1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

ISA 662 IKE Key management for IPSEC Prof. Ravi Sandhu.
Internet Protocol Security (IP Sec)
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
CSC 474 Information Systems Security
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Header and Payload Formats
Security at the Network Layer: IPSec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec – IKE CS 470 Introduction to Applied Cryptography
IKE message flow IKE message flow always consists of a request followed by a response. It is the responsibility of the requester to ensure reliability.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Internet Key Exchange. IPSec – Reminder SPI SA1 2 3 …… SAD.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
IPSec: Internet Key Exchange
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Creating an IPsec VPN using IOS command syntax. What is IPSec IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering.
Anish Arora CSE651 Introduction to Network Security
IPsec: IKE, Internet Key Exchange IPsec does not use Public Key Infrastructure and exchanging keys before an IPsec connection is established is a problem.
1 Lecture 14: Real-Time Communication Security real-time communication – two parties interact in real time (as opposed to delayed communication like )
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Implementing Secure Converged Wide Area Networks (ISCW) Module 3.2.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
CSCE 715: Network Systems Security
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
COEN 350 IPSec, SSL, SSH,. IPSec RFC 1636 identified key areas where the internet needs to be made more secure. Spoofing: Creating packets with false.
SMUCSE 5349/49 IP Sec. SMUCSE 5349/7349 Basics Network-level: all IP datagrams covered Mandatory for next-generation IP (v6), optional for current-generation.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
1 Methods and Protocols for Secure Key Negotiation Using IKE Author : Michael S. Borella, 3Com Corp.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
COEN 350 IPSec, SSL, SSH,. IPSec RFC 1636 identified key areas where the internet needs to be made more secure. Spoofing: Creating packets with false.
Internet Key Exchange IKE ● RFC 2409 ● Services – Constructs shared authenticated keys – Establishes shared security parameters – Common SAs between IPSec.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
1 Authenticated Key Exchange Rocky K. C. Chang 20 March 2007.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
CMSC 414 Computer and Network Security Lecture 27 Jonathan Katz.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
1 Internet Key Exchange Rocky K. C. Chang 20 March 2007.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Chapter 5 Network Security Protocols in Practice Part I
CSE 4905 IPsec II.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Guevara Noubir CSG254: Network Security
Presentation transcript:

1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2

2 History of IKE Early contenders: –Photuris: Authenticated D-H with cookies & identity hiding –SKIP: Auth. D-H with long-term public exponents known to the other party ISAKMP: –a protocol specifying only payload formats & exchanges (i.e., an empty protocol) –adopted by the IPsec working group Oakley: modified Photuris; can work with ISAKMP IKE: a particular Oakley-ISAKMP combination

3 Photuris C A : Alice’s cookie; for connection identification (in case she initiates multiple connections to Bob) C B : Bob’s cookie, stateless; against DoS (why?) Alice Bob CACA C A,C B, crypto offered C A,C B, g a mod p, crypto selected C A,C B, g b mod p C A,C B, K{“Alice”, signature on previous messages} (K = g ab mod p) C A,C B, K{“Bob”, signature on previous messages}

4 IKE/ISAKMP Phases Phase 1 : –does authenticated D-H, establishes session key & “ISAKMP SA or IKE SA” (security association, what’s that again?) –two possible modes: Main & Aggressive –two keys are derived from the session key: SKEYID_e: to encrypt Phase 2 messages SKEYID_a: to authenticate Phase 2 messages Phase 2: –IPsec (AH or ESP) SA established; messages encrypted & authenticated with Phase 1 keys –optional additional D-H exchange for PFS why two phases? –ISAKMP may possibly used for other things besides IPsec –may have different conversations on top of same phase 1 (with different security characteristics) –key rollover is easier on phase 2 rather than repeating phase 1

5 Phase 1 Modes two possible modes: –main mode: 6 rounds; provides identity hiding –aggressive mode: 3 rounds types of authentication: –MAC with pre-shared secret key –digital signatures –public key encryption original: all public key encryption revised: public + secret key encryption

6 Phase 1 – Aggressive Mode previous messages are used to compose the proof, what else? one problem – if Bob does not support any of the Alice’s crypto choices it just has to terminate the connection without informing Alice (why?) Alice Bob g a mod p, “Alice”, crypto offered g b mod p, crypto selected, proof I’m Bob proof I’m Alice

7 Phase 1 – Main Mode Alice Bob crypto offered crypto selected g a mod p g b mod p K{“Alice”, proof I’m Alice} (K = g ab mod p) K{“Bob”, proof I’m Bob}

8 Phase 1 Issues crypto parameters: Alice presents all algorithm combinations she can support – may be too costly – what if she supports any combination proof of identity: –certain fields of the previous messages are hashed & signed/encrypted in the final rounds –not included: Bob’s accepted parameters (problematic) cookies: –similar to Photuris cookies –yet cookies include the crypto parameters Alice offered, Bob is no longer stateless (why? why is this a problem?)

9 Phase 2 X: pair of cookies generated in Phase 1 Y: session identifier within Phase 1 (could be multiple sessions) each message is encrypted/authenticated with Phase 1 keys traffic: optional description of acceptable traffic key generation: based on Phase 1 key, SPI, nonces what’s SPI (security parameter index)? Alice Bob X, Y, CP, SPI A, nonce A, [traffic], [g a mod p] X, Y, CPA, SPI B, nonce B, [traffic], [g b mod p] X, Y, ack Phase1 SA