IPSec Flashcards
What protocol was TLS based on?
SSL 3.0
What algorithms does TLS use for key exchange?
RSA or Diffie-Helman
How is authentication done in TLS?
Using RSA or digital signatures
What is the process of SSL/TLS authentication?
Browser requests web server identifies itself
Server sends browser SSL Certificate
Browser checks if it trusts the SSL certificate, and responds
Server responds with signed acknowledgement and starts SSL encrypted session.
What is HMAC?
Keyed-Hashing for Message Authentication Code.
Same as MAC except uses a key for extra authentication
Can use intermediate CA”s to verify signatures rather than going back to root.
What properties of a network are vulnerable?
Precursors Authentication Confidentiality Integrity Availability Programming Flaws Mobile Agents
What attack vectors are there for authentication?
Impersonation
Eavesdropping
Spoofing
Session Hijacking
What attack vectors are there for confidentiality?
Protocol Flaws Eavesdropping Wiretap Misdelivery Exposure Traffic Flow Analysis Cookies
What attack vectors are there for integrity?
Protocol Flaws Wiretap Falsification of messages Network Noise DNS attack
What attack vectors are there for availability on a network?
Protocol flaws Component Failure DoS Traffic Redirection Ping of Death Smurf Syn flood
What programming flaws are commonly seen that lead to vulnerabilities?
Buffer overflows
Addressing errors
Language vulnerabilities
Viruses
What is IPSec?
Internet Protocol Security
Framework of open standards for ensuring private, secure communications over IP networks.
Uses cryptographic security services.
What does the IPSec suite provide?
Protection against private network and internet attack through end-to-end security.
What does IPSec allow for?
Protection of communications between workgroups, LANs, Domain clients and servers, extranets and roving clients
What was IPSec developed to address?
The needs for data security, integrity, authentication and protection for network connections which are connectionless and stateless.
What does IPSec allowing the transmission of?
Packets sent with cryptography.
What is the drawback of applying cryptography to every packet?
Each packet must be treated as an independent entity
There is no guaranteed delivery
No packet order maintenance
What are the benefits of IPSec?
All IP datagrams are covered
No need to re-engineer applications
Transparent to the upper layer.
What are the two basic modes of use of IPSec?
Transport mode
Tunnel mode
How does transport mode work?
IPsec-aware hosts as endpoints
How does tunnel mode work?
IPSec-unaware hosts have tunnels established by intermediate gateways or host OS.
What is the AH?
Authentication Header
Assures authenticity and integrity of the message.
Uses a message digest to check the integrity of the whole IP datagram and adds an extra header containing the digest.