YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Slide title

In CAPITALS

50 pt

Slide subtitle

32 pt

Manoranjan Mohanty

IPSEC

COMPSCI 316 (Cyber Security)

Source of some slides: University of Tennessee /

Cryptography and Network Security by Behrouz Forouzan

Page 2: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

2

MAC ADDRESS TO IPv6 CONVERSION

Page 3: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

3

MAC ADDRESS TO IPv6 CONVERSION

Page 4: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

4

MAC ADDRESS TO IPv6 CONVERSION

Page 5: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

5

MAC ADDRESS TO IPv6 CONVERSION

Page 6: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

6

MAC ADDRESS TO IPv6 CONVERSION

FE80::3BA7:94FF: FE07:CBD0

Page 7: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

7

IPSEC

Relative location of security facilities in the

TCP/IP protocol stack.

Page 8: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

8

IPSEC: NETWORK SECURITY LAYER

IPSec is a framework of open standards developed by

the Internet Engineering Task Force (IETF)

IPsec aims at securing communications over IP

– Both IPv4 and IPv6

Creates secure, authenticated, reliable

communications over IP networks

It is designed to address fundamental shortcomings,

such as being subject to spoofing and eavesdropping

Page 9: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

9

IPSEC ADVANTAGES

Provides seamless security to application and

transport layers

– Transparent to applications, no change required

in any upper layer

– Transparent to end users, no need to train users

on security mechanisms

Page 10: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

10

IPSEC APPLICATIONS

Site-to-site (vpn)

– An organisation with multiple sub-offices

netw

ork

secur

ity

esse

ntials

4th

editio

n

Page 11: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

11

IPSEC APPLICATIONS

Host-to-site (vpn)

– Travelling employees, Contractors

netw

ork

secur

ity

esse

ntials

4th

editio

n

Page 12: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

12

IPSEC SECURITY SERVICES

Data origin authentication

– Assurance that traffic is sent by legitimate parties

Confidentiality (encryption)

– Limited traffic flow confidentiality (some traffic analysis

possible)

Connectionless integrity

– Assurance that every received IP packet has not been

modified

– Partial sequence integrity - prevents packet replay

Access control

Page 13: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

13

IPSEC MAJOR COMPONENTS

IPSec base protocols

IPSec modes

IPSec Security Policy and Associations (SA)

IPSec Internet Key Exchange (IKE)

Page 14: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

14

IPSEC BASE PROTOCOLS

Authentication Header (AH)

– Authentication

– Protection against replay attacks

– Integrity

Encapsulating Security Payload (ESP)

– Confidentiality

– Protection against replay attacks

– Authentication (depends on algorithm)

– Integrity (depends on algorithm)

Page 15: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

15

IPSEC BASE PROTOCOLS: AH

Provides message

authentication and

integrity check of IP

data payload, but not

confidentiality

Provides

authentication for as

much of the IP header

as possibleHMAC-MD5, HMAC-SHA

Page 16: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

16

IPSEC BASE PROTOCOLS: ESP

ESP provides source authentication, data integrity,

and confidentiality

Content of IP packet is encrypted and encapsulated

between header and trailer fields

Authentication data optionally added

Page 17: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

17

IPSEC BASE PROTOCOLS: ESP

IV (Initialization Vector) is part of payload. Should it

be encrypted?

Page 18: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

18

ESP PADDING

If encryption algorithm requires plaintext in multiple of

bytes, padding is useful

Padding can also provide partial traffic confidentiality –

Add padding to hide actual plaintext length

Page 19: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

19

CONNECTIONLESS INTEGRITY AND

PARTIAL SEQUENCE INTEGRITY

Internet layer is connectionless

– Packets can be dropped and arrive out-of-order

IPSec provides packet-level integrity (no integrity on

flow of packets)

The “replay attack” is countered using a “sliding

window” N (Highest received

sequence number)

Width (w)

– Sequence number less than N-w+1 or an invalid packet

is discarded

– When a valid packet having sequence number N-w+1 to

N arrives, corresponding entry in the window is marked

– When a valid packet having sequence number greater

than N arrives, window advances (N updated)

N – w+1

Page 20: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

20

IPSEC SECURITY

Authentication

– Message authentication code (MAC)

Integrity (Connectionless)

– Hashing (MAC)

Confidentiality

– Encryption

Countering replay attack

– Sequence number

Traffic analysis

– Padding

– Encryption

Page 21: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

21

QUIZ: IPSEC BASE PROTOCOLS: ESP

Which one is better from avoiding DoS

attack point of view?

• First encrypt, then authenticate

• Or, first authenticate, then encrypt.

Page 22: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

22

IPSEC MODES

Transport mode

– Used to deliver

services from

host to host or

from host to

gateway

Tunnel mode

– Used to deliver

services from

gateway to

gateway

Page 23: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

23

TRANSPORT MODE

Protects what is delivered from the transport

layer to the network layer

This mode does not protect the IP header

– It only protects the information coming from the

transport layer

Page 24: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

24

TUNNEL MODE

Protects the entire IP packet

– It takes an IP packet applies security methods to the entire

packet, and then adds a new IP header

This mode protects the original IP header

Page 25: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

25

TRANSPORT MODE & ESP FOR IPv4 and IPv6

Required by routers

Page 26: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

26

TUNNEL MODE & ESP FOR IPv4 and IPv6

Page 27: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

27

TRANSPORT VS. TUNNEL MODE

Traffic analysis: Transport mode vs tunnel mode

IP header(real dest)

IPSec header TCP/UDP header + data

IP header(gateway)

IPSec header TCP/UDP header + dataIP header(real dest)

Transport mode

Tunnel mode

Page 28: IPSec - Auckland€¦ · Slide title In CAPITALS 50 pt Slide subtitle 32 pt Manoranjan Mohanty IPSEC COMPSCI 316 (Cyber Security) Source of some slides: University of Tennessee

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

28

Will IPSec Work with NAT ?

Consider – ESP protocol and tunnel mode

Case 1: Sender – NAT – IPSec Gateway 1 -- IPSec

Gateway 2 – Receiver

Case 2: Sender – IPSec Gateway 1 – NAT -- IPSec

Gateway 2 – Receiver


Related Documents