An Introduction To Ipsec: Bezawada Bruhadeshwar, International Institute of Information Technology, Hyderabad
An Introduction To Ipsec: Bezawada Bruhadeshwar, International Institute of Information Technology, Hyderabad
An Introduction To Ipsec: Bezawada Bruhadeshwar, International Institute of Information Technology, Hyderabad
Bezawada Bruhadeshwar,
International Institute of
Information Technology,
Hyderabad
Overview of Presentation
Introduction
IPsec model
Authentication Header
Encapsulating Security Payload
Internet Key Exchange
Limitations of IPsec
Conclusions
Introduction
Original Design Model for Internet
Introduction (contd.)
Several useful applications have prompted
businesses to make use of the Internet
Introduction (contd.)
In present scenario, Internet enables instant
on-demand business by
Internet Threats
The varied nature of Internet users and
networks has brought the security concern
To ratify the fears several threats have
surfaced, such as,
Identity spoofing
Denial of service
Loss of privacy
Loss of data integrity
Replay attacks
Denial of service
Loss of privacy
Replay attacks
Integrity
Authentication
Start Necessary
Digression
Public-Key Cryptography
A user generates two keys: public-key and privatekey pair
Public-key and private-key pairs can be viewed as
mutually cancelling
Private-key is secret
Message Authentication
Codes
A Message Authentication Code algorithm is a
family of hash functions h k, parametrized by a
secret k, with properties:
Link Layer
Physical Layer
NFS
IP
SNMP
FTP
DNS
FTP
SMTP
HTTP
TCP, UDP
End Digression
Transport Layer
Network Layer
IPsec
Hardware encryption
Implemented in hardware
Requires encryption decryption between every link
Difficult to implement in Internet like scenario
IPsec Services
Access control
Connectionless Integrity
Data origin authentication
Rejection of replayed packets
Confidentiality
Limited traffic flow confidentiality
IPsec Existence
Granularity in Ipsec
IPsec at a Glance
IPsec uses a combination of the
following techniques to provide its
services
IPsec: Roadmap
Security Association, Security Policy
Database
IPsec protocol components
IPsec modes
Authentication Header
Encapsulating Security Payload
Internet Key Exchange
Commercial Instantiations
Security Association
A simplex (one-way) relationship that affords
security services to the traffic carried by it
Only one service per SA : AH or ESP
To secure bi-directional traffic 2 SAs are
required
Specified by Security parameters index (SPI),
destination IP address
IPsec components
IPsec consists of two important protocol
components
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Data Link Header 1
Layer
Header 2
Original
Message
Header 3 Data 3
Data 2
Data 1
IPsec Modes
IPsec can operate in two modes
Transport Mode
Only IP payload is encrypted
IP headers are left in tact
Adds limited overhead to the IP packet
Tunnel
Entire IP packet is encrypted
New IP headers are generated for this
packet
Transperant to end-users
IP
Header
TCP
Header
Transport Mode
protected packet
IP
Header
IPSec
Header
Data
TCP
Header
Data
protected
New IP
Header
IPSec
Header
Original IP
Header
protected
TCP
Header
Data
Authentication Header
This information is added to the
header to provide the following
services:
32-bits)
Authentication Header
(contd.)
Anti-replay attacks
Encapsulating Security
Payload
Three types of services
Confidentiality only
Integrity only
Confidentiality and integrity
Anti-replay service
Limited traffic flow confidentiality
ESP (contd.)
Header fields
ESP (contd.)
Most purposes ESP is sufficient to
achieve both confidentiality and integrity.
Some auditable events by IPsec are:
Invalid SA
Processing fragmented packet
Transmitting packet which can cause
sequence number overflow
Received packet fails anti-replay
Integrity check fails
Authentication
Key Exchange
Establishing SA
Authentication
Two peers in IPsec need to identify each
other. Forms of authentication :
Limitations
Security implemented by AH and ESP
ultimately depends on their implementation
Operating environment affects the way IPsec
security works
Defects in OS security, poor random number
generators, misconfiguration of protocols, can
all degrade security provided by IPssec.
Conclusions
IPsec provides a method for creating secure
private networks over public networks
Applications, operating systems need not be
changed