Limitations of IPsec policy mechanisms

Jari Arkko*, Pekka Nikander

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

6 Citations (Scopus)

Abstract

IPsec, while widely implemented, is rarely used for end-to-end protection of application protocols. Instead, it is mainly used today as an "all or nothing" protection for VPNs. In this paper we discuss the structure and shortcomings of the IPsec security policy mechanisms as partial reasons for this situation. We describe our experiences in using IPsec in a number of situations, including IPv6 control protocols, mobility protocols, network management, and multimedia protocols. We conclude that more often than not, the existing policy mechanisms are inadequate. While IPsec is quite effective in authenticating the peer and establishing assurance about its identity, the lack of attention to authorization questions is a root cause of the existing inadequacies. We also claim that the problems are more fundamental than the lack of suitable APIs and management tools. Finally, we present some potential architectural modifications which could improve the situation, and discuss the practical challenges in achieving these modifications.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer
Pages241-251
Number of pages11
ISBN (Print)3540283897, 9783540283898
DOIs
Publication statusPublished - 1 Dec 2005
MoE publication typeA4 Conference publication
EventInternational Workshop on Security Protocols - Cambridge, United Kingdom
Duration: 2 Apr 20034 Apr 2003
Conference number: 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3364 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

WorkshopInternational Workshop on Security Protocols
Country/TerritoryUnited Kingdom
CityCambridge
Period02/04/200304/04/2003

Fingerprint

Dive into the research topics of 'Limitations of IPsec policy mechanisms'. Together they form a unique fingerprint.

Cite this