IPv6. IPv6 et la sécurité: IPsec Objectif: Sécuriser... v.1a IPv6 Théorie et Pratique & Microsoft IPsec 1



Documents pareils
Sécurité des réseaux IPSec

SSL ET IPSEC. Licence Pro ATC Amel Guetat

IPSEC : PRÉSENTATION TECHNIQUE

Les Réseaux Privés Virtuels (VPN) Définition d'un VPN

How to Login to Career Page

HAUTE DISPONIBILITÉ DE MACHINE VIRTUELLE AVEC HYPER-V 2012 R2 PARTIE CONFIGURATION OPENVPN SUR PFSENSE

Instructions Mozilla Thunderbird Page 1

0,3YDQGLWVVHFXULW\ FKDOOHQJHV 0$,1²0RELOLW\IRU$OO,31HWZRUNV²0RELOH,3 (XUHVFRP:RUNVKRS %HUOLQ$SULO

Tunnels et VPN. 22/01/2009 Formation Permanente Paris6 86

LP ASUR - Sécurité. Introduction à la Sécurité des Systèmes d'information. Florent Autréau - florent@mataru.com 28 Avril 2013

Tunnels. Plan. Pourquoi? Comment? Qu est-ce? Quelles solutions? Tunnels applicatifs ESIL INFO 2005/2006. Sophie Nicoud

Contrôle d'accès Access control. Notice technique / Technical Manual

OWASP Open Web Application Security Project. Jean-Marc Robert Génie logiciel et des TI

Principe de TrueCrypt. Créer un volume pour TrueCrypt

Le protocole SSH (Secure Shell)

Eric DENIZOT José PEREIRA Anthony BERGER

Instructions pour mettre à jour un HFFv2 v1.x.yy v2.0.00

Outils d'analyse de la sécurité des réseaux. HADJALI Anis VESA Vlad

1. Formation F5 - Local Traffic Manager Configuring (LTM)

Windows Server 2008 Sécurité ADMINISTRATION ET CONFIGURATION DE LA SECURITE OLIVIER D.

Notice Technique / Technical Manual

DFL-210, DFL-800, DFL-1600, DFL-2500 Comment configurer une connexion VPN IPSec site à site

Transport Layer Security (TLS) Guide de mise en œuvre. Version: 1.0

NIMBUS TRAINING. Administration de Citrix NetScaler 10. Déscription : Objectifs. Publics. Durée. Pré-requis. Programme de cette formation

Quick Start Guide This guide is intended to get you started with Rational ClearCase or Rational ClearCase MultiSite.

CONVENTION d adhésion au service. EDUROAM de Belnet

Cours 14. Crypto. 2004, Marc-André Léger

VPN IP security Protocol

Les Protocoles de sécurité dans les réseaux WiFi. Ihsane MOUTAIB & Lamia ELOFIR FM05

TABLE DES MATIERES A OBJET PROCEDURE DE CONNEXION

Note technique. Recommandations de sécurité relatives à IPsec 1 pour la protection des flux réseau

1 PfSense 1. Qu est-ce que c est

Frequently Asked Questions

Sécurité GNU/Linux. Virtual Private Network

Firewall ou Routeur avec IP statique

I>~I.J 4j1.bJ1UlJ ~..;W:i 1U

Plan. Department of Informatics

Utiliser une WebCam. Micro-ordinateurs, informations, idées, trucs et astuces

Exemple PLS avec SAS

WEB page builder and server for SCADA applications usable from a WEB navigator

Information Security Management Lifecycle of the supplier s relation

Practice Direction. Class Proceedings

RULE 5 - SERVICE OF DOCUMENTS RÈGLE 5 SIGNIFICATION DE DOCUMENTS. Rule 5 / Règle 5

Contrôle d accès Access control MOD-TCPIP-AI. Notice technique / Technical Manual

Devoir Surveillé de Sécurité des Réseaux

Le protocole RADIUS Remote Authentication Dial-In User Service

Les techniques de la télémaintenance

AUDIT COMMITTEE: TERMS OF REFERENCE

Protocoles utilisant des mécanismes d'authentification: TACACS+, RADIUS et Kerberos

affichage en français Nom de l'employeur *: Lions Village of Greater Edmonton Society

VTP. LAN Switching and Wireless Chapitre 4

Internet Group Management Protocol (IGMP) Multicast Listener Discovery ( MLD ) RFC 2710 (MLD version 1) RFC 3810 (MLD version 2)

IPv6: from experimentation to services

France SMS+ MT Premium Description

Forthcoming Database

Package Contents. System Requirements. Before You Begin

Compléter le formulaire «Demande de participation» et l envoyer aux bureaux de SGC* à l adresse suivante :

La sécurité dans les grilles

TP réseaux Translation d adresse, firewalls, zonage

THÈSE. présentée à TÉLÉCOM PARISTECH. pour obtenir le grade de. DOCTEUR de TÉLÉCOM PARISTECH. Mention Informatique et Réseaux. par.

Cryptologie. Algorithmes à clé publique. Jean-Marc Robert. Génie logiciel et des TI

Academic Project. B2- Web Development. Resit Project. Version 1.0 Last update: 24/05/2013 Use: Students Author: Samuel CUELLA

Contents Windows

TECHNICAL NOTE. Configuration d un tunnel VPN entre un firewall NETASQ et le client VPN. Authentification par clé pré-partagée. Version 7.

CADETS CATO OAIC 11-06


Supervision et infrastructure - Accès aux applications JAVA. Document FAQ. Page: 1 / 9 Dernière mise à jour: 15/04/12 16:14

Université de Reims Champagne Ardenne. HTTPS, SSL, SSH, IPSEC et SOCKS. Présenté par : BOUAMAMA Mohamed Nadjib AZIZ Xerin

Les marchés Security La méthode The markets The approach

Cedric Dumoulin (C) The Java EE 7 Tutorial

Sécurité des réseaux sans fil

Acce s aux applications informatiques Supply Chain Fournisseurs

Micro-ordinateurs, informations, idées, trucs et astuces utiliser le Bureau à distance

Paxton. ins Net2 desktop reader USB

Configuration d'un Réseau Privé Virtuel (RPV ) communément appelé VPN

APPENDIX 6 BONUS RING FORMAT

1. Présentation de WPA et 802.1X

English Q&A #1 Braille Services Requirement PPTC Q1. Would you like our proposal to be shipped or do you prefer an electronic submission?

Bitdefender GravityZone

Complémentarité de DNSsec et d IPsec

AMENDMENT TO BILL 32 AMENDEMENT AU PROJET DE LOI 32

Application Form/ Formulaire de demande

Les solutions de paiement CyberMUT (Crédit Mutuel) et CIC. Qui contacter pour commencer la mise en place d une configuration de test?

Folio Case User s Guide

Monitor LRD. Table des matières

WiFi Security Camera Quick Start Guide. Guide de départ rapide Caméra de surveillance Wi-Fi (P5)

Sécurité des Web Services (SOAP vs REST)

Pare-feu VPN sans fil N Cisco RV120W

INSTRUMENTS DE MESURE SOFTWARE. Management software for remote and/or local monitoring networks

Les réseaux des EPLEFPA. Guide «PfSense»

IPSec VPN. JTO Rennes 27 Mars. Bertrand Wallrich

Règlement sur le télémarketing et les centres d'appel. Call Centres Telemarketing Sales Regulation

LE FORMAT DES RAPPORTS DU PERSONNEL DES COMMISSIONS DE DISTRICT D AMENAGEMENT FORMAT OF DISTRICT PLANNING COMMISSION STAFF REPORTS

RICHEL SERRES DE FRANCE PAR_ _02432_ALT DATE: 03/02/2012

Transcription:

IPv6 IPv6 et la sécurité: IPsec Objectif: Sécuriser... v.1a IPv6 Théorie et Pratique & Microsoft IPsec 1

IPsec Toutes les implémentations conformes IPv6 doivent intégrer IPsec Services Authentification mutuelle Authentification de l'origine des données Confidentialité des données Confidentialité du flux des données Intégrité des données Prévention contre le rejeu des données Non-répudiation Attaques IP sniffing, spoofing, flooding Écoute, usurpation de l'identité, inondation de messages v.1a IPv6 Théorie et Pratique & Microsoft IPsec 2

IETF IPsec IPsec exists below the Transport layer, so its security services are transparently inherited by applications IPsec provides the protections of data integrity, data origin authentication, data confidentiality, and replay protection without having to upgrade applications or train users. One of the great benefits of IPsec is the ability to protect against both internal and external attacks. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 3

Orientations IETF Deux extensions IP de sécurité Authentification: AH Authentification Header Services d'authentification, intégrité des données Optionellement détection de rejeu et non-répudiation Confidentialité: ESP Encapsulating Security Payload Services de confidentialité, intégrité, authentification et détection de rejeu Confidentialité du flux (au moins de façon limitée) Deux modes de protection Transport Tunnel v.1a IPv6 Théorie et Pratique & Microsoft IPsec 4

Association de sécurité L'ensemble des services et mécanismes de sécurité choisis par les deux entités du réseau forme l'association de sécurité de la communication Unidirectionnelle A B et, éventuellement, B A identifiée par le triplet: SPI Security Parameters Index (SAID: Security Association Identifier) Adresse du destinataire du paquet IP Protocole de sécurité AH ou ESP v.1a IPv6 Théorie et Pratique & Microsoft IPsec 5

Contenu d'une association de sécurité AH: Algorithme d'authentification, clés de chiffrement,... ESP Algorithme de chiffrement, clés de chiffrement,... Algorithme d'authentification, clés de chiffrement Si le service d'authentification est choisi Durée de vie Pour éviter que les clés de chiffrement soient utilisées trop longtemps Mode du protocole IPsec Transport Tunnel (Wildcard, c-à-d choisi par l'application) v.1a IPv6 Théorie et Pratique & Microsoft IPsec 6

Choix d'une association de sécurité Choix, au niveau station émettrice ou passerelle de sécurité, dépend des paramètres suivants (sélecteurs): Adresse IP de la source Identité de l'utilisateur Identité de l'équipement Numéros de ports source et destination Protocole de niveau transport Adresse IP de l'équipement distant Niveau de sensibilité des données RFC 1108 http://www.ietf.org/rfc/rfc1108.txt En général on utilise Adresse IP de destination Numéro de protocole Numéros de port v.1a IPv6 Théorie et Pratique & Microsoft IPsec 7

Bases de données IETF conseille deux BD Security Policy DB (SPD) En fonction du sélecteur Discard Bypass IPsec Apply IPsec Security Association DB (SAD) Services et mécanismes à appliquer RFC 2401 2401bis http://www.ietf.org/rfc/rfc2401.txt v.1a Source: Rolf Oppliger, Security at the Internet IPv6 Layer, Théorie IEEE et Computer, Pratique Sep. & Microsoft 1998, pp. 43-47 IPsec 8

PGP Pretty Good Privacy Zimmerman, MIT Source: P. Dowd et al., Network Security:It s Time to Take It Seriously, IEEE Computer, Sep. 1998, pp. 24-28 v.1a IPv6 Théorie et Pratique & Microsoft IPsec 9

Digests et Signatures numériques Digest Condensé (condensat, empreinte) d un document obtenu avec une fonction mathématique de hachage (Hash function) ex. message msg Digital Signature Le fait d encrypter un condensé avec la clef privée d un utilisateur produit une signature numérique elle garantit à la fois: l identité de l auteur (authentification) l intégrité du message l impossibilité pour l auteur de répudier son message Applications typiques Echange de documents, téléchargement de programmes Courrier Electronique v.1a IPv6 Théorie et Pratique & Microsoft IPsec 10

Positionnement de l'extension d'authentification En-tête IPv6 Proche en p. Routage AH Destination Données Mode transport En-tête IPv6 + nouvelles extensionsah Mode tunnel En-tête IPv6 + extensions originales Données v.1a IPv6 Théorie et Pratique & Microsoft IPsec 11

Authentication Header Protocol Authentification et intégrité Trois niveaux de clefs host-oriented keying user-oriented keying session-unique keying IP TCP HTTP CODE HTML IP AH TCP HTTP CODE HTML v.1a IPv6 Théorie et Pratique & Microsoft IPsec 12

Contenu de l'extension d'authentification En-tête suiv. Lg. extension Réservé Indice des paramètres de sécurité (SPI) Numéro de séquence 32 Authentificateur (nombre variable de mots de 32 bits) v.1a IPv6 Théorie et Pratique & Microsoft IPsec 13

Confidentialite v.1a IPv6 Théorie et Pratique & Microsoft IPsec 14

Les deux modes de protection En-tête IPv6 Proche en p. Destination ESP Destination Données Queue ESP Auth. ESP Mode transport Authentifié Chiffré En-tête IPv6 + nouvelles extensions ESP En-tête IPv6 + extensions originales Données Queue ESP Auth. ESP Mode tunnel Authentifié Chiffré v.1a IPv6 Théorie et Pratique & Microsoft IPsec 15

Encapsulating Security Payload Protocol Confidentialité Deux modes Transport : le contenu du paquet Tunnel : tout le paquet IP y compris l en-tête IP TCP HTTP CODE HTML IP AH ESP TCP HTTP CODE HTML IP AH ESP IP TCP HTTP CODE HTML v.1a IPv6 Théorie et Pratique & Microsoft IPsec 16

Contenu de l'extension de confidentialité 1 32 Indice des paramètres de sécurité (SPI) Numéro de séquence Charge utile comprenant les données chiffrées et optionnellement des données de synchronisation (longueur variable) Bourrage (longueur variable) Lg. bourrage En-tête suiv. Authentificateur (nombre variable de mots de 32 bits) v.1a IPv6 Théorie et Pratique & Microsoft IPsec 17

Modes d opération Deux modes d opération transport mode adresses source et destination en clair tunnel mode adresses source et destination cachées v.1a IPv6 Théorie et Pratique & Microsoft IPsec 18

Références IPv6 Théorie et Pratique, Chapitre Sécurité http://livre.point6.net/index.php/s%c3%a9curit%c3%a9 v.1a IPv6 Théorie et Pratique & Microsoft IPsec 19

Internal and External Attacks Firewalls, secure routers, and strong authentication of remote access connections are examples of attempts to defend against external threats. But strengthening a network s perimeter does nothing to protect against attacks mounted from within. An organization can lose a great deal of sensitive information from internal attacks mounted by employees, supporting staff members, or contractors. Edge devices such as firewalls offer no protection against internal threats. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 20

Benefits of IPsec IPsec provides network-level data integrity, data confidentiality, data origin authentication, and replay protection for IP-based traffic. IPsec in Windows Server 2003 integrates with the inherent security of the Windows Server 2003 operating system to provide the ideal platform for protecting intranet and Internet communications. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 21

IPsec in Windows Transparency of IPsec to users and applications Defense-in-depth against vulnerabilities in upper-layer protocols and applications Restricted access to servers Customizable security configuration Centralized IPsec policy administration through Active Directory Support for IETF standards Support for automatic cryptographic key management Hardware acceleration of IPsec cryptographic functions is supported by many network adapters v.1a IPv6 Théorie et Pratique & Microsoft IPsec 22

Packet Filtering v.1a IPv6 Théorie et Pratique & Microsoft IPsec 23

Support for IETF standards RFC 1828: IP Authentication using Keyed MD5 RFC 1829: The ESP DES-CBC Transform RFC 2085: HMAC-MD5 IP Authentication with Replay Prevention RFC 2104: HMAC: Keyed-Hashing for Message Authentication RFC 2401: Security Architecture for the Internet Protocol RFC 2402: IP Authentication Header RFC 2403: The Use of HMAC-MD5-96 within ESP and AH RFC 2404: The Use of HMAC-SHA-1-96 within ESP and AH RFC 2406: IP Encapsulating Security Payload (ESP) RFC 2407: The Internet IP Security Domain of Interpretation for ISAKMP RFC 2408: Internet Security Association and Key Management Protocol (ISAKMP) RFC 2409: The Internet Key Exchange (IKE) RFC 2410: The NULL Encryption Algorithm and Its Use with IPsec RFC 2411: IP Security Document Roadmap RFC 2451: The ESP CBC-Mode Cipher Algorithms A GSS-API Authentication Method for IKE (draft-ietf-ipsec-isakmp-gss-auth-0x.txt) UDP Encapsulation of IPsec Packets (draft-ietf-ipsec-udp-encaps-02.txt) Negotiation of NAT-Traversal in the IKE (draft-ietf-ipsec-nat-t-ike-02.txt) v.1a IPv6 Théorie et Pratique & Microsoft IPsec 24

End-to-End Security Computers or network elements that route data from source to destination are not required to support IPsec. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 25

L2TP/IPsec for Remote Access v.1a IPv6 Théorie et Pratique & Microsoft IPsec 26

Site-to-Site VPN Connection v.1a IPv6 Théorie et Pratique & Microsoft IPsec 27

Gateway-to-Gateway Tunneling v.1a IPv6 Théorie et Pratique & Microsoft IPsec 28

Creating IPsec Policies General IPsec policy settings Settings that determine the name of the policy, its description, key exchange settings, and key exchange methods. General IPsec policy settings apply regardless of which rules are configured. Rules One or more IPsec rules that determine which traffic IPsec examines, how that traffic is secured and encrypted, and how IPsec peers are authenticated. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 29

Defining IPsec Policy Rules Filter list A single filter list is selected that contains one or more predefined packet filters that describe the types of traffic to which the configured filter action for this rule is applied. Filter action A single filter action is selected that includes the type of action required (permit, block, or secure) for packets that match the filter list. For the secure filter action, the negotiation data contains one or more security methods that are used (in order of preference) during IKE negotiations and other IPsec settings. Each security method determines the security protocol (such as AH or ESP), the specific cryptographic algorithms, and session key regeneration settings. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 30

Defining IPsec Policy Rules (2) Authentication methods One or more authentication methods are configured (in order of preference) and used for authentication of IPsec peers during main mode negotiations. The available authentication methods are the Kerberos V5 protocol (used in Active Directory environments), use of a certificate issued from a specified certification authority (CA), or a preshared key. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 31

Example of Configuring an IPsec Policy As an example of how to configure IPsec policies, consider an organization with a centralized legal department. The network administrators have decided that communications within the legal department have to be authentic and unmodified, but not encrypted. Additionally, communications between the legal department and other departments within the organization must be authentic, unmodified, and encrypted. IPsec applies the appropriate security policy based on the characteristics of IP packets. For our example, if the communication is between a computer in the legal department and a computer outside the legal department, IPsec for Windows Server 2003 must enforce data origin authentication, data integrity, and data confidentiality. If the communication is between computers inside the legal department, IPsec must enforce data origin authentication and data integrity. To implement IPsec for the legal department, the administrator would perform the following steps: Create an organizational unit for the legal department named "Legal" and place all of the computer accounts of the legal department within it. Using the IP Security Policies extension within the Group Policy Editor snap-in (available under Computer Configuration\Security Settings), create an IPsec policy named "Communication for the Legal Department" with the following settings: A filter list named "Legal intra-department traffic" that specifies that the destination address of packets must match an address on the IP subnets of the legal department and the source address of packets must match an address on the IP subnets of the legal department. A filter list named "All IP traffic" that specifies any IP traffic. A filter action named "Secure traffic within the Legal department" that specifies data authenticity and integrity. A filter action named "Secure traffic outside the Legal department" that specifies data authenticity, integrity, and confidentiality. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 32

Example of Configuring an IPsec Policy (2) A rule named "Legal intra-department communications" which uses the "Legal intra-department traffic" filter list, the "Secure traffic within the Legal department" filter action, and Kerberos authentication. A rule named "Inter-department communications" which uses the "All IP traffic" filter list, the "Secure traffic outside the Legal department" filter action, and Kerberos authentication. Assign the IPsec policy named "Communication for the Legal Department" to the "Legal" organizational unit. After the IPsec policy is assigned and all computers within the legal department update their Computer Configuration Group Policy settings, IPsec-secured communications is enforced for all communication of the computers in the legal department. For example, when a computer in the legal department sends a packet to computer in another department, the packet matches the "All IP traffic" filter list, which is associated with the "Inter-department communications" rule, which enforces the use of Kerberos authentication and data origin authentication, integrity, and confidentiality. When a computer in the legal department sends a packet to another computer in the legal department, the packet matches the "Legal intra-department traffic" filter list, which is associated with the "Legal intra-department communications" rule, which enforces the use of Kerberos authentication and data origin authentication and integrity. Notice that for intra-department communication, the packets also match the "All IP traffic" filter list. However, the match to the "Legal intra-department traffic" filter list is more specific, and it is chosen over the "All IP traffic" filter list. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 33

IPsec Components v.1a IPv6 Théorie et Pratique & Microsoft IPsec 34

How IPsec Works The user on Computer A sends a message to the user on Computer B. The message is passed to TCP/IP and is intercepted by the IPsec driver on Computer A. The IPsec driver on Computer A checks its outbound IPsec filter list and determines that the message should be secured. The action is to negotiate security, so the IPsec driver notifies IKE module to begin negotiations. The two computers use IKE to authenticate each other and determine secret keying material, the type of protection for future IKE traffic, and the type of protection for the message that is being sent. The sets of parameters that determine the protection, known as security associations (SAs), are sent to the IPsec driver. The IPsec driver uses SA information to protect the message. The IPsec-protected message is forwarded to Computer B. The IPsec driver on Computer B receives the IPsec-protected message. The IPsec driver on Computer B validates authentication and integrity and, if required, decrypts the message. The IPsec driver passes the validated and decrypted message to the TCP/IP driver, which passes it to the receiving application on Computer B. v.1a IPv6 Théorie et Pratique & Microsoft IPsec 35

Questions 1-2 - 3 - Vos questions v.1a IPv6 Théorie et Pratique & Microsoft IPsec 36

Références IPv6 Théorie et Pratique, Chapitre Sécurité http://livre.point6.net/index.php/s%c3%a9curit%c3%a9 Microsoft IP Security for Windows http://technet.microsoft.com/en-us/network/bb531150.aspx v.1a IPv6 Théorie et Pratique & Microsoft IPsec 37