26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TCP/IP SUITE AND INTERNET STACK PROTOCOLS 39<br />

Source routing: The source routing extension header combines the concepts of the strict<br />

source route and the loose source route options of IPv4. The source routing extension is<br />

used when the source wants to specify the transmission path.<br />

The source routing header contains a minimum of seven fields which are expressed in<br />

a unified form as follows:<br />

– The next header and header length are identical to that of hop-by-hop extension header.<br />

– The type field defines loose or strict routing.<br />

– The address left field indicates the number of hops still needed to reach the destination.<br />

– The strict/loose mask field determines the rigidity of routing.<br />

– The destination address in source routing changes from router to router.<br />

The fragmentation extension is used if the payload is a fragment of a message. The<br />

concept of fragmentation is the same as that in IPv4 except that where fragmentation<br />

takes place differs. In IPv4, the source or router is required to fragment if the size of<br />

the datagram is larger than the MTU of the network. In IPv6, only the original source<br />

can fragment using the Path MTU Discovery technique. If the source does not use this<br />

technique, it should fragment the datagram to a size of 576 bytes or smaller, which is the<br />

minimum size of MTU required for each network connected to the <strong>Internet</strong>.<br />

Encrypted <strong>Security</strong> Payload (ESP): The ESP is an extension that provides confidentiality<br />

between sender and receiver and guards against eavesdropping. The ESP format<br />

contains the security parameter index field and the encrypted data field. The security<br />

parameter index field is a 32-bit word that defines the type of encryption/decryption used.<br />

The encrypted data field contains the data being encrypted along with any extra parameters<br />

needed by the algorithm. Encryption can be implemented in two ways: transport<br />

mode and tunnel mode, as shown in Figure 2.9. The transport-mode method encrypts<br />

TCP or UDP<br />

Datagram<br />

Base header<br />

Extension headers<br />

IP<br />

Datagram<br />

Key<br />

Encryption<br />

Base header<br />

Extension headers<br />

SPI<br />

Encrypted data<br />

(Encapsulated in an IPv6 packet)<br />

(a) Transport-mode encryption<br />

Key<br />

New IPv6 header<br />

Encryption Encrypted packet<br />

(Encapsulated in an IPv6 packet)<br />

(b) Tunnel-mode encryption<br />

Figure 2.9 Encrypted security payload.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!