IPSec Access control Connectionless integrity Data origin authentication

  • Slides: 27
Download presentation
IPSec • Access control • Connectionless integrity • Data origin authentication • Rejection of

IPSec • Access control • Connectionless integrity • Data origin authentication • Rejection of replayed packets • Confidentiality Sheng-Liang Song ssl@cisco. com

IPSec • Complexity • Security worst “enemy” • “best practice” Sheng-Liang Song ssl@cisco. com

IPSec • Complexity • Security worst “enemy” • “best practice” Sheng-Liang Song ssl@cisco. com

Agenda n IPSec Overview n IPSec (Network Layer) n Modes (Tunnel/Transport) n Protocols (ESP/AH)

Agenda n IPSec Overview n IPSec (Network Layer) n Modes (Tunnel/Transport) n Protocols (ESP/AH) n IKE (Internet Key Exchange) n IPSec Cases n IPSec Discussion n Q&A

Key Words n ISAKMP (Internet Security Association n and Key Management Protocol) n SA

Key Words n ISAKMP (Internet Security Association n and Key Management Protocol) n SA (Security Associations) n SPD (Security Policy Database) n IKE (Internet Key Exchange) n AH (Authentication Header) n ESP (Encapsulating Security Payload) n HMAC (Keyed-Hashing for Message Authentication) n H(K XOR opad_5 C, H(K XOR ipad_36, text))

IPSec (Network Layer) n lives at the network layer n transparent to applications SSL

IPSec (Network Layer) n lives at the network layer n transparent to applications SSL IPSec application User transport OS network link physical NIC

IPv 4 Header Format Mutable, predictable, Immutable

IPv 4 Header Format Mutable, predictable, Immutable

IPv 6 Header Format

IPv 6 Header Format

IPSec Modes (Tunnel and Transport) n Transport Mode n Tunnel Mode n Transport Mode

IPSec Modes (Tunnel and Transport) n Transport Mode n Tunnel Mode n Transport Mode IP header data IP header ESP/AH data n Tunnel Mode IP header data new IP hdr ESP/AH IP header data

IPSec Protocols (ESP and AH) n ESP (Encapsulating Security Payload) n Integrity and confidentiality

IPSec Protocols (ESP and AH) n ESP (Encapsulating Security Payload) n Integrity and confidentiality (HMAC/DES-CBC) Integrity only by using NULL encryption n n AH (Authentication Header) n Integrity only Original IP Layer IP HDR Data IPSec Authenticated session IP HDR AH HDR Data IPSec Encrypted session IP HDR ESP HDR Data Original IP Layer IP HDR Data encrypted Original IP Layer IP HDR Data IPSec Tunnel Data New IP HDR ESP HDR IP HDR encrypted Original IP Layer IP HDR Data

AH Format The sender's counter is initialized to 0 when an SA is established.

AH Format The sender's counter is initialized to 0 when an SA is established.

AH/Transport

AH/Transport

AH/Transport

AH/Transport

ESP Format The sender's counter is initialized to 0 when an SA is established.

ESP Format The sender's counter is initialized to 0 when an SA is established.

ESP/Transport

ESP/Transport

ESP/Tunnel

ESP/Tunnel

IPSec Tunnels TOS IP header Set TOS IP Payload Original IP Packet TOS IP

IPSec Tunnels TOS IP header Set TOS IP Payload Original IP Packet TOS IP header IP Payload Classified IP packet TOS copy TOS IP new hdr New IP header built by tunnel entry point TOS byte is copied ESP header IPSec packet IP IP Payload

Anti-Replay in IPSec n Both ESP and AH have an anti-reply mechanism based on

Anti-Replay in IPSec n Both ESP and AH have an anti-reply mechanism based on sequence numbers n sender increment the sequence number after each transmission n receiver optionally checks the sequence number and rejects if it is out of window n

How IPSec uses IKE

How IPSec uses IKE

IPSec and IKE in Practice Internal Network Certificate Authority Digital Certificate on i s

IPSec and IKE in Practice Internal Network Certificate Authority Digital Certificate on i s D ig ita l. C er tif ic at e s Se P SA M n Sets up a keying channel n Sets up data channels K A IS Internal Network Authenticated Encrypted Tunnel Clear Text Encrypted ISAKMP (Internet Security Association and Key Management Protocol) SA (Security Associations) SPD (Security Policy Database) Discard, bypass IPsec, apply IPSec (Overhead)

IPSec (IKE 1 Phase 1) n Authenticated with Signatures n Authenticated with Shared key

IPSec (IKE 1 Phase 1) n Authenticated with Signatures n Authenticated with Shared key n Authenticated with Public Key Encryption (Revised)

IPSec (Cases)

IPSec (Cases)

IPSec Case 1

IPSec Case 1

IPSec Case 2

IPSec Case 2

IPSec Case 3

IPSec Case 3

IPSec Case 4

IPSec Case 4

IPSec Discussion 1. IPSec authenticates machines, not users 2. Does not stop denial of

IPSec Discussion 1. IPSec authenticates machines, not users 2. Does not stop denial of service attacks 1. Easier to do Do. S 3. Order of operations: Encryption/Authentication 4. Q & A

Reference n n n Information Security: Principles and Practice, Mark Stamp, Jan 29, 2005

Reference n n n Information Security: Principles and Practice, Mark Stamp, Jan 29, 2005 http: //www. ietf. org/ Cisco IOS IPsec www. cisco. com/go/ipsec/ Cisco White Paper, IPsec, http: //www. cisco. com/warp/public/cc/so/neso/sqso/e qso/ipsec_wp. htm N. Ferguson and B. Schneier, A Cryptographic Evaluation of IPsec, http: //www. schneier. com/paperipsec. html IPsec, Security for the Internet Protocol, http: //www. freeswan. org/freeswan_trees/freeswan 2. 06/doc/intro. html