Chapter 18 IP Security  IP Security (IPSec)

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IP SECURITY – Chapter 16 IP SECURITY – Chapter 16 Security Mechanisms: – S/MIME, PGP client/server - Kerberos web access - Secure Sockets Layer network.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
K. Salah1 Security Protocols in the Internet IPSec.
CSCE 715: Network Systems Security
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPv6 Security & QoS Babu Ram Dawadi.
IPSecurity.
CSE 4905 IPsec.
Encryption and Network Security
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Internet Security CS457 Seminar Zhao Cheng
IPSec IPSec is communication security provided at the network layer.
CSE565: Computer Security Lecture 23 IP Security
No.9: IP Security Network Information Security 网络信息安全
Cryptography and Network Security
CSCE 815 Network Security Lecture 13
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Security Protocols in the Internet
Virtual Private Networks (VPNs)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
NET 536 Network Security Lecture 5: IPSec and VPN
Virtual Private Networks (VPNs)
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 6 IP Security.
CSE 5/7349 – February 15th 2006 IPSec.
Cryptography and Network Security
Presentation transcript:

Chapter 18 IP Security  IP Security (IPSec)  Virtual Private Network (VPN)

Security Approaches Security approaches in TCP/IP protocol stack IPSec: security features at IP layer Transparent to users and applications SSL (or TLS) : security features at transport layer Security features at application layer: PGP, S/MIME, SET, …

IP Security Overview IP security (IPSec) Application of IPSec RFC 1636, 1994 : An implementation of IP-layer security Confidentiality service Authentication service Key management Application of IPSec VPN over Internet Secure remote access over Internet Enhancing e-Commerce security Secure routing info exchange among routers

IPSec (IP Security) IPSec protocols IP Authentication Header (AH) IP Encapsulating Security Payload (ESP) Internet Key Exchange (IKE)

IPSec (IP Security) ESP and AH assume the peers using the protocol have a shared key -> needs a protocol for distributing keys called Internet Key Exchange (IKE). IPSec was designed as two protocols to encourage wide deployment, even where there are import, export, and usage restrictions on encryption.

Virtual Private Networks (VPN) What is a VPN? “…a group of two or more computer systems, typically connected to a private network with limited public-network access, that communicates ‘securely’ over a public network.” “A combination of tunneling, encryption, authentication and access control technologies and services used to carry traffic over an IP network”

Virtual Private Networks (VPN) What makes a VPN secure? Encryption Strong authentication of remote users and hosts. Mechanisms for hiding or masking information about the private network topology from potential attackers Three basic types: Hardware-based Firewall-based Standalone/Software-based

Security Association One-way relationship b/w sender and receiver that affords security services to the traffic on it Defined by: Security parameter index (SPI): the index used to select SA under which a received packet will be processed IP destination address Security protocol identifier: identifies AH or ESP

Security Association SA parameters Sequence number counter: packet sequence number Anti-replay window AH information: authentication algorithm, key, key lifetime, etc. ESP information: authentication and encryption algorithm, key, IV, key lifetime, etc.

Security Association SA parameters SA lifetime: after this lifetime, SA must be replaced with a new SA IPSec protocol mode: tunnel or transport mode Path MTU

Authentication Header (AH) Designed to provide Integrity Authentication Does not provide confidentiality

Authentication Header (AH) AH header includes: Payload length: length of AH authentication data: signed message digest, calculated over original IP datagram, providing source authentication, data integrity. SPI Sequence number (SN): used to protect against replay attacks Next header field: specifies type of data (TCP, UDP, etc.)

Authentication Header (AH) Anti-replay attacks: Sender initializes SN counter to 0 Each time a packet is sent on this SA, sender increments the SN counter If the SN counter reaches SN overflow value, sender terminates the current SA and negotiate a new SA with a new key

Authentication Header (AH) Anti-replay attacks: IP packet may be delivered out of order Receiver allows packets out of order within a window W (default size of 64) Window size (= 64) … N N: the highest SN of the packets received so far

Authentication Header (AH) Anti-replay attacks: Input processing (receiver): When SN of the received packet is within the window: the MAC is checked, if the MAC is correct, mark the window slot When SN of the received packet > N: check the MAC, if the MAC is correct, mark the window slot and advance the window When SN of the received packet is to the left of the window or MAC is incorrect, discard the packet Window size (= 64) … N N: the highest SN of the packets received so far

Encapsulating Security Payload (ESP) Designed to provide Integrity Authentication Confidentiality (Data, ESP trailer) encrypted. Next header field is in ESP trailer. ESP authentication field is similar to AH authentication field. Protocol = 50.

IKE (Internet Key Exchange) A hybrid protocol designed to negotiate and provide authenticated keying material for security associations (SA) in a protected manner Based on three previous protocols ISAKMP – A framework for authentication and key exchanges, define message types for key exchanges Oakley – A described series of key exchanges and the services provided by them SKEME – A versatile key exchange technique providing anonymity, non-repudiability, and quick key refreshment

IPSec Mode Transport mode Tunnel mode Provides protection to the payload of IP packet Used for end-to-end secure communication between two hosts Tunnel mode Provides protection to the entire IP packet The original IP packet is encapsulated into new IP packet including AH or ESP header. Used for secure communications between two IPSec gateways

IPSec Mode

IPSec Mode: ESP