IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Security at the Network Layer: IPSec
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IPSec Isaac Ghansah.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
K. Salah1 Security Protocols in the Internet IPSec.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Network Security Sorina Persa Group 3250 Group 3250.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Lecture 24 Secure Communications CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Ian Goldberg.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Lecture 24 Secure Communications CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Ian Goldberg.
CSCE 715: Network Systems Security
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec  IPsec (IP security)  Security for transmission over IP networks The InternetThe Internet Internal corporate IP networksInternal corporate IP.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Potential vulnerabilities of IPsec-based VPN
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Presentation transcript:

IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched data networks (PSDN) Local Network Internet Local Network

IPsec Why do we need IPsec? –IP has no security –Add security to create a virtual private network (VPN) (Chapter 9) to give secure communication over the Internet or another IP network Local Network Internet Local Network

IPsec Genesis –Being created by the Internet Engineering Task Force –For both IP version 4 and IP version 6

IPsec Two Modes of operation Tunnel Mode –IPsec server at each site –Secures messages going through the Internet Local Network Internet Local Network Secure Communication IPsec Server

IPsec Tunnel Mode –Hosts operate in their usual way Tunnel mode IPsec is transparent to the hosts –No security within the site networks Local Network Internet Local Network Secure Communication IPsec Server

IPsec Two Modes of operation Transport Mode –End-to-end security between the hosts –Security within site networks as well –Requires hosts to implement IPsec Local Network Internet Local Network Secure Communication

IPsec Transport Mode –Adds a security header to IP packet –After the main IP header –Source and destination addresses of hosts can be learned by interceptor –Only the original data field is protected Protected Original Data Field Original IP Header Transport Security Header

IPsec Tunnel Mode –Adds a security header before the original IP header –Has IP addresses of the source and destination IPsec servers only, not those of the source and destination hosts –Protects the main IP header Protected Original Data Field Protected Original IP Header Tunnel Security Header

IPsec Can combine the two modes –Transport mode for end-to-end security –Plus tunnel mode to hide the IP addresses of the source and destination hosts during passage through the Internet Local Network Internet Local Network Tunnel Mode Transport Mode

IPsec Two forms of protection Encapsulating Security Protocol (ESP) security provides confidentiality as well as authentication Authentication Header (AH) security provides authentication but not confidentiality –Useful where encryption is forbidden by law –Provides slightly better authentication by providing authentication over a slightly larger part of the message, but this is rarely decisive

IPsec Modes and protection methods can be applied in any combination Tunnel Mode Transport Mode ESPSupported AHSupported

IPsec Security Associations (SAs) are agreements between two hosts or two IPsec servers, depending on the mode “Contracts” for how security will be performed Negotiated Governs subsequent transmissions Host AHost B Negotiate Security Association

IPsec Security Associations (SAs) can be asymmetrical –Different strengths in the two directions –For instance, clients and servers may have different security needs Host AHost B SA for messages From A to B SA for messages From B to A

IPsec Policies may limit what SAs can be negotiated –To ensure that adequately strong SAs for the organization’s threats –Gives uniformity to negotiation decisions Host AHost B Security Association Negotiations Limited By Policies

IPsec First, two parties negotiate IKE (Internet Key Exchange) Security Associations –IKE is not IPsec-specific –Can be used in other security protocols Host AHost B Communication Governed by IKE SA

IPsec Under the protection of communication governed by this IKE SA, negotiate IPsec- specific security associations Host AHost B Communication Governed by IKE SA IPsec SA Negotiation

IPsec Process of Creating IKE SAs (and other SAs) –Negotiate security parameters within policy limitations –Authenticate the parties using SA-agreed methods –Exchange a symmetric session key using SA-agreed method –Communicate securely with confidentiality, message-by-message authentication, and message integrity using SA-agreed method

IPsec IPsec has mandatory security algorithms –Uses them as defaults if no other algorithm is negotiated –Other algorithms may be negotiated –But these mandatory algorithms MUST be supported

IPsec Diffie-Hellman Key Agreement –To agree upon a symmetric session key to be used for confidentiality during this session –Also does authentication (not discussed) Party AParty B

IPsec Diffie-Hellman Key Agreement –Each party sends the other a nonce (random number) –The nonces will almost certainly be different –Nonces are not sent confidentially Party AParty B Nonce B Nonce A

IPsec Diffie-Hellman Key Agreement –From the different nonces, each party will be able to compute the same symmetric session key for subsequent use –No exchange of the key; instead, agreement on the key Party AParty B Symmetric Key From nonces, independently compute same symmetric session key

IPsec Mandatory algorithm for confidentiality is DES-CBC –DES with Cipher Block Chaining –An extension of DES (Data Encryption Standard) –Straight DES always gives the same ciphertext for the same plaintext and key –This allows certain types of attacks to guess passwords

IPsec DES-CBC (DES Cipher Block Chaining) –DES works in blocks of 64 bits –DES-CBC begins with 64-bit plaintext to be encrypted –Combines with the ciphertext output from the previous block (cipher block chaining) Plaintext Block Previous Ciphertext Block To be Encrypted + Cipher Block Chaining

IPsec DES-CBC –Encrypts the plaintext block plus previous ciphertext block to give ciphertext for the current block –This gives different ciphertexts for the same plaintext and key on different occasions Block To be Encrypted Ciphertext For Block DES Encryption

IPsec Adding Plaintext and Ciphertext together in DES-CBC –The bits are XORed –The result is 1 if one bit (but not both) is 1 1 XOR 0 = 1 0 XOR 1 = 1 –The result is 0 if both bits are 1 or 0 1 XOR 1 = 0 0 XOR 0 = 0

IPsec Adding Plaintext and Ciphertext together in DES-CBC –The bits are XORed –If the ciphertext is … –And the plaintext is … –The result is …

IPsec HMAC –key-Hashed Message Authentication Code –Mandatory IKE message-by-message authentication and message integrity algorithm –Not a digital signature –HMAC does not use public key encryption –So it is faster than digital signature authentication, which uses public key encryption

IPsec HMAC –Begins with original plaintext –Adds a secret HMAC key that only the communicating partners know It is a shared secret Usually different from the symmetric key used to send the entire message confidentiality Original Plaintext HMAC Key

IPsec HMAC –Hashes the combination with MD5 or SHA1 –This gives the HMAC –Get different HMACs with different HMAC keys Original Plaintext HMAC Key HMAC Hashing

IPsec HMAC –The HMAC is added to the original plaintext –Gives authentication and message integrity –HMAC is similar to digital signature –However, hashes instead of using public key encryption, so processing is faster Original Plaintext HMAC

IPsec HMAC –Receiver again hashes plaintext message plus shared secret HMAC key –If the same as transmitted HMAC, sender is authenticated because the sender knows the shared secret HMAC key Transmitted Original Plaintext Transmitted HMAC Key Computed HMAC Hashing Transmitted Original Plaintext

IPsec IPsec only uses symmetric key encryption and hashing, which are very fast Avoids public key encryption, which is very slow –Diffie-Hellman key exchange instead of sending session key encrypted with receiver’s public key –HMAC instead of digital signatures This allows IPsec to be fairly fast, reducing host or IPsec security server costs