330 likes | 712 Views
IPSec. Access control Connectionless integrity Data origin authentication Rejection of replayed packets Confidentiality. Sheng-Liang Song ssl@cisco.com. IPSec. Complexity Security worst “enemy” “best practice”. Sheng-Liang Song ssl@cisco.com. Agenda. IPSec Overview
E N D
IPSec • Access control • Connectionless integrity • Data origin authentication • Rejection of replayed packets • Confidentiality Sheng-Liang Song ssl@cisco.com
IPSec • Complexity • Security worst “enemy” • “best practice” Sheng-Liang Song ssl@cisco.com
Agenda • IPSec Overview • IPSec (Network Layer) • Modes (Tunnel/Transport) • Protocols (ESP/AH) • IKE (Internet Key Exchange) • IPSec Cases • IPSec Discussion • Q&A
Key Words • ISAKMP (Internet Security Association • and Key Management Protocol) • SA (Security Associations) • SPD (Security Policy Database) • IKE (Internet Key Exchange) • AH (Authentication Header) • ESP (Encapsulating Security Payload) • HMAC (Keyed-Hashing for Message Authentication) • H(K XOR opad_5C, H(K XOR ipad_36, text))
application transport network link physical IPSec (Network Layer) • lives at the network layer • transparent to applications User SSL OS IPSec NIC
IPv4 Header Format Mutable, predictable, Immutable
IPSec Modes (Tunnel and Transport) • Transport Mode • Tunnel Mode • Transport Mode IP header data data IP header ESP/AH • Tunnel Mode IP header data IP header new IP hdr ESP/AH data
IP HDR IP HDR IP HDR IP HDR IP HDR IP HDR Data Data Data Data Data Data IPSec Authenticated session Original IP Layer Original IP Layer IP HDR AH HDR Data IPSec Encrypted session Original IP Layer Original IP Layer IP HDR ESP HDR Data encrypted IPSec Tunnel Original IP Layer Original IP Layer IP HDR Data New IP HDR ESP HDR encrypted IPSec Protocols (ESP and AH) • ESP (Encapsulating Security Payload) • Integrity and confidentiality (HMAC/DES-CBC) • Integrity only by using NULL encryption • AH (Authentication Header) • Integrityonly
AH Format The sender's counter is initialized to 0 when an SA is established.
ESP Format The sender's counter is initialized to 0 when an SA is established.
Set TOS IP header TOS IP Payload Classified IP packet TOS copy New IP header built by tunnel entry point TOS byte is copied TOS IP new hdr IP new hdr TOS ESP header IP IP Payload IPSec packet IPSec Tunnels IP header TOS IP Payload Original IP Packet
Anti-Replay in IPSec • Both ESP and AH have an anti-reply mechanism • based on sequence numbers • sender increment the sequence number after each transmission • receiver optionally checks the sequence number and rejects if it is out of window
IPSec and IKE in Practice • Sets up a keying channel • Sets up data channels Internal Network Certificate Authority Digital Certificate ISAKMP Session Digital Certificate SA Authenticated Encrypted Tunnel ISAKMP (Internet Security Association and Key Management Protocol) SA (Security Associations) SPD (Security Policy Database) Discard,bypass IPsec, apply IPSec (Overhead) Clear Text Internal Network Encrypted
IPSec (IKE1 Phase1) • Authenticated with Signatures • Authenticated with Shared key • Authenticated with Public Key Encryption • Authenticated with Public Key Encryption (Revised)
IPSec Discussion • IPSec authenticates machines, not users • Does not stop denial of service attacks • Easier to do DoS • Order of operations: Encryption/Authentication • Q & A
Reference • Information Security: Principles and Practice, Mark Stamp, Jan 29,2005 • http://www.ietf.org/ • Cisco IOS IPsec www.cisco.com/go/ipsec/ • Cisco White Paper, IPsec, http://www.cisco.com/warp/public/cc/so/neso/sqso/eqso/ipsec_wp.htm • N. Ferguson and B. Schneier, A Cryptographic Evaluation of IPsec, http://www.schneier.com/paper-ipsec.html • IPsec, Security for the Internet Protocol, http://www.freeswan.org/freeswan_trees/freeswan-2.06/doc/intro.html