Chap5_1 Flashcards

1
Q

What is IP

A

 The Internet Protocol (IP) for interconnecting systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPsec Overview

A

 IPsec is NOT a single protocol. Instead,
IPsec provides a set of security algorithmsand a general framework that Includes: Authentication (Tunnel mode, transport mode), confidentiality by encryption, and
key management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPsec Can be added to either IPv4 or IPv6 by means of ….

A

additional headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPsec Includes:……

A

Authentication, confidentiality, and

key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPsec Authentication uses ….. on entire IP packet ….. or IP packet except ………..

A

Authentication uses HMAC on entire IP packet
(Tunnel mode) or IP packet except IP header
(Transport mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality by

A

encryption (Tunnel or

transport modes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP protocol vulnerabilities

A

 IP spoofing Intruders (create packets with false IP addresses)
 Eavesdropping and packet sniffing( read transmitted information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

 Benefits of IPsec

A

 Transparent to applications (below transport layer (TCP, UDP)
 Provide security for individual users
 IPsec ensures redirect message comes from the router to which the initial packet was sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPsec Architecture

 Security features are implemented as……

 Authentication is

 Encryption is

A

extension headers
Authentication Header (AH)
Encapsulating Security Payload (ESP) header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPsec Architecture
Support for Security features is….. for
IPv6 and ……. for IPv4

A

mandatory

optional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Associations (SA) is …….. IPsec connection

A

Same as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

e

A

e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPsec composition

IPsec is composed of ……….. plane and ……….. plane.

The …………… plane contains ………….. which is used to establish …………………..

The ……………. plane is made up from …….. and ………….. Both provides framework for validating, encrypting and authentication data

A

control, data

control, IKE (Internet Key exchange) , authenticated keys

data, AH (authentication header) , ESP (encapsulating security payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Both AH and ESP are vehicles for access
control, They may be applied ….. to provide a desired set of
security services in IPv4 and IPv6.

A

alone or in combination with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPSec uses two distinct protocols, ……. and ………

A

Authentication Header (AH)

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AH provides

A

Connectionless integrity
Data origin authentication and
An optional anti-replay service.

17
Q

ESP may provide

A
 Confidentiality (encryption)
 Limited traffic flow confidentiality
 Connectionless integrity
 Data origin authentication, and
 Anti-replay service.
18
Q

Slide 27

19
Q

Authentication Header (AH) Protocol provides ………. and ………. but does not provide …….

Authentication Header (AH) Guards against ………..

Authentication uses ……….. implies the two parties share a ……….

AH header inserted between ……….. and ………

A

 Provides source authentication, data integrity, NO
confidentiality
 Guards against replay attacks
 Authentication uses MAC implies the two parties share
a secret key.
 AH header inserted between IP header, data field.

20
Q

In Transport Mode (AH Authentication) Authentication covers the ……. packet,
excluding ………………..

A

Authentication covers the entire packet,

excluding mutable fields

21
Q

Tunnel Mode (AH Authentication) ……….. original IP packet is authenticated

AH inserted between …………… and new …………….

…………. header may contain different IP
addresses

A

Entire original IP packet is authenticated
 AH inserted between original IP header and
new outer IP header
 Outer IP header may contain different IP
addresses

22
Q

Encapsulating Security Payload (ESP)

Protocol

A

Provides secrecy, host authentication (optional),

data integrity, limited traffic flow confidentiality

23
Q

Tunnel Mode

ESP Encryption and Authentication

A

New IP header will contain sufficient information

for routing but not for traffic analysis

24
Q

Why multilayer Security

A

Because Most layers have control information that must be decoded before decryption is possible and these control information must be sent in the clear

25
Defense in Depth and Breadth
``` Use multiple layers for constructing and deploying network security policies  Depth: If one layer protects against a particular attack and a second layer protects against the same attack, the second layer provides depth against that specific attack  Breadth: If one layer protects against one specific attack and a second layer protects against a completely different attack against that same service, these layers are considered as providing breadth ```
26
Combining Security Associations
 Transport Adjacency:  Apply multiple security protocols without invoking tunneling  Combining AH and ESP allows one level of combination  Further nesting gives no benefits since processing performed at ultimate destination  Iterated Tunneling:  Apply multiple security protocols through IP tunneling  Multiple levels of nesting possible since each tunnel can originate or terminate at a different IPsec site  Two approaches can be combined
27
Authentication Plus Confidentiality
ESP with Auth. Option:  Transport mode: Authenticate and encrypt IP payload but IP header not protected  Tunnel mode: Authentication applies to entire IP packet delivered to outer destination (ex. Firewall), entire inner IP packet protected by privacy to the inner IP destination  In both cases, authentication applies to ciphertext not plaintext.
28
Basic Combinations of SAs  Host-to-host: mode may be.............. or ............... Security gateway: mode must be .....................
Each SA can be AH or ESP  Host-to-host: mode may be transport or tunnel  Security gateway: mode must be tunnel
29
Slide 45
TRUE
30
Key Management may be ........... or ...............
 Manual: • Admin manually configures systems with keys • Practical for small static environments  Automated: • Oakley Key Determination Protocol • Internet Security Association and Key Management Protocol (ISAKMP
31
``` Internet Security Association and Key Management Protocol (ISAKMP) ```
 Provides a framework for Internet Key management  Provides specific protocol support including formats for negotiation of security attributes  Does Not dictate a specific algorithm  Consists of a set of message types that enable the use of different key exchange algorithms  Defines procedures and packet formats to establish, negotiate, modify and delete security associations
32
IPsec: Implementation Issues (1)
 IPsec protocol complex and configuration complicated  IPsec is available for all major operating systems  Needs key management protocols (IKE)  Causes conflict with other protocols/mechanisms
33
Summary IPsec
IPsec: Summary  IKE message exchange for algorithms, secret keys, SPI numbers  Either the AH or the ESP protocol  The AH protocol provides integrity and source authentication  The ESP protocol (with AH) additionally provides encryption  IPsec peers can be two end systems, two routers/firewalls, or a router/firewall and an end system
34
IPsec and NAT: The Problem
Need Based NAT Traversal | with IPsec over TCP or UDP
35
Important IPsec Concepts Before sending data, a .......... is established from sending to receiving entity: This connection is ................... connection and is based on ..............
virtual connection Simplex (unidirectional) security mechanisms (cryptographic algorithm, shared keys)
36
Security Parameters Index (SPI)
A bit string assigned to an SA (IPsec) that enables receiving system to select under which a received packet will be processed
37
......... and .......... protocol supports two modes of use: ............ mode and ..............mode.
AH ESP Transport Tunnel
38
Transport mode Provide protection primarily for ....... and it is used in ......... communication between hosts
upper layer protocols | end-to-end
39
tunnel mode is applied to ............ and used when one or both ends of an SA are..................
tunnel IP packets security gateways (Firewalls, routers)