Download presentation
Presentation is loading. Please wait.
Published byRolf Grant Modified over 9 years ago
1
IP security Ge Zhang ge.zhang@kau.se
2
Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network (closed environment) All hosts are assumed to be trusted So are the users Therefore, security was not an issue
3
Message transfer over the Internet
4
OSI security architecture Security attacks: any action that compromises the security of information. Security mechanism: A method that is designed to detect, prevent or recover from a security attack Security service: A service that enhances the security of a system
5
Scenario
6
Passive attacks
7
Active attacks
8
Security services Data origin authentication Data confidentiality Anonymity Data intergrity Non-repudiation
9
Security mechanism Encipherment Digital signature Trusted functionality Detection and prevention …
10
Layered TCP/IP model IPSec is working in IP layer Protect IP packets
11
Goals of IPSec to verify sources of IP packets –Data source authentication to prevent replaying of old packets to protect integrity and/or confidentiality of packets –Data Integrity/Data Encryption
12
IPSec subprotocols ESPAH IKE IPSec Security Policy Encapsulating Security Payload Authentication Header The Internet Key Exchange
13
IPSec—IP Security Provide encryption and integrity protection to IP packets (and authentication of two peers). –AH (Authentication Header) An additional header, provides integrity protection –ESP (Encapsulating Security Payload) Also an addition header, provides encryption and integrity protection –IKE (Internet Key Exchange) Establishing session keys (used for AH & ESP) as well as authentication.
14
IPSec A collection of protocols (RFC 2401) –Authentication Header (AH) RFC 2402 –Encapsulating Security Payload (ESP) RFC 2406 –Internet Key Exchange (IKE) RFC 2409 –IP Payload Compression (IPcomp) RFC 3137
15
Transport mode and tunnel mode A->BPayloadA->BPayloadA->BPayloadR1->R2A->BPayload
16
Authentication Header (AH) Provides source authentication –Protects against source spoofing Provides data integrity Protects against replay attacks –Use monotonically increasing sequence numbers NO support for confidentiality!
17
AH Details Use 32-bit increasing sequence number to avoid replay attacks Use cryptographically strong hash algorithms to protect data integrity (96-bit) –Use symmetric key cryptography –HMAC-SHA-96, HMAC-MD5-96
18
AH Protocol (transport & tunnel mode in IPv4) IP headerdata (e.g., TCP, UDP segment) AH header IP header New IP header data (e.g., TCP, UDP segment) AH header Authenticated except for mutable fields
19
IPSec Authentication Header
20
Encapsulating Security Payload (ESP) Provides most that AH offers, and in addition provides data confidentiality –Uses symmetric key encryption
21
ESP Details Same as AH: –Use 32-bit sequence number to counter replaying attacks –Use integrity check algorithms Only in ESP: –Data confidentiality: Uses symmetric key encryption algorithms to encrypt packets
22
ESP Protocol (transport & tunnel mode in IPv4) IP header TCP, UDP segment ESP header ESP trailer ESP authent. encrypted authenticated IP header TCP, UDP segment ESP header ESP trailer ESP authent. encrypted authenticated New IP header ESP in fact puts information both before and after the protected data. For encryption, DATA, padding, padding length and next header are encrypted. For authentication, all fields are included.
23
IPSec ESP Format
24
Anti-replay service Sequence number (from 0 to 2 32 -1) The sender increments the sequence number for each generated packet. How to detect replayed packet? –The receiver maintains an array with 2 32 units to mark which packets have been received. –The receiver only accepts the packets with larger sequence number than the previous one. Both are not good methods, why?
25
Slide window scheme A windows of size W (default W = 64) N: highest √sequence number of successfully received packets Three cases –Packets in the window –Packets to the right of the window –Packets to the left of the window 605958575655666564636261 √√√√√ 5453 √√ AB5459 √ 64 √
26
Security Associations (SA) A SA is a one-way relationship between a sender and a receiver that affords security services to the traffic carried on it. –Two ends (from one end the other end) –A SA is identified by: Security Parameters Index (SPI): a local identifier points to a SA IP destination address Security protocol identifier: AH? Or ESP? –SA parameters: Sequence number counter Anti-replay window AH information (key, algorithms) ESP information (key, algorithms) IPSEc protocol mode (Tunnel, transport) …
27
Internet Key Exchange Protocol SA could be created manually, but… Internet Key Exchange Protocol (IKE) –Exchange and negotiate security policies –Establish security sessions Identified as Security Associations –Key exchange –Key management –Can be used outside IPsec as well
28
Virtual Private Networks (VPNs) Virtual –It is not a physically distinct network Private –Tunnels are encrypted to provide confidentiality Using VPN while traveling
29
Discussion IPSec is not the only solution! –Security features can be added on top of IP! e.g. Kerberos, SSL Confused? –IP, IPSec protocols are very complex! Two modes, three sub protocols –Complexity is the biggest enemy of security
30
Discussion Has it been used? –Yes—primarily used by some VPN vendors But not all routers support it –No—it is not really an end-to-end solution Authentication is too coarse (host based) Default encryption algorithm too weak (DES) Too complex for applications to use
31
Key points Security attack, mechanism and service Classical attacks in the internet IPSec encompasses : authentication, confidentiality and key management AH and ESP Transport mode and tunnel mode Slide window to defend against replay attack VPN
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.