CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or...

59
IPsec CNT4406/5412 Network Security IPsec Zhi Wang Florida State University Fall 2014 Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 18

Transcript of CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or...

Page 1: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec

CNT4406/5412 Network SecurityIPsec

Zhi Wang

Florida State University

Fall 2014

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 1 / 18

Page 2: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction

IPsec is a protocol suite for securing IP communication by authenticatingand encrypting each IP packet of a session.

à IPsec can provide authentication and/or confidentialityà IPsec is implemented in the kernel, applications may remain unchangedà IPsec can be configured to be transparent to users

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 2 / 18

Page 3: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction

IPsec is a protocol suite for securing IP communication by authenticatingand encrypting each IP packet of a session.

à IPsec can provide authentication and/or confidentiality

à IPsec is implemented in the kernel, applications may remain unchangedà IPsec can be configured to be transparent to users

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 2 / 18

Page 4: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction

IPsec is a protocol suite for securing IP communication by authenticatingand encrypting each IP packet of a session.

à IPsec can provide authentication and/or confidentialityà IPsec is implemented in the kernel, applications may remain unchanged

à IPsec can be configured to be transparent to users

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 2 / 18

Page 5: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction

IPsec is a protocol suite for securing IP communication by authenticatingand encrypting each IP packet of a session.

à IPsec can provide authentication and/or confidentialityà IPsec is implemented in the kernel, applications may remain unchangedà IPsec can be configured to be transparent to users

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 2 / 18

Page 6: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction...

Why do we need IPsec?

IPv4 has no authentication or integrity protectionà IP spoofing, payload modification, lack of accountabilityIPv4 has no confidentiality protectionà eavesdropping

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 18

Page 7: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction...

Why do we need IPsec?IPv4 has no authentication or integrity protection

à IP spoofing, payload modification, lack of accountabilityIPv4 has no confidentiality protectionà eavesdropping

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 18

Page 8: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction...

Why do we need IPsec?IPv4 has no authentication or integrity protectionà IP spoofing, payload modification, lack of accountability

IPv4 has no confidentiality protectionà eavesdropping

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 18

Page 9: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction...

Why do we need IPsec?IPv4 has no authentication or integrity protectionà IP spoofing, payload modification, lack of accountabilityIPv4 has no confidentiality protection

à eavesdropping

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 18

Page 10: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Introduction

Introduction...

Why do we need IPsec?IPv4 has no authentication or integrity protectionà IP spoofing, payload modification, lack of accountabilityIPv4 has no confidentiality protectionà eavesdropping

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 3 / 18

Page 11: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

IPsec Architecture

SPD: Security Policy Database

IKE: Internet Key Exchange à to negotiate security parametersSA & SAD: Security Association (Database)IPsec: Authentication Header/Encapsulating Security Payloadà AH → authenticationà ESP → encryption and/or authentication

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 4 / 18

Page 12: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

IPsec Architecture

SPD: Security Policy DatabaseIKE: Internet Key Exchange à to negotiate security parameters

SA & SAD: Security Association (Database)IPsec: Authentication Header/Encapsulating Security Payloadà AH → authenticationà ESP → encryption and/or authentication

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 4 / 18

Page 13: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

IPsec Architecture

SPD: Security Policy DatabaseIKE: Internet Key Exchange à to negotiate security parametersSA & SAD: Security Association (Database)

IPsec: Authentication Header/Encapsulating Security Payloadà AH → authenticationà ESP → encryption and/or authentication

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 4 / 18

Page 14: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

IPsec Architecture

SPD: Security Policy DatabaseIKE: Internet Key Exchange à to negotiate security parametersSA & SAD: Security Association (Database)IPsec: Authentication Header/Encapsulating Security Payloadà AH → authenticationà ESP → encryption and/or authentication

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 4 / 18

Page 15: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Association

A IPsec security association is a cryptographically protected connection

A SA has a set of security parameters (attributes)à e.g., identities, algorithms, keys, sequence numberà SA specifies how to process IPsec packetsSA is unidirectional, two SAs for a conversationSA may be changed during the conversation (IKE rekeying)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 18

Page 16: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Association

A IPsec security association is a cryptographically protected connectionA SA has a set of security parameters (attributes)à e.g., identities, algorithms, keys, sequence numberà SA specifies how to process IPsec packets

SA is unidirectional, two SAs for a conversationSA may be changed during the conversation (IKE rekeying)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 18

Page 17: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Association

A IPsec security association is a cryptographically protected connectionA SA has a set of security parameters (attributes)à e.g., identities, algorithms, keys, sequence numberà SA specifies how to process IPsec packetsSA is unidirectional, two SAs for a conversation

SA may be changed during the conversation (IKE rekeying)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 18

Page 18: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Association

A IPsec security association is a cryptographically protected connectionA SA has a set of security parameters (attributes)à e.g., identities, algorithms, keys, sequence numberà SA specifies how to process IPsec packetsSA is unidirectional, two SAs for a conversationSA may be changed during the conversation (IKE rekeying)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 5 / 18

Page 19: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Parameter Index (SPI)

SPI is a 32-bit number assigned to a SA

SPI is chosen by the destination of a SAA SA is uniquely identified by < SPI, destination addr , AH or ESP >à SPI may overlap for unicast and multicast addressesà SPI may overlap for AH and ESPSPI is carried in each AH and ESP headerà the receiver can look up the SA for the packet in its SADà the SA determines how to process the packet

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 18

Page 20: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Parameter Index (SPI)

SPI is a 32-bit number assigned to a SASPI is chosen by the destination of a SA

A SA is uniquely identified by < SPI, destination addr , AH or ESP >à SPI may overlap for unicast and multicast addressesà SPI may overlap for AH and ESPSPI is carried in each AH and ESP headerà the receiver can look up the SA for the packet in its SADà the SA determines how to process the packet

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 18

Page 21: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Parameter Index (SPI)

SPI is a 32-bit number assigned to a SASPI is chosen by the destination of a SAA SA is uniquely identified by < SPI, destination addr , AH or ESP >à SPI may overlap for unicast and multicast addressesà SPI may overlap for AH and ESP

SPI is carried in each AH and ESP headerà the receiver can look up the SA for the packet in its SADà the SA determines how to process the packet

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 18

Page 22: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Parameter Index (SPI)

SPI is a 32-bit number assigned to a SASPI is chosen by the destination of a SAA SA is uniquely identified by < SPI, destination addr , AH or ESP >à SPI may overlap for unicast and multicast addressesà SPI may overlap for AH and ESPSPI is carried in each AH and ESP headerà the receiver can look up the SA for the packet in its SADà the SA determines how to process the packet

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 6 / 18

Page 23: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Association Database

SAs are stored in the security association database

SAD can be searched with < SPI, destination addr , AH or ESP >à SA specifies how to send packets or process received packetsEach host/gateway participating in IPsec maintains its own SAD

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 7 / 18

Page 24: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Association Database

SAs are stored in the security association databaseSAD can be searched with < SPI, destination addr , AH or ESP >à SA specifies how to send packets or process received packets

Each host/gateway participating in IPsec maintains its own SAD

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 7 / 18

Page 25: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Association Database

SAs are stored in the security association databaseSAD can be searched with < SPI, destination addr , AH or ESP >à SA specifies how to send packets or process received packetsEach host/gateway participating in IPsec maintains its own SAD

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 7 / 18

Page 26: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Policy DatabaseSPD is a database of policies to process packets: drop, send w/ IPsec? ...

à SPD policy has a selector and action, similar to the firewall policy

Index Local Remote Proto Dir Action SA In/Out9 1.1.1.12:80 2.2.1.0/24:any TCP I/O IPsec sa15/sa258 1.1.1.0/24:any 2.2.1.0/24:any any I/O IPsec sa10/sa20

...... ... I... ... O drop null0 any any any I/O bypass null

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 8 / 18

Page 27: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Policy DatabaseSPD is a database of policies to process packets: drop, send w/ IPsec? ...à SPD policy has a selector and action, similar to the firewall policy

Index Local Remote Proto Dir Action SA In/Out9 1.1.1.12:80 2.2.1.0/24:any TCP I/O IPsec sa15/sa258 1.1.1.0/24:any 2.2.1.0/24:any any I/O IPsec sa10/sa20

...... ... I... ... O drop null0 any any any I/O bypass null

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 8 / 18

Page 28: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

Security Policy DatabaseSPD is a database of policies to process packets: drop, send w/ IPsec? ...à SPD policy has a selector and action, similar to the firewall policy

Index Local Remote Proto Dir Action SA In/Out9 1.1.1.12:80 2.2.1.0/24:any TCP I/O IPsec sa15/sa258 1.1.1.0/24:any 2.2.1.0/24:any any I/O IPsec sa10/sa20

...... ... I... ... O drop null0 any any any I/O bypass null

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 8 / 18

Page 29: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

IPsec Outbound Processing

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 9 / 18

Page 30: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Architecture

IPsec Inbound Processing

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 10 / 18

Page 31: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Tunnel Mode

IPsec can operate in tunnel mode and transport mode

Tunnel mode:the original IP packet is enclosed in an outer IP header w/ ESP/AHcommonly used in firewall to firewall or endnode to firewallà data is only protected inside the tunnel (not end-to-end)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 18

Page 32: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Tunnel Mode

IPsec can operate in tunnel mode and transport mode

Tunnel mode:the original IP packet is enclosed in an outer IP header w/ ESP/AH

commonly used in firewall to firewall or endnode to firewallà data is only protected inside the tunnel (not end-to-end)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 18

Page 33: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Tunnel Mode

IPsec can operate in tunnel mode and transport mode

Tunnel mode:the original IP packet is enclosed in an outer IP header w/ ESP/AHcommonly used in firewall to firewall or endnode to firewall

à data is only protected inside the tunnel (not end-to-end)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 18

Page 34: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Tunnel Mode

IPsec can operate in tunnel mode and transport mode

Tunnel mode:the original IP packet is enclosed in an outer IP header w/ ESP/AHcommonly used in firewall to firewall or endnode to firewallà data is only protected inside the tunnel (not end-to-end)

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 11 / 18

Page 35: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Tunnel Mode...

Two firewalls establish an encrypted tunnel across the Internet

IPsec packets from F1 to F2 have a destination of F2à the inner IP packet is not changed

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 18

Page 36: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Tunnel Mode...

Two firewalls establish an encrypted tunnel across the InternetIPsec packets from F1 to F2 have a destination of F2

à the inner IP packet is not changed

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 18

Page 37: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Tunnel Mode...

Two firewalls establish an encrypted tunnel across the InternetIPsec packets from F1 to F2 have a destination of F2à the inner IP packet is not changed

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 12 / 18

Page 38: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Transport Mode

IPsec header is inserted after the IP header of the original packet

Commonly applied end-to-end, data is protected end-to-endTransport mode is not strictly necessary, tunnel mode can be usedà tunnel mode uses more header space

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 18

Page 39: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Transport Mode

IPsec header is inserted after the IP header of the original packetCommonly applied end-to-end, data is protected end-to-end

Transport mode is not strictly necessary, tunnel mode can be usedà tunnel mode uses more header space

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 18

Page 40: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Transport Mode

IPsec header is inserted after the IP header of the original packetCommonly applied end-to-end, data is protected end-to-endTransport mode is not strictly necessary, tunnel mode can be used

à tunnel mode uses more header space

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 18

Page 41: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Modes

Transport Mode

IPsec header is inserted after the IP header of the original packetCommonly applied end-to-end, data is protected end-to-endTransport mode is not strictly necessary, tunnel mode can be usedà tunnel mode uses more header space

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 13 / 18

Page 42: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

IP Header

Protocol: what protocol follows the IP header

à common protocols: TCP(6), UDP(17), IP(4), ESP(50), AH(51)à protocol headers in IPv6 are TLV-encoded

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 18

Page 43: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

IP Header

Protocol: what protocol follows the IP headerà common protocols: TCP(6), UDP(17), IP(4), ESP(50), AH(51)

à protocol headers in IPv6 are TLV-encoded

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 18

Page 44: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

IP Header

Protocol: what protocol follows the IP headerà common protocols: TCP(6), UDP(17), IP(4), ESP(50), AH(51)à protocol headers in IPv6 are TLV-encoded

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 14 / 18

Page 45: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Authentication Header

AH header provides authentication only, not encryption

AH header has variable length (which field?)à sequence number: sequence number of AH packetsà ICV: integrity check value for the dataICV covers both data and immutable or predictable fields in IP headerà outer IP header is covered in tunnel modeà immutable fields: version, total length (what if fragmented?)...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 18

Page 46: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Authentication Header

AH header provides authentication only, not encryptionAH header has variable length (which field?)à sequence number: sequence number of AH packetsà ICV: integrity check value for the data

ICV covers both data and immutable or predictable fields in IP headerà outer IP header is covered in tunnel modeà immutable fields: version, total length (what if fragmented?)...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 18

Page 47: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Authentication Header

AH header provides authentication only, not encryptionAH header has variable length (which field?)à sequence number: sequence number of AH packetsà ICV: integrity check value for the dataICV covers both data and immutable or predictable fields in IP header

à outer IP header is covered in tunnel modeà immutable fields: version, total length (what if fragmented?)...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 18

Page 48: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Authentication Header

AH header provides authentication only, not encryptionAH header has variable length (which field?)à sequence number: sequence number of AH packetsà ICV: integrity check value for the dataICV covers both data and immutable or predictable fields in IP headerà outer IP header is covered in tunnel mode

à immutable fields: version, total length (what if fragmented?)...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 18

Page 49: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Authentication Header

AH header provides authentication only, not encryptionAH header has variable length (which field?)à sequence number: sequence number of AH packetsà ICV: integrity check value for the dataICV covers both data and immutable or predictable fields in IP headerà outer IP header is covered in tunnel modeà immutable fields: version, total length (what if fragmented?)...

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 15 / 18

Page 50: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

AH Problems

AH covers both data and part of the IP header, problems?

à difficult for NAT traversal because NAT need to change IP headerà inconsistent in which fields to include: fragment offset is mutable?ICV before data prevents streamlining AH head processà NIC needs to cache the whole packet, cannot send-as-you-goAH can only do authentication and it duplicates functionality in ESP

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 18

Page 51: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

AH Problems

AH covers both data and part of the IP header, problems?à difficult for NAT traversal because NAT need to change IP header

à inconsistent in which fields to include: fragment offset is mutable?ICV before data prevents streamlining AH head processà NIC needs to cache the whole packet, cannot send-as-you-goAH can only do authentication and it duplicates functionality in ESP

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 18

Page 52: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

AH Problems

AH covers both data and part of the IP header, problems?à difficult for NAT traversal because NAT need to change IP headerà inconsistent in which fields to include: fragment offset is mutable?

ICV before data prevents streamlining AH head processà NIC needs to cache the whole packet, cannot send-as-you-goAH can only do authentication and it duplicates functionality in ESP

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 18

Page 53: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

AH Problems

AH covers both data and part of the IP header, problems?à difficult for NAT traversal because NAT need to change IP headerà inconsistent in which fields to include: fragment offset is mutable?ICV before data prevents streamlining AH head processà NIC needs to cache the whole packet, cannot send-as-you-go

AH can only do authentication and it duplicates functionality in ESP

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 18

Page 54: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

AH Problems

AH covers both data and part of the IP header, problems?à difficult for NAT traversal because NAT need to change IP headerà inconsistent in which fields to include: fragment offset is mutable?ICV before data prevents streamlining AH head processà NIC needs to cache the whole packet, cannot send-as-you-goAH can only do authentication and it duplicates functionality in ESP

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 16 / 18

Page 55: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Encapsulating Security Payload

ESP always has an encryption operation, and also supports authentication

à special null encryption if encryption is not neededESP puts information before and after the data (sandwiching)à ICV after the data avoids caching whole packet before sending itData is padded to fit the cipher’s block size

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 18

Page 56: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Encapsulating Security Payload

ESP always has an encryption operation, and also supports authenticationà special null encryption if encryption is not needed

ESP puts information before and after the data (sandwiching)à ICV after the data avoids caching whole packet before sending itData is padded to fit the cipher’s block size

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 18

Page 57: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Encapsulating Security Payload

ESP always has an encryption operation, and also supports authenticationà special null encryption if encryption is not needed

ESP puts information before and after the data (sandwiching)à ICV after the data avoids caching whole packet before sending it

Data is padded to fit the cipher’s block size

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 18

Page 58: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec IPsec Operation

Encapsulating Security Payload

ESP always has an encryption operation, and also supports authenticationà special null encryption if encryption is not needed

ESP puts information before and after the data (sandwiching)à ICV after the data avoids caching whole packet before sending itData is padded to fit the cipher’s block size

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 17 / 18

Page 59: CNT4406/5412 Network Securityzwang/files/cnt5412/fall2014/Lec11.pdfIPv4 has no authentication or integrity protection à IP spoofing, payload modification, lack of accountability

IPsec Summary

Summary

IPsec ArchitectureIPsec ModesAH and ESP

Next lecture: IPsec/IKE

Zhi Wang (FSU) CNT4406/5412 Network Security Fall 2014 18 / 18