⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2401.txt

📁 中、英文RFC文档大全打包下载完全版 .
💻 TXT
📖 第 1 页 / 共 5 页
字号:
   In summary,           a) A host MUST support both transport and tunnel mode.           b) A security gateway is required to support only tunnel              mode.  If it supports transport mode, that should be used              only when the security gateway is acting as a host, e.g.,              for network management.4.2 Security Association Functionality   The set of security services offered by an SA depends on the security   protocol selected, the SA mode, the endpoints of the SA, and on the   election of optional services within the protocol.  For example, AH   provides data origin authentication and connectionless integrity for   IP datagrams (hereafter referred to as just "authentication").  The   "precision" of the authentication service is a function of the   granularity of the security association with which AH is employed, as   discussed in Section 4.4.2, "Selectors".   AH also offers an anti-replay (partial sequence integrity) service at   the discretion of the receiver, to help counter denial of service   attacks.  AH is an appropriate protocol to employ when   confidentiality is not required (or is not permitted, e.g , due to   government restrictions on use of encryption).  AH also provides   authentication for selected portions of the IP header, which may be   necessary in some contexts.  For example, if the integrity of an IPv4   option or IPv6 extension header must be protected en route between   sender and receiver, AH can provide this service (except for the   non-predictable but mutable parts of the IP header.)   ESP optionally provides confidentiality for traffic.  (The strength   of the confidentiality service depends in part, on the encryption   algorithm employed.)  ESP also may optionally provide authentication   (as defined above).  If authentication is negotiated for an ESP SA,   the receiver also may elect to enforce an anti-replay service with   the same features as the AH anti-replay service.  The scope of the   authentication offered by ESP is narrower than for AH, i.e., the IP   header(s) "outside" the ESP header is(are) not protected.  If only   the upper layer protocols need to be authenticated, then ESP   authentication is an appropriate choice and is more space efficient   than use of AH encapsulating ESP.  Note that although both   confidentiality and authentication are optional, they cannot both be   omitted. At least one of them MUST be selected.   If confidentiality service is selected, then an ESP (tunnel mode) SA   between two security gateways can offer partial traffic flow   confidentiality.  The use of tunnel mode allows the inner IP headers   to be encrypted, concealing the identities of the (ultimate) traffic   source and destination.  Moreover, ESP payload padding also can beKent & Atkinson             Standards Track                    [Page 10]RFC 2401              Security Architecture for IP         November 1998   invoked to hide the size of the packets, further concealing the   external characteristics of the traffic.  Similar traffic flow   confidentiality services may be offered when a mobile user is   assigned a dynamic IP address in a dialup context, and establishes a   (tunnel mode) ESP SA to a corporate firewall (acting as a security   gateway).  Note that fine granularity SAs generally are more   vulnerable to traffic analysis than coarse granularity ones which are   carrying traffic from many subscribers.4.3 Combining Security Associations   The IP datagrams transmitted over an individual SA are afforded   protection by exactly one security protocol, either AH or ESP, but   not both.  Sometimes a security policy may call for a combination of   services for a particular traffic flow that is not achievable with a   single SA.  In such instances it will be necessary to employ multiple   SAs to implement the required security policy.  The term "security   association bundle" or "SA bundle" is applied to a sequence of SAs   through which traffic must be processed to satisfy a security policy.   The order of the sequence is defined by the policy.  (Note that the   SAs that comprise a bundle may terminate at different endpoints. For   example, one SA may extend between a mobile host and a security   gateway and a second, nested SA may extend to a host behind the   gateway.)   Security associations may be combined into bundles in two ways:   transport adjacency and iterated tunneling.           o Transport adjacency refers to applying more than one             security protocol to the same IP datagram, without invoking             tunneling.  This approach to combining AH and ESP allows             for only one level of combination; further nesting yields             no added benefit (assuming use of adequately strong             algorithms in each protocol) since the processing is             performed at one IPsec instance at the (ultimate)             destination.             Host 1 --- Security ---- Internet -- Security --- Host 2              | |        Gwy 1                      Gwy 2        | |              | |                                                | |              | -----Security Association 1 (ESP transport)------- |              |                                                    |              -------Security Association 2 (AH transport)----------           o Iterated tunneling refers to the application of multiple             layers of security protocols effected through IP tunneling.             This approach allows for multiple levels of nesting, since             each tunnel can originate or terminate at a different IPsecKent & Atkinson             Standards Track                    [Page 11]RFC 2401              Security Architecture for IP         November 1998             site along the path.  No special treatment is expected for             ISAKMP traffic at intermediate security gateways other than             what can be specified through appropriate SPD entries (See             Case 3 in Section 4.5)             There are 3 basic cases of iterated tunneling -- support is             required only for cases 2 and 3.:             1. both endpoints for the SAs are the same -- The inner and                outer tunnels could each be either AH or ESP, though it                is unlikely that Host 1 would specify both to be the                same, i.e., AH inside of AH or ESP inside of ESP.                Host 1 --- Security ---- Internet -- Security --- Host 2                 | |        Gwy 1                      Gwy 2        | |                 | |                                                | |                 | -------Security Association 1 (tunnel)---------- | |                 |                                                    |                 ---------Security Association 2 (tunnel)--------------             2. one endpoint of the SAs is the same -- The inner and                uter tunnels could each be either AH or ESP.                Host 1 --- Security ---- Internet -- Security --- Host 2                 | |        Gwy 1                      Gwy 2         |                 | |                                     |           |                 | ----Security Association 1 (tunnel)----           |                 |                                                   |                 ---------Security Association 2 (tunnel)-------------             3. neither endpoint is the same -- The inner and outer                tunnels could each be either AH or ESP.                Host 1 --- Security ---- Internet -- Security --- Host 2                 |          Gwy 1                      Gwy 2         |                 |            |                          |           |                 |            --Security Assoc 1 (tunnel)-           |                 |                                                   |                 -----------Security Association 2 (tunnel)-----------   These two approaches also can be combined, e.g., an SA bundle could   be constructed from one tunnel mode SA and one or two transport mode   SAs, applied in sequence.  (See Section 4.5 "Basic Combinations of   Security Associations.") Note that nested tunnels can also occur   where neither the source nor the destination endpoints of any of the   tunnels are the same.  In that case, there would be no host or   security gateway with a bundle corresponding to the nested tunnels.Kent & Atkinson             Standards Track                    [Page 12]RFC 2401              Security Architecture for IP         November 1998   For transport mode SAs, only one ordering of security protocols seems   appropriate.  AH is applied to both the upper layer protocols and   (parts of) the IP header.  Thus if AH is used in a transport mode, in   conjunction with ESP, AH SHOULD appear as the first header after IP,   prior to the appearance of ESP.  In that context, AH is applied to   the ciphertext output of ESP.  In contrast, for tunnel mode SAs, one   can imagine uses for various orderings of AH and ESP.  The required   set of SA bundle types that MUST be supported by a compliant IPsec   implementation is described in Section 4.5.4.4 Security Association Databases   Many of the details associated with processing IP traffic in an IPsec   implementation are largely a local matter, not subject to   standardization.  However, some external aspects of the processing   must be standardized, to ensure interoperability and to provide a   minimum management capability that is essential for productive use of   IPsec.  This section describes a general model for processing IP   traffic relative to security associations, in support of these   interoperability and functionality goals.  The model described below   is nominal; compliant implementations need not match details of this   model as presented, but the external behavior of such implementations   must be mappable to the externally observable characteristics of this   model.   There are two nominal databases in this model: the Security Policy   Database and the Security Association Database.  The former specifies   the policies that determine the disposition of all IP traffic inbound   or outbound from a host, security gateway, or BITS or BITW IPsec   implementation.  The latter database contains parameters that are   associated with each (active) security association.  This section   also defines the concept of a Selector, a set of IP and upper layer   protocol field values that is used by the Security Policy Database to   map traffic to a policy, i.e., an SA (or SA bundle).   Each interface for which IPsec is enabled requires nominally separate   inbound vs. outbound databases (SAD and SPD), because of the   directionality of many of the fields that are used as selectors.   Typically there is just one such interface, for a host or security   gateway (SG).  Note that an SG would always have at least 2   interfaces, but the "internal" one to the corporate net, usually   would not have IPsec enabled and so only one pair of SADs and one   pair of SPDs would be needed.  On the other hand, if a host had   multiple interfaces or an SG had multiple external interfaces, it   might be necessary to have separate SAD and SPD pairs for each   interface.Kent & Atkinson             Standards Track                    [Page 13]RFC 2401              Security Architecture for IP         November 19984.4.1 The Security Policy Database (SPD)   Ultimately, a security association is a management construct used to   enforce a security policy in the IPsec environment.  Thus an   essential element of SA processing is an underlying Security Policy   Database (SPD) that specifies what services are to be offered to IP   datagrams and in what fashion.  The form of the database and its   interface are outside the scope of this specification.  However, this   section does specify certain minimum management functionality that   must be provided, to allow a user or system administrator to control   how IPsec is applied to traffic transmitted or received by a host or   transiting a security gateway.   The SPD must be consulted during the processing of all traffic   (INBOUND and OUTBOUND), including non-IPsec traffic.  In order to   support this, the SPD requires distinct entries for inbound and   outbound traffic.  One can think of this as separate SPDs (inbound   vs.  outbound).  In addition, a nominally separate SPD must be   provided for each IPsec-enabled interface.   An SPD must discriminate among traffic that is afforded IPsec   protection and traffic that is allowed to bypass IPsec.  This applies   to the IPsec protection to be applied by a sender and to the IPsec   protection that must be present at the receiver.  For any outbound or   inbound datagram, three processing choices are possible: discard,   bypass IPsec, or apply IPsec.  The first choice refers to traffic   that is not allowed to exit the host, traverse the security gateway,   or be delivered to an application at all.  The second choice refers

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -