Networking, Security & Cloud Knowledge

Saturday, October 25, 2014

Virtual Private Network - VPN

VPN

Security = encryption and integrity

Encryption user keys (aes / 3des)
Integrity uses hash (cisoc support sha and md5)

Hash > encrypt ---------------------- decrypt > hash

Entire security lies in creating and exchanging key.
1.   Create a public shared key and send it to other party, this method is most vulnerable.
2.   Use static key, but static key can be cracked over a period of time.
3.   Use key exchange algorithm
a.   Firewall creates two key DH public key and DH private key.

Public key used for encrypting data and private key for decrypting data.
b.   Public key is exchanged
c.    Authenticate two firewall with each other using pres-hare key.

 Take hash of preshare key

Encrypt is using public key send it to other side

Decrypt it using private key

Take hash on other side and compare the hashes
Generate share secret key

Encrypt it and send it on other side.

Decrypt share –secrete key on other side

Main objective is using key to encrypt / decrypt. The key is exchanged on ISAMMP




***************************


How HTTPs works
1.      Client make tcp connection on destination port 443
2.      Ssl handshake process starts once tcp connection is established
a.      Browser send the CLIENT HELLO message
                                                              i.      It contains information like
1.      Highest version of SSL supported by browser
2.      Compression method that it supports
3.      Suite of cipher it can user for encryption
4.      And random data which can later use when generating symmetric key for session.
b.      Server response with SERVER HELLO
It contains
1.      SSL version used for session
2.      Cipher and compression method that will be used
3.      Session id for ssl session
4.      Random data used for key generation process.
c.       Server then send Digital certificate singed by CA
It serves for two purposes
1.      It contain public key so that browser can use key to encrypt sent to server it can optionally send chain of certificate beginning with certificate of authority that issued the server certificate.
2.      It established the identity of the server from which the web page is coming.
d.      Server sends SERVER HELLO DONE message
e.      Browser respond by sending CERTIFICATE VERIFY message that it has verified the certificate
f.        Browser then sends CHANGE CIPHER SPEC command to server telling it now on data send to server will be encrypted.
g.      After that browser send FINISHED MESSAGE. This contains digest of message exchanged between browser and server till now. This is done to ensure that none of the information exchanged earlier is tampered during transit.
h.      Server responds with CHANGE CIPHER SPEC message hinting browser that now on data send by server will be encrypted.
i.        Server sends FINISHED MESSAGE containing digest of all message between browser and server.
j.        Now we consider SSL handshake to be complete
3.      Browser generate symmetric secret key just to be used for this ssl session. It encrypt generated key using public key of the serve and send it across to the server. This key remains secret with browser and server.

Note: Reason for using symmetric key is encryption and decryption using symmetric key is lighter then asymmetric key. 

**********************
Types of VPN
·         IPSec – operate at network layer (RFC 2401)
o   Site-to-Site / LAN-to-LAN (L2L)
o   Remote access
·         SSL (WebVPN)
·         PPTP (created by Microsoft) – operate in data link layer
·         L2TP – ietf combined pptp and l2f – operate in data link layer
·         L2F (Layer 2 forwarding protocol)  - operate in data link layer

IPSec VPN
IPSec Protocol
·         IPsec is a set of protocols developed by the IETF to support secure exchange of packets at the IP layer.
·         IPsec includes protocols for establishing mutual authentication between peers at the beginning of the session and negotiation of cryptographic keys to be used during the session.
·          IPsec is available for both IPv4 and IPv6 and has been deployed widely to implement Virtual Private Networks (VPNs).
Fig 1 Interrelationship of IPSec core documents

The Architecture document covers the general concepts, security requirements, definitions, and mechanisms defining IPsec technology.
·         The ESP Protocol and AH Protocol documents cover the packet format and general issues regarding the respective protocols.
·         The Encryption Algorithms document is the set of documents describing how various encryption algorithms are used for ESP.
·         The Authentication Algorithm is the set of documents describing how various authentication algorithms are used for both ESP and AH.
·         The DOI document contains values needed for the other documents to relate to each other. This includes for example encryption algorithms, authentication algorithms, and operational parameters.
·         The Key Management Documents are the documents describing the IETF standards-track key management schemes (ISAKMP/Oakley, IKE).

RFC 4301 “the ip security architecture”
-          Defines the original IPsec architecture and elements common to both AH and ESP

IPSec mode:
Transport mode
·         Default IPSec mode
·         Only IP payload is encrypted 
Note:
IP Payload = tcp segments = tcp header + tcp segment data
                   = udp segment
                   = ICMP message
·         Protected through AH / ESP header

Tunnel mode
·         It is more secure and encrypts both the header and the payload.

IPSec Protocol:
AH (Authentication Header)
·         Provide authentication, integrity & anti-reply protection
·         It does not provide confidentiality / no encryption
·         Data is readable but protected from modification
·         AH is identified in the IP header with the IP protocol ID of 51, AH can be used alone or combined with the esp protocol, in this case AH header is inserted before esp.
·         AH is a format protocol defined in RFC 2402

AH in transport mode:
·         AH header is inserted between ip header & ip datagram
·         In Original ip header next header field value is changed to 51
·         In Ah header next protocol text protocol reference to tcp
 

AH in tunnel mode:
·         In tunnel mode the IPv4 datagram is encapsulated into a new IPv4 datagram that includes the AH header.
·         The AH header’s use the value 4 which means IPv4 in its next header.
·         Everything is authenticated except – DSCP, ToS, TTL, Check sum


ESP (Encapsulation security payload)
·         Provides confidentiality + authentication + integrity + anti-reply
·         Protocol ID 50
·         ESP is a format protocol defined in RFC 2406
·         ESP supports the use of symmetric encryption algorithms, including DES, 3DES, and AES, for confidentiality and the use of MD5 HMAC and SHA1 HMAC for data authentication and integrity.

ESP has several fields that are the same as those used in AH, but packages its fields in a very different way. Instead of having just a header, it divides its fields into three components:
1.       ESP Header: This contains two fields, the SPI and Sequence Number, and comes before the encrypted data. Its placement depends on whether ESP is used in transport mode or tunnel mode.
2.       ESP Trailer: This section is placed after the encrypted data. It contains padding that is used to align the encrypted data, through a Padding and Pad Length field. Interestingly, it also contains the Next Header field for ESP.
3.       ESP Authentication Data: This field contains an Integrity Check Value (ICV), computed in a manner similar to how the AH protocol works, for when ESP's optional authentication feature is used.

There are two reasons why these fields are broken into pieces like this.
1.       The first is that some encryption algorithms require the data to be encrypted to have a certain block size, and so padding must appear after the data and not before it. That's why padding appears in the ESP Trailer.
2.       The second is that the ESP Authentication Data appears separately because it is used to authenticate the rest of the encrypted datagram after encryption. This means it cannot appear in the ESP Header or ESP Trailer.


Note:
1.       ESP support digital signature but exclude outer IP header, whereas AH includes IP header thus not support NAT.
2.       ESP & AH is layer 3 protocol thus not supported by PAT-device / Statefull firewall.
3.       PAT issue can be fixed for ESP by using NAT  TRAVERSAL or IPSec over TCP (Cisco proprietary)

How IPSec works
An IPSec tunnel establishment process can be broken down into five main steps:
1.       Tunnel initiation – triggered by interesting traffic, it start IKE process
2.       IKE Phase 1
3.       IKE Phase 2 –negotiate the parameters and key material to established two unidirectional IPSec SAs for incoming and outgoing traffic (2 DATA connection).
4.       Data Transfer
5.       Tunnel termination

ISAKMP identity – used to identify remote peer.
·         By ip address
·         By name (FQDN)
The ISAKMP and IKE protocol define how to establish on IPSec session between two peers. Three connections (1 Management and 2 data connections) make up the session. The connection are built across two phase.
In phase I –
·         Negotiate the parameters and key material required to establish ISAKMP SA (1 management connection).
·         ISAKMP SA is used to protect future IKE exchanges and to set up a secure channel for negotiating IPSec SAs in IKE phase 2.
·          Purpose is to establish secure authenticated communication channel by using the Diffie-Hellman key exchange algorithm to generate a shared secret key to encrypt IKE communication. The authentication can be performed using either pre-share key (shared secret), digital signatures or public key encryption as described by RFS 2409.
IKE phase I operate in either Main Mode or Aggressive mode.
Main mode: Has 3 two-way exchanges between the initiator and the receiver. And it protect the identity of the peer.
·         First exchange: The algorithms and hashes used to secure the IKE communications are agreed upon in matching ISAKMP SAs in each peer.
·         Second exchange: Uses a Diffie-Hellman exchange to generate shared secret keying material used to generate shared secret keys and to pass nonces (In security engineering, a nonce is an arbitrary number used only once in a cryptographic communication.) numbers sent to the other party and then signed and returned to prove their identity.
·         Third exchange: Verifies the other side’s identity (the identity value is an IP address, an FQDN, an email address, a DNS or a KEY ID form in encrypted form). The main outcome of main mode is matching ISAKMP SAs between peers to provide a protected pipe for subsequent protected ISAKMP exchanges between the IKE peers. The ISAKMP SA specifies values for the IKE exchange: the authentication method used, the encryption and hash algorithms, the Diffie-Hellman group used, the lifetime of the ISAKMP SA in seconds or kilobytes, and the shared secret key values for the encryption algorithms. The ISAKMP SA in each peer is bi-directional.

Aggressive mode:
Aggressive Mode has fewer exchanges with fewer packets. On the first exchange, almost everything is squeezed into the proposed ISAKMP SA values: the Diffie-Hellman public key (a nonce that the other party signs) and an identity packet, which can be used to verify identity via a third party. The receiver sends everything back that is needed to complete the exchange. The only thing left is for the initiator to confirm the exchange. The weakness of using the aggressive mode is that both sides have exchanged information before there’s a secure channel. Therefore, it’s possible to sniff the wire and discover who formed the new SA. However, it is faster than main mode
Management connection is encapsulated in UDP port 500
We can choose three authentication methods for phase I
1.       Pre-shared keys
2.       Certificate (RSA signatures)
3.       Cryptographic keys (CRACK) used with mobile / smart phones.
Default policy
Authentication : pre-share
Encryption : 3DES
DH :2
Hash : SHA HMAC
Life time : 1 day (86400 sec)

If NAT is used then IPSec management and data connection are established , but data can’t be  successfully transmitted between two peers.
To use PAT with ESP there are two solutions.
NAT  traversal / NAT transparency / NAT –T
·         It inserts UDP header between IP header and ESP header.
·         UDP PORT 4500
·         Discovery phase takes place during phase I to determine if two peers support NAT. UDP header is inserted based on need , it add 8 bytes of overhead.
·         NAT-T is globally enabled by default
·         It sends keepalives across data connection to ensure NAT / Statefull firewall don’t remove any idea connection . Default period 20 sec (range 10 – 3600 sec)
·         RFC 3947 defines the negotiation during the Internet key exchange (IKE) phase and RFC 3948 defines the UDP encapsulation.
IPSec over TCP
There are two problems with NAT-T
·         It uses UDP, typically has much smaller idle timeout than tcp connections for NAT / Statefull FW.
·         Fixed port 4500
Cisco created proprietary encapsulation method called IPSec over TCP, it insert tcp 20 bytes header between outer IP and ESP header, we can control port (upto 10) by default port 1000 is used. NAT – T / IPSec over TCP are commonly used for remote access connections, where intermediate FW / NAT devices are more likely to be encounter.
Dead Peer Detection (DPD) is used to monitor the peer and quickly detect when it gets unreachable. It works by exchanging probe packets, and if the peer does not answer for some time, the security associations are killed. DPD is documented by RFC 3706.
 XAUTH, Mode config and Hybrid authentication are optional extensions of the IKE phase 1 described in RFC drafts.
 Extended Authentication (XAUTH) provides additional user authentication by prompting the user for a username and password.
 Mode config is used to deliver parameters such as IP address and DNS address to the client.

Hybrid authentication makes the IKE phase 1 asymmetric: the VPN IPsec server authenticates to the IPsec clients by using a certificate, and the client does not authenticate in IKE phase 1. This extension is usually used with XAUTH to provide a high security level.

IKE Phase 2
The purpose of IKE phase 2 is to negotiate IPsec SAs (Data connection) to set up the IPsec tunnel. The data connection is unidirectional (therefore two data connection) are protected with either the AH /ESP. IKE phase 2 performs the following functions:
 •Negotiates IPsec SA parameters protected by an existing ISAKMP SA.
 •Establishes IPsec security associations.
 •Periodically renegotiates IPsec SAs to ensure security.
 •Optionally performs an additional Diffie-Hellman exchange.

IKE phase 2 has one mode called quick mode. Quick mode occurs after IKE has established the secure tunnel in IKE phase 1. It negotiates a shared IPsec policy, derives shared secret keying material used for the IPsec security algorithms, and establishes IPsec SAs. Quick mode exchanges nonces that provide replay protection. The nonces are used to generate new shared secret key material and prevent replay attacks from generating bogus SAs.

Quick mode is also used to renegotiate a new IPsec SA when the IPsec SA lifetime expires. Base quick mode is used to refresh the keying material used to create the shared secret key based on the keying material derived from the Diffie-Hellman exchange in IKE phase 1.

If perfect forward secrecy (PFS) is specified in the IPsec policy, a new Diffie-Hellman exchange is performed with each quick mode, providing keying material that has greater entropy (key material life) and thereby greater resistance to cryptographic attacks. Each Diffie-Hellman exchange requires large exponentiations, thereby increasing CPU use and exacting a performance cost.

When the IPsec SAs terminate, the keys are also discarded. When subsequent IPsec SAs are needed for a flow, IKE performs a new IKE phase 2 and, if necessary, a new IKE phase 1 negotiation. A successful negotiation results in new IPsec SAs and new keys. New IPsec SAs can be established before the existing SAs expire, so that a given flow can continue uninterrupted.

What is PFS?
PFS ensures that the same key will not be generated again, so forces a new diffie-hellman key exchange. This would ensure if a hacker\criminal wants to compromise a private key, he would be able to access data in transit which protected by that key and not any future data, as future data will not be associated with that compromised key.

Both sides of VPN should support PFS in order for PFS to work. Therefore using PFS provides a more secure VPN connection.

Resolution
The crypto map set pfs command sets IPSec to ask for Perfect Forward Secrecy (PFS) when new security associations are requested for this crypto map entry. Alternatively, it asks that IPSec requires PFS when requests are received for new security associations.


To specify that IPSec not request PFS, issue the no crypto map set pfs command. This command is only available for ipsec-isakmp crypto map entries and dynamic crypto map entries.

Note: By default, PFS is not requested.

With PFS, every time a new security association is negotiated, a new Diffie-Hellman exchange occurs, which requires additional processing time.

PFS adds another level of security because if one key is ever cracked by an attacker, only the data sent with that key is compromised. During negotiation, the no crypto map set pfs command causes IPSec to request PFS when new security associations are requested for the crypto map entry.

The default (group1) is sent if the set pfs statement does not specify a group. If the peer initiates the negotiation and the local configuration specifies PFS, the peer must perform a PFS exchange or the negotiation fails.

If the local configuration does not specify a group, a default of group1 is assumed and an offer of either group1 or group2 is accepted. If the local configuration specifies group2, that group must be part of the peer offer or the negotiation fails.

Note: Internet Key Exchange (IKE) negotiations with a remote peer can hang when a PIX Firewall has numerous tunnels that originate from the PIX and terminate on a single remote peer. This problem occurs when PFS is not enabled and the local peer asks for many simultaneous rekey requests. If this problem occurs, the IKE security association does not recover until it has timed out or until the clear [crypto] isakmp sa command is issued to manually clear it. PIX units configured with many tunnels to many peers, or many clients sharing the same tunnel, are not affected by this problem. If the configuration is affected, issue the crypto map mapname seqnum set pfs command to enable PFS.







CISCO ASA Introduction
The Cisco ASA provides advanced stateful  firewall and VPN concentrator functionality in once device, and for some models, integrated services modules such as IPS.

Features supported by ASA.
1.       Stateful firewall.
2.       VPN concentrator.
3.       IPS ( via module)
4.       Multiple security contexts ( similar to virtualized firewalls)
5.       Clustering ( combining multiples firewall into a single firewall)
6.       Layer 2 FW ( transparent mode) or Layer 3 FW (routed mode)
7.       Advanced inspection engines.
8.       VPN (IPsec / SSL / Clientless SSL.

ASA services module with the switch.
You can install the ASASM in the catalyst 6500 and Cisco 7600 series switches with Cisco IOS software on both the switch supervisor and the integrated MSFC.

Firewall Functional Overview.
Inside – Outside – DMZ (demilitarized zone)

Security Policy Overview.
Determines which traffic is allowed to pass through the firewall.

Permitting or Denying  Traffic with Access lists.
·         To limit traffic from inside to outside.
·         To allow traffic from outside to inside.
·         For transparent FW mode, you can apply an EtherType access list to allow non-IP traffic.

Applying NAT
·         Translation for private non routable address.
·         Hides real address.
·         Support overlapping IP address.

Protecting from IP fragments.
·         The ASA provides IP fragment protection. This feature performs full reassembly of all ICMP error messages and virtual reassembly of the remaining IP fragments that are routed through the ASA. Fragments that fail the security check are dropped and logged. Virtual reassembly cannot be disabled.

Using AAA for through traffic
·         You can require authentication and/or authorization for certain types of traffic, for example, for HTTP.The ASA also sends accounting information to a RADIUS or TACACS+ server.

Applying HTTP, HTTPS, or FTP filtering
·         Due to dynamic nature of the Internet configuring and managing web usage using ACL is not practical. ASA can be used in conjunction with separate server running one of the following Internet filtering products.
o   Websense Enterprise
o   Secure computing smartFilter.

Applying Application Inspection.
·         Inspection engines are required for services that embed IP addressing information in the user data packet or that open secondary channels on dynamically assigned ports. These protocols require the ASA to do a deep packet inspection.

Sending traffic to the IPS module.
·         If your model supports the IPS module for intrusion prevention, then you can send traffic to the module for inspection. The IPS module monitors and performs real-time analysis of network traffic by looking for anomalies and misuse based on an extensive, embedded signature library. When the system detects unauthorized activity, it can terminate the specific connection, permanently block the attacking host, log the incident, and send an alert to the device manager. Other legitimate connections continue to operate independently without interruption.

Sending traffic to the content security and control module
·         If your model supports it, the CSC SSM provides protection against viruses, spyware, spam, and other unwanted traffic. It accomplishes this by scanning the FTP, HTTP, POP3, and SMTP traffic that you configure the ASA to send to it.

Applying QoS policies.
·         Some network traffic, such as voice and streaming video, cannot tolerate long latency times. QoS is a network feature that lets you give priority to these types of traffic. QoS refers to the capability of a network to provide better service to selected network traffic.

Applying connection limited and tcp normalization.
·         You can limit TCP and UDP connections and embryonic connections. Limiting the number of connections and embryonic connections protects you from a DoS attack. The ASA uses the embryonic limit to trigger TCP Intercept, which protects inside systems from a DoS attack perpetrated by flooding an interface with TCP SYN packets. An embryonic connection is a connection request that has not finished the necessary handshake between source and destination. TCP normalization is a feature consisting of advanced TCP connection settings designed to drop packets that do not appear normal.

Enabling threat detection
·         You can configure scanning threat detection and basic threat detection, and also how to use statistics to analyze threats. Basic threat detection detects activity that might be related to an attack, such as a DoS attack, and automatically sends a system log message. A typical scanning attack consists of a host that tests the accessibility of every IP address in a subnet (by scanning through many hosts in the subnet or sweeping through many ports in a host or subnet). The scanning threat detection feature determines when a host is performing a scan. Unlike IPS scan detection that is based on traffic signatures, the ASA scanning threat detection feature maintains an extensive database that contains host statistics that can be analyzed for scanning activity. The host database tracks suspicious activity such as connections with no return activity, access of closed service ports, vulnerable TCP behaviors such as non-random IPID, and many more behaviors. You can configure the ASA to send system log messages about an attacker or you can automatically shun the host.

Enabling the Botnet traffic filtere
·         Malware is malicious software that is installed on an unknowing host. Malware that attempts network activity such as sending private data (passwords, credit card numbers, key strokes, or proprietary data) can be detected by the Botnet Traffic Filter when the malware starts a connection to a known bad IP address. The Botnet Traffic Filter checks incoming and outgoing connections against a dynamic database of known bad domain names and IP addresses (the blacklist), and then logs any suspicious activity. When you see syslog messages about the malware activity, you can take steps to isolate and disinfect the host.



Configuring Cisco Unified Communications
·         The Cisco ASA 5500 series is a strategic platform to provide proxy functions for unified communications deployments. The purpose of a proxy is to terminate and reoriginate connections between a client and server. The proxy delivers a range of security functions such as traffic inspection, protocol conformance, and policy control to ensure security for the internal network. An increasingly popular function of a proxy is to terminate encrypted connections in order to apply security policies while maintaining confidentiality of connections.



No comments:

Post a Comment

Note: Only a member of this blog may post a comment.