Top Banner
Internet Security Internet Security CSCE 813 CSCE 813 IP IP s s ec ec
33

Internet Security CSCE 813 IP s ec

Jan 14, 2016

Download

Documents

Brandi

Internet Security CSCE 813 IP s ec. TCP/IP Protocol Stack. Application Layer. Transport Layer. Network Layer. Data Link Layer. Network Layer. Provides connectionless service Routing (routers): determine the path a path has to traverse to reach its destination - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Internet Security  CSCE 813 IP s ec

Internet Security Internet Security CSCE 813CSCE 813

IPIPssecec

Page 2: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 2

TCP/IP Protocol StackTCP/IP Protocol Stack

Application Layer

Transport Layer

Network Layer

Data Link Layer

Page 3: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 3

Network LayerNetwork Layer

Provides connectionless serviceRouting (routers): determine the path a path

has to traverse to reach its destinationDefines addressing mechanism

– Hosts should conform to the addressing mechanism

Page 4: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 4

Communication Between Communication Between LayersLayers

Transport layer

Network layer

Data Link layer

Network layer

Data Link layer

Network layer

Data Link layer Data Link layer

Network layer

Transport layer

Application layerApplication layerApplication Data

Transport payload

NetworkPayload

Data LinkPayload

Host A Router Router Host B

Page 5: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 5

Network Layer and SecurityNetwork Layer and SecurityIn most network architecture and corresponding communication protocol stack: network layer protocol data units are transmitted in the clear:

Easy to inspect the data content Easy to forge source or destination address Easy to modify content Easy to replay data

Need network layer security protocol

Page 6: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 6

Network Layer ProtocolsNetwork Layer Protocols

Several protocols have been proposed: Security Protocol 3 (SP3): U.S. NSA and NIST as part of

the secure data network system (SDNS)

Network Layer Security Protocol (NLSP): ISO for Connectionless Network Protocol (CLNP)

Integrated NLSP (I-NLSP): NIST, for both IP and CLNP

swIPe: John Ioannidis and Matt Blaze at Berkley Univ. Used in Unix environment

Page 7: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 7

Internet Engineering Task Internet Engineering Task Force StandardizationForce Standardization

IPv6 development requirements: Strong security features– Security features algorithm-independent– Must enforce wide variety of security policies– Avoid adverse impact on Internet users who do not need security

1992: IPSEC WG (IETF)– Define security architecture – Standardize IP Security Protocol and Internet Key Management

Protocol 1998: revised version of IP Security Architecture

– IPsec protocols (two sub-protocols AH and ESP)– Internet Key Exchange (IKE)

Page 8: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 8

IPsecIPsec

Provides security for IP and upper layer protocols

Suit of algorithms: – Mandatory-to-implement– Assures interoperability– Easy to add new algorithms

Page 9: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 9

IP Security OverviewIP Security Overview

IPSec: method of protecting IP datagrams– Data origin authentication– Connectionless data integrity authentication– Data content confidentiality– Anti-replay protection– Limited traffic flow confidentiality

Page 10: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 10

IP Security ArchitectureIP Security ArchitectureIPsec module 1 IPsec module 2

SPD

SADSAD

SPD

IKE IKE

IPsec IPsecSA

Page 11: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 11

Security AssociationSecurity Association

Associates security services and keys with the traffic to be protected– Identified by Security Parameter Index (SPI)

retrieve correct SA parameters from Security Association Database (SAD)

– Ipsec protocol identifier– Destination address (direction)

Simplex connection need to establish two SAs for secure bidirectional communication

Page 12: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 12

Security AssociationSecurity Association Defines security services and mechanisms between

two end points (or IPsec modules):– Hosts– Network security gateways (e.g., routers, application

gateways)– Hosts and security gateways

Security service, parameters, mode of operation, and initialization vector– e.g., Confidentiality using ESP with DES in CBC mode with

IV initialization vector

Page 13: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 13

Security AssociationSecurity Association

May use either Authentication Header (AH) or Encapsulating Security Payload (ESP) but not both if both AH and ESP are applied, need two SAs

Bundle: set of SAs through which traffic must be processed

Page 14: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 14

SA -- LifetimeSA -- Lifetime

Amount of traffic protected by a key and time frame the same key is used– Manual creation: no lifetime– Dynamic creation: may have a lifetime

Page 15: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 15

SA -- Security GranularitySA -- Security Granularity

User (SSO) specified Host-oriented keying

– All users on one host share the same session key– Not recommended!

User-oriented keying– Each user on one host have one or of more unique

session keys Session-unique keying

– Single session key is assigned to a give IP address, upper-layer protocol, and port number

Page 16: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 16

Security Policy Database (SPD)Security Policy Database (SPD)

Defines:– What traffic to be protected– How to protect– With whom the protection is shared

For each packet entering or leaving an IPsec implementation SPD is used to determine security mechanism to be applied

Actions: – Discard: do not let packet in or out– Bypass: do not apply or expect security services– Protect: apply/expect security services on packets

Page 17: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 17

Anti-replay ProtectionAnti-replay Protection Not explicitly part of the architecture Protection by sequence number (32-bits) and sliding

receive window (64-bits) When SA is created: sequence number is initiated to zero Prior to IPsec output processing: sequence number is

incremented

Packet stream

Sliding window of received packets

0 00 11111 111111 111

N N+5 N+7New packet

Page 18: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 18

IPSecIPSec Protection for IP and upper layer protocols IPSec protocols

– Encapsulating Security Payload (ESP) Proof of data origin, data integrity, anti-replay protection Data confidentiality and limited traffic flow

confidentiality

– Authentication Header (AH) Proof of data origin, data integrity, anti-replay protection

Page 19: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 19

IPsecIPsec

Security provided by ESP or AH is dependent on the cryptographic algorithms applied to them

Default encryption algorithm: DES CBC– Not suited for highly sensitive data or– For data that must remain secure for extended period of

time Authentication and/or confidentiality requires shared keys Manual key addition is supported but scales poorly Internet Key Exchange (IKE): key management protocol

Page 20: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 20

AH and ESPAH and ESP

Transport mode: protect upper layer protocols– IPSec header is inserted between the IP header and the

upper-layer protocol header– Communication endpoints must be cryptographic

endpoints

IP IPsec Payload

protected

Page 21: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 21

AH and ESPAH and ESP

Tunnel mode: protect entire IP datagram– Entire IP packet to be protected is encapsulated in

another IP datagram and an IPsec header is inserted between the outer and inner IP headers

PayloadIPIPsecIP

protected

Original IP header

New IP header

Page 22: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 22

Authentication Header (AH)Authentication Header (AH)

Does NOT provide confidentiality Provides:

– Data origin authentication– Connectionless data integrity

May provide:– Non-repudiation (depends on cryptographic alg.)– Anti-replay protection

Precision of authentication: granularity of SA Protocol number: 51

Page 23: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 23

AH Protected IP packetAH Protected IP packet

Protected dataAH headerIP header

authenticated

Page 24: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 24

AH HeaderAH Header

32 bit

Authentication data (n*32 bit)

Sequence number

Security Parameter IndexNext header Payload length Reserved

Page 25: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 25

Authentication DataAuthentication Data

Computed by using – authentication algorithm (MD5, SHA-1)– cryptographic key (secret key)

Sender: computes authentication dataRecipient: verifies data

Page 26: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 26

Encapsulating Security Encapsulating Security Payload (ESP)Payload (ESP)

Provides:– Confidentiality– Authentication (not as strong as AH: IP headers

below ESP are not protected)– Limited traffic flow confidentiality– Anti-replay protection

Protocol number: 50

Page 27: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 27

ESP Protected IP packetESP Protected IP packet

ESP TrailerProtected data

ESP headerIP header

authenticated

encrypted

Page 28: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 28

ESP header and trailerESP header and trailer

ESP packet processing:1. Verify sequence number

2. Verify integrity

3. Decrypt

ESP header: not encrypted– Contains: SPI and sequence number

ESP trailer: partially encrypted– Contains: padding, length of padding, next protocol,

authentication data

Page 29: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 29

ESP FormatESP Format

Authentication data (n*32 bit)

Sequence number

Security Parameter Index

paddingNext headerPad lengthpadding

Payload data

Confidentialityprotected

Authen-ticityprotected

Page 30: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 30

ESP ESP

SA has multiple algorithms defined:– Cipher: for confidentiality– Authenticator: for authenticity– Each ESP has at most:

one cipher and one authenticator or one cipher and zero authenticator or zero cipher and one authenticator or Disallowed: zero cipher and zero authenticator or

Page 31: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 31

EncryptionEncryption

Block ciphers in Cipher Block Chain (CBC) mode

Need – Padding at the end of data– Initialization vector (IV) – contained in the

packet

Page 32: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 32

Encryption and CompressionEncryption and Compression

Interdependence between encryption and compression– When encryption is applied at Internet layer

prevents effective compression by lower protocol layers

– IPsec: does not provide data compression

Page 33: Internet Security  CSCE 813 IP s ec

CSCE813 - Farkas 33

Key Management ProtocolsKey Management Protocols

IP security architecture supports manual and automated SA and key agreement

Key management protocol: e.g., IKEProposals for automated key management

protocol