P2L10: IPSec and TLS Flashcards
1
Q
What are the goals of IP security (IPSec)?
A
- Verify sources of packets (providing authentication that is lacking in IPV4)
- Protect integrity/packet confidentiality
- Prevent replaying old packets
- Provide security automatically for higher level applications
2
Q
What two modes are in IPSec?
A
- Transport mode - End To End
* Tunnel mode (VPN) - Gateway To Gateway
3
Q
What are the 3 parts to IPSec Architecture?
A
- Encapsulating Security Payload (ESP)
- Encrypts applied to packet payload
- Authentication applied to IPSec header & payload after encryption is applied
- Authentication Header (AH)
- The Internet Key Exchange (IKE)
4
Q
Which ESP modes are secure? Encryption only, Authentication only, or Encryption + Authentication
A
All of them
5
Q
Authentication Header
A
- Applied to entire packet
- Mutable fields in IP header are “zeroed out”
- If both ESP and AH are used, AH is applied last
6
Q
What is Internet Key Exchange?
A
- Used when an outbound packet requires IPSec but does not yet have an SA
- 2 phases:
- Establish an IKE SA -> establish shared secret and authenticate it
- Use the IKE SA to negotiate IPSec SAs -> if no perfect secret key then keys for IPSec SA derived from secret, otherwise use new key
- Allows computers to exchange and negotiate security policies
- Establish parameters
- Security Associations
- Shared parameters
7
Q
What are Security Associations?
A
- They are a one-way relationship between a sender and a receiver defined by IPSec parameters
- One SA for inbound traffic
- One SA for outbound traffic
- Uses database called Security Association Database (SADB)
- Security Parameters Index (SPI)
- A unique index for each entry in the SADB
- Identifies the SA associated with a packet
8
Q
What is Anti-Replay?
A
- It is used only if authentication is selected
- Window should not be advanced until the packet has been authenticated
- Duplicates are rejected!
9
Q
What is Secure Socket Layer (SSL) and Transport Layer Security (TLS)?
A
- One of the most widely used security services that rely on TCP
- It’s the internet standard
- Two implementation choices
- Provided as part of underlying protocol suite
- Embedded in specific packages
10
Q
TLS Concepts
A
- TLS Session
* TLS Connections
11
Q
TLS Session
A
- An association between a client and a server
- Created by the Handshake Protocol
- Defines set of cryptographic security parameters
- Used to avoid expensive negotiation of each new security parameter for each connection
12
Q
TLS Connections
A
- A transport that provides a suitable type of service
- Peer to peer relationships
- Every connection is associated with one session