Beruflich Dokumente
Kultur Dokumente
Somesh Jha
University of Wisconsin
Outline
why IPSec?
IPSec Architecture
Internet Key Exchange (IKE)
IPSec Policy
discussion
IP is not Secure!
Security Issues in IP
source spoofing
replay packets
no data integrity or
confidentiality
DOS attacks
Replay attacks
Spying
and more
Fundamental Issue:
Networks are not (and will never be
fully secure
4
Goals of IPSec
Outline
Why IPsec?
IPSec Architecture
Internet Key Exchange (IKE)
IPsec Policy
Discussion
Insecure
IPSec Architecture
ESP
AH
Encapsulating Security
Payload
IPSec Security Policy
Authentication Header
IKE
The Internet Key Exchange
8
IPSec Architecture
IPsec Architecture
Transport Mode
Router
Router
Tunnel Mode
10
Various Packets
Original
IP header
Transport
mode
IP header
IP header
Tunnel
mode
TCP header
data
data
data
11
IPSec
RFC 2402
RFC 2406
RFC 2409
RFC 3137
12
Authentication Header
(AH)
AH Details
14
AH Packet Details
New IP header
Next
header
Payload
length
Reserved
Sequence Number
Encapsulated
TCP or IP packet
Data
Authentication Data
15
Encapsulating Security
Payload (ESP)
16
ESP Details
Same as AH:
Only in ESP:
Data confidentiality:
Payload
length
Reserved
Sequence Number
Initialization vector
TCP header
Data
Pad
Pad length
Next
Encrypted TCP
packet
Authentication Data
18
Question?
1.
2.
Outline
Why IPsec?
IPsec Architecture
Internet Key Exchange (IKE)
IPsec Policy
Discussion
20
Key exchange
Key management
Can be used outside IPsec as well
21
IPsec/IKE Acronyms
22
IPsec/IKE Acronyms
SADB
SPI
SPI
24
Transport Mode
Tunnel Mode
As SADB
From
To
Protocol
Port
Policy
Any
Any
AH[HMAC-MD5]
From
To
Protocol
SPI
SA Record
AH
12
HMAC-MD5 key
From
To
Protocol
Port
Policy
Tunnel Dest
Asub
Bsub
Any
Any
ESP[3DES]
From
To
Protocol
SPI
SA Record
Asub
Bsub
ESP
14
3DES key
Cs SPD
Cs SADB
25
How It Works
IKE Phase 1
27
IKE Phase 1
Examples
Phase 1 Exchange
Quick mode
30
Responder
[Header, SA1]
31
Responder
[Header, SA1]
[Header, SA2]
32
Responder
[Header, SA1]
[Header, SA2]
[Header, KE, Ni, {Cert_Reg} ]
33
Responder
Header, SA1
[Header, SA1]
[Header, KE, Ni { , Cert_Req} ]
Responder
[Header, SA1]
[Header, SA1]
[Header, KE, Ni {,Cert_Req} ]
35
Responder
[Header, SA1]
[Header, SA1]
[Header, KE, Ni {, Cert_req}]
Responder
37
Responder
38
IPSec (Phase 1)
Digital signature
Two forms of authentication with public
key encryption
Pre-shared key
IPSec (Phase 2)
Or by packet:
IPSec (Phase 2)
IP Payload Compression
42
Outline
Why IPsec?
IPsec Architecture
Internet Key Exchange (IKE)
IPSec Policy
Discussion
43
IPsec Policy
Encryption algorithm
Hash algorithm
Authentication method
Diffie-Hellman Group
Lifetime
44
IPSec Policy
AH sub-proposals
ESP sub-proposals
IPComp sub-proposals
Along with necessary attributes such as
Key length, life time, etc
45
In English:
In IPSec:
[Auth=Pre-Hash;
DH=MODP(1024-bit);
HASH=HMAC-SHA;
ENC=3DES]
46
In English:
In IPsec:
Virtual
Private
Alice is Traveling
Alice is Traveling
50
Outline
Why IPsec?
IPsec Architecture
Internet Key Exchange (IKE)
IPsec Policy
Discussion
51
Discussion
Confused?
Discussion
53
Resources
http://www.ietf.org/html.charters/ipsec-charter.html
IPsec: RFC 2401, IKE: RFC 2409
www.freeswan.org
Google search
54