IPsec Protection Protocols Securing the Network in Oracle® Solaris 11.3 (2024)

IPsec Protection Protocols

    IPsec provides two security protocols forprotecting data:

  • Authentication Header (AH)

  • Encapsulating Security Payload (ESP)

AH provides data integrity by using an authentication algorithm. It does not encrypt the packet.

ESP typically protects the packet with an encryption algorithm and provides data integrity with an authentication algorithm. Some encryption algorithms provide both encryption and authentication, such as AES GCM.

The AH protocol cannot be used with network address translation (NAT).

Authentication Header

The authentication header provides dataauthentication, strong integrity, and replay protection to IP packets. AH protects the greater partof the IP packet. As the following illustration shows, AH is inserted between the IP header and thetransport header.

IPsec Protection Protocols Securing the Network in Oracle® Solaris 11.3 (1)

The transport header can be TCP, UDP, SCTP, or ICMP. If a tunnel is beingused, the transport header can be another IP header.

Encapsulating Security Payload

The encapsulating security payload (ESP) protocol provides confidentiality over what theESP encapsulates. ESP also provides the services that AH provides. However,ESP does not protect the outer IP header.ESP provides authentication services to ensure the integrity of theprotected packet. Because ESP uses encryption-enabling technology, a systemthat provides ESP can be subject to import and export control laws.

The ESP header and trailer encapsulate the IP payload. When encryption is used with ESP, it is applied only over the IP payload data, as shown in the followingillustration.

IPsec Protection Protocols Securing the Network in Oracle® Solaris 11.3 (2)

In a TCP packet, the ESP header is authenticated and it encapsulates the TCP header and itsdata. If the packet is an IP-in-IP packet, ESP protects the inner IP packet. Per-socket policyallows self-encapsulation, so ESP can encapsulate IP options when necessary.

Self-encapsulation can be used by writing a program that uses the setsockopt() system call. If self-encapsulation is set, a copy of the IP header is made to construct an IP-in-IP packet. For example, when self-encapsulation is not set on a TCP socket, the packet is sent in the followingformat:

[ IP(a -> b) options + TCP + data ]

When self-encapsulation is set on that TCP socket, the packet is sent in the followingformat:

[ IP(a -> b) + ESP [ IP(a -> b) options + TCP + data ] ]

For further discussion, see Transport and Tunnel Modes in IPsec.

Security Considerations When Using AH and ESP

The following table compares the protections that are provided by AH and ESP.

Table9Protections Provided by AH and ESP in IPsec

Protocol

Packet Coverage

Protection

Against Attacks

AH

Protects packet from the IP header to the end of the transport data

Provides strong integrity, data authentication:

  • Ensures that the receiver receives exactly what the sendersent

  • Is susceptible to replay attacks when an AH does not enable replay protection

Replay, cut-and-paste

ESP

Protects packet from the ESP header to the end of the transport data

With encryption option, encrypts the IP payload. Ensures confidentiality

Eavesdropping

With authentication option, provides the same payload protection asAH

Replay, cut-and-paste

With both options, provides strong integrity, data authentication, andconfidentiality

Replay, cut-and-paste, eavesdropping

Authentication and Encryption Algorithms in IPsec

IPsec security uses two types of algorithms, authenticationand encryption. The AH protocol uses authentication algorithms. The ESP protocol can use encryption as well as authentication algorithms. You can obtain alist of the algorithms on your system and their properties by using the ipsecalgs command. For more information, see the ipsecalgs(1M) man page.You can also use the functions that are described in the getipsecalgbyname(3NSL) man page to retrieve the properties of algorithms.

IPsec uses the Cryptographic Framework to perform encryption and authentication. The Cryptographic Framework enables IPsec to take advantage of hardware acceleration where the hardware supports it.

IPsec Protection Protocols 
Securing the Network in Oracle® Solaris 11.3 (2024)
Top Articles
Top Stocks Under Rs. 10: List of Low Priced Shares to Buy in India (2024)
Groww FAQs
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Free Atm For Emerald Card Near Me
Craigslist Mexico Cancun
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Doby's Funeral Home Obituaries
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Select Truck Greensboro
Things To Do In Atlanta Tomorrow Night
Non Sequitur
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Craigslist In Flagstaff
Shasta County Most Wanted 2022
Energy Healing Conference Utah
Testberichte zu E-Bikes & Fahrrädern von PROPHETE.
Aaa Saugus Ma Appointment
Geometry Review Quiz 5 Answer Key
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Pixel Combat Unblocked
Cvs Sport Physicals
Mercedes W204 Belt Diagram
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Facebook Marketplace Marrero La
Nobodyhome.tv Reddit
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hampton In And Suites Near Me
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Bedbathandbeyond Flemington Nj
Otter Bustr
Selly Medaline
Latest Posts
Article information

Author: Sen. Emmett Berge

Last Updated:

Views: 5716

Rating: 5 / 5 (60 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Sen. Emmett Berge

Birthday: 1993-06-17

Address: 787 Elvis Divide, Port Brice, OH 24507-6802

Phone: +9779049645255

Job: Senior Healthcare Specialist

Hobby: Cycling, Model building, Kitesurfing, Origami, Lapidary, Dance, Basketball

Introduction: My name is Sen. Emmett Berge, I am a funny, vast, charming, courageous, enthusiastic, jolly, famous person who loves writing and wants to share my knowledge and understanding with you.