CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Secure Mobile IP Communication
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 IPSec—An Overview Somesh Jha Somesh Jha University of Wisconsin University of Wisconsin.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec – IKE CS 470 Introduction to Applied Cryptography
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
K. Salah1 Security Protocols in the Internet IPSec.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
1 Network Security Lecture 8 IP Sec Waleed Ejaz
CSCE 715: Network Systems Security
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
CMSC 414 Computer and Network Security Lecture 28 Jonathan Katz.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Cryptography CSS 329 Lecture 13:SSL.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
Chapter 18 IP Security  IP Security (IPSec)
CSE 4905 IPsec II.
IT443 – Network Security Administration Instructor: Bo Sheng
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Presentation transcript:

CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz

Security in what layer?  Depends on the purpose… –What information needs to be protected? –What is the attack model? –Who shares keys in advance? –Should the user be involved?  E.g., a network-layer protocol cannot authenticate two end-users to each other  Also affects efficiency, ease of deployment

Example: SSL vs. IPSec  SSL sits “on top of” the transport layer (e.g., TCP) –The OS does not have to be changed –Easy to modify applications to use SSL, if desired –If SSL rejects a packet that is accepted by TCP, then the connection must be closed! Potential denial of service attack

Example: SSL vs. IPSec  IPSec sits “on top of” the network layer –Need to modify OS –All applications now “protected” by default, without requiring any change to applications or actions on behalf of users –Can only authenticate IP addresses, not users

Take home message…  Best solution involves changes at both the OS and applications layers –The “best” solution is not to run SSL and IPSec! –Would have been better to design system with security in mind from the beginning… –(Keep in mind for future systems…)

Example protocols…  We will look at –IPSec (and IKE, if time) –SSL –PGP (if time)

IPSec: AH and ESP

Overview  IPSec consists of two components –AH/ESP Used once a key is established (either using IKE or out-of-band) –IKE Can be used to establish a key

Security associations (SAs)  An SA is a crypto-protected connection –One SA in each direction…  At each end, the SA contains a key, the identity of the other party, the sequence number, and crypto parameters  IPSec header indicates which SA to use –Chosen by destination –Won’t go into more detail…

More on SAs…  Parties will maintain a database of SAs for currently-open connections –Used both to send and receive packets

AH vs. ESP  Authentication header (AH) –Provides integrity only  Encapsulating security payload (ESP) –Provides encryption and/or integrity  Both provide cryptographic protection of everything beyond the IP headers –AH additionally provides integrity protection of some fields of the IP header

Anti-replay  All authenticated communication includes a sequence number  This prevents replay attacks –Note that this is not entirely trivial since IP may deliver packets out of order…

Tunnel vs. transport mode  Transport mode: add IPSec information between IP header and rest of packet –IP header | IPSec | packet –Most logical when IPSec used end-to-end

Tunnel vs. transport mode  Tunnel mode: keep original IP packet intact; add new header information –New IP header | IPSec | old header | packet –Can be used when IPSec is applied at intermediate point along path (e.g., for firewall- to-firewall traffic) E.g., change source/destination info… –Results in slightly longer packet –Note that data may be encrypted multiple times

Issues…  NATs –If address translation is done, the integrity check will fail due to changes address/port information!  Firewalls –Problem if data used for decision-making is encrypted end-to-end –Arguments pro and con as to whether this data should be encrypted or not

More on AH  AH provides integrity protection on header –But some fields change en route!  Only immutable fields are included in the integrity check  Mutable but predictable fields are also included in the integrity check –E.g., for source routing… –The final value of the field is used

More on AH vs. ESP  Recall that ESP provides encryption and/or authentication  So why do we need AH? –AH also protects the IP header –Export restrictions –Firewalls need some high-level data to be unencrypted  None of these are compelling…

The future of IPSec?  In the long run, it seems that AH will become obsolete –Better to encrypt everything anyway –No real need for AH –Certain performance disadvantages –AH is complex… –Etc.  IPSec is still evolving

IPSec: IKE

Overview of IKE  IKE provides mutual authentication, establishes shared key, and creates SA  Assumes a long-term shared key, and uses this to establish a session key (as well as to provide authentication)  Key types –Public signature keys –Public encryption keys –Symmetric keys

IKE phases  Phase 1: long-term keys used to derive a session key (and provide authentication)  Phase 2: session key used to derive SAs  Why…? –No good answer

IKE phase 1  Aggressive mode –3 messages  Main mode –6 messages –Additional features: Anonymity Negotiation of crypto parameters

Anonymity  Protocols can be designed so that identities of parties are hidden from eavesdroppers –Even while providing authentication!  Can also protect anonymity of one side against active attacks –Whom to protect? Initiator: since responder’s identity is known… Responder: since otherwise it is easy to get anyone’s identity

Key types  As mentioned earlier…  Why are there two PK options? –Signature-based option Escrow Legal reasons –Encryption-based option Can be used to provide anonymity in both directions  Adds tremendously to the complexity

Crypto parameters…  Choice of: –Encryption method (DES, 3DES, …) –Hash function (MD5, SHA-1, …) –Authentication method (e.g., key type, etc.) –Diffie-Hellman group (e.g., (g, p), etc.)  A complete set of protocols (a suite) must be specified

Negotiating parameters  Many protocols allow parties to negotiate cryptographic algorithms and parameters –Allows users to migrate to stronger crypto; increases inter-operability (somewhat)  But, opens up a potential attack…  Also makes for more complicated implementations

Phase 1 session keys  Two session keys are defined in phase 1 –One each for encryption/authentication  These keys are used to protect the final phase 1 messages as well as all phase 2 messages  These keys are derived from the DH key using hashing –Details in the book…

Aggressive mode  Alice sends g a, “Alice”, crypto algorithms –Note that choices are restricted by this message  Bob sends g b, choice of crypto algorithm, “proof” that he is really Bob –If Bob does not support any of the suggested algorithms, he simply does not reply –Note that there is no way to authenticate a refusal, since no session key yet established  Alice sends “proof” that she is Alice

Main mode  Negotiate crypto algorithms (2 rounds)  Alice and Bob do anonymous Diffie- Hellman key exchange (2 rounds)  Alice sends “Alice” plus a proof that she is Alice, all encrypted using g ab  Bob does similarly…

“Proofs” of identity  Depend on which type of long-term shared key is being used  Similar (in spirit) to the authentication protocols discussed in class –Details in book…

Summary of IKE  IKE seems to be overly complex  Will almost certainly be replaced with an updated standard