400 likes | 585 Views
Ivan Svoboda Manager Information security projects. Deployment of IPSec VPN VPN, IPSec, PKI, Smart Cards. Agenda. Business drivers VPN levels VPN & Firewall VPN & PKI VPN & Security Certification. Current issues. E-commerce, E-government Internet services Flexibility
E N D
Ivan Svoboda Manager Information security projects Deployment of IPSec VPNVPN, IPSec, PKI, Smart Cards
Agenda • Business drivers • VPN levels • VPN & Firewall • VPN & PKI • VPN & Security Certification
Current issues • E-commerce, E-government • Internet services • Flexibility • Network infrastructure & cost reduction • Network Security Threats • Sniffing • IP spoofing • Session hijacking • Man-in-the-middle • The enabler: Secure VPN
Secure networks ? Data Data Praha Brno X.25, ATM Frame Relay Internet PSTN
Secure networks ? YES ! Dokument Dokument Dokument Dokument Praha Brno VPN X.25, ATM Frame Relay Internet JTS
Secure networks ? YES ! Dokument Dokument Dokument Dokument Praha Brno VPN X.25, ATM Frame Relay Internet JTS
Appl. Appl. Present. Present. Session Session SSL/TLS Transport Transport Network Network IPSec Link Link Physical Physical Encryption layers SSH, S-MIME L2TP, PPTP LAN, WAN, Internet
Encryption layers • Application (SSH, S/MIME etc.) • (-) application dependant • (-) network access control missing • (+) most specific services • Transport (SSL/TLS) • (-) TCP-only (HTTP etc.) • Network (IPSec) • (-) IP-only • (+) every IP-packet is secured • (+) IP-address tunelling • Link (L2TP, PPTP) • (+) RAS, mixed networks (IP, IPX, NetBEUI etc.)
Dokument Dokument Appl. Appl. Present. Present. Session Session Transport Transport IPSec IPSec Network Network Link Link Physical Physical Network layer encryption: IPSec
Appl. Present. Session Transport Network Link Physical IPSec VPN compatibility database client/server ERM e-mail applications GIS www Unix Microsoft platforms Oracle Novell IPSec - VPN LAN networks X.25 Internet Frame Relay PPP WAN
Dokument Dokument Public key X.Y. Dig. signed CA IPSec VPN functions: • Data confidentiality & integrity • Encryption (ESP) • Authentication (AH) • Users/nodes authentication • digital certificates X.509 • Access control • Access to networks, • Access to sources (servers)
Secure VPN – IPSec technology applications applications TCP / UDP TCP / UDP IKE (ISAKMP/Oakley) IP IP IPSEC IPSEC LAN, WAN, ... IP IP Ethernet / PPP Ethernet / PPP ESP/AH Data authentication and encryption
Public key X.Y. Dig. signed CA IPSec Implementation IPSec - VPN HW SW Firewall Router VPN-gateway
Microsoft IPSec Interoperability LAN, WAN, Internet, JTS • Different types of products in different locations • IPSec compatibility: ICSA certification
PDA, ... IPSec VPN deployment • Intranet • Extranet • E-business/ /E-government LAN PTSN WAN Internet LAN LAN • Where are the threats? • Internal vs. External
VPN deployment issues • VPN & firewall • Complementary technologies • Coordination of policies necessary • VPN & PKI & smart cards • Complementary technologies • Attribute certificates • Two-factor authentication
Firewall supplements Contentsecurity High-availability Antiviruscontrol Loadbalancing Strongauthentication Vulnerabilitiesassesment Directory PKI Intrusiondetection VPN Log analysis Network management
Deploying a VPN Servicewith or without a Firewall • Each component in the network solves its own distinct problem • Issues: Performance, reliability, policy integration, TCO, … • Security: question of protected area perimeter
No Firewall Scenario • VPN Gateway authenticates users with X.509 certificates • If all traffic is encrypted VPN Gateway acts as “perfect” firewall • No other filtering Head office LAN Internet Secure VPN Gateway Access router
Outside of Firewall Scenario • VPN traffic decrypted by VPN Gateway • Firewall can perform additional packet filtering, authentication, and application proxies • No changes to firewall security policy • Security perimeter ? Head office LAN Internet Access router Firewall Secure VPN Gateway
In Parallel to Firewall Scenario • Network access validated and secured by VPN system • Security policy more flexible and simple to implement • No network traffic bottlenecks Head office LAN Firewall Internet Access router Secure VPN Gateway
Inside of Firewall Scenario(1) DMZ FW VPN router LAN WAN VPN Protected area
Inside of Firewall Scenario(2) Protected area DMZ VPN FW router LAN WAN VPN • FW: non-authorised users (access to Web server) • VPN: authorised users (access to accounting server)
Problemissues • Correct IPSec transport through firewall (proxy server) • Transport of LDAP (TCP/port309) and PKIX (TCP/port709) • Transport ISAKMP / IKE (UDP/port500) • Transport ESP (IP/port50) AH (IP/port51) • Network address translation (NAT)
Secure VPNs and Authentication • Two ends wishing to set up a secured session need to know who they are communicating with, otherwise… • spoofing attack • man-in-the-middle attacks • The secure tunnel needs to be authenticated at both ends • Authentication options (IKE): • Certificates • Shared secret
Alternate Authentication Method“Shared Secret” • Eliminate certificates for small deployments • User enters a password for authentication • supported by IKE, in lieu of certificates • longer passwords are more secure • password never traverses the network • But…not as scalable as certificates • password administration becomes difficult
VPN & PKI • PKI is the most scalable authentication method for VPN • VPN is a “killer” aplication for PKI • Dynamic modifications: • Attribute certificates – VPN groups membership
Secure VPN Groups • Engineering VPN group • User A • Engineering subnet Engineering subnet User A Internet • Finance VPN group • User B • Finance subnet Finance subnet VPN gateway User B • Inventory VPN group • User B • User C • Inventory subnet Inventory subnet User C
VPN (1) VPN (2) VPN groupsAccess priviliges WAN LAN A LAN B
VPN policy manager VPN groups Group members New users
Smart cards advantage • Not only private key storage • Private key operations (electronic signature on-card) • Security !
Dokument E-mail Dokument SSL IPSec PKI & smart cards CA LDAP X.500
Smart cards advantage • Different private keys/certificates: • Clients: e-mail, SSL, IPSec, … • Use: authentication, encryption, non-repudiation (electronic signature) • Single smart card • Multi-function cards • Physical access control (contact-less) • Secure login • Electronic signature
Non-certified „IPSec compatible“ Is it really secure?(IPSec VPN) FIPS 140-1 Security Certification 2-5 ICSA Certification cca 10-15
FIPS 140-1 • Cryptographic modules certification • NIST - http://csrc.ncsl.nist.gov/cryptval • CR: Electronic Signature Act Regulation • Requirements for the private key protection, as a part of secure signature creation device) • Levels 1-4 • Level 2: • Physical security for high risk environment (temper-evident coatings) • User authentication • Controlled access protection (C2 equivalent) • VPN, PKI, smart card, …
Conclusion • VPN deployment issues/decisions • VPN level • Security perimeter (Risk analysis) • VPN & FW • Authentication options (VPN & PKI & smart cards) • Security certifications • www.tsoft.cz • svoboda@tsoft.cz • +420-2- 6134 8738