13.07.2015 Views

ericssonhistory.com

ericssonhistory.com

ericssonhistory.com

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

crypt all subsequent packets and to appenda MAC field to each packet.The different protocols protect informationat different levels in the protocol stack. TheIP security (IPsec) protocol, which is a technologythat protects all IP packets at the networklayer, forms a secure layer from onenetwork node to another. IPsec can even beused to create IP-based VPNs. However, theprotocol does not stipulate how peers are tobe authenticated or session keys are exchanged.These tasks are handled by the Internetkey exchange (IKE) protocol.The secure shell (SSH) protocol is the basicprotocol for remote terminal connectionsover the Internet. It is used to make securetext-based management connections to networknodes. The transport level security(TLS, formerly secure socket layer, SSL) protocolis used to protect secure Web servers,such as those used in Internet banking solutions.The WAP Forum has standardizedits own version of the TLS protocol, calledwireless TLS (WTLS). An important distinctionbetween the two protocols is thatWTLS can be used over an unreliable transportlayer such as the user datagram protocol(UDP); TLS cannot (Figure 6).IPsec, SSH, and TLS are useful in theirown special areas. For a terminal-connectionFigure 6The different security layers and their positions in an IP stack.application, SSH has authentication mechanismsthat make it the best choice. Forclient-server applications where the clientside involves human interaction, TLS is preferred.However, to encrypt all packets, includingconnectionless packets and IP controlpackets, IPsec is a good choice. IPsec isBOX C, IKEThe Internet key exchange (IKE) protocol is usedto establish a security association (SA) betweentwo peers. An SA is a shared secret (togetherwith a policy for the secret) between the <strong>com</strong>municatingparties. The SA is needed to protectreal <strong>com</strong>munication between peers. IKE is generallyused to negotiate an SA for IPsec. IKE isbased on the Internet security association andkey management protocol (ISAKMP), whichsuggests a key negotiation based on two differentphases:Phase IThe two peers establish a secure channel for further<strong>com</strong>munication by negotiating ISAKMPSAs.Phase IIUnder the protection of the SA negotiated inPhase I, the peers negotiate SAs that can beused to protect real <strong>com</strong>munication; that is, theIPsec SA.IKE defines two Phase I modes:• MAIN MODE gives authenticated keyexchange with identity protection.• AGRESSIVE MODE gives quicker authenticatedkey exchange without identity protection.For Phase I, IKE defines (for main and aggressivemodes) four different authentication methods:1. authentication with signatures;2. authentication with public key encryption;3. authentication with a revised mode of publickey encryption; and4. authentication with a pre-shared key.In methods 2,3 and 4, it is assumed that the initiatorof the key negotiation has already receivedthe public key or a pre-shared key from therespondent. Figure 5 shows IKE authenticationwith the signature protocol for main and aggressivemodes. The different fields in the protocolare as follows:• HDR—the header field includes a randomcookie chosen by the initiator and respondent.The asterisk (*) in the figure indicates that allpayload following the HDR field is encryptedusing the newly negotiated keys.• SA—the security association field includesseveral parameters together with a proposalfor the cryptographic attributes that the peerwants to use during IKE negotiations. The initiatorsends the proposals; the respondentchooses from among these and returns a newSA.• KE—the value of the public key exchange.• N—a random value used to calculate keymaterials shared by the peers.• ID—an identity field; for example, an IPv4address.• CERT—a certificate that contains a signaturecheck key.• SIG—a digital signature calculated over ahash value. The initiator hash value is obtainedfrom the initiator and respondent cookie values,a "premaster secret," KE values, SAvalue, and the initiator ID. The respondenthash value is obtained in exactly the same waybut using the ID value of the respondent.IKE Phase II has only one mandatory mode:QUICK MODE. IKE Phase II is solely used fornegotiating security parameters for another protocolsuch as IPsec. No certificates are involvedin this phase.Ericsson Review No. 2, 2000 101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!