Protocol Security Where?



Similar documents
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

CS 4803 Computer and Network Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Securing IP Networks with Implementation of IPv6

21.4 Network Address Translation (NAT) NAT concept

Chapter 9. IP Secure

Chapter 32 Internet Security

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

IP Security. Ola Flygt Växjö University, Sweden

Overview. Protocols. VPN and Firewalls

IPsec Details 1 / 43. IPsec Details

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Introduction to Security and PIX Firewall

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Network Security. Lecture 3

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Lecture 17 - Network Security

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Computer and Network Security Exercise no. 4

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Chapter 5: Network Layer Security

Chapter 10. Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Laboratory Exercises V: IP Security Protocol (IPSec)

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Network Security Part II: Standards

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Introduction to Computer Security

IP SECURITY (IPSEC) PROTOCOLS

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Branch Office VPN Tunnels and Mobile VPN

Implementing and Managing Security for Network Communications

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Virtual Private Networks

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Introduction to Computer Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Internet Protocol Security IPSec

Network Working Group Request for Comments: Category: Standards Track December Security Architecture for the Internet Protocol

Insecure network services

ETSF10 Part 3 Lect 2

Chapter 4 Virtual Private Networking

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Wireless Networks. Welcome to Wireless

Internetwork Security

High Performance VPN Solutions Over Satellite Networks

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Using IPSec in Windows 2000 and XP, Part 2

Internet Protocol: IP packet headers. vendredi 18 octobre 13

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Internet Security Architecture

Remote user access VPN with IPsec

Virtual Private Networks

LinkProof And VPN Load Balancing

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

This section provides a summary of using network location profiles to identify network connection types. Details include:

CSCI 454/554 Computer and Network Security. Final Exam Review

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Network Security - ISA 656 Review

Computer Networks. Secure Systems

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Network virtualization

Network Security Fundamentals

Cryptography and network security CNET4523

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Chapter 11 Cloud Application Development


WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

CS 494/594 Computer and Network Security

Using IPsec VPN to provide communication between offices

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Solution of Exercise Sheet 5

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Tomás P. de Miguel DIT-UPM. dit UPM

Security issues with Mobile IP

Firewalls, Tunnels, and Network Intrusion Detection

Computer Networks - CS132/EECS148 - Spring

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Transcription:

IPsec: AH and ESP 1

Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos Transport layer: (+): security mostly seamlessly e.g., TLS Network layer: (+) reduced key management, fewer application changes, fewer implementations, VPN; (- ): multiuser machines Data link layer: (+): speedl (-): hop-by-hop only 2

Documents 3

IPsec Objectives Why do we need IPsec? IP V4 has no authentication IP Spoofing Payload could be changed without detection IP V4 has no confidentiality mechanism Eavesdropping Denial of Service Attacks Cannot hold the attacker accountable due to the lack of authentication IPsec Objectives IP layer security mechanisms for IP V4 and V6 Not all applications need to be security aware Can be transparent to users Provide authentication and confidentiality mechanisms IPsec AH (Authentication Header) and ESP (Encapsulating Security Payload) IP header extensions for carrying cryptographically protected data IKE (Internet Key Management) Authenticating and establishing a session key 4

IPsec Architecture 5

Security Associations (SA) SA is a cryptographically protected connection An association between a sender and a receiver Consists of a set of security related parameters One way relationship: unidirectional Determine IPSec processing for senders Determine IPSec decoding for destination SAs are not fixed! Generated and customized per traffic flows 6

Security Parameter Index (SPI) A bit string assigned to a SA Carried in the IPsec header The SPI allows the destination to select the correct SA under which the received packet will be processed (according to the agreement with the sender) SPI + Dest IP Address + IPsec Protocol (flag for whether it is AH or ESP) Uniquely identify each SA 7

Security Association Database (SAD) Holds parameters for each SA When transmitting to X, look up X in SAD SPI Up to 32 bits large Allow the destination to select the correct SA Key Algorithms Sequence number When receiving an IP packet, look up SPI in SAD 8

Security Policy Database (SPD) Which types of packets should be dropped? Which should be forwarded or accepted without IPsec protection? Which should be protected by IPsec? If protected, encrypted and/or integrity-protected? Index into SPD by Selector fields Dest IP, Source IP, Transport Protocol, IPSec Protocol, Source & Dest Ports, 9

Hosts & Gateways Hosts can implement IPSec to : Other hosts in transport or tunnel mode Gateways with tunnel mode Gateways to gateways - tunnel mode 10

Tunnel Mode Encrypted Tunnel Gateway Gateway A Unencrypted Encrypted Unencrypted B New IP Header AH or ESP Header Orig IP Header TCP Data 11

Tunnel Mode Outer IP header IPSec header Inner IP header Higher layer protocol Destination IPSec entity ESP AH Real IP destination ESP applies only to the tunneled packet AH can be applied to portions of the outer header 12

IPsec, tunnel mode, between firewall 13

Transport Mode IP header IP options IPSec header Higher layer protocol Real IP destination ESP AH ESP protects higher layer payload only AH can protect IP headers as well as higher layer payload 14

Outbound Processing IP Packet Outbound packet (on A) Is it for IPSec? If so, which policy entry to select? SPD (Policy) A SA Database B IPSec processing Determine the SA and its SPI SPI & IPSec Packet 15 Send to B

Inbound Processing Inbound packet (on B) A B From A SPI & Packet SA Database SPD (Policy) Use SPI to index the SAD Was packet properly secured? un-process Original IP Packet 16

NAT (Network Address Translation) What is it? With a NAT box, the computer on your internal network do not need global IPv4 addresses in order to connect to the Internet NAT box translates an internal IP The problem An IPsec tunnel cannot go through a NAT box because the NAT box wants to update the IP address inside the encrypted data and it does not have the key For transport mode, IP address is included in the computation of the TCP/UDP checksum 17

IP Header Protocol field: ESP=50, AH=51 18

AH (Authentication Header) Data integrity: Entire packet has not been tampered with Authentication: 1. Can trust IP address source;2. Use MAC to authenticate Anti-replay feature Integrity check value Immutable or predictable IP header fields: version, IH length, total length, identification, protocol, source, destination (source node => predictable) Upper-level data 19

AH in Transport Mode 20

AH in Tunnel Mode 21

Encapsulating Security Payload (ESP) 22

ESP 23

ESP 24