Implementing IPsec

被引:0
|
作者
Keromytis, AD
Ioannidis, J
Smith, JM
机构
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The IP Security protocols are sufficiently mature to benefit from multiple independent implementations and worldwide deployment. Towards that goal, we implemented the protocols for the BSD/OS, Linux, OpenBSD and NetBSD(1) While some differences in the implementations exist due to the differences in underlying operating system structures, the design philosophy is common. A radix tree, namely the one used by the BSD code for routing purposes, is used to implement the policy engine; a transform table switch is used to make addition of security transformations an easy process; a lightweight kernel-user communication mechanism is used to pass key material and other configuration information from user space to kernel space, and to report asynchronous events such as requests for new keys from kernel space to a user-level keying daemon; and two distinct ways of intercepting outgoing packets and applying the IPsec transformations to them are employed. In this paper, the techniques used in our implementations are explained, differences in approaches are analysed, and hints are given to potential future implementers of new transforms.
引用
收藏
页码:1948 / 1952
页数:5
相关论文
共 50 条
  • [31] Convergence of IPsec in presence of resets
    Huang, CT
    Gouda, MG
    Elnozahy, EN
    JOURNAL OF HIGH SPEED NETWORKS, 2006, 15 (02) : 173 - 183
  • [32] On IPSec performance testing of IPv4/IPv6 IPSec gateway
    Barylski, Marcin
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 175 - 178
  • [33] IPSEC研究及实现
    秦忠林
    黄本雄
    计算机应用, 2001, (04) : 25 - 27
  • [34] IPSec安全机制剖析
    宋云
    长沙电力学院学报(自然科学版), 2004, (01) : 15 - 18
  • [35] Internet安全技术——IPSec
    桂玲
    铁道通信信号, 2000, (06) : 26 - 28
  • [36] 使用IPsec构造VPN
    王育勤
    谢余强
    王清贤
    骆雷飞
    网络安全技术与应用, 2001, (11) : 32 - 35
  • [37] IPSec - (Internet protocol security)
    Agarwal, A
    Mittal, N
    PROCEEDINGS OF THE ICCC 2002: 15TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION, VOLS 1 AND 2: REDEFINING INTERNET IN THE CONTEXT OF PERVASIVE COMPUTING, 2002, : 543 - 560
  • [38] A cryptographic tour of the IPsec standards
    Paterson, Kenneth G.
    Information Security Technical Report, 2006, 11 (02): : 72 - 81
  • [39] Convergence of IPsec in presence of resets
    Huang, CT
    Gouda, MG
    Elnozahy, EN
    23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, 2003, : 22 - 27
  • [40] IPSec: Performance analysis and enhancements
    Shue, Craig A.
    Gupta, Minaxi
    Myers, Steven A.
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1527 - +