SwIPe (protocol)

The swIPe IP Security Protocol (swIPe) is an experimental Internet Protocol (IP) security protocol that was specified in 1993. It operates at the Internet Layer of the Internet Protocol Suite.

Purpose

swIPe provides confidentiality, integrity, and authentication of network traffic, and can be used to provide both end-to-end and intermediate-hop security. swIPe is concerned only with security mechanisms. The protocol does not handle policy and key management, which are handled outside the protocol. It works by augmenting each packet with a cryptographically-strong authenticator and/or encrypting the data to be sent.[1]

Protocol description

swIPe encapsulates each IP datagram to be secured inside a swIPe packet.[1] A swIPe packet is an IP packet of protocol type 53.[2][3] A swIPe packet starts with a header, which contains identifying data and authentication information; the header is followed by the original IP datagram, which in turn is followed by any padding required by the security processing. Depending on the negotiated policy, the sensitive part of the swIPe packet (the authentication information and the original IP datagram) may be encrypted.[1]

Cisco routers and switches running IOS have been found vulnerable to Denial of Service (DoS) attacks which may result from processing packets with IP Protocol 53.[4]

References

  1. 1 2 3 John Ioannidis and Matt Blaze (December 1993). "The swIPe IP Security Protocol INTERNET DRAFT". Columbia University and AT&T Bell Labs.
  2. "Assigned Internet Protocol Numbers". Internet Assigned Numbers Authority (IANA).
  3. "RFC5237". Internet Engineering Task Force (IETF).
  4. Security advisory for Cisco products
This article is issued from Wikipedia - version of the 8/3/2014. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.