IPsec is a list of protocols for securing network connections, but the details and many variations quickly become overwhelming.
Why is there many settings which "quickly becomes overwhelming"?
IPsec provides mechanism, not policy.
Rather than define such-and-such encryption algorithm or a certain authentication function, it provides a framework that allows an implementation to provide nearly anything that both ends agree upon.
IP Datagram
Protocol code | Protocol Description |
---|---|
1 | ICMP — Internet Control Message Protocol |
2 | IGMP — Internet Group Management Protocol |
4 | IP within IP (a kind of encapsulation) |
6 | TCP — Transmission Control Protocol |
17 | UDP — User Datagram Protocol |
41 | IPv6 — next-generation TCP/IP |
47 | GRE — Generic Router Encapsulation (used by PPTP) |
50 | IPsec: ESP — Encapsulating Security Payload |
51 | IPsec: AH — Authentication Header |
Authentication Algorithms
AH carries an Integrity Check Value in the Authentication Data portion of the header, and it's typically (but not always) built on top of standard cryptographic hash algorithms such as MD5 or SHA-1.
Rather than use a straight checksum, which would provide no real security against intentional tampering, it uses a Hashed Message Authentication Code (HMAC) which incorporates a secret value while creating the ICV. Though an attacker can easily recompute a hash, without the secret value he won't be able to recreate the proper ICV.
http://www.unixwiz.net/techtips/iguide-ipsec.html
http://www.unixwiz.net/techtips/iguide-ipsec.html
Hi, Adi here.
ReplyDeleteI think you need to explain more directly what IPSec means, as it isn't so clear from your post what it is exactly.
There is also a discontinuity between each point you've listed up above. They don't seem to be related to the previous points, nor do they flow together at all. I had a hard time understanding what you were trying to say.
The images were not very helpful either. Sorry to be so harsh.