Abstract
IPsec, while widely implemented, is rarely used for end-to-end protection of application protocols. Instead, it is mainly used today as an "all or nothing" protection for VPNs. In this paper we discuss the structure and shortcomings of the IPsec security policy mechanisms as partial reasons for this situation. We describe our experiences in using IPsec in a number of situations, including IPv6 control protocols, mobility protocols, network management, and multimedia protocols. We conclude that more often than not, the existing policy mechanisms are inadequate. While IPsec is quite effective in authenticating the peer and establishing assurance about its identity, the lack of attention to authorization questions is a root cause of the existing inadequacies. We also claim that the problems are more fundamental than the lack of suitable APIs and management tools. Finally, we present some potential architectural modifications which could improve the situation, and discuss the practical challenges in achieving these modifications.
Original language | English |
---|---|
Title of host publication | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
Publisher | Springer |
Pages | 241-251 |
Number of pages | 11 |
ISBN (Print) | 3540283897, 9783540283898 |
DOIs | |
Publication status | Published - 1 Dec 2005 |
MoE publication type | A4 Conference publication |
Event | International Workshop on Security Protocols - Cambridge, United Kingdom Duration: 2 Apr 2003 → 4 Apr 2003 Conference number: 11 |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 3364 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Workshop
Workshop | International Workshop on Security Protocols |
---|---|
Country/Territory | United Kingdom |
City | Cambridge |
Period | 02/04/2003 → 04/04/2003 |