ISAKMP RFC 2408 Internet Security Association & Key Management Protocol Protocol Establish, modify, and delete SAs Negotiate crypto keys Procedures Authentication.

Slides:



Advertisements
Similar presentations
IKE : Internet Key Exchange
Advertisements

Internet Protocol Security (IP Sec)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
CSC 474 Information Systems Security
Header and Payload Formats
Security at the Network Layer: IPSec
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Network Layer Security: IPSec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 IPSec—An Overview Somesh Jha Somesh Jha University of Wisconsin University of Wisconsin.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Internet Security Association & Key Mana gement Protocol CNET 이동재.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec – IKE CS 470 Introduction to Applied Cryptography
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
IKE message flow IKE message flow always consists of a request followed by a response. It is the responsibility of the requester to ensure reliability.
Group Secure Association Key Management Protocol (GSAKMP) Presented by Hugh Harney
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Cryptography and Network Security
1 IPsec Youngjip Kim Objective Providing interoperable, high quality, cryptographically-based security for IPv4 and IPv6 Services  Access.
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
A Cryptographic Evaluation of IPsec. Neils Ferguson and Bruce Schneier presented by Rajdeep R Larha.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
IPsec: IKE, Internet Key Exchange IPsec does not use Public Key Infrastructure and exchanging keys before an IPsec connection is established is a problem.
IP Security: Security Across the Protocol Stack
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
CSCE 715: Network Systems Security
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
TCP/IP Protocols Contains Five Layers
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Internet Key Exchange IKE ● RFC 2409 ● Services – Constructs shared authenticated keys – Establishes shared security parameters – Common SAs between IPSec.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Virtual Private Network Configuration
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
1 Internet Key Exchange Rocky K. C. Chang 20 March 2007.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
The IPSec Protocol Suite
Chapter 5 Network Security Protocols in Practice Part I
CSE 4905 IPsec II.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Presentation transcript:

ISAKMP RFC 2408 Internet Security Association & Key Management Protocol Protocol Establish, modify, and delete SAs Negotiate crypto keys Procedures Authentication of peers Threat mitigation

ISAKMP Defines procedures and packet formats to deal with SAs and keys Provides a framework for secure communication on the Internet Does not specify algorithms, formats, or protocols ISAKMP is a framework in which a specific secure communication definition can be implemented

ISAKMP Security Associations Authentication Public Key Cryptography Protection DoS – Anti-Clogging Hijacking a connection Man in the middle attacks

ISAKMP Terminology DOI – Domain Of Interpretation: defines payload formats, exchange types, naming conventions

IISAKMP – Phases Phase 1: Two entities agree on how to protect further negotiation traffic. They negotiate an ISAKMP SA for an authenticated and secure channel Phase 2:The phase 1 secure channel is used to negotiate security services for IPSec.

ISAKMP Header Initiator Cookie Responder Cookie Major Version Minor Next Payload Exchange Type Flags Message ID Length

Header Fields Initiator Cookie (8 octets) – Cookie of entity that initiated SA establishment, notification or deletion. Responder Cookie (8 octets) – Cookie of the responder Next Payload (1 octet) – Type of first payload Major/Minor Version (4 bits each) – Version of ISAKMP in use Exchange Type (1 octet) – Type of exchange being used Flags (1 octet) – More stinking flags, encrypt, commit authentication only Message ID (4 octets) – Unique ID to identify things in Phase 2 Length (4 octets) – Length of total message (headers + payloads)

Next Payload Types Next Payload Type Value Next Payload Type Value NONE 0 SA 1 Proposal 2 Transform 3 Key Exchange 4 Identification 5 Certificate 6 Cert Request 7 Next Payload Type Value Hash 8 Signature 9 Nonce 10 Notification 11 Delete 12 Vendor ID 13 Reserved 14 – 127 Private Use 128 - 255

Exchange Types Exchange Type Value Exchange Type Value NONE 0 Base 1 Id Protection 2 Auth Only 3 Aggressive 4 Informational 5 Exchange Type Value ISAKMP Future Use 6 - 31 DOI Specific Use 32 – 127 Private Use 128 - 255

Generic Payload Header Next Payload Reserved Payload Length Payload Data

Domain of Interpretation (DOI) SA Payload Next Payload Reserved Payload Length Domain of Interpretation (DOI) ~ Situation DOI (4 octets) – Identifies the DOI under which this negotiation is taking place. A value of 0 (zero) during Phase 1 specifies a Generic ISAKMP SA which can be used for any protocol during Phase 2. Situation - A DOI-specific field that identifies the situation under which this negotiation is taking place.

Proposal Payload Next Payload Reserved Payload Length Proposal No. Proposal ID SPI Size No. of Transforms SPI (variable)

Proposal Payload Payload Length (2 octets) – Length is octets of the entire Proposal payload including the generic payload header, the Proposal payload, and all Transform payloads associated with this proposal. Proposal No. - Identifies the Proposal number for the current payload. Proposal ID – Specifies the protocol identifier such as IPSEC ESP, IPSEC AH, OSPF, TLS, etc. SPI Size – Length in octets of the SPI as defined by the Protocol ID. No. of Transforms – Specifies the number of transforms for the proposal. SPI (variable) – The sending entity's SPI.

Transform Payload ~ Next Payload Reserved Payload Length Transform No. Transform ID Reserved2 ~ SA Attributes

Transform Payload Payload Length (2 octets) – Length is octets of the current payload, including the generic payload header, Transform values, and all SA attributes Transform No. - Identifies the Transform number for the current payload. Transform ID – Specifies the Transform identifier fmor the protocol within the current proposal. Reserved 2 (2 octets) – Set to zero. SA Attributes (Variable length) – SA attributes should be represented using the Data Attributes format.

Key Exchange Payload ~ Reserved Payload Length Next Payload Key Exchange Data Key Exchange Data (variable length) – Data required to generate a session key. This data is specified by the DOI and the associated Key Exchange algorithm.

Certificate Payload ~ Reserved Payload Length Next Payload Cert Encoding Key Exchange Data ~ Cert Encoding (1 octet) – Indicates the type of certificate contained in the Certificate field.

Certificate Types Certificate Type Value Certificate Type Value NONE 0 PKCS #7 1 PGP Certificate 2 DNS Signed Key 3 X.509 Cert - Signature 4 X.509 Cert – Key Exchange 5 Certificate Type Value Kerberos Token 6 Cert Revoc List 7 Authority Revoc List 8 SPKI Cert. 9 X.509 Cert – Attribute 10 Reserved 11 - 255

Other Payloads ~ ~ ~ Reserved Payload Length Next Payload Hash Data Signature Data Next Payload Reserved Payload Length ~ Nonce Data

Notification Payload ~ ~ Next Payload Reserved Payload Length DOI Protocol ID SPI Size Notify Message Type ~ SPI ~ Notification Data

Notify Messages Errors Value INVALID-PAYLOAD-TYPE 1 DOI-NOT-SUPPORTED 2 SITUATION-NOT-SUPPORTED 3 INVALID-COOKIE 4 INVALID-MAJOR-VERSION 5 INVALID-MINOR-VERSION 6 INVALID-EXCHANGE-TYPE 7 INVALID-FLAGS 8 INVALID-MESSAGE-ID 9 INVALID-PROTOCOL-ID 10 INVALID-SPI 11 INVALID-TRANSFORM-ID 12 ATTRIBUTES-NOT-SUPPORTED 13 NO-PROPOSAL-CHOSEN 14 BAD-PROPOSAL-SYNTAX 15 Errors Value PAYLOAD-MALFORMED 16 INVALID-KEY-INFORMATION 17 INVALID-ID-INFORMATION 18 INVALID-CERT-ENCODING 19 INVALID-CERTIFICATE 20 CERT-TYPE-UNSUPPORTED 21 INVALID-CERT-AUTHORITY 22 INVALID-HASH-INFORMATION 23 AUTHENTICATION-FAILED 24 INVALID-SIGNATURE 25 ADDRESS-NOTIFICATION 26 NOTIFY-SA-LIFETIME 27 CERTIFICATE-UNAVAILABLE 28 UNSUPPORTED-EXCHANGE-TYPE 29 UNEQUAL-PAYLOAD-LENGTHS 30 RESERVED (Future Use) 31 - 8191 Private Use 8192 – 16383

ISAKMP Message Construction Initiator Cookie Responder Cookie Major Version Minor Version NP = KE Exchange Type Flags Message ID Total Message Length NP = Nonce Reserved KE Payload Length Key Exchange Data NP = 0 Reserved Nonce Payload Length Nonce Data

Proposal Syntax Proposal # Proposals with the same Proposal Transform # Proposals with the same Proposal number are taken as a logical AND. Proposals with different numbers are taken as a logical OR. Different Transform within a proposal are taken as a logical OR.

Proposal Example Proposal 1: AH Transform 1: HMAC-SHA Transform 2: HMAC-MD5 Proposal 2: ESP Transform 1: 3DES with HMAC-SHA Transform 2: 3DES with HMAC-MD5 Transform 3: AES with HMAC-SHA-256 Proposal 3: ESP Proposal 4: PCP Transform 1: LZS

Exchange Types Exchange Type Value Exchange Type Value NONE 0 Base 1 Id Protection 2 Auth Only 3 Aggressive 4 Informational 5 Exchange Type Value ISAKMP Future Use 6 - 31 DOI Specific Use 32 – 127 Private Use 128 - 255

Base Exchange Initiator Direction Responder Note Header, SA, Nonce => Begin ISAKMP-SA negotiation <= HDR, SA, Nonce Basic SA agreed upon Header, KE, Idii, Auth => Key generated by responder Initiator Ident verified <= HDR, KE, Idir, Auth Responder Ident verified Initiator key generated, SA est.