CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Internet Security CSCE 813 IPsec
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 5 Network Security Protocols in Practice Part I
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
K. Salah1 Security Protocols in the Internet IPSec.
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
TCP/IP Protocols Contains Five Layers
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
SECURE WIRELESS LAN KEAMANAN JARINGAN PROGRAM STUDI TEKNIK TELEKOMUNIKASI FAKULTAS TEKNIK ELEKTRO TELKOM UNIVERSITY.
Encryption and Network Security
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Presentation transcript:

CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz

HW4 feedback?

Firewalls

Application-level gateways  Acts as an application-level proxy for users –Each “logical” connection is actually two TCP connections –If particular application is not supported, that application is not allowed Telnet FTP SMTP HTTP Outside host Inside host Outside connection Inside connection

Application-level gateways  Advantages –Restricted number of applications to worry about –Can examine application-level traffic for potential vulnerabilities –Can provide user authentication –More secure than packet-based filtering  But… –Higher processing overhead

Circuit-level gateways  As with application-level gateways, circuit-level gateways set up two TCP connections:  Once connections are established, TCP segments are forwarded without examining their contents –The security function consists of determining which connections are allowed Inside host Outside host Outside connection Inside connection Out In Circuit-level gateway

Host-based firewalls  Can be used on machines that are not part of a larger network (e.g., home machines)  Can also provide additional protection within a larger network  Filtering can be machine-specific

Multiple firewalls  Can have multiple network firewalls, each providing different protection web server internal network Use stricter filtering rules Protect web server and network from each other

VPNs and IPSec  Can use a firewall to allow for encrypted and authenticated communication across the Internet –If done behind the firewall, the firewall cannot analyze packets  Used in conjunction with IPSec, which does encryption/authentication at the IP layer plain IP packet secure IP packet plain IP packet

Network security in practice

Network layers  Application  Transport  Network  Data link  Physical

Roughly…  Application layer: the communicating processes themselves and the actual messages transmitted  Transport layer: handles transmissions on an “end- to-end” basis  Network layer: handles transmissions on a “hop- by-hop” basis

Examples  Application layer: PGP  Transport layer: SSL/TLS  Network layer: IPsec  Security not usually provided at the data link layer, except possible within closed networks (e.g., military)  Security at the physical layer? (Shielded wires…)

Security in what layer?  Depends on the purpose… –What information needs to be protected? –What is the attack model? –Who shares keys in advance? –Should the user be involved?  E.g., a network-layer protocol cannot authenticate two end-users to each other  An application-layer protocol cannot protect IP header information  Also affects efficiency, ease of deployment, etc.

Example: PGP vs. SSL vs. IPsec  PGP is an application-level protocol for “secure ” –Can provide security on “insecure” systems –Users choose when to use PGP; user must be involved –Alice’s signature on an proves that Alice actually generated the message, and it was received unaltered; also non-repudiation –In contrast, SSL would secure “the connection” from Alice’s computer; would need an additional mechanism to authentication the user –Good for communication with off-line party

Example: PGP vs. SSL vs. IPsec  SSL sits at the transport layer, “above” TCP –Packet stream authenticated/encrypted –End-to-end security, best for connection-oriented sessions (e.g., http traffic) –User does not need to be involved –The OS does not have to change, but applications do if they want to communicate securely –If TCP accepts a packet which is rejected by SSL, then TCP will reject the “correct” packet (detecting a replay) when it arrives! SSL must then close the connection…

Example: PGP vs. SSL vs. IPsec  IPsec sits at the network layer –Individual packets authenticated/encrypted –End-to-end or hop-by-hop security Best for connectionless channels –Need to modify OS –All applications are “protected” by default, without requiring any change to applications or actions on behalf of users –Only authenticates hosts, not users –User completely unaware that IPsec is running

Take home message…  Best solution may involve changes at both the OS and application layers –The “best” solution is not to run SSL and IPsec! –Would have been better to design system with security in mind from the beginning…

IPsec: AH and ESP

Overview  IPsec consists of two components –AH/ESP --- used once a key is established (either using IKE or out-of-band) –IKE --- Can be used to establish a key

Security associations (SAs)  When a node receives a packet, needs to know who it is from –May be receiving IPsec traffic from multiple senders at the same time –Possibly even with the same IP address  The IPsec header indicates which security association to use

Security associations (SAs)  An SA is a crypto-protected connection –One SA in each direction…  At each end, the SA contains a key, the identity of the other party, the sequence number, and crypto parameters (algorithms, auth/enc/both)  IPsec header indicates which SA to use –Won’t go into more detail…

SA database  Parties will maintain a database of SAs for currently-open connections –Used both to send and receive packets

Security policy database  Node maintain a table specifying what is required for each incoming packet –Drop –Forward/accept without IPsec protection –Require IPsec protection Auth only Enc only Both  As with firewalls, decisions can be based on any information in the packet

AH vs. ESP  Two header types…  Authentication header (AH) –Provides integrity only  Encapsulating security payload (ESP) –Provides encryption and/or integrity  Both provide cryptographic protection of everything beyond the IP headers –AH additionally provides integrity protection of some fields of the IP header

Firewalls…  Potential problem if layer-4 header data is used for decision-making; this information will be encrypted when using IPsec –Arguments pro and con as to whether this data should be encrypted or not  Pro: –Data shouldn’t be divulged; get rid of firewalls  Con: –Administrators will likely keep firewalls and turn off encryption…

Transport vs. tunnel mode  Transport mode: add IPsec information between IP header and rest of packet –IP header | IPsec | [ packet ] –Most logical when IPsec used end-to-end protected

Transport vs. tunnel mode  Tunnel mode: keep original IP packet intact; add new header information –New IP header | IPSec | [ old IP header | packet ] –Can be used when IPSec is applied at intermediate point along path (e.g., for firewall-to-firewall traffic) E.g., change source/destination info… Treat the link as a secure tunnel –Results in slightly longer packet –Data may end up getting encrypted multiple times protected