IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Secure Mobile IP Communication
L8. Reviews Rocky K. C. Chang, May Foci of this course 2 Rocky K. C. Chang  Understand the 3 fundamental cryptographic functions and how they are.
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
Security at the Network Layer: IPSec
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 IPSec—An Overview Somesh Jha Somesh Jha University of Wisconsin University of Wisconsin.
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T IKE Tutorial.
Internet Security CSCE 813 IPsec. CSCE Farkas2 Reading Today: – Oppliger: IPSec: Chapter 14 – Stalllings: Network Security Essentials, 3 rd edition,
K. Salah1 Security Protocols in the Internet IPSec.
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
Creating an IPsec VPN using IOS command syntax. What is IPSec IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
IPsec: IKE, Internet Key Exchange IPsec does not use Public Key Infrastructure and exchanging keys before an IPsec connection is established is a problem.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
406 NW’98 1 © 1998, Cisco Systems, Inc. IPSec Loss of Privacy Security Threats Impersonation Loss of Integrity Denial of Service m-y-p-a-s-s-w-o-r-d.
IPSec Chapter 3 – Secure WAN’s. Definition IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering Task Force,
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IPsec  IPsec (IP security)  Security for transmission over IP networks The InternetThe Internet Internal corporate IP networksInternal corporate IP.
IPSEC : KEY MANAGEMENT PRESENTATION BY: SNEHA A MITTAL(121427)
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
18 July 2004Bill Nickless / IPSec1 IPSec Internet Protocol Security And You.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Potential vulnerabilities of IPsec-based VPN
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Internet Key Exchange IKE ● RFC 2409 ● Services – Constructs shared authenticated keys – Establishes shared security parameters – Common SAs between IPSec.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 Secure Key Exchange: Diffie-Hellman Exchange Dr. Rocky K. C. Chang 19 February, 2002.
Network Layer Security Network Systems Security Mort Anvari.
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
K. Salah1 Security Protocols in the Internet IPSec.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Chapter 5 Network Security Protocols in Practice Part I
Reviews Rocky K. C. Chang 20 April 2007.
CSE 4905 IPsec II.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Network Security (contd.)
Presentation transcript:

IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)

Before the Agenda My intention of this presentation: My intention of this presentation: I know that many people do not have any clue what‘ s happening while establishing Security Associations prior to create VPN tunnels. This topic is quite complex. I want you to get started into this topic taking away a bit of its complexity.

Agenda Introductory Information on IPSec VPN Introductory Information on IPSec VPN Why Diffie-Hellman Algorithm? Why Diffie-Hellman Algorithm? IKE SA in Main Mode IKE SA in Main Mode IPSec SA in Quick Mode IPSec SA in Quick Mode Some Troubleshooting Tips Some Troubleshooting Tips

Agenda Introductory Information on IPSec VPN Introductory Information on IPSec VPN Why Diffie-Hellman Algorithm? Why Diffie-Hellman Algorithm? IKE SA in Main Mode IKE SA in Main Mode IPSec SA in Quick Mode IPSec SA in Quick Mode Some Troubleshooting Tips Some Troubleshooting Tips

Introductory Information on IPSec VPN Introductory Information on IPSec VPN

Before establishing a Site-to-Site VPN connection, both gateways must agree upon parameters for encrypting communication. This negotiation process is divided into two phases: Phase 1 Phase 2 Phase 1 and Phase 2. In Phase 1 a IKE Security Association (IKE SA) will be created. Those parameters are therefore:

Before establishing a Site-to-Site VPN connection, both gateways must agree upon parameters for encrypting communication. This negotiation process is divided into two phases: Phase 1 Phase 2 Phase 1 and Phase 2. In Phase 1 a IKE Security Association (IKE SA) will be created. Those parameters are therefore: 1.) Encryption Algorithm (3DES, AES-128, AES-256,…) to ensure privacy

Before establishing a Site-to-Site VPN connection, both gateways must agree upon parameters for encrypting communication. This negotiation process is divided into two phases: Phase 1 Phase 2 Phase 1 and Phase 2. In Phase 1 a IKE Security Association (IKE SA) will be created. Those parameters are therefore: 1.) Encryption Algorithm (3DES, AES-128, AES-256,…) to ensure privacy 2.) Hash Algorithm (SHA-1 or MD5) to ensure data integrity

Before establishing a Site-to-Site VPN connection, both gateways must agree upon parameters for encrypting communication. This negotiation process is divided into two phases: Phase 1 Phase 2 Phase 1 and Phase 2. In Phase 1 a IKE Security Association (IKE SA) will be created. Those parameters are therefore: 1.) Encryption Algorithm (3DES, AES-128, AES-256,…) to ensure privacy 2.) Hash Algorithm (SHA-1 or MD5) to ensure data integrity 3.) Diffie-Hellman Group (1, 2, 5, or 14)

Before establishing a Site-to-Site VPN connection, both gateways must agree upon parameters for encrypting communication. This negotiation process is divided into two phases: Phase 1 Phase 2 Phase 1 and Phase 2. In Phase 1 a IKE Security Association (IKE SA) will be created. Those parameters are therefore: 1.) Encryption Algorithm (3DES, AES-128, AES-256,…) to ensure privacy 2.) Hash Algorithm (SHA-1 or MD5) to ensure data integrity 3.) Diffie-Hellman Group (1, 2, 5, or 14) 4.) Method of mutual authentication (Preshared Key or Certificate)

You have the choice between two different modes in Phase 1: Main ModeMain Mode Aggressive ModeAggressive Mode Main Mode consists of a 6 packet negotiationMain Mode consists of a 6 packet negotiation In Aggressive Mode only three packets are exchanged between both VPN gateways.In Aggressive Mode only three packets are exchanged between both VPN gateways.

Before beginning to analyze the information exchanged by the gateways, let‘s have a look at the Diffie- Hellman Algorithm: Why is Diffie-Hellman necessary?

Agenda Introductory Information on IPSec VPN Introductory Information on IPSec VPN Why Diffie-Hellman Algorithm? Why Diffie-Hellman Algorithm? IKE SA in Main Mode IKE SA in Main Mode IPSec SA in Quick Mode IPSec SA in Quick Mode Some Troubleshooting Tips Some Troubleshooting Tips

Usually, payloads are encrypted symmetrically by means of symmetric encryption algorithms, like 3DES or AES. The problem with symmetric encryption is exchanging the keys over the Internet while preventing them from falling into the wrong hands. One answer is asymmetric encryption.

So, when asymmetric encryption is addressing problems with symmetric encryption, why is latter technology still necessary?

The answer is: Performance!

The Diffie-Hellman Algorithm is not an Encryption Algorithm rather than a Key Agreement Protocol.

To understand the Diffie-Hellman Algorithm, you have to have basic knowledge on the Modulo operation. The Modulo operation finds the remainder of division of one number by another. Given two numbers, a and b, n = a mod b is the remainder on division of a by b.

Examples: 30 mod 16 = mod 100 = 14 8 mod 3 = 2 Isn‘t that simple?

Diffie-Hellman: Initiator takes a prime number p and an integer a with 1 < a < p and a secret integer x with: X = a x mod p X, a, p: public parameters, x: secret parameter.

Initiator sends X, a, and p to the Responder. The Responder takes a secret integer y and computes: Y = a y mod p The number Y, which is public will be sent back to the Initiator.

Initiator and Responder are computing their common encryption key: K x = Y x mod p = (a y mod p) x mod p = (a x mod p) y mod p = X y mod p = K y Hence K x = K y

Now, that we have the basic understanding of the Diffie- Hellman Algorithm, we can now fully understand IKE SA in Main Mode.

Agenda Introductory Information on IPSec VPN Introductory Information on IPSec VPN Why Diffie-Hellman Algorithm? Why Diffie-Hellman Algorithm? IKE SA in Main Mode IKE SA in Main Mode IPSec SA in Quick Mode IPSec SA in Quick Mode Some Troubleshooting Tips Some Troubleshooting Tips

As all of you might already know, IKE SA in Main Mode consists of 6 packets

First of all, the Initiator sends the IKE SA Parameters to be negotiated upon to the Responder: IKE SA: 3DES or AES-128? SHA-1 or MD5? DH-Group 5 or 14? Certificate or Preshared Key?

Initiator Responder Packet Number 1:

The Responder sends back the parameters to be used in common to the Initiator: IKE SA: AES-128! SHA-1! DH-Group 14! Preshared Key!

Initiator Responder Packet Number 1: Packet Number 2:

Then, the Initiator sends the public Diffie- Hellman Parameters and a random number, which is called „Nonce“:

Initiator Responder Packet Number 3:

Then, the Responder sends back its own public Diffie-Hellman Parameters and its own random number („Nonce“):

Initiator Responder Packet Number 3: Packet Number 4:

Both parties know from each other, which parameters and encryption key to use in common. The Initiator then builds the hash of the Preshared Keybuilds the hash of the Preshared Key encrypts the Nonce of the Responder and the Hash of the Preshared Keyencrypts the Nonce of the Responder and the Hash of the Preshared Key

Initiator Responder Packet Number 5: Packet Number 6:

What happens next? Each of the Gateways are receiving their own Nonces encrypted by other parties. The next step is to decrypt the encrypted Nonces to verify the identity of the communicating gateways.

After receiving the sixth packet, you will get the following message in SmartView Tracker: IKE SA: Main Mode completion

Agenda Introductory Information on IPSec VPN Introductory Information on IPSec VPN Why Diffie-Hellman Algorithm? Why Diffie-Hellman Algorithm? IKE SA in Main Mode IKE SA in Main Mode IPSec SA in Quick Mode IPSec SA in Quick Mode Some Troubleshooting Tips Some Troubleshooting Tips

Why is Quick Mode necessary? To establish the IPSec SA!

Quick Mode to establish an IPSec SA consists of 3 packets.

You have to negotiate upon: The Encryption algorithmThe Encryption algorithm The Hash AlgorithmThe Hash Algorithm The IPSec Protocol (ESP, AH)The IPSec Protocol (ESP, AH) If PFS is to be used or notIf PFS is to be used or not (if yes, the DH-Group is to be determined again)

One word regarding IPSec Protocols: Authentication Header (AH) provides: Data Integrity CheckingData Integrity Checking Replay ProtectionReplay Protection

Encapsulating Security Payload (ESP) provides: Payload EncryptionPayload Encryption Data Integrity CheckingData Integrity Checking Replay ProtectionReplay Protection

Why is it necessary to agree upon the Encryption AlgorithmEncryption Algorithm Hash AlgorithmHash Algorithm Eventually DH-GroupEventually DH-Group again? again?

Because the parameters negotiated there is for applying to the payload of the packets and not to the identity of the other gateway!

The 3 Packets in Quick Mode

The Message you will get after succesful IPSec SA Negotiation is: IKE SA: Quick Mode completion

Agenda Introductory Information on IPSec VPN Introductory Information on IPSec VPN Why Diffie-Hellman Algorithm? Why Diffie-Hellman Algorithm? IKE SA in Main Mode IKE SA in Main Mode IPSec SA in Quick Mode IPSec SA in Quick Mode Some Troubleshooting Tips Some Troubleshooting Tips

Some Troubleshooting Methods: Some Troubleshooting Methods: Mostly, you will get the right information with SmartView Tracker There, the most frequent error messages are: IKE SA: No proposal chosenIKE SA: No proposal chosen Encryption failure: No valid SAEncryption failure: No valid SA INVALID_ID_INFORMATIONINVALID_ID_INFORMATION

Some Troubleshooting Methods: Some Troubleshooting Methods: Received Notification from Peer: Malformed Payload Any solution?

One standard method for Debugging IKE/IPSec is One standard method for Debugging IKE/IPSec is vpn debug ikeon to generate the output file ike.elg.

But, without any knowledge of the theory of IPSec, is it useful to analyze the ike.elg file? But, without any knowledge of the theory of IPSec, is it useful to analyze the ike.elg file?

For more troubleshooting IKE/IPSec in a Check Point Environment, attend the next presentation: 305: Troubleshooting in the Check Point Environment – Part II By Tobias Lachmann

Any Questions?

Thanks a lot for your attention! Should you have questions: