DNS maps between IP address (152.14.86.15) and domain and host names (www.csc.ncsu.edu) How it works: the root servers redirect you to the top level domains (TLD) DNS servers, which redirect you to the appropriate sub-domain, and recursively. Note: there are 13 root servers that contain the TLDs for.org,.edu, and country specific registries (.fr,.ch) root edu ncsu.edu csc.ncsu.edu www.csc.ncsu.edu? 152.14.86.15 Host Resolver 19

A DNS query (2) www.enck.org? (3) redirect (4) www.enck.org? (5) redirect (6) www.enck.org? a-root-servers.net a.gtld-servers.org ns-enck.org (7) 206.174.130.40 ISP Nameserver (1) www.enck.org? (8) 206.174.130.40 User PC 20

A DNS query (2) www.enck.org? (3) redirect (4) www.enck.org? (5) redirect (6) www.enck.org? a-root-servers.net a.gtld-servers.org ns-enck.org (7) 206.174.130.40 ISP Nameserver DNS Cache www.enck.org = 206.174.130.40 (1) www.enck.org? (8) 206.174.130.40 User PC 20

Glue information Suppose you ask a name server for a record and it redirects you to another name server (NS record) e.g., if you ask a root for a NS (name server) record for NET, it returns NS records for the authoritative servers for.net It will also give you the A (resource) record for the authoritative servers you were directed to avoid looking them up This is known as the glue records 21

DNS Vulnerabilities Nothing is authenticated, so really the game is over You can not really trust what you hear But, many applications are doing just that. Spoofing of DNS is really dangerous Moreover, DNS is a catalog of resources Zone-transfers allow bulk acquisition of DNS data and hence provide a map for attacking the network Lots of opportunity to abuse the system Relies heavily on caching for efficiency -- cache pollution Once something is wrong, it can remain that way in caches for a long time (e.g., it takes a long time flush) Data may be corrupted before it gets to authoritative server 22

A Cache Poisoning Attack All requests have a unique query ID The nameserver/resolver uses this information to match up requests and responses If an adversary can guess the query ID, then it can forge the responses and pollute the DNS cache 16-bit query IDs (not hard) Some servers increment IDs (or use other bad algo.) First one in wins!!! Note: If you can observe the traffic going to a name server, you can pretty much arbitrarily own the Internet for the clients it serves. 23

Kaminsky DNS Vulnerability 1.Query a random host in a victim zone, e.g., 1234.csc.ncsu.edu 2.Spoof responses* as before, but delegate authority to some server which you own. 1. The glue records you give make you authoritative 3.You now own the domain. *the original attack exploited poor ID selection 24

Kaminski Fixes Make the ID harder to guess (randomized ports) Amplified ID space from 2 16 to 2 27 Prevent foreign requests from being processed E.g., filter requests from outside domain Observe and filter conflicting requests E.g., if you see a lot of bogus looking requests, be careful All of this treats the symptoms, not the disease. Lack of authenticated values Thus, if you can observe request traffic, prevent legitimate responses, or are just plain patient, you can mount these attacks. 25

DNSsec A standard-based (IETF) solution to security in DNS Prevents data spoofing and corruption Public key based solution to verifying DNS data Authenticates Communication between servers DNS data content existence non-existence Public keys (a bootstrap for PKI?) 26

DNSsec Mechanisms TSIG : transaction signatures protect DNS operations Zone loads, some server to server requests (master -> slave), etc. Time-stamped signed responses for dynamic requests A misnomer -- it currently uses shared secrets for TSIG (HMAC) or do real signatures using public key cryptography SIG0: a public key equivalent of TSIG Works similarly, but with public keys Not as popular as TSIG, being evaluated Note: these mechanisms assume clock sync. (NTP) 27

DNSsec Mechanisms Securing the DNS records Each domain signs their zone with a private key Public keys published via DNS Indirectly signed by parent zones Ideally, you only need a self-signed root, and follow keys down the hierarchy Signs Signs Signs root.edu ncsu.edu csc.ncsu.edu 28

DNSsec challenges Incremental deployability Everyone has DNS, can t assume a flag day Resource imbalances Some devices can t afford real authentication Cultural Most people don t have any strong reason to have secure DNS ($$$ not justified in most environments) Lots of transitive trust assumptions (you have no idea how the middlemen do business) Take away: DNSsec will be deployed, but it is unclear whether it will be used appropriately/widely 29

Transport Security A host wants to establish a secure channel to remote hosts over an untrusted network Not Login end-users may not even be aware that protections in place (transparent) Remote hosts may be internal or external The protection service must Authenticate the end-points (each other) Negotiate what security is necessary (and how achieved) Establish a secure channel (e.g., key distribution/agreement) Process the traffic between the end points Also known as communications security. 30

IPsec (not IPSec!) Host level protection service IP-layer security (below TCP/UDP) De-facto standard for host level security Developed by the IETF (over many years) Available in most operating systems/devices E.g., XP, Vista, OS X, Linux, BSD*, Implements a wide range of protocols and cryptographic algorithms Selectively provides. Confidentiality, integrity, authenticity, replay protection, DOS protection 31

IPsec and the IP protocol stack IPsec puts the two main protocols in between IP and the other protocols HTTP TCP FTP SMTP UDP AH - authentication header AH ESP ESP - encapsulating security payload IP Other functions provided by external protocols and architectures 32

Modes of operation Transport : the payload is encrypted and the nonmutable fields are integrity verified (via MAC) MACed encrypted Header Payload Header Payload Tunnel : each packet is completely encapsulated (encrypted) in an outer IP packet Hides not only data, but some routing information MACed encrypted Header Payload Header Header Payload 33

Transport Example (ipsec-howto.org) #!/usr/sbin/setkey -f # Configuration for 192.168.2.100 # Flush the SAD and SPD flush; spdflush; # Attention: Use this keys only for testing purposes! # Generate your own keys! # AH SAs using 128 bit long keys add 192.168.1.100 192.168.2.100 ah 0x200 -A hmac-md5 0xc0291ff014dccdd03874d9e8e4cdf3e6; add 192.168.2.100 192.168.1.100 ah 0x300 -A hmac-md5 0x96358c90783bbfa3d7b196ceabe0536b; # ESP SAs using 192 bit long keys (168 + 24 parity) add 192.168.1.100 192.168.2.100 esp 0x201 -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831; add 192.168.2.100 192.168.1.100 esp 0x301 -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df; # Security policies spdadd 192.168.1.100 192.168.2.100 any -P in ipsec esp/transport//require ah/transport//require; Only thing that changes between 192.168.1.100 and 192.168.2.100 spdadd 192.168.2.100 192.168.1.100 any -P out ipsec esp/transport//require ah/transport//require; 34

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer 35

Tunneling IP over IP Network-level packets are encapsulated Allows traffic to avoid firewalls IP layer IP layer 35

Tunnel Example (ipsec-howto.org) #!/usr/sbin/setkey -f # Flush the SAD and SPD flush; spdflush; # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) # and authentication using 128 bit long keys add 192.168.1.100 192.168.2.100 esp 0x201 -m tunnel -E 3des-cbc 0x7aeaca3f87d060a12f4a4487d5a5c3355920fae69a96c831 -A hmac-md5 0xc0291ff014dccdd03874d9e8e4cdf3e6; add 192.168.2.100 192.168.1.100 esp 0x301 -m tunnel -E 3des-cbc 0xf6ddb555acfd9d77b03ea3843f2653255afe8eb5573965df -A hmac-md5 0x96358c90783bbfa3d7b196ceabe0536b; # Security policies spdadd 172.16.1.0/24 172.16.2.0/24 any -P out ipsec esp/tunnel/192.168.1.100-192.168.2.100/require; spdadd 172.16.2.0/24 172.16.1.0/24 any -P in ipsec esp/tunnel/192.168.2.100-192.168.1.100/require; 36

IPsec Protocol Suite Policy/ Configuration Managent Key Management Packet Processing (SPS) Security Policy System Manual (ESP) Encapsulating Security Payload (IKE) Internet Key Exchange (AH) Authentication Header 37

Internet Key Exchange (IKE) Built on of ISAKMP framework Two phase protocol used to establish parameters and keys for session Phase 1: authenticate peers, establish secure channel Phase 2: negotiate parameters, establish a security association (SA) The details are unimaginably complex The SA defines algorithms, keys, and policy used to secure the session 38

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

IPsec: Packet Handling (Bump ) IP Protocol Stack Application Presentation Session Transport SADB Network (IP) IPsec Data Link Physical 39

Authentication Header (AH) Authenticity and integrity via HMAC over IP headers and data Advantage: the authenticity of data and IP header information is protected it gets a little complicated with mutable fields, which are supposed to be altered by network as packet traverses the network some fields are immutable, and are protected Confidentiality of data is not preserved Replay protection via AH sequence numbers note that this replicates some features of TCP (good?) 40

Authentication Header (AH) Modifications to the packet format IP Header Payload IP Header AH Header MAC Payload AH Packet Authenticated Encrypted 41

IPsec AH Packet Format IPv4 AH Packet Format IPv4 Header Authentication Header Higher Level Protocol Data AH Header Format Next Header Length Reserved Security Parameter Index Authentication Data (variable number of 32-bit words) 42

IPsec Authentication SPI: (spy) identifies the security association for this packet Type of crypto checksum, how large it is, and how it is computed Really the policy for the packet Authentication data Hash of packet contents include IP header as as specified by SPI Treat transient fields (TTL, header checksum) as zero Keyed MD5 Hash is default MD5 Hash Secret Key Key Headers and data being sent Key 43

Encapsulating Security Payload (ESP) Confidentiality, authenticity and integrity via encryption and HMAC over IP payload (data) Advantage: the security manipulations are done solely on user data TCP packet is fully secured simplifies processing Use null encryption to get authenticity/integrity only Note that the TCP ports are hidden when encrypted good: better security, less is known about traffic bad: impossible for FW to filter/traffic based on port Cost: can require many more resources than AH 44

Encapsulating Security Payload (ESP) Modifications to packet format IP Header Payload IP Header ESP Header Payload ESP Trailer MAC ESP Packet Authenticated Encrypted 45

IPsec ESP Packet Format IP Header IPv4 ESP Packet Format Unencrypted Other IP Headers ESP Header Encrypted Encrypted Data ESP Header Format Security Parameter Identifier (SPI) Opaque Transform Data, variable length DES + MD5 ESP Format Security Parameters Index (SPI) Initialization Vector (optional) Replay Prevention Field (incrementing count) Payload Data (with padding) Authentication checksum 46

Practical Issues and Limitations IPsec implementations Large footprint resource poor devices are in trouble New standards to simplify (e.g, JFK, IKE2) Slow to adopt new technologies Configuration is really complicated/obscure Issues IPsec tries to be everything for everybody at all times Massive, complicated, and unwieldy Policy infrastructure has not emerged Large-scale management tools are limited (e.g., CISCO) Often not used securely (common pre-shared keys) 47

Network Isolation: VPNs Idea: I want to create a collection of hosts that operate in a coordinated way E.g., a virtual security perimeter over physical network Hosts work as if they are isolated from malicious hosts Solution: Virtual Private Networks Create virtual network topology over physical network Use communications security protocol suites to secure virtual links tunneling Manage networks as if they are physically separate Hosts can route traffic to regular networks (split-tunneling) 48

VPN Example: RW/Telecommuter (network edge) Internet LAN Physical Link Logical Link (IPsec) 49

VPN Example: Hub and Spoke (network edge) Internet LAN Physical Link Logical Link (IPsec) 50

VPN Example: Mesh (network edge) Internet LAN Physical Link Logical Link (IPsec) 51

Virtual LANs (VLANs) VPNs built with hardware Physically wire VPN via soft configuration of a switch crossbar No encryption none needed wire based isolation Many switches support VLANs Allows networks to be reorganized without rewiring Example usage: two departments in same hallway Each office is associated with department Configuring the network switch gives physical isolation Note: often used to ensure QoS A B C D E A B C D E VLAN 1: A,B VLAN 2: C,D,E 52