SlideShare a Scribd company logo
1 of 47
UNIT – VI
Network Security –II
Topics:
Security at Network Layer
IPSec
System Security
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IP Security
 IP SECURITY OVERVIEW
 IP SECURITY ARCHITECTURE
 AUTHENTICATION HEADER
 ENCAPSULATING SECURITY PAYLOAD
 COMBINING SECURITY ASSOCIATIONS
 KEY MANAGEMENT
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IP Security Overview
The standard Internet communication
protocol is completely unprotected, allowing hosts
to inspect or modify data in transit. Adding IPSec to
the system will resolve this limitation by providing
strong encryption, integrity, authentication and
replay protection.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
What Security Problem?
Today's Internet is primarily comprised of :
 Public
 Un-trusted
 Unreliable IP networks
Because of this inherent lack of security,
the Internet is subject to various types of threats…
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Internet Threats
 Data integrity
The contents of a packet can be accidentally or
deliberately modified.
 Identity spoofing
The origin of an IP packet can be forged.
 Anti-reply attacks
Unauthorized data can be retransmitted.
 Loss of privacy
The contents of a packet can be examined in
transit.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Security at What Level?
Application Layer
Transport Layer
Network Layer
Data Link Layer
PGP, Kerberos, SSH, etc.
Transport Layer Security (TLS)
IP Security
Hardware encryption
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IP SECURITY
IP-level security encompasses three functional areas:
 Authentication
 Confidentiality
 Key management
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IP SECURITY
Authentication- The authentication mechanism
ensures that the received packet was sent by the
identified source. It also assures that the packet has
not been altered in transit.
Confidentiality- The confidentiality facility enables
communicating nodes to encrypt messages to
prevent eavesdopping by third parties.
Key management- It is concerned with secure
exchange of keys
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IP Security Scenario
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Applications of IP Security
Secure branch office connectivity over the Internet.
Secure remote access over the Internet.
Establishing extranet and intranet connectivity with
partners.
Enhancing electronic commerce security.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Benefits of IPsec
Provides strong security when implemented in a
firewall or router that can be applied to all traffic
crossing the perimeter.
IPsec is resistant to bypass if all traffic from the
outside must use IP and the firewall is the only
way of entrance from the Internet into the
organization.
 Is below transport layer, hence transparent to
applications.
Can be transparent to end users.
Can provide security for individual users if
needed.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IPsec Documents
 Architecture – Covers the general concept security
requirements, definitions, and mechanisms defining IPsec technology.
 Authentication Header(AH)- An extension header to provide message
authentication. Current specification is RFC 4302.
 Encapsulating Security Payload- Consists of an encapsulating header and
trailer used to provide encryption or combined
encryption/authentication. Current specification is RFC 4303.
 Internet Key Exchange(IKE)- A collection of documents describing the
key management schemes for use with IPsec.
 Cryptographic algorithms- Includes a large set of documents that define
and describe cryptographic algorithms for encryption, message
authentication, pseudo random functions, and cryptographic key
exchange.
 Domain of Interpretation- Contains values needed for the other
documents to relate to each other. These include identifiers for approved
encryption and authentication algorithms, as well as operational
parameters such as key lifetime
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IPSec Document Overview
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IPSec Security Services
Connectionless integrity
Assurance that received traffic has not been
modified. Integrity includes anti-reply defenses.
 Data origin authentication
Assurance that traffic is sent by legitimate party or parties.
Confidentiality (encryption)
Assurance that user’s traffic is not examined by non-authorized
parties.
Access control
Prevention of unauthorized use of a resource.
Limited traffic flow confidentiality
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Security Associations
 A one-way relationship between a sender and a receiver that affords
security services to the traffic carried on it.
A security association is uniquely identified by three parameters:
 Security Parameters Index (SPI): A bit string assigned to this
SA and having local significance only. The SPI is carried in AH and
ESP headers to enable the receiving system to select the SA under
which a received packet will be processed.
 IP Destination Address: Currently, only unicast addresses are
allowed; this is the address of the destination endpoint of the
SA, which may be an end user system or a network system such as a
firewall or router.
 Security Protocol Identifier: This indicates whether the
association is an AH or ESP security association
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Security Association Parameters
Security Association Database defines the parameters associated
with each SA. A security association is normally defined by the
following parameters:
 Sequence Number Counter: A 32-bit value used to generate the
Sequence Number field in AH or ESP headers.
 Sequence Counter Overflow: A flag indicating whether overflow
of the Sequence Number Counter should generate an auditable event
and prevent further transmission of packets on this SA (required for
all implementations).
 Anti-Replay Window: Used to determine whether an inbound AH
or ESP packet is a replay.
 AH Information: Authentication algorithm, keys, key
lifetimes, and related parameters being used with AH (required for
AH implementations).
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Security Association Parameters
 ESP Information: Encryption and authentication
algorithm, keys, initialization values, key lifetimes, and related
parameters being used with ESP (required for ESP
implementations).
 Lifetime of This Security Association: A time interval or
byte count after which an SA must be replaced with a new SA
(and new SPI) or terminated, plus an indication of which of these
actions should occur (required for all implementations).
 IPSec Protocol Mode: Tunnel, transport, or wildcard (required
for all implementations).
 Path MTU: Any observed path maximum transmission unit
(maximum size of a packet that can be transmitted without
fragmentation) and aging variables (required for all
implementations).
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Security Association Selectors
The means by which IP traffic is related to specific SAs (or no SA in
the case of traffic allowed to bypass IPSec) is the nominal Security
Policy Database (SPD).
The following selectors determine an SPD entry:
Destination IP Address: This may be a single IP address, an
enumerated list or range of addresses, or a wildcard (mask) address.
The latter two are required to support more than one destination
system sharing the same SA (e.g., behind a firewall).
Source IP Address: This may be a single IP address, an
enumerated list or range of addresses, or a wildcard (mask) address.
The latter two are required to support more than one source system
sharing the same SA (e.g., behind a firewall).
UserID: A user identifier from the operating system. This is not a
field in the IP or upper-layer headers but is available if IPSec is
running on the same operating system as the user.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Security Association Selectors
 Data Sensitivity Level: Used for systems
providing information flow security (e.g., Secret or
Unclassified).
 Transport Layer Protocol: Obtained from the
IPv4 Protocol or IPv6 Next Header field. This may be
an individual protocol number, a list of protocol
numbers, or a range of protocol numbers.
 Source and Destination Ports: These may be
individual TCP or UDP port values, an enumerated
list of ports, or a wildcard port.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IPSec Modes of Operation
 Both AH and ESP supports two modes of use:
 Transport mode –Provides protection primarily for
upper layer protocols.ESP in transport mode
encrypts and optionally authenticates the IP payload
but not the IP header. AH authenticates the IP
payload and selected portions of the IP header.
 Tunnel mode - Provides protection to the entire IP
packet. After the AH or ESP fields are added to the IP
packet, the entire packet plus security fields is
treated as payload of new outer packet with a new
outer IP header.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IPSec Modes of Operation
IP
Header
TCP
Header
Data
IP
Header
IPSec
Header
TCP
Header
Data
New IP
Header
IPSec
Header
Original
IP
Header
TCP
Header
Data
 Transport Mode: protect the upper layer protocols
Original IP
Datagram
Transport Mode
protected packet
protected
 Tunnel Mode: protect the entire IP payload
Tunnel Mode
protected packet
protected
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Transport mode vs. Tunnel mode functionalities
Transport Mode
SA
Tunnel Mode
SA
AH Authenticates IP payload
and selected portions of
IP header and IPv6
extension headers
Authenticates entire
inner IP packet plus
selected portions of
outer IP header
ESP Encrypts IP payload and
any IPv6 extesion
header
Encrypts inner IP
packet
ESP with
authentication
Encrypts IP payload and
any IPv6 extesion
header. Authenticates
IP payload but no IP
header
Encrypts inner IP
packet.
Authenticates inner
IP packet.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Authentication Header
Provides support for data integrity and
authentication of IP packets.
Authentication is based on the use of a message
authentication code (MAC), hence the two parties
must share a secret key.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Authentication Header
The Authentication Header consists of the following fields :
 Next Header (8 bits): Identifies the type of header
immediately following this header.
 Payload Length (8 bits): Length of Authentication
Header in 32-bit words, minus 2.
 Reserved (16 bits): For future use.
 Security Parameters Index (32 bits): Identifies a
security association.
Sequence Number (32 bits): A monotonically
increasing counter value
 Authentication Data (variable): A variable-length field
(must be an integral number of 32-bit words) that
contains the Integrity Check Value (ICV), or MAC
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Authentication Header
Fig: Authentication Header
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Encapsulating Security Payload (ESP)
 provides message content confidentiality & limited
traffic flow confidentiality
 can optionally provide the same authentication
services as AH
 Because message authentication is provided by
ESP, the use of AH is deprecated
 supports range of ciphers, modes, padding
 incl. DES, Triple-DES, RC5, IDEA, CAST etc
 CBC & other modes
 padding needed to fill blocksize, fields, for traffic flow
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Encapsulating Security Payload
Fig ESP Format
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Encapsulating Security Payload
 Security Parameters Index (32 bits): Identifies a security association
 Sequence Number (32 bits): A monotonically increasing counter value; this
provides an anti-replay function
 Payload Data (variable): This is a transport-level segment (transport mode) or
IP packet (tunnel mode) that is protected by encryption
 Padding (0–255 bytes): for various reasons
 Pad Length (8 bits): Indicates the number of pad bytes immediately preceding
this field
 Next Header (8 bits): Identifies the type of data contained in the payload data
field by identifying the first header in that payload
 Integrity Check Value (variable): A variable-length field that contains the
Integrity Check Value computed over the ESP packet minus the Authentication
Data field
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Transport vs Tunnel Mode ESP
 transport mode is used to encrypt & optionally
authenticate IP data
 data protected but header left in clear
 can do traffic analysis but is efficient
 good for ESP host to host traffic
 tunnel mode encrypts entire IP packet
 add new header for next hop
 good for VPNs, gateway to gateway security
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Transport vs Tunnel Mode ESP
Fig: Transport-Mode vs. Tunnel-Mode Encryption
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Transport vs Tunnel Mode ESP
Fig: Scope of ESP Encryption and Authentication
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Combining Security Associations
 SA’s can implement either AH or ESP
 to implement both need to combine SA’s
 form a security association bundle
 may terminate at different or same endpoints
 combined by
 transportadjacency
 iterated tunneling
 issue of authentication & encryption order
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Authentication Plus Confidentiality
Transmitting IP packet that has both confidentiality and authentication between
hosts
1) ESP with Authentication Option: Authentication after encryption using
Transport mode ESP or Tunnel mode ESP.
2) Transport Adjacency: Another way to apply Authentication after encryption
 Use two bundled transport SAs, with the inner being an ESP SA and the outer
being an AH SA.
 Here ESP is used without authentication option.
Advantage: Authentication covers more fields, including the source and
destination IP addresses.
Disadvantage: Overhead of two SAs vs one SA.
3) Transport-Tunnel Bundle: Authentication before encryption
 Use a bundle consisting of an inner AH transport SA and an outer ESP tunnel
SA.
Advantages:
a) Impossible to intercept the message and alter the authentication data without
detection.
b) Authentication information with the message may be stored at the destination
for later references.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Basic Combinations of Security Associations
Fig: Basic Combinations of Security Associations
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Key Management
 handles key generation & distribution
 typically need 2 pairs of keys
 2 per direction for AH & ESP
 manual key management
 System administrator manually configures every system
 automated key management
 automated system for on demand creation of keys for
SA’s in large systems
 has Oakley & ISAKMP elements
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Internet Security Association and Key
Management Protocol (ISAKMP)
 ISAKMP provides a framework for Internet key
management and provides the specific protocol.
 support, including formats, for negotiation of
security attributes.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
ISAKMP Header Format
 An ISAKMP message consists of an ISAKMP header followed by one
or more payloads. All of this is
 carried in a transport protocol. The specification dictates that
implementations must support the use of UDP for the transport
protocol.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
ISAKMP consists of the following fields:
 Initiator Cookie (64 bits): Cookie of entity that initiated SA
establishment, SA notification, or SA deletion.
 Responder Cookie (64 bits): Cookie of responding entity; null in
first message from initiator.
 Next Payload (8 bits): Indicates the type of the first payload in
the message
 Major Version (4 bits): Indicates major version of ISAKMP in use.
 Minor Version (4 bits): Indicates minor version in use.
 Exchange Type (8 bits): Indicates the type of exchange.
 Flags (8 bits): Indicates specific options set for this ISAKMP
exchange.
 Message ID (32 bits):Unique ID for this message.
 Length (32 bits): Length of total message (header plus all
payloads) in octets.
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Objective type questions
The ……………. is used to provide integrity check, authentication, and encryption to IP
datagram.
A) SSL B) ESP
C) TSL D) PSL B) ESP
 In ……………………. mode, a common technique in packet-switched networks consist
of wrapping a packet in a new one.
A) Tunneling
B) Encapsulation
C) Both A and B
D) None of the above C) Both A and B
The …………………………. is a collection of protocols designed by Internet Engineering
Task Force(IETF) to provide security for a packet at the Network level.
A) Ipsec B) Netsec
C) Packetsec D) Protocolsec
A) IPsec
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
…………….. mode is used whenever either end of a security the association is
the gateway.
A) Tunnel
B) Encapsulating
C) Transport
D) Gateway
A) Tunnel
IPSec defines two protocols: _______ and ________.
A) AH; SSL B) PGP; ESP
C) AH; ESP D) all of the above
A) AH; SSL
In the ______ mode, IPSec protects information delivered from the transport
layer to the network layer.
A) transport B) tunnel
C) either (a) or (b) D) neither (a) nor (b)
A) transport
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
An _________ is a network that allows authorized access from outside users.
A) intranet B) internet
C) extranet D) none of the above
C) extranet
_________ is a collection of protocols designed by the IETF (Internet
Engineering Task Force) to provide security for a packet at the network level.
A) IPSec B) SSL
C) PGP D) none of the above
A) IPSec
IPSec uses a set of SAs called the ________.
A) SAD B) SAB
C) SADB D) none of the above
C) SADB
IPSec in the ______ mode does not protect the IP header.
A) transport B) tunnel
C) either (a) or (b) D) neither (a) nor (b)
A) transport
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
________ provides privacy, integrity, and authentication in e-mail.
A) IPSec B) SSL
C) PGP D) none of the above
C) PGP
______ provides authentication at the IP level.
A) AH B) ESP
C) PGP D) SSL
A) AH
______ is designed to provide security and compression services to data generated
from the application layer.
A) SSL B) TLS
C) either (a) or (b) D) both (a) and (b)
D) both (a) and (b)
In the _______ mode, IPSec protects the whole IP packet, including the original IP
header.
A) transport B) tunnel
C) either (a) or (b) D) neither (a) nor (b)
B) tunnel
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IPSec is designed to provide security at the _________
a) Transport layer b) Network layer
c) Application layer d) Session layer
b) Network layer
In tunnel mode, IPSec protects the ______
a) Entire IP packet b) IP header
c) IP payload d) IP trailer
a) Entire IP packet
Which component is included in IP security?
a) Authentication Header (AH) b) Encapsulating Security Payload (ESP)
c) Internet key Exchange (IKE) d) All of the mentioned
d) All of the mentioned
 An attempt to make a computer resource unavailable to its intended users is
called ______
a) Denial-of-service attack b) Virus attack
c) Worms attack d) Botnet process
a) Denial-of-service attack
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
_________ is a collection of protocols designed by the IETF (Internet
Engineering Task Force) to provide security for a packet at the network level.
A)IPSec B)SSL
C) PGP D)none of the above
A)IPSec
_________ operates in the transport mode or the tunnel mode.
A)IPSec B)SSL
C)PGP D)none of the above
A)IPSec
In the ______ mode, IPSec protects information delivered from the transport
layer to the network layer.
A)Transport B)tunnel
C)either (a) or (b) D)neither (a) nor (b)
A)Transport
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
IPSec in the ______ mode does not protect the IP header.
A)transport B)tunnel
C)either (a) or (b) D)neither (a) nor (b)
A)transport
In the _______ mode, IPSec protects the whole IP packet, including the
original IP header.
A)Transport B)tunnel
C)either (a) or (b) D)neither (a) nor (b)
B)tunnel
IPSec defines two protocols: _______ and ________.
A)AH; SSL B)PGP; ESP
C)AH; ESP D)none of the above
C)AH; ESP
______ provides either authentication or encryption, or both, for packets at
the IP level.
A)AH B)ESP
C)PGP D)SSL
B)ESP
DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
Previous Questions
1. Illustrate the services provided by IPSec. [3] Oct/Nov - 2018
2. Write short note on tunnel mode in IP security. [3] Oct/Nov - 2018
3. What is Internet key management in IPSec? [3] Oct/Nov - 2018
4. Write about ESP? [3] Oct/Nov - 2018
5. Draw the IP security authentication header and describe the
functions of each field. [8] Oct/Nov - 2018
6. What is transport mode and tunnel mode authentication in IP?
Describe how ESP is applied to both these modes. [8] Oct/Nov -
2018
7. Describe IP security Architecture. [8] Oct/Nov - 2018
1. 8. Define security policy and explain its purpose with relation to
IPsec. [3] Oct/Nov - 2019
2. 9. Distinguish two modes of IPsec. [2] Oct/Nov - 2019
3. 10. What is IPSec? Explain the operation of IPSec in transport
mode and tunnel mode. [7] Explain ISAKMP protocol. [7]
Oct/Nov - 2019
4. 11. What is IPSec? Explain AH and ESP protocols of IPsec. [14]
Oct/Nov - 2019
5. 12. Explain Authentication Header protocol of IPSec. [7]
Oct/Nov - 2019
6. 13. Explain Security Policy of IPSec. [7] Oct/Nov - 2019

More Related Content

Similar to Network Security - II: IPSec, System Security

Web security
Web securityWeb security
Web securityLayla Tk
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Edureka!
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec bigchill29
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol securityAnkit Anand
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networksAlexander Decker
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networksAlexander Decker
 

Similar to Network Security - II: IPSec, System Security (20)

Web security
Web securityWeb security
Web security
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
Websecurity
Websecurity Websecurity
Websecurity
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Ch16
Ch16Ch16
Ch16
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
IP Security
IP SecurityIP Security
IP Security
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Multilayer security mechanism in computer networks
Multilayer security mechanism in computer networksMultilayer security mechanism in computer networks
Multilayer security mechanism in computer networks
 
11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks11.multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

Network Security - II: IPSec, System Security

  • 1. UNIT – VI Network Security –II Topics: Security at Network Layer IPSec System Security DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 2. IP Security  IP SECURITY OVERVIEW  IP SECURITY ARCHITECTURE  AUTHENTICATION HEADER  ENCAPSULATING SECURITY PAYLOAD  COMBINING SECURITY ASSOCIATIONS  KEY MANAGEMENT DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 3. IP Security Overview The standard Internet communication protocol is completely unprotected, allowing hosts to inspect or modify data in transit. Adding IPSec to the system will resolve this limitation by providing strong encryption, integrity, authentication and replay protection. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 4. What Security Problem? Today's Internet is primarily comprised of :  Public  Un-trusted  Unreliable IP networks Because of this inherent lack of security, the Internet is subject to various types of threats… DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 5. Internet Threats  Data integrity The contents of a packet can be accidentally or deliberately modified.  Identity spoofing The origin of an IP packet can be forged.  Anti-reply attacks Unauthorized data can be retransmitted.  Loss of privacy The contents of a packet can be examined in transit. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 6. Security at What Level? Application Layer Transport Layer Network Layer Data Link Layer PGP, Kerberos, SSH, etc. Transport Layer Security (TLS) IP Security Hardware encryption DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 7. IP SECURITY IP-level security encompasses three functional areas:  Authentication  Confidentiality  Key management DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 8. IP SECURITY Authentication- The authentication mechanism ensures that the received packet was sent by the identified source. It also assures that the packet has not been altered in transit. Confidentiality- The confidentiality facility enables communicating nodes to encrypt messages to prevent eavesdopping by third parties. Key management- It is concerned with secure exchange of keys DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 9. IP Security Scenario DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 10. Applications of IP Security Secure branch office connectivity over the Internet. Secure remote access over the Internet. Establishing extranet and intranet connectivity with partners. Enhancing electronic commerce security. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 11. Benefits of IPsec Provides strong security when implemented in a firewall or router that can be applied to all traffic crossing the perimeter. IPsec is resistant to bypass if all traffic from the outside must use IP and the firewall is the only way of entrance from the Internet into the organization.  Is below transport layer, hence transparent to applications. Can be transparent to end users. Can provide security for individual users if needed. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 12. IPsec Documents  Architecture – Covers the general concept security requirements, definitions, and mechanisms defining IPsec technology.  Authentication Header(AH)- An extension header to provide message authentication. Current specification is RFC 4302.  Encapsulating Security Payload- Consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication. Current specification is RFC 4303.  Internet Key Exchange(IKE)- A collection of documents describing the key management schemes for use with IPsec.  Cryptographic algorithms- Includes a large set of documents that define and describe cryptographic algorithms for encryption, message authentication, pseudo random functions, and cryptographic key exchange.  Domain of Interpretation- Contains values needed for the other documents to relate to each other. These include identifiers for approved encryption and authentication algorithms, as well as operational parameters such as key lifetime DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 13. IPSec Document Overview DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 14. IPSec Security Services Connectionless integrity Assurance that received traffic has not been modified. Integrity includes anti-reply defenses.  Data origin authentication Assurance that traffic is sent by legitimate party or parties. Confidentiality (encryption) Assurance that user’s traffic is not examined by non-authorized parties. Access control Prevention of unauthorized use of a resource. Limited traffic flow confidentiality DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 15. Security Associations  A one-way relationship between a sender and a receiver that affords security services to the traffic carried on it. A security association is uniquely identified by three parameters:  Security Parameters Index (SPI): A bit string assigned to this SA and having local significance only. The SPI is carried in AH and ESP headers to enable the receiving system to select the SA under which a received packet will be processed.  IP Destination Address: Currently, only unicast addresses are allowed; this is the address of the destination endpoint of the SA, which may be an end user system or a network system such as a firewall or router.  Security Protocol Identifier: This indicates whether the association is an AH or ESP security association DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 16. Security Association Parameters Security Association Database defines the parameters associated with each SA. A security association is normally defined by the following parameters:  Sequence Number Counter: A 32-bit value used to generate the Sequence Number field in AH or ESP headers.  Sequence Counter Overflow: A flag indicating whether overflow of the Sequence Number Counter should generate an auditable event and prevent further transmission of packets on this SA (required for all implementations).  Anti-Replay Window: Used to determine whether an inbound AH or ESP packet is a replay.  AH Information: Authentication algorithm, keys, key lifetimes, and related parameters being used with AH (required for AH implementations). DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 17. Security Association Parameters  ESP Information: Encryption and authentication algorithm, keys, initialization values, key lifetimes, and related parameters being used with ESP (required for ESP implementations).  Lifetime of This Security Association: A time interval or byte count after which an SA must be replaced with a new SA (and new SPI) or terminated, plus an indication of which of these actions should occur (required for all implementations).  IPSec Protocol Mode: Tunnel, transport, or wildcard (required for all implementations).  Path MTU: Any observed path maximum transmission unit (maximum size of a packet that can be transmitted without fragmentation) and aging variables (required for all implementations). DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 18. Security Association Selectors The means by which IP traffic is related to specific SAs (or no SA in the case of traffic allowed to bypass IPSec) is the nominal Security Policy Database (SPD). The following selectors determine an SPD entry: Destination IP Address: This may be a single IP address, an enumerated list or range of addresses, or a wildcard (mask) address. The latter two are required to support more than one destination system sharing the same SA (e.g., behind a firewall). Source IP Address: This may be a single IP address, an enumerated list or range of addresses, or a wildcard (mask) address. The latter two are required to support more than one source system sharing the same SA (e.g., behind a firewall). UserID: A user identifier from the operating system. This is not a field in the IP or upper-layer headers but is available if IPSec is running on the same operating system as the user. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 19. Security Association Selectors  Data Sensitivity Level: Used for systems providing information flow security (e.g., Secret or Unclassified).  Transport Layer Protocol: Obtained from the IPv4 Protocol or IPv6 Next Header field. This may be an individual protocol number, a list of protocol numbers, or a range of protocol numbers.  Source and Destination Ports: These may be individual TCP or UDP port values, an enumerated list of ports, or a wildcard port. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 20. IPSec Modes of Operation  Both AH and ESP supports two modes of use:  Transport mode –Provides protection primarily for upper layer protocols.ESP in transport mode encrypts and optionally authenticates the IP payload but not the IP header. AH authenticates the IP payload and selected portions of the IP header.  Tunnel mode - Provides protection to the entire IP packet. After the AH or ESP fields are added to the IP packet, the entire packet plus security fields is treated as payload of new outer packet with a new outer IP header. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 21. IPSec Modes of Operation IP Header TCP Header Data IP Header IPSec Header TCP Header Data New IP Header IPSec Header Original IP Header TCP Header Data  Transport Mode: protect the upper layer protocols Original IP Datagram Transport Mode protected packet protected  Tunnel Mode: protect the entire IP payload Tunnel Mode protected packet protected DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 22. Transport mode vs. Tunnel mode functionalities Transport Mode SA Tunnel Mode SA AH Authenticates IP payload and selected portions of IP header and IPv6 extension headers Authenticates entire inner IP packet plus selected portions of outer IP header ESP Encrypts IP payload and any IPv6 extesion header Encrypts inner IP packet ESP with authentication Encrypts IP payload and any IPv6 extesion header. Authenticates IP payload but no IP header Encrypts inner IP packet. Authenticates inner IP packet. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 23. Authentication Header Provides support for data integrity and authentication of IP packets. Authentication is based on the use of a message authentication code (MAC), hence the two parties must share a secret key. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 24. Authentication Header The Authentication Header consists of the following fields :  Next Header (8 bits): Identifies the type of header immediately following this header.  Payload Length (8 bits): Length of Authentication Header in 32-bit words, minus 2.  Reserved (16 bits): For future use.  Security Parameters Index (32 bits): Identifies a security association. Sequence Number (32 bits): A monotonically increasing counter value  Authentication Data (variable): A variable-length field (must be an integral number of 32-bit words) that contains the Integrity Check Value (ICV), or MAC DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 25. Authentication Header Fig: Authentication Header DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 26. Encapsulating Security Payload (ESP)  provides message content confidentiality & limited traffic flow confidentiality  can optionally provide the same authentication services as AH  Because message authentication is provided by ESP, the use of AH is deprecated  supports range of ciphers, modes, padding  incl. DES, Triple-DES, RC5, IDEA, CAST etc  CBC & other modes  padding needed to fill blocksize, fields, for traffic flow DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 27. Encapsulating Security Payload Fig ESP Format DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 28. Encapsulating Security Payload  Security Parameters Index (32 bits): Identifies a security association  Sequence Number (32 bits): A monotonically increasing counter value; this provides an anti-replay function  Payload Data (variable): This is a transport-level segment (transport mode) or IP packet (tunnel mode) that is protected by encryption  Padding (0–255 bytes): for various reasons  Pad Length (8 bits): Indicates the number of pad bytes immediately preceding this field  Next Header (8 bits): Identifies the type of data contained in the payload data field by identifying the first header in that payload  Integrity Check Value (variable): A variable-length field that contains the Integrity Check Value computed over the ESP packet minus the Authentication Data field DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 29. Transport vs Tunnel Mode ESP  transport mode is used to encrypt & optionally authenticate IP data  data protected but header left in clear  can do traffic analysis but is efficient  good for ESP host to host traffic  tunnel mode encrypts entire IP packet  add new header for next hop  good for VPNs, gateway to gateway security DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 30. Transport vs Tunnel Mode ESP Fig: Transport-Mode vs. Tunnel-Mode Encryption DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 31. Transport vs Tunnel Mode ESP Fig: Scope of ESP Encryption and Authentication DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 32. Combining Security Associations  SA’s can implement either AH or ESP  to implement both need to combine SA’s  form a security association bundle  may terminate at different or same endpoints  combined by  transportadjacency  iterated tunneling  issue of authentication & encryption order DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 33. Authentication Plus Confidentiality Transmitting IP packet that has both confidentiality and authentication between hosts 1) ESP with Authentication Option: Authentication after encryption using Transport mode ESP or Tunnel mode ESP. 2) Transport Adjacency: Another way to apply Authentication after encryption  Use two bundled transport SAs, with the inner being an ESP SA and the outer being an AH SA.  Here ESP is used without authentication option. Advantage: Authentication covers more fields, including the source and destination IP addresses. Disadvantage: Overhead of two SAs vs one SA. 3) Transport-Tunnel Bundle: Authentication before encryption  Use a bundle consisting of an inner AH transport SA and an outer ESP tunnel SA. Advantages: a) Impossible to intercept the message and alter the authentication data without detection. b) Authentication information with the message may be stored at the destination for later references. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 34. Basic Combinations of Security Associations Fig: Basic Combinations of Security Associations DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 35. Key Management  handles key generation & distribution  typically need 2 pairs of keys  2 per direction for AH & ESP  manual key management  System administrator manually configures every system  automated key management  automated system for on demand creation of keys for SA’s in large systems  has Oakley & ISAKMP elements DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 36. Internet Security Association and Key Management Protocol (ISAKMP)  ISAKMP provides a framework for Internet key management and provides the specific protocol.  support, including formats, for negotiation of security attributes. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 37. ISAKMP Header Format  An ISAKMP message consists of an ISAKMP header followed by one or more payloads. All of this is  carried in a transport protocol. The specification dictates that implementations must support the use of UDP for the transport protocol. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 38. ISAKMP consists of the following fields:  Initiator Cookie (64 bits): Cookie of entity that initiated SA establishment, SA notification, or SA deletion.  Responder Cookie (64 bits): Cookie of responding entity; null in first message from initiator.  Next Payload (8 bits): Indicates the type of the first payload in the message  Major Version (4 bits): Indicates major version of ISAKMP in use.  Minor Version (4 bits): Indicates minor version in use.  Exchange Type (8 bits): Indicates the type of exchange.  Flags (8 bits): Indicates specific options set for this ISAKMP exchange.  Message ID (32 bits):Unique ID for this message.  Length (32 bits): Length of total message (header plus all payloads) in octets. DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 39. Objective type questions The ……………. is used to provide integrity check, authentication, and encryption to IP datagram. A) SSL B) ESP C) TSL D) PSL B) ESP  In ……………………. mode, a common technique in packet-switched networks consist of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above C) Both A and B The …………………………. is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) Ipsec B) Netsec C) Packetsec D) Protocolsec A) IPsec DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 40. …………….. mode is used whenever either end of a security the association is the gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway A) Tunnel IPSec defines two protocols: _______ and ________. A) AH; SSL B) PGP; ESP C) AH; ESP D) all of the above A) AH; SSL In the ______ mode, IPSec protects information delivered from the transport layer to the network layer. A) transport B) tunnel C) either (a) or (b) D) neither (a) nor (b) A) transport DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 41. An _________ is a network that allows authorized access from outside users. A) intranet B) internet C) extranet D) none of the above C) extranet _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level. A) IPSec B) SSL C) PGP D) none of the above A) IPSec IPSec uses a set of SAs called the ________. A) SAD B) SAB C) SADB D) none of the above C) SADB IPSec in the ______ mode does not protect the IP header. A) transport B) tunnel C) either (a) or (b) D) neither (a) nor (b) A) transport DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 42. ________ provides privacy, integrity, and authentication in e-mail. A) IPSec B) SSL C) PGP D) none of the above C) PGP ______ provides authentication at the IP level. A) AH B) ESP C) PGP D) SSL A) AH ______ is designed to provide security and compression services to data generated from the application layer. A) SSL B) TLS C) either (a) or (b) D) both (a) and (b) D) both (a) and (b) In the _______ mode, IPSec protects the whole IP packet, including the original IP header. A) transport B) tunnel C) either (a) or (b) D) neither (a) nor (b) B) tunnel DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 43. IPSec is designed to provide security at the _________ a) Transport layer b) Network layer c) Application layer d) Session layer b) Network layer In tunnel mode, IPSec protects the ______ a) Entire IP packet b) IP header c) IP payload d) IP trailer a) Entire IP packet Which component is included in IP security? a) Authentication Header (AH) b) Encapsulating Security Payload (ESP) c) Internet key Exchange (IKE) d) All of the mentioned d) All of the mentioned  An attempt to make a computer resource unavailable to its intended users is called ______ a) Denial-of-service attack b) Virus attack c) Worms attack d) Botnet process a) Denial-of-service attack DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 44. _________ is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level. A)IPSec B)SSL C) PGP D)none of the above A)IPSec _________ operates in the transport mode or the tunnel mode. A)IPSec B)SSL C)PGP D)none of the above A)IPSec In the ______ mode, IPSec protects information delivered from the transport layer to the network layer. A)Transport B)tunnel C)either (a) or (b) D)neither (a) nor (b) A)Transport DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 45. IPSec in the ______ mode does not protect the IP header. A)transport B)tunnel C)either (a) or (b) D)neither (a) nor (b) A)transport In the _______ mode, IPSec protects the whole IP packet, including the original IP header. A)Transport B)tunnel C)either (a) or (b) D)neither (a) nor (b) B)tunnel IPSec defines two protocols: _______ and ________. A)AH; SSL B)PGP; ESP C)AH; ESP D)none of the above C)AH; ESP ______ provides either authentication or encryption, or both, for packets at the IP level. A)AH B)ESP C)PGP D)SSL B)ESP DNR COLLEGE OF ENGINEERING & TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
  • 46. Previous Questions 1. Illustrate the services provided by IPSec. [3] Oct/Nov - 2018 2. Write short note on tunnel mode in IP security. [3] Oct/Nov - 2018 3. What is Internet key management in IPSec? [3] Oct/Nov - 2018 4. Write about ESP? [3] Oct/Nov - 2018 5. Draw the IP security authentication header and describe the functions of each field. [8] Oct/Nov - 2018 6. What is transport mode and tunnel mode authentication in IP? Describe how ESP is applied to both these modes. [8] Oct/Nov - 2018 7. Describe IP security Architecture. [8] Oct/Nov - 2018
  • 47. 1. 8. Define security policy and explain its purpose with relation to IPsec. [3] Oct/Nov - 2019 2. 9. Distinguish two modes of IPsec. [2] Oct/Nov - 2019 3. 10. What is IPSec? Explain the operation of IPSec in transport mode and tunnel mode. [7] Explain ISAKMP protocol. [7] Oct/Nov - 2019 4. 11. What is IPSec? Explain AH and ESP protocols of IPsec. [14] Oct/Nov - 2019 5. 12. Explain Authentication Header protocol of IPSec. [7] Oct/Nov - 2019 6. 13. Explain Security Policy of IPSec. [7] Oct/Nov - 2019