31
Protocol Basics

Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Embed Size (px)

Citation preview

Page 1: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Protocol Basics

Page 2: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IPSec

• Provides two modes of protection– Tunnel Mode– Transport Mode

• Authentication and Integrity

• Confidentiality

• Replay Protection

Page 3: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Tunnel Mode

• Encapsulates the entire IP packet within IPSec protection

• Tunnels can be created between several different node types– Gateway to gateway– Host to gateway– Host to host

Page 4: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Three Types of Tunnels

Host to Host

Host to Gateway

Gateway to Gateway

Page 5: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Transport Mode

• Encapsulates only the transport layer information within IPSec protection

• Can only be created between host nodes

Page 6: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Authentication and Integrity

• Verification of the origin of data

• Assurance that data sent is the data received

• Assurance that the network headers have not changed since the data was sent

Page 7: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Confidentiality

• Encrypts data to protect against eavesdropping

• Can hide data source when encryption is used over a tunnel

Page 8: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Replay Prevention

• Causes retransmitted packets to be dropped.

Page 9: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IPSec Protection Protocols

• Authentication Header– Authenticates payload data– Authenticates network header– Gives anti-replay protection

• Encapsulated Security Payload– Encrypts payload data– Authenticates payload data– Gives anti-replay protection

Page 10: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IPSec AH in Transport Mode

DataDataTCP HdrTCP HdrOrig IP HdrOrig IP Hdr

DataDataTCP HdrTCP HdrAH HdrAH HdrOrig IP HdrOrig IP Hdr

Integrity hash coverage (except for mutable fields in IP hdr)Integrity hash coverage (except for mutable fields in IP hdr)

Insert

© 2000 Microsoft Corporation

Page 11: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IPSec AH in Tunnel Mode

DataDataTCP HdrTCP HdrOrig IP HdrOrig IP Hdr

Integrity hash coverage (except for mutable new IP hdr fields)Integrity hash coverage (except for mutable new IP hdr fields)

IP HdrIP Hdr AH HdrAH Hdr DataDataTCP HdrTCP HdrOrig IP HdrOrig IP Hdr

New IP header with source & destination IP address

© 2000 Microsoft Corporation

Page 12: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IPSec ESP in Transport Mode

DataDataTCP HdrTCP HdrOrig IP HdrOrig IP Hdr

DataDataTCP HdrTCP HdrESP HdrESP HdrOrig IP HdrOrig IP Hdr ESP TrailerESP Trailer ESP AuthESP Auth

Usually encryptedUsually encrypted

integrity hash coverageintegrity hash coverage

Insert Append

© 2000 Microsoft Corporation

Page 13: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IPSec ESP Tunnel Mode

DataDataTCP HdrTCP HdrOrig IP HdrOrig IP Hdr

ESP TrailerESP Trailer ESP AuthESP Auth

Usually encryptedUsually encrypted

integrity hash coverageintegrity hash coverage

DataDataTCP HdrTCP HdrESP HdrESP Hdr IP HdrIP HdrIPHdrIPHdr

New IP header with source & destination IP address

© 2000 Microsoft Corporation

Page 14: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IPSec Basic Architecture

• IPSec Driver

• Policy Agent

• Internet Key Exchange (IKE)

Policy Agent

IKE

IPSec DriverTCP/IP Driver

Page 15: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IPSec Driver

• Monitors and Secures IP traffic– Encryption and Authentication of outbound

packets– Decryption and Authentication of inbound

packets– Prompts IKE to negotiate secure channels as

needed

• Maintains secure channel state information

Page 16: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Policy Agent

• Maintains IPSec policy and state information

• Distributes filter rule sets to the IPSec Driver

• Distributes authentication and security settings to IKE

Page 17: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

IKE

• Negotiates secure channels based on settings received from the Policy Agent

• Distributes secure channel information to the IPSec driver

Page 18: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

How It All Fits TogetherTunnel

TransportTransport

Page 19: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Sending in Transport ModeApplicationApplication

TransportTransport

IPIP

PhysicalPhysical

IPSecIPSec

PhysicalPhysical IPIP IPSecIPSec TCPTCPApplicationApplication

DataData

Page 20: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Sending in Tunnel Mode

PhysicalPhysical IPIP IPSecIPSec TCPTCPApplicationApplication

DataData

IPIP IPSecIPSec TCPTCPApplicationApplication

DataData

InnerInnerIPIP

IPSecIPSec TCPTCPApplicationApplication

DataDataIPSecIPSec

OuterOuterIPIP

PhysicalPhysical

IPIP

PhysicalPhysical

IPSecIPSec IPIP

PhysicalPhysical

IPSecIPSec

Page 21: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Receiving in Tunnel Mode

PhysicalPhysical IPIP IPSecIPSec TCPTCPApplicationApplication

DataData

IPIP IPSecIPSec TCPTCPApplicationApplication

DataData

InnerInnerIPIP

IPSecIPSec TCPTCPApplicationApplication

DataDataIPSecIPSec

OuterOuterIPIP

PhysicalPhysical

IPIP

PhysicalPhysical

IPSecIPSec IPIP

PhysicalPhysical

IPSecIPSec

Page 22: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Receiving in Transport ModeApplicationApplication

TransportTransport

IPIP

PhysicalPhysical

IPSecIPSec

PhysicalPhysical IPIP IPSecIPSec TCPTCPApplicationApplication

DataData

Page 23: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Layer Two Tunneling Protocol (L2TP)

• Provides– Provides PPP encapsulation over IP– VPN services

• Doesn’t Provide– A method of encryption for it’s traffic– Protection against injection of packets into an

open L2TP session

Page 24: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

How L2TP Works

ApplicationApplication

L2TPL2TP

PPPPPP

Driver LayerDriver Layer

TCP, UDPTCP, UDP

NICNIC

IPSecIPSec

IPIP

L2TP/IPSecL2TP/IPSec

44

33

55

IKE ServiceIKE Service22

11

controlcontrol

Page 25: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Kerberos

• Provides authentication of network server and client

Page 26: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

What Kerberos Provides

• Mutual authentication of parties

Page 27: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

How Kerberos WorksKDCKDC

ClientClientApplicationApplication

ServerServer

ASAS TGSTGS

Authorization Authorization RequestRequest

Ticket Ticket Granting Granting TicketTicket

Ticket Ticket RequestRequest

TicketTicket

TicketTicket

Page 28: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

Public Key Infrastructure Basics

Page 29: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

How Public Keys Are Used for Authentication

Page 30: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

What’s In a Certificate?

Page 31: Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection

How PKI Works