Ip Security
Ip Security
• The IP packets contain data in plain text form. That is, anyone
watching the IP packets pass by can actually access them, read
their contents and even change them.
• We have studied higher-level security mechanisms (such as SSL,
SHTTP, PGP, PEM, S/MIME and SET) to prevent such kinds of
attacks.
• Although these higher-level protocols enhance the protection
mechanisms, there was a general feeling for a long time that
why not secure IP packets themselves? If we can achieve this,
then we need not rely only on the higher-level security
mechanisms.
• The higher-level security mechanisms can then serve as
additional security measures.
we will have two levels of security in this scheme:
• First offer security at the IP packet level itself.
• Continue implementing higher-level security
mechanisms, depending on the requirements.
• In 1994, the Internet Architecture Board (IAB)
prepared a report, called as Security in the Internet
Architecture (RFC 1636).
• This report stated that the Internet was a very open
network, which was unprotected from hostile
attacks.
• Therefore, said the report, the Internet needs
better security measures, in terms of
authentication, integrity and confidentiality.
• The outcome of the study and IAB’s report is the
protocol for providing security at the IP level, called
as IP Security (IPSec).
• In 1995, the Internet Engineering Task Force (IETF)
published five security based standards related to
IPSec, as shown in Table 9.2.
IPv4 may support these features,
but IPv6 must support them.
The logical format of a message after IPSec processing is
shown in Fig. 9.26
Applications and advantages
• Secure remote Internet access: Using IPSec, we can make a local call to
our Internet Service Provider (ISP) so as to connect to our organization’s
network in a secure fashion from our home or hotel. From there, we can
access the corporate network facilities or access remote desktops/
servers.
• Secure branch office connectivity: Rather than subscribing to an
expensive leased line for connecting its branches across cities/countries,
an organization can set up an IPSec-enabled network to securely connect
all its branches over the Internet.
• Set up communication with other organizations: Just as IPSec allows
connectivity between various branches of an organization, it can also be
used to connect the networks of different organizations together in a
secure and inexpensive fashion.
Advantages
• IPSec is transparent to the end users. There is no need for an
user training, key issuance or revocation.
• When IPSec is configured to work with a firewall, it becomes
the only entry-exit point for all traffic; making it extra
secure.
• IPSec works at the network layer
• When IPSec is implemented in a firewall or a router, all the
outgoing and incoming traffic gets protected. However, the
internal traffic does not have to use IPSec. Thus, it does not
add any overheads for the internal traffic.
• IPSec can allow traveling staff to have secure access to the
corporate network.
• IPSec allows interconnectivity between branches/offices in a
very inexpensive manner.
IPSec Protocols