Network Security Professor Dr. Adeel Akram. Firewalls, SSL, VPN and IPSec.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Cryptography and Network Security
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Module 5: TLS and SSL 1. Overview Transport Layer Security Overview Secure Socket Layer Overview SSL Termination SSL in the Hosted Environment Load Balanced.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
K. Salah1 Security Protocols in the Internet IPSec.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Secure Socket Layer (SSL)
Chapter 13 – Network Security
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
TCP/IP Protocols Contains Five Layers
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 21 – Internet Security.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Chapter 7 : Web Security Lecture #1-Week 12 Dr.Khalid Dr. Mohannad Information Security CIT 460 Information Security Dr.Khalid Dr. Mohannad 1.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Cryptography CSS 329 Lecture 13:SSL.
IPSec Detailed Description and VPN
IPSecurity.
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
Secure Sockets Layer (SSL)
BINF 711 Amr El Mougy Sherif Ismail
Virtual Private Networks (VPNs)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Network Security Professor Dr. Adeel Akram

Firewalls, SSL, VPN and IPSec

Outline ► Types of firewalls  Static Packet Filter  Dynamic (Stateful) Packet Filters  Circuit Level Gateway  Application Level Gateway ► Transport Layer Security / SSL ► VPN ► IPSec

Network Layers and Firewalls

Static Packet Filter ► The decision to accept or deny a packet is based upon an examination of specific fields within the packet's IP and protocol headers.  source address  destination address  application or protocol  source port number  destination port number ► This decision is made on packet by packet basis ► Rules are encoded to filter packets.

Static Packet Filter ► A packet filter only examines data in the IP header and TCP header; it cannot know the difference between a real and a forged address. ► If an address meets the packet filter rules along with the other rule criteria, the packet will be allowed to pass.

IP Address Spoofing ► Suppose all packets from unknown IP addresses are filtered out. ► If a Hacker can find the IP address of one trusted client then the hacker can change the source address on the malicious IP packet and use the address of the trusted client.

Static Packet Filter Considerations ProsCons Low impact on network performance. Operates only at network layer therefore it only examines IP and TCP headers. Low cost – now included with many OSs Unaware of packet payload – offers low level of security. Lacks state awareness – may require numerous ports be left open to facilitate services which use dynamically allocated ports. Susceptible to IP spoofing Difficult to create rules Only provides a low level of protection

Packet Filtering Firewall: Terminology ► Static (Stateless) Firewall: The firewall makes a decision on a packet by packet basis. ► Dynamic (Stateful) Firewall : The firewall keeps state information about transactions (connections).

Dynamic (Stateful) Packet Filter ► A typical dynamic packet filter is "aware" of the difference between a new and an established connection. ► Once a connection is established, it is entered into a table that typically resides in RAM. ► Subsequent packets are compared to this table in RAM, most often by software running at the operating system (OS) kernel level. ► When the packet is found to be an existing connection, it is allowed to pass without any further inspection.

Dynamic (Stateful) Packet Filter ► By avoiding having to parse the packet filter rule base for each and every packet that enters the firewall ► and by performing this already established connection table test at the kernel level in RAM, ► the dynamic packet filter enables a measurable performance increase over a static packet filter.

Dynamic (Stateful) Packet Filter ► State creation must follow the handshake needed for connection creation.

Dynamic Packet Filter Considerations ProsCons Low impact on network performance. Operates only at network layer therefore it only examines IP and TCP headers. Low cost – now included in some of the OSs Unaware of packet payload – offers low level of security. State awareness provides significant performance benefit Susceptible to IP spoofing Difficult to create rules Important to follow the connection creation steps. Only provides a low level of protection

Circuit Level Gateway ► The decision to accept or deny a packet is based upon an examination of specific fields within the packet's IP and protocol headers.  source address  destination address  application or protocol  source port number  destination port number  Handshaking and Sequence number

Circuit Level Gateway

Circuit Level Gateway Considerations ProsCons Low to moderate impact on network performance. Shares many of the same negatives issues associated with packet filters. Breaks direct connection to server behind the firewall Allows any data to pass through the firewall. State awareness provides significant performance benefit Only provides a low to moderate level of protection

Application Level Proxy ► An application level gateway intercepts the incoming and outgoing packets ► Run proxies that prevent direct connection between a trusted server or client and an untrusted host. ► Proxies examine the entire packet and can filter packets at the application layer. ► Proxies are application specific.

Application Level Gateway ► Current technology application level gateways are often referred to as strong application proxies. ► A strong application proxy extends the level of security afforded by the application level gateway. ► Instead of copying the entire datagram on behalf of the user, a strong application proxy actually creates a brand new empty datagram inside the firewall. ► Only those commands and data found acceptable to the strong application proxy are copied from the original datagram outside the firewall to the new datagram inside the firewall. ► By employing this methodology the strong application proxy can mitigate the risk of an entire class of covert channel attacks. covert channel covert channel

Application Level Gateway Considerations

Covert Channel Attacks ► ICMP_ECHO traffic can be used to construct covert communications channels through networks. ► The normal "ping" protocol states that one site (the pinger) sends an ICMP_ECHO packet to the target (the pingee). The pingee then sends an ICMP_ECHOREPLY back. ► ICMP_ECHO packets have an option to include a data section that usually stores timing information to determine round-trip packet times.

Covert Channel Attacks ► Firewalls and filtering routers do not check the data content, so it is possible to transmit malicious information in this packet. ► This is a covert channel. Most network routers pass, drop or return ICMP traffic. Since they don't filter the data content, it is possible to masquerade Trojan packets as valid ICMP_ECHO packets. ► One example of this type of attack is described in Phrack Magazine and is called Project Loki. Project LokiProject Loki

Transport Layer Security

► Lecture prepared using information from ► Chapter 7 of Network Security Essentials Applications and Standards by Stallings ► Section of Computer Networks by Peterson and Davie ► Introduction to SSL.htm ► Analysis of SSL 3.0 Protocol by Wagner and Schneier

SSL ► The Transport Layer Security protocols started with the Secure Socket Layer (SSL) protocol

 So, what is it?  Secure Sockets Layer (version 3.0)  According to the specification… “The primary goal of the SSL Protocol is to provide privacy and reliability between two communicating applications. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. ” SSL

 Designed with four basic goals  Cryptographic security  Interoperability  Extensibility  Relative efficiency SSL

 SSL has three basic properties:  The connection is private. Encryption is used after an initial handshake to define a secret key. Symmetric cryptography is used for data encryption (e.g., DES, RC4, etc.)  The peer's identity can be authenticated using asymmetric, or public key, cryptography (e.g., RSA, DSS, etc.).  The connection is reliable. Message transport includes a message integrity check using a keyed MAC. Secure hash functions (e.g., SHA, MD5, etc.) are used for MAC computations. SSL

SSL/TLS  Well then, what is TLS?  Transport Layer Security (version 1.0)  SSL was developed by Netscape. The standards community wanted their own version free from any patents/restrictions  Thus was born TLS  IETF changed the name to avoid showing bias  We’ll use the two terms interchangeably

 Users want to connect to servers without the connection being listened to (securely)  E.g. Electronic commerce  Every server has a certificate  Basically a public key  Signed by a trusted third party SSL/TLS

SSL Services ► SSL server authentication allows a user to confirm a server’s identity (SSL Certificates). ► SSL client authentication allows a server to confirm a client’s identity ► An encrypted SSL connection allows confidential information exchange.

Application Protocol (e.g. http) TCP IP HandshakeAlertChangeCipher } Record Layer SSL/TLS SSL/TLS

► SSL consists of two protocol layers ► The Record Layer encapsulates all messages  The Handshake protocol negotiates all options of the session  The Alert protocol indicates errors or other caution conditions have occurred in the connection  The ChangeCipherSpec protocol indicates the channel is ready for secure communications SSL/TLS

Application Protocol (e.g. http) TCP IP HandshakeAlertChangeCipher } Record Layer SSL/TLS SSL/TLS

SSL/TLS ► The SSL Record Layer Provides  Confidentiality  Authenticity  Replay Protection ► Over a connection oriented reliable transport protocol like TCP

Application Protocol (e.g. http) TCP IP HandshakeAlertChangeCipher } Record Layer SSL/TLS SSL/TLS

Application Protocol (e.g. http) TCP IP HandshakeAlertChangeCipher } Record Layer SSL/TLS SSL/TLS

► The SSL protocol uses a combination of public-key and symmetric key encryption. ► An SSL session always begins with an exchange of messages called the SSL handshake. ► The handshake allows  the server to authenticate itself to the client using public- key techniques,  the client to authenticate itself to the server optionally  the client and the server to cooperate in the creation of symmetric keys used for rapid encryption, decryption, and tamper detection during the session that follows.

ClientHelloClientKeyExchange ChangeCipherSpec Finish ServerHello Certificate ServerHelloDone ChangeCipherSpecFinish SSL Session Negotiation: Server Authentication

SSL Session Negotiation: Client and Server Authentication ClientHelloCertificateClientKeyExchange CertificateVerifyChangeCipherSpec Finish ServerHello Certificate Certificate Request ServerHelloDone ChangeCipherSpecFinish

Application Protocol (e.g. http) TCP IP HandshakeAlertChangeCipher } Record Layer SSL/TLS SSL/TLS

Virtual Private Networks (VPN)  What is a VPN?  “…a group of two or more computer systems, typically connected to a private network with limited public-network access, that communicates ‘securely’ over a public network.”  “A combination of tunneling, encryption, authentication and access control technologies and services used to carry trusted traffic over an Untrusted IP network”

 What makes a VPN secure?  Encryption  Strong authentication of remote users and hosts.  Mechanisms for hiding or masking information about the private network topology from potential attackers Virtual Private Networks (VPN)

VPN ► If we are going to create a VPN using Internet it is tempting to make all IP traffic secure. ► A VPN may support many different applications  Distributed computing resources  VoIP  SNMP  FTP ► These applications have very different requirements.

Outline ► IP Security Overview ► IP Security Architecture ► Authentication Header ► Encapsulating Security Payload ► Combinations of Security Associations ► Key Management

IPSEC in a few words ► IPSec is an IETF standard for real-time communication security. ► In such a protocol, Alice initiates communication with a target, Bob. ► Each side authenticates itself to the other based on some key that the other side associates with it. ► Then they establish secret session keys (4 keys, one for integrity protection, and one for encryption, for each direction).

IP Security Overview ► IPSEC is a framework for security that operates at the Network Layer by extending the IP Packet Header ► This gives the ability to encrypt any higher layer protocol, including arbitrary TCP and UDP sessions. ► This flexibility comes with complexity. ► IPSEC’s complexity has be criticized quite severely in the literature.

IP Security Scenario

IP Security Overview ► IPSEC is highly modular. It allows users to select from  a variety of encryption algorithms  And specialized security protocols ► IPSEC allows users to select from a large menu of security services including  Access control  Authentication  Confidentiality  Protection against replay attacks

IP Security Architecture ► IPSEC has two major components.  The first component is a pair of protocols that implements security services provided by IPSEC  The second component provides support for key management

IP Security Architecture – Security Services ► In IPSEC security services are provided by a pair of protocols  The Authentication Header (AH) protocol provides ► Access control ► Connectionless message integrity ► Authentication ► Anti-replay protection  The Encapsulating Security Payload (ESP) protocol provides ► All the services provided by AH ► Confidentiality

IP Security Architecture – Key Management ► Key management is done by a protocol known as Internet Security Association and Key Management Protocol (ISAKMP)

IP Security Architecture ► IPSec documents:  RFC 2401: An overview of security architecture  RFC 2402: Description of a packet encryption extension to IPv4 and IPv6  RFC 2406: Description of a packet encryption extension to IPv4 and IPv6  RFC 2408: Specification of key managament capabilities

Questions ??????????????? ??????????????? ????