* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download IPSec
One-time pad wikipedia , lookup
Unix security wikipedia , lookup
Next-Generation Secure Computing Base wikipedia , lookup
Web of trust wikipedia , lookup
Quantum key distribution wikipedia , lookup
Cyber-security regulation wikipedia , lookup
Cryptanalysis wikipedia , lookup
Information security wikipedia , lookup
Secure multi-party computation wikipedia , lookup
Security and safety features new to Windows Vista wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Distributed firewall wikipedia , lookup
Wireless security wikipedia , lookup
Computer security wikipedia , lookup
Cryptography wikipedia , lookup
Electronic authentication wikipedia , lookup
Mobile security wikipedia , lookup
Deep packet inspection wikipedia , lookup
Security-focused operating system wikipedia , lookup
Authentication wikipedia , lookup
Diffie–Hellman key exchange wikipedia , lookup
History of cryptography wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
IPSec Zeen Rachidi David Salim Archana Mehta Agenda Definition of IPSec IPSec Architecture Encapsulating Security Payload and Authentication Header Encryption and Authentication Algorithms Internet Key Exchange mechanism Scenarios for deploying Implementation Benefits Limitations Current areas of research Definition of IPSec IPSec is an abbreviation for IP security, which is used to transfer data securely over unprotected networks like “Internet”. It acts at the networks layer and is part of IPv6. The protocol/process is as follows : Sender encrypts packets before sending them on the network. Receiver authenticates packets. Anti replay checks to reject duplicate packets preventing DOS attack. IKE is the key exchange mechanism to securely exchange keys IPSec Architecture Below are the various RFC defined for IPSec Source: IPSec Architecture Overview IPSec Architecture RFC 2401 - Overall security architecture and services offered by IPSec. Authentication Protocols RFC 2402 – IP Authentication Header processing (in/out bound packets ) RFC 2403 – Use of MD-5 with Encapsulating Security Payload and Authentication Header RFC 2404 - Use of Sha1with Encapsulating Security Payload and Authentication Header ESP Protocol RFC 2405 – Use of DES-CBS which is a symmetric secret key block algorithm (block size 64 bits). RFC 2406 – IP Encapsulating Security Payload processing (in/out bound packets) RFC 2407 – Determines how to use ISAKMP for IPSec IPSec Architecture – Key Management RFC 2408 (Internet Security Association and Key Management Protocol - ISAKMP) Common frame work for exchanging key securely. Defines format of Security Association (SA) attributes, and for negotiating, modifying, and deleting SA. Security Association contains information like keys, source and destination address, algorithms used. Key exchange mechanism independent. RFC 2409 – Internet key exchange Mechanisms for generating and exchanging keys securely. Encapsulation Security Payload Designed to provide both confidentiality and integrity protection Everything after the IP header is encrypted The ESP header is inserted after the IP header Authentication Header Designed for integrity only Certain fields of the IP header and everything after the IP header is protected Provides protection to the immutable parts of the IP header Encryption Algorithms Some of the standard encryption algorithms implemented in IPSec are: 3DES AES NULL Authentication Algorithms Used to achieve integrity protection of data Everything after the IP header is hashed Hash is attached to the IP header as an integrity checksum Destination host generates a hash using the same algorithm and compares it to the one attached to the packet Internet Key Exchange Phase 1 Achieves mutual authentication and establishes and IKE Security Association (SA). Three key options include: Public Key Encryption Public Key Signature Symmetric Key Phase 2 achieves ESP/AH SA IPSec Transport Mode AH or ESP header is inserted between the IP header and payload IP Header AH/ESP Data Encrypts only the data portion of packet Designed for host-to-host communication where routing information is needed IPSec Tunnel Mode Original IP packet is placed in new IP packet with AH or ESP header IP Header Data Original IP Packet IP Header AH/ESP Data Designed for gateway-to-gateway communication Tunnel vs Transport Mode Transport mode is more efficient Transport mode hides all information of the original packet Transport mode is not needed IPSec Implementation Bump-in-stack Update OS network stack Adding software that’s binds to network stack can cause software conflicts Bump-in-wire Attach network device that performs IPSec processing Transparent to hosts Benefits of IPSec Operates at the network layer Application agnostic An Internet standard Extensible hash and encryption algorithms Limitations of IPSec Complex Configuration Lengthy key pairs need to be configured on client and server Performance / Processing Overhead NAT incompatibilities Firewall incompatibilities Current areas of research Stronger encryption and authentication algorithms. Better Public Key Infrastructure to make it simple, less complex and easy to manage and more secure. Security with non IP protocols like Fiber channel. References 1. IP Encapsulating Security Payload, http://www.ietf.org/rfc/rfc2406.txt 2. IPSec, http://www.mywiseowl.com/articles/IPsec 3. IP Security (RFC – 2411), http://rfc.net/rfc2411.html 4. IPSec Product Overview, http://66.102.7.104/search?q=cache:S6usqPxYnIJ:www.freesoft.org/CIE/Topics/141.htm+Ipsec&hl=en&start=3 3 5. IPsec (IP Security Protocol), http://www.nwfusion.com/details/720.html 6. Understanding IPsec, http://www.intranetjournal.com/articles/200206/se_06_13_02c.html 7. Information Security, Principles and Practice, Mark Stamp 8. www.solaris.com