Chapter 5 Network Security Protocols in Practice Part I

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Security at the Network Layer: IPSec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
J. Wang and Z. Kissel. Introduction to Computer Network Security: Theory and Practice. Wiley 2015 Chapter 5 Network Security Protocols in Practice.
IP Security
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Reviews Rocky K. C. Chang 20 April 2007.
CSE 4905 IPsec.
Encryption and Network Security
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
Internet and Intranet Fundamentals
CSE 4905 IPsec II.
IT443 – Network Security Administration Instructor: Bo Sheng
Network Security.
UNIT.4 IP Security.
CSE565: Computer Security Lecture 23 IP Security
No.9: IP Security Network Information Security 网络信息安全
Cryptography and Network Security
Chapter 5 Network Security Protocols in Practice
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Slides have been taken from:
Network Security (contd.)
Virtual Private Networks (VPNs)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
NET 536 Network Security Lecture 5: IPSec and VPN
Virtual Private Networks (VPNs)
Lecture 36.
CSE 5/7349 – February 15th 2006 IPSec.
Lecture 36.
Cryptography and Network Security
Presentation transcript:

Chapter 5 Network Security Protocols in Practice Part I J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 Chapter 5 Outline 5.1 Crypto Placements in Networks 5.2 Public-Key Infrastructure 5.3 IPsec: A Security Protocol at the Network Layer 5.4 SSL/TLS: Security Protocols at the Transport Layer 5.5 PGP and S/MIME: Email Security Protocols 5.6 Kerberos: An Authentication Protocol 5.7 SSH: Security Protocols for Remote Logins J. Wang. Computer Network Security Theory and Practice. Springer 2009

Building Blocks for Network Security Encryption and authentication algorithms are building blocks of secure network protocols Deploying cryptographic algorithms at different layers have different security effects Where should we put the security protocol in the network architecture? J. Wang. Computer Network Security Theory and Practice. Springer 2009

The TCP/IP and the OSI Models J. Wang. Computer Network Security Theory and Practice. Springer 2009

TCP/IP Protocol Layers Logical (Software)‏ Physical (Hardware)‏ Application Web, Email Transport Layer TCP, UDP Network Layer IP Data Link Layer Ethernet, 802.11 Physical Layer J. Wang. Computer Network Security Theory and Practice. Springer 2009

TCP/IP Packet Generation J. Wang. Computer Network Security Theory and Practice. Springer 2009

What Are the Pros and Cons? Application Layer Provides end-to-end security protection No need to decrypt data or check for signatures Attackers may analyze traffic and modify headers Transport Layer Provides security protections for TCP packets No need to modify any application programs Attackers may analyze traffic via IP headers J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 Network Layer Provides link-to-link security protection Transport mode: Encrypt payload only Tunnel mode: Encrypt both header & payload; need a gateway No need to modify any application programs Data-link Layer Provides security protections for frames Traffic analysis would not yield much info J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 Chapter 5 Outline 5.1 Crypto Placements in Networks 5.2 Public-Key Infrastructure 5.3 IPsec: A Security Protocol at the Network Layer 5.4 SSL/TLS: Security Protocols at the Transport Layer 5.5 PGP and S/MIME: Email Security Protocols 5.6 Kerberos: An Authentication Protocol 5.7 SSH: Security Protocols for Remote Logins J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 PKI PKI is a mechanism for using PKC PKI issues and manages subscribers’ public-key certificates and CA networks: Determine users’ legitimacy Issue public-key certificates upon users’ requests Extend public-key certificates’ valid time upon users’ requests Revoke public-key certificates upon users’ requests or when the corresponding private keys are compromised Store and manage public-key certificates Prevent digital signature singers from denying their signatures Support CA networks to allow different CAs to authenticate public-key certificates issued by other CAs J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 X.509 PKI (PKIX) Recommended by IETF Four basic components: end entity certificate authority (CA) registration authority (RA) repository J. Wang. Computer Network Security Theory and Practice. Springer 2009 11

J. Wang. Computer Network Security Theory and Practice. Springer 2009 X.509 PKI (PKIX) Main functionalities: CA is responsible of issuing and revoking public-key certificates RA is responsible of verifying identities of owners of public-key certificates Repository is responsible of storing and managing public-key certificates and certificate revocation lists (CRLs) J. Wang. Computer Network Security Theory and Practice. Springer 2009 12

J. Wang. Computer Network Security Theory and Practice. Springer 2009 PKIX Architecture Transaction managements: Registration Key recovery Initialization Key generation Certificate issuing and publication Certificate revocation Cross-certification J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 X.509 Certificate Formats Version: which version the certificate is using Serial number: a unique # assigned to the certificate within the same CA Algorithm: name of the hash function and the public-key encryption algorithm Issuer: name of the issuer Validity period: time interval when the certificate is valid Subject: name of the certificate owner Public key: subject’s public-key and parameter info. Extension: other information (only available in version 3) Properties: encrypted hash value of the certificate using KCAr J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 Chapter 5 Outline 5.1 Crypto Placements in Networks 5.2 Public-Key Infrastructure 5.3 IPsec: A Security Protocol at the Network Layer 5.4 SSL/TLS: Security Protocols at the Transport Layer 5.5 PGP and S/MIME: Email Security Protocols 5.6 Kerberos: An Authentication Protocol 5.7 SSH: Security Protocols for Remote Logins J. Wang. Computer Network Security Theory and Practice. Springer 2009

IPsec: Network-Layer Protocol IPsec encrypts and/or authenticates IP packets It consists of three protocols: Authentication header (AH) To authenticate the origin of the IP packet and ensure its integrity To detect message replays using sliding window Encapsulating security payload (ESP) Encrypt and/or authenticate IP packets Internet key exchange (IKE) Establish secret keys for the sender and the receiver Runs in one of two modes: Transport Mode Tunnel Mode (requires gateway)‏ J. Wang. Computer Network Security Theory and Practice. Springer 2009

IPsec Security Associations SA Alice Bob If Alice wants to establish an IPsec connection with Bob, the two parties must first negotiate a set of keys and algorithms The concept of security association (SA) is a mechanism for this purpose An SA is formed between an initiator and a responder, and lasts for one session One SA is for encryption or authentication, but not both. If a connection needs both, it must create two SAs, one for encryption and one for authentication J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 SA Components Three parameters: Security parameters index (SPI) IP destination address Security protocol identifier Security Association Database (SAD) Stores active SAs used by the local machine Security Policy Database (SPD) A set of rules to select packets for encryption / authentication SA Selectors (SAS) A set of rules specifying which SA(s) to use for which packets J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 IPsec Packet Layout J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 IPsec Header IPsec Header Authentication Header (AH)‏ Encapsulated Security Payload (ESP)‏ Authentication and Encryption use separate SAs J. Wang. Computer Network Security Theory and Practice. Springer 2009

Authentication Header J. Wang. Computer Network Security Theory and Practice. Springer 2009

Resist Message Replay Attack Sequence number is used with a sliding window to thwart message replay attacks A B C Given an incoming packet with sequence # s, either s in A – It's too old, and can be discarded s in B – It's in the window. Check if it's been seen before s in C – Shift the window and act like case B J. Wang. Computer Network Security Theory and Practice. Springer 2009

Encapsulated Security Payload J. Wang. Computer Network Security Theory and Practice. Springer 2009

Key Determination and Distribution Oakley key determination protocol (KDP) Diffie-Hellman Key Exchange + authentication & cookies Authentication helps resist man-in-the-middle attacks Cookies help resist clogging attacks Nonce helps resist message replay attacks J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 Clogging Attacks A form of denial of service attacks Attacker sends a large number of public key Yi in crafted IP packets, forcing the victim’s computer to compute secret keys Ki = YiX mod p over and over again Diffie-Hellman is computationally intensive because of modular exponentiations Cookies help Before doing computation, recipient sends a cookie (a random number) back to source and waits for a confirmation including that cookie This prevents attackers from making DH requests using crafted packets with crafted source addresses J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 ISAKMP ISAKMP: Internet Security Association and Key Management Protocol Specifies key exchange formats Each type of payload has the same form of a payload header ISAKMP header J. Wang. Computer Network Security Theory and Practice. Springer 2009

J. Wang. Computer Network Security Theory and Practice. Springer 2009 ISAKMP Payload Types SA: for establishing a security association Proposal: for negotiating an SA Transform: for specifying encryption and authentication algorithms Key-exchange: for specifying a key-exchange algorithm Identification: for carrying info and identifying peers Certificate-request: for requesting a public-key certificate Certificate: contain a public-key certificate Hash: contain the hash value of a hash function Signature: contain the output of a digital signature function Nonce: contain a nonce Notification: notify the status of the other types of payloads Delete: notify the receiver that the sender has deleted an SA or SAs 8-bit Next payload Reserved 16-bit Payload length J. Wang. Computer Network Security Theory and Practice. Springer 2009