This document provides an overview of several internet security protocols:
- IPSec is a collection of protocols that provide security at the network level by using two modes (transport and tunnel) and two security protocols. It is designed by IETF.
- SSL/TLS provides security at the transport layer and are the dominant protocols, with TLS being an IETF version of SSL. They use cryptography to establish secure sessions.
- PGP provides security at the application layer to create encrypted and authenticated emails. It uses public-key cryptography and key rings to establish trust between parties.
- Firewalls are devices that control access to a system by filtering packets between the internal network and the internet, using either packet-filter
3. 32.3
32-1 IPSecurity (IPSec)32-1 IPSecurity (IPSec)
IPSecurity (IPSec) is a collection of protocols designedIPSecurity (IPSec) is a collection of protocols designed
by the Internet Engineering Task Force (IETF) toby the Internet Engineering Task Force (IETF) to
provide security for a packet at the network level.provide security for a packet at the network level.
Two Modes
Two Security Protocols
Security Association
Internet Key Exchange (IKE)
Virtual Private Network
Topics discussed in this section:Topics discussed in this section:
23. 32.23
32-2 SSL/TLS32-2 SSL/TLS
Two protocols are dominant today for providingTwo protocols are dominant today for providing
security at the transport layer: the Secure Socketssecurity at the transport layer: the Secure Sockets
Layer (SSL) Protocol and the Transport LayerLayer (SSL) Protocol and the Transport Layer
Security (TLS) Protocol. The latter is actually anSecurity (TLS) Protocol. The latter is actually an
IETF version of the former.IETF version of the former.
SSL Services
Security Parameters
Sessions and Connections
Four Protocols
Transport Layer Security
Topics discussed in this section:Topics discussed in this section:
32. 32.32
32-3 PGP32-3 PGP
One of the protocols to provide security at theOne of the protocols to provide security at the
application layer is Pretty Good Privacy (PGP). PGP isapplication layer is Pretty Good Privacy (PGP). PGP is
designed to create authenticated and confidentialdesigned to create authenticated and confidential
e-mails.e-mails.
Security Parameters
Services
A Scenario
PGP Algorithms
Key Rings
PGP Certificates
Topics discussed in this section:Topics discussed in this section:
34. 32.34
In PGP, the sender of the message
needs to include the identifiers of the
algorithms used in the message as well
as the values of the keys.
Note
35. 32.35
Figure 32.20 A scenario in which an e-mail message is
authenticated and encrypted
38. 32.38
In PGP, there can be multiple paths from
fully or partially trusted authorities to
any subject.
Note
39. 32.39
32-4 FIREWALLS32-4 FIREWALLS
All previous security measures cannot prevent EveAll previous security measures cannot prevent Eve
from sending a harmful message to a system. Tofrom sending a harmful message to a system. To
control access to a system, we need firewalls. Acontrol access to a system, we need firewalls. A
firewall is a device installed between the internalfirewall is a device installed between the internal
network of an organization and the rest of thenetwork of an organization and the rest of the
Internet. It is designed to forward some packets andInternet. It is designed to forward some packets and
filter (not forward) others.filter (not forward) others.
Packet-Filter Firewall
Proxy Firewall
Topics discussed in this section:Topics discussed in this section: