CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec



Similar documents
Protocol Security Where?

Securing IP Networks with Implementation of IPv6

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Network Security Part II: Standards

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

IP Security. Ola Flygt Växjö University, Sweden

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Chapter 5: Network Layer Security

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

CS 4803 Computer and Network Security

Security Engineering Part III Network Security. Security Protocols (II): IPsec

IP SECURITY (IPSEC) PROTOCOLS

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Chapter 32 Internet Security

Internet Protocol Security IPSec

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Computer and Network Security Exercise no. 4

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Chapter 9. IP Secure

Laboratory Exercises V: IP Security Protocol (IPSec)

Lecture 17 - Network Security

Internetwork Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Implementing and Managing Security for Network Communications

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Network Security. Lecture 3

Lecture 10: Communications Security

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Security vulnerabilities in the Internet and possible solutions

Chapter 10. Network Security

Using IPSec in Windows 2000 and XP, Part 2

IPsec Details 1 / 43. IPsec Details

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

CS 494/594 Computer and Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 4 Virtual Private Networking

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

CSCI 454/554 Computer and Network Security. Final Exam Review

IPv6 Security: How is the Client Secured?

Introduction to Computer Security

Network Working Group Request for Comments: Category: Standards Track December Security Architecture for the Internet Protocol

Overview. Protocols. VPN and Firewalls

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Chapter 49 IP Security (IPsec)

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Approaches to Multicast over Firewalls: an Analysis

Lecture 5.1: IPsec Basics

21.4 Network Address Translation (NAT) NAT concept

Branch Office VPN Tunnels and Mobile VPN

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Introduction to Computer Security

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Security issues with Mobile IP

Computer and Network Security

Internet Security Architecture

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Virtual Private Networks

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Lab Configure a PIX Firewall VPN

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

VPN. VPN For BIPAC 741/743GE

Virtual Private Networks: IPSec vs. SSL

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Internet Packets. Forwarding Datagrams

The BANDIT Products in Virtual Private Networks

This section provides a summary of using network location profiles to identify network connection types. Details include:

ICSA Labs Network Protection Devices Test Specification Version 1.3

How To Secure My Data

MINI-FAQ: OpenBSD 2.4 IPSEC VPN Configuration

Chapter 3. Network Domain Security

Access Control: Firewalls (1)

Security threats and network. Software firewall. Hardware firewall. Firewalls


Chapter 2 Virtual Private Networking Basics

Chapter 8 Virtual Private Networking

FIREWALLS IN NETWORK SECURITY

Computer Networks. Secure Systems

Computer security Lecture 9


High Performance VPN Solutions Over Satellite Networks

LinkProof And VPN Load Balancing

IPV6 vs. SSL comparing Apples with Oranges

Protecting Internet Key Exchange (IKE) Implementations from Distributed Denial of Service Attacks

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Authenticated encryption

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

IPSec and SSL Virtual Private Networks

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

IINS Implementing Cisco IOS Network Security Exam.

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Ethernet. Ethernet. Network Devices

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Security Technology: Firewalls and VPNs

Transcription:

CSCI 454/554 Computer and Network Security Topic 8.1 IPsec

Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2

IPsec Objectives Why do we need IPsec? IP V4 has no authentication IP spoofing Payload could be changed without detection. IP V4 has no confidentiality mechanism Eavesdropping Denial of service (DOS) attacks Cannot hold the attacker accountable due to the lack of authentication. 3

IPsec Objectives (Cont d) IP layer security mechanism for IPv4 and IPv6 Not all applications need to be security aware Can be transparent to users Provide authentication and confidentiality mechanisms. 4

IPsec Architecture IPsec module 1 IPsec module 2 SPD SPD IKE IKE SAD IPsec SA IPsec SAD SPD: Security Policy Database; IKE: Internet Key Exchange; SA: Security Association; SAD: Security Association Database. 5

IPsec Architecture (Cont d) Two Protocols (Mechanisms) Authentication Header (AH) Encapsulating Security Payload (ESP) IKE Protocol Internet Key Management 6

IPsec Architecture (Cont d) Can be implemented in Host or gateway Can work in two Modes Tunnel mode Transport mode 7

Hosts & Gateways Hosts can implement IPsec to connect to: Other hosts in transport or tunnel mode Or Gateways in tunnel mode Gateways to gateways Tunnel mode 8

Tunnel Mode Encrypted Tunnel Gateway Gateway A Unencrypted Encrypted Unencrypted B New IP Header AH or ESP Header Orig IP Header TCP Data 9

Tunnel Mode (Cont d) Outer IP header IPsec header Inner IP header Higher layer protocol Destination IPsec entity ESP AH Real IP destination ESP applies only to the tunneled packet AH can be applied to portions of the outer header 10

Transport Mode A Encrypted/Authenticated B New IP Header AH or ESP Header TCP Data 11

Transport Mode (Cont d) IP header IP options IPsec header Higher layer protocol Real IP destination ESP AH ESP protects higher layer payload only AH can protect IP headers as well as higher layer payload 12

Security Association (SA) An association between a sender and a receiver Consists of a set of security related parameters E.g., sequence number, encryption key One way relationship Determine IPsec processing for senders Determine IPsec decoding for destination SAs are not fixed! Generated and customized per traffic flows 13

Security Parameters Index (SPI) A bit string assigned to an SA. Carried in AH and ESP headers to enable the receiving system to select the SA under which the packet will be processed. 32 bits SPI + Dest IP address + IPsec Protocol Uniquely identifies each SA in SA Database (SAD) 14

SA Database (SAD) Holds parameters for each SA Sequence number counter Lifetime of this SA AH and ESP information Tunnel or transport mode Every host or gateway participating in IPsec has their own SA database 15

SA Bundle More than 1 SA can apply to a packet Example: ESP does not authenticate new IP header. How to authenticate? Use SA to apply ESP w/out authentication to original packet Use 2 nd SA to apply AH 16

Security Policy Database (SPD) Decide What traffic to protect? Has incoming traffic been properly secured? Policy entries define which SA or SA Bundles to use on IP traffic Each host or gateway has their own SPD Index into SPD by Selector fields Selectors: IP and upper-layer protocol field values. Examples: Dest IP, Source IP, Transport Protocol, IPSec Protocol, Source & Dest Ports, 17

SPD Entry Actions Discard Do not let in or out Bypass Outbound: do not apply IPSec Inbound: do not expect IPSec Protect will point to an SA or SA bundle Outbound: apply security Inbound: security must have been applied 18

SPD Protect Action If the SA does not exist Outbound processing Trigger key management protocols to generate SA dynamically, or Request manual specification, or Other methods Inbound processing Drop packet 19

Outbound Processing Outbound packet (on A) IP Packet Is it for IPsec? If so, which policy entry to select? SPD (Policy) SA Database A B Determine the SA and its SPI IPSec processing SPI & IPsec Packet Send to B 20

Inbound Processing Inbound packet (on B) From A A B SPI & Packet SA Database SPD (Policy) Use SPI to index the SAD Was packet properly secured? un-process Original IP Packet 21

Authentication Header (AH) Data integrity Entire packet has not been tampered with Authentication Can trust IP address source Use MAC to authenticate Anti-replay feature Integrity check value 22

Integrity Check Value - ICV Message authentication code (MAC) calculated over IP header fields that do not change or are predictable IP header fields that are unpredictable are set to zero. IPsec AH header with the ICV field set to zero. Upper-level data Code may be truncated to first 96 bits 23

IPsec Authentication Header SAD Next Header (TCP/UDP) Payload Length 6-2=4 Reserved SPI Sequence Number ICV 24

Encapsulated Security Protocol (ESP) Confidentiality for upper layer protocol Partial traffic flow confidentiality (Tunnel mode only) Data origin authentication and connectionless integrity (optional) 25

Outbound Packet Processing Form ESP payload Pad as necessary Encrypt result [payload, padding, pad length, next header] Apply authentication 26

Outbound Packet Processing... Sequence number generation Increment then use With anti-replay enabled, check for rollover and send only if no rollover With anti-replay disabled, still needs to increment and use but no rollover checking ICV calculation ICV includes whole ESP packet except for authentication data field. Implicit padding of 0 s between next header and authentication data is used to satisfy block size requirement for ICV algorithm Not include the IP header. 27

Authentication coverage Encrypted ESP Transport Example Original IP Header SPI Sequence Number Payload (TCP Header and Data) Variable Length Padding (0-255 bytes) Pad Length Integrity Check Value Next Header 28

Inbound Packet Processing Sequence number checking Anti-replay is used only if authentication is selected Sequence number should be the first ESP check on a packet upon looking up an SA Duplicates are rejected! 0 reject Check bitmap, verify if new Sliding Window size >= 32 verify 29

Anti-replay Feature Optional Information to enforce held in SA entry Sequence number counter - 32 bit for outgoing IPsec packets Anti-replay window 32-bit Bit-map for detecting replayed packets 30

Anti-replay Sliding Window Window should not be advanced until the packet has been authenticated Without authentication, malicious packets with large sequence numbers can advance window unnecessarily Valid packets would be dropped! 31

Inbound Packet Processing... Packet decryption Decrypt quantity [ESP payload,padding,pad length,next header] per SA specification Processing (stripping) padding per encryption algorithm; In case of default padding scheme, the padding field SHOULD be inspected Reconstruct the original IP datagram Authentication verification (option) 32

ESP Processing - Header Location... Transport mode IPv4 and IPv6 IPv4 Orig IP hdr ESP hdr TCP Data ESP trailer ESP Auth IPv6 Orig IP hdr Orig ext hdr ESP hdr TCP Data ESP trailer ESP Auth 33

ESP Processing - Header Location... Tunnel mode IPv4 and IPv6 IPv4 New IP hdr ESP hdr Orig IP hdr TCP Data ESP trailer ESP Auth IPv6 New IP hdr New ext hdr ESP hdr Orig IP hdr Orig ext hdr TCP Data ESP trailer ESP Auth 34