Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity



Similar documents
APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Securing IP Networks with Implementation of IPv6

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Protocol Security Where?

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 9. IP Secure

Lecture 17 - Network Security

Network Security Part II: Standards

CS 4803 Computer and Network Security

Network Security. Lecture 3

21.4 Network Address Translation (NAT) NAT concept

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

IP Security. Ola Flygt Växjö University, Sweden

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Virtual Private Networks

Security vulnerabilities in the Internet and possible solutions

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Chapter 32 Internet Security

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

IP SECURITY (IPSEC) PROTOCOLS

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Overview. Protocols. VPN and Firewalls

Internet Protocol Security IPSec

Chapter 5: Network Layer Security

VPN. VPN For BIPAC 741/743GE

Branch Office VPN Tunnels and Mobile VPN

IPV6 vs. SSL comparing Apples with Oranges

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Introduction to Security and PIX Firewall

Chapter 10. Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Implementing and Managing Security for Network Communications

Site to Site Virtual Private Networks (VPNs):

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

(d-5273) CCIE Security v3.0 Written Exam Topics

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Computer and Network Security Exercise no. 4

The BANDIT Products in Virtual Private Networks

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Network Access Security. Lesson 10

Using IPSec in Windows 2000 and XP, Part 2

CCNA Security 1.1 Instructional Resource

LinkProof And VPN Load Balancing

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Virtual Private Networks: IPSec vs. SSL

IPsec Details 1 / 43. IPsec Details

Chapter 11 Cloud Application Development

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Introduction to Computer Security

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Chapter 7 Transport-Level Security

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

z/os Firewall Technology Overview

Lab Configure a PIX Firewall VPN

Computer and Network Security

Firewalls und IPv6 worauf Sie achten müssen!

Chapter 8. Network Security

Laboratory Exercises V: IP Security Protocol (IPSec)

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Network Security Fundamentals

Network virtualization

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

NETWORK SECURITY (W/LAB) Course Syllabus

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

FortiOS Handbook IPsec VPN for FortiOS 5.0

Firewalls, Tunnels, and Network Intrusion Detection

ICTTEN8195B Evaluate and apply network security

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Introduction to Computer Security

Virtual Private Networks

Internet Security Architecture

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Final exam review, Fall 2005 FSU (CIS-5357) Network Security


IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Cryptography and network security CNET4523

Transcription:

Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration of transmitted or stored information can be detected

Current Solutions Internet adoption grew Applications were designed and operated ad hoc security solutions Provides semi-trusted and semi-secure Internet access Don t address fundamental issues Mostly concerned with fighting symptoms

Current Solutions Packet Filters and Firewalls Filters traffic based on predefined rules IP address port numbers virus patterns May determine unusual behavior

- example

The IPSEC framework A formally defined standard (RFC 2401) Contains 6 distinct elements Description of security requirements and mechanisms on the network layer Security element for encryption (RFC 2406) Security element for authentication (RFC 2402) Concrete cryptographic algorithms for encryption and authentication Definition of Security policy and Security associations between partners IPSEC key management ISAKMP - RFC 2408 - Internet Security Association and Key Management Protocol

Source: IPv6 Essentials, O Reilly Press, 2002 Security in IPv6 The IPSEC framework

Authentication in IPv6 Extension Header type 51 provides integrity and authentication for end to end data

Authentication in IPv6 Next Header Length of Payload in x32 bits Reserved SPI - Indicates which checksum algorithm has been used Sequence Number - Prevents replay attacks Not to exceed 232 to prevent replay. Re-negotiation should occur It is know that packets may arrive out of order Authentication Data - variable length A cryptographically secure checksum over the payload and possibly other fields

Authentication in IPv6 Cryptographical checksum is also known as a message digest or hash. Uses rules IP Header, version, class, and flow label are excluded from the computation. Hop Limit is assumed to contain zero All Extension Headers that change en-route are computed as a sequence of zero If Routing Extension Header is present the IPv6 destination address is set to the final destination IPv6 implementations MUST support Keyed message digest No. 5 (MD5) requires key considered theoretically breakable Secure Hash Algorithm No. 1 (SHA-1)

Authentication in IPv6 Payload Authentication Transport mode authenticates all end to end payload plus selected headers (described previously) Payload Length Next Header Extension headers (not listed previously) Upper layer headers and data Some IP header fields are not protected Will not work with NAT environment

Authentication in IPv6 Header and Payload Authentication Accomplished by creating a tunnel between 2 gateways Gateway may be a router May be a VPN implementation Wraps the original packet in a new packet Applies checksum to entire packet

Encryption in IPv6 Extension Header type 50 provides integrity and confidentiality

Encryption in IPv6 SPI - Indicates which encryption algorithm has been used Sequence Number - Prevents replay attacks Not to exceed 232 to prevent replay. Re-negotiation should occur It is know that packets may arrive out of order Encryption Parameters - variable length Depends on the encryption algorithm used Encrypted Data

Encryption in IPv6 Trailer Contains Optional authentication information to protect the encrypted data and the sequence number Padding (for 64 bit alignment) Next Header value (in the encrypted packet) IPv6 specification contains one encryption algorithm that must be supported by every implementation DES-CBC (Data Encryption Standard in Cipher Block Chaining Mode) Other stronger algorithms may be negotiated using corresponding SA and SPI Government export controls

Encryption in IPv6 Payload encryption Transport mode encrypts all end to end extension headers and payload Extension headers must not be looked at in path

Encryption in IPv6 Header and Payload encryption Accomplished by creating a tunnel between 2 gateways Gateway may be a router May be a VPN implementation Wraps the original packet in a new packet Applies checksum to entire packet

Encryption in IPv6 Combining Authentication and Encryption It was originally intended to use both But increased IPv6 packet size was not good Decided to included AH functionality in ESP

IPSEC may solve many issues on the Internet FTP, Telnet, DNS, and SNMP However other issues exist IPSEC tunnels break through firewalls or NAT Tunneled IPSEC traffic may contain malicious data QOS doesn t work in IPSEC Mobility issues Dynamic IP addresses cause IPSEC to fail

IPv6 deployment slowed due to IPv4 workarounds NAT and CIDR SSL SSH S/MIME, PGP IPSEC deployment issues lack of public key infrastructure lack of vendor/ipv6 adoption

Questions?