IPsec Protection Mechanisms - Securing The Network In Oracle ...
Maybe your like
IPsec Protection Mechanisms
IPsec provides two security protocols for protecting data:
-
Authentication Header (AH)
-
Encapsulating Security Payload (ESP)
AH protects data with an authentication algorithm. An ESP protects data with an encryption algorithm. ESP can and should be used with an authentication mechanism. If you are not traversing a NAT, you can combine ESP with AH. Otherwise, you can use an authentication algorithm and an encryption mechanism with ESP. A combined mode algorithm, such as AES-GCM, provides encryption and authentication within a single algorithm.
Authentication Header
The authentication header provides data authentication, strong integrity, and replay protection to IP datagrams. AH protects the greater part of the IP datagram. As the following illustration shows, AH is inserted between the IP header and the transport header.
The transport header can be TCP, UDP, SCTP, or ICMP. If a tunnel is being used, the transport header can be another IP header.
Encapsulating Security Payload
The encapsulating security payload (ESP) module provides confidentiality over what the ESP encapsulates. ESP also provides the services that AH provides. However, ESP only provides its protections over the part of the datagram that ESP encapsulates. ESP provides optional authentication services to ensure the integrity of the protected packet. Because ESP uses encryption-enabling technology, a system that provides ESP can be subject to import and export control laws.
ESP encapsulates its data, so ESP only protects the data that follows its beginning in the datagram, as shown in the following illustration.
In a TCP packet, ESP encapsulates only the TCP header and its data. If the packet is an IP-in-IP datagram, ESP protects the inner IP datagram. Per-socket policy allows self-encapsulation, so ESP can encapsulate IP options when ESP needs to.
If self-encapsulation is set, a copy of the IP header is made to construct an IP-in-IP datagram. For example, when self-encapsulation is not set on a TCP socket, the datagram is sent in the following format:
[ IP(a -> b) options + TCP + data ]When self-encapsulation is set on that TCP socket, the datagram is sent in the following format:
[ IP(a -> b) + ESP [ IP(a -> b) options + TCP + data ] ]For further discussion, see Transport and Tunnel Modes in IPsec.
Security Considerations When Using AH and ESP
The following table compares the protections that are provided by AH and ESP.
Table 6-2 Protections Provided by AH and ESP in IPsec
|
Authentication and Encryption Algorithms in IPsec
IPsec security protocols use two types of algorithms, authentication and encryption. The AH module uses authentication algorithms. The ESP module can use encryption as well as authentication algorithms. You can obtain a list of the algorithms on your system and their properties by using the ipsecalgs command. For more information, see the ipsecalgs(1M) man page. You can also use the functions that are described in the getipsecalgbyname(3NSL) man page to retrieve the properties of algorithms.
IPsec uses the Cryptographic Framework to access the algorithms. The Cryptographic Framework provides a central repository for algorithms, in addition to other services. The framework enables IPsec to take advantage of high performance cryptographic hardware accelerators.
For more information, see the following:
-
Chapter 11, Cryptographic Framework (Overview), in Oracle Solaris 11.1 Administration: Security Services
-
Chapter 8, Introduction to the Oracle Solaris Cryptographic Framework, in Developer’s Guide to Oracle Solaris 11 Security
Authentication Algorithms in IPsec
Authentication algorithms produce an integrity checksum value or digest that is based on the data and a key. The AH module uses authentication algorithms. The ESP module can use authentication algorithms as well.
Encryption Algorithms in IPsec
Encryption algorithms encrypt data with a key. The ESP module in IPsec uses encryption algorithms. The algorithms operate on data in units of a block size.
Tag » How Does Ipsec Prevent Replay Attacks
-
IPSec - Internet Protocol Security
-
What Is Anti-replay Protocol And How Does It Work? - TechTarget
-
Protection Mechanisms (IPsec And IKE Administration Guide)
-
Configuring IPsec Anti-replay
-
Anti-replay - Wikipedia
-
Using ESP To Prevent Replay Attacks | Enterprise Networking Planet
-
What Is A Replay Attack And How To Prevent It - Kaspersky
-
Troubleshoot IPsec Anti-Replay Check Failures - Cisco
-
Replay Protection - An Overview | ScienceDirect Topics
-
Anti-replay Protection - Magic WAN - Cloudflare Docs
-
[PDF] IPSec And IKE
-
How Can IPsec Protects The Network? [Solved] (2022) - Cryptocoached
-
Theory - The Official IPsec Howto For Linux
-
What Is IPSec? | IT PRO