• No results found

IPSec implementation for SCTP

N/A
N/A
Protected

Academic year: 2022

Share "IPSec implementation for SCTP"

Copied!
41
0
0

Loading.... (view fulltext now)

Full text

(1)

IPSec implementation for SCTP

Aditya Kelkar Alok Sontakke

Srivatsa R.

Dept. of CSE. IIT Bombay

October 31, 2004

(2)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

1 Stream Control Transmission Protocol (SCTP)

2 IPSec

3 SCTP and IPSec

4 Proposed Modifications to IPSec

5 Conclusion and Future Work

(3)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Features and Comparison of SCTP[4] with TCP

Connection Oriented , Unicast Protocol

SCTP Multi-Homing Feature

(4)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Features and Comparison of SCTP[4] with TCP

Connection Oriented , Unicast Protocol SCTP is Message Oriented

SCTP Multi-Streaming Feature SCTP Multi-Homing Feature

(5)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Features and Comparison of SCTP[4] with TCP

Connection Oriented , Unicast Protocol SCTP is Message Oriented

SCTP Multi-Streaming Feature

(6)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Features and Comparison of SCTP[4] with TCP

Connection Oriented , Unicast Protocol SCTP is Message Oriented

SCTP Multi-Streaming Feature SCTP Multi-Homing Feature

(7)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

SCTP Message Format

Header

Source and destination port numbers 32-bit verification tag

32-bit checksum

Length Value

(8)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

SCTP Message Format

Header

Source and destination port numbers 32-bit verification tag

32-bit checksum Data/Control Chunk

Chunk type Flag field Length Value

(9)

Benefits of SCTP

Acknowledged reliable non-duplicated transfer of user data Application-level segmentation to conform to the maximum transmission unit (MTU) size

Sequenced delivery of user datagrams within multiple streams Optional multiplexing of user datagrams into SCTP datagrams Enhanced reliability through support of multihoming at either or both ends of the association

Congestion avoidance and resistance to flooding and

(10)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Applications of SCTP

Telephony Signaling - Loosely correlated messages (different calls) can be delivered without having to maintain overall sequence integrity.

Transfer of Multimedia documents - SCTP allows transport of these components to be partially ordered rather than strictly ordered, and may result in improved user perception of transport.

(11)

Applications of SCTP

Telephony Signaling - Loosely correlated messages (different calls) can be delivered without having to maintain overall sequence integrity.

Transfer of Multimedia documents - SCTP allows transport of these components to be partially ordered rather than strictly ordered, and may result in improved user perception of transport.

(12)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

IPSec [2]

IPSec is a security mechanism in the TCP/IP protocol suite.

IPSec operates between layers 2/3. Security services can be applied to layers 3-7.

Provides following security services

Confidentiality- Sender can encrypt packets, decrypted by only designated receiver.

Integrity- Packets are not altered in transit.

Data origin authentication- Receiver can authenticate the sender.

Anti replay service- Receiver can detect replayed packets and reject them.

Key management- Secure exchange of keys.

(13)

IPSec Architecture

IPSec architecture includes standards for Encapsulating Security Payload (ESP).

Authentication Header (AH).

These two protocols operate in two modes.

Tunnel mode - Applied to the whole packet.

Transport mode - Applied to payload and selected portions of IP header.

(14)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Authentication Header

Authentication Header contains the checksum of fields with a pre-shared key.

Reciever verifies the integrity by recomputing the checksum and comparing it with the checksum in the packet.

(15)

Encapsulating Security Payload

Sender encrypts the packet/payload with a pre-shared key.

Only receiver can decrypt the packet and recover the plaintext.

(16)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Security Policies (SPs)

Specifies security serivces and how they are to be applied to IP traffic.

Policies are selected by matching selectors.

Source/Destination IP address.

Source/Destination ports.

Transport layer protocol.

User ID.

Data sensitivity level.

Bypass, Apply, Drop?

Process by applying bundles of transformation.

(17)

Security Association (SA)

One-way connection between communicating parties.

Parameterized by Destination Address, IPSec protocol and a unique 32-bit integer - SPI.

Established when parties start communicating.

Each bi-directional connection must create atleast two SAs.

Security Association Database (SAD) stores all the parameters associated with an SA.

Sequence Number.

Sequence counter overflow.

Anti reply window.

Authentication Algorithm and Keys (for AH).

(18)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Combining security associations

Security associations can be combined into bundles in two ways.

Transport adjecency.

(19)

Combining security associations

Iterated tunneling

(20)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

IPSec Application - Secure Branch office connectivity

IPSec can be used for secure connection between main office and branch office.

(21)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

SCTP over IPSec [1]

Why current IPSec implementation needs to be modified?

Using SCTP endpoints in selectors - source and destination port numbers

addresses IKE

Address updates of SCTP sessions must be authenticated

(22)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

SCTP over IPSec [1]

Why current IPSec implementation needs to be modified?

Using SCTP endpoints in selectors - source and destination port numbers

Single SA should specify all source-destination address pairs

SPD entries should specify multiple source-destination IP addresses

IKE

Address updates of SCTP sessions must be authenticated

(23)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

SCTP over IPSec [1]

Why current IPSec implementation needs to be modified?

Using SCTP endpoints in selectors - source and destination port numbers

Single SA should specify all source-destination address pairs SPD entries should specify multiple source-destination IP addresses

(24)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

SCTP over IPSec [1]

Why current IPSec implementation needs to be modified?

Using SCTP endpoints in selectors - source and destination port numbers

Single SA should specify all source-destination address pairs SPD entries should specify multiple source-destination IP addresses

IKE

Address updates of SCTP sessions must be authenticated

(25)

SCTP over IPSec [1]

Why current IPSec implementation needs to be modified?

Using SCTP endpoints in selectors - source and destination port numbers

Single SA should specify all source-destination address pairs SPD entries should specify multiple source-destination IP addresses

IKE

Address updates of SCTP sessions must be authenticated

(26)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Data structures for SAD and SPD

Security Policy

Security Association

(27)

Data structures for SAD and SPD

Security Policy

Security Association

(28)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Current organization of these structures

(29)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

IPSec Packet Processing

Input

IP packet to be sent

Refers to SPD for type of processing

Follows SA bundle to apply series of transformations.

Each transformation adds an IPsec header.

Continue till Transport/IP header is encountered

Check from SPD that all reverse transformations have been applied.

(30)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

IPSec Packet Processing

Input

IP packet to be sent

Refers to SPD for type of processing

Follows SA bundle to apply series of transformations.

Each transformation adds an IPsec header.

Output

Find the SA in SAD

Apply reverse transformation

Continue till Transport/IP header is encountered

Check from SPD that all reverse transformations have been applied.

(31)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Proposed Changes

What ?

Incorporate multiple source/destination addresses into data structures.

addresses.

Modify SA and SP. Why ?

Changing address structure causes unwanted changes since is used not just in SAD and SPD.

Multiple SA’s consumes more memory , affects search time , negotiation time.

(32)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Proposed Changes

What ?

Incorporate multiple source/destination addresses into data structures.

Where ?

One SA and SP for each address pair.

Modify the address structure itself to include multiple addresses.

Modify SA and SP.

Why ?

Changing address structure causes unwanted changes since is used not just in SAD and SPD.

Multiple SA’s consumes more memory , affects search time , negotiation time.

(33)

Proposed Changes

What ?

Incorporate multiple source/destination addresses into data structures.

Where ?

One SA and SP for each address pair.

Modify the address structure itself to include multiple addresses.

Modify SA and SP.

Why ?

Changing address structure causes unwanted changes since is used not just in SAD and SPD.

(34)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

How proposed changes will affect the management of the data structures

Functions creating the structures.

Inserting SA’s into hash queues requires multiple insertions in required hash queues.

Matching selectors should incorporate multiple addresses.

(35)

Conclusion

How to extend IPSec support for SCTP.

Methods by which multiple addresses can be negotiated in IPSec have been proposed.

Comparison of these methods.

(36)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Future Work

Extraction of SCTP port numbers to use in selectors for SPD.

Extend key negotiation in IKE[3] to negotiate single SA for multiple addresses.

(37)

References

beamericonarticleS. Bellovin et. al.

Rfc-3554: On the use of stream control transmission protocol (sctp) with ipsec, 2003.

beamericonarticleS. Kent et. al.

Rfc-2401: Security architecture for the internet protocol, 1998.

beamericonarticleD. Harkins.

Rfc-2409: The internet key exchange (ike), 1998.

beamericonarticleR. Stewart.

(38)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Thank you!!!

Thank you!!!

(39)

Table with 5 colours and multicolumn

Course Date Time

Algorithms 23/11/2004 2:30

FSVP 14/11/2004 10:30

Artificial Intelligence 19/11/2004 2:30 Seminar Hooray! no endsem!!

Communication Skills Hooray! endsem over!!

(40)

Overview Stream Control Transmission Protocol (SCTP) IPSec SCTP and IPSec Proposed Modifications to IPSec Conclusion and Future Work

Graph with gnuplot

Equation: esin(

(x+y))

(41)

Simple picture using PGF

References

Related documents

This proposed strategy essentially estimates both the waiting interval when the channel is unusable for data transmission and the continuous transmission interval otherwise,

• Compare latency of file transfer using TCP and SCTP for files of different sizes. • Compare latency in packet-loss environment for varying

Logical Link Control and Adaptation convention (L2CAP) is layered over the Baseband Protocol and lives in the information connection layer.. The convention

This work proposes an energy harvesting adaptive MAC protocol applied for node connectivity and detailed simulation study carried out with the proposed protocol proves

Thus, a bidirectional router for Network-on-chip was designed, which used Channel Direction Control protocol and Wormhole switching. This is much more efficient compared to other

The VSC can be used uniformly to control transmission line voltage, impedance, and angle by providing reactive shunt compensation, series compensation, and

The Dynamic Transmission Range Adjustment Protocol provides a mechanism for adjusting the transmission range of the ad hoc nodes. The nodes are configured to maintain a threshold

We also developed a novel communication protocol - Adaptive Transmission Power Protocol - for Wireless Sensor Networks with the facility of re-configuring the trans- mission power