Potential vulnerabilities of IPsec-based VPN

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents Security requirements Public key cryptography Key agreement/transport.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 IPSec—An Overview Somesh Jha Somesh Jha University of Wisconsin University of Wisconsin.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Kapitel 7: Securing Site-to-Site Connectivity
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
Internet Protocol Security (IPSec)
Chapter 7: Securing Site-to-Site Connectivity
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
Prepared by They Yu Shu Lee Ern Yu.  Motivation  Previous Work  Remaining Issues  Improvement.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
Karlstad University IP security Ge Zhang
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Chapter 8: Implementing Virtual Private Networks
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Cryptography Chapter 7 Part 3 Pages 812 to 833. Symmetric Cryptography Security Services – Only confidentiality, not authentication or non- repudiation.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Virtual Private Network(VPN) Presented By Aparna Chilukuri.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Network Configuration
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Cryptography CSS 329 Lecture 13:SSL.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Web Applications Security Cryptography 1
Reviews Rocky K. C. Chang 20 April 2007.
Virtual Private Network (VPN)
Somesh Jha University of Wisconsin
CSE 4905 IPsec II.
The Secure Sockets Layer (SSL) Protocol
Presentation transcript:

Potential vulnerabilities of IPsec-based VPN GDF In my short presentation I would like to discuss some protocols and algorithms as fundamentals of the Virtual Private Networks Pamuláné Dr. Borbély Éva

What is a VPN? VPN = Virtual Private Network Virtual =refers to a logical connection between two devices Private = confidentiality provided by the encryption Network = basic connectivity between two devices Virtual refers to a logical connection between two devices. By Private we mean the confidentiality provided by the encryption, and the network is the basic connection between two devices, actually the Internet. And a practical question: why we would ever want to use a VPN between two endpoints, or sites? We do have other options for connectivity. We could use instead of VPN dedicated WAN connections, but one of the obvious problems whit this is cost, and the another is the scalability. So nowadays instead of dedicated lines there are using VPN connections. BUT VPN’s are as secure as dedicated lines? We would see that it depends on applied technologies and protocols. https://technet.microsoft.com

Types of VPN IPsec: SSL (Secure Sockets Layer): Can be used for site-to-site VPNs and remote-access VPNs Implements security of IP packets at L3 of the OSI model SSL (Secure Sockets Layer): Implements security of TCP sessions over encrypted SSL tunnels MPLS (Multiprotocol Label Switching) Layer 3 VPNs are provided by Internet service providers There is no encryption by default We can mention here three different tipes of VPNs.

Two Main Types of VPNs Remote-access VPNs: Site-to-Site VPNs: can use IPsec or Secure Shell (SSL) technologies Site-to-Site VPNs: are based on a collection of VPN technologies called IPsec A remote-access VPN allows individual users to establish secure connections with a remote computer network. A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. Site-to-site VPN extends the company's network, making computer resources from one location available to employees at other locations.

IPsec A collection of protocols and algorithms used for protect IP packets It is used for both remote- access VPN and site-to-site VPN For an IPsec VPN tunnel first of all we need to choose an IPsec protocol: AH or ESP. If we are familiar with mentioned protocols we must to avoid AH. For sensitive data the ESP protocol is acceptable because the data encryption is not involved in AH protocol.

IPsec Goals and the Methods METHODES Confidentiality Encryption Data integrity Hashing Peer authentication Pre-shared keys, RSA digital signatures Antireplay Applying serial numbers to packets Confidentiality means that only the intended parties can understand the data that is sent. Any party that eavesdrops may see the packets, but the contents of the packet are scrambled and meaningless to anyone who cannot unlock or decrypt the data. The major goal of a VPN is confidentiality, and it is accomplished by the sender encrypting the data. Data integrity: it means that the data that is being sent over VPN is accurate from and to and. A hash function is any function that can be used to map data of arbitrary size to data of fixed size. Hash functions are also called one-way functions because it is easy to determine the hash from the message but mathematically infeasible to determine the message from the hash. When a single bit is changed the hash sum becomes completely different. Authentication is important, because we don’t want to establish a VPN connection directly to the attacker’s computer. We can accomplish this by using pre-shared keys or RSA digital signatures. Antireplay protection means that once a VPN packet has been sent, that exact same VPN packet is not valid the second time in the VPN session.

Confidentiality Alternatives: Symmetrical algorithms: fast and low CPU cost AVOID DES Acceptable: AES- 256 Alternatives: RSA - asymmetric algorithm moore secure, but there is a very high CPU cost when using key pairs to lock and unlock data We can us symmetric and asymmetric encryption algorithms. In practice configuring a VPN capable device we can choose from the encryption algorithms mentioned here: DES, 3DES and AES. From security perspectives the only acceptable algorithm is AES with a key-length of two hundred fifty-six bits. There are more secure alternatives, like RSA asymmetric algorithm but it requires a very high CPU cost to encrypt and decrypt data using key pairs.

Integrity Alternatives: Acceptable: SHA-256 Wild-spread algorithms: MD5, SHA AVOID MD5 Alternatives: HMAC: Hashed Message Authentication Code: hash function + secret key HMAC-SHA-256 For integrity we can use different hashing algorithms MD5 or SHA with different key lenghts.

PSK = a password! Out of data! Not Secure! Authentication Pre-Shared Key RSA signatures RSA PSK PSK = a password! Out of data! Not Secure! RSA algorithms for encryption and digital signatures are efficient at higher security levels with a 3072- bit modulus Smaller RSA key sizes, such as 768 or 1024, should be avoided! RSA signature are secure with a key length of three thousands and seventy-two bit modulus.

Deffie – Hellman algorithm allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.(ex.: AES) DH exchange is asymmetrical, but the resulting keys are symmetrical Acceptable key size: 2048, 3072 If we are using the same key for encryption and decryption as well, a big question is how can we share our keys with partners securely? Actually we don’t share our secret keys over the Internet, we just share some segment of information some parts of the secret key. This picture is a simple scheme which allows us to understand this procedure. We have a common color end each parties chose a secret color and mix them. After that they will exchange their mixture. In the next step they mix again the received color with their secret one, and the result will be a common secret key.

Minimum Cryptography Recommendations Encryption AES-128-CBC mode Authentication RSA-3072, DSA-3072 Integrity SHA-256 Key exchange DH Group 15 (3072-bit) It is very good, that we have minimum cryptography recommendations, but who is going to pay the bill? In practice the small and medium sized companies have no enough computational capacity to ensure the recommended key lengths. Than what is the solution for the future?

One possible solution In practice RSA and DH are becoming less efficient every year. There are subexponential attacks that can be used against these algorithms. DH, DSA, and RSA can be used with a 3072-bit modulus to protect sensitive information. (High memory and CPU cost!) A newer alternative to public key cryptography is Elliptic Curve Cryptography (ECC), which operates on elliptic curves over finite fields. The main advantage of elliptic curves is their efficiency.

RSA vs ECC Comparison www.nsa.gov/business/programs/elliptic_curve.shtml.2009 We can see, that key lengths generally increase over time as the computation available to attackers continues to increase. For example if you use elliptic curves for the key management (i.e. the encryption/decryption session key) of an AES-256 session, then a 512-bit elliptic curve session key would be required. To achieve the same level of security with RSA encryption, 15,360 bit keys are required. This stark contrast between ECC and RSA indicates that ECC is the algorithm of the future.