The IPsec protocols. Overview

Similar documents
IPSec. Overview. Overview. Levente Buttyán

CSCE 715: Network Systems Security

IP Security. Have a range of application specific security mechanisms

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

Cryptography and Network Security. Sixth Edition by William Stallings

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

CSC 6575: Internet Security Fall 2017

IP Security. Cunsheng Ding HKUST, Kong Kong, China

Virtual Private Networks (VPN)

The Internet community has developed application-specific security mechanisms in a number of application areas, including electronic mail (S/MIME,

Lecture 13 Page 1. Lecture 13 Page 3

Chapter 6. IP Security. Dr. BHARGAVI H. GOSWAMI Department of Computer Science Christ University

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

Lecture 12 Page 1. Lecture 12 Page 3

Chapter 11 The IPSec Security Architecture for the Internet Protocol

Virtual Private Network

Chapter 6/8. IP Security

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

The IPSec Security Architecture for the Internet Protocol

Network Security IN2101

CSE509: (Intro to) Systems Security

Network Security (NetSec) IN2101 WS 16/17

IP Security Part 1 04/02/06. Hofstra University Network Security Course, CSC290A

IP Security IK2218/EP2120

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Internet Security. - IPSec, SSL/TLS, SRTP - 29th. Oct Lee, Choongho

IBM i Version 7.2. Security Virtual Private Networking IBM

Network Security: IPsec. Tuomas Aura

Chapter 5: Network Layer Security

Protocols, Technologies and Standards Secure network protocols for the OSI stack P2.1 WLAN Security WPA, WPA2, IEEE i, IEEE 802.1X P2.

IP Security Discussion Raise with IPv6. Security Architecture for IP (IPsec) Which Layer for Security? Agenda. L97 - IPsec.

IPSec Transform Set Configuration Mode Commands

Firewalls, Tunnels, and Network Intrusion Detection

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1415/ Chapter 16: 1

Lecture 9: Network Level Security IPSec

IPsec (AH, ESP), IKE. Guevara Noubir CSG254: Network Security

IPsec and SSL/TLS. Applied Cryptography. Andreas Hülsing (Slides mostly by Ruben Niederhagen) Dec. 1st, /43

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

INFS 766 Internet Security Protocols. Lectures 7 and 8 IPSEC. Prof. Ravi Sandhu IPSEC ROADMAP

IPSec Transform Set Configuration Mode Commands

VPN and IPsec. Network Administration Using Linux. Virtual Private Network and IPSec 04/2009

IPSec implementation for SCTP

Configuration of an IPSec VPN Server on RV130 and RV130W

Virtual Private Network. Network User Guide. Issue 05 Date

VPN Overview. VPN Types

Internet security and privacy

Parallelizing IPsec: switching SMP to On is not even half the way

8. Network Layer Contents

Configuring Security for VPNs with IPsec

IPSec Site-to-Site VPN (SVTI)

Configuring IPSec tunnels on Vocality units

COSC4377. Chapter 8 roadmap

Sample excerpt. Virtual Private Networks. Contents

Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP,

Cryptography and secure channel. May 17, Networks and Security. Thibault Debatty. Outline. Cryptography. Public-key encryption

IKE and Load Balancing

CSC 4900 Computer Networks: Security Protocols (2)

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Cryptography and Network Security

Computer Security 3e. Dieter Gollmann. Security.di.unimi.it/sicurezza1516/ Chapter 16: 1

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Network Working Group Request for Comments: Nokia Research Center F. Dupont GET/ENST Bretagne June 2004

Lehrstuhl für Netzarchitekturen und Netzdienste Fakultät für Informatik Technische Universität München. ilab. Lab 8 SSL/TLS and IPSec

Virtual Private Networks

Secure channel, VPN and IPsec. stole some slides from Merike Kaeo

Network Security: IPsec. Tuomas Aura T Network security Aalto University, Nov-Dec 2014

Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

Network Working Group. Obsoletes: 2402 December 2005 Category: Standards Track

Security for VPNs with IPsec Configuration Guide Cisco IOS Release 12.4T

IPsec Working Group. Expires January 2003 July IP Authentication Header draft-ietf-ipsec-rfc2402bis-01.txt. Status of This Memo

Use of IPSec in Mobile IP

VPN, IPsec and TLS. stole slides from Merike Kaeo apricot2017 1

Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15M&T

show crypto group summary, page 1 show crypto ikev2-ikesa security-associations summary spi, page 2

Manual Key Configuration for Two SonicWALLs

How to Configure an IPsec VPN to an AWS VPN Gateway with BGP

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

IPSec. Dr.Talal Alkharobi. IPsec (IP security)

IPsec Working Group. draft-ietf-ipsec-rfc2402bis-05.txt September 2003 Expires March IP Authentication Header draft-ietf-ipsec-rfc2402bis-05.

The First Puzzle Piece: The Authentication Header

IPSECv6 Peach Pit User Guide. Peach Fuzzer, LLC. v3.7.50

How to Configure Forcepoint NGFW Route-Based VPN to AWS with BGP TECHNICAL DOCUMENT

Network Working Group Request for Comments: November 1998

KENIC-AFRINIC IPv6 Workshop 17th 20th June 2008

Application Layer. Presentation Layer. Session Layer. Transport Layer. Network Layer. Data Link Layer. Physical Layer

VPNs and VPN Technologies

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

IPSec VPN Setup with IKE Preshared Key and Manual Key on WRVS4400N Router

Table of Contents 1 IKE 1-1

Site-to-Site VPN. VPN Basics

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

RFC 430x IPsec Support

The EN-4000 in Virtual Private Networks

CloudBridge :31:07 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S

Transcription:

The IPsec protocols -- components and services -- modes of operation -- Security Associations -- Authenticated Header (AH) -- Encapsulated Security Payload () (c) Levente Buttyán (buttyan@crysys.hu) Overview IPsec is an Internet standard for network layer security provides protection for IP and protocols above (ICMP, TCP, ) allows selection of the required security services and algorithms puts in place the necessary cryptographic keys can be applied between a pair of hosts, between a pair of security gateways (e.g., firewalls), and between a host and a gateway components: an authentication protocol (Authentication Header AH) a combined encryption and authentication protocol (Encapsulated Security Payload ) Security Association and key establishment protocol (IKEv2) possible ways to implement IPsec: integration into the native IP stack implementation bump-in-the-stack (BITS): between IP and the network driver bump-in-the-wire (BITW): a separate HW device (security gateway) The IPsec protocol 2

IPsec services AH (encryption only) (encryption and authentication) integrity origin authentication replay detection confidentiality limited traffic flow confidentiality The IPsec protocol 3 Modes of operation (both AH and ) transport mode provides protection primarily for upper layer protocols protection is applied to the payload of the IP packet in transport mode encrypts and optionally authenticates the IP payload but not the IP AH in transport mode authenticates the IP payload and selected fields of the IP typically used between end-systems tunnel mode provides protection to the entire IP packet the entire IP packet is considered as payload and encapsulated in another IP packet (with potentially different source and destination addresses) in tunnel mode encrypts and optionally authenticates the entire inner IP packet AH in tunnel mode authenticates the entire inner IP packet and selected fields of the outer IP usually used between two security gateways, or between a host and a security gateway The IPsec protocol 4

Security Associations (SA) the IPsec state shared by two systems (hosts, gateways) is represented by SAs an SA is always one-way, and it is either created for AH or for (or IKE) an SA includes the following information: end-point identifiers (e.g., IP addresses) protocol information (algorithms, keys, and related parameters) operational mode (tunnel or transport) sending sequence number (for the sender of this SA) anti-replay window (for the receiver of this SA) a counter and a bit-map (or equivalent) used to determine whether an inbound packet is a replay lifetime (a time interval or byte count) SAs are referenced by an SPI (Security Parameter Index) a bit string carried in AH and s to allow the receiving party to select the SA which must be used to process the packet The IPsec protocol 5 Selecting SAs Security Policy Database (SPD) two separate bases for inbound and outbound traffic each entry defines a subset of IP traffic and a set of SAs to be applied for that traffic subset of IP traffic is defined in terms of selectors ( fields) destination IP address (single, enumerated list, range, or mask) source IP address (single, enumerated list, range, or mask) transport layer protocol (single, enumerated list, or range) source or destination port (single, enumerated list, range, or wildcard) outbound processing compare the selector fields of the packet to the values in the SPD determine which SAs should be used for the packet and their SPIs do the requiered IPsec processing inbound processing retrieve the SA that should be used based on the SPI in the inbound packet do the IPsec processing verify in the SPD if the right SAs have been applied The IPsec protocol 6

Authentication Header AH 0 8 16 31 next payload length Security Parameters Index (SPI) sequence number authentication (variable length) reserved next type of immediately following this (e.g., TCP, IP, etc.) payload length length of AH (in 32 bit words) minus 2 e.g., 4 if Authentication is 3x32 bits long Security Parameters Index identifies the SA used to generate this sequence number sequence number of the packet authentication a (truncated) MAC (default length is 3x32 bits) The IPsec protocol 7 MAC the MAC is calculated over IP fields that do not change in transit the AH fields (authentication field is set to 0) entire upper layer protocol the fields not covered by the MAC are set to 0 for the calculation TTL checksum IP 0000 0000... AH 0000... MAC MAC authentication payload The IPsec protocol 8

Supported MAC algorithms Requirement Algorithm (notes) MUST HMAC-SHA1-96 [RFC2404] SHOULD+ AES-XCBC-MAC-96 [RFC3566] MAY HMAC-MD5-96 [RFC2403] (1) Note: (1) Weaknesses have become apparent in MD5; however, these should not affect the use of MD5 with HMAC. The IPsec protocol 9 Replay detection replay: the attacker obtains an authenticated packet and later transmits (replays) it to the intended destination receiver has an anti-replay window of default size W = 64 last received packet packets received window (of size 7)...... dropped dropped if MAC is correct then mark otherwise drop if MAC is correct then mark and advance window The IPsec protocol 10

AH in transport and tunnel mode IPv4 packet IP AH in transport mode IP AH authenticated except for mutable fields in the IP AH in tunnel mode new IP AH IP authenticated except for mutable fields in the outer IP The IPsec protocol 11 Encapsulating Security Payload 0 16 24 31 Security Parameters Index (SPI) sequence number payload (variable length) padding (0-255 bytes) pad length authentication (variable length) next Security Parameters Index identifies the SA used to generate this encrypted packet sequence number payload transport level segment (transfer mode) or encapsulated IP packet (tunnel mode) padding variable length padding pad length next identifies the type of contained in the payload authentication a (truncated) MAC computed over the packet (SPI... next ) The IPsec protocol 12

Encryption and MAC encryption applied to the payload, padding, pad length, and next fields if an IV is needed, then it is explicitly carried at the beginning of the payload (the IV is not encrypted) MAC default length is 3x32 bits MAC is computed over the SPI, sequence number, and encrypted payload, padding, pad length, and next fields unlike in AH, here the MAC does not cover the preceding IP The IPsec protocol 13 Supported encryption and MAC algorithms Requirement MUST MUST- SHOULD+ SHOULD SHOULD NOT Encryption Algorithm NULL TripleDES-CBC [RFC2451] AES-CBC with 128-bit keys [RFC3602] AES-CTR [RFC3686] DES-CBC [RFC2405] Requirement MUST MUST SHOULD+ MAY Authentication Algorithm HMAC-SHA1-96 [RFC2404] NULL AES-XCBC-MAC-96 [RFC3566] HMAC-MD5-96 [RFC2403] The IPsec protocol 14

in transport and tunnel mode IPv4 packet IP in transport mode IP trailer MAC encrypted authenticated in tunnel mode new IP IP trailer MAC encrypted authenticated The IPsec protocol 15 Combining SAs transport adjacency (basic -AH combination) first apply in transport mode without authentication then apply AH in transport mode IP AH trailer authenticated except for mutable fields in the IP iterated tunneling (multiple nested tunnels) both end-points of the two tunnels are the same one end-point of the two tunnels is the same neither endpoint of the two tunnels is the same transport within tunnel The IPsec protocol 16

Example: secure end-to-end communications one or more transport SAs (transport adjacency) local intranet Internet local intranet The IPsec protocol 17 Example: corporate VPN with tunneling tunnel SAs in both direction local intranet Internet local intranet The IPsec protocol 18

Example: remote access tunnel SAs in both direction Internet local intranet The IPsec protocol 19