Ipsec: Security Across The Protocol Stack: Brad Stephenson Csci Netprog
Ipsec: Security Across The Protocol Stack: Brad Stephenson Csci Netprog
Ipsec: Security Across The Protocol Stack: Brad Stephenson Csci Netprog
Network Security
There are application specific security mechanisms (eg. S/MIME, PGP, Kerberos, SSL/HTTPS) But there are security concerns that cut across protocol layers Can we implement security in the network for all applications?
What is IPsec?
A collection of tools and algorithms (protocols) General IP security mechanisms It provides
authentication confidentiality key management
Benefits of IPsec
If implemented in a firewall or router, provides strong security to all traffic crossing the perimeter Resides below the transport layer, hence transparent to application layer Can be transparent to end users Note: Mandatory for IPv6 implementations
AH and ESP
Authentication Header (AH) provides:
Data integrity Authentication of IP packets Prevents replay attacks
Authentication Header
* = Implements IPsec
Tunnel mode
add new header for next hop hides end-host IP addresses through insecure networks good for VPNs, gateway to gateway security
Unix
man ipsec
Windows
mmc (Microsoft Management Console)
Linux
Must specify a security policy in kernel
Who do you trust?
racoon
Key management daemon
Free S/WAN
IPsec implementation for Linux
openswan
Another IPsec implementation for Linux
Unix
IPsec policy is enforced in the ip(7P) driver for system-wide policy Use ndd to alter /dev/ip at the system level Or specify per-socket options
ipsec_req
typedef struct ipsec_req { uint_t ipsr_ah_req; /* AH request */ uint_t ipsr_esp_req; /* ESP request */ uint_t ipsr_self_encap_req; /* Self-Encap request */ uint8_t ipsr_auth_alg; /* Auth algs for AH */ uint8_t ipsr_esp_alg; /* Encr algs for ESP */ uint8_t ipsr_esp_auth_alg; /* Auth algs for ESP */ } ipsec_req_t;
Windows XP
Type mmc at a command line Add snap-in IPsec Policy Edit the policy as you see fit
Summary
IPsec is a collection of protocols that provide low-level network security Last specification was in 1998, currently being revised as Internet Draft Required for IPv6 Currently the most popular use is for implementing VPNs
References
RFC 2401 Security Architecture for the Internet Protocol Internet Draft, Dec 2004, Security Architecture for the Internet Protocol Cryptography and Network Security, W. Stallings, Chap. 16 IP Security Internetworking with TCP/IP Vol. 1, D. Comer, Chap. 32 Internet Security