Bakeoff Summary Jari Arkko, Ericsson Arne Dybdahl, SSH August 17 th, 2001.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Chapter 9 Deploying IIS and Active Directory Certificate Services
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
An Introduction to Security Concepts and Public Key Infrastructure (PKI) Mary Thompson.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Chapter 8 Network Security 4/17/2017
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security Chapter Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Creating an IPsec VPN using IOS command syntax. What is IPSec IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Advanced Computer Networks - IAIK 1 Gsenger, Nindl, Pointner Graz, Secure Anycast Tunneling Protocol.
RE © 2003, Cisco Systems, Inc. All rights reserved.
© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Secure Socket Layer (SSL)
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
I-D: draft-rahman-mipshop-mih-transport-01.txt Transport of Media Independent Handover Messages Over IP 67 th IETF Annual Meeting MIPSHOP Working Group.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
Automatic VPN Client Recovery from IPsec Pass-through Failures Dr. José Brustoloni Dept. Computer Science, University of Pittsburgh 210 S. Bouquet St.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 5 – Configure Site-to-Site VPNs Using Digital Certificates.
Cryptography and Network Security (CS435) Part Twelve (Electronic Mail Security)
TCP/IP Protocols Contains Five Layers
QUALCOMM Incorporated 1 Protocol Options for BSN- BSMCS Controller Interface Jun Wang, Kirti Gupta 05/16/2005 Notice: Contributors grant a free, irrevocable.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 4 City College.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Network Security Continued. Digital Signature You want to sign a document. Three conditions. – 1. The receiver can verify the identity of the sender.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Mobile IPv6 with IKEv2 and revised IPsec architecture IETF 61
1 Extreme Networking at Home Jari Arkko, Ericsson.
Virtual Private Network Configuration
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
K. Salah1 Security Protocols in the Internet IPSec.
X509 Web Authentication From the perspective of security or An Introduction to Certificates.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Module 4: Configuring Site to Site VPN with Pre-shared keys
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
Tutorial on Creating Certificates SSH Kerberos
Tutorial on Creating Certificates SSH Kerberos
CompTIA Security+ Study Guide (SY0-501)
Server-to-Client Remote Access and DirectAccess
Virtual Private Networks (VPNs)
Advanced Computer Networks
DHCP: Dynamic Host Configuration Protocol
CSE 5/7349 – February 15th 2006 IPSec.
Presentation transcript:

Bakeoff Summary Jari Arkko, Ericsson Arne Dybdahl, SSH August 17 th, 2001

What’s New? What’s Tested? N x NAT traversal N x AES N x IPv6 Certificate management: SCEP, OCSP, CMP?... New Diffie-Hellman groups New implementations (cellphones, new vendors,...) Hybrid auth, xauth,... Hub-and-Spoke VPNs Multiple trusted roots, certificate chains, subordinate certs, PKCS #7

What Works Well? IPsec SHA1, 3DES IKE with preshared keys IKE with RSA signature certificates AES Rekey With established vendors, no problems in testing Fragmentation Basic IPv6 cases

Problem Areas 1(4) IPsec IPcomp –Some problems? Re-keying –A couple of problems IKE –AES key length attributes: phase 1 optional, phase mandatory! –Slow new D-H group calculations cause timeouts –Delete messages? –If xauth phase 1.5 fails, torn down phase 1? –If don't support all xauth attrs, turn down the whole thing? –Retranmission and long RTT problems in some people's IKE state machines

Problem Areas 2(4) Certificates –Many smaller problems –CR wars: when to send and what to include? –Also, is the whole chain sent or not? –Problems in certain fields, e.g. identity fqdn vs. ip-address –CR with null cert authority: send multiple certs, some implementations can't cope with this –Enrollment: SCEP RA/CA certificate chain - use of all cert; CA certificates might not have the key encipherment bit set –Correct ordering of relative distinguished name encodings – X.509 vs. LDAP –Not much testing of revokation –Certificate hierarchy and multiple CA troubles NAT Traversal –Packet fragmentation problems with ESP-UDP

Problem Areas 3(4) IPv6 –Certificates with IPv6 identities –Neighbour Discovery to work with IPsec –Missing combinations (v6 inside v4) –Many types of IPv6 addresses –Source address selection –Link local addresses –Fragmentation –Some IPv6 connectivity set-up problems Configuration problems –From "no" to "lots" Specification problems –Keepalives, how to solve? –Some interpretations on NAT traversal –AES key length proposals - send or not –Use of default lifetimes, if other type provided

Problem Areas 4(4) Implementation problems –Some: lifetimes, IKE, proposal numbers, too many unnecessary checks, CRL content formats Disjoint options problem –Not many people have AES –Not many people have larger D-H groups –Somebody wasn't able to turn PFS off –Different sets of id types (DN vs. ) –Clean vs. abrupt tunnel close –Not many support IPv6 –Address-only SPD –Some people require certs –Certificate encodings –3DES, SHA1, v4 are well supported

Registration, Bakeoff? Registration –Generally good feedback –Additional information had to be requested by some (how much power available etc) –Map to the site would have been useful General –Good feedback –Uphill walk from the hotel in the morning –Some didn't bring all equipment, used over network –Less people than last time –Where are the CA vendors? –Busy people, not much time to test –Good food –Some time zone problems with crews back home –Security guards?

Network OK? Website and network configuration –Generally good feedback –Wanted to see network/vendor/implementation information before event –Web site was a bit slow –Network problems at start? –Too many steps for adding machines, interfaces, etc. –We need a NAT –More realistic test environments: delay, drop, capacity, … –IPv6 worked great –IPv6 has other apps than ping6? –WLAN was great –Firewall would have been nice –Regular phones or more mobile phones –DNS set-up very useful

Future Bakeoffs? Yes! –Maybe more participants if in the U.S. –System for testing over the network? Test what? –Whatever gets implemented –Advanced certificate things: enrollment, ocsp,... –NAT traversal –IPv6 –DHCP –AES –Opportunistic encryption –Maybe "ipsec and pki" bakeoff to attract more CA vendors –New D-H groups –Son-of-IKE