IPsec Protection Protocols
Authentication Header (AH)
Encapsulating Security Payload (ESP)
IPsec provides two security protocols forprotecting data:
AH provides data integrity by using an authentication algorithm. It does not encrypt the packet.
ESP typically protects the packet with an encryption algorithm and provides data integrity with an authentication algorithm. Some encryption algorithms provide both encryption and authentication, such as AES GCM.
The AH protocol cannot be used with network address translation (NAT).
Authentication Header
The authentication header provides dataauthentication, strong integrity, and replay protection to IP packets. AH protects the greater partof the IP packet. As the following illustration shows, AH is inserted between the IP header and thetransport header.
The transport header can be TCP, UDP, SCTP, or ICMP. If a tunnel is beingused, the transport header can be another IP header.
Encapsulating Security Payload
The encapsulating security payload (ESP) protocol provides confidentiality over what theESP encapsulates. ESP also provides the services that AH provides. However,ESP does not protect the outer IP header.ESP provides authentication services to ensure the integrity of theprotected packet. Because ESP uses encryption-enabling technology, a systemthat provides ESP can be subject to import and export control laws.
The ESP header and trailer encapsulate the IP payload. When encryption is used with ESP, it is applied only over the IP payload data, as shown in the followingillustration.
In a TCP packet, the ESP header is authenticated and it encapsulates the TCP header and itsdata. If the packet is an IP-in-IP packet, ESP protects the inner IP packet. Per-socket policyallows self-encapsulation, so ESP can encapsulate IP options when necessary.
Self-encapsulation can be used by writing a program that uses the setsockopt() system call. If self-encapsulation is set, a copy of the IP header is made to construct an IP-in-IP packet. For example, when self-encapsulation is not set on a TCP socket, the packet is sent in the followingformat:
[ IP(a -> b) options + TCP + data ]
When self-encapsulation is set on that TCP socket, the packet is sent in the followingformat:
[ IP(a -> b) + ESP [ IP(a -> b) options + TCP + data ] ]
For further discussion, see Transport and Tunnel Modes in IPsec.
Security Considerations When Using AH and ESP
The following table compares the protections that are provided by AH and ESP.
|
Authentication and Encryption Algorithms in IPsec
IPsec security uses two types of algorithms, authenticationand encryption. The AH protocol uses authentication algorithms. The ESP protocol can use encryption as well as authentication algorithms. You can obtain alist of the algorithms on your system and their properties by using the ipsecalgs command. For more information, see the ipsecalgs(1M) man page.You can also use the functions that are described in the getipsecalgbyname(3NSL) man page to retrieve the properties of algorithms.
IPsec uses the Cryptographic Framework to perform encryption and authentication. The Cryptographic Framework enables IPsec to take advantage of hardware acceleration where the hardware supports it.