Demystifying The Ipsec Puzzle
Now that the Internet has blossomed into the Information Superhighway with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself.
1016470167
Demystifying The Ipsec Puzzle
Now that the Internet has blossomed into the Information Superhighway with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself.
105.0 In Stock
Demystifying The Ipsec Puzzle

Demystifying The Ipsec Puzzle

by Sheila Frankel
Demystifying The Ipsec Puzzle

Demystifying The Ipsec Puzzle

by Sheila Frankel

Hardcover

$105.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Now that the Internet has blossomed into the Information Superhighway with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself.

Product Details

ISBN-13: 9781580530798
Publisher: Artech House, Incorporated
Publication date: 03/31/2001
Series: Computer Security Series
Pages: 296
Product dimensions: 6.14(w) x 9.21(h) x 0.69(d)

About the Author

Sheila Frankel is a computer scientist at NIST (National Institute of Standards and Technology). She holds a B.A. in Mathematics from Yeshiva University and a M.S. in computer science from New York University. Her current responsibilities include NIST's IPsec and IKE reference implementations, Cerberus and PlutoPlus; and NIST's interactive WWW-based IPsec interoperability tester, IPsec-WIT.

Table of Contents

Prefacexvii
1Introduction1
1.1The TCP/IP Protocol Stack5
1.1.1IP Packets7
1.1.2IP Packetization and Fragmentation10
1.2Introducing IPsec12
1.3Summary13
1.4Further Reading14
References14
2The First Puzzle Piece: The Authentication Header15
2.1Protections Provided by AH15
2.2Security Associations and the Security Parameters Index16
2.3AH Format19
2.4AH Location20
2.5AH Modes21
2.6Nested Headers22
2.7Implementing IPsec Header Processing23
2.8AH Processing for Outbound Messages25
2.9AH Processing for Inbound Messages30
2.10Complications32
2.11Auditing35
2.12Threat Mitigation37
2.13Summary37
2.14Further Reading38
References38
3The Second Puzzle Piece: The Encapsulating Security Payload41
3.1Protections Provided by ESP41
3.2Security Associations and the Security Parameters Index42
3.3ESP Header Format43
3.4ESP Header Location and Modes45
3.5Nested and Adjacent Headers46
3.6ESP Header Processing for Outbound Messages48
3.7ESP Header Processing for Inbound Messages49
3.8Complications52
3.9Criticisms and Counterclaims52
3.10Threat Mitigation54
3.11Why Two Security Headers?55
3.12Summary56
3.13Further Reading56
References57
4The Third Puzzle Piece: The Cryptographic Algorithms59
4.1Underlying Principles60
4.2Authentication Algorithms62
4.2.1The MD5 Algorithm64
4.2.2The SHA-1 Algorithm65
4.2.3The HMAC Algorithm66
4.2.4Other Authentication Algorithms68
4.3The ESP Header Encryption Algorithms68
4.3.1The DES Algorithm70
4.3.2The Triple DES Algorithm72
4.3.3Other Encryption Algorithms76
4.3.4The AES Algorithm77
4.4Complications78
4.5Public Key Cryptography79
4.5.1Digital Signatures80
4.5.2Other Public Key Operations80
4.5.3The Diffie-Hellman Exchange80
4.6Conclusion82
4.7Further Reading82
References83
5The Fourth Puzzle Piece: The Internet Key Exchange (IKE)87
5.1The IKE Two-Step Dance87
5.2Payloads and Exchanges88
5.3Authentication Methods88
5.4Proposals and Counterproposals90
5.5Cookies94
5.6The Security Association Payload95
5.7The Proposal Payload95
5.8The Message ID96
5.9Nonces96
5.10Identities and Identity Protection97
5.11Certificates and Certificate Requests98
5.12Keys and Diffie-Hellman Exchanges99
5.13Notifications100
5.14Lifetimes101
5.15Vendor IDs101
5.16The Phase 1 Negotiation101
5.16.1Main Mode102
5.16.2Aggressive Mode108
5.16.3Base Mode110
5.17The Phase 2 Negotiation112
5.17.1Quick Mode113
5.17.2The Commit Bit116
5.18New Group Mode117
5.19Informational Exchanges118
5.20The ISAKMP Header119
5.21The Generic Payload Header120
5.22The IKE State Machine121
5.23The Origins of IKE122
5.24An Example122
5.25Criticisms and Counterclaims123
5.26Threat Mitigation125
5.27Summary125
5.28Further Reading126
References127
6The Fifth Puzzle Piece: IKE and the Road Warrior129
6.1Legacy Authentication Methods132
6.2ISAKMP Configuration Method134
6.3Extended Authentication139
6.4Hybrid Authentication140
6.5Challenge-Response for Authenticated Cryptographic Keys142
6.6User-Level Authentication145
6.7Credential-Based Approaches145
6.8Complications150
6.9Threat Mitigation151
6.10Summary151
6.11Further Reading151
References152
7The Sixth Puzzle Piece: IKE Frills and Add-Ons153
7.1Renegotiation154
7.2Heartbeats157
7.3Initial Contact162
7.4Dangling SAs163
7.5Summary164
7.6Further Reading164
References164
8The Glue: PF_KEY165
8.1The PF_KEY Messages166
8.2A Sample PF_KEY Exchange171
8.3Composition of PF_KEY Messages173
8.4Complications177
8.5Summary177
8.6Further Reading177
Reference177
9The Missing Puzzle Piece: Policy Setting and Enforcement179
9.1The Security Policy Database180
9.2The Policy Problem187
9.2.1Policy Configuration187
9.2.2Policy Servers188
9.2.3Gateway Discovery188
9.2.4Policy Discovery189
9.2.5Policy Exchange190
9.2.6Policy Resolution191
9.2.7Policy Decorrelation191
9.2.8Policy Compliance Checking193
9.3Revisiting the Road Warrior193
9.4IPsec Policy Solutions194
9.4.1The IPsec Configuration Policy Model195
9.4.2The IPsec Policy Information Base196
9.4.3The Security Policy Protocol196
9.4.4The Security Policy Specification Language200
9.4.5The KeyNote Trust Management System201
9.4.6An Overall Plan203
9.5Summary204
9.6Further Reading204
References204
10The Framework: Public Key Infrastructure (PKI)207
10.1PKI Functional Components208
10.2The PKI World View210
10.3The Life Cycle of a Certificate211
10.4PKI Protocol-Related Components212
10.5Certificates and CRLs215
10.6Certificate Formats216
10.7Certificate Contents218
10.8IKE and IPsec Considerations222
10.9Summary225
10.10Further Reading225
References226
11The Unsolved Puzzle: Secure IP Multicast229
11.1Some Examples230
11.2Multicast Logistics231
11.3Functional Requirements232
11.4Security Requirements233
11.4.1Key Management234
11.4.2Secrecy236
11.4.3Data Integrity236
11.4.4Source Authentication236
11.4.5Order of Cryptographic Operations237
11.4.6Membership Management237
11.4.7Access-Related Issues238
11.4.8Policy Determination238
11.4.9Anonymity238
11.4.10Nonrepudiation239
11.4.11Service Availability239
11.4.12Firewall Traversal239
11.4.13Piracy239
11.5Whither IP Multicast Security?239
11.6Summary240
11.7Further Reading240
References241
12The Whole Puzzle: Is IPsec the Correct Solution?243
12.1Advantages of IPsec244
12.2Disadvantages of IPsec245
12.3Alternatives to IPsec245
12.3.1Transport Layer Security Protocol245
12.3.2Layer 2 Tunneling Protocol245
12.3.3Point-to-Point Tunneling Protocol247
12.4IPsec Today247
12.5The Future of IPsec247
12.6Summary249
12.7Further Reading249
References249
List of Acronyms and Abbreviations251
About the Author261
Index263
From the B&N Reads Blog

Customer Reviews