Vous êtes sur la page 1sur 49

Technical Overview: DoE Student

VPN
Eric Hlutke
Cisco Systems, Inc.

Presentation_ID

1999, Cisco Systems, Inc.

IPSEC: Encryption Theory and


Protocol Architecture

Presentation_ID

1999, Cisco Systems, Inc.

What is encryption?

Encryption is the conversion of plain- text into cipher-text using a predetermined algorithm
Generally the cipher text is the same length as the plain text
Often a key is used to generate a ciphertext from an algorithm for a particular
plain text
-

Saadat Malik

www.cisco.com

Algorithm and Key system

A key is a parameter used by an encryption algorithm to


encrypt data
After encryption, either the same key (symmetric encryption)
or a complementary key (asymmetric encryption) is used to
decrypt the cipher text
Simple example:
Algorithm:
Key space:

cipher text = ((plain text + 61) * 3 ) / key


{1,3,5,9,44,1111,9001}

If key is 5, and plain text is 7 (say), then cipher text is


((7+61) * 3) / 5 = 40.8

Saadat Malik

www.cisco.com

Public and Private keys

A private key is a key which is only known to the individual


who owns it
A public key is known to everyone but still belongs to a
unique individual
Data encrypted using my public key can only be decrypted
using my private key
Data encrypted using my private key can only be decrypted
using my public key
When Alice wants to send data to Bob and does not want any
one else to see it, she encrypts it using Bobs public key
(which every one knows) and then encrypts this data using
her private key. Bob gets the cipher text and decrypts it first
using Alice's public key (confirming that the data came from
her only) and then decrypts further using his own private key
(which only he possesses)

Saadat Malik

www.cisco.com

What is IPSEC?

IPSEC stands for IP Security


A security protocol in the network layer will be
developed to provide cryptographic security
services that will flexibly support combinations
of authentication, integrity, access control, and
confidentiality (IETF)

Saadat Malik

www.cisco.com

IPSec Protocols

Encryption
Data Privacy

Integrity/Authentication

Data Exchange Verification Transport Format

DES
Data Encryption Standard

3DES
Triple Data Encryption
Standard

IKE
Internet Key Exchange

RSA / DSS
Rivest, Shamir, Adelman /
Digital Signature Standard

X.509v3
Digital Certificates

MD5 / SHA
Message Digest 5 / Secure
Hash Algorithm
Saadat Malik

Modes

www.cisco.com

AH / ESP
Authentication
Header /
Encapsulating
Security Payload

Tunnel /
Transport
Network to
Network / Host to
Host

Digital Encryption Algorithms


DES/3DES (Triple DES)

RC2

IDEA

RC5

Blowfish

MMB

RSA

CA-1.1

Lucifer
Madryga

Saadat Malik

IPSec Standard
Encryption
Algorithm

SkipJack
GOST

FEAL

CAST

REDOC

SAFER

LOKI

3-Way

Khufu/Khafre

CRAB
www.cisco.com

What is DES/3DES?

Data Encryption Standard


DES is a published, U.S. Government approved encryption
algorithm

3DES

DES

3DES is the DES algorithm


performed three times
sequentially

DES is a single algorithm


instance
DES uses a 56 bit key to
encrypt 64 bit datagrams
Actual IPSec algorithm is
DES-CBC, which merges the
datagram with 64 bytes of
random data (IV)
Saadat Malik

Two-key 3DES encrypts 1-21, resulting in a 112 bit key


strength
Three-key 3DES encrypts 12-3, resulting in a 168 bit key
strength

www.cisco.com

Why IPSEC?

intranet

internet

Extend the corporate network


across the Internet
Conduct business over the Internet
Reduce remote access costs
Saadat Malik

www.cisco.com

10

IPSEC protocol Architecture:


What does it offer?
IPSEC is a combination of three primary protocols (ESP,
AH and IKE)
Authentication: Authentication Header (AH) and
Encapsulating Security Payload (ESP)
Integrity: Encapsulating Security Payload (ESP)
Confidentiality: Encapsulating Security Payload (ESP)
Bringing it all together: Internet key Exchange (IKE)

Saadat Malik

www.cisco.com

11

How IPSEC works

IPSEC is implemented in the following five stages:


Decision to use IPSEC between two end points across internet
Configuration of the two gateways between the end points to
support IPSEC
Initiation of an IPSEC tunnel between the two gateways due to
interesting traffic
Negotiation of IPSEC/IKE parameters between the two gateways
Passage of encrypted traffic

Saadat Malik

www.cisco.com

12

Break down of IPSEC: IKE

Internet key Exchange protocol


negotiates protocol parameters
exchanges public keys
authenticates both sides
manages keys after exchange

Saadat Malik

www.cisco.com

13

Break down of IPSEC: IKE (cont.)


1. Outbound packet from
Alice to Bob. No IPSec SA

4. Packet is sent from Alice to


Bob protected by IPSec SA

IPSec

IPSec

Alices
router

Bobs
router

IKE

IKE Tunnel

2. Alices IKE begins


negotiation with Bobs

Saadat Malik

IKE

3. Negotiation complete.
Alice and Bob now have
complete set of SAs in place

www.cisco.com

14

Break down of IPSEC: ESP

Encapsulating Security payload


Encryption of the payload
Transport in packet over IP
Authentication of data source

Saadat Malik

www.cisco.com

15

Break down of IPSEC: ESP


(cont..)

IP D
(Enc ata
rypt
ed)

IP S e c H e a d e
r
ESP
IP
H
He
ad
er

Saadat Malik

www.cisco.com

16

IPSEC Functionality Flow Chart


Interesting traffic received
Main Mode IKE negotiation
Quick Mode negotiation
Establishment of tunnel

IKE
IPSec
Data
Saadat Malik

www.cisco.com

17

Step by Step IPSEC between Bob


and Alice

New York (NY)

San Francisco (SF)


internet

IPSec

Bob

Alice

Saadat Malik

www.cisco.com

18

Case Study: IPSEC Connection


Walk-Through

Presentation_ID

1999, Cisco Systems, Inc.

19

Step by Step IPSEC between Bob


and Alice (cont.)
San Francisco (SF) Configured for IPSEC with New
York (NY)

New York (NY) Configured for IPSEC with San


Francisco (SF)

Alice sends data to Bob

SF recognizes the data as interesting traffic

Saadat Malik

www.cisco.com

20

Step by Step IPSEC between Bob


and Alice (cont.)
San Francisco (SF) starts Main Mode (IKE) exchange
with peer, New York (NY)

SF proposes encryption algorithms, hash


algorithms (for authentication), authentication
method, Diffie Hellman group, ESP or AH protocol

NY agrees to the proposition and responds with an


agreement to SF
SF generates a random number, nonce, and sends
it along with its public key to NY
Saadat Malik

www.cisco.com

21

Step by Step IPSEC between Bob


and Alice (cont.)
NY generates a random number, nonce, and sends
it along with its public key to SF
SF uses its private key to sign the nonce and sends
it back to NY

NY uses its private key to sign the nonce and sends


it back to SF

SF uses NYs public key to decrypt the encrypted


nonce and thus verifies that it is talking to NY
Saadat Malik

www.cisco.com

22

Step by Step IPSEC between Bob


and Alice (cont.)
NY uses SFs public key to decrypt the encrypted
nonce and thus verifies that it is talking to SF
SF uses its private key to sign the nonce and sends
it back to NY

NY uses its private key to sign the nonce and sends


it back to SF

SF uses NYs public key to decrypt the encrypted


nonce and thus verifies that it is talking to NY

Saadat Malik

www.cisco.com

23

Step by Step IPSEC between Bob


and Alice (cont.)
NY uses SFs public key to decrypt the encrypted
nonce and thus verifies that it is talking to SF
SF starts Quick Mode exchange with NY by
generating and sending a security parameter index
(SPI)

NY verifies that the SPI is not being used by it and


confirms that SF can use it. It also sends its own
SPI to SF

Saadat Malik

SF confirms NYs SPI and sends the address of the


host (Alice) that will be using the IPSEC SA
negotiated
www.cisco.com
24

Step by Step IPSEC between Bob


and Alice (cont.)
NY confirms to SF that it supports IPSEC for Alice
and also sends Bobs address to NY
SF confirms that it supports Bob, and sends out
IPSEC attributes i.e.. SA life time and encryption
algorithm to NY

NY verifies the IPSEC attributes sent by SF and sets


up an Inbound, outbound pair of IPSEC SAs for Bob
to talk to Alice

Saadat Malik

SF, upon receiving NYs confirmation of IPSEC


attributes sets up an Inbound, outbound pair of
IPSEC SAs for
Alice to talk to Bob
www.cisco.com

25

ESP packet Format


IP Header
Security parameter Index (SPI)
Sequence Number
Payload Data (variable length)
encrypted Authenticated

Padding (0-255 bytes)


Pad Length
Next header
Authentication Data
Saadat Malik

www.cisco.com

26

VPN Connection Models

Presentation_ID

1999, Cisco Systems, Inc.

27

VPN Models

VPN Software Client


VPN 3002 Hardware Client
PIX VPN
VPN Concentrator

Saadat Malik

www.cisco.com

28

Model: VPN Software Client

Server
VPN
Concentrator

Internet
Tunnel

Modem
ISDN
Cable
DSL

Client

Components
Software Client
Tunneling Protocols
PPTP, L2TP, and IPSec

VPN Concentrator
Saadat Malik

www.cisco.com

29

Model: VPN 3002 Hardware Client

Server
VPN
Concentrator

Internet
Tunnel

Components
3002 Hardware Client
Tunneling Protocols
PPTP, L2TP, and IPSec
VPN Concentrator
Saadat Malik

www.cisco.com

30

Model: PIX VPN

Server
VPN
Concentrator

Internet
Tunnel

Components
PIX Hardware
Tunneling Protocols
PPTP, L2TP, and IPSec
VPN Concentrator
Saadat Malik

www.cisco.com

31

Model: VPN Concentrator


Server
Internet
Tunneling Protocol

Components
VPN Concentrators
Tunneling Protocols
IPSec
Saadat Malik

www.cisco.com

32

VPN Hardware

Presentation_ID

1999, Cisco Systems, Inc.

33

Cisco VPN 3000 Concentrator

Broadband performance
Scalable encryption
Redundant, hot swap SEPs
with stateful SEP failover
Stateless chassis failover
(VRRP)

Scalable
Encryption
Processor
(SEP)
Saadat Malik

Redundant power supplies


Full
DSP
Basedinstrumentation
Hardware Encryption
1500 to 5000 Simultaneous Sessions

www.cisco.com

34

Browser Login

Saadat Malik

www.cisco.com

35

Graphical User Interface

Toolbar
Table of
Contents

Manager
Screen

Saadat Malik

www.cisco.com

36

Quick Configuration

Saadat Malik

www.cisco.com

37

IPSec Client

Saadat Malik

www.cisco.com

38

Properties - General Tab


Win 95/98

Saadat Malik

Win NT 4

www.cisco.com

39

Client Connection Status

Saadat Malik

www.cisco.com

40

Concentrator Connection Status

Saadat Malik

www.cisco.com

41

Status Details

Saadat Malik

www.cisco.com

42

Pix: PDM/ VPN Wizard

Drop
down
Buttons
Tabs

Saadat Malik

www.cisco.com

43

Appendix A

Presentation_ID
Presentation_ID

1999,
1999,Cisco
Cisco Systems,
Systems, Inc.
Inc.

www.cisco.com

44

Security Information Resources

Internet Cryptography; Smith, Richard E.


Addison Wesley Longman Inc.; 08/1997
Designing Network Security: Kaeo, Merike
Cisco Systems; 05/1999
Applied Cryptography : Protocols, Algorithms, and Source Code in C,
Second Edition; Schneier, Bruce
John Wiley and Sons; 01/1996
Basic Methods of Cryptography; Van Der Lubbe, Jan C. A.
Cambridge University Press; 1998

Saadat Malik

www.cisco.com

45

Appendix B

Presentation_ID
Presentation_ID

1999,
1999,Cisco
Cisco Systems,
Systems, Inc.
Inc.

www.cisco.com

46

Presentation Acronyms
3DES Triple Data Encryption Standard
AAA Authentication, Authorization, and Accounting
AES Advanced Encryption Standard
AH Authentication Header
CA Certificate Authority
CAW Certificate Authority Workstation
CBC Cipher Block Chaining
CRL Certificate Revocation List
DES Data Encryption Standard
DH Diffie-Hellman
DSA Digital Signature Algorithm
DSS Digital Signature Standard
ESP Encapsulating Security Protocol
HMAC Hash-Based Message Authentication Code

Saadat Malik

www.cisco.com

47

Presentation Acronyms; Contd


IKE Internet Key Exchange
IPSec IP Security
MD5 Message Digest 5
PKCS Public Key Cryptography Standard
PKI Public Key Infrastructure
PSK Pre-Shared Key
RSA Rivest, Shamir, Adelman
SA Security Association
SCEP Simple Certificate Enrollment Protocol
SHA Secure Hash Algorithm

Saadat Malik

www.cisco.com

48

F0_6919_X
Saadat

1999, Cisco Systems, Inc.


Malik

www.cisco.com

49

49

Vous aimerez peut-être aussi