SlideShare ist ein Scribd-Unternehmen logo
1 von 55
PRESENTED BY:
KESHAB NATH
IP SECURITY
OUTLINE
 IP SECURITY OVERVIEW
 IP SECURITY ARCHITECTURE
 AUTHENTICATION HEADER
 ENCAPSULATING SECURITY PAYLOAD
 COMBINING SECURITY ASSOCIATIONS
 KEY MANAGEMENT
IP Security Overview
The standard Internet communication protocol is
completely unprotected, allowing hosts to inspect or
modify data in transit. Adding IPSec to the system
will resolve this limitation by providing strong
encryption, integrity, authentication and replay
protection.
What Security Problem?
Today's Internet is primarily comprised of :
 Public
 Un-trusted
 Unreliable IP networks
Because of this inherent lack of security,
the Internet is subject to various types of
threats…
Internet Threats
 Data integrity
The contents of a packet can be accidentally or
deliberately modified.
 Identity spoofing
The origin of an IP packet can be forged.
 Anti-reply attacks
Unauthorized data can be retransmitted.
 Loss of privacy
The contents of a packet can be examined in
transit.
Security at What Level?
Application Layer
Transport Layer
Network Layer
Data Link Layer
PGP, Kerberos, SSH, etc.
Transport Layer Security (TLS)
IP Security
Hardware encryption
Encapsulation of Data for Network Delivery
Application Layer
Original
Message
Encapsulation of Data for Network Delivery
Application Layer
Original
Message
Data 3Transport Layer
(TCP, UDP)
Encapsulation of Data for Network Delivery
Application Layer
Original
Message
Transport
Layer
(TCP, UDP)
Header 3 Data 3
Encapsulation of Data for Network Delivery
Network Layer
(IP)
Original
MessageApplication Layer
Data 3Header 3
Transport
Layer
(TCP, UDP)
Data 2
Encapsulation of Data for Network Delivery
Application Layer
Original
Message
Header 3 Data 3
Data 2
Transport
Layer
(TCP, UDP)
Network Layer
(IP)
Header 2
Encapsulation of Data for Network Delivery
Application Layer
Original
Message
Data 3Header 3
Data 2Header 2
Transport
Layer
(TCP, UDP)
Network Layer
(IP)
Data 1
Data Link
Layer
Encapsulation of Data for Network Delivery
Application Layer
Original
Message
Data 3Header 3
Data 2Header 2
Transport
Layer
(TCP, UDP)
Network Layer
(IP)
Data 1
Data Link
Layer
Header 1
Packet Sent by Host A
Data 1Header 1
Packet
Data Link
Layer
Network Layer
Data Link Layer
Packet Received by intermediary Router
Data 1Header 1
De-capsulation of Data from Network Delivery
Data Link
Layer
De-capsulation of Data from Network Delivery
Data 1
Data Link
Layer
De-capsulation of Data from Network Delivery
Data 2Header 2Network Layer
(IP)
De-capsulation of Data from Network Delivery
Data 2Network Layer
(IP)
De-capsulation of Data from Network Delivery
Data 3Header 3Transport Layer
(TCP, UDP)
De-capsulation of Data from Network Delivery
Data 3Transport Layer
(TCP, UDP)
De-capsulation of Data from Network Delivery
Original
Message
Application Layer
IP SECURITY
IP-level security encompasses three functional areas:
 Authentication
 Confidentiality
 Key management
IP SECURITY
Authentication- The authentication mechanism
ensures that the received packet was sent by the
identified source. It also assures that the packet has
not been altered in transit.
Confidentiality- The confidentiality facility enables
communicating nodes to encrypt messages to
prevent eavesdopping by third parties.
Key management- It is concerned with secure
exchange of keys
IP Security Scenario
Applications of IP Security
Secure branch office connectivity over the Internet.
Secure remote access over the Internet.
Establishing extranet and intranet connectivity with
partners.
Enhancing electronic commerce security.
Benefits of IPsec
Provides strong security when implemented in a
firewall or router that can be applied to all traffic
crossing the perimeter.
IPsec is resistant to bypass if all traffic from the
outside must use IP and the firewall is the only
way of entrance from the Internet into the
organization.
 Is below transport layer, hence transparent to
applications.
Can be transparent to end users.
Can provide security for individual users if
needed.
IPsec Documents
 Architecture – Covers the general concept security
requirements, definitions, and mechanisms defining IPsec technology.
 Authentication Header(AH)- An extension header to provide message
authentication. Current specification is RFC 4302.
 Encapsulating Security Payload- Consists of an encapsulating header and
trailer used to provide encryption or combined
encryption/authentication. Current specification is RFC 4303.
 Internet Key Exchange(IKE)- A collection of documents describing the
key management schemes for use with IPsec.
 Cryptographic algorithms- Includes a large set of documents that define
and describe cryptographic algorithms for encryption, message
authentication, pseudo random functions, and cryptographic key
exchange.
 Domain of Interpretation- Contains values needed for the other
documents to relate to each other. These include identifiers for approved
encryption and authentication algorithms, as well as operational
parameters such as key lifetime
IPSec Document Overview
IPSec Security Services
Connectionless integrity
Assurance that received traffic has not been
modified. Integrity includes anti-reply defenses.
 Data origin authentication
Assurance that traffic is sent by legitimate party or parties.
Confidentiality (encryption)
Assurance that user’s traffic is not examined by non-authorized
parties.
Access control
Prevention of unauthorized use of a resource.
Limited traffic flow confidentiality
Security Associations
 A one-way relationship between a sender and a receiver that affords
security services to the traffic carried on it.
A security association is uniquely identified by three parameters:
 Security Parameters Index (SPI): A bit string assigned to this
SA and having local significance only. The SPI is carried in AH and
ESP headers to enable the receiving system to select the SA under
which a received packet will be processed.
 IP Destination Address: Currently, only unicast addresses are
allowed; this is the address of the destination endpoint of the
SA, which may be an end user system or a network system such as a
firewall or router.
 Security Protocol Identifier: This indicates whether the
association is an AH or ESP security association
Security Association Parameters
Security Association Database defines the parameters associated
with each SA. A security association is normally defined by the
following parameters:
 Sequence Number Counter: A 32-bit value used to generate the
Sequence Number field in AH or ESP headers.
 Sequence Counter Overflow: A flag indicating whether overflow
of the Sequence Number Counter should generate an auditable event
and prevent further transmission of packets on this SA (required for
all implementations).
 Anti-Replay Window: Used to determine whether an inbound AH
or ESP packet is a replay.
 AH Information: Authentication algorithm, keys, key
lifetimes, and related parameters being used with AH (required for
AH implementations).
Security Association Parameters
 ESP Information: Encryption and authentication
algorithm, keys, initialization values, key lifetimes, and related
parameters being used with ESP (required for ESP
implementations).
 Lifetime of This Security Association: A time interval or
byte count after which an SA must be replaced with a new SA
(and new SPI) or terminated, plus an indication of which of these
actions should occur (required for all implementations).
 IPSec Protocol Mode: Tunnel, transport, or wildcard (required
for all implementations).
 Path MTU: Any observed path maximum transmission unit
(maximum size of a packet that can be transmitted without
fragmentation) and aging variables (required for all
implementations).
Security Association Selectors
The means by which IP traffic is related to specific SAs (or no SA in
the case of traffic allowed to bypass IPSec) is the nominal Security
Policy Database (SPD).
The following selectors determine an SPD entry:
 Destination IP Address: This may be a single IP address, an
enumerated list or range of addresses, or a wildcard (mask) address.
The latter two are required to support more than one destination
system sharing the same SA (e.g., behind a firewall).
 Source IP Address: This may be a single IP address, an
enumerated list or range of addresses, or a wildcard (mask) address.
The latter two are required to support more than one source system
sharing the same SA (e.g., behind a firewall).
 UserID: A user identifier from the operating system. This is not a
field in the IP or upper-layer headers but is available if IPSec is
running on the same operating system as the user.
Security Association Selectors
 Data Sensitivity Level: Used for systems
providing information flow security (e.g., Secret or
Unclassified).
 Transport Layer Protocol: Obtained from the
IPv4 Protocol or IPv6 Next Header field. This may be
an individual protocol number, a list of protocol
numbers, or a range of protocol numbers.
 Source and Destination Ports: These may be
individual TCP or UDP port values, an enumerated
list of ports, or a wildcard port.
IPSec Modes of Operation
 Both AH and ESP supports two modes of use:
 Transport mode –Provides protection primarily for
upper layer protocols.ESP in transport mode
encrypts and optionally authenticates the IP payload
but not the IP header. AH authenticates the IP
payload and selected portions of the IP header.
 Tunnel mode - Provides protection to the entire IP
packet. After the AH or ESP fields are added to the IP
packet, the entire packet plus security fields is
treated as payload of new outer packet with a new
outer IP header.
IPSec Modes of Operation
 Transport Mode: protect the upper layer protocols
IP
Header
TCP
Header
DataOriginal IP
Datagram
IP
Header
TCP
Header
IPSec
Header
DataTransport Mode
protected packet
• Tunnel Mode: protect the entire IP payload
Tunnel Mode
protected packet
New IP
Header
TCP
Header
IPSec
Header
DataOriginal
IP
Header
protected
protected
Transport mode vs. Tunnel mode functionalities
Transport Mode
SA
Tunnel Mode
SA
AH Authenticates IP payload
and selected portions of IP
header and IPv6 extension
headers
Authenticates entire
inner IP packet plus
selected portions of
outer IP header
ESP Encrypts IP payload and
any IPv6 extesion header
Encrypts inner IP packet
ESP with
authentication
Encrypts IP payload and
any IPv6 extesion header.
Authenticates IP payload
but no IP header
Encrypts inner IP
packet. Authenticates
inner IP packet.
Authentication Header
Provides support for data integrity and
authentication of IP packets.
Authentication is based on the use of a message
authentication code (MAC), hence the two parties
must share a secret key.
Authentication Header
The Authentication Header consists of the following fields :
 Next Header (8 bits): Identifies the type of header
immediately following this header.
 Payload Length (8 bits): Length of Authentication
Header in 32-bit words, minus 2.
 Reserved (16 bits): For future use.
 Security Parameters Index (32 bits): Identifies a
security association.
Sequence Number (32 bits): A monotonically
increasing counter value
 Authentication Data (variable): A variable-length field
(must be an integral number of 32-bit words) that
contains the Integrity Check Value (ICV), or MAC
Authentication Header
Encapsulating Security Payload (ESP)
 provides message content confidentiality & limited
traffic flow confidentiality
 can optionally provide the same authentication
services as AH
 Because message authentication is provided by
ESP, the use of AH is deprecated
 supports range of ciphers, modes, padding
 incl. DES, Triple-DES, RC5, IDEA, CAST etc
 CBC & other modes
 padding needed to fill blocksize, fields, for traffic flow
Encapsulating Security Payload
Fig-1. ESP Format
Encapsulating Security Payload
 Security Parameters Index (32 bits): Identifies a security association
 Sequence Number (32 bits): A monotonically increasing counter value; this
provides an anti-replay function
 Payload Data (variable): This is a transport-level segment (transport mode) or
IP packet (tunnel mode) that is protected by encryption
 Padding (0–255 bytes): for various reasons
 Pad Length (8 bits): Indicates the number of pad bytes immediately preceding
this field
 Next Header (8 bits): Identifies the type of data contained in the payload data
field by identifying the first header in that payload
 Integrity Check Value (variable): A variable-length field that contains the
Integrity Check Value computed over the ESP packet minus the Authentication
Data field
Anti-Replay Service
 A replay attack is one in which an attacker obtains a copy of an authenticated
packet and later transmits it to the intended destination. The receipt of
duplicate, authenticated IP packets may disrupt service in some way or may
have some other undesired consequence.
 The Sequence Number field is designed to thwart such attacks.
 When a new SA is established, the sender initializes a sequence number
counter to 0.
 If anti-replay is enabled (the default), the sender must not allow the sequence
number to cycle past 232 -1 back to zero. Otherwise, there would be multiple
valid packets with the same sequence number. If the limit of 2 32 -1 is
reached, the sender should terminate this SA and negotiate a new SA with a new
key.
Anti-Replay Service
with a default of W = 64
Fig-2. Antireplay Mechanism
Transport vs Tunnel Mode ESP
 transport mode is used to encrypt & optionally
authenticate IP data
 data protected but header left in clear
 can do traffic analysis but is efficient
 good for ESP host to host traffic
 tunnel mode encrypts entire IP packet
 add new header for next hop
 good for VPNs, gateway to gateway security
Transport vs Tunnel Mode ESP
Fig-3. Transport-Mode vs. Tunnel-Mode Encryption
Transport vs Tunnel Mode ESP
Fig-4. Scope of ESP Encryption and Authentication
Combining Security Associations
 SA’s can implement either AH or ESP
 to implement both need to combine SA’s
 form a security association bundle
 may terminate at different or same endpoints
 combined by
 transport adjacency
 iterated tunneling
 issue of authentication & encryption order
Authentication Plus Confidentiality
Transmitting IP packet that has both confidentiality and authentication between
hosts
1) ESP with Authentication Option: Authentication after encryption using
Transport mode ESP or Tunnel mode ESP.
2) Transport Adjacency: Another way to apply Authentication after encryption
 Use two bundled transport SAs, with the inner being an ESP SA and the outer
being an AH SA.
 Here ESP is used without authentication option.
Advantage: Authentication covers more fields, including the source and
destination IP addresses.
Disadvantage: Overhead of two SAs vs one SA.
3) Transport-Tunnel Bundle: Authentication before encryption
 Use a bundle consisting of an inner AH transport SA and an outer ESP tunnel
SA.
Advantages:
a) Impossible to intercept the message and alter the authentication data without
detection.
b) Authentication information with the message may be stored at the destination
for later references.
Basic Combinations of Security Associations
Fig-5. Basic Combinations of Security Associations
Key Management
 handles key generation & distribution
 typically need 2 pairs of keys
 2 per direction for AH & ESP
 manual key management
 System administrator manually configures every system
 automated key management
 automated system for on demand creation of keys for SA’s in
large systems
 has Oakley & ISAKMP elements
References
Cryptography and Network Security Principles and Practices, 4th Ed - William
Stallings
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation harshit chavda
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurationsStudent
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design PrinciplesSHUBHA CHATURVEDI
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 

Was ist angesagt? (20)

Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Key management
Key managementKey management
Key management
 
block ciphers
block ciphersblock ciphers
block ciphers
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Ipsec
IpsecIpsec
Ipsec
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 

Andere mochten auch

Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip securityrajakhurram
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threatswardjo
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intrudersrajakhurram
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transactionHarsh Mehta
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerNaveen Kumar
 

Andere mochten auch (15)

Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
pgp s mime
pgp s mimepgp s mime
pgp s mime
 
ip security
ip securityip security
ip security
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
IP Security
IP SecurityIP Security
IP Security
 
Ip security
Ip security Ip security
Ip security
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
secure electronics transaction
secure electronics transactionsecure electronics transaction
secure electronics transaction
 
Web Security
Web SecurityWeb Security
Web Security
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Network security
Network securityNetwork security
Network security
 

Ähnlich wie IP Security (20)

Ip security
Ip security Ip security
Ip security
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Unit 6
Unit 6Unit 6
Unit 6
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Websecurity
Websecurity Websecurity
Websecurity
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Web Security
Web SecurityWeb Security
Web Security
 
ESP.ppt
ESP.pptESP.ppt
ESP.ppt
 
Network security
Network securityNetwork security
Network security
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
IP Security
IP SecurityIP Security
IP Security
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
 
Web security
Web securityWeb security
Web security
 
IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
 
Ch16
Ch16Ch16
Ch16
 
ip.ppt
ip.pptip.ppt
ip.ppt
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
 

Mehr von Keshab Nath

Active Server Page(ASP)
Active Server Page(ASP)Active Server Page(ASP)
Active Server Page(ASP)Keshab Nath
 
J2 ee container & components
J2 ee container & componentsJ2 ee container & components
J2 ee container & componentsKeshab Nath
 
Distributed computing
Distributed computingDistributed computing
Distributed computingKeshab Nath
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 

Mehr von Keshab Nath (6)

Grid computing
Grid computingGrid computing
Grid computing
 
Active Server Page(ASP)
Active Server Page(ASP)Active Server Page(ASP)
Active Server Page(ASP)
 
J2 ee container & components
J2 ee container & componentsJ2 ee container & components
J2 ee container & components
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber law
Cyber lawCyber law
Cyber law
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

IP Security

  • 2. OUTLINE  IP SECURITY OVERVIEW  IP SECURITY ARCHITECTURE  AUTHENTICATION HEADER  ENCAPSULATING SECURITY PAYLOAD  COMBINING SECURITY ASSOCIATIONS  KEY MANAGEMENT
  • 3. IP Security Overview The standard Internet communication protocol is completely unprotected, allowing hosts to inspect or modify data in transit. Adding IPSec to the system will resolve this limitation by providing strong encryption, integrity, authentication and replay protection.
  • 4. What Security Problem? Today's Internet is primarily comprised of :  Public  Un-trusted  Unreliable IP networks Because of this inherent lack of security, the Internet is subject to various types of threats…
  • 5. Internet Threats  Data integrity The contents of a packet can be accidentally or deliberately modified.  Identity spoofing The origin of an IP packet can be forged.  Anti-reply attacks Unauthorized data can be retransmitted.  Loss of privacy The contents of a packet can be examined in transit.
  • 6. Security at What Level? Application Layer Transport Layer Network Layer Data Link Layer PGP, Kerberos, SSH, etc. Transport Layer Security (TLS) IP Security Hardware encryption
  • 7. Encapsulation of Data for Network Delivery Application Layer Original Message
  • 8. Encapsulation of Data for Network Delivery Application Layer Original Message Data 3Transport Layer (TCP, UDP)
  • 9. Encapsulation of Data for Network Delivery Application Layer Original Message Transport Layer (TCP, UDP) Header 3 Data 3
  • 10. Encapsulation of Data for Network Delivery Network Layer (IP) Original MessageApplication Layer Data 3Header 3 Transport Layer (TCP, UDP) Data 2
  • 11. Encapsulation of Data for Network Delivery Application Layer Original Message Header 3 Data 3 Data 2 Transport Layer (TCP, UDP) Network Layer (IP) Header 2
  • 12. Encapsulation of Data for Network Delivery Application Layer Original Message Data 3Header 3 Data 2Header 2 Transport Layer (TCP, UDP) Network Layer (IP) Data 1 Data Link Layer
  • 13. Encapsulation of Data for Network Delivery Application Layer Original Message Data 3Header 3 Data 2Header 2 Transport Layer (TCP, UDP) Network Layer (IP) Data 1 Data Link Layer Header 1
  • 14. Packet Sent by Host A Data 1Header 1 Packet Data Link Layer
  • 15. Network Layer Data Link Layer Packet Received by intermediary Router
  • 16. Data 1Header 1 De-capsulation of Data from Network Delivery Data Link Layer
  • 17. De-capsulation of Data from Network Delivery Data 1 Data Link Layer
  • 18. De-capsulation of Data from Network Delivery Data 2Header 2Network Layer (IP)
  • 19. De-capsulation of Data from Network Delivery Data 2Network Layer (IP)
  • 20. De-capsulation of Data from Network Delivery Data 3Header 3Transport Layer (TCP, UDP)
  • 21. De-capsulation of Data from Network Delivery Data 3Transport Layer (TCP, UDP)
  • 22. De-capsulation of Data from Network Delivery Original Message Application Layer
  • 23. IP SECURITY IP-level security encompasses three functional areas:  Authentication  Confidentiality  Key management
  • 24. IP SECURITY Authentication- The authentication mechanism ensures that the received packet was sent by the identified source. It also assures that the packet has not been altered in transit. Confidentiality- The confidentiality facility enables communicating nodes to encrypt messages to prevent eavesdopping by third parties. Key management- It is concerned with secure exchange of keys
  • 26. Applications of IP Security Secure branch office connectivity over the Internet. Secure remote access over the Internet. Establishing extranet and intranet connectivity with partners. Enhancing electronic commerce security.
  • 27. Benefits of IPsec Provides strong security when implemented in a firewall or router that can be applied to all traffic crossing the perimeter. IPsec is resistant to bypass if all traffic from the outside must use IP and the firewall is the only way of entrance from the Internet into the organization.  Is below transport layer, hence transparent to applications. Can be transparent to end users. Can provide security for individual users if needed.
  • 28. IPsec Documents  Architecture – Covers the general concept security requirements, definitions, and mechanisms defining IPsec technology.  Authentication Header(AH)- An extension header to provide message authentication. Current specification is RFC 4302.  Encapsulating Security Payload- Consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication. Current specification is RFC 4303.  Internet Key Exchange(IKE)- A collection of documents describing the key management schemes for use with IPsec.  Cryptographic algorithms- Includes a large set of documents that define and describe cryptographic algorithms for encryption, message authentication, pseudo random functions, and cryptographic key exchange.  Domain of Interpretation- Contains values needed for the other documents to relate to each other. These include identifiers for approved encryption and authentication algorithms, as well as operational parameters such as key lifetime
  • 30. IPSec Security Services Connectionless integrity Assurance that received traffic has not been modified. Integrity includes anti-reply defenses.  Data origin authentication Assurance that traffic is sent by legitimate party or parties. Confidentiality (encryption) Assurance that user’s traffic is not examined by non-authorized parties. Access control Prevention of unauthorized use of a resource. Limited traffic flow confidentiality
  • 31. Security Associations  A one-way relationship between a sender and a receiver that affords security services to the traffic carried on it. A security association is uniquely identified by three parameters:  Security Parameters Index (SPI): A bit string assigned to this SA and having local significance only. The SPI is carried in AH and ESP headers to enable the receiving system to select the SA under which a received packet will be processed.  IP Destination Address: Currently, only unicast addresses are allowed; this is the address of the destination endpoint of the SA, which may be an end user system or a network system such as a firewall or router.  Security Protocol Identifier: This indicates whether the association is an AH or ESP security association
  • 32. Security Association Parameters Security Association Database defines the parameters associated with each SA. A security association is normally defined by the following parameters:  Sequence Number Counter: A 32-bit value used to generate the Sequence Number field in AH or ESP headers.  Sequence Counter Overflow: A flag indicating whether overflow of the Sequence Number Counter should generate an auditable event and prevent further transmission of packets on this SA (required for all implementations).  Anti-Replay Window: Used to determine whether an inbound AH or ESP packet is a replay.  AH Information: Authentication algorithm, keys, key lifetimes, and related parameters being used with AH (required for AH implementations).
  • 33. Security Association Parameters  ESP Information: Encryption and authentication algorithm, keys, initialization values, key lifetimes, and related parameters being used with ESP (required for ESP implementations).  Lifetime of This Security Association: A time interval or byte count after which an SA must be replaced with a new SA (and new SPI) or terminated, plus an indication of which of these actions should occur (required for all implementations).  IPSec Protocol Mode: Tunnel, transport, or wildcard (required for all implementations).  Path MTU: Any observed path maximum transmission unit (maximum size of a packet that can be transmitted without fragmentation) and aging variables (required for all implementations).
  • 34. Security Association Selectors The means by which IP traffic is related to specific SAs (or no SA in the case of traffic allowed to bypass IPSec) is the nominal Security Policy Database (SPD). The following selectors determine an SPD entry:  Destination IP Address: This may be a single IP address, an enumerated list or range of addresses, or a wildcard (mask) address. The latter two are required to support more than one destination system sharing the same SA (e.g., behind a firewall).  Source IP Address: This may be a single IP address, an enumerated list or range of addresses, or a wildcard (mask) address. The latter two are required to support more than one source system sharing the same SA (e.g., behind a firewall).  UserID: A user identifier from the operating system. This is not a field in the IP or upper-layer headers but is available if IPSec is running on the same operating system as the user.
  • 35. Security Association Selectors  Data Sensitivity Level: Used for systems providing information flow security (e.g., Secret or Unclassified).  Transport Layer Protocol: Obtained from the IPv4 Protocol or IPv6 Next Header field. This may be an individual protocol number, a list of protocol numbers, or a range of protocol numbers.  Source and Destination Ports: These may be individual TCP or UDP port values, an enumerated list of ports, or a wildcard port.
  • 36. IPSec Modes of Operation  Both AH and ESP supports two modes of use:  Transport mode –Provides protection primarily for upper layer protocols.ESP in transport mode encrypts and optionally authenticates the IP payload but not the IP header. AH authenticates the IP payload and selected portions of the IP header.  Tunnel mode - Provides protection to the entire IP packet. After the AH or ESP fields are added to the IP packet, the entire packet plus security fields is treated as payload of new outer packet with a new outer IP header.
  • 37. IPSec Modes of Operation  Transport Mode: protect the upper layer protocols IP Header TCP Header DataOriginal IP Datagram IP Header TCP Header IPSec Header DataTransport Mode protected packet • Tunnel Mode: protect the entire IP payload Tunnel Mode protected packet New IP Header TCP Header IPSec Header DataOriginal IP Header protected protected
  • 38. Transport mode vs. Tunnel mode functionalities Transport Mode SA Tunnel Mode SA AH Authenticates IP payload and selected portions of IP header and IPv6 extension headers Authenticates entire inner IP packet plus selected portions of outer IP header ESP Encrypts IP payload and any IPv6 extesion header Encrypts inner IP packet ESP with authentication Encrypts IP payload and any IPv6 extesion header. Authenticates IP payload but no IP header Encrypts inner IP packet. Authenticates inner IP packet.
  • 39. Authentication Header Provides support for data integrity and authentication of IP packets. Authentication is based on the use of a message authentication code (MAC), hence the two parties must share a secret key.
  • 40. Authentication Header The Authentication Header consists of the following fields :  Next Header (8 bits): Identifies the type of header immediately following this header.  Payload Length (8 bits): Length of Authentication Header in 32-bit words, minus 2.  Reserved (16 bits): For future use.  Security Parameters Index (32 bits): Identifies a security association. Sequence Number (32 bits): A monotonically increasing counter value  Authentication Data (variable): A variable-length field (must be an integral number of 32-bit words) that contains the Integrity Check Value (ICV), or MAC
  • 42. Encapsulating Security Payload (ESP)  provides message content confidentiality & limited traffic flow confidentiality  can optionally provide the same authentication services as AH  Because message authentication is provided by ESP, the use of AH is deprecated  supports range of ciphers, modes, padding  incl. DES, Triple-DES, RC5, IDEA, CAST etc  CBC & other modes  padding needed to fill blocksize, fields, for traffic flow
  • 44. Encapsulating Security Payload  Security Parameters Index (32 bits): Identifies a security association  Sequence Number (32 bits): A monotonically increasing counter value; this provides an anti-replay function  Payload Data (variable): This is a transport-level segment (transport mode) or IP packet (tunnel mode) that is protected by encryption  Padding (0–255 bytes): for various reasons  Pad Length (8 bits): Indicates the number of pad bytes immediately preceding this field  Next Header (8 bits): Identifies the type of data contained in the payload data field by identifying the first header in that payload  Integrity Check Value (variable): A variable-length field that contains the Integrity Check Value computed over the ESP packet minus the Authentication Data field
  • 45. Anti-Replay Service  A replay attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination. The receipt of duplicate, authenticated IP packets may disrupt service in some way or may have some other undesired consequence.  The Sequence Number field is designed to thwart such attacks.  When a new SA is established, the sender initializes a sequence number counter to 0.  If anti-replay is enabled (the default), the sender must not allow the sequence number to cycle past 232 -1 back to zero. Otherwise, there would be multiple valid packets with the same sequence number. If the limit of 2 32 -1 is reached, the sender should terminate this SA and negotiate a new SA with a new key.
  • 46. Anti-Replay Service with a default of W = 64 Fig-2. Antireplay Mechanism
  • 47. Transport vs Tunnel Mode ESP  transport mode is used to encrypt & optionally authenticate IP data  data protected but header left in clear  can do traffic analysis but is efficient  good for ESP host to host traffic  tunnel mode encrypts entire IP packet  add new header for next hop  good for VPNs, gateway to gateway security
  • 48. Transport vs Tunnel Mode ESP Fig-3. Transport-Mode vs. Tunnel-Mode Encryption
  • 49. Transport vs Tunnel Mode ESP Fig-4. Scope of ESP Encryption and Authentication
  • 50. Combining Security Associations  SA’s can implement either AH or ESP  to implement both need to combine SA’s  form a security association bundle  may terminate at different or same endpoints  combined by  transport adjacency  iterated tunneling  issue of authentication & encryption order
  • 51. Authentication Plus Confidentiality Transmitting IP packet that has both confidentiality and authentication between hosts 1) ESP with Authentication Option: Authentication after encryption using Transport mode ESP or Tunnel mode ESP. 2) Transport Adjacency: Another way to apply Authentication after encryption  Use two bundled transport SAs, with the inner being an ESP SA and the outer being an AH SA.  Here ESP is used without authentication option. Advantage: Authentication covers more fields, including the source and destination IP addresses. Disadvantage: Overhead of two SAs vs one SA. 3) Transport-Tunnel Bundle: Authentication before encryption  Use a bundle consisting of an inner AH transport SA and an outer ESP tunnel SA. Advantages: a) Impossible to intercept the message and alter the authentication data without detection. b) Authentication information with the message may be stored at the destination for later references.
  • 52. Basic Combinations of Security Associations Fig-5. Basic Combinations of Security Associations
  • 53. Key Management  handles key generation & distribution  typically need 2 pairs of keys  2 per direction for AH & ESP  manual key management  System administrator manually configures every system  automated key management  automated system for on demand creation of keys for SA’s in large systems  has Oakley & ISAKMP elements
  • 54. References Cryptography and Network Security Principles and Practices, 4th Ed - William Stallings