Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Analysis of problems associated with IPSec VPN Technology

Olalekan Adeyinka
School of Computing and Technology,
University of East London
adeyinka@acm.org

Abstract The original goal of IPSec [1] is to enable the protection


of all types of Internet Protocol (IP) communication. The
The original goal of Internet Protocol Security (IPSec) is IPSec uses the Internet Key Exchange (IKE) [2] protocol
to enable the protection of all types of Internet protocol to negotiate protocols between peers and generate
(IP) communications by protecting multiple peers at the encryption and authentication keys. Many commercial
network layer, in both the IPv4 and IPv6 environments. IPSec clients are available for windows operating
IPSec is a standard for securing internet communication systems and also there are many Unix-like operating
and a widely deployed mechanism for implementing systems that have IPSec capabilities. IPSec have been
Virtual Private Networks (VPNs). widely used recently to provide the most versatile
Most organisations deploy IPSec VPNs that provide gateway solution in web services, hence it is designed to
enterprise-level secure remote access by protecting the allow encryption and authentication network traffic
IP packet exchanged between remote networks or host between the host machines over an existing TCP/IP
and an IPSec gateway located at the edge of a private network. Therefore, its associated authentication
network.. This paper investigates the security issues of mechanism will manage the authentication and
IPSec VPN technology with respect to remote access encryption phases between the client and the gateway
communication. computers. This process will allow the administrator of a
gateway to choose or select the best authentication
1.0 Introduction mechanism for each case. Authentication could be
identified as pre-shared secret keys, or it could utilise a
The internet was designed to be an open and distributed certificate based authentication scheme [3].
environment without any central instance controlling the Using an IPSec is a way of providing additional security
communication among the users and thus mutual mistrust of IPv4 based on networks, while maintaining
was not of primary concern. The internet is in general an compatibility with the exiting networks infrastructure. It
adversarial environment where attacks can be quite easy, provides two network protocols, the Authentication
inexpensive and may be hard to prevent, detect or trace. Header and the Encapsulating secure payload and these
In general, it is difficult to ensure the main security goals works together as they encrypt and authenticate network
regarding confidentiality, integrity and availability. The data packets [4]. There are two operation modes of IPSec
Internet has become a popular, low-cost backbone which are the tunnel mode and the transport mode. The
infrastructure. Its universal reach has led many tunnel mode as it is known protects the IP header and
businesses to consider constructing a secure virtual reveals only the IP address of the IPSec gateway
private network (VPN) over the public Internet. The machine, while the transport mode does not protect the
challenge in designing a VPN for today’s global business original IP header but encrypts only the payload. Though
environment will be to exploit the public Internet IPSec is extremely complex, is a flexible suit of
backbone for both intra-company and inter-company protocols. It relies on asymmetric key algorithms, a
communication while still providing the security of the public/private key pair-one to encrypt and to decrypt.
traditional private, self-administered corporate network. Applications requiring standards-based security services
IPSec VPNs were created as a cost-effective encrypted such as the World Wide Web (WWW), email, IP
transport alternative to private or leased lines. Security (IPSec) and secure commerce transactions are
being enhanced to take full advantage of this technology,
[5]. It is known that asymmetric algorithms are preferable
978-1-4244-1643-1/08/$25.00 ©2008 IEEE for encrypting the keys, but they are more CPU-intensive
than symmetric algorithms and may not be the best

001903
means of encrypting the actual message. The biggest two security mechanism of IPSec. The ESP
difference between Secure Socket Layer (SSL) VPNs and (Encapsulating Security Payload) mechanism [9]
traditional IP Security remote access VPNs is that IPSec provides confidentiality, authentication, and integrity, the
standard requires installation of client software on the AH (Authentication Header) mechanism [10] provides
end user’s system, while SSL VPNs focus on making Authentication and integrity. It protects against data
applications available through any web browser [6]. SSL tampering and unauthorized retransmission of packets.
VPNs are easier to set up and use for the end user than The last component is the IKE (Internet Key Exchange)
the traditional IPSec VPNs, but sometimes harder for the that provides key management and security association
network manager to maintain. management
IPSec can be used in two modes, namely, transport mode
2.0 IPSec Protocols. and tunnel modes. Transport mode provides protection
primarily for upper layer protocols. It is used for end-to-
In today’s IT environment, it is critical to protect data end communication between two hosts. ESP encrypts and
traffic between disparate host systems in multi-tier optionally authenticates the IP payload but not the IP
applications. Information security teams look for security header. AH authenticates the IP payload and non-mutable
vulnerabilities and try to manage the risk of data portions of the header. AH and ESP header are inserted
tampering, snooping, and eavesdropping. Plain text data after the original IP header and before the IP payload.
flow of critical information like passwords, credit card The ESP trailer is inserted after the IP datagram and after
numbers, and privacy information between systems is at the optional ESP authentication data field can be
highly vulnerable to misuse. The technology that brings placed.
secure communications to the Internet Protocol (IP) is The IPSec protocols include AH, ESP, IKE,
called Internet Protocol Security, commonly abbreviated ISAKMP/Oakley, and transform. In order to understand,
IPSec. It is an Internet Engineering Task Force (IETF) implement and use IPSec, it is necessary to understand
standard, and many operating systems vendors have the relationship among these components. The IPSec
incorporated IPSec in their product offerings. The roadmap defines how various components of IPSec
Internet needs more and better security due to the interact with each other. The ESP and the AH documents
inherent security weakness in the TCP/IP protocols suite defines the protocol, the payload header format, and the
and it identified key areas of security improvements. services they provide. In addition these documents define
IPSec protects IP packets, supports a strong encryption the packet processing rule. IKE generates keys for the
and data integrity mechanisms and is a network layer IPSec protocols. IKE is also used to negotiate keys for
VPN technology, meaning it operates independent of the other protocols that need keys. The parameters that are
application(s) that may use it. The VPNs relied on dial- negotiated are documented in a separate document called
up connections initially, but the increasing availability the IPSec Domain of Interpretation [4]. Authentication
and decreasing cost of broadband internet connectivity Header (AH) and encapsulating security payload (ESP)
has led companies to develop internet VPNs in an effort are two components of IPSec that are added to the plain
to provide a more flexible and cost effective solution. internet protocol to meet the security requirements. Both
IPSec is a framework that provides security services at mechanisms add a new header to the IP datagram.
the IP layer by enabling a system to select required Important fundamental concept in the IPSec architecture
security protocols, determine the algorithm(s) to use for is the security association (SA). It is a one-way
the service(s), and put in place any cryptographic keys relationship between the sender and a receiver which
required to provide the requested services [8]. IPSec can contains all the necessary information for secured
protect host-to-host, gateway-to-gateway or host-to- communication, such as negotiated encryption algorithms
gateway / gateway-to-host packet communications. being used, and encryption keys. For a two-way
The security services provided by IPSec are relationship, two SA are needed. This is also the case
connectionless integrity, data origin authentication, when both AH and ESP are needed for communication.
protection against replays, and confidentiality. These An SA is uniquely identified by three parameters: SPI
services are provided at the IP layer, thus offering (security parameters index), Destination IP address and
protection for IP and all upper layer protocols. Optional security protocol (AH or ESP). SAs are kept in an SA
in IPv4, IPSec is mandatory for any implementation of database (SAD) and when a datagram is sent, its
IPv6. Once IPv6 is widely spread, it will be possible for destination address is looked for in the SAD and security
any user wishing to use security functions to use IPSec. policy database (SPD) is used to decide whether the
In the meantime, we must rely on IPSec implementations datagram is described or accepted [11].
under IPv4.
It must be acknowledged that the IPSec is perhaps one of
the most complicated and confusing security standards
ever put forward for universal implementation. There are

001904
2.1 Security Mechanism (AH and ESP Protocol)

The two security mechanisms use are the AH and ESP


"protocols", which are added to traditional IP processing.
Authentication Header (AH) is conceived to ensure
integrity and authentication of IP datagrams, without data
encryption (i.e. without confidentiality). The principle of
AH is to add an additional field to the traditional IP
datagram; this field makes it possible for the receiver to
check the authenticity of the data included in the
datagram [10]. The authentication header guarantees data
integrity and it authenticates the sending peer. Message
authentication code (MAC) is used in AH and the hash
function is applied to the whole data part of the IP
datagram and to non-mutable fields of the IP header. A Fig 2 Position of AH in tunnel mode (IPv4)
compliant AH implementation must support the HMAC
hash algorithm with MD5 or SHA- 1 algorithms. 2.1.2 Encapsulating Security Payload (ESP)
Encapsulating Security Payload (ESP) is primarily
designed for ensuring confidentiality, but can also The figures below indicate the position of ESP and the
provide data authenticity. The principle of ESP is to services it provides, depending on the selected mode
generate, from a traditional IP datagram, a new datagram (transport or tunnel).
in which the data and eventually the original header are
encrypted [9]. The encapsulating security payload
provides confidentiality, optional integrity and
authentication. The original datagram is encrypted before
it is sent. There are multiple encryption algorithms (e.g.
DES, 3DES) that can be employed of for any DES IPSec
implementation.

2.1.1 Authentication Header (AH)

The figures below indicate the position of AH and the


service brought depending on the selected mode
(transport or tunnel).

Fig 3 Position of ESP in transport mode (IPv4)

Fig1. Position of AH in transport mode (IPv4)

Fig 4 Position of ESP in tunnel mode (IPv4)

001905
2.2 IKE Overview SSL and IPSec approaches. The IPSec VPNs technology
provides the robust solution for the Internet based
The purpose of Internet Key Exchange (IKE) is to allow connectivity. IPSec encapsulates the original IP data
devices to exchange information that’s required for packet with its own packet, thus hiding all application
secure communication. It operates by allowing security protocol information. Once an IPSec tunnel is negotiated,
associations to be negotiated through a series of any number of connections and types (web, email, file
ISAKMP, a generic protocol that supports many different transfer, VoIP) can flow over it, each destined for
key exchange methods. In IKE, the ISAKMP framework different servers behind the VPN gateway.
is used as the basis for a specific key exchange method IT administrators must determine who should have
that combines features from two key exchange protocols. remote access to the network because IPSec VPNs
It also used for negotiating the SAs develop for IPSec. require a client to be installed on each user machine this
This includes cryptographic keys that are used for entails deployment, configuration and maintenance. The
encoding authentication information and performing solution becomes resource intensive and cost prohibitive
payload encryption [2]. IKE works by allowing IPSec- when deployed across large enterprise [12].Traditional
capable devices to exchange SAs, which populate their VPNs rely on IPSec to tunnel between the two endpoints.
SADs. These SADs are then used for the actual IPSec works on the Network Layer of the OSI Model-
exchange of secured datagrams with the AH and ESP securing all data that travels between the two endpoints
protocols. IKE is considered a hybrid protocol because it without an association to any specific application. When
combines (and supplements) the functions of three other connected on an IPSec VPN the client computer is
protocols. The Internet Security Association and Key “virtually” a full member of the corporate network- able
Management Protocol (ISAKMP). The protocol to see and potentially access the entire network. The
ISAKMP is not usable alone, it’s a framework which majority of IPSec VPN solutions require third-party
allows the use of several key exchange protocols and hardware and / or software. In order to access an IPSec
which can be used for other security mechanisms than VPN, the workstation or device in question must have an
those of IPSec. Within the framework of the IPSec client software application installed.
standardization of IPSec, ISAKMP is associated with
part of the SKEME and Oakley protocols to result in a
protocol called IKE (Internet Key Exchange).

3.0 IPSec VPN Overview


IPSec based VPNs are the deployment-proven remote
access technology used by most organizations today to
establish connection using pre-installed VPN client
software to connects hosts to entire private networks by
protecting the IP packet exchanged between remote
networks or hosts and an IPSec gateway located at the
edge of the private network. IPSec VPNs can support all
IP-based applications to an IPSec VPN product. All IP
packets are the same, [7] With the IPSec client software,
organizations can control the function of the VPN client Fig 5 IPSec VPN gateway technology
fuse in applications such as unattended kiosks,
integration with other desktop applications, and other IPSec VPNs in Fig 5 provide access to the entire subnets
special use cases. IPSec authentication employs Internet of a network. A remote user with VPN client software
Key Exchange (IKE), using digital certificates or pre installed communicate through the firewall or VPN
shared secrets for two-way authentication. They differ gateway and initiates a key exchange called the Internet
significantly on how these extensions are implemented. key Exchange (IKE).
Many organizations find that IPSec meets the Another factor to consider with IPSec VPNs is the level
requirements of users already using the technology. But of management resources required for deployment and
the advantages of dynamic self-updating desktop maintenance. All remote or mobile users not at an
software, ease of access for non-company-managed aggregation point must have client software on their
desktops, and highly customizable user access make SSL remote PC. For organizations trying to provide remote
VPNs a compelling choice for reducing remote-access access to hundreds or thousands of mobile users,
VPN operations costs and extending network access to deploying, updating, configuring and managing all of
hard-to-serve users like contractors and business partners. these clients can be very time consuming and costly. If
As such, organizations often deploy a combination of remote partners or customers are considered, the

001906
difficulties are multiplied. While a necessary and authenticate to a central server and SSL firewall ports
appropriate investment for regional, branch and remote that the traffic uses are generally left open, so firewall
offices where the enterprise needs reliable, “always on” reconfiguring is usually unnecessary. The idea is that
connectivity and only has to manage a few network VPN SSLs simplicity translates into an easier installation and
devices, IPSec clients are, in many ways, impractical long term cost savings because of simpler ongoing
investment to meet the needs of mobile/remote workers, support, [14]. Among the problems of IPSec is that is
business partners or customers. For example, because difficult to distribute client software and to administer,
VPN client software is required to connect remote users, and the gear requires reconfiguration of employee’s
those users are restricted to devices where the software is home firewalls.
installed; i.e., corporate laptops. This does not Major drawback of IPSec VPNs is the fact that it
accommodate additional methods of access, such as provides access to the entire subnet within the corporate
Internet kiosks, PDA’s, etc. Tunnelling IPSec is the network. This means that the client PC can potentially be
method usually used in conjunction with a VPN, but has used as a means to enter the network by a hacker and also
more overheads as it generally requires that a public key if client PC becomes infected with virus or Trojan, it
infrastructure be deployed on the server side. Running could potentially spread to the entire network. Once a
IPSec VPNs provides better authentication security and client has a tunnel (effectively a “PVC”) into an
user access on almost any application available on the organization, this can be a target of hackers (i.e. the
corporate intranet. Actually, it requires special client remote access client can effectively be turned into a
software and more infrastructure overhead than SSL router into the organization, unless mitigated by personal
VPNs. However, SSL VPNs is simpler to deploy but firewalls and/or access controls at the VPN gateway).
limits users to browser based applications. Secure back- Access control can also be an issue with IPSec VPNs
end connectivity is enhanced with the addition of IPSec since they rely on network access controls. A VPN
and VPN as standard features, [13]. SSL VPN was gateway is solely responsible for creating the VPN tunnel
adopted for secure delivery between a web server and a with the client. Once the tunnel is created the information
user (web browser), and the reason was to eliminate the that passes through is not reviewed for any type of user
complexity and cost of IPSec-based VPN delivery of rights or permissions. The permissions and the user rights
applications to remote users. IPSec VPN technology was are governed by whatever controls the network.
designed exclusively for IP networks, and IPSec based The Internet has not been designed to deliver
VPNs offers reasonable performance, standard-based performance guarantees, the complexities introduced by
security and application transparency, though it suffers VPNs and the requirement to provide QoS have made the
from technical complexity for both users of the VPN and job of the ISPs and systems administrators extremely
administrators of the network infrastructure. difficult, and as today’s network infrastructure continues
to grow, the ability to manage increasing complexity is a
crucial factor for VPN solutions. But, at the same time,
4.0 Problems Associated with IPSec VPN this also opens the possibility for ISPs to sell VPN
services to mostly corporate end users. Because VPN
Internet-based IPSec remote access VPNs require data networks are a critical element of the overall
software on each remote PC that has to be installed business process, VPN must provides a reliable service to
configured and updated for the VPN to work properly users and their applications.
and this can be cumbersome for small companies. Since Many clients do not have versions that run in multiple
IPSec has been approved by all as a standard of security operating systems such as UNIX, Linux and Mac.
on the Internet, there is a wide believe that it has all Interoperability between vendors is virtually non-
security solution. IPSec is considered as a solution to all existent, meaning VPN clients from one vendor are not
security concerns. Due to lack of understanding of IPSec compatible with other VPN appliances. This could be a
standard, recently people seek other alternative such as problem for users who need to connect to different VPN
SSL VPNs due to the complexities of setting up and sites that use different VPN gateways.
maintaining IPSec VPNs. It shows that other services like Connectivity can be adversely affected by Network
the SSL VPN are easier to set up and use than IPSec Address Translation (NAT) or Proxy devices between the
VPNs. client and gateway as to require client configuration
A growing number of organisations looking for a fast, before the tunnel is established. Interoperability of
secure way to link remote users and business partners are different vendors’ IPSec clients to other vendors’ IPSec
turning away from traditional IP Security-based VPNs servers/gateways is weak, mainly due to configuration
and toward products and services based on sockets layer issues. In a large distributed system or inter-domain
technology. The reason is: Browser-based SSL environment, the diversified regional security policy
alternative require little or no software on remote PCs, enforcement can create significant problems for end-to
and in most cases any PC with a browser can be used to end communication.
make the secure connection, as long as the user can

001907
One of the biggest drawbacks of IPSec is its complexity.
While IPSec flexibility has contributed to its popularity, References
it also leads to confusion and has led to security experts
to state that IPSec contains too many options and too [1] S. Kent and R. Atkinson, “IP encapsulating security
much flexibility. Much of IPSec flexibility and payload,” RFC 2406 (Proposed Standard), Internet
complexity may be attributed to the fact that IPSec was Engineering Task Force, Nov. 1998.
developed via IETF Working groups. [2] D. Harkins and D. Carrel, “The Internet Key
Exchange (IKE),” RFC 2409 (Proposed Standard),
5.0 Conclusion Internet Engineering Task Force, Nov. 1998.
[3] Thai L. Thuan and Lam Hoang, (2006), Web
Although IPSec VPN technology has already addressed services”
the requirements for site-to-site network connectivity, for http://www.ondotnet.com/pub/a/dotnet/excerpt/netessenti
mobile users, they were often too costly, while for als2_6/index4.html Date Accessed: 19/12/07
business partners or customers they were impossible to [4] Doraswamy, N., and Harkins, D., 2003, ‘The New
deploy as they require client software to be installed and Standard for the Internet, Intranets, and Virtual Private
configured on each endpoint. Also security and efficiency Networks: Prentice-Hall’ ISBN: 013046189-X
are conflicting requirements for real-time multimedia [5] King M. Christopher, (1997), ‘Public key
applications that impose time constraints on packet infrastructure: End-to-end security’ ABI/INFORM
delivery in order to produce the original source of Global: Business Communication Review, Vol. 27, No.
information whose functionality may be compromised by 11, pg. 50
security controls. IPSec based VPN requires client VPN [6] Snyder Joel, (2004), ‘Netscreen, Nokia top the
software to be installed on the remote PC or notebook, growing field of products that target simplified secure
which means that kiosk and cyber café, cannot be used remote access’ ABI/INFORM Global: Network World,
for VPN access and that anyone who is permitted to Vol. 21, No.2; pg. 43
access the VPN must either be a corporate owned [7] Phifer, L., 2003, ‘Tunnel Visions: How do SSL VPNs
notebook. However IPSec VPNs connection comes match up with their older cousins?’ Information Security
through the firewall; it requires reconfiguration of Magazine: Pgs. 31-43.
firewall policies and may require the opening of ports on [8] Roland, J.F., and Newcomb, M.J., 2003, CSVPN
the firewall. The opening of ports on the firewall may Certification Guide, CISCO Press
present a security breach as it opens up door through [9] S. Kent and R. Atkinson, “Security architecture for
which malicious users can enter the entire network. the internet protocol,” RFC 2401 (Proposed Standard),
IPSec is a versatile and functional protocol for securing Internet Engineering Task Force, Nov. 1998, updated by
IP. It is not a complete solution for all deployment, and RFC 3168
there are still other issue that may need to be addressed. [10] S. Kent and R. Atkinson “IP authentication header,”
Many protocols desired to use IPSec to satisfy their RFC 2402 (Proposed Standard), Internet Engineering
security concerts and these have different problems that Task Force, Nov. 1998.
IPSec addresses incompletely. While IPSec is a solution [11] Niemi, A., “End-to-end web security – protocol
to a large problems it is a problem to other protocol for overview”, Department of Computer Science University
instance network address translation (NAT). A distinct of Helsinki, Finland, December 2003
advantage of IPSec is that it can be deployed [12] Harding, A., 2003, ‘SSL Virtual Private Networks’,
incrementally, unlike other network related protocols or Computer and Security: Vol. 22, No. 5, Pgs. 416-420
technologies; it is not an all-or-nothing proposition [15]. [13] Yager Tom, (2004), ‘Mobility’s mayflower sets sail’
There are some disadvantages, the use of IPSec carries a ABI/INFORM Global: InfoWorld, Vol. 26, No. 40; pg.
cost: additional processing and increased packet size, that 58
includes IKE traffic that precedes the IPSec protected [14] Greene Tim, (2004), ‘Net6 offers twist on remote
communications, as well as the additional information access’ ABI/INFORM Global: Network World, Vol. 21,
added to each IPSec protected packet. Despite the above No. 11; pg. 17
stated issues, IPSec is currently the most secure VPN [15] Frankel, S., 2001 ‘Demystifying the IPSec Puzzle’,
solution available in the market. The ability to dictate the Arctech house computer series’ ISBN: 1-58053-079-6
requirement of current antivirus and firewall software
and to ensure the operating systems are patched virtually .
eliminates the risk of malicious intent. The requirements
of VPN client software reduce the risk of security breach.

001908

You might also like