Questions tagged [ipsec]

IPsec is a protocol suite on the same level as and that provides confidentiality and authentication of each IP packet. It that was originally designed for and then back-ported to legacy IP (IPv4). Since the Internet Protocol is a network-layer protocol, IPsec is used mostly for Virtual Private Networks ().

IPsec has many similarities to : It protect data only in transit, and the secure channel is established using symmetric cryptographic algorithms. The key exchange is guarded by although the key exchange is strictly speaking not part of the IPsec specification. The key exchange is specified on its own and is known as Internet Key Exchange (IKE). Like SSL, IKE uses to establish a trusted key exchange. Unlike to SSL, keys for IPsec can also be distributed manually although that doesn't scale well and is error prone, and therefore this is rarely an option.

A striking difference between IPsec and SSL/TLS is that IPsec is dealt with by the kernel, so IPsec is transparent to applications - at least that's the idea. SSL on the other hand is at the responsibility of the application. Another difference is that an IPsec security association (the IPsec term for the secure channel) is a simplex channel (i.e. only one-way) - for full duplex secure communication with IPsec two security associations must be established.

IPsec can be used in several modes. Originally there were just tunnel mode, where entire IP packets were encapsulated in containing IP packets, and transport mode, which operated on the original IP packets. In addition, there are two options to protect data:

  • Authentication Header (AH) is used for integrity protection
  • Encapsulating Security Payload (ESP) is used for confidentiality protection and optionally for payload integrity protection.

A typical setup for VPNs is IPsec in tunnel mode with ESP with authentication.

The design of IPsec is said to be overly complex (see Ferguson and Schneier). As a matter of fact, IPsec was felt to be so troublesome and hard to manage that alternatives like were developed, which use SSL/TLS as base technology.

129 questions
4
votes
0 answers

IPSec end-point sends ICMP "unreachable; frag needed" messages while it's not routing

I have a simple site-to-site IPSec VPN where "server-A" is connected to a "fw-A" over an IPSec tunnel. In front of "server-A" there is a switch with has a 1500 byte MTU interface facing the server. Sometimes clients behind "fw-A" send large packets…
Martin
  • 7,516
2
votes
1 answer

rekey ipsec using "ip xfrm"

I built a simple ipsec between two Linux boxes: SHAKEY=0xd3413c31c7d19c93d04db1c6ae8d73d9a64910c2e76297129acde44aaa9de5c5 AESKEY=0xcd191fac520878852e15647dce3456ba9857e2dfd6ed56421eb50cb58d7a1e5a SPI=0x01 if [ "$(hostname -s)" = "host1" ] ;then …
Bill
  • 51
2
votes
0 answers

IPSec VPN problem with tunnel

My connection IPSec have problem. This is my Diagram. Connect VPN is not OK must be restart IPsec ==> OK and after that not OK root@vungtau:~# telnet 10.225.198.3 3900 Trying 10.225.198.3... telnet: Unable to connect to remote host: Connection…
Uncelvel
  • 345
1
vote
1 answer

Why does ipsec want me to disable redirects?

I've just configured a vpn connection (l2tp), but when I run ipsec verify I get: $ ipsec verify ... NETKEY: Testing XFRM related proc values ICMP default/send_redirects [NOT DISABLED] Disable…
x-yuri
  • 3,373
1
vote
1 answer

How to run a command when a libreswan tunnel connects?

I would like to run a command (or wake up a process, or similar) when libreswan succeeds in connecting an IPSec tunnel (or connection, to use the configuration file's term). My requirement is to run a command not when the connection is enabled but…
James W
  • 131
0
votes
1 answer

ip xfrm state update not changing auth/enc keys

I was testing the xfrm framework through the ip xfrm commands, and when testing the state update operation, I did not manage to change either the encryption keys or the authentication keys. A similar issue can be found in this link. I am not sure if…
dcrypt
  • 1
0
votes
1 answer

StrongSwan IPSEC Policy

I have working connection A->B and B->C I need a little help after 3 days of trying, still can't get the desired effect what should I set in SITE B to get connection from A->C and C->A using ipsec policy ? SITE A Mikrotik local 10.10.0.0/24 Public=…
prof
  • 1
0
votes
2 answers

ipsec on linux,a simple and fast question

Is my first VPN, for testing this is my simple network scheme LAN1(private 10.10.0.0/24) --->VPN-----internet---
elbarna
  • 12,695