Lecture 12 - Network Security CSE497b - Spring 2007 Introduction - - PowerPoint PPT Presentation

lecture 12 network security
SMART_READER_LITE
LIVE PREVIEW

Lecture 12 - Network Security CSE497b - Spring 2007 Introduction - - PowerPoint PPT Presentation

Lecture 12 - Network Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Idea


slide-1
SLIDE 1

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger

Lecture 12 - Network Security

CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger

www.cse.psu.edu/~tjaeger/cse497b-s07/

slide-2
SLIDE 2

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Idea

  • Why don’t we just integrate some of these neat

crypto tricks directly into the IP protocol stack?

  • This is called transport security

2

slide-3
SLIDE 3

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

IPsec

  • IP layer security protocol

– Integrated directly into protocol stack – Defined as an extension to the network layer – Transparent to the above layers and application

  • Provides

– confidentiality – integrity – authenticity – replay protection – DOS protection

3

IPsec SA Ethernet IP TCP HTTP Physical Ethernet IP TCP HTTP Physical

slide-4
SLIDE 4

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Tunnel vs. Transport Mode

  • Transport mode

– default mode of IPsec -- protects transport layer packet – end-to-end encapsulation of data – useful when both endpoints are configured to use/manage IPsec

  • Tunnel mode

– encapsulates all of the IP data over a new IP level packet – useful when the device applying IPsec to the packet is not the originating host, e.g., at a gateway – Also known as, “ip over ip”

  • IPsec provides the mechanism, you provide the

policy

4

slide-5
SLIDE 5

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

IPsec Processing

5

ESP

Start IKE Phase 1: Negotiate Session ISAKMP Keys IKE Phase 2: Negotiate SA Keys Process Using AH Encoding and Policy Process Using ESP Encoding and Policy ISAKMP Keys Exist? SA Keys Exist? Processing Policy Yes Yes No No ESP AH

IKE AH

slide-6
SLIDE 6

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Internet Key Exchange (IKE)

  • Built on of ISAKMP framework
  • Two phase protocol used to establish parameters

and keys for session

– Phase 1: negotiate parameters, authenticate peers, establish secure channel

  • ISAKMP keys

– Phase 2: Establish a security association (SA)

  • SA keys used to process user traffic
  • The details are unimaginably complex
  • The SA defines algorithms, keys, and policy used

to secure the session

6

slide-7
SLIDE 7

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

IPsec Implementation

  • User: ISAKMP framework
  • Kernel: IPsec processing

7

User Kernel Policy Engine Policy Cache SA Administration ISAKMP Daemon SA Cache IPSec Engine Crypto Engine Policy Interface SA Interface

slide-8
SLIDE 8

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Authentication Header (AH)

  • Authenticity and integrity

– via HMAC – over IP headers and and data

  • Advantage: the authenticity of data and IP header

information is protected

– it gets a little complicated with mutable fields, which are supposed to be altered by network as packet traverses the network – some fields a immutable, and are protected

  • Confidentiality of data is not preserved
  • Replay protection via AH sequence numbers

– note that this replicates some features of TCP (good?)

8

slide-9
SLIDE 9

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Authentication Header (AH)

  • Modifications to the packet format

9

IP Header AH Header MAC Payload

AH Packet Encrypted Authenticated

IP Header Payload

slide-10
SLIDE 10

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

IPsec Authentication

  • SPI: (spy) identifies the security association for this packet

– Type of crypto checksum, how large it is, and how it is computed – Really the policy for the packet

  • Authentication data

– Hash of packet contents include IP header as as specified by SPI – Treat transient fields (TTL, header checksum) as zero

  • Keyed MD5 Hash is default

Headers and data being sent Key Key Secret Key

MD5 Hash

10

slide-11
SLIDE 11

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Encapsulating Security Payload (ESP)

  • Confidentiality, authenticity and integrity

– via encryption and HMAC – over IP payload (data)

  • Advantage: the security manipulations are done

solely on user data

– TCP packet is fully secured – simplifies processing

  • Use “null” encryption to get authenticity/integrity only
  • Note that the TCP ports are hidden when encrypted

– good: better security, less is known about traffic – bad: impossible for FW to filter/traffic based on port

  • Cost: can require many more resources than AH

11

slide-12
SLIDE 12

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Encapsulating Security Payload (ESP)

  • Modifications to packet format

12

IP Header ESP Header Payload ESP Trailer MAC

ESP Packet Encrypted Authenticated

IP Header Payload

slide-13
SLIDE 13

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Is AH necessary?

  • Some argue that AH is subsumed by ESP

– Header protection can be achieved by tunnel mode ESP – Protection of header has limited utility

  • Should we allow firewalls (and eavesdroppers) to

look at layer 4 (TCP) information

– e.g., filter on ports – exposes a lot of information

  • In practice, the protocol AH is generally not used.

13

?

slide-14
SLIDE 14

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

IPsec Tunnel Mode

  • Encapsulate IP packet

14

Payload Source Dest

C D

ESP Header Payload ESP Trailer MAC Source Dest Tunnel Source Dest Tunnel Header

slide-15
SLIDE 15

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Practical Issues and Limitations

  • IPsec implementations

– Often not compatible (ungh.) – Large footprint

  • resource poor devices are in trouble
  • New standards to simplify (e.g, JFK, IKE2)

– Slow to adopt new technologies

  • Issues

– IPsec tries to be “everything for everybody at all times”

  • Massive, complicated, and unwieldy

– Policy infrastructure has not emerged – Large-scale management tools are limited (e.g., CISCO) – Often not used securely (common pre-shared keys)

15

slide-16
SLIDE 16

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Network Isolation: VPNs

  • Idea: I want to create a collection of hosts which
  • perate in a coordinated way

– E.g., a virtual security perimeter over physical network – Hosts work as if they are isolated from malicious hosts

  • Solution: Virtual Private Networks

– Create virtual network topology over physical network – Use communications security protocol suites to secure virtual links “tunneling” – Manage networks as if they are physically separate – Hosts can route traffic to regular networks (split-tunneling)

16

slide-17
SLIDE 17

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

VPN Example: RW/Telecommuter

17

Internet LAN (network edge)

Physical Link Logical Link (IPsec)

slide-18
SLIDE 18

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

VPN Example: Hub and Spoke

18

Internet LAN (network edge)

Physical Link Logical Link (IPsec)

slide-19
SLIDE 19

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

VPN Example: Mesh

19

Internet LAN (network edge)

Physical Link Logical Link (IPsec)

slide-20
SLIDE 20

CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page

Virtual LANs (VLANs)

  • VPNs build with hardware

– No encryption – none needed – “wire based isolation” – Switches increasingly support VLANs – Allows networks to be reorganized without rewiring

  • Example usage: two departments in same hallway

– Each office is associated with department – Configuring the network switch gives physical isolation – Note: often used to ensure QoS

20