IPSec is an open standard protocol suite that provides security services like data confidentiality, integrity, and authentication for IP communications. It operates at the network layer and can be used to secure communication between hosts, network devices, and between hosts and devices. The key components of IPSec include Internet Key Exchange (IKE) for setting up Security Associations (SA), the Authentication Header (AH) for data integrity and authentication, and the Encapsulating Security Payload (ESP) for confidentiality, integrity, and authentication.
Overview of VPN protocols.
VPNs (Virtual Private Networks) are often viewed from the perspective of security with the goal of providing authentication and confidentiality.
However, the primary purpose of VPNs is to connect 2 topologically separated private networks over a public network (typically the Internet).
VPNs basically hook a network logically into another network so that both appear as one private local network.
Security is a possible add-on to VPNs. In many cases it makes perfectly sense to secure the VPNs communication over the unsecure public network.
VPN protocols typically employ a tunnel where data packets of the local network are encapsulated in an outer protocol for transmission over the public network.
The most important VPN protocols are IPSec, PPTP and L2TP. In recent years SSL/TLS based VPNs such as OpenVPN have gained widespread adoption.
IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include:
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishing extranet and intranet connectivity with partners
Enhancing electronic commerce security
Overview of VPN protocols.
VPNs (Virtual Private Networks) are often viewed from the perspective of security with the goal of providing authentication and confidentiality.
However, the primary purpose of VPNs is to connect 2 topologically separated private networks over a public network (typically the Internet).
VPNs basically hook a network logically into another network so that both appear as one private local network.
Security is a possible add-on to VPNs. In many cases it makes perfectly sense to secure the VPNs communication over the unsecure public network.
VPN protocols typically employ a tunnel where data packets of the local network are encapsulated in an outer protocol for transmission over the public network.
The most important VPN protocols are IPSec, PPTP and L2TP. In recent years SSL/TLS based VPNs such as OpenVPN have gained widespread adoption.
IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include:
Secure branch office connectivity over the Internet
Secure remote access over the Internet
Establishing extranet and intranet connectivity with partners
Enhancing electronic commerce security
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
By the end of this chapter, you will be able to:
1) Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
2) Describe how common application layer protocols interact with end user applications.
3) Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
4) Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
5) Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, 6) File Sharing Services, SMB protocol.
7) Explain how data is moved across the network, from opening an application to receiving data.
A VPN (Virtual Private Network) extends a private network across a public network, such as the
Internet.
A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide
remote offices or individual users with secure access to their organization's network. A VPN ensures
privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP). Data is encrypted at the sending end and decrypted at the receiving end.
This is Powerpoint Presentation on IP addressing & Subnet masking. This presentation describes how IP address works, what its classes and how the subnet masking works and more.
By the end of this chapter, you will be able to:
1) Explain how the functions of the application layer, session layer, and presentation layer work together to provide network services to end user applications.
2) Describe how common application layer protocols interact with end user applications.
3) Describe, at a high level, common application layer protocols that provide Internet services to end-users, including WWW services and email.
4) Describe application layer protocols that provide IP addressing services, including DNS and DHCP.
5) Describe the features and operation of well-known application layer protocols that allow for file sharing services, including: FTP, 6) File Sharing Services, SMB protocol.
7) Explain how data is moved across the network, from opening an application to receiving data.
A VPN (Virtual Private Network) extends a private network across a public network, such as the
Internet.
A VPN is a network that uses a public telecommunication infrastructure, such as the Internet, to provide
remote offices or individual users with secure access to their organization's network. A VPN ensures
privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol
(L2TP). Data is encrypted at the sending end and decrypted at the receiving end.
IKE is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKEv2 is the
second and latest version of the IKE protocol. Adoption for this protocol started as early as 2006.
IKE builds upon the Oakley protocol and ISAKMP. IKE uses X.509 certificates for authentication - either
pre-shared or distributed using DNS (preferably with DNSSEC) and a Diffie–Hellman key exchange - to
set up a shared session secret from which cryptographic keys are derived.
6WINDGate™ - Powering the New-Generation of IPsec Gateways6WIND
6WINDGate™ for IPsec Gateways:
- High performance IPsec stack to sustain encrypted traffic over several tens of thousands of IPsec tunnels with low-latency
- Optimal use of software and hardware crypto-acceleration for best price/performance
- High-capacity IKE control plane to manage several tens of thousands of IKE sessions on a single server
- High capacity for encapsulation protocols such as VLAN, PPP, L2TP and GRE…
- High performance and scalable IPv4 and IPv6 forwarding with virtual routing support for a large number of instances
- High performance and capacity firewall and NAT
Example application providing guidelines for using the Cryptography Device Library framework.
Showcase DPDK cryptodev framework performance with a real world use case scenario.
Author: Georgi Tkachuk
Revision for 2015 from the IMS services & signaling course. The lecture was part of the communication protocols class delivered to students from FIIT STU Bratislava, Slovakia and University Zilina, Slovakia.
The IMS framework on Ericsson Labs is to build Java or Android based mobile applications or RESTful based PC client applications with messaging, presence on top of IMS/SIP.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
10. AH – Packet Structure… TUNNEL MODE TRANSPORT MODE Provides Integrity Protection to entire packet irrespective of the mode New IP Header AH Header Original IP Header Payload Authenticated (Integrity Protection) Original IP Header AH Header Payload Authenticated (Integrity Protection
11.
12. Authentication Header - Packet Identifies the protocol of the payload data. Size of AH Packet For Future Use Contains the MAC output used for verifying whether the packet has been altered or not Ensures that only packets within a sliding window of sequence numbers are accepted. Prevents replay attack Unique identifier set by each endpoint of IPSec connection. Used to determine which SA is in use Next Header Payload Length Reserved Security Parameters Index (SPI) Sequence Number Authentication Data
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25. ESP – Packet Structure TUNNEL MODE TRANSPORT MODE New IP Header ESP Header Original IP Header Payload ESP Trailer ESP Auth (Optional) Encrypted Authentication (Integrity Protection) Original IP Header ESP Header Payload ESP Trailer ESP Auth (Optional) Encrypted Authenticated (Integrity Protection)
26. ESP - Packet Contains the data used to authenticate the packet Unique identifier set by each endpoint of IPSec connection. Used to determine which SA is in use Ensures that only packets within a sliding window of sequence numbers are accepted. Prevents replay attack Used with some block ciphers to pad the data to the full length of a block. Size of Padding in Bytes Identifies the protocol of the payload data. Security Parameters Index (SPI) Sequence Number Payload Data Padding Pad Length Next Header Authentication Data (Variable)
27.
28.
29.
30.
31.
32.
33. VPN protocols – Pros & Cons Protocol Strengths Weaknesses PPTP Can protect Non-IP protocols since the layer is operating below the network layer Requires client software (if there is no built-in client) Has known security weaknesses Does not offer strong authentication Supports one session per tunnel L2TP Can protect Non-IP protocols Can support multiple sessions per tunnel Can support RADIUS Can use IPSec to provide encryption and key mgmt service Requires client software (if there is no built-in client)
34. VPN protocols – Pros & Cons Protocol Strengths Weaknesses SSL Already supported by all major web browser Can provide strong encryption Can only protect TCP based communications Requires application servers & clients to support SSL/TLS Typically implemented to authenticate the server to the client and not vice-versa Application Layer VPNs Can provide granular protection for application communications Can only protect some or all of the communications for a single application Often cannot be incorporated in off-the shelf software Uses proprietary encryption or authentication mechanisms that may have unknown flaws
Editor's Notes
Today we will be exploring the concepts of IPSec and its importance to establish a secure end to end communications over the untrusted network (Internet).
IPSec is an suite of protocols used for securing the IP communications over the Internet. Internet Protocol Security ( IPSec ) is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. IPSec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPSec can be used to protect data flows between a pair of hosts (e.g. computer users or servers), between a pair of security gateways (e.g. routers or firewalls), or between a security gateway and a host.
IPSec is a set of open standard protocols that govern the secure, private exchange of data across public networks, such as the Internet. It was developed by the Internet Engineering Task Force (IETF). IPSec works on Layer 3, the Network layer of the Open Systems Interconnection 7-layer networking model. By running on Layer 3, IPSec is able to function transparently to applications running on Layer 7. The applications do not require any knowledge of IPSec in order to use it. IPSec is used to create tunnels for Virtual Private Networks (VPN), and also provide confidentiality, authenticity, and integrity of data through use of encryption algorithms. Combined with Internet Key Exchange (IKE), IPSec users can exchange keys, authenticate one another, and securely tunnel encrypted data between peers.
Data origin authentication verifies that each datagram was originated by the claimed sender. Data integrity verifies that the contents of the datagram were not changed in transit, either deliberately or due to random errors. Data confidentiality conceals the cleartext of a message, typically by using encryption. Replay protection assures that an attacker can not intercept a datagram and play it back at some later time without being detected. Automated management of cryptographic keys and security associations assures that a company's VPN policy can be conveniently and accurately implemented throughout the extended network with little or no manual configuration. These functions make it possible for a VPN's size to be scaled to whatever size a business requires.
The concept of a Security Association (SA) is fundamental to IPSec. An SA is a unidirectional (simplex) logical connection between two IPSec systems, uniquely identified by the following triple: -Security Parameter Index -IP Destination Address -Security Protocol The definition of the members is as follows: Security Parameter Index (SPI) This is a 32-bit value used to identify different SAs with the same destination address and security protocol. The SPI is carried in the header of the security protocol (AH or ESP). The SPI has only local significance, as defined by the creator of the SA. The SPI values in the range 1 to 255 are reserved by the Internet Assigned Numbers Authority (IANA). The SPI value of 0 must be used for local implementation-specific purposes only. Generally the SPI is selected by the destination system during the SA establishment. IP Destination Address This address may be a unicast, broadcast or multicast address. However, currently SA management mechanisms are defined only for unicast addresses. Security Protocol This can be either AH or ESP. An SA can be in either of two modes: transport or tunnel, depending on the mode of the protocol in that SA. You can find the explanation of these protocol modes later in this chapter. Because SAs are simplex, for bidirectional communication between two IPSec systems, there must be two SAs defined, one in each direction. An SA gives security services to the traffic carried by it either by using AH or ESP, but not both. In other words, for a connection that should be protected by both AH and ESP, two SAs must be defined for each direction. In this case, the set of SAs that define the connection is referred to as an SA bundle . The SAs in the bundle do not have to terminate at the same endpoint. For example, a mobile host could use an AH SA between itself and a firewall and a nested ESP SA that extends to a host behind the firewall.
An IPSec implementation maintains two databases related to SAs: Security Policy Database (SPD) The Security Policy Database specifies what security services are to be offered to the IP traffic, depending on factors such as source, destination, whether it is inbound, outbound, etc. It contains an ordered list of policy entries, separate for inbound and or outbound traffic. These entries might specify that some traffic must not go through IPSec processing, some must be discarded and the rest must be processed by the IPSec module. Entries in this database are similar to the firewall rules or packet filters. Security Association Database (SAD) The Security Association Database contains parameter information about each SA, such as AH or ESP algorithms and keys, sequence numbers, protocol mode and SA lifetime. For outbound processing, an SPD entry points to an entry in the SAD. That is, the SPD determines which SA is to be used for a given packet. For inbound processing, the SAD is consulted to determine how the packet must be processed.
Mode : SAs operate using modes. A mode is the method in which the IPSec protocol is applied to the packet. IPSec can be used in tunnel mode or transport mode. Typically, the tunnel mode is used for gateway-to-gateway IPSec tunnel protection, but transport mode is used for host-to-host IPSec tunnel protection. A gateway is a device that monitors and manages incoming and outgoing network traffic and routes the traffic accordingly. A host is a device that sends and receives network traffic. • Transport Mode: The transport mode IPSec implementation encapsulates only the packet’s payload. The IP header is not changed. After the packet is processed with IPSec, the new IP packet contains the old IP header (with the source and destination IP addresses unchanged) and the processed packet payload. Transport mode does not shield the information in the IP header; therefore, an attacker can learn where the packet is coming from and where it is going to. • Tunnel Mode: The tunnel mode IPSec implementation encapsulates the entire IP packet. The entire packet becomes the payload of the packet that is processed with IPSec. A new IP header is created that contains the two IPSec gateway addresses. The gateways perform the encapsulation/ de-capsulation on behalf of the hosts. Tunnel mode ESP prevents an attacker from analyzing the data and deciphering it, as well as knowing who the packet is from and where it is going.
IPSec Components IPSec contains the following elements: IKE, AH, ESP. • Internet Key Exchange (IKE) : Provides key management and Security Association (SA) management. The main role of IKE is to be setup Security Association. Also to handle negotiation of protocols and algorithms. • Authentication Header (AH) : Provides authentication and integrity. Provides protection against replay attacks. Does not provide confidentiality. • Encapsulating Security Payload (ESP) : Provides confidentiality, authentication, and integrity.
AH provides authentication and integrity, which protect against data tampering. AH also provides optional anti-replay protection, which protects against unauthorized retransmission of packets. The authentication header is inserted into the packet between the IP header and any subsequent packet contents. The payload is not touched. Although AH protects the packet’s origin, destination, and contents from being tampered with, the identity of the sender and receiver is known. In addition, AH does not protect the data’s confidentiality. If data is intercepted and only AH is used, the message contents can be read.
AH is used to provide integrity and authentication to IP datagram. Optional replay protection is also possible. Although its usage is optional, the replay protection service must be implemented by any IPSec-compliant system. The mentioned services are connectionless, that is they work on a per-packet basis. AH authenticates as much of the IP datagram as possible. Some fields in the IP header change en-route and their value cannot be predicted by the receiver. These fields are called mutable and are not protected: Type of Service (TOS) Flags Fragment Offset Time to Live (TTL) Header Checksum AH can be used in two ways: tunnel mode and transport mode. With tunnel mode the tunneling concept is applied a new IP datagram is constructed and the original IP datagram is made the payload of it. Then AH in transport mode is applied to the resulting datagram. The tunnel mode is used whenever either end of a security association is a gateway. Thus, between two firewalls the tunnel mode is always used. Although gateways are supposed to support tunnel mode only, often they can also work in transport mode. This mode is allowed when the gateway acts as a host, that is in cases when traffic is destined to itself. In tunnel mode the outer headers' IP addresses does not need to be the same as the inner headers' addresses. For example two security gateways may operate an AH tunnel which is used to authenticate all traffic between the networks they connect together. This is a very typical mode of operation. Hosts are not required to support tunnel mode, but often they do. The advantages of the tunnel mode are total protection of the encapsulated IP datagram and the possibility of using private addresses. However, there is an extra processing overhead associated with this mode. AH is an integral part of IPv6. In an IPv6 environment, AH is considered an end-to-end payload and it appears after hop-by-hop, routing, and fragmentation extension headers. The destination options extension header could appear either before or after the AH header. In transport mode the original IP datagram is taken and the AH header is inserted right after the IP header. If the datagram already has IPSec header, then the AH header is inserted before any of those. The transport mode is used by hosts, not by gateways. Gateways are not even required to support transport mode. The advantage of the transport mode is less processing overhead. The disadvantage is that the mutable fields are not authenticated.
This figure shows how the IPSec channel is checked before it passes through the IPSec Channel. AH in transport mode is between 2 end points generally computers. AH in tunnel mode is between gateway to PC or PC to gateway.
AH Format Next Header The Next Header is an 8-bit field that identifies the type of the next payload after the Authentication Header. The value of this field is chosen from the set of IP protocol numbers defined in the most recent "Assigned Numbers" RFC from the Internet Assigned Numbers Authority (IANA). Payload Length This field is 8 bits long and contains the length of the AH header expressed in 32-bit words, minus 2. It does not relate to the actual payload length of the IP packet as a whole. If default options are used, the value is 4. (Three 32-bit fixed words plus three 32-bit words of authentication data minus two.) Reserved This field is reserved for future use. Its length is 16 bits and it is set to zero. Security Parameter Index (SPI) This field is 32 bits in length. Sequence Number This 32-bit field is a monotonically increasing counter which is used for replay protection. Replay protection is optional; however, this field is mandatory. The sender always includes this field and it is at the discretion of the receiver to process it or not. At the establishment of an SA the sequence number is initialized to zero. The first packet transmitted using the SA has a sequence number of 1. Sequence numbers are not allowed to repeat. Thus the maximum number of IP packets that can be transmitted on any given SA is 232-1. After the highest sequence number is used, a new SA and consequently a new key is established. Anti-replay is enabled at the sender by default. If upon SA establishment the receiver chooses not to use it, the sender does not concern with the value in this field anymore. Authentication Data This is a variable-length field, also called Integrity Check Value (ICV). The ICV for the packet is calculated with the algorithm selected at the SA initialization. The authentication data length is an integral multiple of 32 bits. As its name tells, it is used by the receiver to verify the integrity of the incoming packet. When doing the ICV calculation, the mutable fields are considered to be filled with zero.
Keyed hash algorithm creates a hash based on the message and pre-shared key (between the two end points) Hash is added to the AH packet header IPSec uses Hash Message Authentication Code (HMAC-MD5) and HMAC-SHA-1 Another common MAC algorithm used is AES Cipher Block Chaining MAC IP Header fields that may legitimately change (TTL, IP Header Checksum) are excluded from Integrity Protection process.
Internet Key Exchange IPSec works hand-in-hand with ISAKMP, otherwise known as IKE, or Internet Key Exchange. IKE provides a key exchange mechanism, when used in conjunction with IPSec you can encrypt data, create security associations (SA), and operate VPNs. IKE protocol is used to negotiate, create and manage Security Associations (SA) SA is a generic term for a set of values that define the IPSec features and protection applied to a connection. SA can also be manually set by two parties but cannot be updated. IKE uses 5 different types of exchanges to create SA, transfer status and error info and define new Diffie Hellman groups.
There are 5 types of IKE Exchanges Out of these five only the two are most widely used i.e. Main Mode or Aggressive Mode for the Phase 1 And Quick Mode for Phase 2 for the IPSec VPN.
IKE Phase 1 : 1.To successfully negotiate a secure channel through which an IPSec SA can be negotiated. Channel created is called IKE SA\\ 2.Provides bi-directional encryption and authentication for subsequent IKE exchanges namely Transfer status, error information and creation of Diffie-Hellman group 3.IKE SA can be established through either of the following two modes: Main Mode Aggressive Mode
Step 1 Interesting traffic initiates the IPSec process — Traffic is deemed interesting when the IPSec security policy configured in the IPSec peers starts the IKE process. Step 2 IKE phase one — IKE authenticates IPSec peers and negotiates IKE SAs during this phase, setting up a secure channel for negotiating IPSec SAs in phase two. Step 3 IKE phase two — IKE negotiates IPSec SA parameters and sets up matching IPSec SAs in the peers. Step 4 Data transfer — Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the SA database. Step 5 IPSec tunnel termination — IPSec SAs terminate through deletion or by timing out.
In IKE Phase 1 : Phase 1 is where the two ISAKMP peers establish a secure, authenticated channel with which to communicate. This is called the ISAKMP Security Association (SA). "Main Mode" and "Aggressive Mode" each accomplish a phase 1 exchange. "Main Mode" and "Aggressive Mode" MUST ONLY be used in phase 1. The first pair of message is mainly to negotiate Security Association policy. It contains the encryption algorithm and Integrity Protection Algorithm Authentication is mainly accomplished by using pre-shared key or digital signatures or public key encryption. In Main Mode the keys are exchanged only after the tunnel is encrypted so there is no possibility of sniffing the key in the middle.
Second Pair of Messages performs key Exchange through Diffie Hellman using the parameters negotiated during first step. IDs are not shared until the third pair of messages so that the keys established through diffie hellman can protect the IDs In third Pair of Messages, each end point authenticate to the other and by this time all messages are encrypted
This is the summary. Main Mode is an instantiation of the ISAKMP Identity Protect Exchange: The first two messages negotiate policy; the next two exchange Diffie-Hellman public values and ancillary data (e.g. nonces) necessary for the exchange; and the last two messages authenticate the Diffie-Hellman Exchange. The authentication method negotiated as part of the initial ISAKMP exchange influences the composition of the payloads but not their purpose. The XCHG for Main Mode is ISAKMP Identity Protect.
Aggressive Mode is faster than the Main Mode in such a way that there are only three messages that are exchanged in the phase 1. The first message Endpoint A sends all SA parameters, Diffie Hellman key exchange and its ID. The second message Endpoint B sends all SA parameters, Diffie Hellman key exchange and its authentication payload. The final message or the third message authenticates the sender.
Key exchange happens before Diffie-Hellman parameters are exchanged Identity information is not always hidden hence adversary can realize the parties involved in the authentication process . If PKI is used then the identity information gets concealed. Susceptible to Man in the middle attacks (Pre-Shared Key Cracking). This is because, keys are exchanged in the very first pair itself. Thus all the keys , usernames are passed in clear-text using IKE Aggressive Mode. Usernames are susceptible to brute-force guessing when using IKE Aggressive Mode.
What is IKE Phase 2 exchange ? Used to establish an SA for the actual IPSec connection. This SA is referred to as IPSec SA. IPSec SA is uni-directional. Data encryption takes place here in this phase.
ESP is used to provide integrity check, authentication and encryption to IP datagram. Optional replay protection is also possible. These services are connectionless, they operate on a per-packet basis. The set of desired services are selectable upon SA establishment. There are two modes : Transport Mode and Tunnel Mode.
Like AH, ESP can be used in two ways: transport mode and tunnel mode. In transport mode the original IP datagram is taken and the ESP header is inserted right after the IP header. If the datagram already has IPSec header, then the ESP header is inserted before any of those. The ESP trailer and the optional authentication data are appended to the payload. ESP in transport mode provides neither authentication nor encryption for the IP header. This is a disadvantage, since false packets might be delivered for ESP processing. The advantage of transport mode the lower processing overhead. As in the case of AH, ESP in transport mode is used by hosts, not gateways. Gateways are not even required to support transport mode. Tunnel mode applies the tunneling principle. A new IP packet is constructed with a new IP header and then ESP in transport mode is applied. Since the original datagram becomes the payload data for the new ESP packet, its protection is total if both encryption and authentication are selected. However, the new IP header is still not protected. The tunnel mode is used whenever either end of a security association is a gateway. Thus, between two firewalls the tunnel mode is always used.
Security Parameter Index (SPI) This field is 32 bits in length. Sequence Number This 32-bit field is a monotonically increasing counter. Same as in AH. Payload Data The Payload Data field is mandatory. It consists of a variable number of bytes of data described by the Next Header field. This field is encrypted with the cryptographic algorithm selected during SA establishment. Padding Most encryption algorithms require that the input data must be an integral number of blocks. Also, the resulting ciphertext (including the Padding, Pad Length and Next Header fields) must terminate on a 4-byte boundary, so that Next Header field is right aligned. That's why this variable length field is included. It can be used to hide the length of the original messages too. However, this could adversely impact the effective bandwidth. Padding is an optional field. Note: The encryption covers the Payload Data, Padding, Pad Length and Next Header fields. Pad Length This 8-bit field contains the number of the preceding padding bytes. It is always present, and the value of 0 indicates no padding. Next Header The Next Header is an 8-bit mandatory field that shows the data type carried in the payload, for example an upper-level protocol identifier such as TCP. The values are chosen from the set of IP Protocol Numbers defined by the IANA. Authentication Data This field is variable in length and contains the ICV calculated for the ESP packet from the SPI to the Next Header field inclusive. The Authentication Data field is optional. It is included only when integrity check and authentication have been selected at SA initialization time. The ESP specifications require two authentication algorithms to be supported: HMAC with MD5 and HMAC with SHA-1. Often the simpler keyed versions are also supported by the IPSec implementations.
The above are the differences between the AH and ESP.
Why two protocols? Knowing about the security services of ESP, one might ask if there is really a requirement for AH. Why does ESP authentication not cover the IP header as well? There is no official answer to these questions, but here are some points that justify the existence of two different IPSec authentication protocols: ESP requires strong cryptographic algorithms to be implemented, whether it will actually be used or not. Strong cryptography is an over-hyped and sensitive topic in some countries, with restrictive regulations in place. It might be troublesome to deploy ESP-based solutions in such areas. However, authentication is not regulated and AH can be used freely around the world. Often only authentication is needed. While ESP could have been specified to cover the IP header as well, AH is more performant compared to ESP with authentication only, because of the simpler format and lower processing overhead. It makes sense to use AH in these cases. Having two different protocols means finer-grade control over an IPSec network and more flexible security options. By nesting AH and ESP for example, one can implement IPSec tunnels that combine the strengths of both protocols.
IPSec is the prevalent network layer VPN protocol. There are scenarios where-in other VPN protocols are required to be implemented Data Link Layer VPN protocol; example PPTP , L2TP, L2F Transport Layer VPN protocol ; example SSL Application Layer VPN protocol ;example SSH
Types of VPN : 1. Site to site VPN : in which there are two VPN devices at two different locations. And encryption and decryption takes place in these boxes.
VPN connectivity would be transparent to the users. Labor costs for configuring clients/ gateways reduces. Deployment would be easy as only the gateways needs to be configured. Existent Routers could be used as VPN gateway, only if it supports VPN. Hardware cost of gateway might be high.
Client to Site VPN: In this type of VPN, one end is a VPN device other end is a client. So encryption and decryption takes place at external client as well as at the vpn device.
Different VPN PROTOCOL with their strength and weakness can be understood from the above slide.