Top Banner
1 Chapter 6 Chapter 6 IP Security
31

1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

Dec 13, 2015

Download

Documents

Elmer Singleton
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

1

Chapter 6Chapter 6

IP Security

Page 2: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

2

OutlineOutline

• Internetworking and Internet Protocols (Appendix 6A)

• IP Security Overview• IP Security Architecture• Authentication Header• Encapsulating Security Payload• Combinations of Security Associations• Key Management

Page 3: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

3

TCP/IP ExampleTCP/IP Example

Page 4: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

4

IPv4 HeaderIPv4 Header

Page 5: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

5

IPv6 HeaderIPv6 Header

Page 6: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

6

IP Security OverviewIP Security Overview

IPSec is not a single protocol. Instead, IPSec provides a set of security algorithms plus a general framework that allows a pair of communicating entities to use whichever algorithms provide security appropriate for the communication.

Page 7: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

7

IP Security OverviewIP Security Overview

• Applications of IPSec– Secure branch office connectivity over

the Internet– Secure remote access over the

Internet– Establsihing extranet and intranet

connectivity with partners– Enhancing electronic commerce

security

Page 8: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

8

IP Security ScenarioIP Security Scenario

Page 9: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

9

IP Security OverviewIP Security Overview

• Benefits of IPSec– Transparent to applications (below transport

layer (TCP, UDP)– Provide security for individual users

• IPSec can assure that:– A router or neighbor advertisement comes

from an authorized router– A redirect message comes from the router

to which the initial packet was sent– A routing update is not forged

Page 10: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

10

IP Security ArchitectureIP Security Architecture

• IPSec documents:– RFC 2401: An overview of security

architecture– RFC 2402: Description of a packet

encryption extension to IPv4 and IPv6– RFC 2406: Description of a packet

emcryption extension to IPv4 and IPv6– RFC 2408: Specification of key

managament capabilities

Page 11: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

11

IPSec Document IPSec Document OverviewOverview

Page 12: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

12

IPSec ServicesIPSec Services

• Access Control• Connectionless integrity• Data origin authentication• Rejection of replayed packets• Confidentiality (encryption)• Limited traffic flow confidentiallity

Page 13: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

13

Security Associations Security Associations (SA)(SA)

• A one way relationsship between a sender and a receiver.

• Identified by three parameters:– Security Parameter Index (SPI)– IP Destination address– Security Protocol Identifier

Page 14: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

14

Transport Mode SA

Tunnel Mode SA

AH Authenticates IP payload and selected portions of IP header and IPv6 extension headers

Authenticates entire inner IP packet plus selected portions of outer IP header

ESP Encrypts IP payload and any IPv6 extesion header

Encrypts inner IP packet

ESP with authentication

Encrypts IP payload and any IPv6 extesion header. Authenticates IP payload but no IP header

Encrypts inner IP packet. Authenticates inner IP packet.

Page 15: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

15

Before applying AHBefore applying AH

Page 16: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

16

Transport Mode (AH Transport Mode (AH Authentication)Authentication)

Page 17: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

17

Tunnel Mode (AH Tunnel Mode (AH Authentication)Authentication)

Page 18: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

18

Authentication HeaderAuthentication Header

• Provides support for data integrity and authentication (MAC code) of IP packets.

• Guards against replay attacks.

Page 19: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

19

End-to-end versus End-End-to-end versus End-to-Intermediate to-Intermediate AuthenticationAuthentication

Page 20: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

20

Encapsulating Security Encapsulating Security PayloadPayload

• ESP provides confidentiality services

Page 21: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

21

Encryption and Encryption and Authentication Authentication

AlgorithmsAlgorithms• Encryption:

– Three-key triple DES– RC5– IDEA– Three-key triple IDEA– CAST– Blowfish

• Authentication:– HMAC-MD5-96– HMAC-SHA-1-96

Page 22: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

22

ESP Encryption and ESP Encryption and AuthenticationAuthentication

Page 23: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

23

ESP Encryption and ESP Encryption and AuthenticationAuthentication

Page 24: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

24

Combinations of Combinations of Security AssociationsSecurity Associations

Page 25: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

25

Combinations of Combinations of Security AssociationsSecurity Associations

Page 26: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

26

Combinations of Combinations of Security AssociationsSecurity Associations

Page 27: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

27

Combinations of Combinations of Security AssociationsSecurity Associations

Page 28: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

28

Key ManagementKey Management

• Two types:– Manual– Automated

• Oakley Key Determination Protocol• Internet Security Association and Key

Management Protocol (ISAKMP)

Page 29: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

29

OakleyOakley

• Three authentication methods:– Digital signatures– Public-key encryption– Symmetric-key encryption

Page 30: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

30

ISAKMPISAKMP

Page 31: 1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.

31

Recommended ReadingRecommended Reading

• Comer, D. Internetworking with TCP/IP, Volume I: Principles, Protocols and Architecture. Prentic Hall, 1995

• Stevens, W. TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994