Skip to main content

Limitations of IPsec Policy Mechanisms

  • Conference paper
Security Protocols (Security Protocols 2003)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3364))

Included in the following conference series:

Abstract

IPsec, while widely implemented, is rarely used for end-to-end protection of application protocols. Instead, it is mainly used today as an “all or nothing” protection for VPNs. In this paper we discuss the structure and shortcomings of the IPsec security policy mechanisms as partial reasons for this situation. We describe our experiences in using IPsec in a number of situations, including IPv6 control protocols, mobility protocols, network management, and multimedia protocols. We conclude that more often than not, the existing policy mechanisms are inadequate. While IPsec is quite effective in authenticating the peer and establishing assurance about its identity, the lack of attention to authorization questions is a root cause of the existing inadequacies. We also claim that the problems are more fundamental than the lack of suitable APIs and management tools. Finally, we present some potential architectural modifications which could improve the situation, and discuss the practical challenges in achieving these modifications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aboba, B., Tseng, J., Walker, J., Rangan, V., Travostino, F.: Securing Block Storage Protocols over IP. Internet Draft draft-ietf-ips-security-19.txt (Work In Progress), IETF (January 2003)

    Google Scholar 

  2. Arkko, J.: Effects of ICMPv6 on IKE and IPsec Policies. Internet Draft draft-arkko-icmpv6-ike-effects-01.txt (Work in Progress), IETF (June 2002)

    Google Scholar 

  3. Arkko, J.: SEcure Neighbor Discovery (SEND). Internet Draft draft-arkko-send-ndopt-00.txt (Work in Progress), IETF (June 2003)

    Google Scholar 

  4. Arkko, J., Nikander, P., Kivinen, T., Rossi, M.: Manual SA Configuration for IPv6 Link Local Messages. Internet Draft draft-arkko-manual-icmpv6-sas-01 (Work in Progress), IETF (June 2002)

    Google Scholar 

  5. Arkko, J., Aura, T., Kempf, J., Mantyla, V.-M., Nikander, P., Roe, M.: Securing IPv6 Neighbor Discovery. In: Wireless Security Workshop (September 2002)

    Google Scholar 

  6. Arkko, J., Kempf, J., Sommerfeld, B., Zill, B.: SEcure Neighbor Discovery (SEND). Internet Draft draft-ietf-send-ipsec-01.txt (Work in Progress), IETF (June 2003)

    Google Scholar 

  7. Arkko, J., Devarapalli, V., Dupont, F.: Using IPsec to Protect Mobile IPv6 Signaling between Mobile Nodes and Home Agents. Internet Draft draft-ietf-mobileip-mipv6-ha-ipsec-06.txt (Work in Progress), IETF (June 2003)

    Google Scholar 

  8. Bellovin, S.: Guidelines for mandating the use of IPsec. Internet Draft draft-bellovin-useipsec-00.txt (Work in Progress), IETF (October 2002)

    Google Scholar 

  9. Blaze, M., et al.: The KeyNote Trust-Management System Version 2. RFC 2704, IETF (September 1999)

    Google Scholar 

  10. Dierks, T., Allen, C.: The TLS Protocol Version 1.0. RFC 2246, IETF (January 1999)

    Google Scholar 

  11. Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., Carney, M.: Dynamic Host Configuration Protocol for IPv6 (DHCPv6). Internet Draft draft-ietf-dhc-dhcpv6-28.txt (Work in Progress), IETF (November 2002)

    Google Scholar 

  12. Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409, IETF (November 1998)

    Google Scholar 

  13. Ionnadis, J.: Why don’t we still have IPsec., dammit. NDSS 2003 (February 2003)

    Google Scholar 

  14. Johnson, D., Perkins, C., Arkko, J.: Mobility Support in IPv6. Internet Draft draft-ietf-mobileip-ipv6-24.txt (Work in Progress), IETF (June 2003)

    Google Scholar 

  15. Kent, S., Atkinson, R.: IP Authentication Header. RFC 2402, IETF (November 1998)

    Google Scholar 

  16. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401, IETF (November 1998)

    Google Scholar 

  17. Moskowitz, R., Nikander, P., Jokela, P.: Host Identity Payload and Protocol. Internet Draft draft-moskowitz-hip-07.txt (Work in Progress), IETF (June 2003)

    Google Scholar 

  18. Nikander, P.: Secure Neighbor Discovery using separate CGA extension header. Internet Draft (Work in Progress), IETF (June 2003)

    Google Scholar 

  19. Patel, B., Aboba, B., Dixon, W., Zorn, G., Booth, S.: Securing L2TP using IPsec. RFC 3193, IETF (November 2001)

    Google Scholar 

  20. Narten, T., Draves, R.: Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 3041, IETF (January 2001)

    Google Scholar 

  21. Narten, T., Nordmark, E., Simpson, W.: Neighbor Discovery for IP Version 6 (IPv6). RFC 2461, IETF (December 1998)

    Google Scholar 

  22. O’Shea, G., Roe, M.: Child-proof authentication for MIPv6 (CAM). Computer Communications Review (April 2001)

    Google Scholar 

  23. Rescorla, E.: Guidelines for Writing RFC Text on Security Considerations. Internet Draft draft-iab-sec-cons-03.txt (Work in Progress), IETF (January 2003)

    Google Scholar 

  24. Schulzrinne, H., Casner, S., Frederick, R., Jacobson, V.: RTP: A Transport Protocol for Real-time Applications. RFC 1889, IETF (January 1996)

    Google Scholar 

  25. Thomson, S., Narten, T.: IPv6 Stateless Address Autoconfiguration. RFC 2462, IETF (December 1998)

    Google Scholar 

  26. Ylonen, T., Kivinen, T., Saarinen, M., Rinne, T., Lehtinen, S.: SSH protocol architecture. Internet Draft draft-ietf-secsh-architecture-12.txt (Work in Progress), IETF (January 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Arkko, J., Nikander, P. (2005). Limitations of IPsec Policy Mechanisms. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2003. Lecture Notes in Computer Science, vol 3364. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11542322_29

Download citation

  • DOI: https://doi.org/10.1007/11542322_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28389-8

  • Online ISBN: 978-3-540-31836-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics