Objectives IPSec architecture and concepts IPSec authentication header IPSec encapsulating security payload

Similar documents
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Protocol Security Where?

IPsec Details 1 / 43. IPsec Details

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Security Engineering Part III Network Security. Security Protocols (II): IPsec

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Securing IP Networks with Implementation of IPv6

21.4 Network Address Translation (NAT) NAT concept

IP Security. Ola Flygt Växjö University, Sweden

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security vulnerabilities in the Internet and possible solutions

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Chapter 5: Network Layer Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Network Security Part II: Standards

IP SECURITY (IPSEC) PROTOCOLS

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 17 - Network Security

Lecture 10: Communications Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Lecture 3

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Internet Ideal: Simple Network Model

Chapter 7 Transport-Level Security

Implementing and Managing Security for Network Communications

Chapter 10. Network Security

Introduction to Security and PIX Firewall

Chapter 9. IP Secure

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Internetwork Security

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Chapter 4 Virtual Private Networking

Using IPSec in Windows 2000 and XP, Part 2

Laboratory Exercises V: IP Security Protocol (IPSec)

Chapter 32 Internet Security

IPv6 Security: How is the Client Secured?

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

MINI-FAQ: OpenBSD 2.4 IPSEC VPN Configuration

Introduction to Computer Security

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Application Note: Onsight Device VPN Configuration V1.1

CS 494/594 Computer and Network Security

CS 4803 Computer and Network Security

Internet Security Architecture

IPV6 vs. SSL comparing Apples with Oranges

Firewalls, Tunnels, and Network Intrusion Detection

Computer and Network Security

Branch Office VPN Tunnels and Mobile VPN

Lab Configure a PIX Firewall VPN

Introduction to Computer Security

Chapter 49 IP Security (IPsec)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Overview - Using ADAMS With a Firewall

Client Server Registration Protocol

Network Working Group Request for Comments: Category: Standards Track December Security Architecture for the Internet Protocol

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Internet Protocol Security IPSec

Overview - Using ADAMS With a Firewall

Computer and Network Security Exercise no. 4

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Security Technology: Firewalls and VPNs

Computer Security: Principles and Practice

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Network Security Essentials Chapter 5

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Overview. Protocols. VPN and Firewalls

Ethernet. Ethernet. Network Devices

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Lecture 23: Firewalls

z/os Firewall Technology Overview

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Insecure network services

IP - The Internet Protocol

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

Approaches to Multicast over Firewalls: an Analysis

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Network Access Security. Lesson 10

Most Common DMVPN Troubleshooting Solutions

Computer Networks. Secure Systems

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Chapter 17. Transport-Level Security

Wireless Networks. Welcome to Wireless

Understanding the Cisco VPN Client

Chapter 8 Virtual Private Networking

Transcription:

IP Security Objectives IPSec architecture and concepts IPSec authentication header IPSec encapsulating security payload http://www.ietf.org/html.charters/ipsec-charter.html Web Security: Network Level Provide security using IPSec Advantages: Transparent to users and applications Filtering : only selected traffic need incur the overhead of IPSec processing 1

Problem: Why IP Security? Traditional IP does not directly handle encryption/authentication of traffic......there was a need as identified in 1994 to secure the network infrastructure from unauthorized monitoring and control of network traffic and end-to-end-user traffic (Stallings, 1999) Recommendations of Internet Architecture Board Include authentication/encryption in next-generation IP concepts compatible both with IPv4 and IPv6 These features are MANDATORY for IPv6 implementations and OPTIONAL for IPv4 implementations Both implementations use the extension header method IPSec Objectives Band-aid for IPv4: known vulnerabilities Replay Wiretap Spoofing and Masquerading Hijacking of connections IP layer mechanism for IPv4 and IPv6 Not all applications need to be security aware Can be transparent to users sometimes used interchangeably with IPv6, but it is more correct to think of IPv6 as a protocol incorporating IPSEC philosophies 2

IPv6 includes IPSEC Protocol to support authentication of data origin, data integrity, and encryption for privacy Techniques Authentication Header and Encapsulating Security Payload Security associations between connections, connection sets Benefits of IPSec In a firewall/router, it provides strong security to all traffic crossing the perimeter (no overhead for local) It is below transport layer, hence transparent to applications It can be transparent to end users It can provide security for individual users if desired 3

Security Depends Upon secure protocols but also (among others) cryptographic strength implementation quality good random number sources end system security system management. IP Security Architecture The specification is quite complex, defined in numerous RFC s (Main ones RFC 2401/2402/2406/2408) There are seven groups within the original IP Security Protocol Working Group, based around the following: Architecture (general issues, requirements, mechanisms) Encapsulating Security Payload, ESP (packet form and usage for encryption and some auth) Authentication Header, AH (packet form and usage for auth) Encryption Algorithm (how different ones are used) Authentication Algorithm (using algorithms for AH and ESP) Key management (schemes) Domain of Interpretation (relating the other ones) 4

Next level IPSec lets systems do the following: Allow selection of required security protocols Decide on which algorithms to use on which services, Deal with the key issue These choices are guided by the two protocols: Authentication Header authentication and integrity of payload and header Encapsulating Security Payload without authentication: confidentiality of payload with authentication: confidentiality, authentication and integrity of payload Some services can only be provided with certain combinations of AH, ESP with and ESP without. Components and Concepts Host or gateway implementation Tunnel vs. Transport mode Security association (SA) Security parameter index (SPI) Security policy database (SPD) SA database (SAD) Encapsulating security payload (ESP) Authentication header (AH) 5

Hosts and Gateways Hosts can implement IPSec to : Other hosts in transport or tunnel mode Gateways with tunnel mode Gateways to gateways - tunnel mode IPSEC Security Association SA is a one-directional relationship between sender and receiver Determines IPSec processing for sender and IPSec decoding for destination SAs are not fixed, but generated and customized per traffic flows SA applies to AH or ESP but not both two-way secure exchange of IP packets requires two SAs SAs are established by management protocols (IKE) manually 6

IPSEC Security Association referenced by a 32 bit Security Parameter Index (SPI) carried in header of each IPSEC packet The SPI allows the destination to select the correct SA under which the received packet will be processed (according to the agreement with the sender) SA for an IP packet uniquely identified by SPI destination IP address IPSec protocol (AH or ESP) SA Parameters sequence number counter: 32 bit overflow flag: indicating abort or not on overflow anti-replay window: to check inbound replay AH information: algorithm, key, key lifetime ESP information: algorithm, key, key lifetime for encryption and authentication lifetime of SA: time interval or byte count IPSEC protocol mode: transport, tunnel, wildcard (allows same SA to be used, for either tunnel or transport, on a per-packet basis, specified by the application) path MTU (maximum transmission unit) 7

SA Database - SAD Holds parameters for each SA Lifetime of this SA AH and ESP information Tunnel or transport mode Every host or gateway participating in IPSec has own SA database (not specified how expected functionalities are provided) IPSEC Traffic Protocols both IP AH and IP ESP can operate in transport mode end-to-end tunnel mode security-gateway to security-gateway transport mode and tunnel model can coexist 8

Transport Mode Transport Mode good for upper layer protocols authentication is between the client and server workstations workstation may be either local or remote workstation and server share a protected secret key Tunnel Mode Tunnel Mode protects entire IP packet authentication is between remote workstation and corporate firewall authentication for access to entire internal network or because the server doesn t speak authentication (called standards based tunneling as opposed to some other forms which do not adhere to any specific standard). 9

Protection is at different levels The transport mode is end-to-end AH is used to authenticate the IP payload and certain parts of the headers ESP is used to encrypt the IP payload not headers for IPv4, but includes extension header info for IPv6 ESP with authentication encrypts IP payload and the extension headers; authenticates IP payload but not IP header The tunnel mode is not end-to-end AH: authenticates the inner IP packet including header plus some of the outer IP header and IPv6 extensions ESP: encrypts inner IP packet (which includes header info) ESP with : encrypts inner IP packet, authenticates inner IP packet Security Policy Database - SPD What traffic to protect? Has incoming traffic been properly secured? Policy entries define which SA or SA Bundles to use on IP traffic Each host or gateway has own (nominal) SPD Index into SPD by Selector fields Dest IP, Source IP, UserId, DataSensitivityLevel, Transport Protocol, IPSec Protocol, Source & Dest Ports, 10

SPD Entry Actions Discard Do not let in or out Bypass Outbound: do not apply IPSec Inbound: do not expect IPSec Protect will point to an SA or SA bundle Outbound: apply security Inbound: check that security must have been applied If the SA does not exist Outbound processing: use IKE to generate SA dynamically Inbound processing: drop packet Outbound Processing IP Packet Outbound packet (on A) Is it for IPSec? If so, which policy entry to select? SPD (Policy) SA Database A B IPSec processing Determine the SA and its SPI SPI & IPSec Packet Send to B 11

Inbound Processing Inbound packet (on B) A B From A SPI & Packet Use SPI to index the SAD SA Database SPD (Policy) Was packet properly secured? un-process Original IP Packet IP Authentication Header Data integrity Entire packet has not been tampered with Authentication Can trust IP address source Use MAC on IP packet header and data payload to authenticate Anti-replay feature Integrity check value 12

Authentication Header Provides support for data integrity and authentication (MAC code) of IP packets. IP AH Fields next header: 8 bit protocol field length: 8-bit field specifying length of authentication data in 32-bit words Unused (so far): 16 bit set to 0 SPI: 32 bit to identify a SA sequence number: 32 bit integrity check value (ICV): some multiple of 32 bits, e.g., 96, 128, 160 13

Anti-replay Feature Optional (default is ON) Information to enforce held in SA entry Sequence number counter 32-bit for outgoing IPSec packets From sender s side, sequence number starts at 1 and cannot go past 2 32-1 (if reached, SA terminated and new one negotiated) Anti-replay window 32-bit Bit-map for detecting replayed packets Anti-replay Mechanism receiver keeps a window of min size 32 (64 preferred and default, larger is ok) packets to the left of window are discarded repeated packets within window are discarded authentic packets to the right of window cause window to move right Window should not be advanced until the packet has been authenticated Without authentication, malicious packets with large sequence numbers can advance window unnecessarily Valid packets would be dropped 14

Integrity Check Value - ICV ICV is a message authentication code produced by a MAC algorithm The ICV is calculated over IP header fields that do not change (e.g., source address) or are predictable (e.g., destination address); those that do change (e.g., Time-to-Live) are set to zero for calculation AH header minus Authentication Data (where the ICV value goes) Upper-level data (assumed not to change in transit) Code may be truncated to first 96 bits Compliant implementations must support HMAC- MD5-96, HMAC-SHA-1-96 Before applying AH 15

Transport Mode AH protocol field of IP header is 51 (for AH payload) AH in turn contains protocol field specifying protocol of actual payload, e.g., TCP or UDP or ICMP or IP Tunnel Mode AH 16

IP Encapsulating Security Payload (ESP) IPv4 and IPv6 ESP: confidentiality ESP w/auth: confidentiality, authentication, integrity ESP w/auth is an option within ESP ESP header (cleartext) security parameter index (SPI) sequence number: 32 bit Initial Value for CBC (if algorithm requires it) ESP trailer (encrypted) padding next header (identifies payload protocol) ESP w/auth authentication ICV: for authentication option applies only to encrypted payload and not to header Format varies based on encryption type Encapsulating Security Payload provides message content confidentiality and limited traffic flow confidentiality can optionally provide the same authentication services as AH Modes supported by ESP: Tunnel mode: encrypt entire IP packet plus headers inside another IP packet Transport mode: do not encrypt headers supports range of ciphers, modes, padding incl. DES, Triple-DES, RC5, IDEA, CAST etc CBC most common pad to meet blocksize, for traffic flow 17

Encapsulating Security Payload ESP Encryption and Authentication 18

ESP Encryption and Authentication Outbound Packet Processing Form ESP payload Pad as necessary Encrypt result [payload, padding, pad length, next header] Apply authentication Allow rapid detection of replayed/bogus packets Allow potential parallel processing - decryption & verifying authentication code 19

Outbound Packet Processing Sequence number generation Increment then use With anti-replay enabled, check for rollover and send only if no rollover With anti-replay disabled, still needs to increment and use but no rollover checking ICV calculation ICV includes whole ESP packet minus authentication data field Implicit padding of 0 s between next header and authentication data is used to satisfy block size requirement for ICV algorithm Inbound Packet Processing Sequence number checking Anti-replay is used only if authentication is selected Sequence number should be the first ESP check on a packet upon looking up a SA Duplicates are rejected 0 reject Check bitmap, verify if new Sliding Window size >= 32 verify 20

Inbound Packet Processing Packet decryption Decrypt quantity [ESP payload, padding, pad length, next header] per SA specification Processing (stripping) padding per encryption algorithm; in case of default padding scheme, the padding field should be inspected Reconstruct the original IP datagram Authentication verification (optional) precedes decryption to avoid denial of service attacks Key Management AH and ESP require encryption and authentication keys Process to negotiate and establish IPSec SA s between two entities handles key generation and distribution typically need 2 pairs of keys 2 for each direction, for AH and ESP 21

IPSEC Key Management There are three possibilities for Key Management Manual keying manually distribute crypto information, sysadmin configures SKIP: Simple Key Interchange Protocol (Sun) Not session oriented ISAKMP: Internet Security Association and Key Management Protocol (NSA) General-purpose security exchange protocol, provides framework for key management and policy negotiations defines procedures and packet formats to establish, negotiate, modify and delete SAs independent of key exchange protocol, encryption algorithm and authentication method Transition From IPv4 To IPv6 Not all routers can be upgraded simultaneous no flag days How will the network operate with mixed IPv4 and IPv6 routers? Two proposed approaches: Dual Stack: some routers with dual stack (v6, v4) can translate between formats Tunneling: IPv6 carried as payload in IPv4 datagram among IPv4 routers 22

Dual Stack Approach A B C D E F IPv6 IPv6 IPv4 IPv4 IPv6 IPv6 Flow: X Src: A Dest: F Src:A Dest: F Src:A Dest: F Flow:?? Src: A Dest: F data data data data A-to-B: IPv6 B-to-C: IPv4 B-to-C: IPv4 B-to-C: IPv6 Tunneling Logical view: Physical view: A B E F tunnel IPv6 IPv6 IPv6 IPv6 A B C D E F IPv6 IPv6 IPv4 IPv4 IPv6 IPv6 Flow: X Src: A Dest: F data Src:B Dest: E Flow: X Src: A Dest: F Src:B Dest: E Flow: X Src: A Dest: F Flow: X Src: A Dest: F data data data A-to-B: IPv6 B-to-C: IPv6 inside IPv4 D-to-E: IPv6 inside IPv4 E-to-F: IPv6 23