CSE 4905 IPsec II.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 IPSec—An Overview Somesh Jha Somesh Jha University of Wisconsin University of Wisconsin.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec – IKE CS 470 Introduction to Applied Cryptography
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
1 IPsec Youngjip Kim Objective Providing interoperable, high quality, cryptographically-based security for IPv4 and IPv6 Services  Access.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
IPsec: IKE, Internet Key Exchange IPsec does not use Public Key Infrastructure and exchanging keys before an IPsec connection is established is a problem.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.
CSCE 715: Network Systems Security
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Karlstad University IP security Ge Zhang
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
1 Internet Key Exchange Rocky K. C. Chang 20 March 2007.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Computer and Network Security
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Module 4: Configuring Site to Site VPN with Pre-shared keys
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Reviews Rocky K. C. Chang 20 April 2007.
INF526: Secure Systems Administration
CSE 4905 IPsec.
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
Somesh Jha University of Wisconsin
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
UNIT.4 IP Security.
BINF 711 Amr El Mougy Sherif Ismail
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Slides have been taken from:
Network Security (contd.)
Sheila Frankel Systems and Network Security Group, ITL
Virtual Private Networks (VPNs)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Virtual Private Networks (VPNs)
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Guevara Noubir CSG254: Network Security
Network Security Standards
Chapter 6 IP Security.
CSE 5/7349 – February 15th 2006 IPSec.
Cryptography and Network Security
Presentation transcript:

CSE 4905 IPsec II

Recall IPsec SA Two entities need to establish Security Associations SA for communication from A to B includes a collection of attributes Security Parameter Index (SPI) Encryption key Encryption algorithm Authentication key Authentication algorithm

Key management for IPsec establishing and maintaining SAs between pairs of communicating entities Internet Key Exchange (IKE) Exchange and negotiate security policies Establish security associations Key exchange Key management Typical implementation IKE daemon in user space IPsec stack in kernel space (for efficiency)

IKE history IETF defined IKE in November 1998 IKE v2 RFC 2407: The Internet IP Security Domain of Interpretation for ISAKMP RFC 2408: The Internet Security Association and Key Management Protocol (ISAKMP) RFC 2409: The Internet Key Exchange (IKE) ISAKMP: gift to IETF from NSA Total: 150 pages, complex & confusing IKE v2 A few versions starting from December 2005 Current Internet standard: RFC 7296, October 2014

IKE: two phases Phase I: negotiate and establish an auxiliary end-to-end secure channel Used by subsequent phase II negotiations Only established once between two end points! Also called IKE-SA phase Phase II: negotiate and establish custom secure channels Can occur multiple times Also called IPsec-SA phase Through UDP, port 500 Initiator responsible for retransmissions

Discussion: why two phases in IKE? Not an obvious need for two phases Only beneficial if multiple Phase 2’s occur

IKE Phase 1 Goal: to establish a secure channel between two end points w/ security features: Source authentication Data integrity and data confidentiality Protection against replay attacks Rationale each application has different security requirements But they all need to negotiate policies and exchange keys! So, provide the basic security features and allow application to establish custom sessions

Examples All packets sent to address mybank.com must be encrypted using 3DES with HMAC-MD5 integrity check All packets sent to address www.forum.com must use integrity check with HMAC-SHA1 (no encryption is required)

Phase 1 protocols Four different “key” options Two modes Public key encryption (original version) Public key encryption (improved version) Public key signature Pre-shared symmetric key Two modes Main mode (6 messages) Aggressive mode (3 messages) There are 8 versions of IKE Phase 1!

Discussion: why three types of “key” options? Pre-shared keys: OK for small-scale settings, better efficiency Why public key signature vs public key encryption?

Phase 1 exchange: two modes Main mode Six messages in three round trips More options Aggressive mode Three messages in two round trips Less options Both modes use Diffie-Hellman key exchange to establish a shared key

Phase 1 aggressive mode 3 messages The first two messages: negotiate policy, exchange Diffie-Hellman public values and ancillary data and identities In addition, the second message authenticates the responder The third message: authenticates the initiator

General Idea of Aggressive Mode Alice Bob I’m Alice, gA mod p, nonceA I’m Bob, gB mod p, proof I’m Bob, nonceB proof I’m Alice Bob either accepts g and p from A or fail Proof of identity: prove sender knows the secret key associated with the identity; integrity protection of previous messages

Phase 1 main mode 6 messages 1st two messages: negotiate policy 2nd two messages: exchange Diffie-Hellman public values and ancillary data (e.g., nonces) 3rd two messages: authenticate the Diffie-Hellman Exchange

General Idea of Main Mode Alice Bob crypto suites I support crypto suites I choose gA mod p, nonceA gB mod p, nonceB {“Alice”, proof I’m Alice} key variant-dependent {“Bob”, proof I’m Bob}

Main Mode: Preshared key S Alice Bob crypto suites I support crypto suites I choose gA mod p, nonceA gB mod p, nonceB {“Alice”, proof I’m Alice} f(S,gAB) {“Bob”, proof I’m Bob} f(S,gAB)

Phase 1 session keys Phase I establishes two session keys: Integrity key, encryption key Used to protect the last of phase I messages, and all phase II messages Basic procedure SKEYID: key seed obtained after DH, hash of nonces, DH values, etc. Exact method depends on “key” options Authentication key SKEYID_a from SKEYID Encryption key SKEYID_e from SKEYID

IKE Phase 2 Goal: to establish custom secure channels between two end points Use the secure channel established in Phase 1 for communication Only one mode: Quick Mode Generate SAs for two end points

General idea of Quick Mode IKE-SA, Y, {Ni, traffic, SPIA, [gA mod p]} IKE-SA, Y, {ack} IKE-SA, Y, {Nr, traffic, SPIB, [gB mod p]} Alice Bob New key is PRF(current key, gAB | Ni | Nr ) Ni: nonce from initiator Nr: nonce from responder Optional diffie-hellman Y: 32-bit number chosen by initiator DH optional {}: encrypted and integrity protected using keys from phase I

IKE v2 Not backward compatible Goal: Specify all functionalities in a single document Simplify and improve the protocol Fix various problems from deployment and analysis Not to make gratuitous changes to IKE v1

IPsec Policy Phase 1 policies Phase 2 policies defined as protection suites; each protection suite must contain: Encryption algorithm, Hash algorithm, Authentication method, Diffie-Hellman Group May optionally contain Lifetime, … Phase 2 policies defined as proposals each proposal may contain AH sub-proposals, ESP sub-proposals, IPComp sub-proposals Along with necessary attributes such as Key length, life time, …

IPSec Policy Example In English: In IPsec: All traffic to 128.104.120.0/24 must be: Use pre-hashed key authentication DH group is MODP with 1024-bit modulus Hash algorithm is HMAC-SHA (128 bit key) Encryption using 3DES In IPsec: [Auth=Pre-Hash; DH=MODP(1024-bit); HASH=HMAC-SHA; ENC=3DES]

IPsec Policy Example II In English: All traffic to 128.104.120.0/24 must use one of the following: AH with HMAC-SHA or, ESP with 3DES as encryption algorithm and (HMAC-MD5 or HMAC-SHA as hashing algorithm) In IPsec: [AH: HMAC-SHA] or, [ESP: (3DES and HMAC-MD5) or (3DES and HMAC-SHA)]

IPsec summary Security protocol for IP-layer security Between two entities Host-to-host, host-to-router, router-to-router AH and ESP protocols Transport and Tunnel mode Security association (SA) IPsec datagram Internet Key Exchange (IKE) Best use case: VPN