Lecture 17 - Network Security



Similar documents
APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

CS 4803 Computer and Network Security

Introduction to Security and PIX Firewall

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Securing IP Networks with Implementation of IPv6

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Network Security. Lecture 3

CSC574: Computer and Network Security Module: Network Security

Laboratory Exercises V: IP Security Protocol (IPSec)

IP Security. Ola Flygt Växjö University, Sweden

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

CCNA Security 1.1 Instructional Resource

Protocol Security Where?

Network Security Part II: Standards

Internet Protocol Security IPSec

IPv6 Security: How is the Client Secured?

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

The BANDIT Products in Virtual Private Networks

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Site to Site Virtual Private Networks (VPNs):

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Case Study for Layer 3 Authentication and Encryption

Lecture 10: Communications Security

Network virtualization

CS 494/594 Computer and Network Security

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Virtual Private Networks

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Branch Office VPN Tunnels and Mobile VPN

IPsec Details 1 / 43. IPsec Details

VPN. VPN For BIPAC 741/743GE

Introduction to Computer Security

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Overview. Protocols. VPN and Firewalls

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Chapter 7 Transport-Level Security

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

GNAT Box VPN and VPN Client

Network Access Security. Lesson 10

Chapter 32 Internet Security

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

z/os Firewall Technology Overview

Firewall Troubleshooting

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Introduction to Computer Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Computer Networks. Secure Systems

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Chapter 5: Network Layer Security

Cisco RV 120W Wireless-N VPN Firewall

ISG50 Application Note Version 1.0 June, 2011

IP SECURITY (IPSEC) PROTOCOLS

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Linksys RV042. TheGreenBow IPSec VPN Client. Configuration Guide.

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Implementing and Managing Security for Network Communications

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

LAN-Cell to Cisco Tunneling

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Creating a Gateway to Gateway VPN between Sidewinder G2 and Linux

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Security vulnerabilities in the Internet and possible solutions

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cisco SA 500 Series Security Appliance

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Internet Key Exchange (IKE) EJ Jung

21.4 Network Address Translation (NAT) NAT concept

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide

Computer and Network Security Exercise no. 4

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Ingate Firewall. TheGreenBow IPSec VPN Client Configuration Guide.

LinkProof And VPN Load Balancing

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Lab a Configure Remote Access Using Cisco Easy VPN

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

Application Note: Onsight Device VPN Configuration V1.1

Juniper NetScreen 5GT

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Cisco Easy VPN on Cisco IOS Software-Based Routers

IP Office Technical Tip

Transcription:

Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/

Idea Why donʼt we just integrate some of these neat crypto tricks directly into the IP protocol stack? This is called transport security 2

IPsec IP layer security protocol Integrated directly into protocol stack Defined as an extension to the network layer Transparent to the above layers and application Provides confidentiality HTTP HTTP integrity authenticity TCP TCP replay protection IP IPsec SA IP DOS protection Ethernet Ethernet Physical Physical 3

Tunnel vs. Transport Mode Transport mode default mode of IPsec -- protects transport layer packet end-to-end encapsulation of data useful when both endpoints are configured to use/manage IPsec Tunnel mode encapsulates all of the IP data over a new IP level packet useful when the device applying IPsec to the packet is not the originating host, e.g., at a gateway Also known as, ip over ip IPsec provides the mechanism, you provide the policy 4

IPsec Processing Start ISAKMP Keys Exist? No IKE IKE Phase 1: Negotiate Session ISAKMP Keys Yes SA Keys Exist? No IKE Phase 2: Negotiate SA Keys AH Process Using AH Encoding and Policy AH Yes Processing Policy ESP ESP Process Using ESP Encoding and Policy 5

Internet Key Exchange (IKE) Built on of ISAKMP framework Two phase protocol used to establish parameters and keys for session Phase 1: negotiate parameters, authenticate peers, establish secure channel ISAKMP keys Phase 2: Establish a security association (SA) SA keys used to process user traffic The details are unimaginably complex The SA defines algorithms, keys, and policy used to secure the session 6

IPsec Implementation User: ISAKMP framework Kernel: IPsec processing User Policy Engine ISAKMP Daemon SA Administration Kernel Policy Interface SA Interface Policy Cache IPSec Engine SA Cache Crypto Engine 7

Authentication Header (AH) Authenticity and integrity via HMAC over IP headers and and data Advantage: the authenticity of data and IP header information is protected it gets a little complicated with mutable fields, which are supposed to be altered by network as packet traverses the network some fields a immutable, and are protected Confidentiality of data is not preserved Replay protection via AH sequence numbers note that this replicates some features of TCP (good?) 8

Authentication Header (AH) Modifications to the packet format IP Header Payload IP Header AH Header MAC Payload AH Packet Authenticated Encrypted 9

IPsec Authentication SPI: (spy) identifies the security association for this packet Type of crypto checksum, how large it is, and how it is computed Really the policy for the packet Authentication data Hash of packet contents include IP header as as specified by SPI Treat transient fields (TTL, header checksum) as zero Keyed MD5 Hash is default MD5 Hash Secret Key Key Headers and data being sent Key 10

Encapsulating Security Payload (ESP) Confidentiality, authenticity and integrity via encryption and HMAC over IP payload (data) Advantage: the security manipulations are done solely on user data TCP packet is fully secured simplifies processing Use null encryption to get authenticity/integrity only Note that the TCP ports are hidden when encrypted good: better security, less is known about traffic bad: impossible for FW to filter/traffic based on port Cost: can require many more resources than AH 11

Encapsulating Security Payload (ESP) Modifications to packet format IP Header Payload IP Header ESP Header Payload ESP Trailer MAC ESP Packet Authenticated Encrypted 12

Is AH necessary? Some argue that AH is subsumed by ESP Header protection can be achieved by tunnel mode ESP Protection of header has limited utility Should we allow firewalls (and eavesdroppers) to look at layer 4 (TCP) information? e.g., filter on ports exposes a lot of information In practice, the protocol AH is generally not used. 13

IPsec Tunnel Mode Encapsulate IP packet C D Source Dest Payload Tunnel Header Tunnel Source Dest ESP Header Source Payload ESP Trailer MAC Dest 14

Practical Issues and Limitations IPsec implementations Often not compatible (ungh.) Large footprint resource poor devices are in trouble New standards to simplify (e.g, JFK, IKE2) Slow to adopt new technologies Issues IPsec tries to be everything for everybody at all times Massive, complicated, and unwieldy Policy infrastructure has not emerged Large-scale management tools are limited (e.g., CISCO) Often not used securely (common pre-shared keys) 15

Network Isolation: VPNs Idea: I want to create a collection of hosts which operate in a coordinated way E.g., a virtual security perimeter over physical network Hosts work as if they are isolated from malicious hosts Solution: Virtual Private Networks Create virtual network topology over physical network Use communications security protocol suites to secure virtual links tunneling Manage networks as if they are physically separate Hosts can route traffic to regular networks (split-tunneling) 16

VPN Example: RW/Telecommuter (network edge) Internet LAN Physical Link Logical Link (IPsec) 17

VPN Example: Hub and Spoke (network edge) Internet LAN Physical Link Logical Link (IPsec) 18

VPN Example: Mesh (network edge) Internet LAN Physical Link Logical Link (IPsec) 19

Virtual LANs (VLANs) VPNs build with hardware No encryption none needed wire based isolation Switches increasingly support VLANs Allows networks to be reorganized without rewiring Example usage: two departments in same hallway Each office is associated with department Configuring the network switch gives physical isolation Note: often used to ensure QoS 20