Network Security Mechanisms

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

IPSec.
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
K. Salah1 Security Protocols in the Internet IPSec.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Lecture 11 Page 1 CS 136, Spring 2009 Network Security CS 136 Computer Security Peter Reiher May 7, 2009.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Lecture 12 Page 1 CS 136, Fall 2011 Network Security, Continued CS 136 Computer Security Peter Reiher November 1, 2011.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Network Security: Firewalls, Network Cryptography, and Honeypots Computer Security Peter Reiher February 9, 2017.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
CSE 4905 IPsec.
Encryption and Network Security
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Network Security.
Firewall Configuration and Administration
IPSec IPSec is communication security provided at the network layer.
CSE565: Computer Security Lecture 23 IP Security
CSE 4905 Network Security Overview
Cryptography and Network Security
Virtual Private Networks (VPNs)
Outline Using cryptography in networks IPSec SSL and TLS.
Outline Network characteristics that affect security
Virtual Private Networks (VPNs)
Outline Basics of network security Definitions Sample attacks
Outline The spoofing problem Approaches to handle spoofing
Chapter 6 IP Security.
Outline The concept of perimeter defense and networks Firewalls.
Cryptography and Network Security
Presentation transcript:

Network Security Mechanisms Again, the usual suspects - Encryption Authentication Access control Data integrity mechanisms Traffic control

Encryption for Network Security Relies on the kinds of encryption algorithms and protocols discussed previously Can be applied at different places in the network stack With different effects and costs

Link Level Encryption Source Destination ciphertext plaintext ciphertext plaintext ciphertext ciphertext plaintext ciphertext ciphertext plaintext ciphertext plaintext ciphertext Let’s say we want to send a message using encryption Different keys (maybe even different ciphers) used at each hop

End-to-End Encryption Source Destination plaintext ciphertext ciphertext ciphertext ciphertext plaintext ciphertext When would link encryption be better? Cryptography only at the end points Only the end points see the plaintext Normal way network cryptography done

IPSec Standard for applying cryptography at the network layer of IP stack Provides various options for encrypting and authenticating packets On end-to-end basis Without concern for transport layer (or higher)

What IPSec Covers Message integrity Message authentication Message confidentiality

What Isn’t Covered Non-repudiation Digital signatures Key distribution Traffic analysis Handling of security associations Some of these covered in related standards

Some Important Terms for IPsec Security Association - “A Security Association (SA) is a simplex "connection" that affords security services to the traffic carried by it.” Basically, a secure one-way channel SPI (Security Parameters Index) – Combined with destination IP address and IPsec protocol type, uniquely identifies an SA

General Structure of IPsec Really designed for end-to-end encryption Though could do link level Designed to operate with either IPv4 or IPv6 Meant to operate with a variety of different encryption protocols And to be neutral to key distribution methods Has sub-protocols E.g., Encapsulating Security Payload

Encapsulating Security Payload (ESP) Protocol Encrypt the data and place it within the ESP The ESP has normal IP headers Can be used to encrypt just the payload of the packet Or the entire IP packet

ESP Modes Transport mode Encrypt just the transport-level data in the original packet No IP headers encrypted Tunnel mode Original IP datagram is encrypted and placed in ESP Unencrypted headers wrapped around ESP

ESP in Transport Mode Extract the transport-layer frame E.g., TCP, UDP, etc. Encapsulate it in an ESP Encrypt it The encrypted data is now the last payload of a cleartext IP datagram

ESP Transport Mode Original IP header ESP Hdr Normal Packet Payload Trlr ESP Auth Encrypted Authenticated

Using ESP in Tunnel Mode Encrypt the IP datagram The entire datagram Encapsulate it in a cleartext IP datagram Routers not understanding IPsec can still handle it Receiver reverses the process

ESP Tunnel Mode Original Packet Payload New IP hdr ESP Hdr Orig. Trlr ESP Auth Encrypted Authenticated

Uses and Implications of Tunnel Mode Typically used when there are security gateways between sender and receiver And/or sender and receiver don’t speak IPsec Outer header shows security gateway identities Not identities of real parties Can thus be used to hide some traffic patterns

What IPsec Requires Protocol standards To allow messages to move securely between nodes Supporting mechanisms at hosts running IPsec E.g., a Security Association Database Lots of plug-in stuff to do the cryptographic heavy lifting Does NOT require core router changes

The Protocol Components Pretty simple Necessary to interoperate with non-IPsec equipment So everything important is inside an individual IP packet’s payload No inter-message components to protocol Though some security modes enforce inter-message invariants

The Supporting Mechanisms Methods of defining security associations Databases for keeping track of what’s going on with other IPsec nodes To know what processing to apply to outgoing packets To know what processing to apply to incoming packets

Plug-In Mechanisms Designed for high degree of generality So easy to plug in: Different crypto algorithms Different hashing/signature schemes Different key management mechanisms

Status of IPsec Accepted Internet standard Widely implemented and used Supported in Windows 2000, XP, Vista, and Windows 7 In Linux 2.6 (and later) kernel The architecture doesn’t require everyone to use it RFC 3602 on using AES in IPsec still listed as “proposed” Expected that AES will become default for ESP in IPsec

Traffic Control Mechanisms Filtering Source address filtering Other forms of filtering Rate limits Protection against traffic analysis Padding Routing control

Source Address Filtering Filtering out some packets because of their source address value Usually because you believe their source address is spoofed Often called ingress filtering Or egress filtering . . .

Source Address Filtering for Address Assurance Router “knows” what network it sits in front of In particular, knows IP addresses of machines there Filter outgoing packets with source addresses not in that range Prevents your users from spoofing other nodes’ addresses But not from spoofing each other’s

Source Address Filtering Example 95.113.27.12 56.29.138.2 My network shouldn’t be creating packets with this source address 128.171.192.* So drop the packet

Source Address Filtering in the Other Direction Often called egress filtering Or ingress filtering . . . Occurs as packets leave the Internet and enter a border router On way to that router’s network What addresses shouldn’t be coming into your local network?

Filtering Incoming Packets 128.171.192.5 128.171.192.7 Packets with this source address should be going out, not coming in 128.171.192.* So drop the packet

Other Forms of Filtering One can filter on things other than source address Such as worm signatures, unknown protocol identifiers, etc. Also, there are unallocated IP addresses in IPv4 space Can filter for packets going to or coming from those addresses Also, certain source addresses are for local use only Internet routers can drop packets to/from them

Rate Limits Many routers can place limits on the traffic they send to a destination Ensuring that the destination isn’t overloaded Popular for denial of service defenses Limits can be defined somewhat flexibly But often not enough flexibility to let the good traffic through and stop the bad

Padding Sometimes you don’t want intruders to know what your traffic characteristics are Padding adds extra traffic to hide the real stuff Fake traffic must look like real traffic Usually means encrypt it all Must be done carefully, or clever attackers can tell the good stuff from the noise

Routing Control Use ability to control message routing to conceal the traffic in the network Used in onion routing to hide who is sending traffic to whom For anonymization purposes Routing control also used in some network defense To hide real location of a machine E.g., SOS DDoS defense system

Onion Routing Meant to hide source and destination of traffic Encrypt real packet Wrap it in another packet With intermediate receiver Who actively participates Generally, do it multiple times

The Effect of Onion Routing Lots of packets with encrypted payloads flow around At each step, one layer of encryption peeled off None of the intermediate routers are sure when real delivery occurs Last layer also encrypted

Costs of Onion Routing Multiple encryptions per packet Packet travels further Decryption done at app level So multiple trips up and down the network stack Unless carefully done, observers can deduce who’s sending to whom