1 Network Security Lecture 8 IP Sec Waleed Ejaz

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Network Security Essentials Chapter 8 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IP SECURITY – Chapter 16 IP SECURITY – Chapter 16 Security Mechanisms: – S/MIME, PGP client/server - Kerberos web access - Secure Sockets Layer network.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IPSec Isaac Ghansah.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Cryptography and Network Security
1 IPsec Youngjip Kim Objective Providing interoperable, high quality, cryptographically-based security for IPv4 and IPv6 Services  Access.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
IP Security. IPSEC Objectives n Band-aid for IPv4 u Spoofing a problem u Not designed with security or authentication in mind n IP layer mechanism for.
K. Salah1 Security Protocols in the Internet IPSec.
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
TCP/IP Protocols Contains Five Layers
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
IP Security (IPSec) Encapsulating Security Payload (ESP) Dr Milan Marković.
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
© MMII JW RyderCS 428 Computer Networking1 IP Security  IPSec  Firewall Design  Security - Understanding when and how users, computers, services, networks.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
IPSec IPSec is communication security provided at the network layer.
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Presentation transcript:

1 Network Security Lecture 8 IP Sec Waleed Ejaz

2 Overview 1. Security Scheme Design Issues: Perfect Forward Secrecy 2. IP Concepts: NAT, Tunnel, Firewall, Proxy Servers 3. IP Headers 4. IPsec: Concepts, AH, ESP 5. AH, ESP Version 3

3 Security Scheme Design Issues Perfect Forward Secrecy Denial of Service Protection End Point Identifier Hiding Live Partner Reassurance

4 Perfect Forward Secrecy Attacker cannot decrypt a conversation even if he records the entire session and subsequently steals their long term secrets Use session keys not derivable from information stored at the node after session concludes Escrow-Foilage: Even if the long-term private keys have been escrowed, eavesdropper (passive) cannot decrypt

5 Denial of Service Protection Rule: Do not keep state until the response comes back ⇒ All state in cookies sent back to the requester Adds a round-trip delay

6 End Point Identifier Hiding Hide the identities from eavesdroppers Anonymous DH and use the key to tell identities ⇒ Passive eavesdropper cannot learn identities but active Man-in-the-Middle can learn one or both identities ⇒ Authenticate Requester should divulge first

7 Live Partner Reassurance DH operations are expensive ⇒ g, b, a are not changed often Keys should be based on a gab and an nonce ⇒ Can't replay previous sessions

8 IP Concepts Private Addresses Network Address Translation Tunnel Firewalls Proxy Servers IPv4 IPv6

9 Private Addresses 32-bit Address ⇒ 4 Billion addresses max Subnetting ⇒ Limit is much lower Shortage of IP address ⇒ Private addresses Frequent ISP changes ⇒ Private address Private ⇒ Not usable on public Internet RFC 1918 lists such addresses for private use Prefix = 10/8, /12, /16 Example:

10 Network Address Translation (NAT) NAT = Network Address Translation Like Dynamic Host Configuration Protocol (DHCP) Outgoing Packets: Change <Private source address, Source Port> to Incoming Packets: Change <Public Destination Address, Dest Port> to

11 Tunnel Tunnel = Encaptulation Used whenever some feature is not supported in some part of the network, e.g., multicasting, mobile IP

12 Firewall Enforce rules on what internal hosts/applications can be accessed from outside and vice versa One point of entry. Easier to manage security. Discard based on IP+TCP header. Mainly port #. Firewall-Friendly applications: Use port 80.

13 Proxy Server Specialized server programs on bastion host Take user's request and forward them to real servers Take server's responses and forward them to users Enforce site security policy ⇒ Refuse some requests. Also known as application-level gateways With special "Proxy client" programs, proxy servers are almost transparent

14 IP Headers

15 IPSec Security at layer 3 Competition: Layer 2 VPN, Layer 4 SSL, etc Advantages:  Applies to all applications  Routers/firewalls vendors can implement it (Can't implement SSL) Limitations:  Limited to IP Addresses  Has no concept of application users

16 Security Association One way relationship between sender and receiver For two way, two associations are required Three SA identification parameters  Security parameter index  IP destination address  Security protocol identifier

17 IPSec Concepts IPsec Security Association: One-way Security Parameter Index: Allows receiver to retrieve info from security association database.  Chosen by receiver  SPI+[DA]+[SA]

18 IPSec Secure IP: A series of proposals from IETF Separate Authentication and privacy Authentication Header (AH) ensures data integrity and data origin authentication Encapsulating Security Protocol (ESP) ensures confidentiality, data origin authentication, connectionless integrity, and antireplay service

19 Tunnel Vs Transport Mode Gateway-to-gateway vs. end-to-end

20 Authentication Header Next Header = TCP=6, UDP=17, IP=4, AH=51 ⇒ Designed by IPv6 fans Payload Length = Length of AH in 32-bit words − 2 (for IPv4) =Length of AH in 64-bit words -1 (for IPv6) SPI = Identifies Security association (0=Local use, reserved) Authentication data = Integrity Check Value

21 AH ICV Computation The AH ICV is computed over: IP header fields that are either immutable in transit or that are predictable in value upon arrival at the endpoint for the AH SA, e.g., source address (immutable), destination address with source routing (mutable but predictable) The AH header (Next Header, Payload Len, Reserved, SPI, Sequence Number, and the Authentication Data (which is set to zero for this computation), and explicit padding bytes (if any)) The upper level protocol data, which is assumed to be immutable in transit

22 ESP Packet Payload data: IP, TCP, UDP packet Pad Length in bytes Next Header: Type of payload (TCP, UDP, …) Authentication Data: Integrity Check Value over ESP packet

23 Encapsulating Security Payload Provides encryption and/or integrity ⇒ Confidentiality=ESP, Integrity=AH or ESP, Confidentiality + Integrity=ESP, ESP+AH Null encryption algorithm ⇒ No confidentiality IV and authentication data sizes available from SA database

24 Current State of IPSec Best currently existing VPN standard  For example, used in Cisco PIX firewall, many remote access gateways IPsec has been out for a few years, but wide deployment has been hindered by complexity

25 AH Version3 RFC4302, December 2005 (V2 in RFC2402, November 1998, V1 in RFC1826, August 1995) Uniform algorithm for Security Parameter Index (SPI) for unicast and multicast Unicast: SPI alone, or SPI+protocol may be used to select SA Multicast: SPI+DA or SPI+DA+SA Extended 64-bit sequence numbers for high-speed communications Separate RFC for mandatory algorithms

26 ESP Version3 RFC4303, December 2005 (V2 in RFC2406, November 1998, V1 in RFC1827, August 1995) Uniform algorithm for SPI for unicast and multicast Extended 64-bit sequence numbers Separate RFC for mandatory algorithms Combined Mode algorithms: Combined Confidentiality + Integrity algorithms in addition to separate confidentiality and integrity algorithms Can add extra bytes before padding for traffic flow confidentiality Can generate and discard dummy padding packets (Next header=59) Issue: No version number in the header. But older versions will reject new algorithms and options

27 Summary Design Issues: Perfect forward secrecy, Denial of Service Protection, End Point Identifier hiding, Live partner assurance NAT, Firewall, Proxy Servers, Tunnel (Encapsulation) Security Association and Security parameter index AH is for integrity ESP can be used for Confidentiality and/or integrity

28 Questions!