[读书笔记]IPsec协议

文摘   教育   2023-05-19 20:53   上海  

第一阶段:建立IKE SA协商的是以下信息:

1、对等体之间采用何种方式做认证,是预共享密钥还是数字证书。

2、双方使用哪种加密算法(DES3DES

3、双方使用哪种HMAC方式,是MD5还是SHA

4、双方使用哪种Diffie-Hellman密钥组

5、使用哪种协商模式(主模式或主动模式)

6、协商SA的生存期


第二阶段:建立IPsec SA协商的是以下信息:

1、双方使用哪种封装技术,AH还是ESP

2、双方使用哪种加密算法

3、双方使用哪种HMAC方式,是MD5还是SHA

4、使用哪种传输模式,是隧道模式还是传输模式

5、协商SA的生存期



附:IPsec标准和协议参考

RFC 4301:Security Architecture for the Internet Protocol

RFC 2403:The Use of HMAC-MD5-96 within ESP and AH

RFC 2409:The Internet Key Exchange (IKE)

RFC 2857:The Use of HMAC-RIPEMD-160-96 within ESP and AH

RFC 3566: The AES-XCBC-MAC-96 Algorithm and its use with IPsec

RFC 3625:More Modular Exponential (MODP)Diffie-Hellman groups for Internet Key Exchange (IKE)

RFC 3664:The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)

RFC 3706:A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers

RFC 3748:Extensible Authentication Protocol(EAP)

RFC 3947:Negotiation of NAT-Traversal in the IKE

RFC 4109:Algorithms for Internet Key Exchange version 1 (IKEv1)

RFC 3948:UDP Encapsulation of IPsec ESP Packets

RFC 4305:Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH)

RFC 4306:Internet Key Exchange (IKEv2)Protocol

RFC 4307:Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2)

RFC 4322:Opportunistic Encryption using the Internet Key Exchange (IKE)

RFC 4359:The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH)

RFC 4434:The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE)

RFC 4478:Repeated Authentication in Internet Key Exchange (IKEv2)

RFC 5996:Internet Key Exchange Protocol Version 2 (IKEv2)


ingenieur
不动笔墨不读书