1 ip security behzad akbari fall 2009 in the name of the most high
TRANSCRIPT
![Page 1: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/1.jpg)
1
IP Security
Behzad AkbariFall 2009
In the Name of the Most High
![Page 2: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/2.jpg)
Outline
Need for Internet Security Internetworking and Internet Protocols
(Appendix 6A) IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations of Security Associations Key Management
![Page 3: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/3.jpg)
Need for Internet Security
Based on public-domain standards Potential intruders know how things work
The Internet is ever-increasingly pervasive No need for specialist tools to get access
Applications (e.g. web servers and browsers) are extensible Now used for much more than protocol designers
envisaged originally TCP/IP weaknesses
e.g. easy to masquerade as someone else
![Page 4: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/4.jpg)
Why secure at the IP layer?
Can put security in place once, in a consistent manner, for multiple applications
All applications are secured, without the need for the user to be involved
Central management of security, including access policy, keys, algorithms, etc.
![Page 5: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/5.jpg)
Secured IP
Diverse Apps
WebEmail GameDB
queriesFTPSNMP IM
TCP UDP Other Transport
Independent of Applications and Transport
![Page 6: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/6.jpg)
Internet Protocols
Internet Protocol (IP)provides functionality for interconnecting end systems across multiple networks.
IPv4 and IPv6 Routers provide connections between
networks Data is encapsulated in an IP Protocol Data
Unit (PDU) for transmission
![Page 7: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/7.jpg)
Uses of IPsec Virtual Private Network (VPN) establishment
For connecting remote offices and users using public Internet
Low-cost remote access e.g. teleworker gains secure access to company
network via local call to ISP Extranet connectivity
Secure communication with partners, suppliers, etc.
![Page 8: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/8.jpg)
OSI 7 Layer Model 7 Application
HTTP, SMTP, SNMP, FTP, Telnet, SIP, SSH, NFS,, Whois,
6 Presentation XDR, ASN.1, SMB, AFP, NCP
5 Session ASAP, TLS, SSH,RPC, NetBIOS, ASP, Winsock, BSD sockets
4 Transport TCP, UDP, RTP, SCTP, SPX, ATP,
3 Network IP, ICMP, IPX, BGP, OSPF, RIP, ARP, X.25
2 Data Link Ethernet, Token ring, HDLC, Frame relay, ISDN, ATM, 802.11 WiFi, FDDI, PPP
1Physical wire, radio, fiber optic
![Page 9: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/9.jpg)
5 Layer Internet Protocol Model
1 .Physical
2 .Network Interface)like Data Link(
3 .Internet
4 .Transport
5 .Application
Logical Link Control (LLC)
Media Access Control (MAC)
IP
TCP, UDP
![Page 10: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/10.jpg)
TCP/IP Example
![Page 11: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/11.jpg)
IP Security Overview
Application–specific security mechanisms E-mail (S/MIME, PGP) Client-server (Kerberos) Web Access ( Secure sockets)
IP level security (IPSec) Authentication (received unaltered from source in header) Confidentiality (encrypted to prevent eavesdropping) Key Management (secure exchange of keys)
![Page 12: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/12.jpg)
IP Security Overview
IPSec is not a single protocol. Instead, IPSec provides a set of security algorithms plus a general framework that allows a pair of communicating entities to use whichever algorithms provide security appropriate for the communication.
![Page 13: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/13.jpg)
IP Security Overview
Applications of IPSec Secure branch office connectivity over the Internet Secure remote access over the Internet Establishing extranet and intranet connectivity
with partners Enhancing electronic commerce security
![Page 14: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/14.jpg)
IP Security Scenario
![Page 15: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/15.jpg)
IP Security Overview
Benefits of IPSec Transparent to applications (below transport layer
(TCP, UDP) Provide security for individual users
IPSec can assure that: A router or neighbor advertisement comes from an
authorized router A redirect message comes from the router to which
the initial packet was sent A routing update is not forged
![Page 16: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/16.jpg)
IP Security Architecture
IPSec documents: RFC 2401: An overview of security architecture RFC 2402: Description of a packet encryption
extension to IPv4 and IPv6 RFC 2406: Description of a packet emcryption
extension to IPv4 and IPv6 RFC 2408: Specification of key managament
capabilities
![Page 17: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/17.jpg)
IPsec Architecture
Two alternative protocols: Authentication Header (AH)
Provides authentication but not confidentiality Adds extra field to traditional IP packet; used to verify
authenticity of the packet
Encapsulating Security Payload (ESP) Provides packet encryption and, optionally, authentication Content of IP packet is encrypted and encapsulated between
header and trailer fields
![Page 18: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/18.jpg)
IPSec Document Overview
![Page 19: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/19.jpg)
IPSec Services
IPSec provides security services at the IP layer by enabling a system to select required protocols, determine the algorithm(s) to use, and to put in place the cryptographic keys.
Two protocols are needed: Authentication Header (AH) Encapsulating Security Payload (ESP)
![Page 20: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/20.jpg)
IPSec Services
Access Control Connectionless integrity Data origin authentication Rejection of replayed packets Confidentiality (encryption) Limited traffic flow confidentiallity
![Page 21: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/21.jpg)
Security Association (SA)
In order to communicate, each pair of hosts must set up SA with each other
Acts as virtual connection for which various parameters are set: Type of protection Algorithms Keys …
Specifies one-way relationship For either AH or ESP, but not both
![Page 22: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/22.jpg)
Security Associations (SA)
A one way relationship between a sender and a receiver.
Identified by three parameters: Security Parameter Index (SPI) IP Destination address Security Protocol Identifier
![Page 23: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/23.jpg)
Security Association (SA) Each SA uniquely identified by:
Security Parameters Index (SPI) 32-bit string assigned to this SA (local meaning only)
IP destination address of packets May be end user system, or firewall or router
Choice of AH or ESP For each IP packet, governing SA is identified by:
Destination IP address in packet header SPI in extension header (AH or ESP)
![Page 24: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/24.jpg)
Before applying AH
![Page 25: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/25.jpg)
IPsec modes
Transport Mode: Protects payload only
i.e. protects original data and upper-level protocols
Typically used for end-to-end communication
![Page 26: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/26.jpg)
Transport Mode Security
![Page 27: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/27.jpg)
Transport Mode (AH Authentication)
![Page 28: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/28.jpg)
IPsec modes
Tunnel Mode: Protects entire IP packet
Including the IP header Typically used for connecting secure
gateways (firewalls or routers that implement IPsec)
Hosts don’t need to be IPsec-enabled
![Page 29: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/29.jpg)
Tunnel Mode Security
![Page 30: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/30.jpg)
Tunnel Mode (AH Authentication)
![Page 31: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/31.jpg)
• Adds extra field to traditional IP packet• This is used to verify authenticity &
integrity of the packet
Before applying AH:
Transport Mode:data is authenticated, as
well as parts of IP header
Tunnel Mode:entire original packet
is authenticated + parts of new header
Authenticated (Data + orig IP header + parts of new header)
Authentication Header (AH)
Authenticated (Data + parts of IP header)
![Page 32: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/32.jpg)
Authentication Header Provides support for data integrity and authentication
(MAC code) of IP packets. Guards against replay attacks. Parties share a secret key, K
![Page 33: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/33.jpg)
Authentication Header (AH)
Protection against replay attack with use of sequence number
Why have an Authentication-only protocol (AH)? May be used where export/import/use of encryption is
restricted Faster implementation Receiver can choose whether to expend the effort to
verify authenticity/integrity
![Page 34: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/34.jpg)
Encapsulating Security Payload (ESP) Content of IP packet is encrypted and
encapsulated between header and trailer fields.
Authentication data optionally added
![Page 35: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/35.jpg)
Original IP packet:
Transport Mode:only data is encrypted &
authenticated
Tunnel Mode:entire packet encrypted &
authenticated
Authenticated
(optionally)
Encrypted
Authenticated
(optionally)
Encrypted
Encapsulating Security Payload (ESP)
![Page 36: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/36.jpg)
ESP Format
![Page 37: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/37.jpg)
Encrypts inner IP packet. Authenticates inner IP packet.
Encrypts IP payload and any IPv6 extesion header. Authenticates IP payload but no IP header
ESP with authentication
Encrypts inner IP packet
Encrypts IP payload and any IPv6 extesion header
ESP
Authenticates entire inner IP packet plus selected portions of outer IP header
Authenticates IP payload and selected portions of IP header and IPv6 extension headers
AH
Tunnel Mode SA
Transport Mode SA
Main difference is that Tunnel mode secures the IP header as well as the payload
![Page 38: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/38.jpg)
End-to-end versus End-to-Intermediate Authentication
![Page 39: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/39.jpg)
Encapsulating Security Payload ESP provides confidentiality services
![Page 40: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/40.jpg)
Encryption and Authentication Algorithms Encryption:
Three-key triple DES RC5 IDEA Three-key triple IDEA CAST Blowfish
Authentication: HMAC-MD5-96 HMAC-SHA-1-96
![Page 41: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/41.jpg)
ESP Encryption and Authentication
![Page 42: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/42.jpg)
ESP Encryption and Authentication
![Page 43: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/43.jpg)
Combinations of Security Associations
![Page 44: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/44.jpg)
Combinations of Security Associations
![Page 45: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/45.jpg)
Combinations of Security Associations
![Page 46: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/46.jpg)
Combinations of Security Associations
![Page 47: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/47.jpg)
Key Management
Two types: Manual Automated
Oakley Key Determination Protocol( a refinement of the Difffie-HellProject Objectives and Plans man exchange algorithm)
Internet Security Association and Key Management Protocol (ISAKMP)
![Page 48: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/48.jpg)
Key Management in IPsec
Generation and distribution of secret keys Manual
System admin configures keys (doesn’t scale well) Automated
Oakley Key Determination Protocol based on Diffie-Hellman
ISAKMP & IKE – Internet Security Association and Key Management Protocol & Internet Key Exchange
Default is referred to as ISAKMP/Oakley
![Page 49: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/49.jpg)
Oakley
Key determination protocol, based on Diffie-Hellman algorithm with added security
Secret keys are created only when needed Key exchange requires no pre-exisitng structure, only an
agreement on global parameters Three authentication methods:
Digital signatures Public-key encryption Symmetric-key encryption
![Page 50: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/50.jpg)
Oakley Algorithm
Characteristics: uses a method known as cookies to thwart clogging
attacks (See next slide) enables two parties to negotiate a group uses nonces to ensure against replay attacks enables the exchange of Diffie-Hellman public key
values authenticates Diffie-Hellman exchange to thwart
“man-in-the-middle” attack
![Page 51: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/51.jpg)
Clogging Attacks
An opponent forges the source address of a legitimate user and send a public key to the victim.
The victim computes the secret key. Repeated messages can clog the victim’s system with
useless work. Cookie exchange requires that each side send a
pseudorandom number (cookie) in the initial message, which the other side acknowledges and repeats in the first message of the Diffie-Hellman key exchange.
If the source address was forged, the opponent gets no answer.
![Page 52: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/52.jpg)
ISAKMP Internet Security Association and Key
Management Protocol (ISAKMP) provides framework for key management and specific
protocol supports defines procedures and packet formats to establish,
modify and delete security associations. Provides consistent independent of the key exchange
protocol, encryption algorithm and authentication mechanism
![Page 53: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/53.jpg)
ISAKMP
![Page 54: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/54.jpg)
IPsec Benefits Provides a level of security for all applications.
Allows deployment of new/emerging applications that may not have their own security.
Transparent to transport layer Transparent to end-users
No need for training, key issue, key revocation, etc. Can be provided to individual users where needed (e.g. off-
site workers) Extensible to new, stronger, cryptographic methods as these
become available
![Page 55: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/55.jpg)
IPsec Drawbacks
Processing performance overhead Protection is applied to all traffic, though only a small
portion may be security-sensitive Blocks access to non-IPsec hosts Hosts must have security association
Not great for short-lived connections Requirement for pair-wise SA limits usefulness for
arbitrary Internet-based transactions Not practical for broadcast
![Page 56: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/56.jpg)
Note on VPN concept
Private Network A set of computers connected together and
protected from the Internet (usually with a firewall)
Traditionally made up of LAN(s) within individual locations. If needed, wide area (e.g. inter-branch) connection is made by secure leased telecommunications lines.
![Page 57: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/57.jpg)
Virtual Private Networks
(a) A leased-line private network. )b( A virtual private network.
![Page 58: 1 IP Security Behzad Akbari Fall 2009 In the Name of the Most High](https://reader030.vdocuments.net/reader030/viewer/2022033103/56649e195503460f94b06b94/html5/thumbnails/58.jpg)
Recommended Reading
Comer, D. Internetworking with TCP/IP, Volume I: Principles, Protocols and Architecture. Prentic Hall, 1995
Stevens, W. TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994