#4_ipsec
#4_ipsec
1
Internetwork Protocol (IP)
Aim
◦ provide interconnection across different networks
IPv6 header
◦ modular approach
◦ base header + extension headers
◦ base header is longer than v4, but number of fields is smaller
IPv6 header
Is IP Secure?
Content (Payload) is not encrypted
◦ confidentiality is not provided
◦ IP sniffers are available on the net
So IP is not secure
Where to provide security?
Application-layer?
◦S/MIME, PGP – email security
◦Kerberos – client / server
◦SSH – secure telnet
Transport level?
◦SSL / TLS
◦between TCP and Application
IP level
◦IPSec
IPSec
general IP Security mechanisms
provides authentication and confidentiality at IP level
◦ also has key management features
Applications
◦ VPNs (Virtual Private Networks)
◦ Interconnected LANs over the insecure Internet
◦ router-to-router
◦ Secure remote access, e.g. to ISPs
◦ individual-to-router
AH info
◦ authentication algorithms, keys, key lifetimes, etc.
ESP info
◦ encryption (and authentication) algorithms, keys, key lifetimes, etc.
Lifetime of SA
IPSec Mode: Transport or Tunnel
SA, AH – ESP, and key
management
SAs are in databases
◦both in sender and receiver
AH and ESP use the cryptographic primitives and
other info in SA
Key Management Protocols (will discuss later) are
to establish SA
So
◦AH / ESP are independent of key management
SA Selectors
IPSec is a flexible protocol
◦ traffic from IP address X to IP address Y may use several SAs
◦ or no SA if that particular traffic will not be secured
etc.
Host (IP Addr: 1.2.3.101)
SPD Example
Transport and Tunnel Modes
Both AH and ESP support these two modes
◦differently
Transport Mode
◦security is basically for the IP payload (upper-level protocol
data)
◦IP header is not protected (except some fields in AH)
◦Typically for end-to-end communication
Tunnel Mode
◦secures the IP packet as a whole including header(s)
◦actually puts all IP packet within another (outer) one
◦packet is delivered according to the outer IP header
◦Typically for router-to-router, or firewall-to-firewall
communication
Authentication Header (AH)
Provides support for data integrity and
authentication of IP packets
◦malicious modifications are detected
◦address spoofing is prevented
◦replays are detected via sequence numbers
Authentication is based on use of a MAC
◦parties must share a secret key
◦ in SA
Authentication Header
Next Header:
specifies next
header or upper
layer protocol
Payload length: to
specify header
length
SPI: to identify SA
Authentication data:
Sequence number: MAC value (variable
used for replay length)
control
AH – Anti-replay Service
Detection of duplicate packets
Sequence numbers
◦ associated with SAs
◦ 32-bit value
◦ when an SA is created, initialized to 0
◦ when it reaches 232-1, SA must be terminated
◦ not to allow overflows
◦ sender increments the replay counter and puts into each AH
(sequence number field)
Problem: IP is unreliable, so the receiver may receive IP
packets out of order
◦ Solution is window-based mechanism
◦ Implemented at receiver side
Anti-replay
Service
window size W
(default is 64)
N: highest seq.
number for a valid
paket recevied so far
If a received packet falls in the window
◦ if authenticated and unmarked, mark it
◦ if marked, then replay!
transport
mode
tunnel
mode
AH – Tunnel Mode
Inner IP packet carries the
ultimate destination
address
Outer IP packet may carry
another dest. address
(e.g. address of a router
at destination network) transport
mode
new tunnel
mode
Encapsulating Security Payload (ESP)
provides
◦ message content confidentiality
◦ via encryption
◦ limited traffic flow confidentiality and measures for traffic
analysis
◦ by padding (may arbitrarily increase the data)
◦ by encrypting the source and destination addresses in tunnel mode
◦ optionally authentication services as in AH
◦ via MAC (HMAC), sequence numbers
(IP Payload)
Padding in ESP
several purposes and reasons
◦ encryption algorithm may require the plaintext to be multiple of some integer n
◦ ESP format requires 32-bit words
◦ additional padding may help to provide partial traffic flow confidentiality by
concealing the actual length of data
◦ Other than the existing padding field, extra padding can be added to the end of the payload to
improve traffic flow confidentiality
Transport Mode ESP
transport mode is used to encrypt & optionally
authenticate IP payload (e.g. TCP segment)
◦data protected but IP header left in clear
◦so source and destination addresses are not encrypted
◦Mostly for host to host (end-to-end) traffic
Tunnel Mode ESP
Encrypts and optionally authenticates the entire IP
packet
◦add new (outer) IP header for processing at intermediate
routers
◦ may not be the same as the inner (original) IP header, so traffic
analysis can somehow be prevented
◦good for VPNs, gateway to gateway (router to router)
security
◦ hosts in internal network do not get bothered with security related
processing
◦ number of keys reduced
◦ thwarts traffic analysis based on ultimate destination
Tunnel Mode ESP
Tunnel Mode ESP
Protocol
Operations
for ESP
Transport and Tunnel Modes
Combining Security Associations
SAs can implement either AH or ESP
to implement both, need to combine SAs
◦form a security association bundle
A possible case: End-to-end Authentication +
Confidentiality
◦Solution1: use ESP with authentication option on
◦Solution2: apply ESP SA (no auth.) first, then apply AH SA
◦Solution3: Apply AH SA first, then ESP SA
◦ encryption is after the authentication
Internet Key Exchange
The key management portion of IPsec involves the determination and
distribution of secret keys
◦ A typical requirement is four keys for communication between two
applications
◦ Transmit and receive pairs for both integrity and confidentiality
The IPsec Architecture document mandates support for two types of key
management:
ISAKMP/Oakley
The default automated key management protocol of IPsec
Consists of:
◦ Oakley Key Determination Protocol
◦ A key exchange protocol based on the Diffie-Hellman algorithm but providing added security
◦ Generic in that it does not dictate specific formats
◦ Internet Security Association and Key Management Protocol (ISAKMP)
◦ Provides a framework for Internet key management and provides the specific protocol support,
including formats, for negotiation of security attributes
◦ Consists of a set of message types that enable the use of a variety of key exchange algorithms
Features of IKE Key Determination
Algorithm is characterized by five important features:
IKE Payload Types
Summary
IP security overview
◦ Applications of IPsec •Encapsulating security payload
◦ Benefits of IPsec ◦ ESP format
◦ Routing applications ◦ Encryption and authentication
◦ IPsec documents
algorithms
◦ IPsec services ◦ Padding
◦ Transport and tunnel modes ◦ Anti-replay service
◦ Transport and tunnel modes
IP security policy
◦ Security associations •Combining security associations
◦ Security association database ◦ Authentication plus
◦ Security policy database confidentiality
◦ IP traffic processing ◦ Basic combinations of security
associations
◦ Cryptographic suites •Internet key exchange
◦ Key determination protocol
◦ Header and payload formats