PRESENTED BY:KESHAB NATHIP SECURITY
OUTLINE IP SECURITY OVERVIEW IP SECURITY ARCHITECTURE AUTHENTICATION HEADER ENCAPSULATING SECURITY PAYLOAD COMBINING ...
IP Security OverviewThe standard Internet communication protocol iscompletely unprotected, allowing hosts to inspect ormod...
What Security Problem?Todays Internet is primarily comprised of : Public Un-trusted Unreliable IP networksBecause of th...
Internet Threats Data integrityThe contents of a packet can be accidentally ordeliberately modified. Identity spoofingTh...
Security at What Level?Application LayerTransport LayerNetwork LayerData Link LayerPGP, Kerberos, SSH, etc.Transport Layer...
Encapsulation of Data for Network DeliveryApplication LayerOriginalMessage
Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageData 3Transport Layer(TCP, UDP)
Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageTransportLayer(TCP, UDP)Header 3 Data 3
Encapsulation of Data for Network DeliveryNetwork Layer(IP)OriginalMessageApplication LayerData 3Header 3TransportLayer(TC...
Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageHeader 3 Data 3Data 2TransportLayer(TCP, UDP)Net...
Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageData 3Header 3Data 2Header 2TransportLayer(TCP, ...
Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageData 3Header 3Data 2Header 2TransportLayer(TCP, ...
Packet Sent by Host AData 1Header 1PacketData LinkLayer
Network LayerData Link LayerPacket Received by intermediary Router
Data 1Header 1De-capsulation of Data from Network DeliveryData LinkLayer
De-capsulation of Data from Network DeliveryData 1Data LinkLayer
De-capsulation of Data from Network DeliveryData 2Header 2Network Layer(IP)
De-capsulation of Data from Network DeliveryData 2Network Layer(IP)
De-capsulation of Data from Network DeliveryData 3Header 3Transport Layer(TCP, UDP)
De-capsulation of Data from Network DeliveryData 3Transport Layer(TCP, UDP)
De-capsulation of Data from Network DeliveryOriginalMessageApplication Layer
IP SECURITYIP-level security encompasses three functional areas: Authentication Confidentiality Key management
IP SECURITYAuthentication- The authentication mechanismensures that the received packet was sent by theidentified source....
IP Security Scenario
Applications of IP SecuritySecure branch office connectivity over the Internet.Secure remote access over the Internet.E...
Benefits of IPsecProvides strong security when implemented in afirewall or router that can be applied to all trafficcross...
IPsec Documents Architecture – Covers the general concept securityrequirements, definitions, and mechanisms defining IPse...
IPSec Document Overview
IPSec Security ServicesConnectionless integrityAssurance that received traffic has not beenmodified. Integrity includes a...
Security Associations A one-way relationship between a sender and a receiver that affordssecurity services to the traffic...
Security Association ParametersSecurity Association Database defines the parameters associatedwith each SA. A security ass...
Security Association Parameters ESP Information: Encryption and authenticationalgorithm, keys, initialization values, key...
Security Association SelectorsThe means by which IP traffic is related to specific SAs (or no SA inthe case of traffic all...
Security Association Selectors Data Sensitivity Level: Used for systemsproviding information flow security (e.g., Secret ...
IPSec Modes of Operation Both AH and ESP supports two modes of use: Transport mode –Provides protection primarily forupp...
IPSec Modes of Operation Transport Mode: protect the upper layer protocolsIPHeaderTCPHeaderDataOriginal IPDatagramIPHeade...
Transport mode vs. Tunnel mode functionalitiesTransport ModeSATunnel ModeSAAH Authenticates IP payloadand selected portion...
Authentication HeaderProvides support for data integrity andauthentication of IP packets.Authentication is based on the ...
Authentication HeaderThe Authentication Header consists of the following fields : Next Header (8 bits): Identifies the ty...
Authentication Header
Encapsulating Security Payload (ESP) provides message content confidentiality & limitedtraffic flow confidentiality can ...
Encapsulating Security PayloadFig-1. ESP Format
Encapsulating Security Payload Security Parameters Index (32 bits): Identifies a security association Sequence Number (3...
Anti-Replay Service A replay attack is one in which an attacker obtains a copy of an authenticatedpacket and later transm...
Anti-Replay Servicewith a default of W = 64Fig-2. Antireplay Mechanism
Transport vs Tunnel Mode ESP transport mode is used to encrypt & optionallyauthenticate IP data data protected but heade...
Transport vs Tunnel Mode ESPFig-3. Transport-Mode vs. Tunnel-Mode Encryption
Transport vs Tunnel Mode ESPFig-4. Scope of ESP Encryption and Authentication
Combining Security Associations SA’s can implement either AH or ESP to implement both need to combine SA’s form a secur...
Authentication Plus ConfidentialityTransmitting IP packet that has both confidentiality and authentication betweenhosts1) ...
Basic Combinations of Security AssociationsFig-5. Basic Combinations of Security Associations
Key Management handles key generation & distribution typically need 2 pairs of keys 2 per direction for AH & ESP manua...
ReferencesCryptography and Network Security Principles and Practices, 4th Ed - WilliamStallings
THANK YOU
Upcoming SlideShare
Loading in …5
×

IP Security

5,386 views

Published on

Published in: Technology
0 Comments
11 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
5,386
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
550
Comments
0
Likes
11
Embeds 0
No embeds

No notes for slide

IP Security

  1. 1. PRESENTED BY:KESHAB NATHIP SECURITY
  2. 2. OUTLINE IP SECURITY OVERVIEW IP SECURITY ARCHITECTURE AUTHENTICATION HEADER ENCAPSULATING SECURITY PAYLOAD COMBINING SECURITY ASSOCIATIONS KEY MANAGEMENT
  3. 3. IP Security OverviewThe standard Internet communication protocol iscompletely unprotected, allowing hosts to inspect ormodify data in transit. Adding IPSec to the systemwill resolve this limitation by providing strongencryption, integrity, authentication and replayprotection.
  4. 4. What Security Problem?Todays Internet is primarily comprised of : Public Un-trusted Unreliable IP networksBecause of this inherent lack of security,the Internet is subject to various types ofthreats…
  5. 5. Internet Threats Data integrityThe contents of a packet can be accidentally ordeliberately modified. Identity spoofingThe origin of an IP packet can be forged. Anti-reply attacksUnauthorized data can be retransmitted. Loss of privacyThe contents of a packet can be examined intransit.
  6. 6. Security at What Level?Application LayerTransport LayerNetwork LayerData Link LayerPGP, Kerberos, SSH, etc.Transport Layer Security (TLS)IP SecurityHardware encryption
  7. 7. Encapsulation of Data for Network DeliveryApplication LayerOriginalMessage
  8. 8. Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageData 3Transport Layer(TCP, UDP)
  9. 9. Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageTransportLayer(TCP, UDP)Header 3 Data 3
  10. 10. Encapsulation of Data for Network DeliveryNetwork Layer(IP)OriginalMessageApplication LayerData 3Header 3TransportLayer(TCP, UDP)Data 2
  11. 11. Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageHeader 3 Data 3Data 2TransportLayer(TCP, UDP)Network Layer(IP)Header 2
  12. 12. Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageData 3Header 3Data 2Header 2TransportLayer(TCP, UDP)Network Layer(IP)Data 1Data LinkLayer
  13. 13. Encapsulation of Data for Network DeliveryApplication LayerOriginalMessageData 3Header 3Data 2Header 2TransportLayer(TCP, UDP)Network Layer(IP)Data 1Data LinkLayerHeader 1
  14. 14. Packet Sent by Host AData 1Header 1PacketData LinkLayer
  15. 15. Network LayerData Link LayerPacket Received by intermediary Router
  16. 16. Data 1Header 1De-capsulation of Data from Network DeliveryData LinkLayer
  17. 17. De-capsulation of Data from Network DeliveryData 1Data LinkLayer
  18. 18. De-capsulation of Data from Network DeliveryData 2Header 2Network Layer(IP)
  19. 19. De-capsulation of Data from Network DeliveryData 2Network Layer(IP)
  20. 20. De-capsulation of Data from Network DeliveryData 3Header 3Transport Layer(TCP, UDP)
  21. 21. De-capsulation of Data from Network DeliveryData 3Transport Layer(TCP, UDP)
  22. 22. De-capsulation of Data from Network DeliveryOriginalMessageApplication Layer
  23. 23. IP SECURITYIP-level security encompasses three functional areas: Authentication Confidentiality Key management
  24. 24. IP SECURITYAuthentication- The authentication mechanismensures that the received packet was sent by theidentified source. It also assures that the packet hasnot been altered in transit.Confidentiality- The confidentiality facility enablescommunicating nodes to encrypt messages toprevent eavesdopping by third parties.Key management- It is concerned with secureexchange of keys
  25. 25. IP Security Scenario
  26. 26. Applications of IP SecuritySecure branch office connectivity over the Internet.Secure remote access over the Internet.Establishing extranet and intranet connectivity withpartners.Enhancing electronic commerce security.
  27. 27. Benefits of IPsecProvides strong security when implemented in afirewall or router that can be applied to all trafficcrossing the perimeter.IPsec is resistant to bypass if all traffic from theoutside must use IP and the firewall is the onlyway of entrance from the Internet into theorganization. Is below transport layer, hence transparent toapplications.Can be transparent to end users.Can provide security for individual users ifneeded.
  28. 28. IPsec Documents Architecture – Covers the general concept securityrequirements, definitions, and mechanisms defining IPsec technology. Authentication Header(AH)- An extension header to provide messageauthentication. Current specification is RFC 4302. Encapsulating Security Payload- Consists of an encapsulating header andtrailer used to provide encryption or combinedencryption/authentication. Current specification is RFC 4303. Internet Key Exchange(IKE)- A collection of documents describing thekey management schemes for use with IPsec. Cryptographic algorithms- Includes a large set of documents that defineand describe cryptographic algorithms for encryption, messageauthentication, pseudo random functions, and cryptographic keyexchange. Domain of Interpretation- Contains values needed for the otherdocuments to relate to each other. These include identifiers for approvedencryption and authentication algorithms, as well as operationalparameters such as key lifetime
  29. 29. IPSec Document Overview
  30. 30. IPSec Security ServicesConnectionless integrityAssurance that received traffic has not beenmodified. Integrity includes anti-reply defenses. Data origin authenticationAssurance that traffic is sent by legitimate party or parties.Confidentiality (encryption)Assurance that user’s traffic is not examined by non-authorizedparties.Access controlPrevention of unauthorized use of a resource.Limited traffic flow confidentiality
  31. 31. Security Associations A one-way relationship between a sender and a receiver that affordssecurity services to the traffic carried on it.A security association is uniquely identified by three parameters: Security Parameters Index (SPI): A bit string assigned to thisSA and having local significance only. The SPI is carried in AH andESP headers to enable the receiving system to select the SA underwhich a received packet will be processed. IP Destination Address: Currently, only unicast addresses areallowed; this is the address of the destination endpoint of theSA, which may be an end user system or a network system such as afirewall or router. Security Protocol Identifier: This indicates whether theassociation is an AH or ESP security association
  32. 32. Security Association ParametersSecurity Association Database defines the parameters associatedwith each SA. A security association is normally defined by thefollowing parameters: Sequence Number Counter: A 32-bit value used to generate theSequence Number field in AH or ESP headers. Sequence Counter Overflow: A flag indicating whether overflowof the Sequence Number Counter should generate an auditable eventand prevent further transmission of packets on this SA (required forall implementations). Anti-Replay Window: Used to determine whether an inbound AHor ESP packet is a replay. AH Information: Authentication algorithm, keys, keylifetimes, and related parameters being used with AH (required forAH implementations).
  33. 33. Security Association Parameters ESP Information: Encryption and authenticationalgorithm, keys, initialization values, key lifetimes, and relatedparameters being used with ESP (required for ESPimplementations). Lifetime of This Security Association: A time interval orbyte count after which an SA must be replaced with a new SA(and new SPI) or terminated, plus an indication of which of theseactions should occur (required for all implementations). IPSec Protocol Mode: Tunnel, transport, or wildcard (requiredfor all implementations). Path MTU: Any observed path maximum transmission unit(maximum size of a packet that can be transmitted withoutfragmentation) and aging variables (required for allimplementations).
  34. 34. Security Association SelectorsThe means by which IP traffic is related to specific SAs (or no SA inthe case of traffic allowed to bypass IPSec) is the nominal SecurityPolicy Database (SPD).The following selectors determine an SPD entry: Destination IP Address: This may be a single IP address, anenumerated list or range of addresses, or a wildcard (mask) address.The latter two are required to support more than one destinationsystem sharing the same SA (e.g., behind a firewall). Source IP Address: This may be a single IP address, anenumerated list or range of addresses, or a wildcard (mask) address.The latter two are required to support more than one source systemsharing the same SA (e.g., behind a firewall). UserID: A user identifier from the operating system. This is not afield in the IP or upper-layer headers but is available if IPSec isrunning on the same operating system as the user.
  35. 35. Security Association Selectors Data Sensitivity Level: Used for systemsproviding information flow security (e.g., Secret orUnclassified). Transport Layer Protocol: Obtained from theIPv4 Protocol or IPv6 Next Header field. This may bean individual protocol number, a list of protocolnumbers, or a range of protocol numbers. Source and Destination Ports: These may beindividual TCP or UDP port values, an enumeratedlist of ports, or a wildcard port.
  36. 36. IPSec Modes of Operation Both AH and ESP supports two modes of use: Transport mode –Provides protection primarily forupper layer protocols.ESP in transport modeencrypts and optionally authenticates the IP payloadbut not the IP header. AH authenticates the IPpayload and selected portions of the IP header. Tunnel mode - Provides protection to the entire IPpacket. After the AH or ESP fields are added to the IPpacket, the entire packet plus security fields istreated as payload of new outer packet with a newouter IP header.
  37. 37. IPSec Modes of Operation Transport Mode: protect the upper layer protocolsIPHeaderTCPHeaderDataOriginal IPDatagramIPHeaderTCPHeaderIPSecHeaderDataTransport Modeprotected packet• Tunnel Mode: protect the entire IP payloadTunnel Modeprotected packetNew IPHeaderTCPHeaderIPSecHeaderDataOriginalIPHeaderprotectedprotected
  38. 38. Transport mode vs. Tunnel mode functionalitiesTransport ModeSATunnel ModeSAAH Authenticates IP payloadand selected portions of IPheader and IPv6 extensionheadersAuthenticates entireinner IP packet plusselected portions ofouter IP headerESP Encrypts IP payload andany IPv6 extesion headerEncrypts inner IP packetESP withauthenticationEncrypts IP payload andany IPv6 extesion header.Authenticates IP payloadbut no IP headerEncrypts inner IPpacket. Authenticatesinner IP packet.
  39. 39. Authentication HeaderProvides support for data integrity andauthentication of IP packets.Authentication is based on the use of a messageauthentication code (MAC), hence the two partiesmust share a secret key.
  40. 40. Authentication HeaderThe Authentication Header consists of the following fields : Next Header (8 bits): Identifies the type of headerimmediately following this header. Payload Length (8 bits): Length of AuthenticationHeader in 32-bit words, minus 2. Reserved (16 bits): For future use. Security Parameters Index (32 bits): Identifies asecurity association.Sequence Number (32 bits): A monotonicallyincreasing counter value Authentication Data (variable): A variable-length field(must be an integral number of 32-bit words) thatcontains the Integrity Check Value (ICV), or MAC
  41. 41. Authentication Header
  42. 42. Encapsulating Security Payload (ESP) provides message content confidentiality & limitedtraffic flow confidentiality can optionally provide the same authenticationservices as AH Because message authentication is provided byESP, the use of AH is deprecated supports range of ciphers, modes, padding incl. DES, Triple-DES, RC5, IDEA, CAST etc CBC & other modes padding needed to fill blocksize, fields, for traffic flow
  43. 43. Encapsulating Security PayloadFig-1. ESP Format
  44. 44. Encapsulating Security Payload Security Parameters Index (32 bits): Identifies a security association Sequence Number (32 bits): A monotonically increasing counter value; thisprovides an anti-replay function Payload Data (variable): This is a transport-level segment (transport mode) orIP packet (tunnel mode) that is protected by encryption Padding (0–255 bytes): for various reasons Pad Length (8 bits): Indicates the number of pad bytes immediately precedingthis field Next Header (8 bits): Identifies the type of data contained in the payload datafield by identifying the first header in that payload Integrity Check Value (variable): A variable-length field that contains theIntegrity Check Value computed over the ESP packet minus the AuthenticationData field
  45. 45. Anti-Replay Service A replay attack is one in which an attacker obtains a copy of an authenticatedpacket and later transmits it to the intended destination. The receipt ofduplicate, authenticated IP packets may disrupt service in some way or mayhave some other undesired consequence. The Sequence Number field is designed to thwart such attacks. When a new SA is established, the sender initializes a sequence numbercounter to 0. If anti-replay is enabled (the default), the sender must not allow the sequencenumber to cycle past 232 -1 back to zero. Otherwise, there would be multiplevalid packets with the same sequence number. If the limit of 2 32 -1 isreached, the sender should terminate this SA and negotiate a new SA with a newkey.
  46. 46. Anti-Replay Servicewith a default of W = 64Fig-2. Antireplay Mechanism
  47. 47. Transport vs Tunnel Mode ESP transport mode is used to encrypt & optionallyauthenticate IP data data protected but header left in clear can do traffic analysis but is efficient good for ESP host to host traffic tunnel mode encrypts entire IP packet add new header for next hop good for VPNs, gateway to gateway security
  48. 48. Transport vs Tunnel Mode ESPFig-3. Transport-Mode vs. Tunnel-Mode Encryption
  49. 49. Transport vs Tunnel Mode ESPFig-4. Scope of ESP Encryption and Authentication
  50. 50. Combining Security Associations SA’s can implement either AH or ESP to implement both need to combine SA’s form a security association bundle may terminate at different or same endpoints combined by transport adjacency iterated tunneling issue of authentication & encryption order
  51. 51. Authentication Plus ConfidentialityTransmitting IP packet that has both confidentiality and authentication betweenhosts1) ESP with Authentication Option: Authentication after encryption usingTransport mode ESP or Tunnel mode ESP.2) Transport Adjacency: Another way to apply Authentication after encryption Use two bundled transport SAs, with the inner being an ESP SA and the outerbeing an AH SA. Here ESP is used without authentication option.Advantage: Authentication covers more fields, including the source anddestination IP addresses.Disadvantage: Overhead of two SAs vs one SA.3) Transport-Tunnel Bundle: Authentication before encryption Use a bundle consisting of an inner AH transport SA and an outer ESP tunnelSA.Advantages:a) Impossible to intercept the message and alter the authentication data withoutdetection.b) Authentication information with the message may be stored at the destinationfor later references.
  52. 52. Basic Combinations of Security AssociationsFig-5. Basic Combinations of Security Associations
  53. 53. Key Management handles key generation & distribution typically need 2 pairs of keys 2 per direction for AH & ESP manual key management System administrator manually configures every system automated key management automated system for on demand creation of keys for SA’s inlarge systems has Oakley & ISAKMP elements
  54. 54. ReferencesCryptography and Network Security Principles and Practices, 4th Ed - WilliamStallings
  55. 55. THANK YOU

×