IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 IPSec—An Overview Somesh Jha Somesh Jha University of Wisconsin University of Wisconsin.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Cryptography and Network Security
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 IPsec Youngjip Kim Objective Providing interoperable, high quality, cryptographically-based security for IPv4 and IPv6 Services  Access.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
IP Security. IPSEC Objectives n Band-aid for IPv4 u Spoofing a problem u Not designed with security or authentication in mind n IP layer mechanism for.
K. Salah1 Security Protocols in the Internet IPSec.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
TCP/IP Protocols Contains Five Layers
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
IPSec Detailed Description and VPN
IPSecurity.
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
Somesh Jha University of Wisconsin
Internet and Intranet Fundamentals
Virtual Private Networks (VPNs)
Virtual Private Networks (VPNs)
Presentation transcript:

IP security Ge Zhang

Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network (closed environment) All hosts are assumed to be trusted So are the users Therefore, security was not an issue

Message transfer over the Internet

OSI security architecture Security attacks: any action that compromises the security of information. Security mechanism: A method that is designed to detect, prevent or recover from a security attack Security service: A service that enhances the security of a system

Scenario

Passive attacks

Active attacks

Security services Data origin authentication Data confidentiality Anonymity Data intergrity Non-repudiation

Security mechanism Encipherment Digital signature Trusted functionality Detection and prevention …

Layered TCP/IP model IPSec is working in IP layer Protect IP packets

Goals of IPSec to verify sources of IP packets –Data source authentication to prevent replaying of old packets to protect integrity and/or confidentiality of packets –Data Integrity/Data Encryption

IPSec subprotocols ESPAH IKE IPSec Security Policy Encapsulating Security Payload Authentication Header The Internet Key Exchange

IPSec—IP Security Provide encryption and integrity protection to IP packets (and authentication of two peers). –AH (Authentication Header) An additional header, provides integrity protection –ESP (Encapsulating Security Payload) Also an addition header, provides encryption and integrity protection –IKE (Internet Key Exchange) Establishing session keys (used for AH & ESP) as well as authentication.

IPSec A collection of protocols (RFC 2401) –Authentication Header (AH) RFC 2402 –Encapsulating Security Payload (ESP) RFC 2406 –Internet Key Exchange (IKE) RFC 2409 –IP Payload Compression (IPcomp) RFC 3137

Transport mode and tunnel mode A->BPayloadA->BPayloadA->BPayloadR1->R2A->BPayload

Authentication Header (AH) Provides source authentication –Protects against source spoofing Provides data integrity Protects against replay attacks –Use monotonically increasing sequence numbers NO support for confidentiality!

AH Details Use 32-bit increasing sequence number to avoid replay attacks Use cryptographically strong hash algorithms to protect data integrity (96-bit) –Use symmetric key cryptography –HMAC-SHA-96, HMAC-MD5-96

AH Protocol (transport & tunnel mode in IPv4) IP headerdata (e.g., TCP, UDP segment) AH header IP header New IP header data (e.g., TCP, UDP segment) AH header Authenticated except for mutable fields

IPSec Authentication Header

Encapsulating Security Payload (ESP) Provides most that AH offers, and in addition provides data confidentiality –Uses symmetric key encryption

ESP Details Same as AH: –Use 32-bit sequence number to counter replaying attacks –Use integrity check algorithms Only in ESP: –Data confidentiality: Uses symmetric key encryption algorithms to encrypt packets

ESP Protocol (transport & tunnel mode in IPv4) IP header TCP, UDP segment ESP header ESP trailer ESP authent. encrypted authenticated IP header TCP, UDP segment ESP header ESP trailer ESP authent. encrypted authenticated New IP header ESP in fact puts information both before and after the protected data. For encryption, DATA, padding, padding length and next header are encrypted. For authentication, all fields are included.

IPSec ESP Format

Anti-replay service Sequence number (from 0 to ) The sender increments the sequence number for each generated packet. How to detect replayed packet? –The receiver maintains an array with 2 32 units to mark which packets have been received. –The receiver only accepts the packets with larger sequence number than the previous one. Both are not good methods, why?

Slide window scheme A windows of size W (default W = 64) N: highest √sequence number of successfully received packets Three cases –Packets in the window –Packets to the right of the window –Packets to the left of the window √√√√√ 5453 √√ AB5459 √ 64 √

Security Associations (SA) A SA is a one-way relationship between a sender and a receiver that affords security services to the traffic carried on it. –Two ends (from one end  the other end) –A SA is identified by: Security Parameters Index (SPI): a local identifier points to a SA IP destination address Security protocol identifier: AH? Or ESP? –SA parameters: Sequence number counter Anti-replay window AH information (key, algorithms) ESP information (key, algorithms) IPSEc protocol mode (Tunnel, transport) …

Internet Key Exchange Protocol SA could be created manually, but… Internet Key Exchange Protocol (IKE) –Exchange and negotiate security policies –Establish security sessions Identified as Security Associations –Key exchange –Key management –Can be used outside IPsec as well

Virtual Private Networks (VPNs) Virtual –It is not a physically distinct network Private –Tunnels are encrypted to provide confidentiality Using VPN while traveling

Discussion IPSec is not the only solution! –Security features can be added on top of IP! e.g. Kerberos, SSL Confused? –IP, IPSec protocols are very complex! Two modes, three sub protocols –Complexity is the biggest enemy of security

Discussion Has it been used? –Yes—primarily used by some VPN vendors But not all routers support it –No—it is not really an end-to-end solution Authentication is too coarse (host based) Default encryption algorithm too weak (DES) Too complex for applications to use

Key points Security attack, mechanism and service Classical attacks in the internet IPSec encompasses : authentication, confidentiality and key management AH and ESP Transport mode and tunnel mode Slide window to defend against replay attack VPN