ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Network Security Protocols in Practice Part I
IP SECURITY – Chapter 16 IP SECURITY – Chapter 16 Security Mechanisms: – S/MIME, PGP client/server - Kerberos web access - Secure Sockets Layer network.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IPSec Isaac Ghansah.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
K. Salah1 Security Protocols in the Internet IPSec.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
1 Network Security Lecture 8 IP Sec Waleed Ejaz
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
TCP/IP Protocols Contains Five Layers
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
IP Security (IPSec) Authentication Header (AH) Dr Milan Marković.
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
IPSec IPSec is communication security provided at the network layer.
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
Virtual Private Networks (VPNs)
Virtual Private Networks (VPNs)
Cryptography and Network Security
Presentation transcript:

ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall

IPsec: AH and ESP IP security issues IPsec security services IPsec modes Security association AH ESP VPN

TCP/IP Example

IP Packet format

IP Security Issues When an entity receives an IP packet, it has no assurance of: ◦ Data origin authentication / data integrity:  The packet has actually been send by the entity which is referenced by the source address of the packet  The packet contains the original content the sender placed into it, so that it has not been modified during transport  The receiving entity is in fact the entity to which the sender wanted to send the packet ◦ Confidentiality:  The original data was not inspected by a third party while the packet was sent from the sender to the receiver

IP Security Issues (Cont’d) Many solutions are application-specific ◦ TLS for Web, S/MIME for , SSH for remote login IPsec aims to provide a framework of open standards for secure communications over IP ◦ Protect every protocol running on top of IPv4 and IPv6

IPsec IETF standard for real-time communication security Implemented at IP layer, all traffic can be secured no matter what application. Transparent to applications, no changes on upper-layer software. Transparent to end users, no need to train users on security mechanisms, issuing keying material on a per-user basis, or revoking keying material when users leave.

IPsec = AH + ESP + IPcomp + IKE IPsec: Network Layer Security Protection for IP traffic AH provides integrity and origin authentication ESP also confidentiality Compression Sets up keys and algorithms for AH and ESP AH and ESP rely on an existing security association ◦ Idea: parties must share a set of secret keys and agree on each other’s IP addresses and crypto algorithms Internet Key Exchange (IKE) ◦ Goal: establish security association for AH and ESP ◦ If IKE is broken, AH and ESP provide no protection!

IPsec Security Services Authentication and integrity for packet sources ◦ Ensures connectionless integrity (for a single packet) and partial sequence integrity (prevent packet replay) Confidentiality (encapsulation) for packet contents ◦ Also partial protection against traffic analysis Authentication and encapsulation can be used separately or together Either provided in one of two modes These services are transparent to applications above transport (TCP/UDP) layer

IPsec Modes Transport mode ◦ Used to deliver services from host to host or from host to gateway ◦ Usually within the same network, but can also be end-to-end across networks Tunnel mode ◦ Used to deliver services from gateway to gateway or from host to gateway ◦ Usually gateways owned by the same organization  With an insecure network in the middle

IPsec in Transport Mode End-to-end security between two hosts ◦ Typically, client to gateway (e.g., PC to remote host) Requires IPsec support at each host

IPsec in Tunnel Mode Gateway-to-gateway security ◦ Internal traffic behind gateways not protected ◦ Typical application: virtual private network (VPN) Only requires IPsec support at gateways

Tunnel Mode Illustration IPsec protects communication on the insecure part of the network Implements IPSec Implements IPSec

Transport mode secures packet payload and leaves IP header unchanged Tunnel mode encapsulates both IP header and payload into IPsec packets Transport Mode vs. Tunnel Mode IP header (real dest) IPsec headerTCP/UDP header + data IP header (gateway) IPsec headerTCP/UDP header + data IP header (real dest)

Security Association (SA) One-way sender-recipient relationship SA determines how packets are processed ◦ Cryptographic algorithms, keys, IVs, lifetimes, sequence numbers, mode (transport or tunnel) ◦ SA is identified by SPI (Security Parameters Index)… ◦ Each IPsec keeps a database of SAs ◦ SPI is sent with packet, tells recipient which SA to use SA is defined by the triple

SA Components Each IPsec connection is viewed as one-way so two SAs required for a two-way conversation ◦ Hence need for Security Parameter Index Security association (SA) defines ◦ Protocol used (AH, ESP) ◦ Mode (transport, tunnel) ◦ Encryption or hashing algorithm to be used ◦ Negotiated keys and key lifetimes ◦ Lifetime of this SA ◦ … plus other info

Security Association Issues How is SA established? ◦ How do parties negotiate a common set of cryptographic algorithms and keys to use? More than one SA can apply to a packet! ◦ E.g., end-to-end authentication (AH) and additional encryption (ESP) on the public part of the network

AH: Authentication Header Sender authentication Integrity for packet contents and IP header Sender and receiver must share a secret key ◦ This key is used in HMAC computation ◦ The key is set up by IKE key establishment protocol and recorded in the Security Association (SA)  SA also records protocol being used (AH) and mode (transport or tunnel) plus hashing algorithm used  MD5 or SHA-1 supported as hashing algorithms

IP Headers Version Header Length TOS Packet length Packet Id Flags Fragment offset TTL Protocol number Checksum Source IP address Destination IP address Options PredictableImmutable Mutable AH sets mutable fields to zero and predictable fields to final value and then uses this header plus packet contents as input to HMAC

AH in Transport Mode Before AH is applied

AH in Tunnel Mode Before AH is applied

Provides integrity and origin authentication Authenticates portions of the IP header Anti-replay service (to counter denial of service) No confidentiality AH Format Next header (TCP) Payload lengthReserved Security parameters index (SPI) Sequence number ICV: Integrity Check Value (HMAC of IP header, AH, TCP payload) Identifies security association (shared keys and algorithms) Anti-replay Authenticates source, verifies integrity of payload

Prevention of Replay Attacks When SA is established, sender initializes 32-bit counter to 0, increments by 1 for each packet ◦ If wraps around , new SA must be established Recipient maintains a sliding 64-bit window ◦ If a packet with high sequence number is received, do not advance window until packet is authenticated

Forms of AH-Based Authentication

ESP: Encapsulating Security Payload Adds new header and trailer fields to packet Transport mode ◦ Confidentiality of packet between two hosts ◦ Complete hole through firewalls ◦ Used sparingly Tunnel mode ◦ Confidentiality of packet between two gateways or a host and a gateway ◦ Implements VPN tunnels

New IP header Confidentiality and integrity for packet payload ◦ Symmetric cipher negotiated as part of security assoc Optionally provides authentication (similar to AH) Can work in transport… …or tunnel mode ESP Security Guarantees Original IP header ESP headerTCP/UDP segmentESP trailerESP auth encrypted authenticated Original IP header ESP headerTCP/UDP segmentESP trailerESP auth

ESP Packet Identifies security association (shared keys and algorithms) Anti-replay TCP segment (transport mode) or entire IP packet (tunnel mode) Pad to block size for cipher, also hide actual payload length Type of payload HMAC-based Integrity Check Value (similar to AH)

Virtual Private Networks (VPN) ESP is often used to implement a VPN ◦ Packets go from internal network to a gateway with TCP / IP headers for address in another network Entire packet hidden by encryption ◦ Including original headers so destination addresses are hidden ◦ Receiving gateway decrypts packet and forwards original IP packet to receiving address in the network that it protects This is known as a VPN tunnel ◦ Secure communication between parts of the same organization over public untrusted Internet

ESP Together With AH AH and ESP are often combined End-to-end AH in transport mode ◦ Authenticate packet sources Gateway-to-gateway ESP in tunnel mode ◦ Hide packet contents and addresses on the insecure part of the network Significant cryptographic overhead ◦ Even with AH

Reading Assignment [Kaufman] Chapter 17