⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2401.txt

📁 著名的RFC文档,其中有一些文档是已经翻译成中文的的.
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Network Working Group                                            S. KentRequest for Comments: 2401                                      BBN CorpObsoletes: 1825                                              R. AtkinsonCategory: Standards Track                                  @Home Network                                                           November 1998            Security Architecture for the Internet ProtocolStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (1998).  All Rights Reserved.Table of Contents1. Introduction........................................................3  1.1 Summary of Contents of Document..................................3  1.2 Audience.........................................................3  1.3 Related Documents................................................42. Design Objectives...................................................4  2.1 Goals/Objectives/Requirements/Problem Description................4  2.2 Caveats and Assumptions..........................................53. System Overview.....................................................5  3.1 What IPsec Does..................................................6  3.2 How IPsec Works..................................................6  3.3 Where IPsec May Be Implemented...................................74. Security Associations...............................................8  4.1 Definition and Scope.............................................8  4.2 Security Association Functionality..............................10  4.3 Combining Security Associations.................................11  4.4 Security Association Databases..................................13     4.4.1 The Security Policy Database (SPD).........................14     4.4.2 Selectors..................................................17     4.4.3 Security Association Database (SAD)........................21  4.5 Basic Combinations of Security Associations.....................24  4.6 SA and Key Management...........................................26     4.6.1 Manual Techniques..........................................27     4.6.2 Automated SA and Key Management............................27     4.6.3 Locating a Security Gateway................................28  4.7 Security Associations and Multicast.............................29Kent & Atkinson             Standards Track                     [Page 1]RFC 2401              Security Architecture for IP         November 19985. IP Traffic Processing..............................................30  5.1 Outbound IP Traffic Processing..................................30     5.1.1 Selecting and Using an SA or SA Bundle.....................30     5.1.2 Header Construction for Tunnel Mode........................31        5.1.2.1 IPv4 -- Header Construction for Tunnel Mode...........31        5.1.2.2 IPv6 -- Header Construction for Tunnel Mode...........32  5.2 Processing Inbound IP Traffic...................................33     5.2.1 Selecting and Using an SA or SA Bundle.....................33     5.2.2 Handling of AH and ESP tunnels.............................346. ICMP Processing (relevant to IPsec)................................35  6.1 PMTU/DF Processing..............................................36     6.1.1 DF Bit.....................................................36     6.1.2 Path MTU Discovery (PMTU)..................................36        6.1.2.1 Propagation of PMTU...................................36        6.1.2.2 Calculation of PMTU...................................37        6.1.2.3 Granularity of PMTU Processing........................37        6.1.2.4 PMTU Aging............................................387. Auditing...........................................................398. Use in Systems Supporting Information Flow Security................39  8.1 Relationship Between Security Associations and Data Sensitivity.40  8.2 Sensitivity Consistency Checking................................40  8.3 Additional MLS Attributes for Security Association Databases....41  8.4 Additional Inbound Processing Steps for MLS Networking..........41  8.5 Additional Outbound Processing Steps for MLS Networking.........41  8.6 Additional MLS Processing for Security Gateways.................429. Performance Issues.................................................4210. Conformance Requirements..........................................4311. Security Considerations...........................................4312. Differences from RFC 1825.........................................43Acknowledgements......................................................44Appendix A -- Glossary................................................45Appendix B -- Analysis/Discussion of PMTU/DF/Fragmentation Issues.....48  B.1 DF bit..........................................................48  B.2 Fragmentation...................................................48  B.3 Path MTU Discovery..............................................52     B.3.1 Identifying the Originating Host(s)........................53     B.3.2 Calculation of PMTU........................................55     B.3.3 Granularity of Maintaining PMTU Data.......................56     B.3.4 Per Socket Maintenance of PMTU Data........................57     B.3.5 Delivery of PMTU Data to the Transport Layer...............57     B.3.6 Aging of PMTU Data.........................................57Appendix C -- Sequence Space Window Code Example......................58Appendix D -- Categorization of ICMP messages.........................60References............................................................63Disclaimer............................................................64Author Information....................................................65Full Copyright Statement..............................................66Kent & Atkinson             Standards Track                     [Page 2]RFC 2401              Security Architecture for IP         November 19981. Introduction1.1 Summary of Contents of Document   This memo specifies the base architecture for IPsec compliant   systems.  The goal of the architecture is to provide various security   services for traffic at the IP layer, in both the IPv4 and IPv6   environments.  This document describes the goals of such systems,   their components and how they fit together with each other and into   the IP environment.  It also describes the security services offered   by the IPsec protocols, and how these services can be employed in the   IP environment.  This document does not address all aspects of IPsec   architecture.  Subsequent documents will address additional   architectural details of a more advanced nature, e.g., use of IPsec   in NAT environments and more complete support for IP multicast.  The   following fundamental components of the IPsec security architecture   are discussed in terms of their underlying, required functionality.   Additional RFCs (see Section 1.3 for pointers to other documents)   define the protocols in (a), (c), and (d).        a. Security Protocols -- Authentication Header (AH) and           Encapsulating Security Payload (ESP)        b. Security Associations -- what they are and how they work,           how they are managed, associated processing        c. Key Management -- manual and automatic (The Internet Key           Exchange (IKE))        d. Algorithms for authentication and encryption   This document is not an overall Security Architecture for the   Internet; it addresses security only at the IP layer, provided   through the use of a combination of cryptographic and protocol   security mechanisms.   The keywords MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD,   SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL, when they appear in this   document, are to be interpreted as described in RFC 2119 [Bra97].1.2 Audience   The target audience for this document includes implementers of this   IP security technology and others interested in gaining a general   background understanding of this system.  In particular, prospective   users of this technology (end users or system administrators) are   part of the target audience.  A glossary is provided as an appendixKent & Atkinson             Standards Track                     [Page 3]RFC 2401              Security Architecture for IP         November 1998   to help fill in gaps in background/vocabulary.  This document assumes   that the reader is familiar with the Internet Protocol, related   networking technology, and general security terms and concepts.1.3 Related Documents   As mentioned above, other documents provide detailed definitions of   some of the components of IPsec and of their inter-relationship.   They include RFCs on the following topics:        a. "IP Security Document Roadmap" [TDG97] -- a document           providing guidelines for specifications describing encryption           and authentication algorithms used in this system.        b. security protocols -- RFCs describing the Authentication           Header (AH) [KA98a] and Encapsulating Security Payload (ESP)           [KA98b] protocols.        c. algorithms for authentication and encryption -- a separate           RFC for each algorithm.        d. automatic key management -- RFCs on "The Internet Key           Exchange (IKE)" [HC98], "Internet Security Association and           Key Management Protocol (ISAKMP)" [MSST97],"The OAKLEY Key           Determination Protocol" [Orm97], and "The Internet IP           Security Domain of Interpretation for ISAKMP" [Pip98].2. Design Objectives2.1 Goals/Objectives/Requirements/Problem Description   IPsec is designed to provide interoperable, high quality,   cryptographically-based security for IPv4 and IPv6.  The set of   security services offered includes access control, connectionless   integrity, data origin authentication, protection against replays (a   form of partial sequence integrity), confidentiality (encryption),   and limited traffic flow confidentiality.  These services are   provided at the IP layer, offering protection for IP and/or upper   layer protocols.   These objectives are met through the use of two traffic security   protocols, the Authentication Header (AH) and the Encapsulating   Security Payload (ESP), and through the use of cryptographic key   management procedures and protocols.  The set of IPsec protocols   employed in any context, and the ways in which they are employed,   will be determined by the security and system requirements of users,   applications, and/or sites/organizations.   When these mechanisms are correctly implemented and deployed, they   ought not to adversely affect users, hosts, and other Internet   components that do not employ these security mechanisms forKent & Atkinson             Standards Track                     [Page 4]RFC 2401              Security Architecture for IP         November 1998   protection of their traffic.  These mechanisms also are designed to   be algorithm-independent.  This modularity permits selection of   different sets of algorithms without affecting the other parts of the   implementation.  For example, different user communities may select   different sets of algorithms (creating cliques) if required.   A standard set of default algorithms is specified to facilitate   interoperability in the global Internet.  The use of these   algorithms, in conjunction with IPsec traffic protection and key   management protocols, is intended to permit system and application   developers to deploy high quality, Internet layer, cryptographic   security technology.2.2 Caveats and Assumptions   The suite of IPsec protocols and associated default algorithms are   designed to provide high quality security for Internet traffic.   However, the security offered by use of these protocols ultimately   depends on the quality of the their implementation, which is outside   the scope of this set of standards.  Moreover, the security of a   computer system or network is a function of many factors, including   personnel, physical, procedural, compromising emanations, and   computer security practices.  Thus IPsec is only one part of an   overall system security architecture.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -