Chinaunix首页 | 论坛 | 博客
  • 博客访问: 800204
  • 博文数量: 102
  • 博客积分: 10011
  • 博客等级: 上将
  • 技术积分: 2301
  • 用 户 组: 普通用户
  • 注册时间: 2006-10-08 13:00
文章存档

2011年(2)

2010年(30)

2009年(25)

2008年(45)

我的朋友

分类: 系统运维

2010-09-27 10:14:51

Module 3  Lesson 3: Security in IPv6

 

Security in IPv6—Objectives

Upon completion of this lesson , you will be able to :

Ø Describe how security is implemented in IPv6

Ø Describe AH and ESP security headers

Ø Describe IPv6 security issues (NAT,IKE)

1 Security –IPSec authentication Header

Ø Integrity

Ø Authentication of the source

Ø Optional replay protection

Security inside IPv6 is achieved by IPSec’s own protocols, IPSec is available in both IPv4 and IPv6, but it is mandatory in IPv6, IPSec has two separate header that can be chained in the same IPv6 packet through extension headers, there are many related protocols for IPSec such as the key management protocols

Authentication header (AH) provides integrity and authentication of the source , it also provides optional protection against replays, it protects the integrity of most of the IP header fields, but not all  as some change over the path, it authenticates the source through a signature-based algorithm,

The key difference between IPv4 and IPv6 related to security is the fact that IPSec is mandatory for IPv6, this means that all IP communications can be secured , if there is enough keying infrastructure to do on a large scale basis.

The other IPSec Security header is the Encapsulating Security Payload (ESP) header. It provides confidentiality, authentication of the source, connectionless integrity of the inner packet, anti-replay and limited traffic flow confidentiality.

2 IKE Issues

      Internet Key Exchange (IKE) is the mechanism IPsec nodes use to change keys periodically to defeat eavesdropping/sampling attacks

      Keys must be securely rolled over before sequence number cycles to use anti-replay service

      Small key lengths and fast networks means keys must be rolled frequently – before 2^32 pkts are sent

      Most currently shipping IPsec IPv6 stacks do not include IKE support, so manual keys must be used and managed

      Key infrastructure is still lacking wide deployment, so any IPsec implementation will be difficult to scale

Note:

Ø Internet Security Association and Key Management Protocol (ISAKMP) combines authentication, key management and Security Associations (SA) management to build secure communication channels between hosts.

Ø Internet Key Exchange (IKE) can be used to negotiate security associations. 

Ø Regardless of the initial SA setup, even if symmetric pre-shared keys are used, the shared key must be rolled over (changed) before the sequence numbers (also called the initialization vector) are reused.

Ø For IPsec ESP, the sequence number is a 32-bit value, which means that a shared key can be used (securely) for no more than 4Billion packets before the key should be changed.  IKE provides a mechanism to securely change the shared key.

Ø Most IPsec implementations for IPv4 support IKE.  Most implementations for IPv6 do not at this time – static keys must be used and changed manually (rarely done).  Thus, for IPv6, many times shared keys remain constant for much too long, resulting in security risk.

3 NAT Issues

      IPsec provides the ability to ensure packets are not modified in transit (AH) or viewed in transit (ESP)

      NAT, by definition, modifies packets

      Workarounds exist (NAT UDP Traversal) but are still not highly interoperable, and are still being discussed in the standards groups

      IPsec works best as a secure connection between peers, with packets not modified in any way between these endpoints

阅读(623) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~