P2L10 IPSec and TLS Flashcards
goals of ipsec
verify source of IP packets, integrity of packets, avoid replay of packets
IPSec modes
- transport mode (host to host) and 2. tunnel mode (gateway of one network to gateway of another network)
Tunnel packets from gateway A to gateway B
packet is encapsulated in additional headers (source gateway address, destination gateway address, IPSec header)
Security mechanisms of IPSec
Key Exchange Protocol, ESP (Encapsulating Security Payload), AH (Authentication Header)
ESP
Encrypts and authenticates each packet (applied to payload). Authentication is applied to data in the IPSec header and packet payload (after encryption applied)
ESP can provide both confidentiality and integrity protection
true
If the authentication option of ESP is chosen, message integrity code is computed before encryption
false
To protect the confidentiality and integrity of the whole original IP packet, we can use ESP with the authentication option in tunnel mode
true
In AH, the integrity hash covers the IP header
true
internet key exchange protocol
needed for IPSec, allows two parties to decide security policies for traffic between them and agree security parameters (algorithms for hashing), establishes shared keys between two parties
SPI
used to look up SA in SADB, included in IPSEC header
Outbound processing of packet
Inbound processing of packet
Anti-replay mechanism
Sequence number added to IPSEC header. Only used when AH is present.
A sequence scale is used. If packet contains sequence number below sequence window, it is rejected. If it contains sequence # above, the window is advanced. If # within window, it is checked to see if used before.
IKE SA
Internet Key Exchange Security Association. It is bidirectional and used to define encryption and authentication of IKE traffic.
TWO PHASES:
- Establish IKE SA
- Use IKE SA to negotiate IPSec SAs