IP Security Lawrence Taub IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
IP Security. n Have a range of application specific security mechanisms u eg. S/MIME, PGP, Kerberos, SSL/HTTPS n However there are security concerns that.
Security at the Network Layer: IPSec
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Network Security Essentials Chapter 8 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Network Layer Security: IPSec
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Cryptography and Network Security
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 IPsec Youngjip Kim Objective Providing interoperable, high quality, cryptographically-based security for IPv4 and IPv6 Services  Access.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
IP Security. IPSEC Objectives n Band-aid for IPv4 u Spoofing a problem u Not designed with security or authentication in mind n IP layer mechanism for.
IP Security: Security Across the Protocol Stack
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
SMUCSE 5349/49 IP Sec. SMUCSE 5349/7349 Basics Network-level: all IP datagrams covered Mandatory for next-generation IP (v6), optional for current-generation.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
1 Lecture 16: IPsec IKE history of IKE Photurus IKE phases –phase 1 aggressive mode main mode –phase 2.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
@Yuan Xue CS 285 Network Security IP Security Yuan Xue Fall 2013.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSec IPSec is communication security provided at the network layer.
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
Cryptography and Network Security
Presentation transcript:

IP Security Lawrence Taub

IPSEC IP security — security built into the IP layer Provides host-to-host (or router-to-router) encryption and authentication Required for IPv6, optional for IPv4 Comprised of two parts: –IPSEC proper (authentication and encryption) –IPSEC key management

IPSEC Authentication header (AH) — integrity protection of header only Inserted into IP datagram Integrity check value (ICV) is 96-bit HMAC

IPSEC Proper The AH authenticates entire datagram Mutable fields (time-to-live, IP checksums) are zeroed before AH is added Sequence numbers provide replay protection –Receiver tracks packets within a 64-entry sliding window

IPSEC Proper Encapsulating security protocol (ESP) — authentication (optional) and confidentiality Inserted into IP datagram Contains sequence numbers and optional ICV as for AH

IPSEC Proper ESP secures data payload in datagram Encryption protects payload –Authentication protects header and encryption Security Association bundling is possible –ESP without authentication inside AH –Authentication covers more fields this way than just ESP with authentication

IPSEC Key Management Key management establishes a security association (SA) for a session –SA used to provide authentication/confidentiality for that session –SA is referenced via a security parameter index (SPI) in each IP datagram header

IPSEC Processing Use SPI to look up security association (SA) Perform authentication check using SA Perform decryption of authenticated data using SA Operates in two modes –Transport mode (secure IP), protects payload –Tunneling mode (secure IP inside standard IP), protects entire packet Popular in routers Communicating hosts don’t have to implement IPSEC themselves Nested tunneling possible

IPSEC Key Management ISAKMP –Internet Security Association and Key Management Protocol Oakley –DH-based key management protocol Photuris –DH-based key management protocol SKIP –Sun’s DH-based key management protocol Protocols changed considerably over time, most borrowed ideas from each other

Photuris Latin for “firefly”, Firefly is the NSA’s key exchange protocol for STU-III secure phones Three-stage protocol –1. Exchange cookies –2. Use D-H to establish a shared secret Agree on security parameters –3. Identify other party Authenticate data exchanged in steps 1 and 2 –n. Change session keys or update security parameters

Photuris Cookie based on IP address and port, stops flooding attacks –Attacker requests many key exchanges and bogs down host (clogging attack) Cookie depends on –IP address and port –Secret known only to host –Cookie = hash( source and dest IP and port + local secret ) Host can recognize a returned cookie –Attacker can’t generate fake cookies Later adopted by other IPSEC key management protocols

Photuris Client Server Client cookie   Server cookie Offered schemes Chosen scheme  D-H keygen  D-H keygen Client identity Authentication for previous data   Server identity Authentication for previous data

SKIP Each machine has a public DH value authenticated via –X.509 certificates –PGP certificates –Secure DNS Public D-H value is used as an implicit shared key calculation parameter –Shared key is used once to exchange encrypted session key –Session key is used for further encryption/authentication Clean-room non-US version developed by Sun partner in Moscow –US government forced Sun to halt further work with non-US version

Oakley Exchange messages containing any of –Client/server cookies –DH information –Offered/chosen security parameters –Client/server ID’s until both sides are satisfied Oakley is extremely open-ended, with many variations possible –Exact details of messages exchange depends on exchange requirements Speed vs thoroughness Identification vs anonymity New session establishment vs rekey D-H exchange vs shared secrets vs PKC-based exchange

ISAKMP NSA-designed protocol to exchange security parameters (but not establish keys) –Protocol to establish, modify, and delete IPSEC security associations –Provides a general framework for exchanging cookies, security parameters, and key management and identification information –Exact details left to other protocols Two phases –1. Establish secure, authenticated channel (“SA”) –2. Negotiate security parameters (“KMP”)

IKE (ISAKMP/Oakley) ISAKMP merged with Oakley –ISAKMP provides the protocol framework –Oakley provides the security mechanisms Combined version clarifies both protocols, resolves ambiguities

IKE (ISAKMP/Oakley) Phase 1 example Client Server Client cookie Client ID Key exchange information   Server cookie Server ID Key exchange information Server signature Client signature  Other variants possible (data spread over more messages, authentication via shared secrets) –Above example is aggressive exchange which minimizes the number of messages

IKE (ISAKMP/Oakley) Phase 2 example Client Server Encrypted, MAC’d Client nonce Security parameters Offered   Encrypted, MAC’d Server nonce Security parameters accepted Encrypted, MAC’d Client nonce Server nonce 

IPSEC Algorithms DES in CBC mode for encryption HMAC/MD5 and HMAC/SHA (truncated to 96 bits) for authentication Later versions added optional, DOI-dependent algorithms –3DES –Blowfish –CAST-128 –IDEA –RC5 –Triple IDEA (!!!)