© MMII JW RyderCS 428 Computer Networking1 IP Security  IPSec  Firewall Design  Security - Understanding when and how users, computers, services, networks.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
K. Salah1 Security Protocols in the Internet IPSec.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
© MMII JW RyderCS 428 Computer Networking1 Private Network Interconnection  VPN - Virtual Private Networks  NAT - Network Address Translation  Describe.
Chapter 13 – Network Security
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
6/21/01Team 2 DCS 835 Rev 6/22/011 IP Security (IPSec)  Background –The internet has no centralized technical support. What makes it work is an agreed.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
1 Network Security Lecture 8 IP Sec Waleed Ejaz
CSCE 715: Network Systems Security
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
TCP/IP Protocols Contains Five Layers
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Internet Security and Firewall Design Chapter 32.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Network Communications Using IPSec Chapter Twelve.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
IP Security
Computer and Network Security
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Security in the layers 8: Network Security.
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
IPSec IPSec is communication security provided at the network layer.
BINF 711 Amr El Mougy Sherif Ismail
IP Security and VPN Most of the slides are derived from the slides (Chapter-8) by the authors of «Computer Networking: A Top Down Approach», and from the.
Firewalls Routers, Switches, Hubs VPNs
Virtual Private Networks (VPNs)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
NET 536 Network Security Lecture 5: IPSec and VPN
Introduction to Network Security
Virtual Private Networks (VPNs)
Virtual Private Network zswu
Chapter 6 IP Security.
Presentation transcript:

© MMII JW RyderCS 428 Computer Networking1 IP Security  IPSec  Firewall Design  Security - Understanding when and how users, computers, services, networks can trust one another  2 fundamental techniques  Perimeter security  Encryption

© MMII JW RyderCS 428 Computer Networking2 Security  Perimeter security - allows organization to determine services and networks it will make available to outsiders  Encryption handles most other aspects

© MMII JW RyderCS 428 Computer Networking3 Security  Security implies safety, assurance of data integrity, freedom from unauthorized access, freedom from snooping or wiretapping, freedom from disruption of service  Physical security is as important as protecting abstract resources

© MMII JW RyderCS 428 Computer Networking4 Aspects of Protection  Data Integrity - Protect from unauthorized change  Data Availability - Outsiders cannot prevent legitimate access to data  Confidentiality  Authorization - to only data as required  Replay Avoidance - Capture copies of packets by outsiders

© MMII JW RyderCS 428 Computer Networking5 Information Policy  “Before an organization can enforce network security, it must assess risks and develop a clear policy regarding information access and protection.”  An information policy begins with people - most susceptible point in any security scheme

© MMII JW RyderCS 428 Computer Networking6 Internet Security  Datagrams can be intercepted or compromised - the contents cannot be trusted  Example  Server attempts source authentication  Examine source IP address  Source authentication is weak  Stronger authentication requires encryption

© MMII JW RyderCS 428 Computer Networking7 IPSec  A set of protocols that provide secure Internet comm.  Valid for IPv4 and IPv6  IPSec is flexible and extensible  Can use authentication or encryption  Asymmetric choices ok  Does not demand a specific authentication or encryption algorithm  Includes a set of encryption algorithms that all implementations must recognize

© MMII JW RyderCS 428 Computer Networking8 IPSec AH  Authentication Header  See figures 32.1 and 2 on pages 584 and 585  Inserts AH after IP header and before transport header  PROTOCOL field in IP header changed to value 51  PROTOCOL field is changed so how does receiver determine type?

© MMII JW RyderCS 428 Computer Networking9 IPSec AH  AH has NEXT HEADER field. Original PROTOCOL values written into here  PAYLOAD LEN - Length of AH  SEQUENCE NUMBER - starts at 0 and increases monotonically  SECURITY PARAMETER INDEX - specifies Security Association (SA)  AUTHENTICATION DATA - based upon security scheme

© MMII JW RyderCS 428 Computer Networking10 Security Association  Security scheme includes  authentication algorithm  key(s)  key lifetime  algorithm lifetime for destination  authorized source addresses  Information cannot fit into header  Each receiver collects all details about security scheme into an abstraction call Security Assoc.

© MMII JW RyderCS 428 Computer Networking11 Security Association  Each SA given a number aka a security parameters index  Before sender can use IPSec to communicate with a receiver, sender must know index value of a SA on receiver  Index values owned by destinations, not globally known!  SAs can have lifetimes reusing index values

© MMII JW RyderCS 428 Computer Networking12 IPSec ESP  Privacy plus Authentication  Encapsulating Security Protocol  Value 50 in PROTOCOL field  See figures on 586 and 587  3 additional areas  ESP HEADER  ESP TRAILER  ESP AUTH - variable size

© MMII JW RyderCS 428 Computer Networking13 IPSec ESP  Uses many of same items as AH but reorders them  ESP HEADER  8 octets for SPI and SEQ Number  ESP TRAILER  Optional padding  Padding Length  NEXT HEADER  ESP AUTH data

© MMII JW RyderCS 428 Computer Networking14 IPSec ESP  Padding may be present for 3 reasons  Some decryption algorithms require zeros following encrypted message  NEXT HEADER is right justified within 4 octet field. IPSec requires that AITH data that follows trailer start on 4 octet boundary  Random padding to throw off sniffers

© MMII JW RyderCS 428 Computer Networking15 Mutable Fields  IPSec Authentication designed to assure arriving datagram identical to that sent by source  Intermediate routers decrement TTL fields and re-compute CKSUMs  Mutable fields = IP header fields that can change  IPSec only authenticates immutable fields

© MMII JW RyderCS 428 Computer Networking16 IPSec Tunneling  Standard defines both AH and ESP tunnels  See figure 32.4 on page 588  Required security algorithms  See figure 32.5 on page 588  Secure Sockets Layer (SSL)  Originated by Netscape  Dual authentication, negotiate for encryption algorithm  Secure connection, not formally adopted by IETF but defacto standard

© MMII JW RyderCS 428 Computer Networking17 Firewalls  Place firewall at connection to external internet  Inside and outside regions  Intranet can have several external connections  Strong as weakest link  All firewalls must be configured to use same access restrictions

© MMII JW RyderCS 428 Computer Networking18 Firewalls  In theory, a firewall simply blocks all communication between the organization and the outside  In practice, need more that this  Firewalls need to be tailored to specific organization  Must be have hardware and software to handle a potentially busy interface

© MMII JW RyderCS 428 Computer Networking19 Packet-Level Filters  High speed filtering mechanism  Manager configures filter in router  Filter(block) all datagrams form a specific source or those used by specific application  Does not keep record of filtering  Packet filters are free from TCP/IP standards

© MMII JW RyderCS 428 Computer Networking20  See figure 32.6 on page 591  Block incoming datagrams destined for well- known services  Block outgoing datagrams for any 16 bit prefix from to remote server (TCP port 25) Packet Filters

© MMII JW RyderCS 428 Computer Networking21  Previous example does not work well for firewall  Number of well-known ports is large  Much traffic on an internet does not travel on well- known ports  Programmers can choose  Remote Procedure Call assigns dynamic port numbers  Listing ports leaves the firewall open for tunneling Packet Filters

© MMII JW RyderCS 428 Computer Networking22  Tunneling can circumvent security  Host on inside agrees to accept encapsulated datagrams from host on outside  Remove one layer and then forward to internal service  Must reverse idea of filtering  Instead of identifying what datagrams should be filtered(blocked), block everything! Firewalls

© MMII JW RyderCS 428 Computer Networking23  Allow those only for approved networks, hosts, and ports  Examine organizations information policy then enable certain funtionality  Many packet filter use this approach  Solves many problems and has interesting consequence  Prevents inside user from accessing outside resources Firewalls

© MMII JW RyderCS 428 Computer Networking24  Servers may operate on well-known ports but clients do not  Clients may send data out but won’t get data back in  Packet filter will block client’s returning datagram  Not all organizations configure to block all internal unknown port numbers Firewalls

© MMII JW RyderCS 428 Computer Networking25  Secure Firewalls  Users on the inside need to access resources on the outside  Can only provide safe access through a secure computer  Install one secure computer with each firewall and install a set of application gateways on that computer  Bastion Host Proxy Access

© MMII JW RyderCS 428 Computer Networking26  See figure 32.7 on page 593  Outer barrier  Blocks all incoming traffic except for datagrams destined for  services on bastion that organization chooses to expose externally  clients on the bastion host  Inner barrier  Blocks incoming traffic except those coming from bastion  Manual bypass Secure Gateway

© MMII JW RyderCS 428 Computer Networking27  Web access example  Firewall prevents user computer from receiving datagrams  User cannot use browser for direct access  Arrange proxy server on bastion host  Inside, each browser configured to use the proxy  Proxy contacts URL, receives information and returns it transparently to user inside firewall Secure Firewalls

© MMII JW RyderCS 428 Computer Networking28  Each barrier requires router with packet filter  Network connections between the routers and bastion host  See figure 32.8 on page 594  R 2 = outer barrier  H = bastion host  R 1 = inner barrier  Safety of firewall depends on safety of bastion host (software and hardware) Firewall Implementation

© MMII JW RyderCS 428 Computer Networking29  Previous example known as stub network  Stub network isolates organization  May be considered unnecessary  See figure 32.9 on page 595 for alternative firewall permitting many external connections  One router per connection - All external connections also mistrust one another Stub Network

© MMII JW RyderCS 428 Computer Networking30  Monitoring  Active - Firewall notifies whenever there is an incident  Passive - Firewall records activity in logs Firewalls