NETWORK SECURITY.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

NS-H /11041 IP Security. NS-H /11042 TCP/IP Example.
Cryptography and Network Security
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
Network Security Essentials Chapter 8 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IP SECURITY – Chapter 16 IP SECURITY – Chapter 16 Security Mechanisms: – S/MIME, PGP client/server - Kerberos web access - Secure Sockets Layer network.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Cryptography and Network Security
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden Revised by Andrew.
IP Security: Security Across the Protocol Stack
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Network Security David Lazăr.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
PGP & IP Security  Pretty Good Privacy – PGP Pretty Good Privacy  IP Security. IP Security.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
CSE 4905 IPsec.
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
IPSec IPSec is communication security provided at the network layer.
CSE565: Computer Security Lecture 23 IP Security
No.9: IP Security Network Information Security 网络信息安全
Cryptography and Network Security
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
Virtual Private Networks (VPNs)
Virtual Private Networks (VPNs)
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 6 IP Security.
Cryptography and Network Security
Presentation transcript:

NETWORK SECURITY

Outline IP Security Architecture Authentication Header Encapsulating Security Payload Combinations of Security Associations Key Management

IP Security Overview 1994 – RFC1636, “Security in the Internet Architecture” Identified key needs: Secure network infrastructure from unauthorized monitoring Control network traffic Secure end-to-end user traffic using encryption and authentication

IP Security Overview CERT – most serious attacks are IP spoofing and eavesdropping/packet sniffing Next generation IP includes authentication and encryption IPv6 IPSec  IPv6 Available with IPv4

Application of IPSec Secure branch office connectivity over the Internet Secure remote access over the Internet Establish extranet and intranet connectivity with partners Enhance electronic commerce security

Application of IP Security

Benefits of IPSec Strong security for all traffic when crossing the perimeter (边界) (assuming it is implemented in a firewall or router) IPSec in a firewall is resistant to bypass Below the transport layer (TCP, UDP) and transparent to applications Transparent to the end user Provides security for individual users – offsite workers, VPN

IPSec Documents November - 1998 RFC 2401 – Overview RFC 2402 – Packet Authentication Extension RFC 2406 – Packet Encryption Extension RFC 2408 – Key Management Capabilities Implemented as extension headers that follow the main header: Authentication Header (AH) Encapsulating Security Payload Header (ESP)

IPSec Documents packet format Domain of Interpretation relation between documents (identifiers and parameters)

IPSec Services Access Control 访问控制 Connectionless integrity 无连接完整性 Data origin authentication 数据源认证 Rejection of replayed packets 拒绝重放包 Confidentiality (encryption) 机密性 Limited traffic flow confidentiallity 有限的流量机密性

IPSec Services AH ESP(加密) ESP(加密认证) √ Access control 访问控制 Connectionless integrity 无连接完整性 Data origin authentication 数据源认证 Rejection of replayed packets 拒绝重放包 Confidentiality (encryption) 机密性 Limited traffic flow confidentiality 有限的流量机密性

Security Associations Security Association (SA) – is a one-way relationship between a sender and a receiver that defines the security services that are provided to a user SA is unidirectional (单向的) It defines the operations that occur in the transmission in one direction only Bi-directional transport of traffic requires a pair of SAs

Security Associations Uniquely identified by: Security parameter index (SPI) – bit string that provides the receiving device with info on how to process the incoming traffic Destination IP address – address of the destination endpoint of the SA (end user system or firewall/router) Security protocol – whether association is AH or ESP. Defines key size, lifetime and crypto algorithms (transforms)

Transport and Tunnel Modes SA supports two modes: Transport – protection for the upper layer protocols Tunnel – protection for the entire IP packet

Transport Mode Protection extends to the payload of an IP packet Primarily for upper layer protocols – TCP, UDP, ICMP Mostly used for end-to-end communication For AH or ESP the payload is the data following the IP header (IPv4) and IPv6 extensions Encrypts and/or authenticates the payload, but not the IP header

Tunnel Mode Protection for the entire packet Add new outer IP packet with a new outer header AH or ESP fields are added to the IP packet and entire packet is treated as payload of the outer packet Packet travels through a tunnel from point to point in the network

End-to-end Authentication transport tunnel Two Ways To Use IPSec Authentication Service

Authentication Header Provides support for data integrity and authentication of IP packets Undetected modification in transit is impossible Authenticate the user or application and filters traffic Prevents address spoofing attacks Guards against replay attacks Based on the use of a message authentication code (MAC) so two parties must share a key

IPSec Authentication Header Next header – type of header following Payload length – length of AH Reserved – future use Security Parameters Index – idents SA Sequence Number – 32bit counter Authentication data – variable field that contains the Integrity Check Value (ICV), or MAC

Scope of AH Authentication IP 头 TCP头 数据 原IP 头 AH头 TCP头 数据 Transport mode 传输模式 AH中完整性检查包括哪些数据? 新IP头 AH头 原始IP头 TCP头 数据 Tunnel Modes 隧道模式

Scope of AH Authentication IP 头 TCP头 数据 原IP 头 AH头 TCP头 数据 Transport mode 传输模式 AH中完整性检查包括哪些数据? 新IP头 AH头 原始IP头 TCP头 数据 Tunnel Modes 隧道模式

Encapsulating Security Payload Provides confidentiality services Confidentiality of message contents and limited traffic flow confidentiality ESP can also provide the same authentication services as AH

IPSec ESP Format Security Parameters Index – idents SA Sequence Number – 32bit counter Payload Data – variable field protected by encryption Padding – 0 to 255 bytes Pad Length – number of bytes in preceding Next header – type of header following Authentication data – variable field that contains the Integrity Check Value (ICV)

ESP and AH Algorithms Implementation must support DES in cipher block chaining (CBC) mode Other algorithms have been assigned identifiers in the DOI document Others: 3DES, PC5, IDA, 3IDEA, CAST, Blowfish ESP support use of a 96bit MAC similar to AH

ESP Padding Algorithm may require plaintext to be a multiple of some number of bytes Pad Length and Next Header must be right aligned within a 32-bit word Additional padding may be used to provide partial traffic flow confidentiality by conceal (隐蔽) actual length of the payload

Authenticated (optionally) Authenticated (optionally) Encapsulating Security Payload Original IP packet: Encrypted Transport Mode: Authenticated (optionally) Tunnel Mode: entire packet encrypted & authenticated Encrypted Authenticated (optionally)

Authenticated (optionally) ESP Transport Mode Encrypted Authenticated (optionally)

Authenticated (optionally) ESP Tunnel Mode Encrypted Authenticated (optionally)

Tunnel and Transport Mode Transport Mode SA Tunnel Mode SA AH Authenticates IP payload and selected portions of IP header Authenticates entire inner IP packet plus selected portions of outer IP header ESP Encrypts IP payload Encrypts inner IP packet ESP with authentication Encrypts IP payload. Authenticates IP payload but no IP header Encrypts inner IP packet. Authenticates inner IP packet.

Combining SAs SA can implement either AH or ESP protocol, but not both Traffic flow may require separate IPSec services between hosts Security Association Bundle refers to a sequence of SAs SAs in a bundle may terminate at different end points

Combining SAs SAs many combine into bundles in two ways: Transport adjacency – applying more than one security protocol to the same IP packet without invoking tunneling; only one level of combination, no nesting Iterated tunneling – application of mutltiple layers of security protocols effected through IP tunneling; multiple layers of nesting

Authentication + Encryption Several approaches to combining authentication and confidentiality ESP with Authentication Option First apply ESP then append the authentication data field Authentication applies to ciphertext rather than plaintext

Authentication + Encryption ESP with Authentication Option Transport Mode Tunnel Mode

Authentication + Encryption Transport-Tunnel Bundle First apply authentication, then encryption Authenticated data is protected and easier to store and retrieve Use a bundle consisting of an inner AH transport SA and an outer ESP tunnel SA Advantage: entire authenticated inner packet is encrypted and a new outer IP header is added

Authentication + Encryption Transport Adjacency Use two bundled transport SAs Inner being an ESP SA; outer being an AH SA Authentication covers the ESP plus the original IP header Advantage: authentication covers more fields, including source and destination IP addresses

Basic Combinations IPSec architecture lists four examples that must be supported in an implementation Figures represent the logical and physical connectivity Each SA can be either AH or ESP Host-to-host SAs are either transport or tunnel, otherwise it must be tunnel mode

Basic Combinations – Case 1 All security is provided between end systems that implement IPSec Possible combinations AH in transport mode ESP in transport mode AH followed by ESP in transport mode (an AH SA inside an ESP SA) Any one of a, b, or c inside and AH or ESP in tunnel mode

Basic Combinations – Case 1

Basic Combinations – Case 2 Security is provided only between gateways and no hosts implement IPSec VPN – Virtual Private Network Only single tunnel needed (support AH, ESP or ESP w/auth)

Basic Combinations – Case 2

Basic Combinations – Case 3 Builds on Case 2 by adding end-to-end security Gateway-to-gateway tunnel is ESP Individual hosts can implement additional IPSec services via end-to-end SAs

Basic Combinations – Case 3

Basic Combinations – Case 4

Basic Combinations – Case 4 Provides support for a remote host using the Internet and reaching behind a firewall Only tunnel mode is required between the remote host and the firewall One or two SAs may be used between the remote host and the local host

Key Management Determination and distribution of secret keys Four keys for communication between two applications: xmit and receive pairs for both AH & ESP Two modes: manual and automated Two protocols: Oakley Key Determination Protocol Internet Security Association and Key Management Protocol (ISAKMP)