Internet Protocol Security (Ipsec) Guide

Internet Protocol Security (Ipsec) Guide

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC– NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building their network infrastructure across the Internet without having to spend a lot on private leased lines. However, more and more «evil ways» of breaking into the network to gather sensitive information are also evolving. Thus, security on the Internet has been a main concern for each enterprise. IPSec provides the necessary infrastructure to extend an enterprise’s private network across the Internet to reach out to customers and business partners with the help of a «virtual private network (VPN)». | 02 VPN APPLICATIONS IPSEC MODES OF OPERATION There are three basic flavors of IPSec VPNs, each with an IPSec provides two different modes to exchange protected associated set of business requirements (Figure 1): data across the different kinds of VPNs: • Remote-Access VPNs: These let individual users connect to 1. Transport Mode: This mode is applicable only for host-to-host a corporate network. The user’s laptop usually contains a VPN security. Here protection extends to the payload of IP data. client that creates a secure tunnel to the security gateway at The IP addresses of the hosts must be public IP addresses. the corporate headquarters. Another flavor of this application is offered via creating an L2TP/PPTP session that is protected 2. Tunnel Mode: This mode is used to provide data security through IPSec. between two networks. It provides protection for the entire IP packet and is sent by adding an outer IP header corresponding to • Intranet VPNs: This type connects branch offices to the the two tunnel endpoints. The unprotected packets generated corporate headquarters, thus creating a transparent Intranet. by hosts travel through the protected «tunnel» created by the gateways on both ends. The outer IP header in Figure 2 • Extranet VPNs: These let companies connect with their corresponds to these gateways. Both intranet and extranet business partners (for example, suppliers, customers, and joint VPNs are enabled through this mode. Since tunnel mode hides ventures). the original IP header, it facilitates security of the networks with private IP address space. IP HDR Data TRANSPORT MODE ESP ESP IP HDR ESP HDR Data Trailer Auth Encrypted Authenticated TUNNEL MODE ESP ESP NEW IP HDR ESP HDR IP HDR Data Trailer Auth Encrypted Authenticated Figure 1 - IPSec VPN Applications Figure 2 - IPSec modes of operation—tunnel and transport 03 | IPSEC ARCHITECTURE Figure 3 describes the overall IPSec architecture: «pass through», the forwarding engine forwards the packet normally. The «Policy Manager» module is the interface between the user adding a security policy and the SPD. The «IKE Daemon» module • If the policy is «IPSec», the SPD entry should point to an SA does the automatic SA negotiation between two IPSec peers. in SAD. The module then fetches the corresponding SAD The «Certificate Manager» verifies and enrolls certificates for entry and checks for validity. If the SA state is expired, the authentication purposes. In short, a typical packet flow inside IKE daemon starts another SA negotiation. this architecture proceeds as follows: • The transform depicted in the SA is performed on the packet • A packet is received through the receive queue and passed with the help of the «cryptography» module. to the IPSec packet processing module. • The transformed packet is sent to the «transmit queue» for • The IPSec packet processing module extracts the «selector» transmission. from the packet and looks up the SPD for a policy. If the policy is «discard», the packet is discarded. If the policy is Policy Certificate IKE Daemon Manager Manager SPD SAD Receive Transmit Queue Queue IPSecPacketProcessingModule Incoming Outgoing Packet Packet CryptographyModule Figure 3 - IPSec architecture | 04 IPSEC PROTOCOLS IPSec standards have defined a key negotiation protocol, IKE, and two protocols to exchange data, ESP and AH. ESP is most Original IP Ext commonly used. Packet Header Hdrs TCP Data Encapsulating Security Payload (ESP) TRANSPORT MODE ESP provides data confidentiality, data integrity, and replay IP Ext ESP ESP protection for the IP payload. It uses a symmetric key algorithm Header Hdrs ESP Header TCP Data Trailer Auth (like 3DES-CBC or AES-CBC) to encrypt the payload and a Encrypted secure hash algorithm (such as SHA1 or SHA2) that takes an Authenticated authentication key as input to compute the integrity check value (ICV) over the payload. The ICV is then appended to the TUNNEL MODE New IP Ext IP Ext ESP ESP packet. The receiver decrypts the payload and re-computes Header Hdrs ESP Header Header Hdrs TCP Data Trailer Auth the ICV on the received packet and checks for equality. Encrypted Authenticated Any modifications that occurred to the packet payload during transmission can be discovered, as the ICVs will not match. Unlike AH (below), the IP header itself is not protected against data-integrity attacks. Figure 4a illustrates the ESP header. Figure 4a - IPSec ESP Transport and Tunnel formats 05 | Authentication Header (AH) Internet Key Exchange (IKE) AH provides data integrity and replay protection for the whole IKE defines the mechanism to establish SAs required to IP datagram and is an effective measure against IP-spoofing secure the packets between the two IPSec peers. The main and session-hijacking attacks. AH, like ESP, uses a secure hash components of an SA are the transform details (the algorithm algorithm to compute the ICV over the IP header plus payload. and the key) that will be used to protect data. IKE defines an The ICV is included as part of the AH header. The AH protocol automatic and secure way of negotiating these details between specifies a set of mutable IP header fields (TOS, Fragment the two peers. The protocol operates in two phases: offset and flags, TTL, Checksum) that should be excluded from the ICV computation. Figure 4b illustrates the AH header. 1. Phase I (Authentication Phase) When two peers over the Internet wish to communicate, it is assumed that no secure channel exists. Therefore, the objective of «phase I» is to establish a secure channel, authenticate the negotiating parties, and generate shared keys to protect IKE Original IP Ext Packet Header Hdrs TCP Data protocol messages. TRANSPORT MODE 2. Phase II (Key Exchange) Phase II, also called as the «Quick Mode,» is used to establish IP Ext Authent. Header Hdrs Header TCP Data the IPSec SA and to generate new keying material. Authenticated (except for mutable fields) TUNNEL MODE New IP Ext Authent. IP Ext Header Hdrs Header Header Hdrs TCP Data Authenticated (except for mutable fields in new IP Header) Figure 4b - IPSec AH Transport and Tunnel formats | 06 IPSEC PACKET PROCESSING Outbound Packet Processing Figure 5 describes IPSec operation on the security device for Outbound packets arrive from the private network and are inbound and outbound packets. destined to another private network across the Internet. These packets need to be protected. Inbound Packet Processing Engineering A High-Performance Security Gateway Inbound packets are the protected packets that arrive at the security gateway, typically coming from the public network Encryption and authentication are extremely compute- to the private network. These packets have to be decrypted, intensive functions. A security gateway that must perform at authenticated, and forwarded to the private network. wire speed with 64-byte packets cannot rely on a software- only implementation. Specialized SoC functions that perform the cryptographic computations, including encryption and authentication, are called crypto accelerators. These devices are necessary to scale to higher throughput rates. There are different types of crypto accelerators available in the market. At this point of time, these crypto accelerators seem to fall into three general categories: • Processors with Basic Algorithm Support - These processors perform basic symmetric-key operations such as 3DES, AES, and others and hash operations such as SHA1, SHA2, and others. • Packet Processors - These take in a packet along with an SA and do the complete packet processing (for example, the addition of the ESP or AH header, as required) in addition to supporting the prior functionality. • Inline Security Coprocessors - Handles SA lookup and packet handling, as well as SPD verification. Figure 5 - IPSec Packet Processing Data Flow (User Space SW implementation) 07 | INTRODUCING INSIDE SECURE’S EIP-197 PACKET ENGINE FAMILY The PacketEngine-IP-197 (EIP-197) security packet engine is comprised of an in-line streaming interface, a look-aside bus interface, an IPSec classifier, a packet transform engine and an optional post decryption processor. This packet engine is used as a bus master in the data plane of the system and processes packets with very little CPU intervention. It supports an AXI streaming interface, an AMBA SoC bus interface and can be delivered in different configurations to support multiple performance grades from 5 to 80+ Gbps, achievable even on a single SA (one half of a single tunnel) - or as many SA’s/tunnels as needed (limited only by available memory connected to the SoC). | 08 This packet engine is used as a bus master in the data plane handle the cryptographic workload due to performance or of the system and processes packets with very little CPU power limitations. The packet engine handles the security intervention. It supports an AXI streaming interface, an (protocol) operations and reduces power in high-end servers, AMBA SoC bus interface and can be delivered in different communication and network processors for: network processors configurations to support multiple performance grades from used in switch applications; data center processing and cloud 5 to 80+ Gbps, achievable even on a single SA (one half of a computing; communication and high-end security gateways. single tunnel) - or as many SA’s/tunnels as needed (limited only by available memory connected to the SoC).

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us