IPSec Internet
Protocol Security (IPSec) ver 4
از اين سرويس براي حفاظت كردن Network Traffic از حمله افراد مزاحم و هكرها استفاده مي شود اين
سرويس در لايه 3 شبكه فعال مي باشد
توسط اين روش يك IP Packet را مي توان
به دو روش كه در شكل مشاهده مي كنيد Encrypt ويا Sign كرد
در روش AH كه در زير
مشاهده مي كنيد يك Packet به طور كامل Sign
مي شود يعني كل
آن به صورت Unmodify يا غيره
قابل تغيير مي شود
در اين روش يك Packet را مي توان
خواند ولي تغيير نمي توان داد در روش دوم ESP يك Packet
را
سيستم بوسيله يك سري الگوريتم كد
مي كند كه با
اين الگوريتم ها آشنا خواهيد شد
فرق اين روش با روش AH در اين هست كه در روش دوم سيستم كاري با IP Header ندارد
البته شما مي توانيد از هر دو روش
نيز در يك لحظه براي شبكه استفاده كنيد
كه بهترين راه نيز همين مي باشد
و امنيت شبكه بسيار بالا مي رود
IPSec security protocols
قبل از شروع بايد دو Protocol مهم كه
اين سرويس از آنها براي محافظت از Packet
هاي IP استفاده مي كند را معرفي كرد AH and ESP
Authentication Header (AH)
اين روش براي محافظت از يك Packet مي باشد
كه هم از قسمت Header و هم بقيه قسمتهاي يك
packet
محافظت مي كند به اين ترتيب كه كل آن Packet را Sign مي كند
يعني غيره قابل تغيير
در اين روش مي توان يك Packet
را Read كرد ولي امكان Write
را نداريم چون در حالت
unmodify مي باشد
لازم بذكر هست كه براي تغييردادن مسيريك Packet
بايدHeader آن را تغيير
داد وچون اين روش از اين كار جلوگيري مي كند يعني
اجازه Write شدن به Header
را نمي دهد
امكان داردايجاد مشكل كند اين مشكل درRouter ها به چشم
مي آيد چون كار يكRouter تغير دادن
مسيرمقصد
يك Packet مي باشد
كه براي اين كار بايد Header يك Packet را دستكاري كند Authentication Header (AH)
براي رفع اين مشكل Router ها راه حلي پيدا كرده اند سرويسي به نام ICV وجود دارد
كه تغييرات Packet
در بين مسير را Check
مي كند كه تغييري نكند فيلدهايي كه در داخل Header توسط Router تغيير مي كند براي اين سرويس ارزش صفر دارند بنابراين
AH دچار مشكل
با Router ها
نمي شود
Encapsulating Security Payload (ESP)
اين سرويس براي كد كردن يك Packet استفاده مي شود منظور از كد كردن همان Encrypt
كردن آن مي باشداين كدكردن توسط
يك سري الگوريتم هاي رياضي مي باشدكه MD5 and 3DES
از معروف ترين اين الگوريتم ها مي باشند البته مانند
شكل كه مشاهده مي كنيد اين نوع قسمتي از
Packet
را Sign مي كند البته زماني كه يك Packet
در حالت Tunnel
ساخته شود و فرستاده
شود اين قسمت ازPacket
توسط اين Protocol
به صورت Sign مي شود همان طور كه در شكل
مي بينيد اين روش به IP
Header كاري ندارد
Encapsulating Security
Payload (ESP)
درزير تركيب اين دو روش را مي بينيد
Packet
signature and encryption
The IP header is not signed and is not necessarily
protected from modification.
To provide data integrity
and authentication for the IP header, use ESP and AH.
در زير انواع الگوريتم هاي موجود
را با شرح مشاهده مي كنيد
The encryption algorithm:
DES, 3DES, 40bitDES.
DES
Used when the high security and overhead of 3DES are not
necessary.
3DES
Used when high security is required. 3DES processes each
block three times, using a unique 56-bit key each time:
Encryption on the block with key 1
Decryption on the block with key 2
Encryption on the block with key 3
This process is reversed if the computer is decrypting a
packet.
The integrity algorithm: MD5 or SHA.
MD5
Message Digest 5 (MD5) is based on RFC 1321. It was
developed in response to a weakness found in MD4. MD5 completes four passes
over the data blocks (MD4 completed three passes), using a different numeric
constant for each word in the message on each pass. The number of 32-bit
constants used during the MD5 computation equates to 64, ultimately producing a
128-bit hash that is used for the integrity check. While MD5 is more resource
intensive, it provides stronger integrity than MD4.
SHA1
Secure Hash Algorithm 1 (SHA1) was developed by the
National Institute of Standards and Technology as described in Federal
Information Processing Standard (FIPS) PUB 180-1. The SHA process is closely
modeled after MD5. The SHA1 computation results in a 160-bit hash that is used
for the integrity check. Because longer hash lengths provide greater security,
SHA is stronger than MD5.
IPSec Policy Agent
در سيستم سرويسي به نام IPSec Policy Agent وجود دارد
كه اين سرويس وظيفه اش اين است كه جستجو كند كه آيا يك Policy از نوع
IPSEC به صورت
Locally تعريف شده
يا خير درغيره اين صورت اگر سيستم عضو يك Domain
باشد درADS به دنبال آن مي گردد تا اگر بر روي سيستم هاي عضو Domain
يك Policy اعمال شده آن را پيدا كرده و بر روي سيستم اعمال
كند
دراين ميان IPSEC Policy
Agant مامور است كه سيستم را از بودن يك Policy در Domain
مطلع كند و ISAKMP/Oakley
نيز وظيفه اش ساختن كليد
بر اساس الگوريتم هاي تعريف شده مي باشد و IPSEC Driver نيز اجرا
كنند اين سرويس مي باشد اگر Policy
وجود نداشته باشند اين سرويس فعال نمي شود
IPSec security negotiation
يك سيستم مي تواند چند كليد ارتباطي
تعريف كند و براي ارتباط با هر سيستمي از يكي از آنها استفاده كند البته سرويسي به
نام ISAKMP
اين وظيفه را برعهده دارد تا بين Policy و Key
هاي مد نظر هماهنگي ايجاد كند يك سرور مانند RAS چون با
تعداد زيادي سيستم ارتباط برقرارمي كند
بايد براي امنيت بالا با هر يك از اين سيستم ها
يك كليد مجزا بسازد به همين دليل نقش اين سرويس خيلي مهم مي باشد در ارتباط ميان سيستم
ها
ternet Security Association and Key Management
Protocol ISAKMP
اين سرويس ارتباطي بين دو سيستم
بوجود مي آورد در اين ارتباط كه به صورت Encrypt شده مي
باشد هر دو سيستم براي مشخص كردن يك كليد و يك الگوريتم
با هم هماهنك مي شوند در اين ميان
هست كه مشخص مي شود كه دو سيستم چگونه Key
هاي هم ديگر را بعد از هر ارتباط تغيير مي دهند يا حتي الگوريتم ها
نيز
مي توان تنظيم كرد كه تغيير كند در مدت زمان مشخص
يا مقدار kbyte كه Send or receiveشده اين كار بسيار زياد تاثير دارد در امنيت شبكه و ارتباطات
در زير سه گزينه مي بينيد كه براي اين سرويس مهم
مي باشد در انتخاب آنها براي برقراري ارتباط .اين سرويس از هر سه اين گزينه ها استفاده
مي كند
The encryption algorithm: DES, 3DES, 40bitDES, or none.
The integrity algorithm: MD5 or SHA.
The authentication method: Public Key Certificate,
preshared key, or Kerberos V5 (the Windows 2000 default).
Public Key Certificate
مي توان براي برقراي سيستم ها از يك Certificate استفاده كرد
براي اطلاعات بيشتر در HELP اين كلمه را جستجو كنيد
preshared key
اما Preshared Key
يك نشانه رمز يا يك اسم رمز مي باشد كه سيستم ها توسط آن مي توانند
طرف خود را شناسايي كنند يعني سيستم از ميان سيستم هاي شبكه
فقط جواب سيستمي را مي دهد كه Preshared key آن با خود يكي باشد يا بهتر هست بگوييم سيستم به
دنبال سيستم كسي مي گردد كه اين Key را داشته باشد
و اين KEY
يك TEXT بيشتر نمي باشد
لازم بذكر است كه اين سرويس براي كد كردن كليدها
Key و اطلاعات
يك Packet از الگوريتم
هاي بالا استفاده مي كند گزينه يك و دوم
درزير مراحل كاري ارتباط IPSEC
را مشاهده مي كنيد اين مراحل بر اساس شكل بالا مي باشد
For simplicity, this example illustrates IPSec from a
domain computer to a domain computer. Alice, using an application on Computer
A, sends a message to Bob.
The IPSec driver on Computer A checks the IP Filter List
in the active policy for a match with the address or traffic type of the
outbound packets.
The IPSec driver notifies ISAKMP to begin security
negotiations with Computer B.
The ISAKMP service on Computer B receives a request for security
negotiations.
The two computers perform a key exchange, establish an
ISAKMP SA and a shared, secret key.
The two computers negotiate the level of security for the
data transmission, establishing a pair of IPSec SAs and keys for securing the
IP packets.
Using the outbound IPSec SA and key, the IPSec driver on
Computer A signs the packets for integrity, and encrypts the packets if
confidentiality has been negotiated.
The IPSec driver on Computer A transfers the packets to
the appropriate connection type for transmission to Computer B.
Computer B receives the secured packets and transfers them
to the IPSec driver.
Using the inbound SA and key, the IPSec driver on Computer
B checks the integrity signature and decrypts the packets, if necessary.
The IPSec driver on Computer B transfers the decrypted
packets to the TCP/IP driver, which transfers them to the receiving application.
Virtual Private Networking with IPSec
The entire process of
encapsulation, routing, and de-encapsulation is called tunneling. Tunneling
hides, or encapsulates, the original packet inside a new packet. This new
packet may have new addressing and routing information, which enables the new
packet to travel through networks. When tunneling is combined with privacy, the
original packet data (as well as the original source and destination) is not
revealed to those listening to traffic in the network. The network could be any
internetwork: a private intranet, or the Internet. Once the encapsulated
packets reach their destination, the encapsulation header is removed and the
original packet header is used to route the packet to its final destination.
The tunnel itself is the logical data path through which
the encapsulated packets travel. To the original source and destination peer,
the tunnel is usually transparent and appears as just another point-to-point
connection in the network path. The peers are unaware of any routers, switches,
proxy servers, or other security gateways between the tunnel’s beginning point
and the tunnel’s end point. When tunneling is combined with privacy, it can be
used to provide Virtual Private Networks (VPN).
In Windows 2000, two types of tunneling are provided that
use IPSec:
Layer 2 Tunneling Protocol (L2TP/IPSec), in which L2TP provides
encapsulation and tunnel management for any type of network traffic and IPSec
in transport mode provides the security for the L2TP tunnel packets.
IPSec in tunnel mode, in which IPSec itself does the
encapsulation for IP traffic only.
Before using either type of tunneling, a complete
understanding of the functionality should be obtained. For more information,
see "Virtual Private Networking and IPSec" in the Windows 2000
Resource Kit.
The encapsulated packets travel through the network inside
the tunnel. (In this example, the network is the Internet.) The gateway may be
an edge gateway which stands between the outside Internet world and the private
network--a router, firewall, proxy server, or other security gateway. Also, two
gateways may be used inside the private network to protect traffic across less
trusted parts of the network.
L2TP and IPSec
IPSec and L2TP are combined to provide both tunneling and
security for IP, IPX and other protocol packets across any IP network. IPSec
can also perform tunneling without L2TP, but it is only recommended for
interoperability, when one of the gateways does not support L2TP or PPTP.
L2TP encapsulates original packets inside a PPP frame,
performing compression when possible and then inside a UDP-type packet assigned
to port 1701. Since the UDP packet format is an IP packet, L2TP automatically
uses IPSec to secure the tunnel, based on the security settings in the user
configuration of the L2TP tunnel. The IPSec Internet Key Exchange (IKE)
protocol negotiates security for the L2TP tunnel using certificate-based
authentication by default. This authentication uses computer certificates, not
user certificates, to verify that both source and destination computers trust
each other. If IPSec transport security is successfully established, then L2TP
negotiates the tunnel, including compression and user authentication options
and performs access control based on the user identity. Thus, L2TP/IPSec is the
easiest, most flexible, most interoperable and more secure tunneling option for
both client remote access VPN and gateway-to-gateway VPN tunnels.
Configuration for L2TP/IPSec VPN remote access clients is
performed using Network and Dial-up Connections. Configuration for the VPN
remote access server and for gateway-to-gateway tunnels is performed using the
Routing and Remote Access console.
The original packet header, shown here as the IP or IPX
header, carries the original and ultimate source and destination addresses
(addresses used on the private network), and the outer IP header, shown as New
IP Header contains the source and destination addresses of the tunnel end
points (addresses used in the public network). The L2TP header carries tunnel
control information. The PPP header identifies the protocol of the original
packet, for example IP or IPX. For more information on L2TP/IPSec, see Network
and Dial-up Connections in Windows 2000 Server Help.
IPSec Tunneling
The primary reason for using IPSec tunnel mode is for
interoperability with other routers, gateways, or end-systems which do not
support L2TP/IPSec or PPTP VPN tunneling technology. IPSec tunnel mode is
supported only in gateway-to-gateway tunneling scenarios and for certain
server-to-server or server-to-gateway configurations as an advanced feature.
The Windows 2000 Resource Kit chapter on IPSec describes these scenarios and
configurations in more detail and should be understood before using IPSec
tunnel mode. IPSec tunnel mode is not supported for client remote access VPN
scenarios. L2TP/IPSec or PPTP should be used for client remote access VPN.
The two formats of IPSec packets can be used also in
tunnel mode:
ESP Tunnel Mode
The original IP header (which is the original packet
header) usually carries the ultimate source and destination addresses, while
the outer IP header usually contains the source and destination address of
security gateways. The ESP tunnel format always provides strong integrity and
authenticity for traffic carried inside the tunnel. The ESP tunnel is used
mainly to provide privacy for the tunneled packets using DES or 3DES
encryption. The level of encryption is specified in the Filter Action of the
tunnel rule, and thus could also be configured for no encryption if the contents
of the tunnel traffic does not require privacy.
In the preceding illustration, the original packet between
the ultimate source and destination is encapsulated by the new IP and ESP
headers. The Signed area indicates where the packet has been protected with
integrity. The Encrypted area indicates that the entire original packet may be
encrypted.
The information in the new IP header is used to route the
packet from origin to the tunnel destination end point; usually a security
gateway. The new IP ESP header is not protected by the integrity hash. This is
the IETF RFC design to allow the packet header to be modified by network
components as necessary to provide additional services, such as changing the
source or destination IP address, or giving it higher priority over other
packets.
AH Tunnel Mode
AH tunnel mode does not provide encryption privacy for the
contents of the tunnel, only strong integrity and authenticity.
The entire packet is signed for integrity, including the
new tunnel header. Thus, no change in the source or destination address can be
made once the packet is sent by the source of the tunnel. The IETF RFC design
still allows for a few fields in the new IP header to be modified by network
components to provide priority for certain packets, and to delete stray or old
packets. ESP and AH can be combined to provide tunneling, which includes both
integrity for the entire packet and confidentiality for the original IP packet.
IPSec tunnels provide security for "IP only"
traffic. The tunnel is configured to protect traffic either between two IP
addresses or between two IP subnets. If the tunnel is used between two hosts
instead of between two gateways, the outer IP address is the same as the inner
IP address. In Windows 2000, IPSec does not support protocol-specific,
port-specific, or application-specific tunnels. Configuration is performed
using the IPSec Policy console by specifying a security rule containing a
filter to describe the traffic that goes into the tunnel, a filter action for
securing the tunnel and an authentication method to be used by the tunnel end
points. Three types of authentication are supported: certificates, pre-shared
key, and Kerberos.
IPSec policy planning
اولين موردي كه قبل از راه اندازي يك Policy بر روي
يك Domain بايد به
صورت يك Document داشت هدف ما از راه اندازي يك Policy
بر روي شبكه مي باشد مابايد بدانيم كه اين سرويس جه مشكلاتي را با
چه امكاناتي حل مي كند و چه مشكلاتي ممكن هست بوجود آورد پس هدف مهم مي باشد يك مثال
اين سرويس كاري مي تواند بكند كه هيچ سيستم Prewindows
2000 در شبكه نتواند با سرورها ارتباط برقرار كند منظور
سيستم هاي WIN95 and WIN98 مي باشد پس اگر در شبكه ما سيستم هاي بالا كه اين سرويس را پشتيباني نمي
كنند موجود باشد راه اندازي آن ما را دچار مشكل خواهد كرد مگر آنكه ما اين سيستم ها
را جز، شبكه داراي Security قرارندهيم كه اين خود معني اش يك شبكه با Risk
بالا مي باشد در نتيجه شبكه ما كامل داراي Security نمي باشد
و سيستم هاي ما از خطر هكرها در امان نخواهد ماند همين طور سرورهاي ما در شبكه. پس
ما Zone هاي از كامپيوتر ها را مي توانيم IPSEC اعمال كنيم
كه فقط از WIN 2000 استفاده مي كنند لازم بذكر هست كه WIN XP
نيز بايد اين سرويس را ازسرورهاي WIN 2003 SERVER
بگيرد
Establishing an IPSec security plan
شما بايد يكي از سه حالت زير را
در نظر داشته باشيد اول Minimal securityآنكه شما در شبكه اطلاعات مهمي كه حساس باشند نداريد پس لزومي براي ايجاد IPSEC نداريد دوم شما
در شبكه امكان دارد اطلاعات مهمي داشته باشيد در
اين حالت شما مي توانيد ((Client (Respond Only) and Server (Request Security).را
در نظر بگيريد در حالت سوم شما داراي شبكه اي با اطلاعات كاملا محرمانه مي باشيد و
بايد از حداكثر Security برخوردار باشيد كه Secure Server Require
Security
نوع IPSEC Policy
شما مي باشد البته نوع چهارمي وجود دارد كه Administrators مي توانند
آن را دستي ايجاد كنند
انواع اين Level
هاي Policy را در زير مشاهده مي كنيد
Client (Respond Only)
This is used for computers which should not secure
communications most of the time. For example, intranet clients may not require
IPSec, except when requested by another computer. This policy enables the computer
on which it is active to respond appropriately to requests for secured
communications. The policy contains a default response rule, which enables
negotiation with computers requesting IPSec. Only the requested protocol and
port traffic for the communication is secured.
Server (Request Security)
This is used for computers which should secure
communications most of the time. An example would be servers which transmit
sensitive data. In this policy, the computer accepts unsecured traffic, but
always attempts to secure additional communications by requesting security from
the original sender. This policy allows the entire communication to be
unsecured if the other computer is not IPSec-enabled.
Secure Server (Require Security)
This is used for computers which always require secure
communications. An example would be a server which transmits highly sensitive
data, or a security gateway which protects the intranet from the outside. This
policy rejects unsecured incoming communications, and outgoing traffic is
always secured. Unsecured communication will not be allowed, even if a peer is
not IPSec-enabled.
در حالت اول Respond Only
سيستم ها اگر IPSEC را پشتيباني كنند جواب Packet
هارا به صورت Secureمي دهند در غيره اين صورت عادي عمل مي كنند اين حالت با حالت دومي سازگاري
دارد درحالت دومRequest Security سيستم ها اول سعي دارند از طريقSecure
با هم ارتباط برقرار كنند ولي اگر Packet
از طرف سيستمي آمد كه Secure نشده بود سيستم ها آن را قبول مي كنند و جواب مي
دهد
در حالت سوم Require
Security كليه Packet ها incoming و outcoming از طريق
Secure فرستاده مي شوند ودر اين حالت Max Security
در شبكه اعمال مي شود ولي سيستم هاي PREWindows 2000 نمي توانند
در اين شبكه نقشي داشته باشند
Assign IPSec policy
Assessing the risk and determining the appropriate level
of security for your organization.
شما بايد تشخيص بدهيد كه نوع Policy
كه در شبكه اعمال كرده ايد چه مقدار Risk امنيتي
دارد
Identifying valuable information.
شما بايد سيستم هاي كه در شبكه داراي اطلاعات
باارزش مي باشند را پيدا كنيد و اين سيستم
ها را داراي Security كنيد
Defining security policies that use your risk management
criteria and protect the identified information.
بررسي سيستم ارداري و اجرا اين Policy بر اساس
ضوابط اداري
Determining how the policies can best be implemented
within the existing organization.
تشخيص اين كه آيا اين Policy
بهترين ابزار يا بهترين راه براي اعمال Security مي باشد
يا خير
Ensuring that management and technology requirements are
in place.
تشخيص اين كه آيا اين Policy
را در اين مكان مشخص شده
نياز مي باشد يا خير
Special IPSec considerations
Windows 2000 Encryption Requirements
شما بايد حداقل از يكي از الگوريتم هاي كد كردن اطلاعات استفادع كنيد كه
بهترين آنها 3DES مي باشد در زمان برقراري دو سيستم بايد آنها داراي يكي از الگوريتم
هاي مانند MD5 and 3DES
باشند كه اطلاعات بر اساس اين مدل ها كد بندي شود و از طريق اين موارد
Traffic شبكه Secure مي شود
Authentication
شناسايي افراد با Account
در شبكه بايد با سرويس Kerberos V5 انجام شود
IP Filter Lists
شما مي توانيد توسط اين گزينه يك نوع فيلتر بوجو
آوريد كه در شبكه مهم مي باشد شما مي توانيد تعريف كنيد كه با كدامRange IP مي خواهيد
Traffic Secure
داشته باشيد البته نوع الگوريتم هاو نيز نوع تعاريف
IP Filter شما مي
تواند تايين كننده ميزان بار كاري بر روي شبكه باشد شما در اين قسمت با معرفي اين IP ها
به آنها چند حالت مي دهيد كه اولي Block
مي باشد يعني بستن ارتباط Secure
دوم Permit مي باشد كه مشخص مي باشد براي اطلاعات بيشتر به قسمت
Filter actions رجوع كنيد
همان گونه كه در شكل A1 مي بينيد
مي توان Traffic از نوع ICMP را Filter كرد ودر قسمتA2 مي بينيد كه مي توان در اين فيلتر تعريف كرد كه چه سيستم هاي
با ما در ارتباط باشند در اين قسمت از گزينه هاي
My IP Address
, Any IP Address , A Specific IP Address , A Specific IP Subnet
كه توسط اين گزينه ها مي توان محدوده فيلتر را مشخص
كرد براي Source Address و Destination Address
Security Gateways
ترافيك Secure در شيكه دچار مشكلاتي در gateway,
firewall, proxy server, router ها مي شود
براي رفع مشكل بايد IP Filter هاي زير را اعمال
كرد لازم است كه حتما اين Port ها در Device هاي كه
گفته شد باز باشند تا IPSec Traffic امكان عبور
از آنها را داشته باشند
Input Filters
IP Protocol ID of 51 (0x33) for inbound IPSec
Authentication Header traffic.
IP Protocol ID of 50 (0x32) for inbound IPSec
Encapsulating Security Protocol traffic. UDP port 500 (0x1F4) for inbound
ISAKMP/Oakley negotiation traffic.
Output Filters
IP Protocol ID of 51 (0x33) for outbound IPSec
Authentication Header traffic.
IP Protocol ID of 50 (0x32) for outbound IPSec
Encapsulating Security Protocol traffic. UDP port 500 (0x1F4) for outbound
ISAKMP/Oakley negotiation traffic.
در شبكه سرورهاي DHCP,
DNS, and WINS services; Domain Controllers نير بايد داراي يك سري IP Filter
باشند كه براي مثال
سرور dns را شرح مي دهيم تذكر dns
از Port 53 استفاده مي كند لازم بذكر است كه بايد فيلتر از نوع Permit باشد
Set the IP filter list to exempt traffic between the
computer and the DNS server from requiring IPSec:
Set the Source address to My IP address.
Set the Destination address to the IP address of your DNS
server.
Enable Mirrored to automatically create the inbound filter.
Configure the protocol settings, From this Port and To
this Port, to the port which your DNS server has been configured to use for
traffic. It is generally port 53.
Set the filter action to Permit, to ensure that DNS
traffic passes through and security is never negotiated for traffic which
matches this IP filter list.
براي پيدا كردن Port
هاي معروف مي توانيد در آدرس زير پيدا كنيد
%winroot%\system32\drivers\
etc\services or RFC 1700.
Description of an IPSec policy
IPSec policy properties
دو نوع IPSEC POLICY
وجود دارد اولي به صورت Locally وجود دارد
كه در Registry يك سيستم تعريف شده و نگهداري مي شود دوم
اين Policy
در يك ADS يا همان Active Directory
مي باشد كه حالت دوم داراي كاربرد بيشتري مي باشد
لازم بذكر هست كه Rule
هاي تعريف شده در IPSEC Policy
سرورهاي DNS,WINS,DHCP,SNMP,RRAS
باهم متفاوت مي باشد
Rules
يك Rule
مقررميكند كه چگونه و چه وقت ارتباط سيستم ها Secure باشد كه
شامل موارد زير مي باشد
IP filter lists
براي برقراري ارتباط بين سيستم ها بايد يك IP Filter
حداقل وجود داشته باشد همان طور كه در شكل A1,A2 مشاهده
كرديد مي توان اين فيلتر را بر روي سيستم
ها ونيز Protocol
هاي آنها نيز اعمال كرد كه بسيار مهم مي باشد
در زير مي توانيد فيلترهاي لازم براي برقراري سيستم
A با سيستم
B را مشاهده
كنيد
For example, if Computer A wants to securely exchange data
with Computer B:
The active IPSec policy
on Computer A must have a filter for any outbound packets to Computer B.
Source=A and Destination=B.
The active IPSec policy
on Computer A must have a filter for any inbound packets from Computer B.
Source=B and Destination=A.
Each peer must also have the reverse filter:
The active IPSec policy
on Computer B must have a filter for any inbound packets coming from Computer
A. Source=A and Destination=B.
The active IPSec policy
on Computer B must have a filter for any outbound packets to Computer A.
Source=B and Destination=A.
براي هر يك از Inbound AND Outbound بايد يك
Filter جدا تعريف
كرد لازم بذكر است كه كليه Port هاي سيستم را مي توان در بر گرفت يا اينكه يك
Port را استفاده كرد براي مثلا عبور Traffic ICMP يا IGMP
در مثال زير مي توانيد يك IP Filter را مشاهده
كنيد در اينجا براي برقراري يك Host با يك سري
از Host هاي شبكه
از IP Base و Mask آن استفاده شده
Source address
IP BASE=192.168.1.16 MASK= 255.255.255.240 ==NETWORK==> 192.168.1.16 .. .. .. .. 192.168.1.31
Destination address
IP
BASE=192.168.1.230 MASK=255.255.255.255
در اين قسمت شما مي توانيد نوع Protocol خود را
تعريف كنيد كه در اين جا از TCP استفاده شده و Port 1800
در بالا شما گزينه Mirrored را انتخاب مي كنيد براي اينكه اين فيلتر هم در آدرس
مبدا و هم در آدرس مقصد چك شود و از اين قانون پيروي كند
بااين كار هر دو آدرس با Port
1800 خود به ديگر سيستم ها Attach مي كند
براي ارتباط بر قرار كردن
From this port:1800
To any port
Filter settings
Each filter defines a particular subset of inbound or
outbound network traffic which should be secured. You must have a filter to
cover any traffic to which the associated rule applies. A filter contains the
following settings:
The source and destination address of the IP packet. This
may be configured at a granular level, using a single IP address or DNS name,
or groups of addresses, subnets, or networks.
The protocol over which the packet is being transferred.
This automatically defaults to cover all protocols in the TCP/IP protocol
suite. However, it can be configured to an individual protocol level to meet
special requirements, including custom protocols.
The source and destination port of the protocol for TCP
and UDP. By default, all ports are covered, but this can be configured to apply
to only a specific port.
Filter actions
يك فيلتر چندين حالت مي تواند داشته باشد كه در
زير آنها را بررسي مي كنيم
Permit
در زماني كه يك فيلتر در اين حالت باشد اجازه عبور
Traffic Secure را نمي
دهد تذكر Broadcasting Packet نبايد داراي Traffic Secure
باشند
Block
سيستم هايي در شبكه كه اجازه ارتباط را ندارند اين
نوع فيلتر بر روي آنها اعمال مي شوند
Accept unsecured communication but always respond using
IPSec
در زماني كه يك سيستم در اين حالت فيلتري دارا باشد
رفتارآن سيستم درمقابل سيستم هايي كه IPsec
را پشتيباني نمي كنند بدين صورت است كه اگر جواب Secure
نباشد آن را قبول مي كند واگر Secure باشد نيز
آن را قبول مي كند در اين حالت سيستم با هر دو نوع سازگاري دارد البته توصيه نمي شود
اين نوع فيلتر چون Risk
بالاي آن در شبكه خطر ناك مي باشد
Enable Session Key Perfect Forward Secrecy PFS
در يك فيلتر مي توان تعريف كرد كه هر Session ارتباطي
بين دوسيستم با يك Key مخصوص كد شود اين كار بسيار مفيد مي باشد چون ارتباط ميان دو سيستم
به طور دائم داراي Key
Code هاي متغير مي باشد
Specify security requirements
نوع آخر همان ارتباط و Negotiation از نوع Secure
مي باشد كه تركيب آن با PFS
مي تواند Maximum Security
در يك Filter را ايجاد كند
در اين حالت تمامي سيستم ها بايد بتوانند ترافيك
Secure را پشتيباني
كنند
در بالا حالت Require
Security مد نظر
مي باشد
IPSec security methods
سه نوع Method براي Secure كردن وجود
دارد High=ESP Protocol و Medium=AH Protocol
نوع سومي وجود دارد كه تركيب اين دو نوع مي باشد
در مورد اين دو Method كاملا در قسمت Understanding Internet
Protocol Security توضيح
داده شده اند در اين ميان بهتر است كه Key Lifetimes يا همان
PFS را در هر
دوي اين Method ها در نظر بگيريد براي بالا بردن Security
در شكل بالا Properties
نوع سوم كه تركيبي از هر دو نوع مي باشد را مي بينيد
Security Protocols
Both AH and ESP may be enabled in a custom security
method, if you require IP header integrity and data encryption. If you chose to
enable both, you do not need to specify a second integrity algorithm for ESP;
the algorithm you select for AH will provide integrity.
Integrity
Message Digest 5 (MD5), which produces a 128-bit key.
Secure Hash Algorithm (SHA), which results in a 160-bit
key. Longer key lengths provide greater security, so SHA would be considered
stronger.
Confidentiality
3DES
is the most secure of the DES combinations, and somewhat slower in performance.
3DES processes each block three times, using a unique key each time.
DES is to be used when the high security and overhead of
3DES is not necessary, or for interoperability. DES uses only 56 bits of keying
material.
IPSec authentication
Kerberos V5
اولين راه براي شناسايي افرا همان Kerberos V5 مي باشد
كه پيش فرض نيز مي باشد
A public key certificate
دومين روش مي باشد البته اين روش با شبكه هايي كه
داراي Kerberos هستنند سازگاري ندارد
A preshared key
شومين روش شناسايي افراد مي باشد اين روش كمي متفاوت
مي باشد زماني كه دوسيستم بخواهند همديگر را
در شبكه شناسايي كنند اين اسم رمز را بايد از همديگر
بگيرنند اگر يكسان باشد همديگر
را شناسايي كرده و ترافيك IPsec را به هم ارسال مي كنند در اين قسمت فقط يك Text بايد تايپ شود
IPSec tunneling
This rule does not specify an IPSec tunnel (default). Disables
IPSec tunneling for communications covered by the rule.
IPSec connection types
سه گزينه براي انتخاب يك Interface
در IPsec وجود دارد
All Network Connections
كليه Network Adaptor
يك سيستم را در بر مي گيرد حتي Modem
Local Area Network LAN
فقط LAN
داخلي را در بر مي گيرد
Remote Access
Modem و سيستم
هايي كه از طريق RRAS و يا همان Dial-up به سيستم وصل مي شونند
Advanced IPSec settings
Key exchange methods
در اين قسمت شما مي توانيد بر اساس الگوريتم هاي كه در قسمت IPSec security
methods معرفي شد تعريفي از چگونگي ساختن يك كليد را مشخص
كنيد
To create key exchange methods
In IP Security Policy Management, right-click the policy
you want to modify, and then click Properties.
Click the General tab, click Advanced, and then click
Methods.
Click Add, or if you are reconfiguring an existing method,
click the security method, and then click Edit.
Select an Integrity Algorithm:
Click MD5 to use a 128-bit value.
Click SHA to use a 160-bit value (stronger).
Select a Confidentiality Algorithm:
Click 3DES to use the highest security algorithm.
Click DES if you are required to connect to computers that
do not have 3DES or if you do not need the higher security and overhead of
3DES. For more information on cryptographic settings, see Special
Considerations.
Select a Diffie-Hellman Group to set the length of base
keying material used to generate the actual keys:
Click Low (1) to use 768 bits as a basis.
Click Medium (2) to use 1024 bits as a basis (stronger).
IPSec scenarios
Domain, Peer to Peer:
IPSec
در يك LAN
كه داراي چند Server
با درجات مختلف Security
مي باشد بهترين كار براي ايجاد يك يا چند بخش امنيتي بالا و متوسط بايداز Group
policy در
هر OU
استفاده كرد
در بالا مشاهده مي شود كه يك سري
از سرورها در يك Highest Security OU مي باشند
و يك سري در Secure Server OU مي باشند
كليه اين تعاريف در ADS
بايد معرفي شود و بسيار مهم است كه درجه Secure بودن هر
سرور توسط Administrator مشخص شود
Remote communications:
IPSec
Secure, remote communication is achieved by combining the
Layer 2 Tunneling Protocol (L2TP) and IPSec. L2TP is used to build the tunnel
through which the data will travel, and IPSec secures the data.
Roving clients
A common requirement is securing communications between
remote clients and the enterprise network. This may be a sales consultant who
spends most of the time on the road, or an employee working from a home office.
In this figure, the remote gateway is a server which
provides edge security for the enterprise's intranet. The remote client
represents a roving user who needs regular access to network resources and
information. The client may or may not be going through an Internet service
provider (ISP); it is shown here to represent the path of communication if the
client is using an ISP to access the remote gateway. L2TP is combined with
IPSec to provide a simple, efficient way to build the tunnel and protect the
data across the Internet. The tunnel itself is between the Remote Client and
the remote gateway, since it is used only to protect communication through the
Internet.
Branch offices
A large enterprise will often have multiple sites which
need to communicate, for example, a corporate office in New York, and a sales
office in Washington. As in the previous scenario, L2TP is combined with IPSec
to provide the tunnel and protect the data between the sites.
In this figure, the Windows 2000 routers provide edge
security and a communication route between the two sites. The routers may have
a lease line, demand dial, or other type of connection. The tunnel runs between
the routers only, since it is being used to protect communication through the
Internet. However, the virtual private network (VPN) extends between the
intranet computers at each site that are exchanging data.
Securing remote communication
Instead of configuring IPSec policies, these remote
communication scenarios require configuration of the L2TP security properties
in Windows 2000.
When L2TP is configured to use IPSec for security:
The required IP filter and filter action lists are
dynamically set in the IPSec Policy Agent for the duration of the connection.
Authentication is determined by L2TP, which requires a
computer public key certificate and its associated private key.
Default key exchange settings are in effect.
The level of Internet Protocol security that is used for
the duration of the connection is dependent upon the L2TP security
configuration:
No encryption. IPSec still requires a certificate and will
negotiate AH.
Optional encryption. If the other computer requests or
requires secured communication, IPSec can offer security levels ranging from
ESP/3DES to AH/MD5.
Session key Perfect Forward Secrecy is not enabled unless
the other computer requests it.
You can fall back to unsecured communication.
Required encryption. The computer will require secured
communication. The security that is offered is identical to that under optional
encryption, except that you cannot fall back to unsecured communication.
هیچ نظری موجود نیست:
ارسال یک نظر