NS 2nd QB Answers
NS 2nd QB Answers
• IPsec provides the capability to secure communications across a LAN, across private and public
WANs, and across the Internet. Examples of its use include:
• Secure branch office connectivity over the Internet: A company can build a secure virtual private
network over the Internet or over a public WAN. This enables a business to rely heavily on the
Internet and reduce its need for private networks, saving costs and network management overhead.
• Secure remote access over the Internet: An end user whose system is equipped with IP security
protocols can make a local call to an Internet Service Provider (ISP) and gain secure access to a
company network. This reduces the cost of toll charges for traveling employees and telecommuters.
• Establishing extranet and intranet connectivity with partners: IPsec can be used to secure
communication with other organizations, ensuring authentication and confidentiality and providing
a key exchange mechanism.
• Enhancing electronic commerce security: IPsec guarantees that all traffic designated by the
network administrator is both encrypted and authenticated, adding an additional layer of security to
whatever is provided at the application layer
• The principal feature of IPsec that enables it to support these varied applications is that it can encrypt
and/or authenticate all traffic at the IP level. Thus, all distributed applications (including remote
logon, client/server, e-mail, file transfer, Web access, and so on) can be secured.
IPsec Services
IPsec provides security services at the IP layer by enabling a system to select
required security protocols, determine the algorithm(s) to use for the service(s),
and put in place any cryptographic keys required to provide the requested services.
Two protocols are used to provide security: an authentication protocol designated
by the header of the protocol, Authentication Header (AH); and a combined
encryption/authentication protocol designated by the format of the packet for that
protocol, Encapsulating Security Payload (ESP). IPSec services are listed below:
• Access control
• Connectionless integrity
• Data origin authentication
• Rejection of replayed packets (a form of partial sequence integrity)
• Confidentiality (encryption)
• Limited traffic flow confidentiality
5. Draw the flow chart of processing model for outbound and inbound packets.
OUTBOUND PACKETS
➢ Padding
The Padding field serves several purposes:
• If an encryption algorithm requires the plaintext to be a multiple of some number of
bytes (e.g., the multiple of a single block for a block cipher), the Padding field is used to
expand the plaintext (consisting of the Payload Data, Padding, Pad Length, and Next Header
fields) to the required length.
• The ESP format requires that the Pad Length and Next Header fields be right aligned
within a 32-bit word. Equivalently, the ciphertext must be an integer multiple of 32 bits.
The Padding field is used to assure this alignment.
• Additional padding may be added to provide partial traffic-flow confidentiality by
concealing the actual length of the payload.
➢ Anti-Replay Service
• A replay attack is one in which an attacker obtains a copy of an authenticated packet
and later transmits it to the intended destination. The receipt of duplicate,
authenticated IP packets may disrupt service in some way or may have some other
undesired consequence. The Sequence Number field is designed to thwart such
attacks.
• First, we discuss sequence number generation by the sender, and then we look at how
it is processed by the recipient.
• When a new SA is established, the sender initializes a sequence number counter to
0. Each time that a packet is sent on this SA, the sender increments the counter and
places the value in the Sequence Number field. Thus, the first value to be used is 1.
• If anti-replay is enabled (the default), the sender must not allow the sequence
number to cycle past 232 – 1 back to zero. Otherwise, there would be multiple valid
packets with the same sequence number. If the limit of 232 – 1 is reached, the sender
should terminate this SA and negotiate a new SA with a new key.
• Because IP is a connectionless, unreliable service, the protocol does not guarantee
that
packets will be delivered in order and does not guarantee that all packets will be
delivered. Therefore, the IPsec authentication document dictates that the
receiver should implement a window of size , with a default of .
• The right edge of the window represents the highest sequence number N-W+1 to N,
, so far received for a valid packet. For any packet with a sequence number in the
range from to that has been correctly received (i.e., properly authenticated), the
corresponding slot in the window is marked (Figure 3.8).
Fig 3.8 Anti-Replay Mechanism
➢ When the user responds and provides a valid user ID and authentication information, the
gateway contacts the application on the remote host and relays TCP segments containing the
application data between the two endpoints. If the gateway does not implement the proxy code
for a specific application, the service is not supported and cannot be forwarded across the firewall.
➢ The gateway can be configured to support only specific features of an application that the
network administrator considers acceptable while denying all other features.
➢ Application-level gateways tend to be more secure than packet filters. Rather than trying to deal
with the numerous possible combinations that are to be allowed and forbidden at the TCP and IP
level, the application-level gateway need only scrutinize a few allowable applications. In addition,
it is easy to log and audit all incoming traffic at the application level.
➢ A prime disadvantage of this type of gateway is the additional processing overhead on each
connection. In effect, there are two spliced connections between the end users, with the gateway
at the splice point, and the gateway must examine and forward all traffic in both directions.