i psecurity

41
IPSEC Crypto Group presents:

Upload: zainabnoorgul

Post on 13-Apr-2017

81 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: I psecurity

IPSECCrypto Group presents:

Page 2: I psecurity

Definition

Why IPSec?

Goals of IPSec

Introduction

Page 3: I psecurity

Definition Internet Protocol Security (IPSec) is a Protocol suite for secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of communication session.

Page 4: I psecurity

IP is not secure..!IP Protocol was designed in the late

70’s to early 80’s.

Part of DARPA Internet Project Very Small Network All hosts are known So are the users Therefore security was not an issue

Why IPsec … ?

Page 5: I psecurity

Security Issues in IP Fundamental Issue Networks are not fully Secure (and never will be) DOS Attacks, Replay Attacks and Spying etc.

IP causes Source Spoofing Replay Packets No data Integrity or Confidentiality

Why IPsec … ? (Cont..)

Page 6: I psecurity

Authentication To verify sources of IP packets

To prevent Replaying of Old Packets

To protect Integrity and/or Confidentiality of Packets Data Integrity/ Data Encryption

Goals of IPsec

Page 7: I psecurity

Wei Xu started in July 1994 the research on IP Security, enhanced the IP protocols, developed the IPSec product.

The assembly software encryption was unable to support even a T1 (1.544MBps) speed.

Wei further developed an automated device driver, known as plug-and-play.

After achieving the throughput higher than a T1s, in December 1994, he finally made the commercial product, that was released as Gauntlet firewalll

History of IPsec

Page 8: I psecurity

History (cont..)

In December 1993, Another IP Encapsulating Security Payload (ESP) was researched at the Naval Research Laboratory as DARPA project

ESP was derived from the US Department of Defense SP3D protocol.

The Security Authentication Header (AH) is derived from previous IETF standard.

In 1995, The IPsec working group in the IETF was started to create Protocols.

IETF : Internet Engineering Task Force

Page 9: I psecurity

9

Secure

Insecure

IPsec Security Model

Page 10: I psecurity

Router Router

Transport Mode

Tunnel Mode

IPsec Architecture

Page 11: I psecurity

Transport ModeTransport Mode is used between end-stations supporting IPSec or between an end-station and a gateway, if the gateway is being treated as a host

Tunnel ModeTunnel mode is used to encrypt traffic between secure IPSec gateways and it is also used to connect an end-station running IPSec Software.

Modes of IPsec

Page 12: I psecurity

Modes of IPsec (Diagram)

Page 13: I psecurity

IP header

IP header

IP header

TCP header

TCP header

TCP header

data

data

data

IPSec header

IPSec header IP header

Original

Transportmode

Tunnelmode

Modes of IPsec (Diagram cont..)

Page 14: I psecurity

PROTOCOLS

Page 15: I psecurity

IPSec is broken into multiple protocols. These are:

Authentication Header (AH) Encapsulated Security Payload (ESP)

Internet Key Exchange (IKE) IP Payload Compression

Protocols

Page 16: I psecurity

Authentication header is defined as:

Authentication Header (AH)

Page 17: I psecurity

Provides source authentication

Protects against source spoofing Provides data integrity Protects against replay attacks

Use monotonically increasing sequence numbers

Protects against denial of service attacks

NO protection for confidentiality!

Authentication Header (Cont..)

Page 18: I psecurity

The following AH packet diagram shows how an AH packet is constructed and interpreted.

Authentication Header (Cont..)

Page 19: I psecurity

User and application transparent Authentication Integrity checking Anti-replay Protects entire packet

Advantages of Authentication Header

Page 20: I psecurity

No confidentiality

Unable to use NATs or proxies

Only works with TCP/IP

Disadvantages of Authentication Header

Page 21: I psecurity

ESP is a member of the IPsec protocol suite. In IPsec it provides origin authenticity, integrity and confidentiality protection of packets.

Encapsulating Security Payload (ESP)

Page 22: I psecurity

The following ESP packet diagram show how an ESP packet is constructed and interpreted.

ESP (Cont..)

Page 23: I psecurity

Does not protect entire packet

May not work with NATs or proxies

Only works with TCP/IP

Disadvantages of ESP

Page 24: I psecurity

User and application transparent Authentication Integrity checking Confidentiality Anti-replay

Advantages of ESP

Page 25: I psecurity

Used for compression

Can be specified as part of the IPSec policy

Will not cover!

IP Payload Compression

Page 26: I psecurity

Internet Key Exchange(IKE) The internet key exchange is a

protocol to set up a security association in the IPsec protocol.

Before secured data can be exchanged, a security agreement is established between two computers. In this security agreement(SA) both peers agree on how to exchange and protect information.

Page 27: I psecurity

IKE Modes

Page 28: I psecurity

The IKE (Internet Key Exchange) ofIPsec is of two phases:

1) IKE phase 12) IKE phase 2

IPSec Phases

Page 29: I psecurity

IKE Phase 1 Diagram

Page 30: I psecurity

IKE phase 2 does the following things:

Negotiates IPsec SA parameters protected by an existing IKE SA.

Establishes Ipsec security associations.

Periodically negotiates IPsec SAs to ensure security.

IKE Phase 2

Page 31: I psecurity

IKE Phase 2 Diagram

Page 32: I psecurity

Benefits of IKE

Automatic negotiation.

Authentication.

Anti replay services.

Certification authority.

Page 33: I psecurity

Authentication

Integrity

Confidentiality

IPSec Features

Page 34: I psecurity

IPsec policy is a set of rules that governs when and how Windows uses IPsec protocol to secure the communications.

The IPsec policy interacts directly with the Ipsec driver.

IPsec consists of some basic elements which includes:

IP filter list Individual IP filters Filter actions

A brief description is as follows:

IPSec Policy

Page 35: I psecurity

IP filter list contains the IP packets on which the action was applied.

Individual IP filters tells windows that on which IP packets actions should be performed.

Filter action is to secure the IP packets.

IPSec Policy (Cont..)

Page 36: I psecurity

The IPsec policy also requires someinfo about the network which includes:

Security method to use Connection type Tunnel settings

IPSec Policy (Cont..)

Page 37: I psecurity

Security methods – which security algorithms to use for authentication and key exchanges.

Connection type – policy applied to remote access connections, LANs or all network connections.

Tunnel settings – IPsec use over a virtual private network.

IPSec Policy (Cont..)

Page 38: I psecurity

IPsec policies can be created or edited.

In windows, 3 default policies are stored which are:

Client policy Server policy Secure server policy

IPSec Policy (Cont..)

Page 39: I psecurity

IPsec policy to block PING traffic.

IPsec policy configuration through GPO.

IPSec Policy Examples

Page 40: I psecurity

References:

https://en.wikipedia.org/wiki/IPsec http://www.webopedia.com/TERM/I/IP

sec.html http://www.unixwiz.net/techtips/iguid

e-ipsec.html

Page 41: I psecurity

Thank You..!