Implement end-to-end and gateway security for IP networks.
Internet Security Protocols: Protecting IP
Traffic is a complete networking professional's guide
to providing end-to-end and gateway Internet security for
the user's information. World-renowned consultant Uyless
Black covers the essential Internet security protocols
designed to protect IP traffic. The book's coverage
includes:
- Key Internet security challenges: privacy, secrecy,
confidentiality, integrity of information, authentication,
access control, non-repudiation, denial of service
attacks
- Dial-in authentication with CHAP, RADIUS, and
DIAMETER
- The role of IPSec in acquiring privacy and
authentication services
- The Internet Key Distribution, Certification, and
Management Systems (ISAKMP and IKE)
- Security in mobile Internet applications
From the basics of firewalls to the latest public key
distribution systems, Uyless Black reviews the alternatives
for securing Internet traffic. If you're responsible for
securing information traveling on IP networks, Internet
Security Protocols is a fine source for the
authoritative answers you're looking for.
Contents
1. Introduction.
Security Problems. How
Pervasive Are Security Attacks? Types of Security Services.
Introduction to the Firewall. The Security Policy. Trusted
and Untrusted Networks. Security and Risk Management.
Virtual Private Networks (VPNs). The Modern VPN. VPNs and
SLAs. The Debate of Privacy vs Law Enforcement.
2. Types of Security Violations. Types of Security
Problems. Denial of Service: Attacks and Counter-attacks.
Virus. Worm. Clogging or Flooding. Trojan Horse. Bomb. Trap
Door. Salami. Replay Violations. Cookies. Applets and
Sandboxes. Other Problems. Summary.
3. Basic Security Concepts. How Secure is Secure?
Definitions. Encryption and Decryption. Basic Encryption
and Decryption Methods. The German Enigma Machine.
Substitution and Transposition. One-way Functions and
Modular Arithmetic. Example of a One-way Function. The
Diffie-Hellman Idea Using Modular Arithmetic. The Hash
Function. Use of a One-way Hash Function. Randomness of
Keys. Randomness or Lack Thereof Equals the Demise of a
Crypto System. Key Problem: Exchanging Keys. Awkwardness of
Key Distribution. The Asymmetric Key. Use of the Asymmetric
Keys in Reverse Order. Asymmetric Keys for Privacy.
Asymmetric Keys for Authentication: The Digital Signature.
The Next Step: RSA. The RSA Key Pairs. Key Transport and
Key Generation. Message Authentication Code (MAC) and Key
Hashing. Putting Together the Security Functions. Paul
Zimmerman and Pretty Good Privacy (PGP). PGP's Use of Key
Certificates. Example of a PGP Public Key. OpenPGP. Perfect
Forward Secrecy (PFS). Man-in-the-Middle Attack.
Certification. The Certification Procedure. Anti-Replay
Measures. Security in a Mobile Network. Authentication.
Privacy Operations. Summary.
4. Firewalls. What is a Firewall?
Protection from Untrusted Networks. Permitting and Denying
Services. What Firewalls Can Do and Cannot Do. Packet
Filtering. Proxy or Application Firewalls. NCSA Guidance.
Managed Firewall Services (MFWS). Evaluating a Firewall
Service Provider. Firewalls with Internet Security
Protocols (IPSec). SOCKS. Summary.
5. Prominent Internet Security Procedures. Diffie-Hellman.
Diffie-Hellman and RFC 2631. Rivest, Shamir, and Adleman
(RSA). RSA in RFC 2437. MD5. MD5 Vulnerabilities? RFC 2537:
RSA, MD5, and DNS. RSA Public KEY Resource Records. RSA/MD5
SIG Resource Records. Performance Considerations. The
Secure Hash Standard (SHA-1) and The Secure Hash Algorithm
(SHA). RIPEMD-160. Comparisons of MD5, SHA-1, RIPEMD-160,
and MD5-HMAC. HMAC. Performance and Security of HMAC. HMAC
with IPSec. The OAKLEY Key Determination Protocol. Beyond
Diffie-Hellman and STS. OAKLEY Key Exchange Processing. The
Essential Key Exchange Message Fields. Summary.
6. PPP, ECP, TLS, EAP, DESE-bis, and 3DESE. PPP and HDLC. LCP. General
Example of PPP Operations. PPP Phase Diagram. Link Dead
(Physical Layer Not Ready). Link Establishment Phase.
Authentication Phase. Network Layer Protocol Phase. Link
Termination Phase. LCP Packets. Configure-Request.
Configure-Ack. Configure-Nak. Configure-Reject.
Terminate-Request and Terminate-Ack. Code-Reject.
Protocol-Reject. Echo-Request and Echo-Reply.
Discard-Request. Other Supporting Cast Members for PPP
Security Services. Transport Layer Security Protocol (TLS).
Goals of TLS. PPP Encryption Control Protocol (ECP). PPP
Extensible Authentication Protocol (EAP). PPP DES
Encryption Protocol, Version 2 (DESE-bis). Configuration
Option for ECP. Packet Format for DESE. PPP Triple-DES
Encryption Protocol (3DESE). The Algorithm. Keys. 3DESE
Configuration Option for ECP. Packet Format for 3DESE.
Summary.
7. Dial-in Operations with PAP, CHAP, RADIUS and
DIAMETER. PAP and CHAP. PAP. Key
Aspects of PAP. CHAP. CHAP Messages. RADIUS. RADIUS
Configuration. Example of a RADIUS Message Exchange. Use of
UDP. RADIUS Message Format. RADIUS Attributes. Examples of
RADIUS Operations. Problems with RADIUS. DIAMETER. DIAMETER
Message Formats. Message Header. Message Body for the AVP.
DIAMETER-Command AVP. Message-Reject-Ind Command. Approach
to the Remainder of Message Descriptions. Basic Operations.
DIAMETER Support of Dial-Ins To/From SS7. Session Setup
Messages Signaling Gateway/ NAS Controller Interaction.
Message Exchanges Examples. Summary.
8. IPSec Architecture. Basics of IPSec. IPSec
Services. IPSec Traffic Security Protocols. Security
Association (SA) Databases. The IPSec Tunnel. The Security
Association (SA). Cases of Security Associations: A General
View. Types of SAs: Transport Mode and Tunnel Mode.
Combining Security Associations: A More Detailed View.
Placements of IPSec. The IPSec Databases. Selectors and
SAD/SPD Operations. Destination IP Address. Source IP
Address. Name. Transport Layer Protocol. Source and
Destination Ports. Selectors and SAD/SPD Entries. Looking
Up the SA in the SAD. Examples of IPSec Sending and
Receiving Operations. Selecting and Using an SA or SA
Bundle. Summary.
9. The IPSec AH and ESP Protocols. Services of the IPSec
Protocols. Integrity Check Value (ICV). Relationships of
AH, ESP, and the Transport and Tunnel Modes. Handling
Mutable Fields. Protection Coverage of the AH and ESP
Packets. AH Protection. Services and Operations of AH. RFC
1826. RFC 2402. Integrity Check Value (ICV) for Outbound
Packets. Integrity Check Value (ICV) for Inbound Packets.
Services and Operations of ESP. ESP Protection. RFC 1827.
RFC 2406. Outbound Packet Processing. Inbound Packet
Processing. AH and ESP and the “Cases”. IP
Addressing in the Headers. Construction of the ESP Packet.
Header Construction for Tunnel Mode. HMAC Applied to AH and
ESP. MD5-HMAC-96 Within ESP and AH. MHAC-SHA-1-96 Within
ESP and AH. IPSec and NAT. Summary.
10. The Internet Key Distribution, Certification, and
Management. What is Public Key
Infrastructure (PKI)? Certificates and Certification
Authorities (CAs). Support for Non-repudiation. Key Backup
and Recovery. Using Two Key Pairs. Key Update and
Management of Key Histories. Certificate Repositories and
Certificate Distribution. Cross-certification. ISAKMP,
ISAKMP DOI, and IKE. ISAKMP. The “Protection
Suite”. Other Thoughts on Key Exchange. ISAKMP
Negotiation Phases. Messages. The Generic Header. Data
Attributes. The Payloads. OAKLEY and ISAKMP. Examples of
ISAKMP Negotiations. The Base Exchange. The Identity
Protection Exchange. Authentication Only Exchange. The
Aggressive Exchange. ISAKMP Domain of Interpretation (DOI).
IPSec/ISAKMP Payloads. Summary.
11. Internet Key Exchange (IKE). IKE Basics. Definitions.
Perfect Forward Secrecy. Aspects of IKE and ISAKMP. Modes
to Establish Authenticated Key Exchange. Main Mode.
Aggressive Mode. Quick Mode and New Group Mode. Four
Methods Used with Main or Aggressive Mode. Examples of IKE
Message Exchanges. Phase One: Authenticated with
Signatures. Phase One: Authenticated with Public Key
Encryption. Phase One: Authenticated with a Revised Mode of
Public Key Encryption. Phase One: Authenticated With a
Pre-Shared Key. Phase Two: Quick Mode. New Group Mode.
ISAKMP Informational Exchanges. Oakley Groups. Messages for
a Complete IKE Exchange. Phase Two Using Quick Mode. IPSec,
NAT, and IKE. Examples of PKI Vendors. Summary.
12. Security Operations in a Mobile Network. The IS-41-C Specification.
The IS-41-C Model. The Five Security/Privacy Operations.
Authentication Parameters. Authentication of Mobile Station
Registration Procedures. The Parameters. At the Air
Interface. On the Network Side. Unique Challenge-Response
Procedures. The Parameters. At the Air Interface. On the
Network Side. Authentication of Mobile Station Originating
a Call. The Parameters. At the Air Interface. On the
Network Side. Authentication of Call to a Terminating
Mobile Station. The Parameters. At the Air Interface. On
the Network Side. Updating the Shared Secret Data (SSD).
The Parameters. At the Air Interface and on the Network
Side. Summary. ChapterE13 Follow-ups to This Book.
Appendix A: Coding for Prominant Security
Functions. Appendix B: Network Address Translation (NAT).
Abbreviations. Index.