IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Cryptography and Network Security
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Network Layer Security: IPSec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IP SECURITY – Chapter 16 IP SECURITY – Chapter 16 Security Mechanisms: – S/MIME, PGP client/server - Kerberos web access - Secure Sockets Layer network.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Cryptography and Network Security
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security: Security Across the Protocol Stack
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
CSE 4905 IPsec.
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
IPSec IPSec is communication security provided at the network layer.
No.9: IP Security Network Information Security 网络信息安全
Cryptography and Network Security
CSCE 815 Network Security Lecture 13
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
NET 536 Network Security Lecture 5: IPSec and VPN
Network Security Essentials
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 6 IP Security.
Cryptography and Network Security
Presentation transcript:

IP Security

Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified key areas for security mechanisms. Report emphasis on the need to secure the network infrastructure from unauthorized monitoring. and control of network traffic. And the need to secure end-user-to-end-user traffic using authentication and encryption mechanisms. Thus IAB included authentication and encryption as necessary security features in the next generation IP, which has been issued as IPv6.

Security facilities in the TCP/IP protocol stack

Definition IPSec provides a standard set of cryptographic algorithms that provides secure, trusted connections over TCP/IP and protects and filters the contents of IP packets at layer 3 (Network layer) of the OSI model.

IPSec encrypted packets are resistant to: IP Spoofing Man-in-the-middle attack DOS Attacks Eveasedropping/packet sniffing Payload/data modification

Applications of IPSec Secure branch office connectivity over the internet e.g. VPN over the internet. Secure remote accessover the internet. Establishing extranet and intranet connectivity with partners. Enhancing electronic commerce security. IPSec can encrypt and/or authenticate traffic at IP level.Thus, all distributed applications (including remote logon, client/server, , file transfer, web access, and so on) can be secured.

IPSec Usage

Benefits of IPSec In a firewall/router provides strong security to all traffic crossing the perimeter Is below transport layer, hence transparent to applications can be transparent to end users can provide security for individual users if desired additionally in routing applications: ◦ assure that router advertisments come from authorized routers ◦ neighbor advertisments come from authorized routers ◦ insure redirect messages come from the router to which initial packet was sent

IPSec Services Two protocols are used to provide security: ◦ Authentication Header Protocol (AH) ◦ Encapsulation Security Payload (ESP) Services provided are: ◦ Access control ◦ Connectionless integrity ◦ Data origin authentication ◦ Rejection of replayed packets  a form of partial sequence integrity ◦ Confidentiality (encryption) ◦ Limited traffic flow confidentiality

To create a secure IPSec encrypted connection, both sides require a compataible (but not identical)IPSec policy. Compatibility is negotiated through ISAKMP. Once ISAKMP ensures that both parties are involved in an IPSec connection meet a common and compatible set of requirements, a SA is assigned to them

Like a sophisticated firewall, Ipsec can filter packets on the basis of source and destination address, and the no of ports

Security Associations a one-way relationship between sender & receiver that affords security for traffic flow defined by 3 parameters: ◦ Security Parameters Index (SPI)  a bit string ◦ IP Destination Address  only unicast allowed  could be end user, firewall, router ◦ Security Protocol Identifier  indicates if SA is AH or ESP has a number of other parameters ◦ seq no, AH & EH info, lifetime etc have a database of Security Associations

Security Association Database SAD normally has following parameters: Security Parameter Index ◦ Bit value used to identify SA Sequence Number Counter ◦ Bit value used to generate sequence numbers Sequence Counter Overflow ◦ A flag whose value indicates that overflow of sequence numbers Anti-Replay Window ◦ Indicates whether a packet is a replay AH Information ◦ Authentication algorithms, keys ESP Information ◦ Encryption and Authentication algorithms, keys, initialization values, key life time etc. Lifetime of this Security Association ◦ Time interval or byte count after which SA must be replaced IPSec Protocol Mode ◦ Tunnel or Transport or wildcard Path MTU ◦ Path maximum transmission Unit of a Packet aging variables

Security Policy Database The means by which IP traffic is related to specific SAs is SPD. Simply, SPD points to a subset of IP traffic and the associated SA to that traffic. In complex environment, there can be multiple entries for a SA. For any outbound packet, SPD does the following sequence of steps: ◦ Compare the values for the appropriate fields in the packet, which will point to zero or more fields. ◦ Determine the SA if any for this packet and its associated SPI. ◦ Do the required IPSec processing (ESP or AH)

Security Policy Database Each specific SPD entry is called Selector. The following selectors determine an SPD entry: Remote and Local IP Addresses ◦ This may be a single IP address or range of addresses or wildcard(mask) address Next layer Protocol ◦ TCP, UDP etc. Name ◦ A user identifier from the operating system Local and Remote Ports ◦ TCP or UDP port values

AH Authentication Header (AH) protocol is designed to authenticate the source host and to ensure the integrity of the payload carried by the IP packet. The protocol calculates a message digest, using a hashing function and a symmetric key, and inserts the digest in the authentication header. The AH protocol provides source authentication and data integrity, but not privacy. This is transport AH 

Steps for authentication header: ◦ AH is added to the payload with the authentication data field set to zero. ◦ Padding may be added to make the total length even for a particular hashing algorithm ◦ Hashing is based on total packet. For message digest, only those fields of IP header that don’t change during transmission are considered. ◦ Authentication data are included in the authentication header Payload length: Length of AH in 4-byte multiples. SPI: plays the role of VCI Sequence number: for anti replay

ESP Encapsulation Security Payload (ESP) provides source authentication, privacy and integrity. Steps ◦ ESP trailer is added to the payload ◦ Payload and trailer or encrypted ◦ ESP header is added ◦ ESP header, payload and ESP trailer are used to create authenticated data. ◦ Authenticated data are added at the end of ESP trailer. This is transport ESP 

Two Modes of Operation IPSec operates in two different modes. Mode defines where the IPSec header is applied to the IP packet. ◦ Transport mode  IPSec header is added between the IP header and the rest of the packet.  Most logical when IPSec is used end-to-end ◦ Tunnel mode  IPSec header is placed in front of the original IP header.  The IPSec header, the preserved IP header, and the rest of the packet are treated as the payload.  Can be used when IPSec is applied at intermediate point along path (e.g., VPN)  Results in slightly longer packet  Note that data may be encrypted multiple times