SlideShare une entreprise Scribd logo
1  sur  104
IPSEC AND VPN
Presented by : Abdullaziz Tagawy
Course : Computer Security
1
March / 2016
Resources
 Materials
 IPSec Tutorial by Scott Cleven-
MulcahyItem (paper is taken from the
GIAC directory of certified
professionals)
 IPSec—An Overview; (Presented
by Somesh Jha) University of
Wisconsin.
 The Cryptography of the IPSec
and IKE Protocols; (presented by
Hugo Krawczyk), Technion & IBM
Research.
 INTERNET KEY EXCHANGE
PROTOCOL ; (Presented by
PRATEEK SINGH BAPNA).
 IP Security (IPSec); (Presented
by Thomas Lee ), Chief
Technologist –QA .
 Technical Development Program
- VPN basics (Presented by Martín
Bratina) 2014 AT&T Intellectual
Property.
 Book(s)
 Cryptography and Network Security
Principles and Practice – 6th Ed
(William Stallings)
 Cryptography and Network Security by
Forouzan (2007)
 Google search
 http://www.slideshare.net
2
IPSec Contents
 IP Security Overview
 Applications of Ipsec
 Benefits of Ipsec
 IPsec Documents
 IPsec Services
 Transport and Tunnel Modes
 IP Security Policy
 Security Associations
 Security Association Database
 Security Policy Database
 IP Traffic Processing
3
IPSec Contents
 Encapsulating Security Payload
 ESP Format
 Encryption and Authentication Algorithms
 Padding
 Anti-Replay Service
 Transport and Tunnel Modes
 Combining Security Associations
 Authentication Plus Confidentiality
 Basic Combinations of Security
Associations
4
IPSec Contents
 Internet Key Exchange
 Key Determination Protocol
 Header and Payload Formats
 All Together
 VPN
 What is a VPN?
 Types of VPNs.
 Commonly used VPNs
 IPSec VPN Benefits
5
IP Security Overview
 IPsec provides the
capability to secure
communications
across a LAN,
across private and
public WANs, and
across the Internet.
Examples of its use
include:
 Secure branch office
connectivity over the
Internet
 Secure remote access
over the Internet
 Establishing extranet
and intranet connectivity
with partners
 Enhancing electronic
commerce security
Applications of Ipsec:-
6
IP Security Overview
 Some of the benefits
of IPsec:-
 When IPsec is implemented
in a firewall or router, it
provides strong security that
can be applied to all traffic
crossing the perimeter.
 IPsec in a firewall is resistant
to bypass.
 IPsec is below the transport
layer (TCP, UDP) and so is
transparent to applications.
 IPsec can be transparent to
end users.
 IPsec can provide security for
individual users if needed.
Benefits of Ipsec:-
7
IP Security Overview
 IPsec encompasses three
functional areas:
 authentication,
 confidentiality,
 key management.
 The latest version of the
IPsec document roadmap,
which as of this writing is
RFC 6071.
 The documents can be
categorized into the
following groups:
 Architecture: Covers the
general concepts, security
requirements, definitions, and
mechanisms defining IPsec
technology “RFC 4301[Security
Architecture for the Internet
Protocol.]”.
 Authentication Header
(AH):RFC 4302[IP Authentication
Header] Note that the use of AH
is deprecated. It is included in
IPsecv3 for backward
compatibility but should not be
used in new applications.
 Encapsulating Security
Payload (ESP):The current
specification is RFC 4303, [IP
Encapsulating Security Payload
(ESP)].
IPsec Documents:-
8
IP Security Overview
 IPsec encompasses three
functional areas:
 authentication,
 confidentiality,
 key management.
 The latest version of the
IPsec document roadmap,
which as of this writing is
RFC 6071.
 The documents can be
categorized into the
following groups:
 Internet Key Exchange (IKE):
RFC 5996, [Internet Key
Exchange (IKEv2) Protocol], but
there are a number of related
RFCs.
 Cryptographic algorithms: This
category encompasses a large
set of documents that define and
describe cryptographic
algorithms for encryption,
message authentication,
pseudorandom functions (PRFs),
and cryptographic key exchange.
 Other: There are a variety of
other IPsec-related RFCs,
including those dealing
 with security policy and
management information base
IPsec Documents:-
9
IP Security Overview
 IPsec provides security
services at the IP layer
(AH , ESP) by enabling
a system to select
required security
protocols, determine
the algorithm(s) to use
for the service(s), and
put in place any
cryptographic keys
required to provide the
requested services.
 Access control
 Connectionless integrity
 Data origin
authentication
 Rejection of replayed
packets (a form of
partial sequence
integrity)
 Confidentiality
(encryption)
 Limited traffic flow
IPsec Services:-
10
IP Security Overview
 Access Control
 IPSec provides access control indirectly, using a Security Association Database (SAD),
When a packet arrives at a destination and there is no Security Association already
established for this packet, the packet is discarded.
 Message Integrity
 A digest of data is created and sent by the sender to be checked by the receiver.
 Entity Authentication
 The Security Association and the keyed-hash digest of the data sent by the sender
authenticate the sender of the data
IPsec Services:-
11
IP Security Overview
 Confidentiality
 The encryption of the message in ESP provides confidentiality. AH, however, does not provide
confidentiality. If confidentiality is needed, one should use ESP instead of AH.
 Replay Attack Protection
 The replay attack is prevented by using sequence numbers and a sliding receiver window.
Each IPSec header contains a unique sequence number when the Security Association is
established. The number starts from 0 and increases until the value reaches 232
− 1. When
the sequence number reaches the maximum, it is reset to 0 and, at the same time, the old
Security Association (see the next section) is deleted and a new one is established. To
prevent processing duplicate packets, IPSec mandates the use of a fixed-size window at the
receiver. The size of the window is determined by the receiver with a default value of 64.
IPsec Services:-
12
IP Security Overview
 Both AH and ESP support two modes of use:
transport and tunnel mode.
Transport and Tunnel Modes:-
13
IP Security Overview
Transport and Tunnel Modes:-
Transport Mode
Transport and Tunnel Modes:-
Tunnel Mode
14
IP Security Overview
Transport and Tunnel Modes:-
Transport Mode
Transport and Tunnel Modes:-
Tunnel Mode
15
IP Security Overview
 Transport mode is normally
used when we need host-to-
host (end-to-end) protection
of data.
 The sending host uses
IPSec to authenticate and/or
encrypt the payload delivered
from the transport layer.
 The receiving host uses
IPSec to check the
authentication and/or decrypt
the IP packet and deliver it to
the transport layer.
 The new IP header, has
different information than the
original IP header.
 Tunnel mode is normally used
between two routers,
between a host and a router,
or between a router and a
host.
 The entire original packet is
protected from intrusion
between the sender and the
receiver, as if the whole
packet goes through an
imaginary tunnel.
Transport and Tunnel Modes:-
Transport Mode
Transport and Tunnel Modes:-
Tunnel Mode
16
IP Security Overview
Transport and Tunnel Modes:-
Transport Mode
Transport and Tunnel Modes:-
Tunnel Mode
17
IP Security Overview
 The IPSec layer
comes between the
transport layer and
the network layer.
 The flow is from the
network layer to the
IPSec layer and then
back to the network
layer again.
Transport and Tunnel Modes:-
Transport Mode
Transport and Tunnel Modes:-
Tunnel Mode
18
IP Security Policy
 Security Policy (SP): This is important aspect
of IPSec which defines the type of security
applied to a packet when it is to be sent or
when it has arrived.
 IPsec policy is determined primarily by the
interaction of two databases, the security
association database (SAD) and the
security policy database (SPD).
19
IP Security Policy
20
IP Security Policy
 It is a key concept
that appears in both
the authentication and
confidentiality
mechanisms for IP.
 It is a contract
between two parties;
it creates a secure
channel between
them.
 Alice needs to
unidirectionally
communicate with Bob.
 If they are interested only
in the confidentiality aspect
of security, they can get a
shared secret key between
themselves.
 That is mean there are two
SA’s between Alice and
Bob; one outbound SA
and one inbound SA.
Security Associations:- Idea of Security Association
21
IP Security Policy
 The Security Association can
be more involved if the two
parties need message
integrity and authentication.
 It needs other data such as
the algorithm for message
integrity, the key, and other
parameters.
 It can be much more complex
if the parties need to use
specific algorithms and
specific parameters for
different protocols, such as
IPSec AH or IPSec ESP.
 Each of them stores the value
of the key in one variable and
the name of the encryption/
decryption algorithm in
another.
 Alice uses the algorithm and
the key to encrypt a message
to Bob; Bob uses the
algorithm and the key when
he needs to decrypt the
message received from Alice.
Security Associations:-
Idea of Security Association
(con..)
22
IP Security Policy
 A security association is
uniquely identified by three
parameters.
 Security Parameters Index
(SPI): A 32-bit unsigned
integer assigned to this SA
and having local significance
only. The SPI is carried in AH
and ESP headers to enable
the receiving system to select
the SA under which a received
packet will be processed.
 IP Destination Address: This
is the address of the
destination endpoint of the SA,
which may be an end-user
system or a network system
such as a firewall or router.
 Security Protocol Identifier:
This field from the outer IP
header indicates whether the
association is an AH or ESP
security association.
Security Associations:-
23
IP Security Policy
 We need a set of
SAs that can be
collected into a
database.
 We need a set of
SAs that can be
collected into a
database.
 The database can
be thought of as a
two-dimensional
table with each row
defining a single SA.
 There are two
SADs, one inbound
and one outbound
Security Association
Database:-
24
IP Security Policy
 Security Parameter Index: A 32-bit value selected by the receiving end of an
SA to uniquely identify the SA. In an SAD entry for an outbound SA, the SPI is
used to construct the packet’s AH or ESP header. In an SAD entry for an
inbound SA, the SPI is used to map traffic to the appropriate SA.
 • Sequence Number Counter: A 32-bit value used to generate the Sequence
Number field in AH or ESP headers, (required for all implementations).
 • Sequence Counter Overflow: A flag indicating whether overflow of the
Sequence Number Counter should generate an auditable event and prevent
further transmission of packets on this SA (required for all implementations).
Security Association
Database:-
25
IP Security Policy
 Anti-Replay Window: Used to determine whether an inbound AH or
ESP packet is a replay, (required for all implementations).
 • AH Information: Authentication algorithm, keys, key lifetimes, and
related parameters being used with AH (required for AH
implementations).
 • ESP Information: Encryption and authentication algorithm, keys,
initialization values, key lifetimes, and related parameters being used
with ESP (required for ESP implementations).
Security Association
Database:-
26
IP Security Policy
 Lifetime of this Security Association: A time interval or byte count
after which an SA must be replaced with a new SA (and new SPI) or
terminated, plus an indication of which of these actions should occur
(required for all implementations).
 • IPsec Protocol Mode: Tunnel, transport, or wildcard.
 • Path MTU: Any observed path maximum transmission unit (maximum
size of a packet that can be transmitted without fragmentation) and aging
variables (required for all implementations).
Security Association
Database:-
27
IP Security Policy
 When a host needs to send a packet that must carry an IPSec header,
the host needs to find the corresponding entry in the outbound SAD to
find the information for applying security to the packet.
 when a host receives a packet that carries an IPSec header, the host
needs to find the corresponding entry in the inbound SAD to find the
information for checking the security of the packet.
Security Association
Database:-
28
IP Security Policy
 Each entry in an inbound SAD is selected using a triple index:
 Security parameter index (a 32-bit number that defines the SA at the
destination).
 Destination address.
 Protocol (AH or ESP).
Security Association
Database:-
29
IP Security Policy
 The means by which IP
traffic is related to specific
SAs (or no SA in the case
of traffic allowed to bypass
IPsec) is the nominal
Security Policy Database
(SPD).
 its simplest form, an SPD
contains entries, each of
which defines a subset of
IP traffic and points to an
SA for that traffic.
 In more complex
environments, there may
be multiple entries that
potentially relate to a
single SA or multiple SAs
associated with a single
SPD entry.
 Each SPD entry is defined
by a set of IP and upper-
layer protocol field values,
called selectors.
 These selectors are used
to filter outgoing traffic in
order to map it into a
particular SA.
Security Policy Database:-
30
IP Security Policy
 Outbound
processing obeys
the following general
sequence for each
IP packet:
1) Compare the values of the
appropriate fields in the
packet (the selector fields)
against the SPD to find a
matching SPD entry, which
will point to zero or more
SAs.
2) Determine the SA if any for
this packet and its
associated SPI.
3) Do the required IPsec
processing (i.e., AH or ESP
processing).
Security Policy Database:-
31
IP Security Policy
 The following selectors determine an
SPD entry:
 Remote IP Address: This may be a
single IP address, an enumerated
list or range of addresses, or a
wildcard (mask) address. The latter
two are required to support more
than one destination system sharing
the same SA (e.g., behind a
firewall).
 Local IP Address: This may be a
single IP address, an enumerated
list or range of addresses, or a
wildcard (mask) address. The latter
two are required to support more
than one source system sharing the
same SA (e.g., behind a firewall).
 Next Layer Protocol: The IP
protocol header (IPv4, IPv6, or IPv6
Extension) includes a field (Protocol
for IPv4, Next Header for IPv6 or
IPv6 Extension) that designates the
protocol operating over IP. This is an
individual protocol number, ANY, or
for IPv6 only, OPAQUE. If AH or ESP
is used, then this IP protocol header
immediately precedes the AH or ESP
header in the packet.
 Name: A user identifier from the
operating system. This is not a field
in the IP or upper-layer headers but
is available if IPsec is running on the
same operating system as the user.
 Local and Remote Ports: These
may be individual TCP or UDP port
values, an enumerated list of ports,
or a wildcard port.
Security Policy Database:-
32
IP Security Policy
Security Policy Database:-
33
IP Security Policy
 IPsec is executed
on a packet-by-
packet basis.
 Each outbound IP
packet is processed
by the IPsec logic
before transmission.
 Each inbound
packet is processed
by the IPsec logic
after reception and
before passing the
packet contents on
to the next higher
layer
IP Traffic Processing:-
34
IP Security Policy
Outbound Packets:-
35
IP Security Policy
Inbound Packets:-
36
IP Security Policy
37
SPD and SADB Example
From To Protocol Port Policy
A B Any Any AH[HMAC-MD5]
Tunnel Mode
Transport Mode
C
A’s SPD
From To Protocol SPI SA Record
A B AH 12 HMAC-MD5 key
A’s SADB
From To Protocol Port Policy Tunnel Dest
Any Any ESP[3DES] D C’s SPD
From To Protocol SPI SA Record
ESP 14 3DES key
C’s SADB
D
A B
Authentication Header (AH)
 It is designed to authenticate the
source host and to ensure the
integrity of the payload carried in
the IP packet.
 The protocol uses a hash function
and a symmetric (secret) key to
create a message digest; the digest
is inserted in the authentication
header.
 The AH is then placed in the
appropriate location, based on the
mode (transport or tunnel).
38
Authentication Header (AH)
39
Authentication Header (AH)
Authentication Data
Sequence Number
Security Parameters Index (SPI)
Next
header
Payload
length
Reserved
Old IP header (only in Tunnel mode)
TCP header
New IP header
Authenticated
Data
Encapsulated
TCP or IP packet
Hash of everything
else
40
Authentication Header (AH)
 Before applying AH
41
Authentication Header (AH)
Transport Mode (AH
Authentication)
Tunnel Mode (AH
Authentication)
42
Authentication Header (AH)
43
Encapsulating Security
Payload(ESP)
 ESP can be used to provide :
 Confidentiality
 Data origin authentication
 connectionless integrity
 An anti-replay service (a form of partial
sequence integrity)
 And (limited) traffic flow confidentiality.
44
Encapsulating Security
Payload(ESP)
 Can optionally provide the same
authentication services as AH
 Supports range of ciphers, modes,
padding:
 incl. DES, Triple-DES, RC5, IDEA, CAST etc
 CBC & other modes
 Padding needed to fill block size, fields, for
traffic flow.
45
Encapsulating Security
Payload(ESP)
 ESP adds a header and trailer.
 Note that ESP’s authentication data are added
at the end of the packet, which makes its
calculation easier.
46
Encapsulating Security
Payload(ESP)
 Security Parameters Index (32 bits): Identifies a
security association.
 Sequence Number (32 bits): A monotonically
increasing counter value; this provides an anti-
replay function, as discussed for AH.
 Payload Data (variable): This is a transport-level
segment (transport mode) or IP packet (tunnel
mode) that is protected by encryption.
 Padding (0–255 bytes):
 Pad Length (8 bits): Indicates the number of pad
bytes immediately preceding this field.
 Next Header (8 bits): Identifies the type of data
contained in the payload data field by identifying
the first header in that payload (e.g., an extension
header in IPv6, or an upper-layer protocol such as
TCP).
 Integrity Check Value (variable): A variable-
length field (must be an integral number of 32-bit
words) that contains the Integrity Check Value
computed over the ESP packet minus the
Authentication Data field.
ESP Format:-
47
Encapsulating Security
Payload(ESP)
 Two additional fields may be
present in the payload:
 An initialization value (IV):
or nonce, is present if this is
required by the encryption
or authenticated encryption
algorithm used for ESP.
 Traffic flow confidentiality
(TFC) : The IPsec
implementation may add
padding after the Payload
Data and before the
Padding field
ESP Format:-
48
Encapsulating Security
Payload(ESP)
 The Payload Data, Padding, Pad
Length, and Next Header fields
are encrypted by the ESP
service.
 If the algorithm used to encrypt
the payload requires
cryptographic synchronization
data, such as an initialization
vector (IV), then these data may
be carried explicitly at the
beginning of the Payload Data
field.
 If included, an IV is usually not
encrypted, although it is often
referred to as being part of the
ciphertext.
Encryption and Authentication
Algorithms:-
 If included, an IV is usually not
encrypted, although it is often
referred to as being part of the
ciphertext.
 The ICV field is optional.
 The ICV is present only if the
integrity service is selected .
 The ICV is provided by either a
separate integrity algorithm or a
combined mode algorithm that
uses an ICV
 The ICV is computed after the
encryption is performed.
49
Encapsulating Security
Payload(ESP)
 The Padding field serves
several purposes:
 If an encryption algorithm
requires the plaintext to be
a multiple of some number
of bytes (e.g., the multiple
of a single block for a block
cipher), the Padding field is
used to expand the plaintext
(consisting of the Payload
Data, Padding, Pad Length,
and Next Header fields) to
the required length.
Padding:-
 The ESP format requires
that the Pad Length and
Next Header fields be right
aligned within a 32-bit word.
Equivalently, the ciphertext
must be an integer multiple
of 32 bits. The Padding field
is used to assure this
alignment.
 Additional padding may be
added to provide partial
traffic-flow confidentiality by
concealing the actual length
of the payload.
50
Encapsulating Security
Payload(ESP)
 A replay attack is one in
which an attacker obtains a
copy of an authenticated
packet and later transmits it to
the intended destination. The
receipt of duplicate,
authenticated IP packets may
disrupt service in some way
or may have some other
undesired consequence.
 The Sequence Number field
is designed to thwart such
attacks.
Anti-Replay Service:-
51
Encapsulating Security
Payload(ESP)
Anti-Replay Service:-
52
Encapsulating Security
Payload(ESP)
Anti-Replay Service:-
53
Encapsulating Security
Payload(ESP)
 Transport-level
security:
 A virtual private
network via tunnel
mode:
Transport and Tunnel Modes:-
54
Encapsulating Security
Payload(ESP)
Transport Mode ESP :-
55
Encapsulating Security
Payload(ESP)
Transport Mode ESP :-
Operation :
1) At the source, the block of
data consisting of the ESP
trailer plus the entire
transport-layer segment is
encrypted and the plaintext of
this block is replaced with its
ciphertext to form the IP
packet for transmission.
Authentication is added if this
option is selected.
2) The packet is then routed to
the destination. Each
intermediate router needs to
examine and
process the IP header plus
any plaintext IP extension
headers but does not need to
examine the ciphertext.
3) The destination node
examines and processes the
IP header plus any plaintext IP
extension headers. Then, on
the basis of the SPI in the ESP
header, the destination node
decrypts the remainder of the
packet to recover the plaintext
transport-layer segment.
56
Encapsulating Security
Payload(ESP)
Transport Mode ESP :-
Operation :
57
Encapsulating Security
Payload(ESP)
Tunnel Mode ESP:-
58
Encapsulating Security
Payload(ESP)
Tunnel Mode ESP:-
Operation
1) The source prepares an inner
IP packet with a destination
address of the target internal
host. This packet is prefixed
by an ESP header; then the
packet and ESP trailer are
encrypted and Authentication
Data may be added. The
resulting block is encapsulated
with a new IP header (base
header plus optional
extensions such as routing
and hop-by-hop options for
IPv6)
whose destination address is
the firewall; this forms the
outer IP packet.
2) The outer packet is routed to
the destination firewall. Each
intermediate router needs to
examine and process the
outer IP header plus any outer
IP extension headers but does
not need to examine the
ciphertext.
59
Encapsulating Security
Payload(ESP)
Tunnel Mode ESP:-
Operation
3) The destination firewall
examines and processes the
outer IP header plus any outer
IP extension headers. Then, on
the basis of the SPI in the ESP
header, the destination node
decrypts the remainder of the
packet to recover the plaintext
inner IP packet. This packet is
then transmitted in the internal
network.
4) The inner packet is routed
through zero or more routers
in the internal network to the
destination host.
60
Encapsulating Security
Payload(ESP)
Tunnel Mode ESP:-
Operation
61
Encapsulating Security
Payload(ESP)
Tunnel Mode ESP:- Transport Mode ESP :-
 Tunnel mode encrypts entire
IP packet
 Add new header for next hop
 Good for VPNs, gateway to
gateway security
 Transport mode is used to
encrypt & optionally
authenticate IP data
 Data protected but header left
in clear
 Can do traffic analysis but is
efficient
 Good for ESP host to host
traffic
62
Combining Security
Associations
 SA’s can implement either AH or ESP
 To implement both need to combine SA’s
 Form a security association bundle
 May terminate at different or same endpoints
 Combined by
 Transport adjacency
 Iterated tunneling
 Issue of authentication & encryption order
63
Combining Security
Associations64
Internet Key Exchange65
Internet Key Exchange
 Used for Key Management in IPSec Networks.
 The IPsec Architecture supports two types of key
management:
 Manual: A system administrator manually configures each
system with its own keys and with the keys of other
communicating systems. This is practical for small,
relatively static environments.
 Automated: An automated system enables the on-
demand creation of keys for SAs and facilitates the use of
keys in a large distributed system with an evolving
configuration.
 The default automated key management protocol for
IPsec is referred to as ISAKMP/Oakley
66
Overview :
Internet Key Exchange
 Creates SAs for use by IPSec.
 Negotiates security parameters for the SA
 Key Exchange: share keys between parties
 Manages SAs: create, refresh, maintain, delete.
 IKEv1 (1998):
 ISAKMP for management.
 Oakley is a key exchange protocol.
 IKEv2 (2003): IKE specifies it all
67
Overview :
Internet Key Exchange
 Oakley Key Determination Protocol: Oakley is
a key exchange protocol based on the Diffie-
Hellman algorithm but providing added security.
Oakley is generic in that it does not dictate
specific formats.
 Internet Security Association and Key
Management Protocol (ISAKMP): ISAKMP
provides a framework for Internet key
management and provides the specific protocol
support, including formats, for negotiation of
security attributes.
68
IKE History
Internet Key Exchange
 When a peer needs to send an IP packet, it
consults the Security Policy Database (SPD) to
see if there is an AS for that type of traffic. If
there is no SA, IKE will called to establish one.
 IKE operates in two phases:
 IKE Phase 1
 Uses Main or Aggressive mode exchange
 Negotiates IKE SA
 Only established once between two end
points
69
How It Works:
Internet Key Exchange
 IKE operates in two phases:
 IKE Phase 2
 Uses quick mode exchange.
 Negotiates IPSec SAs.
 Occurs multiple times.
 Both phases use Diffie-Hellman key
exchange to establish a shared key.
70
How It Works:
Internet Key Exchange
 When A wants to talk to B under protection of IPSec, and
they do not have an established SA:
 A invokes IKE to signal B its request for an SA
 IKE is run between A and B: result is a shared SA
(services to be applied and fresh shared keys)
 Negotiated parameters stored locally at A and B (SAD)
 SPI (sec. parameters index): pointer to SA included in the
IPSec header of each packet
 Architectural separation: IKE writes to SAD, IPSec reads
from SAD.
71
How It Works:
Internet Key Exchange
72
How It Works:
Internet Key Exchange
 Algorithm for secure key exchange over
unsecured channels.
 Based on the difficulty of finding discreet
algorithms.
 Used to establish a shared secret between
parties (usually the secret keys for symmetric
encryption or HMACs).
73
Diffie-Hellman Algorithm:
Internet Key Exchange
 General overview:
Key Exchange establishes a
shared secret between two
parties that can be used for
secret communication for
exchanging data over a public
network. The following
conceptual diagram illustrates
the general idea of the key
exchange by using colors
instead of very large numbers.
74
Diffie-Hellman Algorithm:
Internet Key Exchange
 The parties agree on two non-secret
numbers, g (generator), and p (modulus),
where g is small and p is very large
 Each party generates a random secret X
 Based on g, p, and X, each party generates
a public value
Y=𝒈 𝑿
mod p
 Peers then exchange public values
75
Diffie-Hellman Algorithm:
Internet Key Exchange
76
Diffie-Hellman Algorithm:
APrivate Value, X
Public Value, Y
Private Value, X
Public Value, Y B𝒀 𝑨 = 𝒈 𝑨
𝑿
mod p
𝒀 𝑩= 𝒈 𝑩
𝑿
mod p𝒀 𝑨
𝒀 𝑩
𝒀 𝑩 = 𝒀 𝑨 = 𝒈 𝑿(𝑩)
𝑿(𝑨)
𝒎𝒐𝒅 𝒑
(Shared Secret)
Internet Key Exchange
 There are a number of weaknesses to Diffie-Hellman,
as pointed out in [HUIT98].
 It does not provide any information about the
identities of the parties.
 It is subject to a man-in-the-middle attack, in
which a third party C impersonates B while
communicating with A and impersonates A while
communicating with B. Both A and B end up
negotiating a key with C, which can then listen to
and pass on traffic. The man-in-the-middle attack
proceeds as
77
Diffie-Hellman Algorithm:
Internet Key Exchange
78
Diffie-Hellman Algorithm:
This is how does Diffie-Hellman
work:
This is how does the man-in-
the-middle attack work in Diffie-
Hellman:
Internet Key Exchange
 There are a number of weaknesses to Diffie-Hellman,
as pointed out in [HUIT98].
 It is computationally intensive. As a result, it is
vulnerable to a clogging attack,in which an
opponent requests a high number of keys. The
victim spends considerable computing resources
doing useless modular exponentiation rather than
real work.
 IKE key determination is designed to retain the
advantages of Diffie-Hellman, while countering its
weaknesses.
79
Diffie-Hellman Algorithm:
Internet Key Exchange
1. It employs a mechanism known as cookies to thwart
clogging attacks.
2. It enables the two parties to negotiate a group; this,
in essence, specifies the global parameters of the
Diffie-Hellman key exchange.
3. It uses nonces to ensure against replay attacks.
4. It enables the exchange of Diffie-Hellman public key
values.
5. It authenticates the Diffie-Hellman exchange to
thwart man-in-the-middle attacks.
80
Features of IKE key
determination:
Internet Key Exchange
 An IKE session runs over UDP (source and
destination port 500).
 IKE session establishment results in the
creation of IKE Sas.
 IKE then establishes all requested IPSec SAs
on demand.
81
IKE Protocol:
Internet Key Exchange
 The IKEv2 protocol involves the exchange of
messages in pairs.
 The goal of using four messages to establish
the first SA for general use.
82
IKE v2 Exchanges:
Internet Key Exchange
 The first two pairs of
exchanges are referred
to as the initial
exchanges.
 the two peers exchange
information concerning
cryptographic
algorithms and other
security parameters
they are willing to use
along with nonces and
Diffie-Hellman (DH)
values.
83
IKE v2 Exchanges:
Internet Key Exchange
 The result of this
exchange is to set up
a special SA called
the IKE SA.
 This SA defines
parameters for a
secure channel
between the peers
over which
subsequent message
exchanges take
place.
84
IKE v2 Exchanges:
Internet Key Exchange
 all subsequent IKE
message exchanges
are protected by
encryption and
message
authentication.
85
IKE v2 Exchanges:
Internet Key Exchange
 The second
exchange, the two
parties authenticate
one another and set
up a first IPsec SA to
be placed in the
SADB and used for
protecting ordinary
(i.e. non-IKE)
communications
between the peers.
86
IKE v2 Exchanges:
Internet Key Exchange
 The
CREATE_CHILD_S
A exchange can be
used to establish
further SAs for
protecting traffic.
87
IKE v2 Exchanges:
Internet Key Exchange
 The informational
exchange is used to
exchange
management
information, IKEv2
error messages, and
other notifications.
88
IKE v2 Exchanges:
Internet Key Exchange
 IKE defines procedures and packet formats to
establish, negotiate, modify, and delete security
associations.
 As part of SA establishment, IKE defines
payloads for exchanging key generation and
authentication data.
 These payload formats provide a consistent
framework independent of the specific key
exchange protocol, encryption algorithm, and
authentication mechanism.
89
Header and Payload Formats:
Internet Key Exchange
90
Header and Payload Formats:
Internet Key Exchange
91
Header and Payload Formats:
All Together92
93
filtersfilters
How Components Interacts?
 Internet Key Exchange (IKE) - Identity Protect Mode – defined in RFC 2409
 Phase 1 “Main Mode” establishes IKE SA – trusted channel between systems, negotiation establishes encrypted
channel, mutual trust, and dynamically generates shared secret key (“master” key)
 Phase 2 “Quick Mode” establishes IPSec SAs – for data protection, one SA for each direction identified by packet
label (SPI), algorithms and packet formats agreed, generates shared “session” secret keys derived from “master” key
NIC
TCPIP
Application
Server or Gateway
IPSec
Driver
IPSec
PolicyAgentIKE (ISAKMP)
IPSec
Driver
IPSec
Policy
Agent IKE (ISAKMP)
NIC
TCPIP
Application/Service
client
“IKE Responder”“IKE Initiator”
UDP port 500
negotiation
1 IKE SA
2 IPSec SAs
IP protocol 50/51
VPN94
VPN
 Establish a connection between networks over
an untrusted network provided via a tunnel
95
What is a VPN?
Internet
Site A Site B
VPN
VPN
96
 RFC 4308 defines two cryptographic suites for
establishing virtual private networks.
 Suite VPN-A matches the commonly used
corporate VPN security used in older IKEv1
implementations at the time of the issuance of
IKEv2 in 2005.
 Suite VPN-B provides stronger security and is
recommended for new VPNs that implement
IPsecv3 and IKEv2.
VPN
97
VPN
98
 Note that for symmetric cryptography:
 VPN-A relies on 3DES and HMAC.
 while VPN-B relies exclusively on AES.
 Three types of secret-key algorithms are used:
 Encryption: For encryption, the cipher block chaining
(CBC) mode is used.
 Message authentication: For message authentication,
VPN-A relies on HMAC with SHA-1 with the output
truncated to 96 bits. VPN-B relies on a variant of CMAC
with the output truncated to 96 bits.
 Pseudorandom function: IKEv2 generates
pseudorandom bits by repeated use of the MAC used for
message authentication.
VPN
1. Site to Site
2. Remote Access
99
Types of VPNs:
VPN
100
Types of VPNs:
Site to Site
Internet
Site A Site B
Data A-B Data A-BData A-B Data A-BData A-B Data A-B
VPN
101
Types of VPNs:
Remote Access
Internet
Site A
User 1
User 2
User n
VPN
 L2 VPNs
 L2TP
 MPLS VPN. VPLS
 L3 VPNs
 IPSec
 MPLS VPN. Routed
 GRE
 L5/L6 VPNs
 SSL-TLS
102
Commonly used VPNs:
VPN
 IPSec VPN Benefits:
 Anti Replay
 Confidentiality
 Integrity
 Authentication
103
IPSec VPN Benefits:
THANK YOU104

Contenu connexe

Tendances

Vpn site to site
Vpn site to siteVpn site to site
Vpn site to siteIT Tech
 
GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)NetProtocol Xpert
 
Protocol for Secure Communication
Protocol for Secure CommunicationProtocol for Secure Communication
Protocol for Secure Communicationchauhankapil
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overviewdavisli
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell pptsravya raju
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11Nil Menon
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 

Tendances (20)

Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
 
Protocol for Secure Communication
Protocol for Secure CommunicationProtocol for Secure Communication
Protocol for Secure Communication
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
IPsec
IPsecIPsec
IPsec
 
CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11CCNA 2 Routing and Switching v5.0 Chapter 11
CCNA 2 Routing and Switching v5.0 Chapter 11
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 

En vedette

VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchangehughpearse
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 

En vedette (9)

RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
What Is VPN
What Is VPNWhat Is VPN
What Is VPN
 
Diffie-Hellman key exchange
Diffie-Hellman key exchangeDiffie-Hellman key exchange
Diffie-Hellman key exchange
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Vpn
VpnVpn
Vpn
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 

Similaire à IPSec and VPN

Similaire à IPSec and VPN (20)

Ip security
Ip security Ip security
Ip security
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Unit 6
Unit 6Unit 6
Unit 6
 
IP Security
IP SecurityIP Security
IP Security
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
ip.ppt
ip.pptip.ppt
ip.ppt
 
Chapter 6.ppt
Chapter 6.pptChapter 6.ppt
Chapter 6.ppt
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
 
Ip sec
Ip secIp sec
Ip sec
 
Ip Security.pptx
Ip Security.pptxIp Security.pptx
Ip Security.pptx
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
Network IP Security.pdf
Network IP Security.pdfNetwork IP Security.pdf
Network IP Security.pdf
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
 

Plus de Abdullaziz Tagawy

Service performance and analysis in cloud computing extened 2
Service performance and analysis in cloud computing   extened 2Service performance and analysis in cloud computing   extened 2
Service performance and analysis in cloud computing extened 2Abdullaziz Tagawy
 
Solar Cells versus Photodiode
Solar Cells versus PhotodiodeSolar Cells versus Photodiode
Solar Cells versus PhotodiodeAbdullaziz Tagawy
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
 
EMP_Assessment Report ABDELAZEZ TAGAWY
EMP_Assessment Report ABDELAZEZ TAGAWYEMP_Assessment Report ABDELAZEZ TAGAWY
EMP_Assessment Report ABDELAZEZ TAGAWYAbdullaziz Tagawy
 
OFDM Orthogonal Frequency Division Multiplexing
OFDM Orthogonal Frequency Division MultiplexingOFDM Orthogonal Frequency Division Multiplexing
OFDM Orthogonal Frequency Division MultiplexingAbdullaziz Tagawy
 
Solving QoS multicast routing problem using ACO algorithm
Solving QoS multicast routing problem using ACO algorithmSolving QoS multicast routing problem using ACO algorithm
Solving QoS multicast routing problem using ACO algorithmAbdullaziz Tagawy
 
Solving QoS multicast routing problem using aco algorithm
Solving QoS multicast routing problem using aco algorithm Solving QoS multicast routing problem using aco algorithm
Solving QoS multicast routing problem using aco algorithm Abdullaziz Tagawy
 
SNAPDRAGON SoC Family and ARM Architecture
SNAPDRAGON SoC Family and ARM Architecture SNAPDRAGON SoC Family and ARM Architecture
SNAPDRAGON SoC Family and ARM Architecture Abdullaziz Tagawy
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerAbdullaziz Tagawy
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link LayerAbdullaziz Tagawy
 

Plus de Abdullaziz Tagawy (13)

Service performance and analysis in cloud computing extened 2
Service performance and analysis in cloud computing   extened 2Service performance and analysis in cloud computing   extened 2
Service performance and analysis in cloud computing extened 2
 
Solar Cells versus Photodiode
Solar Cells versus PhotodiodeSolar Cells versus Photodiode
Solar Cells versus Photodiode
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
EMP_Assessment Report ABDELAZEZ TAGAWY
EMP_Assessment Report ABDELAZEZ TAGAWYEMP_Assessment Report ABDELAZEZ TAGAWY
EMP_Assessment Report ABDELAZEZ TAGAWY
 
Convolutional codes
Convolutional codesConvolutional codes
Convolutional codes
 
OFDM Orthogonal Frequency Division Multiplexing
OFDM Orthogonal Frequency Division MultiplexingOFDM Orthogonal Frequency Division Multiplexing
OFDM Orthogonal Frequency Division Multiplexing
 
Solving QoS multicast routing problem using ACO algorithm
Solving QoS multicast routing problem using ACO algorithmSolving QoS multicast routing problem using ACO algorithm
Solving QoS multicast routing problem using ACO algorithm
 
Solving QoS multicast routing problem using aco algorithm
Solving QoS multicast routing problem using aco algorithm Solving QoS multicast routing problem using aco algorithm
Solving QoS multicast routing problem using aco algorithm
 
SNAPDRAGON SoC Family and ARM Architecture
SNAPDRAGON SoC Family and ARM Architecture SNAPDRAGON SoC Family and ARM Architecture
SNAPDRAGON SoC Family and ARM Architecture
 
Error Detection and Correction - Data link Layer
Error Detection and Correction - Data link LayerError Detection and Correction - Data link Layer
Error Detection and Correction - Data link Layer
 
Introduction to Data-Link Layer
Introduction to Data-Link LayerIntroduction to Data-Link Layer
Introduction to Data-Link Layer
 
Comp net 2
Comp net 2Comp net 2
Comp net 2
 
Comp net 1
Comp net 1Comp net 1
Comp net 1
 

Dernier

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Dernier (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

IPSec and VPN

  • 1. IPSEC AND VPN Presented by : Abdullaziz Tagawy Course : Computer Security 1 March / 2016
  • 2. Resources  Materials  IPSec Tutorial by Scott Cleven- MulcahyItem (paper is taken from the GIAC directory of certified professionals)  IPSec—An Overview; (Presented by Somesh Jha) University of Wisconsin.  The Cryptography of the IPSec and IKE Protocols; (presented by Hugo Krawczyk), Technion & IBM Research.  INTERNET KEY EXCHANGE PROTOCOL ; (Presented by PRATEEK SINGH BAPNA).  IP Security (IPSec); (Presented by Thomas Lee ), Chief Technologist –QA .  Technical Development Program - VPN basics (Presented by Martín Bratina) 2014 AT&T Intellectual Property.  Book(s)  Cryptography and Network Security Principles and Practice – 6th Ed (William Stallings)  Cryptography and Network Security by Forouzan (2007)  Google search  http://www.slideshare.net 2
  • 3. IPSec Contents  IP Security Overview  Applications of Ipsec  Benefits of Ipsec  IPsec Documents  IPsec Services  Transport and Tunnel Modes  IP Security Policy  Security Associations  Security Association Database  Security Policy Database  IP Traffic Processing 3
  • 4. IPSec Contents  Encapsulating Security Payload  ESP Format  Encryption and Authentication Algorithms  Padding  Anti-Replay Service  Transport and Tunnel Modes  Combining Security Associations  Authentication Plus Confidentiality  Basic Combinations of Security Associations 4
  • 5. IPSec Contents  Internet Key Exchange  Key Determination Protocol  Header and Payload Formats  All Together  VPN  What is a VPN?  Types of VPNs.  Commonly used VPNs  IPSec VPN Benefits 5
  • 6. IP Security Overview  IPsec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include:  Secure branch office connectivity over the Internet  Secure remote access over the Internet  Establishing extranet and intranet connectivity with partners  Enhancing electronic commerce security Applications of Ipsec:- 6
  • 7. IP Security Overview  Some of the benefits of IPsec:-  When IPsec is implemented in a firewall or router, it provides strong security that can be applied to all traffic crossing the perimeter.  IPsec in a firewall is resistant to bypass.  IPsec is below the transport layer (TCP, UDP) and so is transparent to applications.  IPsec can be transparent to end users.  IPsec can provide security for individual users if needed. Benefits of Ipsec:- 7
  • 8. IP Security Overview  IPsec encompasses three functional areas:  authentication,  confidentiality,  key management.  The latest version of the IPsec document roadmap, which as of this writing is RFC 6071.  The documents can be categorized into the following groups:  Architecture: Covers the general concepts, security requirements, definitions, and mechanisms defining IPsec technology “RFC 4301[Security Architecture for the Internet Protocol.]”.  Authentication Header (AH):RFC 4302[IP Authentication Header] Note that the use of AH is deprecated. It is included in IPsecv3 for backward compatibility but should not be used in new applications.  Encapsulating Security Payload (ESP):The current specification is RFC 4303, [IP Encapsulating Security Payload (ESP)]. IPsec Documents:- 8
  • 9. IP Security Overview  IPsec encompasses three functional areas:  authentication,  confidentiality,  key management.  The latest version of the IPsec document roadmap, which as of this writing is RFC 6071.  The documents can be categorized into the following groups:  Internet Key Exchange (IKE): RFC 5996, [Internet Key Exchange (IKEv2) Protocol], but there are a number of related RFCs.  Cryptographic algorithms: This category encompasses a large set of documents that define and describe cryptographic algorithms for encryption, message authentication, pseudorandom functions (PRFs), and cryptographic key exchange.  Other: There are a variety of other IPsec-related RFCs, including those dealing  with security policy and management information base IPsec Documents:- 9
  • 10. IP Security Overview  IPsec provides security services at the IP layer (AH , ESP) by enabling a system to select required security protocols, determine the algorithm(s) to use for the service(s), and put in place any cryptographic keys required to provide the requested services.  Access control  Connectionless integrity  Data origin authentication  Rejection of replayed packets (a form of partial sequence integrity)  Confidentiality (encryption)  Limited traffic flow IPsec Services:- 10
  • 11. IP Security Overview  Access Control  IPSec provides access control indirectly, using a Security Association Database (SAD), When a packet arrives at a destination and there is no Security Association already established for this packet, the packet is discarded.  Message Integrity  A digest of data is created and sent by the sender to be checked by the receiver.  Entity Authentication  The Security Association and the keyed-hash digest of the data sent by the sender authenticate the sender of the data IPsec Services:- 11
  • 12. IP Security Overview  Confidentiality  The encryption of the message in ESP provides confidentiality. AH, however, does not provide confidentiality. If confidentiality is needed, one should use ESP instead of AH.  Replay Attack Protection  The replay attack is prevented by using sequence numbers and a sliding receiver window. Each IPSec header contains a unique sequence number when the Security Association is established. The number starts from 0 and increases until the value reaches 232 − 1. When the sequence number reaches the maximum, it is reset to 0 and, at the same time, the old Security Association (see the next section) is deleted and a new one is established. To prevent processing duplicate packets, IPSec mandates the use of a fixed-size window at the receiver. The size of the window is determined by the receiver with a default value of 64. IPsec Services:- 12
  • 13. IP Security Overview  Both AH and ESP support two modes of use: transport and tunnel mode. Transport and Tunnel Modes:- 13
  • 14. IP Security Overview Transport and Tunnel Modes:- Transport Mode Transport and Tunnel Modes:- Tunnel Mode 14
  • 15. IP Security Overview Transport and Tunnel Modes:- Transport Mode Transport and Tunnel Modes:- Tunnel Mode 15
  • 16. IP Security Overview  Transport mode is normally used when we need host-to- host (end-to-end) protection of data.  The sending host uses IPSec to authenticate and/or encrypt the payload delivered from the transport layer.  The receiving host uses IPSec to check the authentication and/or decrypt the IP packet and deliver it to the transport layer.  The new IP header, has different information than the original IP header.  Tunnel mode is normally used between two routers, between a host and a router, or between a router and a host.  The entire original packet is protected from intrusion between the sender and the receiver, as if the whole packet goes through an imaginary tunnel. Transport and Tunnel Modes:- Transport Mode Transport and Tunnel Modes:- Tunnel Mode 16
  • 17. IP Security Overview Transport and Tunnel Modes:- Transport Mode Transport and Tunnel Modes:- Tunnel Mode 17
  • 18. IP Security Overview  The IPSec layer comes between the transport layer and the network layer.  The flow is from the network layer to the IPSec layer and then back to the network layer again. Transport and Tunnel Modes:- Transport Mode Transport and Tunnel Modes:- Tunnel Mode 18
  • 19. IP Security Policy  Security Policy (SP): This is important aspect of IPSec which defines the type of security applied to a packet when it is to be sent or when it has arrived.  IPsec policy is determined primarily by the interaction of two databases, the security association database (SAD) and the security policy database (SPD). 19
  • 21. IP Security Policy  It is a key concept that appears in both the authentication and confidentiality mechanisms for IP.  It is a contract between two parties; it creates a secure channel between them.  Alice needs to unidirectionally communicate with Bob.  If they are interested only in the confidentiality aspect of security, they can get a shared secret key between themselves.  That is mean there are two SA’s between Alice and Bob; one outbound SA and one inbound SA. Security Associations:- Idea of Security Association 21
  • 22. IP Security Policy  The Security Association can be more involved if the two parties need message integrity and authentication.  It needs other data such as the algorithm for message integrity, the key, and other parameters.  It can be much more complex if the parties need to use specific algorithms and specific parameters for different protocols, such as IPSec AH or IPSec ESP.  Each of them stores the value of the key in one variable and the name of the encryption/ decryption algorithm in another.  Alice uses the algorithm and the key to encrypt a message to Bob; Bob uses the algorithm and the key when he needs to decrypt the message received from Alice. Security Associations:- Idea of Security Association (con..) 22
  • 23. IP Security Policy  A security association is uniquely identified by three parameters.  Security Parameters Index (SPI): A 32-bit unsigned integer assigned to this SA and having local significance only. The SPI is carried in AH and ESP headers to enable the receiving system to select the SA under which a received packet will be processed.  IP Destination Address: This is the address of the destination endpoint of the SA, which may be an end-user system or a network system such as a firewall or router.  Security Protocol Identifier: This field from the outer IP header indicates whether the association is an AH or ESP security association. Security Associations:- 23
  • 24. IP Security Policy  We need a set of SAs that can be collected into a database.  We need a set of SAs that can be collected into a database.  The database can be thought of as a two-dimensional table with each row defining a single SA.  There are two SADs, one inbound and one outbound Security Association Database:- 24
  • 25. IP Security Policy  Security Parameter Index: A 32-bit value selected by the receiving end of an SA to uniquely identify the SA. In an SAD entry for an outbound SA, the SPI is used to construct the packet’s AH or ESP header. In an SAD entry for an inbound SA, the SPI is used to map traffic to the appropriate SA.  • Sequence Number Counter: A 32-bit value used to generate the Sequence Number field in AH or ESP headers, (required for all implementations).  • Sequence Counter Overflow: A flag indicating whether overflow of the Sequence Number Counter should generate an auditable event and prevent further transmission of packets on this SA (required for all implementations). Security Association Database:- 25
  • 26. IP Security Policy  Anti-Replay Window: Used to determine whether an inbound AH or ESP packet is a replay, (required for all implementations).  • AH Information: Authentication algorithm, keys, key lifetimes, and related parameters being used with AH (required for AH implementations).  • ESP Information: Encryption and authentication algorithm, keys, initialization values, key lifetimes, and related parameters being used with ESP (required for ESP implementations). Security Association Database:- 26
  • 27. IP Security Policy  Lifetime of this Security Association: A time interval or byte count after which an SA must be replaced with a new SA (and new SPI) or terminated, plus an indication of which of these actions should occur (required for all implementations).  • IPsec Protocol Mode: Tunnel, transport, or wildcard.  • Path MTU: Any observed path maximum transmission unit (maximum size of a packet that can be transmitted without fragmentation) and aging variables (required for all implementations). Security Association Database:- 27
  • 28. IP Security Policy  When a host needs to send a packet that must carry an IPSec header, the host needs to find the corresponding entry in the outbound SAD to find the information for applying security to the packet.  when a host receives a packet that carries an IPSec header, the host needs to find the corresponding entry in the inbound SAD to find the information for checking the security of the packet. Security Association Database:- 28
  • 29. IP Security Policy  Each entry in an inbound SAD is selected using a triple index:  Security parameter index (a 32-bit number that defines the SA at the destination).  Destination address.  Protocol (AH or ESP). Security Association Database:- 29
  • 30. IP Security Policy  The means by which IP traffic is related to specific SAs (or no SA in the case of traffic allowed to bypass IPsec) is the nominal Security Policy Database (SPD).  its simplest form, an SPD contains entries, each of which defines a subset of IP traffic and points to an SA for that traffic.  In more complex environments, there may be multiple entries that potentially relate to a single SA or multiple SAs associated with a single SPD entry.  Each SPD entry is defined by a set of IP and upper- layer protocol field values, called selectors.  These selectors are used to filter outgoing traffic in order to map it into a particular SA. Security Policy Database:- 30
  • 31. IP Security Policy  Outbound processing obeys the following general sequence for each IP packet: 1) Compare the values of the appropriate fields in the packet (the selector fields) against the SPD to find a matching SPD entry, which will point to zero or more SAs. 2) Determine the SA if any for this packet and its associated SPI. 3) Do the required IPsec processing (i.e., AH or ESP processing). Security Policy Database:- 31
  • 32. IP Security Policy  The following selectors determine an SPD entry:  Remote IP Address: This may be a single IP address, an enumerated list or range of addresses, or a wildcard (mask) address. The latter two are required to support more than one destination system sharing the same SA (e.g., behind a firewall).  Local IP Address: This may be a single IP address, an enumerated list or range of addresses, or a wildcard (mask) address. The latter two are required to support more than one source system sharing the same SA (e.g., behind a firewall).  Next Layer Protocol: The IP protocol header (IPv4, IPv6, or IPv6 Extension) includes a field (Protocol for IPv4, Next Header for IPv6 or IPv6 Extension) that designates the protocol operating over IP. This is an individual protocol number, ANY, or for IPv6 only, OPAQUE. If AH or ESP is used, then this IP protocol header immediately precedes the AH or ESP header in the packet.  Name: A user identifier from the operating system. This is not a field in the IP or upper-layer headers but is available if IPsec is running on the same operating system as the user.  Local and Remote Ports: These may be individual TCP or UDP port values, an enumerated list of ports, or a wildcard port. Security Policy Database:- 32
  • 33. IP Security Policy Security Policy Database:- 33
  • 34. IP Security Policy  IPsec is executed on a packet-by- packet basis.  Each outbound IP packet is processed by the IPsec logic before transmission.  Each inbound packet is processed by the IPsec logic after reception and before passing the packet contents on to the next higher layer IP Traffic Processing:- 34
  • 37. IP Security Policy 37 SPD and SADB Example From To Protocol Port Policy A B Any Any AH[HMAC-MD5] Tunnel Mode Transport Mode C A’s SPD From To Protocol SPI SA Record A B AH 12 HMAC-MD5 key A’s SADB From To Protocol Port Policy Tunnel Dest Any Any ESP[3DES] D C’s SPD From To Protocol SPI SA Record ESP 14 3DES key C’s SADB D A B
  • 38. Authentication Header (AH)  It is designed to authenticate the source host and to ensure the integrity of the payload carried in the IP packet.  The protocol uses a hash function and a symmetric (secret) key to create a message digest; the digest is inserted in the authentication header.  The AH is then placed in the appropriate location, based on the mode (transport or tunnel). 38
  • 40. Authentication Header (AH) Authentication Data Sequence Number Security Parameters Index (SPI) Next header Payload length Reserved Old IP header (only in Tunnel mode) TCP header New IP header Authenticated Data Encapsulated TCP or IP packet Hash of everything else 40
  • 41. Authentication Header (AH)  Before applying AH 41
  • 42. Authentication Header (AH) Transport Mode (AH Authentication) Tunnel Mode (AH Authentication) 42
  • 44. Encapsulating Security Payload(ESP)  ESP can be used to provide :  Confidentiality  Data origin authentication  connectionless integrity  An anti-replay service (a form of partial sequence integrity)  And (limited) traffic flow confidentiality. 44
  • 45. Encapsulating Security Payload(ESP)  Can optionally provide the same authentication services as AH  Supports range of ciphers, modes, padding:  incl. DES, Triple-DES, RC5, IDEA, CAST etc  CBC & other modes  Padding needed to fill block size, fields, for traffic flow. 45
  • 46. Encapsulating Security Payload(ESP)  ESP adds a header and trailer.  Note that ESP’s authentication data are added at the end of the packet, which makes its calculation easier. 46
  • 47. Encapsulating Security Payload(ESP)  Security Parameters Index (32 bits): Identifies a security association.  Sequence Number (32 bits): A monotonically increasing counter value; this provides an anti- replay function, as discussed for AH.  Payload Data (variable): This is a transport-level segment (transport mode) or IP packet (tunnel mode) that is protected by encryption.  Padding (0–255 bytes):  Pad Length (8 bits): Indicates the number of pad bytes immediately preceding this field.  Next Header (8 bits): Identifies the type of data contained in the payload data field by identifying the first header in that payload (e.g., an extension header in IPv6, or an upper-layer protocol such as TCP).  Integrity Check Value (variable): A variable- length field (must be an integral number of 32-bit words) that contains the Integrity Check Value computed over the ESP packet minus the Authentication Data field. ESP Format:- 47
  • 48. Encapsulating Security Payload(ESP)  Two additional fields may be present in the payload:  An initialization value (IV): or nonce, is present if this is required by the encryption or authenticated encryption algorithm used for ESP.  Traffic flow confidentiality (TFC) : The IPsec implementation may add padding after the Payload Data and before the Padding field ESP Format:- 48
  • 49. Encapsulating Security Payload(ESP)  The Payload Data, Padding, Pad Length, and Next Header fields are encrypted by the ESP service.  If the algorithm used to encrypt the payload requires cryptographic synchronization data, such as an initialization vector (IV), then these data may be carried explicitly at the beginning of the Payload Data field.  If included, an IV is usually not encrypted, although it is often referred to as being part of the ciphertext. Encryption and Authentication Algorithms:-  If included, an IV is usually not encrypted, although it is often referred to as being part of the ciphertext.  The ICV field is optional.  The ICV is present only if the integrity service is selected .  The ICV is provided by either a separate integrity algorithm or a combined mode algorithm that uses an ICV  The ICV is computed after the encryption is performed. 49
  • 50. Encapsulating Security Payload(ESP)  The Padding field serves several purposes:  If an encryption algorithm requires the plaintext to be a multiple of some number of bytes (e.g., the multiple of a single block for a block cipher), the Padding field is used to expand the plaintext (consisting of the Payload Data, Padding, Pad Length, and Next Header fields) to the required length. Padding:-  The ESP format requires that the Pad Length and Next Header fields be right aligned within a 32-bit word. Equivalently, the ciphertext must be an integer multiple of 32 bits. The Padding field is used to assure this alignment.  Additional padding may be added to provide partial traffic-flow confidentiality by concealing the actual length of the payload. 50
  • 51. Encapsulating Security Payload(ESP)  A replay attack is one in which an attacker obtains a copy of an authenticated packet and later transmits it to the intended destination. The receipt of duplicate, authenticated IP packets may disrupt service in some way or may have some other undesired consequence.  The Sequence Number field is designed to thwart such attacks. Anti-Replay Service:- 51
  • 54. Encapsulating Security Payload(ESP)  Transport-level security:  A virtual private network via tunnel mode: Transport and Tunnel Modes:- 54
  • 56. Encapsulating Security Payload(ESP) Transport Mode ESP :- Operation : 1) At the source, the block of data consisting of the ESP trailer plus the entire transport-layer segment is encrypted and the plaintext of this block is replaced with its ciphertext to form the IP packet for transmission. Authentication is added if this option is selected. 2) The packet is then routed to the destination. Each intermediate router needs to examine and process the IP header plus any plaintext IP extension headers but does not need to examine the ciphertext. 3) The destination node examines and processes the IP header plus any plaintext IP extension headers. Then, on the basis of the SPI in the ESP header, the destination node decrypts the remainder of the packet to recover the plaintext transport-layer segment. 56
  • 59. Encapsulating Security Payload(ESP) Tunnel Mode ESP:- Operation 1) The source prepares an inner IP packet with a destination address of the target internal host. This packet is prefixed by an ESP header; then the packet and ESP trailer are encrypted and Authentication Data may be added. The resulting block is encapsulated with a new IP header (base header plus optional extensions such as routing and hop-by-hop options for IPv6) whose destination address is the firewall; this forms the outer IP packet. 2) The outer packet is routed to the destination firewall. Each intermediate router needs to examine and process the outer IP header plus any outer IP extension headers but does not need to examine the ciphertext. 59
  • 60. Encapsulating Security Payload(ESP) Tunnel Mode ESP:- Operation 3) The destination firewall examines and processes the outer IP header plus any outer IP extension headers. Then, on the basis of the SPI in the ESP header, the destination node decrypts the remainder of the packet to recover the plaintext inner IP packet. This packet is then transmitted in the internal network. 4) The inner packet is routed through zero or more routers in the internal network to the destination host. 60
  • 62. Encapsulating Security Payload(ESP) Tunnel Mode ESP:- Transport Mode ESP :-  Tunnel mode encrypts entire IP packet  Add new header for next hop  Good for VPNs, gateway to gateway security  Transport mode is used to encrypt & optionally authenticate IP data  Data protected but header left in clear  Can do traffic analysis but is efficient  Good for ESP host to host traffic 62
  • 63. Combining Security Associations  SA’s can implement either AH or ESP  To implement both need to combine SA’s  Form a security association bundle  May terminate at different or same endpoints  Combined by  Transport adjacency  Iterated tunneling  Issue of authentication & encryption order 63
  • 66. Internet Key Exchange  Used for Key Management in IPSec Networks.  The IPsec Architecture supports two types of key management:  Manual: A system administrator manually configures each system with its own keys and with the keys of other communicating systems. This is practical for small, relatively static environments.  Automated: An automated system enables the on- demand creation of keys for SAs and facilitates the use of keys in a large distributed system with an evolving configuration.  The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley 66 Overview :
  • 67. Internet Key Exchange  Creates SAs for use by IPSec.  Negotiates security parameters for the SA  Key Exchange: share keys between parties  Manages SAs: create, refresh, maintain, delete.  IKEv1 (1998):  ISAKMP for management.  Oakley is a key exchange protocol.  IKEv2 (2003): IKE specifies it all 67 Overview :
  • 68. Internet Key Exchange  Oakley Key Determination Protocol: Oakley is a key exchange protocol based on the Diffie- Hellman algorithm but providing added security. Oakley is generic in that it does not dictate specific formats.  Internet Security Association and Key Management Protocol (ISAKMP): ISAKMP provides a framework for Internet key management and provides the specific protocol support, including formats, for negotiation of security attributes. 68 IKE History
  • 69. Internet Key Exchange  When a peer needs to send an IP packet, it consults the Security Policy Database (SPD) to see if there is an AS for that type of traffic. If there is no SA, IKE will called to establish one.  IKE operates in two phases:  IKE Phase 1  Uses Main or Aggressive mode exchange  Negotiates IKE SA  Only established once between two end points 69 How It Works:
  • 70. Internet Key Exchange  IKE operates in two phases:  IKE Phase 2  Uses quick mode exchange.  Negotiates IPSec SAs.  Occurs multiple times.  Both phases use Diffie-Hellman key exchange to establish a shared key. 70 How It Works:
  • 71. Internet Key Exchange  When A wants to talk to B under protection of IPSec, and they do not have an established SA:  A invokes IKE to signal B its request for an SA  IKE is run between A and B: result is a shared SA (services to be applied and fresh shared keys)  Negotiated parameters stored locally at A and B (SAD)  SPI (sec. parameters index): pointer to SA included in the IPSec header of each packet  Architectural separation: IKE writes to SAD, IPSec reads from SAD. 71 How It Works:
  • 73. Internet Key Exchange  Algorithm for secure key exchange over unsecured channels.  Based on the difficulty of finding discreet algorithms.  Used to establish a shared secret between parties (usually the secret keys for symmetric encryption or HMACs). 73 Diffie-Hellman Algorithm:
  • 74. Internet Key Exchange  General overview: Key Exchange establishes a shared secret between two parties that can be used for secret communication for exchanging data over a public network. The following conceptual diagram illustrates the general idea of the key exchange by using colors instead of very large numbers. 74 Diffie-Hellman Algorithm:
  • 75. Internet Key Exchange  The parties agree on two non-secret numbers, g (generator), and p (modulus), where g is small and p is very large  Each party generates a random secret X  Based on g, p, and X, each party generates a public value Y=𝒈 𝑿 mod p  Peers then exchange public values 75 Diffie-Hellman Algorithm:
  • 76. Internet Key Exchange 76 Diffie-Hellman Algorithm: APrivate Value, X Public Value, Y Private Value, X Public Value, Y B𝒀 𝑨 = 𝒈 𝑨 𝑿 mod p 𝒀 𝑩= 𝒈 𝑩 𝑿 mod p𝒀 𝑨 𝒀 𝑩 𝒀 𝑩 = 𝒀 𝑨 = 𝒈 𝑿(𝑩) 𝑿(𝑨) 𝒎𝒐𝒅 𝒑 (Shared Secret)
  • 77. Internet Key Exchange  There are a number of weaknesses to Diffie-Hellman, as pointed out in [HUIT98].  It does not provide any information about the identities of the parties.  It is subject to a man-in-the-middle attack, in which a third party C impersonates B while communicating with A and impersonates A while communicating with B. Both A and B end up negotiating a key with C, which can then listen to and pass on traffic. The man-in-the-middle attack proceeds as 77 Diffie-Hellman Algorithm:
  • 78. Internet Key Exchange 78 Diffie-Hellman Algorithm: This is how does Diffie-Hellman work: This is how does the man-in- the-middle attack work in Diffie- Hellman:
  • 79. Internet Key Exchange  There are a number of weaknesses to Diffie-Hellman, as pointed out in [HUIT98].  It is computationally intensive. As a result, it is vulnerable to a clogging attack,in which an opponent requests a high number of keys. The victim spends considerable computing resources doing useless modular exponentiation rather than real work.  IKE key determination is designed to retain the advantages of Diffie-Hellman, while countering its weaknesses. 79 Diffie-Hellman Algorithm:
  • 80. Internet Key Exchange 1. It employs a mechanism known as cookies to thwart clogging attacks. 2. It enables the two parties to negotiate a group; this, in essence, specifies the global parameters of the Diffie-Hellman key exchange. 3. It uses nonces to ensure against replay attacks. 4. It enables the exchange of Diffie-Hellman public key values. 5. It authenticates the Diffie-Hellman exchange to thwart man-in-the-middle attacks. 80 Features of IKE key determination:
  • 81. Internet Key Exchange  An IKE session runs over UDP (source and destination port 500).  IKE session establishment results in the creation of IKE Sas.  IKE then establishes all requested IPSec SAs on demand. 81 IKE Protocol:
  • 82. Internet Key Exchange  The IKEv2 protocol involves the exchange of messages in pairs.  The goal of using four messages to establish the first SA for general use. 82 IKE v2 Exchanges:
  • 83. Internet Key Exchange  The first two pairs of exchanges are referred to as the initial exchanges.  the two peers exchange information concerning cryptographic algorithms and other security parameters they are willing to use along with nonces and Diffie-Hellman (DH) values. 83 IKE v2 Exchanges:
  • 84. Internet Key Exchange  The result of this exchange is to set up a special SA called the IKE SA.  This SA defines parameters for a secure channel between the peers over which subsequent message exchanges take place. 84 IKE v2 Exchanges:
  • 85. Internet Key Exchange  all subsequent IKE message exchanges are protected by encryption and message authentication. 85 IKE v2 Exchanges:
  • 86. Internet Key Exchange  The second exchange, the two parties authenticate one another and set up a first IPsec SA to be placed in the SADB and used for protecting ordinary (i.e. non-IKE) communications between the peers. 86 IKE v2 Exchanges:
  • 87. Internet Key Exchange  The CREATE_CHILD_S A exchange can be used to establish further SAs for protecting traffic. 87 IKE v2 Exchanges:
  • 88. Internet Key Exchange  The informational exchange is used to exchange management information, IKEv2 error messages, and other notifications. 88 IKE v2 Exchanges:
  • 89. Internet Key Exchange  IKE defines procedures and packet formats to establish, negotiate, modify, and delete security associations.  As part of SA establishment, IKE defines payloads for exchanging key generation and authentication data.  These payload formats provide a consistent framework independent of the specific key exchange protocol, encryption algorithm, and authentication mechanism. 89 Header and Payload Formats:
  • 90. Internet Key Exchange 90 Header and Payload Formats:
  • 91. Internet Key Exchange 91 Header and Payload Formats:
  • 93. 93 filtersfilters How Components Interacts?  Internet Key Exchange (IKE) - Identity Protect Mode – defined in RFC 2409  Phase 1 “Main Mode” establishes IKE SA – trusted channel between systems, negotiation establishes encrypted channel, mutual trust, and dynamically generates shared secret key (“master” key)  Phase 2 “Quick Mode” establishes IPSec SAs – for data protection, one SA for each direction identified by packet label (SPI), algorithms and packet formats agreed, generates shared “session” secret keys derived from “master” key NIC TCPIP Application Server or Gateway IPSec Driver IPSec PolicyAgentIKE (ISAKMP) IPSec Driver IPSec Policy Agent IKE (ISAKMP) NIC TCPIP Application/Service client “IKE Responder”“IKE Initiator” UDP port 500 negotiation 1 IKE SA 2 IPSec SAs IP protocol 50/51
  • 94. VPN94
  • 95. VPN  Establish a connection between networks over an untrusted network provided via a tunnel 95 What is a VPN? Internet Site A Site B VPN
  • 96. VPN 96  RFC 4308 defines two cryptographic suites for establishing virtual private networks.  Suite VPN-A matches the commonly used corporate VPN security used in older IKEv1 implementations at the time of the issuance of IKEv2 in 2005.  Suite VPN-B provides stronger security and is recommended for new VPNs that implement IPsecv3 and IKEv2.
  • 98. VPN 98  Note that for symmetric cryptography:  VPN-A relies on 3DES and HMAC.  while VPN-B relies exclusively on AES.  Three types of secret-key algorithms are used:  Encryption: For encryption, the cipher block chaining (CBC) mode is used.  Message authentication: For message authentication, VPN-A relies on HMAC with SHA-1 with the output truncated to 96 bits. VPN-B relies on a variant of CMAC with the output truncated to 96 bits.  Pseudorandom function: IKEv2 generates pseudorandom bits by repeated use of the MAC used for message authentication.
  • 99. VPN 1. Site to Site 2. Remote Access 99 Types of VPNs:
  • 100. VPN 100 Types of VPNs: Site to Site Internet Site A Site B Data A-B Data A-BData A-B Data A-BData A-B Data A-B
  • 101. VPN 101 Types of VPNs: Remote Access Internet Site A User 1 User 2 User n
  • 102. VPN  L2 VPNs  L2TP  MPLS VPN. VPLS  L3 VPNs  IPSec  MPLS VPN. Routed  GRE  L5/L6 VPNs  SSL-TLS 102 Commonly used VPNs:
  • 103. VPN  IPSec VPN Benefits:  Anti Replay  Confidentiality  Integrity  Authentication 103 IPSec VPN Benefits:

Notes de l'éditeur

  1. Beginning course details and/or books/materials needed for a class/project.
  2. Figures shows two ways in which the IPsec ESP service can be used. In the left part of the figure, encryption (and optionally authentication) is provided directly between two hosts. The right Figure shows how tunnel mode operation can be used to set up a virtual private network. In this example, an organization has four private networks interconnected across the Internet. Hosts on the internal networks use the Internet for transport of data but do not interact with other Internet-based hosts. By terminating the tunnels at the security gateway to each internal network, the configuration allows the hosts to avoid implementing the security capability. The former technique is supported by a transport mode SA, while the latter technique uses a tunnel mode SA.
  3. Transport mode ESP is used to encrypt and optionally authenticate the data carried by IP (e.g., a TCP segment), as shown in Figure 20.8b. For this mode using IPv4, the ESP header is inserted into the IP packet immediately prior to the transport-layer header (e.g., TCP, UDP, ICMP), and an ESPtrailer (Padding, Pad Length, and Next Header fields) is placed after the IP packet. If authentication is selected, the ESP Authentication Data field is added after the ESP trailer. The entire transport-level segment plus the ESP trailer are encrypted. Authentication covers all of the ciphertext plus the ESP header. In the context of IPv6, ESP is viewed as an end-to-end payload; that is, it is not examined or processed by intermediate routers. Therefore, the ESP header appears after the IPv6 base header and the hop-by-hop, routing, and fragment extension headers. The destination options extension header could appear before or after the ESP header, depending on the semantics desired. For IPv6, encryption covers the entire transport-level segment plus the ESP trailer plus the destination options extension header if it occurs after the ESP header. Again, authentication covers the ciphertext plus the ESP header.
  4. Tunnel mode ESP is used to encrypt an entire IP packet (Figure 20.8c). For this mode, the ESP header is prefixed to the packet and then the packet plus the ESP trailer is encrypted. This method can be used to counter traffic analysis. Because the IP header contains the destination address and possibly source routing directives and hop-by-hop option information, it is not possible simply to transmit the encrypted IP packet prefixed by the ESP header. Intermediate routers would be unable to process such a packet. Therefore, it is necessary to encapsulate the entire block (ESP header plus ciphertext plus Authentication Data, if present) with a new IP header that will contain sufficient information for routing but not for traffic analysis. Whereas the transport mode is suitable for protecting connections between hosts that support the ESP feature, the tunnel mode is useful in a configuration that includes a firewall or other sort of security gateway that protects a trusted network from external networks. In this latter case, encryption occurs only between an external host and the security gateway or between two security gateways. This relieves hosts on the internal network of the processing burden of encryption and simplifies the key distribution task by reducing the number of needed keys. Further, it thwarts traffic analysis based on ultimate destination.
  5. Consider a case in which an external host wishes to communicate with a host on an internal network protected by a firewall, and in which ESP is implemented in the external host and the firewalls. The upper steps occur for transfer of a transport-layer segment from the external host to the internal host.
  6. Consider a case in which an external host wishes to communicate with a host on an internal network protected by a firewall, and in which ESP is implemented in the external host and the firewalls. The upper steps occur for transfer of a transport-layer segment from the external host to the internal host.
  7. An individual SA can implement either the AH or ESP protocol but not both. Sometimes a particular traffic flow will call for the services provided by both AH and ESP. Further, a particular traffic flow may require IPSec services between hosts and ,for that same flow, separate services between security gateways, such as firewalls. In all of these cases, multiple SAs must be employed for the same traffic flow to achieve the desired IPSec services. The term security association bundle refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPSec services. The SAs in a bundle may terminate at different endpoints or at the same endpoints. Security associations may be combined into bundles in two ways: • Transport adjacency: more than one security protocol on same IP packet, without invoking tunneling • Iterated tunneling: application of multiple layers of security protocols effected through IP tunneling One interesting issue is the order in which authentication and encryption may be applied between a given pair of endpoints.
  8. The IPSec Architecture document lists four examples of combinations of SAs that must be supported by compliant IPSec hosts or security gateways. These are illustrated in Stallings Figure 16.10. Note the *’d devices implement IPSec. The cases are: Case 1 security is provided between end systems that implement IPSec. Case 2 security is provided only between gateways (routers,firewalls,etc.) and no hosts implement IPSec. Case 3 builds on Case 2 by adding end-to-end security .The same combinations discussed for cases 1 and 2 are allowed here. Case 4 provides support for a remote host that uses the Internet to reach an organization’s firewall and then to gain access to some server or workstation behind the firewall. Only tunnel mode is required between the remote host and the firewall.
  9. First, consider the problem of clogging attacks. In this attack, an opponent forges the source address of a legitimate user and sends a public Diffie-Hellman key to the victim. The victim then performs a modular exponentiation to compute the secret key. Repeated messages of this type can clog the victim’s system with useless work. The cookie exchange requires that each side send a pseudorandom number, the cookie, in the initial message, which the other side acknowledges. This acknowledgment must be repeated in the first message of the Diffie-Hellman key exchange. If the source address was forged, the opponent gets no answer. Thus, an opponent can only force a user to generate acknowledgments and not to perform the Diffie-Hellman calculation. IKE mandates that cookie generation satisfy three basic requirements: 1. The cookie must depend on the specific parties. This prevents an attacker from obtaining a cookie using a real IP address and UDP port and then using it to swamp the victim with requests from randomly chosen IP addresses or ports. 2. It must not be possible for anyone other than the issuing entity to generate cookies that will be accepted by that entity. This implies that the issuing entity will use local secret information in the generation and subsequent verification of a cookie. It must not be possible to deduce this secret information from any particular cookie. The point of this requirement is that the issuing entity need not save copies of its cookies, which are then more vulnerable to discovery, but can verify an incoming cookie acknowledgment when it needs to. 3. The cookie generation and verification methods must be fast to thwart attacks intended to sabotage processor resources. The recommended method for creating the cookie is to perform a fast hash (e.g., MD5) over the IP Source and Destination addresses, the UDP Source and Destination ports, and a locally generated secret value. IKE key determination supports the use of different groups for the Diffie- Hellman key exchange. Each group includes the definition of the two global parameters and the identity of the algorithm. The current specification includes the following groups. SHANNON.IR 652 Chapter 20 / IP Security • Modular exponentiation with a 768-bit modulus q = 2768 - 2704 - 1 + 264 * ( :2638 * p; + 149686) a = 2 • Modular exponentiation with a 1024-bit modulus q = 21024 - 2960 - 1 + 264 * ( :2894 * p; + 129093) a = 2 • Modular exponentiation with a 1536-bit modulus • Parameters to be determined • Elliptic curve group over 2155 • Generator (hexadecimal): X = 7B, Y = 1C8 • Elliptic curve parameters (hexadecimal): A = 0, Y = 7338F • Elliptic curve group over 2185 • Generator (hexadecimal): X = 18, Y = D • Elliptic curve parameters (hexadecimal): A = 0, Y = 1EE9 The first three groups are the classic Diffie-Hellman algorithm using modular exponentiation. The last two groups use the elliptic curve analog to Diffie-Hellman. IKE key determination employs nonces to ensure against replay attacks. Each nonce is a locally generated pseudorandom number. Nonces appear in responses and are encrypted during certain portions of the exchange to secure their use. Three different authentication methods can be used with IKE key determination: • Digital signatures: The exchange is authenticated by signing a mutually obtainable hash; each party encrypts the hash with its private key. The hash is generated over important parameters, such as user IDs and nonces. • Public-key encryption: The exchange is authenticated by encrypting parameters such as IDs and nonces with the sender’s private key. • Symmetric-key encryption: A key derived by some out-of-band mechanism can be used to authenticate the exchange by symmetric encryption of exchange parameters.
  10. IKE Header Format An IKE message consists of an IKE header followed by one or more payloads. All of this is carried in a transport protocol. The specification dictates that implementations must support the use of UDP for the transport protocol. Figure 20.12a shows the header format for an IKE message. It consists of the following fields. • Initiator SPI (64 bits): A value chosen by the initiator to identify a unique IKE security association (SA). • Responder SPI (64 bits): A value chosen by the responder to identify a unique IKE SA. • Next Payload (8 bits): Indicates the type of the first payload in the message; payloads are discussed in the next subsection. • Major Version (4 bits): Indicates major version of IKE in use. • Minor Version (4 bits): Indicates minor version in use. • Exchange Type (8 bits): Indicates the type of exchange; these are discussed later in this section. • Flags (8 bits): Indicates specific options set for this IKE exchange. Three bits are defined so far. The initiator bit indicates whether this packet is sent by the SA initiator. The version bit indicates whether the transmitter is capable of using a higher major version number than the one currently indicated. The response bit indicates whether this is a response to a message containing the same message ID. • Message ID (32 bits): Used to control retransmission of lost packets and matching of requests and responses. • Length (32 bits): Length of total message (header plus all payloads) in octets. IKE Payload Types All IKE payloads begin with the same generic payload header shown in Figure 20.12b. The Next Payload field has a value of 0 if this is the last payload in the message; otherwise its value is the type of the next payload. The Payload Length field indicates the length in octets of this payload, including the generic payload header. The critical bit is 0 if the sender wants the recipient to skip this payload if it does not understand the payload type code in the Next Payload field of the previous payload. It is set to 1 if the sender wants the recipient to reject this entire message if it does not understand the payload type.
  11. Years of experience with IPv4 have exposed us to various aspects of TCP/IP communication: transport protocols have port numbers, NAT and proxy servers have become standard networking features, we have learned to accept replay attacks as vulnerability, and Network IDS is considered a requirement by many security professionals. IPSec changes the rules on how and what we deploy in our networks and in some cases we no longer need accept certain limitations of TCP/IP. Unlike many transport layer protocols, such as TLS, TCP, and UDP, ESP uses only a protocol number. AH also uses a protocol number as is typical of network layer protocols. Specifically, AH uses protocol number 51 and ESP uses protocol number 50. If the two are used together then the protocol number of the outer most protocol is exposed. AH and ESP in transport mode will expose protocol 51 whereas ESP in tunnel mode and AH in transport mode will expose protocol 50. As was mentioned in previous sections, AH and ESP may not work with a proxy server or NAT. More generically, IPSec, in either transport or tunnel mode, does not work with a device that modifies an IP packet. This is because AH and ESP sign their portions of each packet. AH signs the entire IP packet with the exception of a few fields that must change in normal IP communication (such as TTL). Tunnel mode allows the new IP header to be modified enroute, unless AH in transport mode is also used, but the rest of the packet is still off limits. The result is that regardless if you use AH or ESP the payload is always off limits for modifications, tunnel or transport, and the IP and transport header information may also be off limits. Recently Network and Host IDS have become an important tool in the security professional’s toolbox. NIDS are basically protocol analyzers. They capture packets on the network, analyze the packets to determine if it is malicious, alert security administrators of malicious packets, and in some cases will terminate communication containing malicious packets. All IDS’ work on the premise that the packet is transparent and that the contents are in an expected position. IPSec complicates this by encrypting portions of the packet, ESP, or moving the location of parts of a packet, tunnel mode. The solution will depend on the organization. Tunnel mode moves the original IP header and Transport layers from the expected location within the packet. However, tunnel mode is almost exclusively used between gateways. NIDS will need to be located inside of each gateway, prior to IPSec tunneling being applied, to permit the NIDS to work. Since transport mode does not relocate important packet information, in principle NIDS will work with transport mode. If ESP is used with encryption there is no simple solution, however. One solution is to not use ESP with encryption on a network that requires NIDS. Another solution is to use ESP in tunnel mode to a gateway. Once at the gateway the IPSec is decrypted and available for inspection by NIDS before reaching the next gateway, which encrypts the packet before sending it to the final destination. Potentially a Host IDS that provides packet analysis can be used. This solution only works if the HIDS is able to inspect the packet after the packet has been decrypted. HIDS solutions can quickly become extremely expensive since every host in the network requires the software. Replay and man-in-the-middle attacks are difficult to protect against. Fortunately, they are somewhat difficult to carry out since they require direct access to the network the systems use. Replay attacks capture the packets of a real session, alter the packets, and then retransmit the packets. The end-point hosts believe they are communicating directly with each other, but in fact they are communicating with a server in between. This is attack is extremely difficult to detect. As has been mentioned many times, IPSec provides anti-replay protection. This is done by using a sliding window. IPSec gives each packet a sequence number. If a 64- packet sliding window is used then a host will accept packets 1 – 64 without problem. When packet 65 arrives the host will no longer accept packet number 1. Likewise, when packet 100 arrives, any packets below number 36 are dropped. In addition, IPSec does not accept duplicate sequence numbers. In other words, once packet 125 arrives for a given IPSec session, IPSec does not permit another packet 125. This also means that IPSec keys must be renegotiated and a new IPSec session established before IPSec sequence numbers wrap. This scheme makes replay attacks very difficult since the attacker only has a narrow window of time to retransmit the packet. IPSec provides only limited man-in-the-middle protection. This protection is dependent on authentication method selected. In W2K, 3rd party certificates, Kerberos, and shared secret are supported. Of these, only 3rd party certificates provide strong man-inthe- middle protection.
  12. Estimated duration 01:15 A VPN is secure because private data is encapsulated, encrypted and sent to the remote peer for decryption/de capsulation. We will later see what encapsulation and encryption is. There are four major concerns when sending private data over a public medium that IPSec addresses. One is Anti-replay It Ensures the uniqueness of each IP packet. Anti-replay is also called replay prevention. Anti-replay ensures that data captured by an attacker cannot be reused or replayed to establish a session or gain information illegally. Confidentiality Keep data secure and hidden (using Encryption). Ensures that data is only disclosed to intended recipients. Integrity Ensure data hasn’t been changed. Protects data from unauthorized modification in transit, ensuring that the data received is exactly the same as the data sent. Authentication Verifies if did the traffic really come from the advertised source? Verifies that a message could only have been sent from a computer that has knowledge of the authentication key --------------------------------------------------------------------------------------------------------------------- The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays (a form of partial sequence integrity), confidentiality (encryption), and limited traffic flow confidentiality.