VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
IPSec.
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
K. Salah1 Security Protocols in the Internet IPSec.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security
SMUCSE 5349/49 IP Sec. SMUCSE 5349/7349 Basics Network-level: all IP datagrams covered Mandatory for next-generation IP (v6), optional for current-generation.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
Computer and Network Security
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
CSE 4905 IPsec.
Encryption and Network Security
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
Somesh Jha University of Wisconsin
Internet and Intranet Fundamentals
CSE 4905 IPsec II.
IT443 – Network Security Administration Instructor: Bo Sheng
UNIT.4 IP Security.
IPSec IPSec is communication security provided at the network layer.
BINF 711 Amr El Mougy Sherif Ismail
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
IP Security and VPN Most of the slides are derived from the slides (Chapter-8) by the authors of «Computer Networking: A Top Down Approach», and from the.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Network Security (contd.)
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Virtual Private Networks (VPNs)
NET 536 Network Security Lecture 5: IPSec and VPN
Virtual Private Networks (VPNs)
B. R. Chandavarkar CSE Dept., NITK Surathkal
CSE 5/7349 – February 15th 2006 IPSec.
Cryptography and Network Security
Presentation transcript:

VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU

Outline What is VPN? IPSec VPN IPSec VPN vs SSL VPN

Virtual Private Networks (VPNs) Provides secure access to private network over public links Often, goal is to provide access to corporate network (intranet) from outside (Internet) Or, logically join physically separated networks Achieves some combination of: Confidentiality Integrity Mutual authentication

Telecommuter VPNs: Client-to-Gateway

Gateway-to-Gateway VPNs

How do we build VPNs? We cannot rebuild the Internet

VPN Tunneling

SSL VPN Which layer? Layered system: the VPN transfers IP packets (of the virtual network) by serializing them on a SSL connection, which itself uses TCP as a transport medium, which is built over IP packets (on the physical unprotected network).

IPsec VPN IPsec is another technology which is more deeply integrated in the packets IPsec VPN more efficient than SSL VPN IPsec must be managed quite deep within the operating system network code SSL-based VPN only needs some way to hijack incoming and outgoing traffic; the rest can be down in user-level software.

IPsec Host level protection service IP-layer security (below TCP/UDP) De-facto standard for host level security Developed by the IETF (over many years) Available in most operating systems/devices E.g., Windows, OS X, Linux, BSD*, ... Not a single protocol; IPsec is a protocol suite Implements a wide range of protocols and cryptographic algorithms Selectively provides .... Confidentiality, integrity, authenticity, replay protection, DoS protection

IPsec Protocol Suite

IPsec Architecture

Internet Key Exchange (IKE) Two phase protocol used to establish parameters and keys for session Phase 1: authenticate peers, establish secure channel via Diffie- Hellman key exchange Phase 2: negotiate parameters, establish a security association (SA) The SA defines algorithms, keys, and policy used to secure the session for a unidirectional traffic flow Pairing requires two SAs -- one for each direction SAs stored in host’s Security Association Database (SAD) Each gateway may define policies for each SA Policies stored in the SAD

IPsec: Packet Handling

Transport Mode

Tunnel Mode

Key Management Two options: Manual: use preshared secrets;or Internet Key Exchange (IKE)

Internet Key Exchange Harkins and Carrel, RFC2409, Nov. 1998 Phase1: KeyExchange (Simplified) 1. Initiator sends list of supported crypto algos to responder 2. Responder chooses crypto algo from sender’s list 3. Initiator sends first half of DH exchange and a nonceI to responder 4. Responder sends second half of DH exchange, and a nonceR to initiator 5. Initiator sends its id, its cert, and a sig, all encrypted using key derived from previously exchanged messages 6. Responder sends its id, its cert, and a sig, all encrypted using key derived from previously exchanged messages

Internet Key Exchange Phase II: Security Associations Using secure channel, establish at least 2 security associations: inbound outbound

IPsec and the IP protocol stack IPsec puts the two main protocols in between IP and the other protocols AH: Authentication Header ESP: Encapsulating Security Payload Other functions provided by external protocols and architectures

Security Association (SA) An association between a sender and a receiver Consists of a set of security related parameters E.g., sequence number, encryption key One way relationship Determine IPsec processing for senders Determine IPsec decoding for destination SAs are not fixed! Generated and customized per traffic flows

Security Parameter Index (SPI) A bit string assigned to an SA. Carried in AH and ESP headers to enable the receiving system to select the SA under which the packet will be processed. 32 bits SPI + Dest IP address + IPsec Protocol Uniquely identifies each SA in SA Database (SAD)

SA Database (SAD) Holds parameters for each SA Sequence number counter Lifetime of this SA AH and ESP information Tunnel or transport mode Every host or gateway participating in IPsec has their own SA database

Authentication Header (AH) Provides authenticity and integrity via HMAC over immutable IP headers and data Advantage: the authenticity of data and IP header information is protected Disadvantage: the set of immutable IP headers isn’t necessarily fixed Confidentiality of data is not preserved Replay protection via AH sequence numbers note that this replicates some features of TCP

IPsec AH Packet Format

IPsec Authentication SPI: (spy) identifies the SA for this packet Type of crypto checksum, how large it is, and how it is computed Really, the policy for the packet Authentication data Hash of packet contents include IP header as specified by SPI Treat mutable fields (TTL, header checksum) as zero Keyed MD5 Hash is default

Encapsulating Security Payload Confidentiality, authenticity, and integrity via encryption and HMAC over IP payload (data) Advantage: encapsulated packet is fully secured Use “null” encryption to get authenticity/integrity only Note that the TCP/UDP ports are hidden when encrypted good: better security, less is known about traffic bad: impossible for FW to filter/traffic based on port Cost: can require many more resources than AH

ESP Packet Format

Modes of Operation Transport: the payload is (optionally) encrypted and the non-mutable fields are integrity verified (via MAC) Tunnel: each packet is completely encapsulated (and optionally encrypted) in an outer IP packet Hides not only data, but some routing information