NIST Special Publication 800-77 Study Notes
Special Publication 800-77 Guide to IPsec VPNs
General Information
Authors: Sheila Frankel, Karen Kent, Ryan Lewkowski, Angela D. Orebaugh, Ronald W. Ritchey, Steven R. Sharma.
Publisher: National Institute of Standards and Technology (NIST).
Publication Date: December 2005.
Document Number: NIST Special Publication 800-77.
Introduction
Purpose: The guide assists organizations in implementing IPsec as a solution to secure sensitive data communications over networks.
Audience: Targeted towards network architects, administrators, security staff, technical support, and security program managers.
Document Structure: The guide is structured into major sections covering network layer security, IPsec fundamentals, implementation planning, alternatives to IPsec, case studies, and future directions.
Network Layer Security
Need for Network Layer Security
TCP/IP Model: Comprised of four layers:
Application Layer: Deals with specific applications (e.g., DNS, HTTP).
Transport Layer: Provides session services (e.g., TCP, UDP).
Network Layer: Routes packets (IP); incorporates protocols such as ICMP and IGMP.
Data Link Layer: Concerns physical devices (e.g., Ethernet).
Security Controls
Security controls at each layer:
Application Layer: Specific to each application; may require extensive customization.
Transport Layer: Protects connections; TLS is a common example.
Network Layer: More flexible; protects all traffic without application modifications.
Data Link Layer: Useful for dedicated circuits or dial-up connections but limited for broader applications.
IPsec Fundamentals
Overview
IPsec Architecture: Provides confidentiality, integrity, and authentication for IP packets.
Protocols:
Authentication Header (AH): Provides integrity and authentication; cannot encrypt.
Encapsulating Security Payload (ESP): Provides encryption and integrity.
Internet Key Exchange (IKE): Negotiates SAs for protection and key management.
IP Payload Compression Protocol (IPComp): Optionally compresses packets.
AH Protocol
Modes: Transport and Tunnel.
Transport Mode: Original IP header remains unchanged.
Tunnel Mode: Creates a new IP header.
Integrity Protection Process: Uses keyed hash algorithms like HMAC.
Header Format: Six fields including Next Header and Security Parameter Index (SPI).
ESP Protocol
Modes: Transport and Tunnel, each with encryption and integrity capabilities.
Fields: ESP Header contains SPI and Sequence Number; authentication information is optional.
Encryption Process: Utilizes symmetric algorithms (e.g., AES, 3DES).
Planning and Implementation
Phased Approach
Identify Needs: Determine what communications need protection and select appropriate methods.
Design the Solution: Define architecture, authentication methods, cryptography policy, and packet filters.
Implement and Test Prototype: Validate the solution through comprehensive testing.
Deploy the Solution: Gradually introduce IPsec into the network infrastructure.
Manage the Solution: Maintain and adapt the solution as necessary.
Considerations
Gateway Placement: Affects security, functionality, and performance.
NAT Issues: Need for compatibility due to IP address alterations by NAT devices.
User Authentication: Methods include pre-shared keys and digital signatures; each has pros and cons.
Alternatives to IPsec
Overview of Alternatives
Alternative protocols are categorized by the TCP/IP model layers they operate in:
Data Link Layer: PPTP, L2TP, L2F.
Transport Layer: TLS, SSL.
Application Layer: PGP, SSH.
Key Examples
PPTP: Older protocol with known security weaknesses; not recommended.
L2TP: Tunnels data and often used alongside IPsec.
SSL/TLS: Commonly used for application security; less effective for whole network protection.
Planning and Implementation Case Studies
Case Study Overview
Reviews three scenarios of implementing IPsec:
Connecting a Remote Office to Main Office.
Protecting Wireless Communications.
Protecting Communications for Remote Users.
Scenario Discussion
Each case study outlines the needs, evaluates options, designs, and discusses implementation and configuration details.
Future Directions
Network Security Enhancements
Ongoing revisions of IPsec standards, particularly with IKEv2 and versions 3 of AH and ESP.
Multicast traffic challenges remain a concern; research progresses on solutions.
IPv6 integration remains crucial, ensuring IPsec encapsulation capabilities are incorporated.
Appendices
Policy Considerations
Provides guidelines for creating policies related to IPsec implementations.
Covers gateway management, user authentication, and traffic management strategies.
Configuration Files
Sample configurations referenced in case studies to illustrate deployment steps.
Glossary & Acronym List
Definitions and abbreviations commonly used within the document.