Enabling end - 2 end security

advertisement
International Telecommunication Union
Enabling end-2-end security
Wolfgang Fritsche
IABG
Workshop on IPv6
Geneva, 22-23 June 2005
Agenda
ITU-T
o IPv6 security - facts & fiction
o IPv6 privacy - facts & fiction
o SEINIT- Deploying IPv6 security
o Summary
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
2
ITU-T
IPv6 securityfacts & fiction
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
3
IPsec
ITU-T
Is IPsec for IPv6 more secure than IPsec for IPv4?
• Clear answer: NO!
o There cannot be a major difference, as
• The IPsec functionality is on the same protocol layer
• The IPsec protocol specification is the same
• The algorithms / cryptography to be used are the same
o
Application Layer
ApplicationLayer
Transport Layer
Transport Layer
IPsec
NetworkLayer
Network Layer
Link Layer
Link Layer
Physical Layer
Physical Layer
DataCommunication
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
4
IPsec ctnd.
ITU-T
o However, IPsec deployment will be easier in IPv6 due to the
disappearance of NAT boxes
• NAT boxes modify IP packets and break therefore the end-to-end
transparency
• This modification also breaks end-to-end IPsec
• Workarounds are complex and costly and often not possible at all
o
data Pri(A) Pub(B)
data Pub(A) Pub(B)
NAT
Company A
Private Address A
© IABG 2005
data Pub(A) Pri(B)
NAT
Internet
Global Addresses
Workshop on IPv6
Geneva, 22-23 June 2005
Company B
Private Address B
5
Cryptographically Generated Addresses
ITU-T
o IPv6 addresses, which carry hashed information about public
key in the identifier part
o Benefits
• Certificate functionality without requiring a key management
infrastructure
• Solution for securing IPv6 Neighbor Discovery (resolve chicken-egg
problem of IPsec)
Cryptographically Generated Address
Subnet prefix (64 bit)
CGA specific ID (64 bit)
Hash of sender public key
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
6
The side benefit of large address space
ITU-T
o IPv6 uses 264 addresses on a link instead of
usually less than 28 for IPv4
o Attacks based on simply scanning a whole
network
•
•
•
would need years for performing it
would thereby consume a massive bandwidth on the scanned link
are therefore no longer appropriate
o However
• one needs to take care about the addressing of server (use of
arbitrary identifiers)
• one needs to secure neighbor discovery messages
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
7
Viruses, worms and spam
ITU-T
o Viruses, worms and spam are today some of
the most annoying penetrations
•
•
•
They infect user equipment
Consume significant network / computation resources
Have a large scale distribution
o Can IPv6 prevent me from that?
• NO, as viruses, worms and spam are an application level problem,
and have to be defended there
• In the same way IPv4 cannot help here
• However, IPv6 could make their fast distribution more complex
(network scanning for vulnerable systems is more complex in IPv6)
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
8
IPv6 security products
ITU-T
o The main security product manufacturer support meanwhile IPv6
for IPsec, firewalling, IDS, …
o However, some of these products are just copies from IPv4 and
don’t reflect IPv6 specifica, e.g.
• Extended use of ICMPv6 requires different firewalling policies
• Reflect the increased use of IP Multicast instead of Broadcast o n local
links
• Make use of IPv6 address aggregation for more effective ingress
filtering
• Discard fragmented packets sourced from / destined to intermediate
systems
• Efficient support of tunneling, which will be intensively used during
IPv6 transition
o Further work is required here
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
9
ITU-T
IPv6 privacy facts & fiction
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
10
Tracability of (mobile) users
ITU-T
o In stateless IPv6 address autoconfiguration identifiers
can be derived from HW (static part in address)
o Does this mean that I‘m trackable (location, sites
visited, …)?
• IPv6 supports also random identifiers for privacy reasons
• These random identifiers are default setting in some operating systems
Subnet prefix (64 bit)
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
Random or static
identifier (64 bit)
11
Disappearance of NATs
ITU-T
o Without NAT boxes my home / company devices will
have public addresses
o Does this mean that I‘m easily reachable from outside
and therefore also more affected by attacks?
•
•
NO, as NAT boxes do not give any security or privacy.
A (host) firewall can effectively shield parts which should not be
reachable from outside.
• Even more, a firewall can provide application layer security, a NAT box
can not
FW
Company A
Public Address A
© IABG 2005
Internet
Global Addresses
Workshop on IPv6
Geneva, 22-23 June 2005
FW
Company B
Public Address B
12
ITU-T
SEINIT
Deploying IPv6 security
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
13
SEINIT overview
ITU-T
o FP6 call-1 project: Security Expert Initiative
o 2 years project: Dec. 2003 – Nov. 2005
o Budget: 8 M€ (3.9 M€ EU contribution)
o 12 Partners
• Thales Communications, Alcatel, BT, T-Systems NOVA, IABG,
ENST, KYOS, THALES (UK), UCL, UMU, WIT, ISOC
o
© IABG 2005
Public deliverables will be made available at:
• www.seinit.org
Workshop on IPv6
Geneva, 22-23 June 2005
14
SEINIT goals
ITU-T
o Key project goals
• Investigate emerging security technologies
• Research on new security models and policies
• Specify security architectures involving
heterogeneous underlying networks
• Develop prototypes of new security
components
• Provide training to users, manufacturer, ISPs,
…
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
15
SEINIT – Heterogenity of …
ITU-T
o Access networks
o Protocols
o Applications
o User devices
o Security policies
o ambience
Bluetooth Ad hoc
IEEE802.11
IPv6
Core Network
GPRS
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
16
SEINIT – principle of virtualization
ITU-T
Virtualisation
© IABG 2005
TCP / UDP
IPv6
WLAN
TCP / UDP
IPv6
DSL
Security Domain A:
Hotel Network
Security Domain B:
Home Network
Workshop on IPv6
Geneva, 22-23 June 2005
TCP / UDP
IPv6
3G
Security Domain C:
Car Network
17
SEINIT - Status
ITU-T
© IABG 2005
o Research
• Many emerging security technologies initially investigated, such
as CGA, PANA, honeypots, …
• Investigations done on security policy handling
• Initial architecture for heterogeneous ambience defined
• IPv6 prototypes for CGA, PANA, honeypot, policy management,
… developed
• Virtualisation approach implemented in middleware
o Demonstration
• First demonstration of middleware done during annual EC
conference November 2004
• Next demonstration scheduled for 28 June 2005 within EC
review
o Contact to DHS
• Contacts established via ISOC to US Department for Homeland
Security
Workshop on IPv6
Geneva, 22-23 June 2005
18
ITU-T
Summary
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
19
Summary
ITU-T
o IPv6 security
• IPsec for IPv6 and IPv4 are equal in security strength, however,
disappearance of NAT will ease deployment
• CGAs are an efficient mean to secure ND on local links
• Network scanning is more difficult with large IPv6 address space
• IPv6 could make the fast distribution of viruses, worms and
spam more difficult
• Available security products need to consider more detailed IPv6
characteristics
o IPv6 privacy
• IPv6 has an efficient mechanism for preventing the tracing of IP
addresses
• Disappearance of NAT won‘t harm privacy and security
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
20
Contact
ITU-T
Wolfgang
Wolfgang Fritsche
Fritsche
Manager
ManagerAdvanced
AdvancedIP
IPServices
Services
Phone:
Phone:+49
+4989
896088-2897
6088-2897
Email:
Email:fritsche@iabg.de
fritsche@iabg.de
© IABG 2005
Workshop on IPv6
Geneva, 22-23 June 2005
21
Download