Title: IPSec
1IPSec
- Access control
- Connectionless integrity
- Data origin authentication
- Rejection of replayed packets
- Confidentiality
- Sheng-Liang Song
- ssl_at_cisco.com
2IPSec
- Complexity
- Security worst enemy
- best practice
- Sheng-Liang Song
- ssl_at_cisco.com
3Agenda
- IPSec Overview
- IPSec (Network Layer)
- Modes (Tunnel/Transport)
- Protocols (ESP/AH)
- IKE (Internet Key Exchange)
- IPSec Cases
- IPSec Discussion
- QA
4Key Words
- ISAKMP (Internet Security Association
- and Key Management Protocol)
- SA (Security Associations)
- SPD (Security Policy Database)
- IKE (Internet Key Exchange)
- AH (Authentication Header)
- ESP (Encapsulating Security Payload)
- HMAC (Keyed-Hashing for Message Authentication)
- H(K XOR opad_5C, H(K XOR ipad_36, text))
5IPSec (Network Layer)
- lives at the network layer
- transparent to applications
User
SSL
OS
IPSec
NIC
6IPv4 Header Format
Mutable, predictable, Immutable
7IPv6 Header Format
8IPSec Modes (Tunnel and Transport)
- Tunnel Mode
- Transport Mode
IP header
data
data
IP header
ESP/AH
IP header
data
new IP hdr
ESP/AH
IP header
data
9IPSec Protocols (ESP and AH)
- ESP (Encapsulating Security Payload)
- Integrity and confidentiality (HMAC/DES-CBC)
- Integrity only by using NULL encryption
- AH (Authentication Header)
- Integrity only
10AH Format
The sender's counter is initialized to 0 when an
SA is established.
11AH/Transport
12AH/Transport
13ESP Format
The sender's counter is initialized to 0 when an
SA is established.
14ESP/Transport
15ESP/Tunnel
16IPSec Tunnels
IP header
IP Payload
TOS
Original IP Packet
17Anti-Replay in IPSec
- Both ESP and AH have an anti-reply mechanism
- based on sequence numbers
- sender increment the sequence number after each
transmission - receiver optionally checks the sequence number
and rejects if it is out of window
18How IPSec uses IKE
19IPSec and IKE in Practice
- Sets up a keying channel
- Sets up data channels
Internal Network
Certificate Authority
Digital Certificate
ISAKMP Session
Digital Certificate
SA
Authenticated Encrypted Tunnel
ISAKMP (Internet Security Association and Key
Management Protocol) SA (Security
Associations) SPD (Security Policy
Database) Discard,bypass IPsec, apply
IPSec (Overhead)
Clear Text
Internal Network
Encrypted
20IPSec (IKE1 Phase1)
- Authenticated with Signatures
- Authenticated with Shared key
- Authenticated with Public Key Encryption
- Authenticated with Public Key Encryption (Revised)
21IPSec (Cases)
22IPSec Case1
23IPSec Case2
24IPSec Case3
25IPSec Case4
26IPSec Discussion
- IPSec authenticates machines, not users
- Does not stop denial of service attacks
- Easier to do DoS
- Order of operations Encryption/Authentication
- Q A
27Reference
- Information Security Principles and Practice,
Mark Stamp, Jan 29,2005 - http//www.ietf.org/
- Cisco IOS IPsec www.cisco.com/go/ipsec/
- Cisco White Paper, IPsec, http//www.cisco.com/war
p/public/cc/so/neso/sqso/eqso/ipsec_wp.htm - N. Ferguson and B. Schneier, A Cryptographic
Evaluation of IPsec, http//www.schneier.com/paper
-ipsec.html - IPsec, Security for the Internet Protocol,
http//www.freeswan.org/freeswan_trees/freeswan-2.
06/doc/intro.html