24.05.2014 Views

AIX Version 4.3 Differences Guide

AIX Version 4.3 Differences Guide

AIX Version 4.3 Differences Guide

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the Encapsulating Security Payload (ESP) that always provides confidentiality<br />

and usually provides integrity and authentication. The protocol formats for the IP<br />

AH and IP ESP are independent of the cryptographic algorithm. The use of the<br />

RFC-compliant combinations of AH and ESP are supported in the initial release<br />

of IPSec for <strong>AIX</strong> <strong>4.3</strong>.0.<br />

IPSec also provides filtering capability without the use of secure tunnels. This<br />

may be very useful for setting up filters based on addresses, protocol, interface or<br />

port, and so on.<br />

7.1.6.1 Key Management<br />

Key management for <strong>AIX</strong>/IPSec supports a static key used during the lifetime of a<br />

tunnel and a dynamically refreshed session key that is updated periodically by a<br />

session key daemon using an IBM proprietary protocol. Master keys for both<br />

tunnel types can be manually input by the user or autogenerated using a<br />

pseudorandom number generator.<br />

Note: Session key refresh is not supported for IPv6 tunnels.<br />

IPSec for <strong>AIX</strong> allows for additional key management modules, including<br />

automatic master key exchange and key management user interface, as new<br />

protocols are defined. The current design does not include any distributed key<br />

management engines, such as Internet Security Association Management<br />

Protocol (ISAKMP/Oakley) or Simple Key Management for IP (SKIP).<br />

In summary, the major key management elements in this release are:<br />

• Manual master key exchange<br />

• Static session key<br />

• Dynamic session key refresh<br />

Note: Master key access is restricted to root user only.<br />

7.1.6.2 Transforms Provided with IPSec for <strong>AIX</strong> <strong>4.3</strong>.0<br />

The following transforms are provided with IPSec for <strong>AIX</strong> <strong>4.3</strong>.0:<br />

• keyed-md5<br />

• hmac-md5 with _optional_ replay protection<br />

• esp-des-cbc<br />

• esp-des-md5 (with replay protection)<br />

• hmac-sha with _optional_ replay protection<br />

The design of IPSec for <strong>AIX</strong> allows plug-in and replaceable kernel modules for<br />

encryption and authentication.<br />

7.1.6.3 Encapsulation Forms<br />

The following list describes the encapsulation forms:<br />

• IPSec for <strong>AIX</strong> supports both AH and ESP.<br />

• On outgoing packets, the RFCs recommendations for AH and ESP order of<br />

processing is followed.<br />

• On incoming packets, any order and combination of AH and ESP ordering is<br />

allowed.<br />

154 <strong>AIX</strong> <strong>Version</strong> <strong>4.3</strong> <strong>Differences</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!