ilab 2 ipsec with ikev2 and strongswan
play

ilab 2 - IPSec with IKEv2 and Strongswan Lukas Grillmayer and Linus - PowerPoint PPT Presentation

ilab 2 - IPSec with IKEv2 and Strongswan Lukas Grillmayer and Linus Lotz Chair for Network Architectures and Services Department for Computer Science Technische Universit at M unchen June 4, 2014 Lukas Grillmayer and Linus Lotz: ilab 2 -


  1. ilab 2 - IPSec with IKEv2 and Strongswan Lukas Grillmayer and Linus Lotz Chair for Network Architectures and Services Department for Computer Science Technische Universit¨ at M¨ unchen June 4, 2014 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 1

  2. Motivation Imagine you are a huge search engine company you recently found out that some government agancy has the audacity to sniff in your network “F*** these guys.” - a engineer from a huge search engine company Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 2

  3. Motivation Imagine you are a huge search engine company you recently found out that some government agancy has the audacity to sniff in your network “F*** these guys.” - a engineer from a huge search engine company Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 2

  4. Motivation Imagine you are a huge search engine company you recently found out that some government agancy has the audacity to sniff in your network “F*** these guys.” - a engineer from a huge search engine company Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 2

  5. Situation We have several locations that need to be connected We have some users who need to access our network from outside ⇒ What we need is a VPN = Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 3

  6. Situation We have several locations that need to be connected We have some users who need to access our network from outside ⇒ What we need is a VPN = Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 3

  7. Situation We have several locations that need to be connected We have some users who need to access our network from outside ⇒ What we need is a VPN = Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 3

  8. Outline Motivation 1 Outline 2 IPSec 3 AH ESP IKEv2 Summary 4 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 4

  9. Outline Motivation 1 Outline 2 IPSec 3 AH ESP IKEv2 Summary 4 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 4

  10. Outline Motivation 1 Outline 2 IPSec 3 AH ESP IKEv2 Summary 4 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 4

  11. Outline Motivation 1 Outline 2 IPSec 3 AH ESP IKEv2 Summary 4 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 4

  12. IPSec - What is it good for? For encrypting data between two parties Consists of a number of different protocols 1 AH 2 ESP 3 ISAKMP 4 IKE(v2) A lot of RFCs about IPSec: 2403,2404,2405,2410,2451,2857,3526,3686,3947,3948,4106,4301, 4302,4303,4304,4307,4308,4309,4543,4555,4806,4835,5945,5996 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 5

  13. IPSec - What is it good for? For encrypting data between two parties Consists of a number of different protocols 1 AH 2 ESP 3 ISAKMP 4 IKE(v2) A lot of RFCs about IPSec: 2403,2404,2405,2410,2451,2857,3526,3686,3947,3948,4106,4301, 4302,4303,4304,4307,4308,4309,4543,4555,4806,4835,5945,5996 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 5

  14. IPSec - What is it good for? For encrypting data between two parties Consists of a number of different protocols 1 AH 2 ESP 3 ISAKMP 4 IKE(v2) A lot of RFCs about IPSec: 2403,2404,2405,2410,2451,2857,3526,3686,3947,3948,4106,4301, 4302,4303,4304,4307,4308,4309,4543,4555,4806,4835,5945,5996 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 5

  15. IPSec - What is it good for? For encrypting data between two parties Consists of a number of different protocols 1 AH 2 ESP 3 ISAKMP 4 IKE(v2) A lot of RFCs about IPSec: 2403,2404,2405,2410,2451,2857,3526,3686,3947,3948,4106,4301, 4302,4303,4304,4307,4308,4309,4543,4555,4806,4835,5945,5996 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 5

  16. IPSec - What is it good for? For encrypting data between two parties Consists of a number of different protocols 1 AH 2 ESP 3 ISAKMP 4 IKE(v2) A lot of RFCs about IPSec: 2403,2404,2405,2410,2451,2857,3526,3686,3947,3948,4106,4301, 4302,4303,4304,4307,4308,4309,4543,4555,4806,4835,5945,5996 Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 5

  17. Tunnel and Transport Mode Tunnelmode: Transportmode: Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 6

  18. AH - Authentication Header - RFC 4302 Operates on top of IP Authentication and Integrity Protection Protects from replay attacks Protects the IP header and it’s payload No encryption! Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 7

  19. AH - Authentication Header - RFC 4302 Operates on top of IP Authentication and Integrity Protection Protects from replay attacks Protects the IP header and it’s payload No encryption! Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 7

  20. AH - Authentication Header - RFC 4302 Operates on top of IP Authentication and Integrity Protection Protects from replay attacks Protects the IP header and it’s payload No encryption! Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 7

  21. AH - Authentication Header - RFC 4302 Operates on top of IP Authentication and Integrity Protection Protects from replay attacks Protects the IP header and it’s payload No encryption! Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 7

  22. AH - Authentication Header - RFC 4302 Operates on top of IP Authentication and Integrity Protection Protects from replay attacks Protects the IP header and it’s payload No encryption! Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 7

  23. AH - Header Format Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 8

  24. ESP - Encapsulating Security Payload RFC 4303 Operates on top of IP Encrypts the transported payload Integrity Check AH can be added to protect the outer IP header Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 9

  25. ESP - Encapsulating Security Payload RFC 4303 Operates on top of IP Encrypts the transported payload Integrity Check AH can be added to protect the outer IP header Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 9

  26. ESP - Encapsulating Security Payload RFC 4303 Operates on top of IP Encrypts the transported payload Integrity Check AH can be added to protect the outer IP header Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 9

  27. ESP - Encapsulating Security Payload RFC 4303 Operates on top of IP Encrypts the transported payload Integrity Check AH can be added to protect the outer IP header Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 9

  28. ESP - Encapsulating Security Payload RFC 4303 Operates on top of IP Encrypts the transported payload Integrity Check AH can be added to protect the outer IP header Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 9

  29. ESP - Header Format Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 10

  30. Internet Key Exchange Protocol v2 Current version specified in RFC 5996 Used to establish encryption and authentication keys Find the best mutually supported algorithms Authentication between the parties Selection of supported authentication methods: PSK X.509 certificates EAP Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 11

  31. Internet Key Exchange Protocol v2 Current version specified in RFC 5996 Used to establish encryption and authentication keys Find the best mutually supported algorithms Authentication between the parties Selection of supported authentication methods: PSK X.509 certificates EAP Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 11

  32. Internet Key Exchange Protocol v2 Current version specified in RFC 5996 Used to establish encryption and authentication keys Find the best mutually supported algorithms Authentication between the parties Selection of supported authentication methods: PSK X.509 certificates EAP Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 11

  33. Internet Key Exchange Protocol v2 Current version specified in RFC 5996 Used to establish encryption and authentication keys Find the best mutually supported algorithms Authentication between the parties Selection of supported authentication methods: PSK X.509 certificates EAP Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 11

  34. Internet Key Exchange Protocol v2 Current version specified in RFC 5996 Used to establish encryption and authentication keys Find the best mutually supported algorithms Authentication between the parties Selection of supported authentication methods: PSK X.509 certificates EAP Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 11

  35. Summary We need a VPN We have IPSec We want to give a road warrior access Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 12

  36. Summary We need a VPN We have IPSec We want to give a road warrior access Lukas Grillmayer and Linus Lotz: ilab 2 - IPSec with IKEv2 and Strongswan 12

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend