LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 06-27-2014, 07:28 PM   #1
stateless
Member
 
Registered: Jan 2013
Distribution: Debian
Posts: 166
Blog Entries: 1

Rep: Reputation: 4
ipsec: educational questions


I'm wanting to make sure I understand properly what benefits ipsec does and does not give. Some questions:

- Does ipsec do anything to ensure you are communicating with correct host /before/ the session is established? Or does it just protect a session that is/has already been established? I.e., do you still rely on the application layer to know that you've established a session with the correct host?
- After a session has been established, does ipsec do anything to ensure future sessions are with the correct host? (Like ssh storing and checking the fingerprint...)
 
Old 06-29-2014, 06:42 PM   #2
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,341

Rep: Reputation: Disabled
The encryption keys that form the basis of all secure and/or authenticated IPsec communication are exchanged over a secure channel once the identity of the opposite endpoint has been verified. One of two mechanisms can be used to perform this verification:

1) A pre-shared key (PSK) can be configured on both endpoints

2) Asymmetric encryption keys can be exchanged automatically using cryptographically signed X.509 certificates

In the first scenario, the fact that the other party is in possession of the same key is seen as proof that you're communication with the right host. In the second scenario you're relying on a certificate issued by a third-party CA, and the signature of that CA is considered proof that the CA has validated the identity of the certificate holder. No data can be encrypted or signed before the key or certificate has been validated.

In both cases, the key(s) in question are not used for encrypting data; random session keys are generated and replaced at regular (configurable) intervals. It is possible for an application to override this mechanism and specify the encryption key to be used. This is hardly ever done (for obvious reasons).

IPsec does not provide a mechanism for key storage and management; it's up to the IPsec implementation to store pre-shared keys. Certificates are exchanged automatically, so the only certificate one needs to store is one's own. Again, it's up to the IPsec implementation to access a certificate store provided by the OS or an application, or it could have its own store.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
vpn-ipsec : Failed to parse config setup portion of ipsec.conf hari85 Linux - Newbie 1 07-17-2010 08:12 PM
IPSec questions setting up to connect to a Linksys VPN router dendon Linux - Networking 2 10-30-2008 07:38 AM
IPSec Questions AMarkos Linux - Networking 4 08-18-2008 07:42 PM
educational software alkat Linux - Software 0 05-01-2004 08:47 AM
IPsec connection on RedHat9 - few questions tvojvodi Linux - Networking 0 02-24-2004 12:53 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 08:15 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration