IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

IP security over ATM CS 329 Hwajung Lee Computer and Communications Security The George Washington University.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.2: IPsec.
IPSec.
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Security at the Network Layer: IPSec
Network Security Essentials Chapter 8 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Layer Security: IPSec
IP SECURITY – Chapter 16 IP SECURITY – Chapter 16 Security Mechanisms: – S/MIME, PGP client/server - Kerberos web access - Secure Sockets Layer network.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
IPSec Isaac Ghansah.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
THE USE OF IP ESP TO PROVIDE A MIX OF SECURITY SERVICES IN IP DATAGRAM SREEJITH SREEDHARAN CS843 PROJECT PRESENTATION 04/28/03.
1 IPsec Youngjip Kim Objective Providing interoperable, high quality, cryptographically-based security for IPv4 and IPv6 Services  Access.
IP Security. IPSEC Objectives n Band-aid for IPv4 u Spoofing a problem u Not designed with security or authentication in mind n IP layer mechanism for.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security
SMUCSE 5349/49 IP Sec. SMUCSE 5349/7349 Basics Network-level: all IP datagrams covered Mandatory for next-generation IP (v6), optional for current-generation.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
1 IPSec: Security at the IP Layer Rocky K. C. Chang 15 March 2007.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
IP Security (IPSec) Authentication Header (AH) Dr Milan Marković.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
IPSecurity.
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPNs)
NET 536 Network Security Lecture 5: IPSec and VPN
Virtual Private Networks (VPNs)
CSE 5/7349 – February 15th 2006 IPSec.
Presentation transcript:

IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows

Implementation approaches ● BITS – Bump in the stack, usually tightly integrated in the OS ● BITW – Bump in the wire, Often a hardware device connected to a router or security gateway.

Security Features ● Authentication – Verifies the identity of the sender ● Integrity – Ensures that the data has not been changed in transit ● Confidentiality – Encrypts data using symmetric key ● Replay Protection – Attacker can't resend packets without being detected

IPSec Components ● SPD - Security Policy Database – Defined by the sysadmin – Contains a set of rules Src IP | Dst IP | Ports | Action | IPSec Protocol | Mode | SA Index ● SAD – Security Association Database – Contains Security Associations – Each Security Association contains keys, sequence numbers – Must be stored in a secure place

IPSec Components ● Key Management – Internet Key Exchange Protocol (IKE) ● Data Manipulation – For authentication, encryption and compression – Authentication Header (AH) – Encapsulation Security Payload (ESP) – IP Compression (IPCOMP)

IPSec Modes ● Transport Mode – Used primarily to protect IP traffic between hosts – Adds requested protection to the datagram payload ● Tunnel Mode – The entire IP Datagram is treated as a block of data – Adds new header and protects the datagram – Used primarily between gateways

IPSec Transport Mode IP Header Payload IP Header IPSec Header (AH or ESP) IP Datagram to be protected Protected Datagram

IPSec Tunnel Mode IP Header Payload New IP Header IPSec Header (AH or ESP) IP Datagram to be protected Protected Datagram (Tunnel Mode) Original IP Header

IPSec Protocols (HEADERS) ● AH - Authentication Header – Connectionless integrity – Data origin authentication – Optional anti-replay service ● ESP – Encapsulating Security Payload – Confidentiality plus AH services

Security Associations (SA) ● A Security Association is a bundle of algorithms and keys/IVs ● They provide security services to the traffic carried by it. ● SA's are different for tunnel mode and transport mode ● If either end of a security association is a security gateway the SA must be tunnel mode ● Every host must support both tunnel mode and transport mode

Security Association Database (SAD) ● Separate SAD's are required for inbound traffic and outbound traffic ● The SAD contains parameters that are associated with each active security association ● A Selector is a set of IP and upper layer protocol field values that is used by the SPD to map traffic to a policy

SPI ● Security Parameters Index (32 bits) ● Arbitrary ● The SPI and the destination IP address identifies the Security Association of the receiving party. ● Sequence Number ● Increases by 1 for every packet ● Used for replay detection

SAD Record Contents SPI Src IP Dst IP Src PortAnyAny Dst PortAny80 Parametersstuffstuff TypeInboundOutbound Pointer to SPD Entry47

Additional SAD Record Fields ● Sequence Counter ● Sequence Counter Overflow ● A flag when set causes an auditable event ● Anti-Replay Window ● AH Authentication Algorithm, keys, etc. ● ESP Encryption Algorithm, keys, IV Mode, IV, etc. ● ESP Authentication Algorithm, keys, etc. ● Lifetime of this SA ● IPSec protocol mode: tunnel, transport ● Path MTU

Security Policy Database (SPD) ● Security association is a management construct to enforce a security policy ● A security policy specifies what services are to be offered to IP datagrams and in what fashion ● All processing of traffic both inbound and outbound must consult the SPD ● The SPD must specify what action will be taken on every packet

SPD Record Contents Rule #12 Src IP Dst IP Src PortAnyAny Dst Port23443 ActionIPSecIPSec ProtocolESPAH ModeTunnelTunnel Outbnd SA Index4001

Traffic processing ● Every inbound and outbound packet is processed by IPSec ● Three processing choices: – Discard ● Not allowed to enter host ● Auditable event – Bypass IPSec – Apply IPSec

SA Selectors ● Dest IP Address ● Source IP Address ● Name – usually User ID ● Data Sensitivity Level for info flow security – Bell-LaPadua Model ● Transport Layer Protocol ● Src/Dst Ports – In the case the Upper layer is encrypted these selectors may have the value “OPAQUE”

Outbound IP Traffic Processing ● The SPD must be consulted for every outbound packet – If no policy is found that matches the packet, the packet MUST be discarded and audited – If a policy is found that matches then the packet is mapped to an existing SA or a new SA is created. ● If IPSec is required the packet must be either mapped to an existing SA of a new SA is created ● Create a Header for Tunnel Mode

Outbound IP Traffic Processing ● Some packet's selectors will match multiple SAs ● The SPD is ordered ● IPSec must 1)Locate the first appropriate policy in the SPD 2)Find first SA is the SAD that matches the packet's selectors 3)If no SA is found create a new one and link to the appropriate policy in the SPD 4)Do the required IPSec processing

Inbound IP Traffic Processing ● All fragments are reassembled ● Mapping the IP datagram to the appropriate SA depends on: ● Outer IP header destination address ● The IPSec protocol ● The SPI ● If the mapping fails drop and log ● Otherwise use the SA to do the IPSec processing