Implementing IPsec

被引:0
|
作者
Keromytis, AD
Ioannidis, J
Smith, JM
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IP Security protocols are sufficiently mature to benefit from multiple independent implementations and worldwide deployment. Towards that goal, we implemented the protocols for the BSD/OS, Linux, OpenBSD and NetBSD(1) While some differences in the implementations exist due to the differences in underlying operating system structures, the design philosophy is common. A radix tree, namely the one used by the BSD code for routing purposes, is used to implement the policy engine; a transform table switch is used to make addition of security transformations an easy process; a lightweight kernel-user communication mechanism is used to pass key material and other configuration information from user space to kernel space, and to report asynchronous events such as requests for new keys from kernel space to a user-level keying daemon; and two distinct ways of intercepting outgoing packets and applying the IPsec transformations to them are employed. In this paper, the techniques used in our implementations are explained, differences in approaches are analysed, and hints are given to potential future implementers of new transforms.
引用
收藏
页码:1948 / 1952
页数:5
相关论文
共 50 条
  • [1] Mechanism for implementing IPSEC
    Tang, Yin
    Wang, Wei-Ran
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2002, 24 (03):
  • [2] Implementing IPsec in Wireless Sensor Networks
    Varadarajan, Prabhakar
    Crosby, Garth V.
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [3] A FRAMEWORK FOR IMPLEMENTING IPSEC FUNCTIONAL ARCHITECTURE
    Fahandezh, M.
    Bondy, M.
    Erfani, S.
    2009 IEEE 22ND CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1 AND 2, 2009, : 228 - 233
  • [4] An efficient and universal security architecture of implementing IPSec in broadband router
    Gu, Xiaozhuo
    Yang, Jianzu
    Yu, Jing
    Lan, Julong
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 227 - 231
  • [5] Fast IPSec: A high-performance IPsec implementation
    Leffler, SJ
    USENIX ASSOCIATION PROCEEDINGS OF BSDCON '03, 2003, : 133 - 140
  • [6] IPsec clustering
    Nuopponen, A
    Vaarala, S
    Virtanen, T
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 367 - 379
  • [7] Enhancing Law Enforcement Security: Implementing MABIS Overlay with Virtual Tunnel Interface over IPsec Protocols for Robust Integration
    Rey, William P.
    2024 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS, AND CONTROL ENGINEERING, ICECC 2024, 2024, : 87 - 93
  • [8] IPSec VPN技术
    李伟光
    科技传播, 2011, (02) : 182 - 182
  • [9] IPsec技术分析
    黄海清
    电力系统通信, 2003, (04) : 33 - 35
  • [10] An experimental study on IPSec
    Tsukamoto, K
    Matsushima, M
    Matsuki, K
    Takano, Y
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2002, E85A (01) : 175 - 180