Experiences with host-to-host IPsec

  • Authors:
  • Tuomas Aura;Michael Roe;Anish Mohammed

  • Affiliations:
  • Microsoft Research;Microsoft Research;Microsoft Research

  • Venue:
  • Proceedings of the 13th international conference on Security protocols
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper recounts some lessons that we learned from the deployment of host-to-host IPsec in a large corporate network. Several security issues arise from mismatches between the different identifier spaces used by applications, by the IPsec security policy database, and by the security infrastructure (X.509 certificates or Kerberos). Mobile hosts encounter additional problems because private IP addresses are not globally unique, and because they rely on an untrusted DNS server at the visited network. We also discuss a feature interaction in an enhanced IPsec firewall mechanism. The potential solutions are to relax the transparency of IPsec protection, to put applications directly in charge of their security and, in the long term, to redesign the security protocols not to use IP addresses as host identifiers.