IP Packets have no inherent security. It is relatively easy to
forge the addresses of IP packets, modify the contents of IP packets, replay old
packets, and inspect the contents of IP packets in transit. Therefore, there is
no guarantee that IP datagrams received are (1) from the claimed sender (the
source address in the IP header); (2) that they contain the original data that
the sender placed in them; or (3) that the original data was not inspected by a
third party while the packet was being sent from source to destination. IPSec is
a method of protecting IP datagrams. This protection takes the form of data
origin authentication, connectionless data integrity authentication, and data
content confidentiality.
IPSec provides a standard, robust, and extensible mechanism in
which to provide security to IP and upper-layer protocols (e.g., UDP or TCP). A
default, mandatory-to-implement suite of algorithms is defined to assure
interoperability between different implementations, and it is relatively
straightforward to add new algorithms without breaking interoperability.
The method of protecting IP datagrams or upper-layer protocols
is by using one of the IPSec protocols, the Encapsulating Security Payload (ESP)
or the Authentication Header (AH). AH provides proof-of-data origin on received
packets, data integrity, and antireplay protection. ESP provides all that AH
provides in addition to optional data confidentiality. Since ESP provides all
that AH provides, one may ask, "Why use AH?" That's a good question, and is the
topic of debate in the security community. The debate has shown no signs of
subsiding though and AH may be depricated in the future. One subtle difference
between the two is the scope of coverage of authentication. This will be
discussed more fully in later chapters.
It should be noted that the ultimate security provided by AH or
ESP is dependent on the cryptographic algorithms applied by them.
Mandatory-to-implement algorithms are defined for conformance testing and to
insure interoperability among implementations. These algorithms are generally
secure, although recent advances in cryptography and the continued demonstration
of Moore's law (the observation that every 18 months computing power doubles)
continue to whittle away at the effective security of ciphers. The Digital
Encryption Standard (DES) has depricated for just this reason. The new Advanced
Encryption Standard (AES) is taking its place.
The security services that IPSec provides requires shared keys
to perform authentication and/or confidentiality. A mechanism to manually add
keys for these services is mandatory to implement. This ensures interoperability
of the base IPSec protocols. Of course, manual key addition scales poorly so a
standard method of dynamically authenticating IPSec peers, negotiating security
services, and generating shared keys is defined. This key management protocol is
called IKE—the Internet Key Exchange.
The shared keys used with IPSec are for either a symmetric
cipher (when confidentiality is needed) or for a keyed MAC (for data integrity)
or for both. IPSec must be fast and existing public key technologies, such as
RSA or DSS, are too slow to operate on a packet-by-packet basis. Presently,
public key technology is limited to initial authentication during key
exchange.
0 comments:
Post a Comment