25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

When Host-B receives this message <strong>and</strong> verifies the hash, both systems can<br />

begin to use the negotiated security protocols to protect their user data streams.<br />

Negotiating multiple Security Associations<br />

It is also possible to negotiate multiple Security Associations, each with its own<br />

set of keying material, within a single three-message Quick Mode exchange.<br />

The message formats are very similar to the previously illustrated ones, so we<br />

only highlight the differences:<br />

► Message 1 carries multiple Security Association payloads, each offering a<br />

range of protection suites.<br />

► HASH_1 covers the entire set of all offered Security Associations carried in<br />

message 1. That is, each Security Association <strong>and</strong> all of its offered proposals<br />

are included.<br />

► In message 2, for each offered SA, Host-B selects a single protection suite.<br />

That is, if n SAs are open for negotiation, Host-B chooses n protection suites,<br />

one from each proposal.<br />

► As was the case for HASH_1, HASH_2 now covers the entire set of all offered<br />

Security Associations carried in message 1. That is, each Security<br />

Association <strong>and</strong> all of its offered proposals are included.<br />

► After messages 1 <strong>and</strong> 2 have been exchanged, Host-A <strong>and</strong> Host-B generate<br />

the keying material for each of the accepted protection suites, using the same<br />

formulas as in “Generating the keys (phase 2)” on page 844, applied<br />

individually for each accepted SA. Even though the nonces <strong>and</strong> the public<br />

Diffie-Hellman values are the same for all selected suites, the keying material<br />

derived for each selected protection suite is different because each proposal<br />

has a different SPI.<br />

► Because multiple Security Associations have been negotiated, it is a matter of<br />

local choice as to which one is used to protect a given datagram. A receiving<br />

system must be capable of processing a datagram that is protected by any<br />

SA that has been negotiated. That is, it is legal for a given source host to send<br />

two consecutive datagrams to a destination system, where each datagram<br />

was protected by a different SA.<br />

Using IKE with remote access<br />

The critical element in the remote access scenario is the use of Oakley to identify<br />

the remote host by name, rather than by its dynamically assigned <strong>IP</strong> address.<br />

After the remote host's identity has been authenticated <strong>and</strong> the mapping to its<br />

dynamically assigned <strong>IP</strong> address has been ascertained, the remainder of the<br />

processes are the same as we have described for the other scenarios. For<br />

example, if the corporate intranet is considered to be trusted, the remote host<br />

needs to establish a single SA between itself <strong>and</strong> the firewall. But if the corporate<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 845

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!