how to debug ipsec and ike

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

CPUG:THECHECKPOINTUSERGROUPHowtoDebugIKEandIPSEC©AnAbbreviatedGuideByWarrenVerbanecYourHostWarrenVerbanec•UCDavisgraduate•SiliconValleyLocal•TwoyearsinNokia’sProductLineSupportgroup“HelloEverybody!”Goalsfortonight•Eatfreefood•Winraffle•DiscusshowCheckPointimplementsIKEandIPSec•Reviewavailabletroubleshootingtools•ProvidepracticalexamplesFirst,abitofreview…•WhatisIKEandIPSEC(inourcontext)?–Generallyspeaking,IKEisamethodforsecurelyexchangingencryptionciphersthatwillbeusedinalaterencryptedsession–IPSecisanoveralltermusedtodescribeencrypteddatacommunicationoverIP,usingthekeysexchangedwithIKEThisisPartOne•IKEandIPSecisahugetopic.There’snofeasiblewaytocoveritin½ofanhour•Therefore,PartOnewillprovideabasicintroductiontoonlytheconceptsrequiredtoworkwithCheckPointdebugging•PartTwowillprovidehands-onexamplesoftroubleshootingtheapplication•PartTwowillbepresentednextmonthWhat’sthebigdeal?•Thesearecomplexprotocolsratifiedbymultipleinternationalbodies•Lotsofconfigurableparameters•Generallydefinea“framework”forsecurity,whileallowingforadvancesincryptography–MD5collisiondemonstatesneedforexpandability–•Thus,debuggingandconfigurationishardHowdoesencryptionwork?•Init’sbasicform,cryptographyentailstheadditionoftwomessagestomakeanew,unreadablemessage•Message1+KeyMessage=Cipher•IfyouknowtheKeyMessage,youcandecodethecipherbysubtractingtheKeyinformationfromthecipher•Computersaregoodatthis,andcandoitveryquickly-say,onapacketbypacketbasis•Butthismeansthatyouhavetokeepthesecretkeysafe•Thismakestheprocessdifficult-generallyspeaking,ifyoulosethekeytothebadguys,ALLinformationeverencryptedwiththatkeyisnowreadableBasiccryptoapplications•Algorithms:DES,AES,3DES–Usedforactualreversibleencryption–“non-entropic”,reversibleoperations–Requiresaunique“secretkey”fortheencryptoranddecryptor•Hashes:SHA-1,MD5–Usedtogenerateauniquemathematical“summaryvalue”foragivendataset–“Entropic”,non-reversibleoperation–Usedtoauthenticateadataset–Canbecombinedwitha“secretkey”valuetocreateacustomHash-ensuresthatyourhashwascreatedbysomeoneyoutrust.HowdoesSSLdiffer?•SSLisbasedonPKI,whichusespublic/privatekeypairs-usingentirelydifferentmath•Designedtoenablesecuretransferofdata(likeatemporarycryptokey)tosomeoneyoudon’tnecessarilytrust•IKE/IPSecdoesnotusePKI,asitisinherentlylesssafe-anddesignedfore-commerceuse•Actually,PKI-likekeyexchangeisusedinsomelimitedwaysinIKE,butthecoreofIPSecisnotbasedonpublic/privatekeyexchange•AdiscussionofPKIisbeyondthescopeofthispresentation•AgoodPKItutorialis:…•PKIusespublic/privatekeypairs–Anythingencryptedwiththeprivatekeyisreadablewiththepublickey–Anythingencryptedwiththepublickeyisreadablewiththeprivatekey–AnythingencryptedwiththepublickeyisNOTreadablewiththepublickey•ThecoreofIPSecusesasinglekey-anythingencryptedwithitisreadableonlywiththesamekey•Diffie-Hellmankeyexchange,andPKIcertificatesareusedinIKEandIPSec,butinalimitedwaybyCheckPoint•Theextenttowhichpublic/privatekeyexchangeisusedinIPSecwillbediscussedlaterSo,howdoesaHashfitin?•Acryptographichashisusedtoderiveamathematical“summary”valueforasetofdata•Data“hashed”withaparticularalgorithmgeneratesauniqueoutputvalue•Thisvaluehasaone-to-onecorrelationwithit’sdataset-thisensuresthatifadatasetisaltered,it’shashvaluewillchange•ThisisgoodforensuringdataintegrityDiffie-Hellmaniskey!•Remember,theproblemisnotjustencryptingthemessages-it’skeepingyourkeyssafeinthelongterm–ThisisaccomplishedbyrenegotiatingkeysofteninIPSec-thiscompartmentalizestheencryptionanddataexchange–Thismeansthatsecretkeysmustbeexchangedoften•Diffie-Hellmankeyexchangedefineshowtousepublic/privatekeypairstotransportyoursecretkeys•D-Hgroupnumbersdefinethestrengthofthepublic/privatekeyencryptionused-CheckPointjustaddednewGroupsupportinHFA55_10Andnow,IPSec!•TherearethreepartstoIPSec:–AH-authenticationheader-providessessionsecurityata“sophisticated”levelbycheckingdataintegrityandprotectingagainst“replay”attacks–ESP-encapsulatingsecuritypayload-providesthebulkdataencryptionmethod–IKE-handlestheexchangeofsecretkeysusedinthepriortwocategoriesAH•IntheoperationalmodeusedinVPNs,AHwrapsanIPpacket(headerandall)inanencryptionenvelope,thenaddsanewIPheader•ThisprocessisperformedataVPNgateway,andisundoneattheterminatinggatewayattheotherendofthesecure“tunnel”•AHusesIPProtocol51-soit’snotUDPorTCP•AHisnottoorelevanttotheCheckPointworldMoreAH•AHhasseveralfieldsinit’sheader:–SecurityParameterIndexisanumericidentifierthatspecifiesaparticularlogicalconnection•ThisSPIistrackedonthegatewaysalongwiththeencryptionparametersassociatedwithit(hashalgorithm,bulkencryptionalgorithm,otherparameters)–Sequencenumberfieldisusedtotrackindividualpackets•OptionallyusedtoprotectagainstreplayattacksESP•ESPisusedforthebulkencryption–It’sbasicallyanalgorithm-encryptedpacketinsideaPKIsignaturewrapperforauthenticity–ESPusesIPprotocol50forthetransport-thisiswhatyoucommonlyseeinpackettracesoftunneltraffic–HasaSPIfield,likeAH,aswellastheoptionallyutilizedsequencenumberi

1 / 58
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功