14.NSP 03 - IP Security_C
Download
Report
Transcript 14.NSP 03 - IP Security_C
IP Security
Ch16 of Cryptography and
Network Security - Third Edition
by William Stallings
Modified from lecture slides by
Lawrie Brown
CIM3681: NSP 03 - IP Security
1
IP Security
If a secret piece of news is divulged 泄露,暴露
by a spy before the time is ripe 成熟的 , he
must be put to death, together with the
man to whom the secret was told.
—The Art of War, Sun Tzu
CIM3681: NSP 03 - IP Security
2
IP Security
IPSec
IP Security Architecture 組織,結構
Authentication Header 鑑別表頭
Encapsulating 封進內部 Security Payload 有
效負荷
Combining Security Associations
Key Management
CIM3681: NSP 03 - IP Security
3
IP Security
have considered some application specific
security mechanisms
eg. S/MIME, PGP, Kerberos, SSL/HTTPS
however there are security concerns that
cut across 橫跨 protocol layers
would like security implemented by the
network for all applications
CIM3681: NSP 03 - IP Security
4
IPSec
general IP Security mechanisms
provides
authentication
confidentiality
key management
applicable to use over LANs, across public
& private WANs, & for the Internet
CIM3681: NSP 03 - IP Security
5
IPSec Uses
CIM3681: NSP 03 - IP Security
6
Benefits of IPSec
in a firewall/router provides strong
security to all traffic crossing the
perimeter 周界
is resistant to bypass 繞過
is below transport layer, hence transparent
透明 to applications
can be transparent to end users
can provide security for individual users if
desired 需求
CIM3681: NSP 03 - IP Security
7
IP Security Architecture
specification 規格 is quite complex
defined in numerous RFC’s
incl. RFC 2401/2402/2406/2408
many others, grouped by category
mandatory 強制 in IPv6, optional in IPv4
CIM3681: NSP 03 - IP Security
8
IPSec Document Overview
CIM3681: NSP 03 - IP Security
9
IPSec Services
Access control 存取控制
Connectionless integrity 無連接方式完整性
Data origin authentication 數據起源鑑別
Rejection of replayed 重演 packets
a form of partial sequence integrity
Confidentiality (encryption)
Limited traffic flow confidentiality
CIM3681: NSP 03 - IP Security
10
IPSec Services
CIM3681: NSP 03 - IP Security
11
Security Associations
a one-way relationship between sender &
receiver that affords 負擔得起 security for
traffic flow
defined by 3 parameters: 參數
has a number of other parameters
Security Parameters Index (SPI)
IP Destination Address
Security Protocol Identifier
seq no, AH & EH info, lifetime etc
have a database of Security Associations
CIM3681: NSP 03 - IP Security
12
Authentication Header (AH) 鑑別表頭
provides support for data integrity &
authentication of IP packets
based on use of a MAC
end system/router can authenticate user/app
prevents address spoofing attacks by tracking
sequence numbers
HMAC-MD5-96 or HMAC-SHA-1-96
parties must share a secret key
CIM3681: NSP 03 - IP Security
13
Authentication Header
CIM3681: NSP 03 - IP Security
14
Transport & Tunnel Modes
CIM3681: NSP 03 - IP Security
15
Tunnel Mode and Transport Mode
Functionality
CIM3681: NSP 03 - IP Security
16
Encapsulating Security Payload (ESP)
provides message content confidentiality &
limited traffic flow confidentiality
can optionally provide the same
authentication services as AH
supports range of ciphers, modes, padding
incl. DES, Triple-DES, RC5, IDEA, CAST etc
CBC most common
pad to meet blocksize, for traffic flow
CIM3681: NSP 03 - IP Security
17
Encapsulating Security Payload
CIM3681: NSP 03 - IP Security
18
Transport 傳送 vs Tunnel 隧道 Mode
ESP
transport mode is used to encrypt &
optionally authenticate IP data
data protected but header left in clear
can do traffic analysis but is efficient
good for ESP host to host traffic
tunnel mode encrypts entire IP packet
add new header for next hop
good for VPNs, gateway to gateway security
CIM3681: NSP 03 - IP Security
19
Combining Security Associations
SA’s can implement either AH or ESP
to implement both need to combine SA’s
form a security bundle
have 4 cases (see next)
CIM3681: NSP 03 - IP Security
20
Combining Security Associations
CIM3681: NSP 03 - IP Security
21
Key Management
handles key generation & distribution
typically need 2 pairs of keys
manual key management
2 per direction for AH & ESP
sysadmin manually configures every system
automated key management
automated system for on demand creation of
keys for SA’s in large systems
has Oakley & ISAKMP elements
CIM3681: NSP 03 - IP Security
22
Oakley
a key exchange protocol
based on Diffie-Hellman key exchange
adds features to address weaknesses
cookies, groups (global params), nonces, DH
key exchange with authentication
can use arithmetic in prime fields or
elliptic curve fields
CIM3681: NSP 03 - IP Security
23
ISAKMP
Internet Security Association and Key
Management Protocol
provides framework for key management
defines procedures and packet formats to
establish, negotiate, modify, & delete SAs
independent of key exchange protocol,
encryption alg, & authentication method
CIM3681: NSP 03 - IP Security
24
ISAKMP
CIM3681: NSP 03 - IP Security
25
Summary
have considered:
IPSec security framework
AH
ESP
key management & Oakley/ISAKMP
CIM3681: NSP 03 - IP Security
26