Virtual Private Networking Irfan Khan Myo Thein Nick Merante.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
SCSC 455 Computer Security Virtual Private Network (VPN)
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Guide to Network Defense and Countermeasures Second Edition
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Virtual Private Networks and IPSec
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
K. Salah1 Security Protocols in the Internet IPSec.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
Computer Net Lab/Praktikum Datenverarbeitung 2 1 Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
TCP/IP Protocols Contains Five Layers
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
FreeS/WAN & VPN Cory Petkovsek VPN: Virtual Private Network – a secure tunnel through untrusted networks. IP Security (IPSec): a standardized set of authentication.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Presentation transcript:

Virtual Private Networking Irfan Khan Myo Thein Nick Merante

VPN + IPSec VPN: Virtual Private Network –Enable two remote networks to appear as one network via the internet. IPSec: Internet Protocol Security Extensions –Enable machines to securely communicate over an insecure medium

What We Will Cover The need for security Benefits of a VPN/IPSec combination The necessary tools How to set everything up How to verify everything is working

The Need for Security Internet not like it used to be The hunt for bugs Automated tools do most of the dirty work Systems targets regardless of content value Business need for securing client/customer data in global network

Why Use VPN Confidentiality Integrity Authenticity Replay Protection

Who can benefit Peer to peer security – encryption of traffic between people. –PGP Desktop Security Corporate security – encryption of traffic between offices.

Benefits to personal users Create a secure path between two machines Enhance the level of trust with authentication

Benefits for corporate users Can do away with leased lines connecting offices without sacrificing privacy. Can then make use of the internet: –More reliable –More portable –More cost-effective

A method of security Implementing a Virtual Private Network (VPN) Using IPSec to encrypt all traffic Authenticating data sent

What is IPSec IPSec = AH + ESP + IKE

Different Modes AH vs ESP AH: Authentication Header –Attaches checksum to packets –Ensures packet not modified in transit ESP: Encapsulating Security Payload –Encrypts data –Ensures authentication

Tunnel Mode –Encapsulate packet into new IPv4/v6 header –Used for VPN Gateways Transport Mode –Encrypts normal traffic between peers Different Modes Tunnel vs Transport

Tunnel vs Transport Host 1Host 2 Host 1Gateway 1Host 2 Transport Mode Tunnel Mode Gateway 2

Necessary Tools Two unix machines with properly configured kernels to serve as gateways Racoon for key exchange Internet connection

Preparing the machine Modify the kernel bpf # Berkeley packet filter IPFIREWALL# Enable Firewall IPDIVERT# Divert IP sockets (Used for NAT) IPSEC # IP security IPSEC_ESP# IP security (crypto; define w/ IPSEC) IPSEC_DEBUG # debug for IP sec Install Racoon –Obtain source code or install from ports collection

Creating the tunnel Set up tunnel between 2 private networks gif – Generic tunnel interface Diagram A Tunnel Script (Step 3)

Diagram A Internet Gateway A Node B Node A Node C Gateway B Node B Node A Node C VPN Tunnel van-gw1 gif0: vpn-gw2 gif0:

Adding the Encryption Creating the policies Manual keying Automatic keying (racoon) –Racoon configuration Different algorithms –des, 3des, blowfish, etc. Step 4 / Figure A

Figure A # Ident: ipsec.conf # Usage: setkey –f ipsec.conf flush; # Flush the Security Association Database spdflush;# Flush the Security Policy Database #add esp E blowfish-cbc "12345"; #add esp E blowfish-cbc "12345"; spdadd / /24 any -P out ipsec esp/tunnel/ /require; spdadd / /24 any -P in ipsec esp/tunnel/ /default;

Changes to the Packet Orig IP hdrTCPData Orig IP hdrTCPData ESP Trailer ESP Auth ESP Header encrypted authenticated Before applying ESP After applying ESP IP v4: ESP: Encapsulating Security Payload

Manual vs Automatic Keying Benefits of manual keying –Simplicity –Less overhead Benefits of automatic keying –Much more secure –Encryption keys periodically changed based on time or amount transferred.

Encryption Algorithms Data Encryption Standard (DES) –64 bits Triple DES –192 bits Blowfish –40 to 448 bits Rijndael (AES) –128/192/256 bits

Verification An analysis before and after –Key Policies (Figure B) –Dump Security Association Database with setkey –D (Figure C) –TCP Dump of Headers (Figure D) –TCP Dump of Data (Figure E)

Diagram A Internet Gateway A Node B Node A Node C Gateway B Node B Node A Node C VPN Tunnel van-gw1 gif0: vpn-gw2 gif0:

Conclusion Different tools for different jobs PGP for encrypting data SSL for encrypting sockets SSH for encrypting logons IPSec for encrypting all traffic Another tool for the administrator’s toolbox