VIRTUAL PRIVATE NETWORKS Lab 8. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

IPSec.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Lecture 7: Network Level Security – IPSec CS 336/536: Computer Network Security Fall 2013 Nitesh Saxena Adopted from previous lecture by Keith Ross, and.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Secure connections.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Security at different layers
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Securing Network Communications Using IPSec Chapter Twelve.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Network
Lecture 9: Network Level Security – IPSec
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Virtual Private Networks
Virtual Private Networks
CSE 4905 IPsec.
Encryption and Network Security
Virtual Private Networks
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPN)
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
IP Security and VPN Most of the slides are derived from the slides (Chapter-8) by the authors of «Computer Networking: A Top Down Approach», and from the.
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Slides have been taken from:
Virtual Private Networks (VPNs)
NET 536 Network Security Lecture 5: IPSec and VPN
Virtual Private Networks (VPNs)
Topic 12: Virtual Private Networks
Chapter 6 IP Security.
Cryptography and Network Security
Presentation transcript:

VIRTUAL PRIVATE NETWORKS Lab 8

2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers, links, DNS infrastructure.  With a VPN, institution’s inter-office traffic is sent over public Internet instead.  But inter-office traffic is encrypted before entering public Internet

3 IP header IP header IPsec header IPsec header Secure payload Secure payload IP header IP header IPsec header IPsec header Secure payload Secure payload IP header IP header IPsec header IPsec header Secure payload Secure payload IP header IP header payload IP header IP header payload headquarters branch office salesperson in hotel Public Internet laptop w/ IPsec Router w/ IPv4 and IPsec Router w/ IPv4 and IPsec Virtual Private Network (VPN)

What is VPN  Virtual Private Network is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated connection such as leased line, a VPN uses “virtual” connections routed though the internet.  A method of ensuring private, secure communication between hosts over an insecure medium using tunneling

What is tunneling? ECE Internetwork Security  Most VPNs rely on tunneling to create a private network that reaches across the Internet.  Essentially, tunneling is the process of placing an entire packet within another packet and sending it over a network.

Tunneling Payload Original IP Header New IP Header Original IP Header

Types of VPN ECE Internetwork Security  Uses some means of encryption to secure communications  IPSec  SSH  Software could be written to support any type of encryption scheme  Two main types of VPNs –  Remote-Access  Site-to-Site

What is a VPN? (cont…) ECE Internetwork Security  Remote-Access  The typical example of this is a dial-up connection from home or for a mobile worker, who needs to connect to secure materials remotely  Site-to-Site  The typical example of this is a company that has offices in two different geographical locations, and wants to have a secure network connection between the two

Remote-Access VPN  Remote-access, also called a virtual private dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.  A good example of a company that needs a remote- access VPN would be a large firm with hundreds of sales people in the field.  Remote-access VPNs permit secure, encrypted connections between a company's private network and remote users through a third-party service provider.

Remote-Access Example ECE Internetwork Security

Site-to-Site VPN  Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN.  Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.

Site-to-Site Example ECE Internetwork Security

VPN

VPN Protocols  There are three main protocols that power the vast majority of VPN’s:  PPTP  L2TP  IPsec  All three protocols emphasize encryption and authentication; preserving data integrity that may be sensitive and allowing clients/servers to establish an identity on the network

VPN Protocols (In depth)  Point-to-point tunneling protocol (PPTP)  PPTP is widely supported by Microsoft as it is built into the various flavors of the Windows OS  PPTP initially had weak security features, however, Microsoft continues to improve its support  Layer Two tunneling protocol (L2TP)  L2TP was the original competitor to PPTP and was implemented primarily in Cisco products  L2TP is a combination of the best features of an older protocol L2F and PPTP  L2TP exists at the datalink layer (Layer 2) of the OSI model

VPN Protocols and Their Uses Slide 16 Firewalls & Network Security, 2nd ed. - Chapter 11

Why Use a VPN? ECE Internetwork Security  Originally designed as inexpensive alternative WAN over leased lines  Now mostly used to securely connect computers over the internet  Convenient  Lot’s of cheap and convenient protocols are insecure (IP, , etc)  Can now communicate securely over these insecure protocols

VPN Advantages ECE Internetwork Security  Improved Security  Consolidation of Scattered Resources  Reduced Cost (vs. Leased Lines)

VPN Disadvantages ECE Internetwork Security  Time Consuming Setup  Possibly Frustrating Troubleshooting  Interoperability with other Networks/VPNs  Small performance overhead

VPN Security ECE Internetwork Security  In academic terms, VPN can provide Confidentiality, Integrity, and Authenticity  Security against determined hacker depends largely upon underlying protocols used  Assuming security of SSH, IPSec, or other protocol used, should be secure

Summary  To enable remote user to connect to a VPN, issue that user VPN client software  Make sure user’s computer has anti-virus software and a firewall  May need to obtain key for remote user if using IPSec to make VPN connection  VPN best practices include:  Security policy rules specific to the VPN  Integration of firewall packet filtering and VPN traffic  Auditing VPN to ensure acceptable performance Slide 21 Firewalls & Network Security, 2nd ed. - Chapter 11

IPSEC

Security at different layers  Link layer: WEP / i  Application layer: PGP  Transport layer: SSL  Network layer: IPsec IPsec approach: IPsec TCP/UDP/ICMP HTTP/SMTP/IM IPsec can provide security between any pair of network-layer entities (eg, between two hosts, two routers, or a host and a router).

IP Security  IP datagrams have no inherent security  IP source address can be spoofed  Content of IP datagrams can be sniffed  Content of IP datagrams can be modified  IP datagrams can be replayed  IPSec is a method for protecting IP datagrams  Only sender and receiver have to be IPsec compliant Rest of network can be regular IP

What is IPsec?  A collection of protocols for securing Internet Protocol (IP) communications by encrypting and authenticating all IP packets 1  Progressive standard  Defined in RFC 2401 thru 2409  Purpose:  To protect IP packets  To provide defense against network attacks 1: From wikipedia.org

What is IPsec? (cont)  Created November 1998  Created by IETF  Deployable on all platforms  Windows  Unix  Etc..  Can be implemented and deployed on:  End hosts  Gateways  Routers  Firewalls

IPSec r IP Sec ≠ VPN m IP Sec is a protocol used in many VPNs r Two main modes m Transport m Tunnel r components: m – an authentication protocol (Authentication Header – AH) m – a combined encryption and authentication protocol (Encapsulated Security Payload – ESP) m – Security Association and key establishment protocol (IKEv2)

What is confidentiality at the network- layer? Between two network entities:  Sending entity encrypts the payloads of datagrams. Payload could be:  TCP segment, UDP segment, ICMP message,, and so on.  All data sent from one entity to the other would be hidden:  Web pages, , P2P file transfers, TCP SYN packets, and so on.  That is, “blanket coverage”.

IPsec services  Data integrity  Origin authentication  Replay attack prevention  Confidentiality  Two protocols providing different service models:  AH  ESP

Modes of connection: 1- The transport method  Is used when connecting between two computers directly. In this method, the application and transport layer information is encrypted, but the source and estination IP addresses are visible.

IPsec Transport Mode IPsec

Modes of connection: 2 -The tunnel method  is used in host-to-server and server-to-server configurations.  In this method, the upper-layer data is encrypted, including the IP header.  The IP addresses of the hosts behind the servers are hidden from the packet information.  This adds an extra layer of protection and thus makes it more difficult for an attacker to get information about your network.

IPsec – tunneling mode (1)  End routers are IPsec aware. Hosts need not be. IPsec

IPsec – tunneling mode (2)  Also tunneling mode. IPsec

Two protocols r Authentication Header (AH) protocol m provides source authentication & data integrity but not confidentiality r Encapsulation Security Protocol (ESP) m provides source authentication,data integrity, and confidentiality m more widely used than AH

Four combinations are possible! Host mode with AH Host mode with ESP Tunnel mode with AH Tunnel mode with ESP Most common and most important

Authentication header - AH

Encapsulating Security Payload – ESP

ESP in transport and tunnel mode

Security associations (SAs)  Before sending data, a virtual connection is established from sending entity to receiving entity.  Called “security association (SA)”  SAs are simplex: for only one direction  Both sending and receiving entites maintain state information about the SA  Recall that TCP endpoints also maintain state information.  IP is connectionless; IPsec is connection-oriented!

/ /24 SA Internet Headquarters Branch Office R1 R2 Example SA from R1 to R2 R1 stores for SA  32-bit identifier for SA: Security Parameter Index (SPI)  the origin interface of the SA ( )  destination interface of the SA ( )  type of encryption to be used (for example, 3DES with CBC)  encryption key  type of integrity check (for example, HMAC with with MD5)  authentication key

IPsec datagram Focus for now on tunnel mode with ESP new IP header ESP hdr original IP hdr Original IP datagram payload ESP trl ESP auth encrypted “enchilada” authenticated padding pad length next header SPI Seq #

What happens? / /24 SA Internet Headquarters Branch Office R1 R2 new IP header ESP hdr original IP hdr Original IP datagram payload ESP trl ESP auth encrypted “enchilada” authenticated padding pad length next header SPI Seq #

R1 converts original datagram into IPsec datagram  Appends to back of original datagram (which includes original header fields!) an “ESP trailer” field.  Encrypts result using algorithm & key specified by SA.  Appends to front of this encrypted quantity the “ESP header, creating “enchilada”.  Creates authentication MAC over the whole enchilada, using algorithm and key specified in SA;  Appends MAC to back of enchilada, forming payload;  Creates brand new IP header, with all the classic IPv4 header fields, which it appends before payload.

Inside the enchilada:  ESP trailer: Padding for block ciphers  ESP header:  SPI, Security Parameter Index so receiving entity knows what to do  Sequence number, to thwart replay attacks  MAC in ESP auth field is created with shared secret key new IP header ESP hdr original IP hdr Original IP datagram payload ESP trl ESP auth encrypted “enchilada” authenticated padding pad length next header SPI Seq #

IPsec sequence numbers  For new SA, sender initializes seq. # to 0  Each time datagram is sent on SA:  Sender increments seq # counter  Places value in seq # field  Goal:  Prevent attacker from sniffing and replaying a packet Receipt of duplicate, authenticated IP packets may disrupt service  Method:  Destination checks for duplicates  But doesn’t keep track of ALL received packets; instead uses a window

 replay: the attacker obtains an authenticated packet and later transmits (replays) it to the intended destination  ƒ receiver has an anti-replay window of default size W = 64

Summary of IPsec  An IPsec used in VPN  Either the AH or the ESP protocol (or both)  The AH protocol provides integrity and source authentication  The ESP protocol (with AH) additionally provides encryption  IPsec peers can be two end systems, two routers/firewalls, or a router/firewall and an end system