Chap5_1 Flashcards

1
Q

What is IP

A

 The Internet Protocol (IP) for interconnecting systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IPsec Overview

A

 IPsec is NOT a single protocol. Instead,
IPsec provides a set of security algorithmsand a general framework that Includes: Authentication (Tunnel mode, transport mode), confidentiality by encryption, and
key management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IPsec Can be added to either IPv4 or IPv6 by means of ….

A

additional headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPsec Includes:……

A

Authentication, confidentiality, and

key management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPsec Authentication uses ….. on entire IP packet ….. or IP packet except ………..

A

Authentication uses HMAC on entire IP packet
(Tunnel mode) or IP packet except IP header
(Transport mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality by

A

encryption (Tunnel or

transport modes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP protocol vulnerabilities

A

 IP spoofing Intruders (create packets with false IP addresses)
 Eavesdropping and packet sniffing( read transmitted information)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

 Benefits of IPsec

A

 Transparent to applications (below transport layer (TCP, UDP)
 Provide security for individual users
 IPsec ensures redirect message comes from the router to which the initial packet was sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IPsec Architecture

 Security features are implemented as……

 Authentication is

 Encryption is

A

extension headers
Authentication Header (AH)
Encapsulating Security Payload (ESP) header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IPsec Architecture
Support for Security features is….. for
IPv6 and ……. for IPv4

A

mandatory

optional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Security Associations (SA) is …….. IPsec connection

A

Same as

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

e

A

e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPsec composition

IPsec is composed of ……….. plane and ……….. plane.

The …………… plane contains ………….. which is used to establish …………………..

The ……………. plane is made up from …….. and ………….. Both provides framework for validating, encrypting and authentication data

A

control, data

control, IKE (Internet Key exchange) , authenticated keys

data, AH (authentication header) , ESP (encapsulating security payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Both AH and ESP are vehicles for access
control, They may be applied ….. to provide a desired set of
security services in IPv4 and IPv6.

A

alone or in combination with each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPSec uses two distinct protocols, ……. and ………

A

Authentication Header (AH)

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AH provides

A

Connectionless integrity
Data origin authentication and
An optional anti-replay service.

17
Q

ESP may provide

A
 Confidentiality (encryption)
 Limited traffic flow confidentiality
 Connectionless integrity
 Data origin authentication, and
 Anti-replay service.
18
Q

Slide 27

A

TRUE

19
Q

Authentication Header (AH) Protocol provides ………. and ………. but does not provide …….

Authentication Header (AH) Guards against ………..

Authentication uses ……….. implies the two parties share a ……….

AH header inserted between ……….. and ………

A

 Provides source authentication, data integrity, NO
confidentiality
 Guards against replay attacks
 Authentication uses MAC implies the two parties share
a secret key.
 AH header inserted between IP header, data field.

20
Q

In Transport Mode (AH Authentication) Authentication covers the ……. packet,
excluding ………………..

A

Authentication covers the entire packet,

excluding mutable fields

21
Q

Tunnel Mode (AH Authentication) ……….. original IP packet is authenticated

AH inserted between …………… and new …………….

…………. header may contain different IP
addresses

A

Entire original IP packet is authenticated
 AH inserted between original IP header and
new outer IP header
 Outer IP header may contain different IP
addresses

22
Q

Encapsulating Security Payload (ESP)

Protocol

A

Provides secrecy, host authentication (optional),

data integrity, limited traffic flow confidentiality

23
Q

Tunnel Mode

ESP Encryption and Authentication

A

New IP header will contain sufficient information

for routing but not for traffic analysis

24
Q

Why multilayer Security

A

Because Most layers have control information that must be decoded before decryption is possible and these control information must be sent in the clear

25
Q

Defense in Depth and Breadth

A
Use multiple layers for constructing and
deploying network security policies
 Depth: If one layer protects against a
particular attack and a second layer
protects against the same attack, the
second layer provides depth against
that specific attack
 Breadth: If one layer protects against
one specific attack and a second layer
protects against a completely different
attack against that same service, these
layers are considered as providing
breadth
26
Q

Combining Security Associations

A

 Transport Adjacency:
 Apply multiple security protocols without invoking
tunneling
 Combining AH and ESP allows one level of combination
 Further nesting gives no benefits since processing
performed at ultimate destination
 Iterated Tunneling:
 Apply multiple security protocols through IP tunneling
 Multiple levels of nesting possible since each tunnel can
originate or terminate at a different IPsec site
 Two approaches can be combined

27
Q

Authentication Plus Confidentiality

A

ESP with Auth. Option:
 Transport mode: Authenticate and encrypt IP
payload but IP header not protected
 Tunnel mode: Authentication applies to entire
IP packet delivered to outer destination (ex.
Firewall), entire inner IP packet protected by
privacy to the inner IP destination
 In both cases, authentication applies to
ciphertext not plaintext.

28
Q

Basic Combinations of SAs

 Host-to-host: mode may be………….. or ……………

Security gateway: mode must be …………………

A

Each SA can be AH or ESP
 Host-to-host: mode may be transport or tunnel
 Security gateway: mode must be tunnel

29
Q

Slide 45

A

TRUE

30
Q

Key Management may be ……….. or ……………

A

 Manual:
• Admin manually configures systems with keys
• Practical for small static environments
 Automated:
• Oakley Key Determination Protocol
• Internet Security Association and Key Management Protocol
(ISAKMP

31
Q
Internet Security Association and Key
Management Protocol (ISAKMP)
A

 Provides a framework for Internet Key
management
 Provides specific protocol support including
formats for negotiation of security attributes
 Does Not dictate a specific algorithm
 Consists of a set of message types that enable
the use of different key exchange algorithms
 Defines procedures and packet formats to
establish, negotiate, modify and delete security
associations

32
Q

IPsec: Implementation Issues (1)

A

 IPsec protocol complex and configuration complicated
 IPsec is available for all major operating systems
 Needs key management protocols (IKE)
 Causes conflict with other protocols/mechanisms

33
Q

Summary IPsec

A

IPsec: Summary
 IKE message exchange for algorithms, secret keys,
SPI numbers
 Either the AH or the ESP protocol
 The AH protocol provides integrity and source
authentication
 The ESP protocol (with AH) additionally provides
encryption
 IPsec peers can be two end systems, two
routers/firewalls, or a router/firewall and an end
system

34
Q

IPsec and NAT: The Problem

A

Need Based NAT Traversal

with IPsec over TCP or UDP

35
Q

Important IPsec Concepts

Before sending data, a ………. is established from
sending to receiving entity:

This connection is ………………. connection and is based on …………..

A

virtual connection

Simplex (unidirectional)

security mechanisms (cryptographic algorithm, shared keys)

36
Q

Security Parameters Index (SPI)

A

A bit string assigned to an SA (IPsec) that enables receiving system to
select under which a received packet will be processed

37
Q

……… and ………. protocol supports two modes of use:
………… mode and …………..mode.

A

AH
ESP
Transport
Tunnel

38
Q

Transport mode Provide protection primarily for ……. and it is used in ……… communication between hosts

A

upper layer protocols

end-to-end

39
Q

tunnel mode is applied to ………… and used when one or both ends of an SA are………………

A

tunnel IP packets

security gateways (Firewalls, routers)