Security Engineering Part III Network Security. Security Protocols (II): IPsec

Similar documents
IP Security. Ola Flygt Växjö University, Sweden

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Securing IP Networks with Implementation of IPv6

Network Security. Lecture 3

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Lecture 17 - Network Security

Chapter 10. Network Security

Network Security Part II: Standards

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Chapter 5: Network Layer Security

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Protocol Security Where?

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Laboratory Exercises V: IP Security Protocol (IPSec)

Chapter 32 Internet Security

Internet Protocol Security IPSec

CS 4803 Computer and Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Introduction to Computer Security

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Branch Office VPN Tunnels and Mobile VPN

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Introduction to Security and PIX Firewall

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Network Security Fundamentals

Overview. Protocols. VPN and Firewalls

Chapter 9. IP Secure

21.4 Network Address Translation (NAT) NAT concept

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

VPN. VPN For BIPAC 741/743GE

Security vulnerabilities in the Internet and possible solutions

Introduction to Computer Security

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

IPSec and SSL Virtual Private Networks

CCNA Security 1.1 Instructional Resource

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Implementing and Managing Security for Network Communications

MINI-FAQ: OpenBSD 2.4 IPSEC VPN Configuration

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

IPSec Pass through via Gateway to Gateway VPN Connection

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

The BANDIT Products in Virtual Private Networks

Case Study for Layer 3 Authentication and Encryption

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Internet Security Architecture

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Computer Networks. Secure Systems

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

Application Note: Onsight Device VPN Configuration V1.1

Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1

IPsec Details 1 / 43. IPsec Details

Internetwork Security

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Computer and Network Security

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

ZyXEL ZyWALL P1 firmware V3.64

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

LinkProof And VPN Load Balancing

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Chapter 49 IP Security (IPsec)

IP SECURITY (IPSEC) PROTOCOLS

Chapter 4 Virtual Private Networking

This is a guide on how to create an IPsec VPN tunnel from a local client running Shrew Soft VPN Client to an Opengear device.

ISG50 Application Note Version 1.0 June, 2011

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

This section provides a summary of using network location profiles to identify network connection types. Details include:

GNAT Box VPN and VPN Client

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Using IPSec in Windows 2000 and XP, Part 2

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

How To Add Security To The Basic Protocols

Cisco RV 120W Wireless-N VPN Firewall

z/os Firewall Technology Overview

CS 494/594 Computer and Network Security

Chapter 7 Transport-Level Security

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Linksys RV042. TheGreenBow IPSec VPN Client. Configuration Guide.

Juniper NetScreen 5GT

Computer and Network Security Exercise no. 4

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Planet CS TheGreenBow IPSec VPN Client. Configuration Guide.

Transcription:

Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador jestevez@inf.uc3m.es Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science, Fall 2011

Preliminaries 2

Preliminaries IPv4 header IPv6 header 3

Preliminaries We have application-specific security protocols S/MIME, PGP, SSL/TLS, But Some problems are common Some problems are inherent to the network layer and won t be solved by just securing the app layer Email Web Game DB queries SNMP FTP IM TCP UDP Other Transport Secured IP 4

IPsec A typical usage scenario Protocol architecture and algorithms to provide Access control Data authentication Data integrity Confidentiality Detection of replayed packets Key management Some applications Remote access using untrusted networks (e.g. Internet) Connectivity to various networks using untrusted networks (VPN, Virtual Private Networks) Some security features to routing (e.g., route announcements come from authorised router, no fake messages, etc.) Security enhancements to some applications e-commerce 5

IPsec A typical usage scenario 6

IPsec essentials IPsec is optional in IPv4 and mandatory in IPv6 Two main protocols: Authentication Header (AH) Data authentication + integrity, but no confidentiality MAC-based using a shared secret key Encapsulating Security Payload (ESP) Encrypts packets. Authentication is optional. Based on various ciphers and encryption modes. 7

Security associations (SA) Bundle of algorithms and paramenters associated with one flow in one direction. Defines provided security services In a bidirectional communication, each host must establish an SA with the other party. Indexed in the local SADB by: Security Parameter Index (SPI) IP destination address So when a packet arrives, the host knows which SA manages it When establishing an SA, one must choose between AH or ESP, but not both simultaneously 8

IPsec modes of operation Transport mode Only payload is protected Used for securing end-to-end communications 9

IPsec modes of operation Tunnel mode Protects the entire IP packet, including the IP header Used to connect security gateways Hosts not required to implement IPsec 10

AH protocol Provides Data integrity Data origin authentication Protection against replay attacks (see Seq. No. in AH header) of the IP packet 11

AH protocol Original IP packet AH (transport mode) AH (tunnel mode) 12

AH protocol Data Auth+Integrity based on an ICV (Integrity Check Value) In practice, implemented as a MAC: AuthData = HMAC k (Payload) Both hosts must share key k Why do we want a protocol providing only data auth+int.? Useful in environments were encryption is restricted Fast implementation Receiver chooses whether he wishes to check it or not 13

ESP protocol Provides confidentiality by encrypting the IP packet Various standard block ciphers supported: DES, 3DES, RC5, IDEA, CAST, Most common mode: CBC (caution!) Padding to avoid traffic analysis attack and also to fit block size required by the cipher It provides AH-like services too: Data origin authentication Data integrity Detection of replay attacks So ESP admits three configurations: Authentication-only (WHY?) Encryption-only (DON T!) Encryption+Authentication 14

ESP protocol 15

ESP protocol Original IP packet Transport mode: Only the payload is encrypted and authenticated Encrypted Authenticated (optionally) Tunnel mode: The entire packet is encrypted and authenticated Encrypted Authenticated (optionally) 16

IPsec protocols and modes SA transport mode SA tunnel mode AH Authenticates: payload + parts of IP header + IPv6 extensions Authenticates: internal IP packet + parts of external IP header ESP (Enc. Only) Encrypts: payload + any IPv6 extension Encrypts: internal IP packet ESP with Auth Encrypts: payload + any IPv6 extension. Authenticates: payload only Encrypts: internal IP packet Authenticates: internal IP packet

SA combinations

IPsec: key management AH and ESP require shared keys (typically 2 pairs per comm.) ISAKMP (Internet Security Association and Key Management Protocol) Framework for authentication (entity) and key exchange Authenticated keying material provided: Manually with pre-shared keys Internet Key Exchange (IKE, IKEv2) Kerberized Internet Negotiation of Keys (KINK) IPSECKEY DNS records