SORT BY:

LIST ORDER
THREAD
AUTHOR
SUBJECT


SEARCH

IPS HOME


    [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

    Underlying IPSec requirements



    
    The IP Storage security requirements are specified in the iSCSI and FCIP
    draft RFCs and are repeated and elaborated in the Security paper. This is
    beneficial in that it provides a comprehensive summary of IPSec and it
    clarifies the "subset" of IPSec that is required. However, it is not clear
    the extent to which IPSec specifications not explicitly mentioned in the IPS
    Security paper must be supported.  
    
    For example, IKE supports the negotiation of a lifetime for the Security
    Association. This can be either in seconds or kilobytes. My interpretation
    is that this must be supported, but other people I have talked to have not
    reached the same conclusion.
    
    If the intent is that IPSec requirements not specifically mentioned in the
    IPS drafts must be supported, a statement to this effect should be added to
    the documents.
    
    A clear summary of the requirements for all configurable IPsec parameters
    should be provided. Following is a list of these parameters. Most are well
    summarized; are few are not. An * indicates those that are not well covered
    by the IPS drafts:
    
        IPSec end points: 
        Connection: Source IP:Port, Destination IP:Port
        Protocol: TCP/UDP
    	Tunnel or Transport mode 
    	    Tunnel mode: 
    		destination address for source machine
    		*protected addresses for gateway machine
        IKE Negotiation options:
    	ESP or AH
    	    ESP: acceptable hash algorithms, encryption algorithms
    	    AH: acceptable hash algorithms
    	Authentication method: Shared secret/Certificates
    	Action on sequence number wrap (anti-replay)
    	Perfect Forward Secrecy
    	*Lifetime: seconds/kilobytes
    	*ESP padding
    
    Tunnel mode protected addresses: 
    An important IPSec requirement is that the receiving end must check all IP
    packets against the security policy and drop the packet if security is
    required. In order to do this on a gateway machine, the machine must know
    which destinations behind the gateway require security and which do not. The
    method of specifying host addresses, subnet addresses, etc. has been an area
    of major interoperability problems in IPSec.
    
    ESP padding:
    IPSec supports the option of adding a variable amount of padding to the ESP
    payload, for the purposes of impeding traffic analysis by size of packets.
    Most IPSec implementation seem to ignore this option and do not make it
    available to the user.
    
    
    


Home

Last updated: Mon Feb 18 11:17:59 2002
8781 messages in chronological order