APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0



Similar documents
IP Security. Ola Flygt Växjö University, Sweden

Protocol Security Where?

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

IPSec and SSL Virtual Private Networks

Securing IP Networks with Implementation of IPv6

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Internetwork Security

Network Security. Lecture 3

Network Security Part II: Standards

Lecture 17 - Network Security

Security Engineering Part III Network Security. Security Protocols (II): IPsec

The BANDIT Products in Virtual Private Networks

Branch Office VPN Tunnels and Mobile VPN

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

VPN. VPN For BIPAC 741/743GE

Internet Protocol Security IPSec

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Network Security Fundamentals

Introduction to Security and PIX Firewall

Chapter 5: Network Layer Security

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Chapter 4 Virtual Private Networking

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

CS 4803 Computer and Network Security

Application Note: Onsight Device VPN Configuration V1.1

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

VPN Solutions. Lesson 10. etoken Certification Course. April 2004

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Site to Site Virtual Private Networks (VPNs):

Chapter 10. Network Security

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

SonicOS Enhanced 3.2 IKE Version 2 Support

Laboratory Exercises V: IP Security Protocol (IPSec)

Chapter 32 Internet Security

CCNA Security 1.1 Instructional Resource

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

IP SECURITY (IPSEC) PROTOCOLS

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

IPsec Details 1 / 43. IPsec Details

CSCI 454/554 Computer and Network Security. Final Exam Review

Chapter 49 IP Security (IPsec)

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 8 Virtual Private Networking

Lecture 10: Communications Security

Implementing and Managing Security for Network Communications

FortiOS Handbook IPsec VPN for FortiOS 5.0

Overview. Protocols. VPN and Firewalls

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Security vulnerabilities in the Internet and possible solutions

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Chapter 2 Virtual Private Networking Basics

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

IPSEC: IKE. Markus Hidell Based on material by Vitaly Shmatikov, Univ. of Texas, and by the previous course teachers

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

FortiOS Handbook - IPsec VPN VERSION 5.2.2

Virtual Private Network and Remote Access Setup

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Chapter 9. IP Secure

NetScreen Concepts & Examples

ISG50 Application Note Version 1.0 June, 2011

Lab Configure a PIX Firewall VPN

GNAT Box VPN and VPN Client

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Technical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TD: GB-WGSOHO6

Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall

Virtual Private Network (VPN)

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

This section provides a summary of using network location profiles to identify network connection types. Details include:

Virtual Private Networks

Using IPSec in Windows 2000 and XP, Part 2

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

IPSec Pass through via Gateway to Gateway VPN Connection

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Configuring Internet Key Exchange Security Protocol

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Case Study for Layer 3 Authentication and Encryption

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Internet Security Architecture

Computer and Network Security

Introduction to Computer Security

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Brocade 5600 vrouter IPsec Site-to-Site VPN

Computer Networks. Secure Systems

Security Architecture for IP (IPsec)

MINI-FAQ: OpenBSD 2.4 IPSEC VPN Configuration

How to configure VPN function on TP-LINK Routers

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Integrated Services Router with the "AIM-VPN/SSL" Module

Transcription:

APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0

Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations and ISAKMP Authentication Header (AH) Encapsulating Security Payload (ESP) Internet Key Exchange (IKE) IPSec Tunnel Creation

Virtual Private Network Creates a secure tunnel over a public network Client to firewall Router to router Firewall to firewall Uses the Internet as the public backbone to access a secure private network Remote employees can access their office network VPN Protocols PPTP (Point-to-Point tunneling Protocol) L2F (Layer 2 Forwarding Protocol) L2TP (Layer 2 Tunneling Protocol) IPSec (Internet Protocol Security)

IPsec Provides Layer 3 security (RFC 2401) Transparent to applications (no need for integrated IPSec support) A set of protocols and algorithms used to secure IP data at the network layer Combines different components: Security associations (SA) Authentication headers (AH) Encapsulating security payload (ESP) Internet Key Exchange (IKE) A security context for the VPN tunnel is established via the ISAKMP

Why IPsec? Internet Protocol (IP) is not secure IP protocol was designed in the early stages of the Internet where security was not an issue All hosts in the network are known Possible security issues Source spoofing Replay packets No data integrity or confidentiality

IPsec Standards RFC 4301 The IP Security Architecture Defines the original IPsec architecture and elements common to both AH and ESP RFC 4302 Defines authentication headers (AH) RFC 4303 Defines the Encapsulating Security Payload (ESP) RFC 2408 ISAKMP RFC 5996 IKE v2 (Sept 2010) RFC 4835 Cryptographic algorithm implementation for ESP and AH

Benefits of IPsec Confidentiality By encrypting data Integrity Routers at each end of a tunnel calculates the checksum or hash value of the data Authentication Signatures and certificates All these while still maintaining the ability to route through existing IP networks IPsec is designed to provide interoperable, high quality, cryptographicallybased security for IPv4 and IPv6 - (RFC 2401)

Benefits of IPsec Offers Confidentiality (encrypting data), Integrity, and Authentication Data integrity and source authentication Data signed by sender and signature is verified by the recipient Modification of data can be detected by signature verification Because signature is based on a shared secret, it gives source authentication Anti-replay protection Optional; the sender must provide it but the recipient may ignore Key management IKE session negotiation and establishment Sessions are rekeyed or deleted automatically Secret keys are securely established and authenticated Remote peer is authenticated through varying options

Different Layers of Encryption Application Layer SSL, PGP, SSH, HTTPS Source Destination Network Layer - IPsec Link Layer Encryption

IPsec Modes Tunnel Mode Entire IP packet is encrypted and becomes the data component of a new (and larger) IP packet. Frequently used in an IPsec site-to-site VPN Transport Mode IPsec header is inserted into the IP packet No new packet is created Works well in networks where increasing a packet s size could cause an issue Frequently used for remote-access VPNs

Tunnel vs. Transport Mode IPsec IP Header TCP Header Payload Without IPsec IP Header IPsec Header TCP Header Payload Transport Mode IPsec New IP Header IPsec Header IP Header TCP Header Payload Tunnel Mode IPsec

IPsec Architecture AH Authentication Header Security Protocols IPsec Security Policy ESP Encapsulating Security Payload IKE The Internet Key Exchange Establishes the tunnel Key management

Security Associations (SA) A collection of parameters required to establish a secure session Uniquely identified by three parameters consisting of Security Parameter Index (SPI) IP destination address Security protocol (AH or ESP) identifier An SA is unidirectional Two SAs required for a bidirectional communication A single SA can be used for AH or ESP, but not both must create two (or more) SAs for each direction if using both AH and ESP

How to Set Up an SA Manually Sometimes referred to as manual keying You configure on each node: Participating nodes (I.e. traffic selectors) AH and/or ESP [tunnel or transport] Cryptographic algorithm and key Automatically Using IKE (Internet Key Exchange) 14

ISAKMP Internet Security Association and Key Management Protocol Defined by RFC 2408 Used for establishing Security Associations (SA) and cryptographic keys Only provides the framework for authentication and key exchange, but key exchange independent Key exchange protocols Internet Key Exchange (IKE) and Kerberized Internet Negotiation of Keys (KINK)

Authentication Header (AH) Provides source authentication and data integrity Protection against source spoofing and replay attacks Authentication is applied to the entire packet, with the mutable fields in the IP header zeroed out If both AH and ESP are applied to a packet, AH follows ESP Operates on top of IP using protocol 51 In IPv4, AH protects the payload and all header fields except mutable fields and IP options (such as IPSec option)

Encapsulating Security Payload (ESP) Uses IP protocol 50 Provides all that is offered by AH, plus data confidentiality It uses symmetric key encryption Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication is applied to data in the IPsec header as well as the data contained as payload

Packet Format Alteration for AH Transport Mode Authentication Header Without AH Original IP Header TCP/UDP Data With AH Original IP Header AH Header TCP/UDP Data Authenticated except for mutable fields in IP header ToS TTL Header Checksum Offset Flags

Packet Format Alteration for ESP Transport Mode Encapsulating Security Payload Before applying ESP: Original IP Header TCP/UDP Data After applying ESP: Original IP Header ESP Header TCP/UDP Data ESP Trailer ESP Authentication Encrypted Authenticated

Packet Format Alteration for AH Tunnel Mode Authentication Header Before applying AH: Original IP Header TCP/UDP Data After applying AH: New IP Header AH Header Original IP Header Data Authenticated except for mutable fields in new IP header ToS TTL Header Checksum Offset Flags

Packet Format Alteration for ESP Tunnel Mode Encapsulating Security Payload Before applying ESP: Original IP Header TCP/UDP Data After applying ESP: New IP Header ESP Header Original IP Header TCP/UDP Data ESP Trailer ESP Authentication Encrypted Authenticated

Internet Key Exchange (IKE) An IPsec component used for performing mutual authentication and establishing and maintaining Security Associations. (RFC 5996) Typically used for establishing IPsec sessions A key exchange mechanism Five variations of an IKE negotiation: Two modes (aggressive and main modes) Three authentication methods (pre-shared, public key encryption, and public key signature) Uses UDP port 500

IKE Modes Mode Main mode Aggressive Mode Quick Mode Description Three exchanges of information between IPsec peers. Initiator sends one or more proposals to the other peer (responder) Responder selects a proposal Achieves same result as main mode using only 3 packets First packet sent by initiator containing all info to establish SA Second packet by responder with all security parameters selected Third packet finalizes authentication of the ISAKMP session Negotiates the parameters for the IPsec session. Entire negotiation occurs within the protection of ISAKMP session

Internet Key Exchange (IKE) Phase I Establish a secure channel (ISAKMP SA) Using either main mode or aggressive mode Authenticate computer identity using certificates or pre-shared secret Phase II Establishes a secure channel between computers intended for the transmission of data (IPsec SA) Using quick mode

Overview of IKE 1 Traffic which needs to be protected IPsec Peer 2 IKE Phase 1 IPsec Peer Secure communication channel 3 IKE Phase 2 IPsec Tunnel 4 Secured traffic exchange

IKE Phase 1 (Main Mode) Main mode negotiates an ISAKMP SA which will be used to create IPsec SAs Three steps SA negotiation (encryption algorithm, hash algorithm, authentication method, which DF group to use) Do a Diffie-Hellman exchange Provide authentication information Authenticate the peer

IKE Phase 1 (Main Mode) Initiator 3 Compute DH shared secret and derive keying material Responder Internet 1 Negotiate IKE Policy IKE Message 1 (SA proposal) IKE Message 2 (accepted SA) 2 Authenticated DH Exchange IKE Message 3 (DH public value, nonce) IKE Message 4 (DH public value, nonce) 4 Protect IKE Peer Identity IKE Message 5 (Authentication material, ID) IKE Message 6 (Authentication material, ID) (Encrypted)

IKE Phase 1 (Aggressive Mode) Uses 3 (vs 6) messages to establish IKE SA No denial of service protection Does not have identity protection Optional exchange and not widely implemented 28

IKE Phase 2 (Quick Mode) All traffic is encrypted using the ISAKMP Security Association Each quick mode negotiation results in two IPsec Security Associations (one inbound, one outbound) Creates/refreshes keys 29

IKE Phase 2 (Quick Mode) 4 Validate message 2 1 7 Compute keying material Initiator Responder Internet Message 1 (authentication/keying material and SA proposal) 2 Validate message 1 6 Validate message 3 Message 2 (authentication/keying material and accepted SA) 3 5 Message 3 (hash for proof of integrity/authentication) 30

IPsec Best Practices Use IPsec to provide integrity in addition to encryption. Use ESP option Use strong encryption algorithms 3DES and AES instead of DES Use SHA instead of MD5 as a hashing algorithm Reduce the lifetime of the Security Association (SA) by enabling Perfect Forward Secrecy (PFS) Increases processor burden so do this only if data is highly sensitive

Questions Please remember to fill out the feedback form <survey-link> Slide handouts will be available after completing the survey

APNIC Helpdesk Chat

Thank You! End of Session