| IP- Level Security: IPSEC | 
| IP Security (IPSec) is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the IP level. | 
| IPSec does not define the use of any specific encryption or authentication method. Instead, it provides a framework and a mechanism: it leaves the selection of the encryption, authentication, and hashing methods to the user. | 
| Security Association | 
| IPSec requires a logical connection between two hosts using a signaling protocol, called Security Association (SA). | 
| In other words, IPSec needs the connectionless IP protocol changed to a connection-oriented protocol before security can be applied. | 
| An SA connection is a simplex (unidirectional) connection between a source and destination. | 
| . If a duplex (bidirectional) connection is needed, two SA connections are required, one in each direction. An SA connection is uniquely defined by three elements: | 
| 1. A 32-bit security parameter index (SPI), which acts as a virtual circuit identifier in connection-oriented protocols such as Frame Relay or ATM. | 
| 2. The type of the protocol used for security. We will see shortly that IPSec defines two alternative protocols: AH and ESP. | 
| 3. .The source IP address. | 
| Two Modes | 
| IPSec operates at two different modes: transport mode and tunnel mode. The mode defines where the IPSec header is added to the IP packet. | 
| Transport Mode | 
| In this mode, the IPSec header is added between the IP header and the rest of the packet, as shown in Figure. | 
|  | 
| Two Security Protocols | 
| IPSec defines two protocols: Authentication Header (AH) protocol and Encapsulating Security Payload (ESP) protocol. We discuss both of these protocols here. | 
| Authentication Header (AH) Protocol | 
| The Authentication Header (AH) protocol is designed to authenticate the source, host and to ensure the integrity of the payload carried by the IP packet. | 
| The protocol calculates a message digest, using a hashing function and a symmetric key, and inserts the digest in the authentication header. | 
| The AH is put in the appropriate location based on the mode (transport or tunnel). | 
| Figure shows the position of the authentication header in the transport mode. | 
|  | 
| Encapsulating Security Payload | 
| The AH protocol does not provide privacy, only source authentication and data integrity. | 
| IPSec later defined an alternative protocol that provides source authentication, integrity, and privacy called Encapsulating Security Payload (ESP). | 
| ESP adds a . Header and trailer. Note that ESP's authentication data are added at the end of packet which makes its calculation easier. | 
| Figure 31.4 shows the location of the ESP header and trailer. | 
|  | 
Thursday, February 5, 2009
IP- Level Security: IPSEC
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment