18
IPSec – IP Security Protocol By Archis Raje

IPSec IP Security Protocol By Archis Raje. What is IPSec IP Security set of extensions developed by IETF to provide privacy and authentication to

Embed Size (px)

DESCRIPTION

Why do we need IPSec? Because IP is insecure – you can Forge IP address modify packet contents replay old content inspect packet content during transit

Citation preview

Page 1: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

IPSec – IP Security Protocol

ByArchis Raje

Page 2: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

What is IPSec IP Security – set of extensions

developed by IETF to provide privacy and authentication to IP.

To protect the contents of an IP datagram, the data is transformed using cryptography.

Page 3: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Why do we need IPSec?Because IP is insecure – you can• Forge IP address• modify packet contents• replay old content• inspect packet content during transit

Page 4: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

How does it work?combination of - Cryptographic protocols Security mechanisms

Page 5: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

What Does IPSec Provide? Access control to network elements. Data origin authentication. Connectionless integrity for protocols

such as UDP. Detection and rejection of replayed

packets. Use of encryption to provide data

confidentiality. Limited traffic flow confidentiality.

Page 6: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Since the IPSec services are offered at the

network layer of the TCP/IP protocol stack, these services can be used by any of the upper-layer protocols such as TCP, UDP, ICMP and IGMP or any application layer protocol.

IPSec provides cryptographic based security for ipv4 and ipv6 datagrams.

Page 7: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

How?Using two traffic security protocols: Authentication header (AH). Encapsulating security payload (ESP).

And through the use of cryptographic-key management procedures and protocols such as -

Internet key exchange (IKE) protocol.

Page 8: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Together, the security protocols

provide - Data confidentiality Limited traffic flow confidentiality Connectionless integrity Data origin authentication Anti-replay service

Page 9: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Modes of Operation of AH and ESP Transport mode Tunnel mode

Page 10: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Transport Mode

Authenticated

IP Header

AH transformation:

IP Header

TCP/UDP Header

TCP/UDPHeaderAH Header

Upper layerpayload

Upper layerpayload

Page 11: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Transport ModeESP transformation:

Encrypted

Authenticated

IP Header

IP Header

TCP/UDP Header

TCP/UDP Header

Upper layerpayload

Upper layerpayload

ESP Header

ESPTrailer

ESPauth

Page 12: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Tunnel ModeAH transformation:

IP HeaderUpper layerpayload

Upper layerpayloadIP Header

TCP/UDP Header

TCP/UDP HeaderIP Header AH Header

Authenticated

Page 13: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Tunnel ModeESP transformation:

Encrypted

Authenticated

IP Header

IP Header IP Header

TCP/UDP Header

TCP/UDP Header

Upper layerpayload

Upper layerpayload

ESP Header

ESPTrailer

ESPauth

Page 14: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Communication The IKE protocol is used to negotiate the

cryptographic algorithm choices, to be utilized by AH and ESP, and put in place the necessary cryptographic keys that the algorithms require.

IPSec can implement different security policy/encryption algorithm for different subnets, nodes, etc.

It does this by the use of Security Association (SA).

Page 15: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Security AssociationAn agreement between communicating peers

on factors such as - IPSec protocol Mode of operation of the protocols (transport

mode or tunnel mode) Cryptographic algorithms Cryptographic keys Lifetime of the keys

SAs are simplex (unidirectional)

Page 16: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

SAD – Security Association Database Stores SA parameters communicated by

IKE. Contents are –

Sequence number counter. Sequence counter overflow flag Anti-replay window IPSec protocol mode Path maximum transfer unit (PMTU) Lifetime of the SA

Page 17: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

SPD - Security Policy Database Contains policies that are to be applied to

the traffic destined to or originated from a given host or network.

Contents are – Destination IP address Source IP address Transport layer protocol System name: FQDN or email id User ID

Page 18: IPSec  IP Security Protocol By Archis Raje. What is IPSec IP Security  set of extensions developed by IETF to provide privacy and authentication to

Drawbacks Complex - has too many options. Prone to Initialization Vector attacks.