10 IPSec Flashcards

(13 cards)

1
Q

IPSec offers two basic protocols for data transmission. Name both and brieflz describe their properties

A
  1. Authentication Header (AH)
  2. Encapsulating Security Protocol (ESP)

AH provides data origin authentication, integrity protection, and replay protection.
Inserted between the IP header and the data to be protected.

ESP provides confidentiallity and data origin authentication and replay protection. A header and a trailer encapsulating the data to be protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are these 2 endpoints?

A
  1. Cryptographic endpoints
  2. Communication endpoints
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is cryptographic Endpoints?

A

Entities that process IPSec headers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Communication Endpoints?

A

Source and destination of an IP packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many Security Associations are required for bidirectional communication

A

2 security association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many SAs are required for bidirectional IPSec secure channel with both AH and ESP protection?

A

bidirectional communitation requires 2 SAs for each transform. resulting 4 SAs for two transformations in duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is it a good idea to manually configue SAs? Why?

A

Is possible but generally bad idea.
- The chosen keys might be insecure and not provide PFS
- Manual configuation is error prone
- Mnaua configuation doesnt scale

Use key management negotiation deamon such as IKE instead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 exchanges from IKEv2 protocol?

A

IKE_SA_INIT: IKE SA parameters, nonces, DH values
IKE_AUTH: Initiator& Responder identities, Auth previous messages, prove knowledge of secrets, first CHILD_SA parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Aftre IKEv2 exchanges are done, which data has been negotiated?

A

After the two exchanges, an IKE security association, as well as an IPSec child security association have been established.
All messages and the identities of Initiator&Responder have been authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between an IPSec Security Policy and Securiy Association

A

Security Policy: Description of how security services should be provided to categories of packets
Security Association: Explicit packet transformations for simplex channel between two communication parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Diffie Hellman key exchange do

A

Establish a shared secret session key over an secure network, wirhout pre shared keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Requirements for PFS

A
  1. sessiont kezs must from ephemeral secrets
  2. Ephemeral secrets must be deleted after the session
    long term key leak must not allow recovery of old session keys
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly