IPSec The Wonder Protocol Anurag Vij Microsoft IT
Agenda IPSec – the protocol Network Segmentation using Microsoft
Why? For too long “defense-in-depth” has meant layers of network protection Consider the medieval castle model… The hosts themselves should start participating Achieves more granular security Improves trustworthiness: now we know the machines, too Common problems that are solved SpoofingPrivacy
What is IPsec? What is IPsec? Internet Protocol Security Set of protocols and services Provides various security services for traffic at the IP layer – the network layer These security services include Authentication – we are who we say we are Integrity – the data has not been tampered with Confidentiality – the data cannot be seen by others Anti-replay – the data cannot be replayed post interception Non-repudiation – validating sender of the traffic
What is IPsec? (2) What is IPsec? (2) IPsec is composed of three main protocols Authentication Header (AH) Integrity, anti-replay, non-repudiation Encapsulating Security Payload (ESP) Integrity, anti-replay, non-repudiation, confidentiality Internet Key Exchange (IKE) Cryptographic Infrastructure provides keying and negotiation. IPsec Request for Comment (RFC) 2401
About these “modes” There is no such thing as an “IPsec tunnel”! Types Transport mode Tunnel mode Methods AH (authenticated header) ESP (encapsulated security payload)
IPsec authentication header (AH) in transport mode Orig IP Hdr TCP Hdr Data Data Orig IP Hdr Integrity hash coverage 24 bytes total AH is IP protocol 51 AH Hdr Insert Next Hdr Payload Len RsrvSecParamIndexSeq# Keyed Hash
IPsec encapsulating security payload (ESP) in transport mode Data Usually encrypted Integrity hash coverage ESP Trailer ESP Auth Append Orig IP Hdr TCP Hdr Data ESP Hdr Insert Orig IP Hdr TCP Hdr
IPsec ESP tunnel mode ESP Trailer Data TCP Hdr IP Hdr IP Hdr IPHdr New IP header with source and destination IP address Orig IP Hdr TCP Hdr Data ESP Hdr ESP Auth Usually encrypted Integrity hash coverage
filters filters SA establishment Internet Key Exchange (IKE) - Identity Protect Mode – defined in RFC 2409 Phase 1 “Main Mode” establishes IKE SA – trusted channel between systems, negotiation establishes encrypted channel, mutual trust, and dynamically generates shared secret key (“master” key) Phase 2 “Quick Mode” establishes IPsec SAs – for data protection, one SA for each direction identified by packet label (SPI), algorithms and packet formats agreed, generates shared “session” secret keys derived from “master” key NIC TCPIP Application Server or Gateway IPsecDriver IPsecPolicyAgent IKE (ISAKMP) IPsecDriver IPsecPolicyAgent NIC TCPIP App or Service client “IKE Responder” “IKE Initiator” UDP port 500 negotiation 1 IKE SA 1 IKE SA 2 IPsec SAs IP protocol 50/51
Traffic not filtered by IPsec IP broadcast addresses Can’t secure to multiple receivers Multicast addresses From through , same reason RSVP—IP protocol type 46 Allows RSVP to signal quality of service (QOS) requests for application traffic that may then be IPsec protected Kerberos—UDP source or dest port 88 Kerberos is itself a secure protocol, which the IPsec’s IKE negotiation service may use for authentication of other computers in a domain IKE—UDP dest port 500 Required to allow IKE to negotiate parameters for IPsec security
Policy A policy defines all aspects of the communication to be secured by IPsec Tunnel or transport mode Host or network address of IPsec entities Cryptographic algorithms Type of traffic Key lifetimes Action to take Authentication methods
IPsec overview - how IPsec helps Problem How IPsec helps Details Unauthorized system access Authentication, Integrity Defense in depth by isolating trusted from untrusted systems Targeted attacks of high-value servers Authentication, Integrity Locking down servers with IPsec. Examples: HR servers, Outlook® Web Access (OWA), DC replication Eavesdropping Authentication, confidentiality Defense in depth against password or information gathering by untrusted systems Government guideline compliance Authentication, confidentiality Example: “All communications between financial servers must be encrypted.”
Planning for IPsec implementation Determine security requirements What network resources and traffic flows need to be secured How resources and traffic flows should be secured AuthenticationEncryption Block or permit
Planning for IPsec implementation Design IPsec policies Select authentication method Kerberos, preshared key, certificates Select security protocol ESP for confidentiality; AH or ESP (Null) for integrity
Planning for IPsec implementation Design IPsec policies (cont.) Determine traffic flows Network and host addresses Protocols Port addresses
Planning for IPsec implementation Test IPsec functionality and behavior Design an implementation strategy Roll out in phases Use Microsoft IPsec policy features to minimize user impact
IPsec steps before you implement Create an IPsec test network. Select IPsec configuration and troubleshooting tools. IPsec Management snap-in or Netsh.exe IPsec Monitor snap-in, Netsh.exe, Oakley.log files, packet sniffers Add policies and send traffic to verify functionality. Filter configuration Filter weighting Smart filters
Configuring IPsec policy – MMC Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (2) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (3) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n... Configuring IPsec policy – MMC (4)
Authentication methods Configuring IPsec policy – MMC (5) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Authentication methods Configuring IPsec policy – MMC (6) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Authentication methods Configuring IPsec policy – MMC (7) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (8) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (9) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (10) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (11) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (12) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (13) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Configuring IPsec policy – MMC (14) Policy-wide parameters ISAKMP policy Filter 1 Filter n Filter action IPsec policy Authentication methods Tunnel endpoint Connection type IPsec rule 1 Filter list... IPsec rule n... Method 1 Method n...
Implementation scenarios Domain and server isolation Protect corporate assets from unmanaged, rogue and guest PCs Complement to other security mechanisms (firewall, antivirus, IDS) Restrict communication to domain-managed computers
Scenario: IPsec packet filtering Filters for allowed and blocked traffic No actual negotiation of IPsec security associations Overlapping filters – most specific match determines action Does not provide stateful filtering Recommended only on internal isolated networks for specific or limited purposes From IP To IP Protocol Src Port Dest Port Action Any My Internet IP Anyn/an/aBlock Any TCPAny80Permit
Scenario: IPsec packet filtering (2) DMZ* server IPsec packet filtering only Internet Block All, Allow Port 80, 443 (Windows ® 2000, 2003) * Refers to perimeter network (also known as DMZ, demilitarized zone, and screened subnet).
Scenario: Secure server solution Allows IPsec authentication and protection for traffic between specific sets of servers Secures communication in environments that are not secure Complements firewalls by requiring authentication of all traffic
Scenario: Secure server solution (2) Reduces firewall exceptions to IPsec traffic Typical scenarios: Between an OWA server on the Internet and a computer running Exchange Server Between domain controllers for domain replication
Scenario: Domain isolation
Levels of Trusted Assets U1U1 U2U2 U2U2 XX B DHCPDHCP DNSDNS WINSWINS DCDC SecureNet Clients, Servers, Home LAN, Trustworthy Labs (203,000) Untrustworthy Labs (75,000) PocketPC/ Xbox (18,000) MAC (2,000) Boundary Machines (5,000) Infrastructure (500) Internet Servers Business Partners Extranet DTaps (no connectivity to CorpNet) (1,800) External Exclusions Internal Exclusions Microsoft Corporate Network ACL Controlled
Your Feedback is Important! Please Fill Out the feedback form
© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.