42
1 CSCI 6433 Internet Protocols Class 8 Dave Roberts

CSCI 6433 Internet Protocols Class 8

  • Upload
    alec

  • View
    35

  • Download
    0

Embed Size (px)

DESCRIPTION

CSCI 6433 Internet Protocols Class 8. David C. Roberts. Topics. Mobile IP Virtual Private Networks . Mobile IP. IP was not designed with hand-held or book-sized mobile computers in mind - PowerPoint PPT Presentation

Citation preview

Page 1: CSCI 6433 Internet Protocols Class  8

1

CSCI 6433Internet Protocols

Class 8

Dave Roberts

Page 2: CSCI 6433 Internet Protocols Class  8

Topics

• Mobile IP• IPSec• Virtual Private Networks

2

Page 3: CSCI 6433 Internet Protocols Class  8

Mobile IP

• IP was not designed with hand-held or book-sized mobile computers in mind

• Mobile IP has its limitations in today’s world, where IP address is tied to network address which is geographic

• However, Mobile IP does illustrate the basics of dealing with a roving host

3

Page 4: CSCI 6433 Internet Protocols Class  8

Mobile IP

Allows portable computers to move from one network to another.

Hosts move from one network to another, not in the original design of IP!

Without mobile IP, either• Host address must change, or• Routers must send a host-specific route across the

entire Internet4

Page 5: CSCI 6433 Internet Protocols Class  8

General Characteristics of Mobile IP

• Transparency—mobility transparent to applications, transport layer protocols, routers not involved in the change.

• Interoperability—mobile host can interoperate with stationery and mobile hosts using IPv4, and mobile IPv6 hosts can interoperate with stationary and mobile IPv6 hosts

• Scalability—scales to large internets• Security—authentication for all messages• Macro mobility—focuses on long-duration moves, rather than

roving as in a cellular phone system

5

Page 6: CSCI 6433 Internet Protocols Class  8

Overview of Mobile IPv4

• Host can have primary and secondary address• Primary is obtained at “home” location, permanent and

fixed• Secondary obtained after a move. Sent to agent

(router) at home. • Agent intercepts datagrams, encapsulates in IP

datagrams, sends to secondary address.• Mobile host deregisters when returning home, notifies

agent of new address after another move6

Page 7: CSCI 6433 Internet Protocols Class  8

Mobile IPv4 Addressing• Home address—conventional IP address• Temporary address is called care-of address• Two forms of care-of address:

• Co-located: mobile host does forwarding• Foreign: foreign agent (router) on network being visited assigns care-of address, handles forwarding

• A home agent (HA) stores information about mobile nodes whose permanent home address is in the home agent's network.

• The HA acts as a router on a mobile host's (MH) home network which tunnels datagrams for delivery to the MH when it is away from home, maintains a location directory (LD) for the MH.

• A foreign agent (FA) stores information about mobile nodes visiting its network. Foreign agents also advertise care-of addresses, which are used by Mobile IP. If there is no foreign agent in the host network, the mobile device has to take care of getting an address and advertising that address by its own means.

• The FA acts as a router on a MH’s visited network which provides routing services to the MH while registered. FA detunnels and delivers datagrams to the MH that were tunneled by the MH’s HA

7

Page 8: CSCI 6433 Internet Protocols Class  8

Operation of Mobile IP

8

Page 9: CSCI 6433 Internet Protocols Class  8

Mobile IP

• Mobile node finds an agent on its local network through the agent discovery process. Listens for agent advertisement messages, or can ask for one with agent solicitation

• Mobile node determines from the message whether it is at its home network

• If device has moved to foreign network, it obtains a (local) care-of address. Used to forward datagrams

• Mobile node tells home agent at home network by registering with the home network

• Home agent captures datagrams for the mobile node and forward them

9

Page 10: CSCI 6433 Internet Protocols Class  8

IPv4 Foreign Agent Discovery

10

ICMP router discovery mechanism used to discover a foreign agent.

Page 11: CSCI 6433 Internet Protocols Class  8

IPv4 Agent Registration

11

Page 12: CSCI 6433 Internet Protocols Class  8

IPv6 Mobility

• No use of foreign agent or care-of addresses. Instead, IPv6 mobile host uses co-located care-of address

• Host can have a home address and co-located care-of address at once

• IPv6 does not depend on link-layer forwarding• IPv6 routing expansion header makes forwarding more

efficient than for IPv4• IPv6 mobile host does not need foreign agent

12

Page 13: CSCI 6433 Internet Protocols Class  8

IPv6 Datagram Transmission

• IPv6 mobile host informs home agent before communicating with a destination

• Host includes a mobility header in sent datagram

• Destination can then communicate with home agent, find mobile’s current address, and send directly

13

Page 14: CSCI 6433 Internet Protocols Class  8

Assessment of Mobile IP

• Designed for devices with static IP configuration—not practical with dynamic IP address assignment

• Retaining an IP address is less important than it was, due to dynamic IP address assignment

• Not practical for devices that move frequently—too much setup and teardown

• VPN allows remote device to have home address and have full access to its home network

14

Page 15: CSCI 6433 Internet Protocols Class  8

Summary

• Mobile IP allows a computer to move from one network to another without changing its IP address

• Mobile either obtains a co-located care-of address or discovers a foreign mobility agent and requests a care-of address.

• Once registered, mobile can communicate with an arbitrary computer on the Internet.• Datagrams from mobile go directly to destination• Return datagrams go through mobile’s home agent

15

Page 16: CSCI 6433 Internet Protocols Class  8

IPSec

• IPSec provides security services at the IP layer for other Internet protocols to use

16

Page 17: CSCI 6433 Internet Protocols Class  8

What’s Needed for A Secure Path

• Mutually agreed security protocols• Mutually agreed specific encryption algorithm• Exchange of keys

17

Page 18: CSCI 6433 Internet Protocols Class  8

IPSec Protocols and Components

18

Page 19: CSCI 6433 Internet Protocols Class  8

Authentication Header

• The AH allows for the contents of the datagram to be authenticated

• It contains a checksum, computed using a secret key agreed between the sender and recipient

• The checksum is added by the sender, used by the recipient to validate the contents

19

Page 20: CSCI 6433 Internet Protocols Class  8

Authentication Header

20

Page 21: CSCI 6433 Internet Protocols Class  8

Encapsulation Security Payload

• ESP protects from intermediate devices examining the contents of the datagram

• Header is placed before encrypted data• Trailer is placed after encrypted data• Authentication data is used to check integrity

similarly to AH protocol, for ESP optional authentication feature to authenticate after encryption

21

Page 22: CSCI 6433 Internet Protocols Class  8

ESP Payload

22

Page 23: CSCI 6433 Internet Protocols Class  8

Internet Key Exchange

• A new security association involves a key exchange

• The following is established:• Encryption algorithm to be used• Hash algorithm • Authentication method• Diffie-Helman Group

23

Page 24: CSCI 6433 Internet Protocols Class  8

IPSec Implementation Methods

• End host implementation: implementing in hosts provides “end to end” security

• Router implementation: implement in pairs of routers, provides security between routers

24

Page 25: CSCI 6433 Internet Protocols Class  8

IPSec Architectures

• Built in to IP• Inserted into the stack:

“bump in the stack”• In device connected to

the router: “bump in the wire”

25

Page 26: CSCI 6433 Internet Protocols Class  8

Built In to IP

• Integrated: change IP stack to include IPSec • Requires extensive software changes for IPv4. • IPv6 is designed to include IPSec.

26

Page 27: CSCI 6433 Internet Protocols Class  8

“Bump in The Stack”

• Bump in the stack (BITS): IPSec a layer between IP and data link layer. IPSec intercepts datagrams, passes to data link layer.

27

Page 28: CSCI 6433 Internet Protocols Class  8

“Bump in The Wire”

28

Bump in the wire (BITW): Add a hardware device between two communicating routers

Page 29: CSCI 6433 Internet Protocols Class  8

IPSec Modes

• Transport mode: IPSec protects the message passed to IP from the transport layer. AH and ESP headers are added as the IP datagram is created.

• Tunnel mode: IPSec protects complete encapsulated IP datagram after IP header is applied. IP datagram is created normally, then AH and ESP headers are added. Usually associated with “bump in the stack” and “bump in the wire” implementations

29

Page 30: CSCI 6433 Internet Protocols Class  8

IPSec Transport Mode

30

Page 31: CSCI 6433 Internet Protocols Class  8

IPSec Tunnel Mode

31

Page 32: CSCI 6433 Internet Protocols Class  8

Summary

• IPSec protects against observation and change of transmitted data by intermediate hosts

• IPSec requires setup between communicating hosts to establish security associations

32

Page 33: CSCI 6433 Internet Protocols Class  8

VPN

• Extends a private network across a public network such as the Internet

• Enables user to send and receive data across shared networks as if the hosts were directly connected to the private network

• VPN is created by establishing virtual point-to-point connections, typically using virtual tunneling protocols, with or without traffic encryption

33

Page 34: CSCI 6433 Internet Protocols Class  8

Virtual Private Networks (VPN)

Suppose we want to:• Allow external connections• Keep internal datagrams private

• We can use VPN to build a private internet, not connected to the public Internet

• Or we can use VPN to build a private network, and connect each site to the Internet also (hybrid network)

34

Page 35: CSCI 6433 Internet Protocols Class  8

IPSec for VPNs

• IPSec can be used to provide a VPN• If IPSec is implemented in tunnel mode, it

protects the addresses as well as the contents of datagrams

• If IPSec is implemented using the “bump in the stack” architecture, then the security parameters can be used to implement a VPN using IPSec

35

Page 36: CSCI 6433 Internet Protocols Class  8

VPN Example

36Source: Wikipedia

Page 37: CSCI 6433 Internet Protocols Class  8

Virtual Private Network

37

Page 38: CSCI 6433 Internet Protocols Class  8

Virtual Private Network

38

Page 39: CSCI 6433 Internet Protocols Class  8

VPN Addressing

39

Page 40: CSCI 6433 Internet Protocols Class  8

VPN with Private Addresses

40

Page 41: CSCI 6433 Internet Protocols Class  8

VPN Services

• Today a great variety of VPN services are offered• One service lets you use an IP address

associated with a different location so that your messages appear to come from somewhere other than your location

• Another lets you use a constant IP address even though your ISP may use dynamic IP addressing or you might have a NAT router

41

Page 42: CSCI 6433 Internet Protocols Class  8

Summary

• VPN—less costly alternative to private connection between networks

42