1. Trang chủ
  2. » Giáo án - Bài giảng

Network systems security by mort anvari lecture11

24 114 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Network Layer Security Network Systems Security Mort Anvari Security in Network Layer    Implementing security in application layer provides flexibility in security policy and key management Problem is need to implement security mechanism in every application individually To reduce the overhead, implement security in network layer to provide security for all applications between selected pair of computers 9/30/2004 IPSec  Two protocols    Provide general security services for IP      Authentication Header (AH) Encasulating Security Payload (ESP) Authentication Confidentiality Anti-replay Key management Applicable to use over LANs, across public and private WANs, and for the Internet 9/30/2004 Scenario of IPSec Uses 9/30/2004 Benefits of IPSec      Provide strong security to all traffic crossing the perimeter if installed in a firewall/router Resistant to bypass IPSec is below transport layer, hence transparent to applications Can be transparent to end users Can provide security for individual users if desired 9/30/2004 IP Security Architecture    Specification is quite complex Defined in numerous RFC’s  RFC 2401/2402/2406/2408  many others, grouped by category Mandatory in IPv6, optional in IPv4 9/30/2004 Security Association (SA)    A unidirectional relationship between sender and receiver that affords security for traffic flow Each IPSec computer maintains a database of SA’s Defined by parameters    Security Parameters Index (SPI) IP Destination Address Security Protocol Identifier 9/30/2004 SA Parameters        Sequence Number Counter Sequence Number Overflow Anti-Replay Window AH and ESP information Lifetime IPSec Protocol Mode Path MTU 9/30/2004 Authentication Header (AH)  Provide support for data integrity and authentication of IP packets    Based on use of a MAC   end system/router can authenticate user/app prevent address spoofing attacks by tracking sequence numbers HMAC-MD5-96 or HMAC-SHA-1-96 Parties must share a secret key 9/30/2004 Authentication Header 9/30/2004 10 End-to-End vs End-toIntermediate Authentication 9/30/2004 11 Scope of AH Authentication 9/30/2004 12 Encapsulating Security Payload (ESP)    Provide message content confidentiality and limited traffic flow confidentiality Can optionally provide the same authentication services as AH Support range of ciphers, modes, padding    DES, Triple-DES, RC5, IDEA, CAST etc CBC most common pad to meet blocksize, for traffic flow 9/30/2004 13 Encapsulating Security Payload 9/30/2004 14 Transport vs Tunnel Mode ESP  Transport mode is used to encrypt and optionally authenticate IP data     data protected but header left in clear can traffic analysis but is efficient good for ESP host to host traffic Tunnel mode encrypts entire IP packet   add new header for next hop good for VPNs, gateway to gateway security 9/30/2004 15 Scope of ESP Encryption and Authentication 9/30/2004 16 Combining Security Associations    SAs can implement either AH or ESP, but each SA can implement only one To implement both, need to combine SAs  form a security bundle Have cases 9/30/2004 17 Combining Security Associations 9/30/2004 18 Key Management   Handle key generation and distribution Typically need pairs of keys   Manual key management   per direction for AH & ESP sysadmin manually configures every system Automated key management   automated system for on demand creation of keys for SA’s in large systems Oakley and ISAKMP 9/30/2004 19 OAKLEY    A key exchange protocol Based on Diffie-Hellman key exchange Add features to address weaknesses of Diffie-Hellman     cookies to counter clogging attacks nonces to counter replay attacks key exchange authentication to counter man-in-the-middle attacks Can use arithmetic in prime fields or elliptic curve fields 9/30/2004 20 Usage of Cookies  Three basic requirements     Must depend on specific parties Impossible for anyone other than issuing entity to generate cookies that will be accepted by issuing party Cookie generation and verification must be fast To create a cookie, perform a fast hash over src and dst IP addresses, src and dst ports, and a locally generated secret value 9/30/2004 21 ISAKMP     Internet Security Association and Key Management Protocol Provide framework for key management Define procedures and packet formats to establish, negotiate, modify, and delete SAs Independent of key exchange protocol, encryption algorithm, and authentication method 9/30/2004 22 ISAKMP 9/30/2004 23 Next Class   Denial-of-Service (DoS) attack Hop Integrity 9/30/2004 24 .. .Security in Network Layer    Implementing security in application layer provides flexibility in security policy and key management Problem is need to implement security mechanism... overhead, implement security in network layer to provide security for all applications between selected pair of computers 9/30/2004 IPSec  Two protocols    Provide general security services... provide security for individual users if desired 9/30/2004 IP Security Architecture    Specification is quite complex Defined in numerous RFC’s  RFC 2401/2402/2406/2408  many others, grouped by

Ngày đăng: 09/01/2018, 11:57

Xem thêm:

Mục lục

    Network Layer Security Network Systems Security

    Security in Network Layer

    Scenario of IPSec Uses

    End-to-End vs End-to-Intermediate Authentication

    Scope of AH Authentication

    Encapsulating Security Payload (ESP)

    Transport vs Tunnel Mode ESP

    Scope of ESP Encryption and Authentication

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN