Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1



Similar documents
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Computer Networks. Secure Systems

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Network Security. Lecture 3

Protocol Security Where?

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Chapter 7 Transport-Level Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Securing IP Networks with Implementation of IPv6

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Lecture 17 - Network Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Implementing and Managing Security for Network Communications

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

VPN. VPN For BIPAC 741/743GE

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Virtual Private Networks

Introduction to Security and PIX Firewall

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Microsoft Azure Configuration

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Lecture 10: Communications Security

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Chapter 10. Network Security

Network Access Security. Lesson 10

Branch Office VPN Tunnels and Mobile VPN

CCNA Security 1.1 Instructional Resource

Overview. Protocols. VPN and Firewalls

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

TLS and SRTP for Skype Connect. Technical Datasheet

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica

Computer and Network Security Exercise no. 4

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Transport Layer Security Protocols

Virtual Private Networks

How To Understand And Understand The Security Of A Key Infrastructure

SSL VPN connection multiplexing techniques

Networking Basics and Network Security

Network Security Essentials Chapter 5

Linux MDS Firewall Supplement

Laboratory Exercises V: IP Security Protocol (IPSec)

21.4 Network Address Translation (NAT) NAT concept

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Chapter 32 Internet Security

Paranoid Penguin - Linux VPN Technologies

Network Security and Firewall 1

This section provides a summary of using network location profiles to identify network connection types. Details include:

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Lecture 9 - Network Security TDTS (ht1)

IPV6 vs. SSL comparing Apples with Oranges

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Exam Questions SY0-401

Cornerstones of Security

This chapter describes how to set up and manage VPN service in Mac OS X Server.

z/os Firewall Technology Overview

Security vulnerabilities in the Internet and possible solutions

Chapter 49 IP Security (IPsec)

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Configuring Eduroam on Microsoft Windows Vista and 7 (all editions, 32 and 64 bits)

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

CSCI 454/554 Computer and Network Security. Final Exam Review

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

CS5008: Internet Computing

TLS/SSL in distributed systems. Eugen Babinciuc

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Lab Objectives & Turn In

Understanding the Cisco VPN Client

Network Security Part II: Standards

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Transport Level Security

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Firewall VPN Router. Quick Installation Guide M73-APO09-380

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

CSE/EE 461 Lecture 23

Transcription:

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

Communication between User and Server: In the form of packets. Traverse several Routers. Can be intercepted by a BadBoy. Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 2

14:34:50.808982 user.domain.com.35558 > www.porn.com.80: tcp 137 (DF) 0x0000 4500 00bd 524e 4000 4006 0079 ac10 0002 E...RN@.@..y... 0x0010 d882 d8d6 8ae6 0050 d683 1771 9f37 920d...P...q.7.. 0x0020 8018 16d0 bb19 0000 0101 080a 0639 453d...9E= 0x0030 1858 219f 4745 5420 2f70 6f72 6e2f 696e.X!.GET./porn/in 0x0040 6465 782e 6874 6d6c 2048 5454 502f 312e dex.html.http/1. 0x0050 300d 0a55 7365 722d 4167 656e 743a 2057 0..User-Agent:.W 0x0060 6765 742f 312e 382e 320d 0a48 6f73 743a get/1.8.2..host: 0x0070 2077 7777 2e70 6f72 6e2e 636f 6d0d 0a41.www.porn.com..A 0x0080 6363 6570 743a 202a 2f2a 0d0a 4175 7468 ccept:.*/*..auth 0x0090 6f72 697a 6174 696f 6e3a 2042 6173 6963 orization:.basic 0x00a0 2062 4739 7663 3256 794f 6c42 6c5a 4739.bG9vc2VyOlBlZG9 0x00b0 7761 476c 735a 513d 3d0d 0a0d 0a waglszq==... What a BadBoy can see in this packet... It's a cleartext request for a webpage www.porn.com server name /porn/index.html document name Authorization encoded username and password Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 3

The Authorization string contains an encoded username and password. Authorization: Basic bg9vc2vyolblzg9waglszq== Type Basic means Base64 encoding. $ echo bg9vc2vyolblzg9waglszq== openssl base64 -d looser:pedophile Here we are... username looser, password Pedophile :-) Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 4

Majority of the Internet traffic is in cleartext (non encrypted). Vulnerable protocols Telnet, POP3, IMAP, HTTP, SMTP and almost every other... Possible risks Passive eavesdropping Gathering passwords and other sensitive information. Active man in the middle Replay attack resending a piece of informtion many times. Packet modifications changing the information on the way between user and server. Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 5

... and brings privacy and confidentiality Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 6

On the application level Application to application security SSH, Kerberos, PGP,... Generic SSL/TLS protocol used with many services: HTTPs, IMAPs, POP3s,... On the network level Host to host or even Network to network security No need to modify the applications IPsec, CIPE, proprietary VPN solutions Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 7

CIPE Linux and Windows only. Preshared keys only. Uses UDP packets. Doesn't work with Linux kernel 2.6. Only two ciphers available. IPsec Widely supported standard. Preshared keys, RSA keys, X.509 cetrificates, Kerberos tickets. Uses ESP and/or AH protocol. Could be encapsulated in UDP. Two implementations for kernel 2.6 available. Currently 8 ciphers and 6 digests to choose from. Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 8

Kernel Keeps the symmetric encryption keys and security policies Encrypts outgoing packets Decrypts and verifies incoming packets Uses ESP and/or AH protocol (IP protocols). Userspace daemon Negotiates the keys with the other party Pushes the keys and security policies into the kernel Uses IKE protocol (UDP protocol). Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 9

Kernel Two implementations FreeS/WAN Available since 2.0.x kernel Requires FreeS/WAN userspace. More mature Native IPsec stack Available since 2.6.0 RFC based API Still has some problems Used in SUSE Linux'kernel Userspace Three choices (Super)FreeS/WAN Most widely used Many extensions Shipped in SUSE Linux IPsec tools Ported from NetBSD Only for native 2.6 IPsec ISAKMPd Ported from OpenBSD Only for native 2.6 IPsec Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 10

Only two types of the traffic on the wire: IKE Key exchange and connection control ESP Encrypted traffic Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 11

IP protocol #50 Provides encryption Prevents eavesdropping BadBoys can still see the traffic, but can't understand it. Provides authentication Prevents man in the middle attacks Ensures that the packet wasn't modified since it was sent. Prevents replay attack every packet is accepted only once. Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 12

IP protocol #49 Provides only authentication, no encryption Not really usefull with IPv4 ESP provides similar functionality Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 13

UDP protocol, port 500 Implemented in userspace. Can use different methods for peer's authentication: Preshared keys X.509 certificates RSA keys Kerberos tickets Result is a key used for ESP/AH protocols. Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 14

NAT Traversal (NAT T) Encapsulates IPsec traffic into UDP packets for passing through NAT gateways and firewalls. Native IPsec With NAT T Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 15

Encapsulates only the transported data, not the IP headers. Used for host to host connections. Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 16

The whole original packet is encapsulated. Used for network to network connections. Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 17

Firewalling the encrypted traffic Only ESP protocol and UDP port 500 required: # iptables -A INPUT -p udp dport 500 -j ACCEPT # iptables -A INPUT -p esp -j ACCEPT Firewalling the tunelled traffic Done on device ipsec0 (only with FreeS/WAN) Example: blocking outgoing ICMP over IPsec tunnel # iptables -A FORWARD -p icmp -o ipsec0 -j DROP Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 18

Advanced topics for interested audience SPDB Security Policy Database Contains IPsec policies for different From< >To traffic. SADB Security Association Database Holds cryptographic keys for use with ESP/AH. PF_KEYv2 Kernel interface for managing SADB and SPDB entries. Read more in appropriate RFCs : ) Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 19

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 20