@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Network Layer Security: IPSec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
IP SECURITY – Chapter 16 IP SECURITY – Chapter 16 Security Mechanisms: – S/MIME, PGP client/server - Kerberos web access - Secure Sockets Layer network.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IPSec Isaac Ghansah.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Cryptography and Network Security
1 IPsec Youngjip Kim Objective Providing interoperable, high quality, cryptographically-based security for IPv4 and IPv6 Services  Access.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
IP Security. IPSEC Objectives n Band-aid for IPv4 u Spoofing a problem u Not designed with security or authentication in mind n IP layer mechanism for.
K. Salah1 Security Protocols in the Internet IPSec.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
IP Security: Security Across the Protocol Stack
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
TCP/IP Protocols Contains Five Layers
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Internet Security CSCE 813 IPsec. CSCE813 - Farkas2 TCP/IP Protocol Stack Application Layer Transport Layer Network Layer Data Link Layer.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
K. Salah1 Security Protocols in the Internet IPSec.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
CSE 4905 IPsec.
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
Cryptography and Network Security
Virtual Private Networks (VPNs)
Virtual Private Networks (VPNs)
Cryptography and Network Security
Presentation transcript:

@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013

@Yuan Xue Review Multi/Demultiplex port CW port Congestion window port Congestion window port SSL_CTX SSL SSL_SESSION HTTP Application Transport Network Link Fragment/Reassemble Forward Routing IP Address Routing table Forwarding table Scheduling/medium access SMTP PGP FTP User ID/ /Key ID UDPTCP SSL HTTPS CW port Stream Frame Packet payloadTCP hdr payload SSL hdr payloadSSL hdr payloadTCP hdrSSL hdrIP

@Yuan Xue Comparison PGPSSL Application LayerTransport Layer OfflineOnline/Realtime Connectionless -Single data message -Data order? -Replay attack? Connection-oriented - A data stream - Data order? - Replay attack? Protect application payload (only) Authentication Entity: User(Key ID) Protected Unit: data message Authentication Entity: SSL Session (certificate) Protected Unit: SSL connection/TCP/Port

@Yuan Xue Issues TCP header/IP header are not protected Why this is a bad thing? Application specific protection needs user awareness Why this is a bad thing? Think about SMTP/HTTP that run over TCP, instead of SSL

@Yuan Xue Any Idea for A Solution? Security Service/protocol at a lower layer How about network layer? Above IP  enjoy the routing service Below transport  support all applications/processes on this host + protect TCP header how about IP header?

@Yuan Xue Let’s work on a solution together Security Requirement Confidentiality Integrity  Data Integrity  Source Authentication  Replay defense (*) Option for both/either of the above two requirements More Details Which part should be protected?  Whether IP header should/can be protected? How to establish cryptography context?  Keys/ciphers, etc…

@Yuan Xue IP Headers Version Header Length TOS Packet length Packet Id Flags Fragment offset TTL Protocol number Checksum Source IP address Destination IP address Options PredictableImmutable Mutable Some fields are mutable  how to perform MAC calculation/verification? Some fields are necessary for intermediate routers to forward the packet  if they are encrypted, the packet can not be delivered. What should we do?

@Yuan Xue IPSec Overview Background A collection of protocols and mechanisms  RFC 2401, RFC 2402, RFC 2406, RFC 2408 IPsec is a mandatory part of IPv6 (mandatory to implement, not mandatory to use), and is optional for use with IPv4IPv6IPv4 IPsec aims to provide a framework of open standards for secure communications over IP Protect every protocol/service running on top of IPv4 and IPv6 Transparent to applications above transport (TCP/UDP) layer  Data confidentiality  Data integrity  Source authentication Prevent IP address spoofing Guard against packet replay

@Yuan Xue Ipsec Architecture Confidentiality  ESP Integrity  AH  Replay defense  Usage of sequence number Option for both/either of the above two requirements  Authentication and encapsulation can be used separately Which part should be protected?  transport mode: only TCP/UDP header+ payload  tunnel mode: IP header + TCP/UDP header+ payload (more details later) How to establish cryptography context?  Security association  Key management…

@Yuan Xue Transport Mode vs. Tunnel Mode Transport mode Protects the payload data from upper-layer protocol IP header in clear text Host-to-host communication Tunnel-mode Protects the entire IP packets including the IP header Network-to-network/host-to-network Adding a new IP header  has new destination address IP header Encrypted data payload New IP header IP header data payload Encrypted IPSec header

@Yuan Xue IPsec in Transport Mode End-to-end security between two hosts Requires IPsec support at each host

@Yuan Xue IPsec in Tunnel Mode Gateway-to-gateway security Internal traffic behind gateways not protected Typical application: virtual private network (VPN) Only requires IPsec support at gateways

@Yuan Xue Tunnel Mode Illustration IPsec protects communication on the insecure part of the network Implements IPsec Implements IPsec

@Yuan Xue Security Association To decide the protection for an outgoing packet, IPsec uses the security parameter index (SPI), an index to the security association database (SADB), along with the destination address in a packet header, which together uniquely identify a security association for that packet. For an incoming packet IPsec gathers decryption and verification keys from the security association database. Security Association One-way relationship between a sender and a receiver For two-way security exchange, two SA are required SPI +IP Destination Address + Security Protocol Identifier ( whether an AH or an ESP) Security Parameters Index (SPI) carried in AH/ESP headers to enable the receiving system to select the SA to process the packet SADB SPI SA

@Yuan Xue Implementation

@Yuan Xue Authentication Header Security Service Data integrity Source authentication -- Prevent IP spoofing Guard against replay attack Integrity check value MAC -- HMAC-MD5-96/HMAC-SHA-1-96 Calculated over  Immutable IP header field, set the mutable field to zero  AH header other than AD field  Upper-level protocol data IP v4 Identifies security association (shared keys and algorithms) Anti-replay Authenticates source, verifies integrity of payload

@Yuan Xue AH in Transport Mode Before AH is applied

@Yuan Xue AH in Tunnel Mode Before AH is applied

@Yuan Xue ESP: Encapsulating Security Payload Security Service Confidentiality Authentication (optional) Encryption Algorithm 3DES, RC5, IDEA, CAST, Blowfish … +CBC mode Authentication Algorithm MAC -- HMAC-MD5-96/HMAC-SHA-1-96 Packet format Adds new header and trailer fields to packet Transport mode Confidentiality of packet between two hosts Complete hole through firewalls Tunnel mode Confidentiality of packet between two gateways or a host and a gateway Implements VPN tunnels

@Yuan Xue New IP header Confidentiality and integrity for packet payload Symmetric cipher negotiated as part of SA Authentication (Optional) Transport mode Tunnel mode ESP Security Guarantees Original IP header ESP headerTCP/UDP segmentESP trailerESP auth encrypted authenticated Original IP header ESP headerTCP/UDP segmentESP trailerESP auth

@Yuan Xue ESP Packet Identifies security association (shared keys and algorithms) Anti-replay TCP segment (transport mode) or entire IP packet (tunnel mode) Pad to block size for cipher, also hide actual payload length Type of payload HMAC-based Integrity Check Value (similar to AH)

@Yuan Xue Virtual Private Networks (VPN) VPN tunnel Secure communication between parts of the same organization over public untrusted Internet ESP can be used to implement a VPN Packets go from internal network to a gateway with destination IP address Entire packet protected by ESP, including original headers so destination addresses are hidden Receiving gateway decrypts packet and forwards original IP packet to receiving address in the network that it protects

@Yuan Xue AH vs. ESP AH protects some of the field in IP header ESP only protects everything beyond the ESP header Separation of authentication and encryption Port information in clear text for firewall

@Yuan Xue Combination of SA Authentication + confidentiality ESP with authentication option AH SA + ESP SA bundle Transport + Tunnel Bundle

@Yuan Xue Prevention of Replay Attacks When SA is established, sender initializes 32-bit counter to 0, increments by 1 for each packet If wraps around , new SA must be established Recipient maintains a sliding 64-bit window If a packet with high sequence number is received, do not advance window until packet is authenticated Duplicated packets will be dropped What if TCP retransmit a packet with the same sequence number? Will it be dropped?

@Yuan Xue Key Management Oakley Key Determination Protocol Based on Diffie-Hellman algorithm Internet Security Association and Key Management Protocol (ISAKMP) A framework for Internet key management Internet Key Exchange Protocol (IKE) The first phase establishes an ISAKMP SA  based on pre-shared keys (PSK), RSA keys and X.509 certificates, even via Kerberos. In the second phase the ISAKMP SA is used to negotiate and setup the IPsec SAs.

@Yuan Xue Comparison Again PGPSSLIPSec Application LayerTransport Layer (above TCP) Network Layer(above IP) OfflineOnline/Realtime Connectionless -Single data message -Data order (n/a) -Replay attack (timestamp) Connection-oriented - A data stream - Data order (via tcp) - defense against replay attack Connectionless - defense against replay attack Protect application payload (only) Transport: Protect tcp hdr + application payload Tunnel: Protect IP hdr + tcp hdr + payload Authentication Entity: User(Key ID) Protected Unit: entire data message Authentication Entity: SSL Session (certificate) Protected Unit: SSL connection/TCP/Port Entity: Security association

@Yuan Xue Review Multi/Demultiplex port CW port Congestion window port Congestion window port SSL_CTX SSL SSL_SESSION HTTP Application Transport Network Link Fragment/Reassemble Forward Routing IP Address Routing table Forwarding table IEEE SMTP PGP FTP User ID/ /Key ID UDPTCP SSL HTTPS CW port Stream Frame Packet payloadTCP hdr payload SSL hdr payloadSSL hdr payloadIPSecSSLIP IPSec SADB TCP payloadIPSecSSLIPTCP (Transport mode) MAC

@Yuan Xue Reference