25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22.4.2 Authentication Header (AH)<br />

AH is used to provide integrity <strong>and</strong> authentication to <strong>IP</strong> datagrams. Replay<br />

protection is also possible. Although its usage is optional, the replay protection<br />

service must be implemented by any <strong>IP</strong>Sec-compliant system. The services are<br />

connectionless, that is, they work on a per-packet basis. AH is used in two<br />

modes, transport mode <strong>and</strong> tunnel mode.<br />

AH authenticates as much of the <strong>IP</strong> datagram as possible. In transport mode,<br />

some fields in the <strong>IP</strong> header change en-route <strong>and</strong> their value cannot be predicted<br />

by the receiver. These fields are called mutable <strong>and</strong> are not protected by AH.<br />

The mutable <strong>IP</strong>v4 fields are:<br />

► Type of service (TOS)<br />

► Flags<br />

► Fragment offset<br />

► Time to live (TTL)<br />

► Header checksum<br />

When protection of these fields is required, tunneling must be used. The payload<br />

of the <strong>IP</strong> packet is considered immutable <strong>and</strong> is always protected by AH.<br />

AH is identified by protocol number 51, assigned by the IANA. The protocol<br />

header (<strong>IP</strong>v4, <strong>IP</strong>v6, or extension) immediately preceding the AH contains this<br />

value in its protocol (<strong>IP</strong>v4) or Next header (<strong>IP</strong>v6, extension) field.<br />

AH processing is applied only to non-fragmented <strong>IP</strong> packets. However, an <strong>IP</strong><br />

packet with AH applied can be fragmented by intermediate routers. In this case,<br />

the destination first reassembles the packet <strong>and</strong> then applies AH processing to it.<br />

If an <strong>IP</strong> packet that appears to be a fragment (offset field is non-zero, or the More<br />

Fragments bit is set) is input to AH processing, it is discarded. This prevents the<br />

so-called overlapping fragment attack, which misuses the fragment reassembly<br />

algorithm in order to create forged packets <strong>and</strong> force them through a firewall.<br />

Packets that fail authentication are discarded <strong>and</strong> never delivered to upper<br />

layers. This mode of operation greatly reduces the chances of successful<br />

denial-of-service attacks, which aim to block the communication of a host or<br />

gateway by flooding it with bogus packets.<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 813

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!