Securing IP Networks with Implementation of IPv6



Similar documents
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

IP Security. Ola Flygt Växjö University, Sweden

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Protocol Security Where?

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Network Security Part II: Standards

Lecture 10: Communications Security

Security Engineering Part III Network Security. Security Protocols (II): IPsec

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Laboratory Exercises V: IP Security Protocol (IPSec)

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Security vulnerabilities in the Internet and possible solutions

IP SECURITY (IPSEC) PROTOCOLS

Network Security. Lecture 3

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

CS 4803 Computer and Network Security

Lecture 17 - Network Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Internet Protocol Security IPSec

Chapter 5: Network Layer Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Case Study for Layer 3 Authentication and Encryption

Network Access Security. Lesson 10

Chapter 9. IP Secure

Site to Site Virtual Private Networks (VPNs):

Virtual Private Networks

Chapter 10. Network Security

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Internetwork Security

Security issues with Mobile IP

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Chapter 32 Internet Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Internet Security Architecture

Using IPSec in Windows 2000 and XP, Part 2

VPN. VPN For BIPAC 741/743GE

Application Note: Onsight Device VPN Configuration V1.1

Virtual Private Networks: IPSec vs. SSL

Branch Office VPN Tunnels and Mobile VPN

TLS and SRTP for Skype Connect. Technical Datasheet

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Introduction to Security and PIX Firewall

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Implementing and Managing Security for Network Communications

Cisco Which VPN Solution is Right for You?

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Network Working Group Request for Comments: Category: Standards Track December Security Architecture for the Internet Protocol

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Chapter 49 IP Security (IPsec)

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

The BANDIT Products in Virtual Private Networks

21.4 Network Address Translation (NAT) NAT concept

Chapter 3. Network Domain Security

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Chapter 7 Transport-Level Security

Chapter 4 Virtual Private Networking

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

Network Security Fundamentals

How To Secure My Data

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Introduction to Computer Security

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

IPsec Details 1 / 43. IPsec Details

CSCI 454/554 Computer and Network Security. Final Exam Review

Introduction to Internet Security

CCNA Security 1.1 Instructional Resource

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Computer and Network Security

Computer security Lecture 9

CS 494/594 Computer and Network Security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

LinkProof And VPN Load Balancing

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Virtual Private Networks

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

How To Understand And Understand The Security Of A Key Infrastructure

Network virtualization

Lab Configure a PIX Firewall VPN

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

Network Security - ISA 656 Review

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

BUY ONLINE AT:

Securing a wireless local area network - using standard security techniques

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Introduction to Computer Security

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Transcription:

Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC

Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle (MITM) Attack Solutions to these and other types of attacks are not always available.

Security Goals and implementation methods Security Goals Authentication Integrity Confidentiality Implementation Methods in IP Networks Encryption Secure hashes Digital Signatures Implementation Levels Possible in every layer of TCP/IP Stack, including IP layer (IPSec) Transport Layer through TLS

What is IPSec? IPsec defines the method that allows a node to encrypt and / or authenticate packets and encapsulate the secured packets (which may now be literally indecipherable, due to encryption) into new packets and transport them across a network.

The goal of IPsec is to provide security for all versions of IP (i.e. both IPv4 and IPv6). But it is Optional in IPv4 and Mandatory in IPv6

IP Security Issues (Features are enabled by IPsec) 1. Encryption 2. Authentication 3. Access Control 4. Integrity verification (connectionless integrity) 5. Protection against replay attacks 6. Limitation of traffic analysis attacks 7. End to end security 8. Secure tunneling

IPsec Protocol Implementation An IPsec implementation operates in a host, as a security gateway (SG), or as an independent device, affording protection to IP traffic. IPsec security services are offered at the IP layer through selection of appropriate security protocols, cryptographic algorithms, and cryptographic keys.

Encryption and Authentication Algorithms Symmetric encryption Public key encryption Key Exchange Secure hashes Digital signature

ESP and AH Headers All the security functions in IPsec are possible through the use of ESP (Encapsulating Security Payload) header and AH (Authentication Header). ESP provides mechanisms for applying any kind of cryptographic algorithm to an IP packet including encryption, digital signature, and / or secure hashes. AH provides mechanisms for applying authentication algorithms to an IP packet.

AH Provide integrity and authentication without confidentiality to IP datagrams Implementation Scenarios Security between 2 or more hosts implementing AH, Security between 2 or more gateways implementing AH, Security between a host and gateway implementing AH and a set of host or gateways.

Protocol Structure - IPsec AH: IP Authentication Header 8 16 32bit Next Header Payload Length Reserved Security parameters index (SPI) Sequence Number Field Authentication data (variable)

ESP Provide Integrity, Authentication and Confidentiality to IP datagrams Implementation Scenarios Security between 2 or more hosts implementing ESP Security between 2 or more gateways implementing ESP Security between a host or gateway implementing ESP and a set of hosts and /or gateways

Protocol Structure - ESP: Encapsulating Security Payload 16 24 32bit Security Parameter Index (SPI) Sequence Number Payload data (variable length) Padding (0-255 bytes) Pad Length Next Header Authentication Data (variable)

IPSec Implementation Modes Tunnel Mode In tunnel mode, AH and ESP are applied to tunneled IP packets. Transport Mode In transport mode, AH and ESP provide protection primarily for next layer protocols

Security Tunneling through a Hostile Network

Security Tunneling through a Hostile Network

A pair of hosts A and B communicating in the Transport Mode

Security Policy A security policy is a rule that is programmed into the IPsec implementation that tells it how to process different packets received by the device Security policies for a device are stored in the device's Security Policy Database (SPD) Outbound packets are checked against the SPD to determine the kind of IPsec processing to apply

Security Associations (SA) Security Association (SA) is fundamental to IPsec implementation. SA is much more specific than a Security Policy SA is a simplex connection Each SA will provide security using either AH or ESP but not both If both AH and ESP are used by a traffic stream, there will be two SA for that traffic stream Components of SA Security Parameter Index (SPI) IP destination Address Security Protocol (AH or ESP) identifier

Using Security Associations (Key Exchange Protocols) Internet Security Association and Key Management protocol (ISAKMP) ISAKMP provides a generalized protocol for establishing SAs and managing the cryptographic keys within an internet environment Internet Key Exchange (IKE) protocol Working within the framework of ISAKMP, it defines the mechanism for hosts to perform negotiation of SAs and authenticated keying material.

Key Management using ISAKMP

Implementing and Deploying IPsec Integrated implementation IPsec is integrated into the native IP implementation Bump in the Stack (BITS) IPsec is implemented beneath the IP stack and above the local network drivers Bump in the wire (BITW) implements IPsec in a hardware cryptographic processor

Conclusion Network security is a critical issue with modern networks working in real world situations. Hackers are always on the prowl to attack the networks to derive all possible benefits. IPsec exists for IPv4 but it was made optional. Therefore, end to end security is not guaranteed IPsec is made mandatory in IPv6. Therefore, it guarantees end to end security

Selected References Cisco Press, Deploying IPv6 networks http://72.34.43.90/ipv6/usipv6_reston_2004/wed/trhulj.pdf (accessed on 12/02/2010) http://www.6journal.org/archive/00000182/01/ipv603.pdf (accessed on 12/02/2010) http://www.cisco.com/web/si/expo2009/assets/docs/ipv6_security_groznje_in _mehanizmi_zascite_eric_vyncke.pdf (accessed on 12/02/2010) http://www.is journal.org/v02i02/2isjlp231 Rowe%20and%20Gallaher.pdf (accessed on 12/02/2010) http://www.v6summit.com/conference/presentations/security_collignon.p df (accessed on 12/02/2010) Joseph Davies, Understanding IPv6, Microsoft Press Pete Loshin, IPv6: Theory, Protocols and Practice, Elsevier Publications, 2 nd edition RFC 1825 RFC 2401 RFC 4301 Silvia Hagen, IPv6 essentials, O Reilly Publications