IPsec - 2 Problems (Eng)
IPsec - 2 Problems (Eng)
Solutions
Yasir Jan
Future Internet
29th May, 2008
1/19
Contents
Definition
Architecture Types
Modes of Operation
Key Exchange
Multiple Options
IPsec problems and solutions
Summary
References
2/19
IPsec
Definition
IP security refers to security mechanisms implemented at the IP (Internet
Protocol) Layer to ensure integrity, authentication and confidentiality of
data during transmission in the open Internet environment.
Fig: Security
3/19
IPsec
Architecture Types
Authentication Header
Integrity + Authentication
Encapsulating Security Payload
Integrity + Authentication + Confidentiality
4/19
IPsec
Modes of Operation
Transport Mode
Only payload of the IP packet is encrypted and/or authenticated.
Tunnel Mode
Entire IP packet (data plus the message headers) is encrypted and/or
authenticated
IP AH Upper Protocol Headers
AH Transport mode Header Header and Packet Data
7/19
IPsec problems and solutions
1) Key Management in Large Networks
When IPsec is largely
developed, key management
becomes very difficult
10/19
IPsec problems and solutions
7) Scrambled Group passwords recovery
IPsec passwords were first sniffed from memories,
when used, so Cisco VPN clients were designed to
scramble the passwords in memory, but they were
hacked again
Once getting group password, an attacker can
hijack a connection from a user and get other
usernames and passwords
8) No End-End Protection
Applications use their own SSL or other techniques
IETF working on API integrated with IPsec to achieve
maximum use
But IPsec has many good things as compared to Fig: IPsec vs firewalls
firewalls like encryption, no bottle necks etc
12/19
IPsec problems and solutions
10) VoIP Quality loss
Scheduling causes packet loss
in real time applications
Latency in VoIPs
13/19
IPsec problems and solutions
12) Multicast Traffic
Packets have single destination
addresses, so difficult to mange SPI
Some applications using streaming
multimedia assign port numbers
dynamically, so IPsec policy
becomes difficult to assign
IPsec has multicast option but is not
enough for all occasions
13) Security within algorithms
IPsec works with other protocols for
security. They should be secure
enough to stop attacker otherwise Fig: Multicast traffic
only secure IPsec is useless
14/19
IPsec problems and solutions
14) Brute Force Attack
ESP initiation scheme is fixed 3 steps of Aggressive mode, so
intruder may try to delay the initiation during which it will find the
key by brute force attack
Crack Tool was used with Pre-Shared-Key IKE authentication [2] for
guessing with brute force
Fig: Questions
19/19