2002-Trust management for IPsec
- 格式:pdf
- 大小:314.44 KB
- 文档页数:24
IPSEC VPN 点到多点配置ipsecvpn点到多点配置总部是一个静态IP地址,分支是一个动态拨号。
获取的IP地址不稳定。
构建IPSec VPN总部usg-1配置[usg-1]firewallzonetrust[usg-1-zone-trust]addintg0/0/0[usg-1-zone-trust]退出[usg-1]FirewallZoneUntrust[usg-1-zone-untrust]addintg0/0/1[usg-1-zone-untrust]quit[usg-1]iproute-0。
0.0.00.0.0.011.0.0.1[usg-1]intg0/0/1[usg-1-gigabitethernet0/0/1]ipadd11.0.0.224[usg-1-gigabitethernet0/0/1]intg0/0/0[usg-1-gigabitethernet0/0/0]iPad192。
168.10.124[usg-1-gigabitethernet0/0/0]退出------------------------阶段一----------------------------[usg-1]ikeproposal1//配置一个安全提议[usg-1-ike-proposal-1]身份验证方法预共享//配置ike认证方式为预共享密钥[usg-1-ike-proposal-1]认证算法1//配置ike认证算法为sha1[usg-1-ike-proposal-1]integrity-algorithmaes-xcbc-96//配置ike完整性算法[usg-1-ike-proposal-1]dhgroup2//配置ike密钥协商dh组[usg-1-ike-proposal-1]退出[usg-1]ikepeerusg-n//创建一个ike对等体名字为usg-n[usg-1-ike-peer-usg-n]ike-proposal1//调用ike安全提议[usg-1-ike-peer-usg-n]pre-shared-keyabc123//配置预共享密钥[usg-1-ike-peer-usg-n]quit注:由于对方地址不是固定的,因此无需指定对方地址------------------------阶段二-----------------------------[usg-1]ipsecproposaltest//配置一个ipsec安全提议[usg-1-ipsec-proposed-test]封装模型隧道//封装采用隧道[usg-1-ipsec-proposed-test]transformesp//将ipsec安全协议配置为ESP[usg-1-ipsec-proposed-test]espauthentication-algorithmsha1//配置esp协议认证算法[usg-1-ipsec-proposal-test]ESP加密算法//配置esp协议加密算法为aes[usg-1-ipsec-proposal-test]退出[usg-1]acl3000//创建一个acl定义感兴趣流[usg-1-acl-adv-3000]规则许可资源192。
本文翻译者:weicq2000RFC 6071 IP安全(IPsec)和互联网密钥交换(IKE)文件路线图(2011年2月)RFC 6071废止了RFC 2411。
摘要过去几年,定义和使用IP安全(IPsec)和互联网密钥交换(Internet Key Exchange, IKE)的RFCs数量急剧增长。
造成这种复杂情况的主要原因是这些RFCs源于许多IETF工作组:最初的IPsec 工作组,它的各种衍生组织,以及其他使用IPsec和/或IKE来保护它们的协议流量的工作组。
本文件归纳与IPsec和IKE有关的RFCs。
包括对每个RFC的简短描述,伴随背景信息介绍IPsec成长和扩展的动机及其来龙去脉。
本文件废止了RFC2411,先前的“IP安全文件路线图”。
[RFC-2411]简单描述各种等级基本IPsec文件的相互关系。
[RFC-2411]的要点是说明文件的建议内容,这些文件规定附加加密和认证算法。
本备忘录状态本文件不是互联网标准跟踪(Internet Standards Track)规范;出版它是出于提供信息目的。
本文件是互联网工程任务组(Internet Engineering Task Force, IETF)的作品。
它代表IETF 社会的共识。
它收到了公众评价并已获得互联网工程指导组(Internet Engineering Steering Group, IESG)认可和获准出版。
由IESG批准的文件不一定都是某个层次互联网标准的候选方案;参阅RFC5741第2章。
有关本文件目前状态信息,任何错误,以及如何得到有关它的反馈可以浏览:/info/rfc6071。
版权声明Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved.This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modifiedoutside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it intolanguages other than English.目录第1章序言第2章IPsec/IEK背景信息2-1 IPsec/IKE文件相互关系2-2 IPsec版本2-2-1 “旧”IPsec (IPsec-v2)和“新”IPsec (IPsec-v3)的不同2-3 IKE版本2-3-1 IKEv1和IKEv2的不同2-4 IPsec和IKE的IANA注册第3章IPsec文件3-1 基本文件3-1-1 “旧”IPsec (IPsec-v2)3-1-2 “新”IPsec (IPsec-v3)3-2 对IPsec的补充3-3 一般考虑第4章IKE文件4-1 基本文件4-1-1 IKEv14-1-2 IKEv24-2 补充和扩展4-2-1 对端认证方法4-2-2 证书内容和管理(PKI4IPsec)4-2-3 失效的对端检查4-2-4 远程访问第5章密码算法和套件5-1 算法要求5-2 加密算法5-3 完整性保护(认证)算法5-4 组合模式算法5-5 伪随机函数(PRFs)5-6 密码套件5-7 迪菲赫尔曼算法第6章多播的IPsec/IKE第7章IPsec/IKE派生物7-1 IPsec策略7-2 IPsec MIBs7-3 IP压缩( IPComp)7-4 有比没有好安全(BTNS)策略7-5 密钥的Kerberized互联网协商(KINK)7-6 IPsec安全远程访问(IPSRA)7-7 IPsec密钥信息资源记录(IPSECKEY)第8章使用IPsec/IKE的其他协议8-1 移动IP(MIPv4和MIPv6)8-2 开放最短路径优先(OSPF)8-3 主机标识协议(HIP)8-4 流控制传输协议(SCTP)8-5 茁壮首部压缩(ROHC)8-6 边界网关协议(BGP)8-7 IPsec 基准(测试)8-8 网络地址转换器(NAT)8-9 会话发起协议(SIP)8-10 显示分组灵敏度标签第9章其他采纳非IPsec功能IKE的协议9-1 可扩展认证协议(EAP)9-2 光纤通道9-3 无线安全第10章致谢第11章安全考虑第12章参考文献12-1 信息性参考文献附录A 算法要求等级归纳第1章序言互联网协议安全(Internet Protocol Security, IPsec)是一组协议,它在IP层对互联网通信提供安全保证。
2022年职业考证-软考-信息安全工程师考试全真模拟全知识点汇编押题第五期(含答案)一.综合题(共15题)1.单选题数字水印技术通过在数字化的多媒体数据中嵌入隐蔽的水印标记,可以有效实现对数字多媒体数据的版权保护等功能。
以下关于数字水印的描述中,不正确的是( )。
问题1选项A.隐形数字水印可应用于数据侦测与跟踪B.在数字水印技术中,隐藏水印的数据量和鲁棒性是一对矛盾C.秘密水印也称盲化水印,其验证过程不需要原始秘密信息D.视频水印算法必须满足实时性的要求【答案】C 【解析】本题考查数字水印知识。
在数字水印技术中,水印的数据量和鲁棒性构成了一对基本矛盾;视频水印算法必须满足实时性的要求;隐形数字水印主要应用领域有原始数据的真伪鉴别、数据侦测与跟踪、数字产品版权保护。
数字水印根据输入输出的种类及其组合可分为三种:①秘密水印(非盲化水印)、②半秘密水印(半盲化水印)、③公开水印(盲化或健忘水印)。
盲化水印的检测不需要任何原始数据和辅助信息。
故本题选C 。
点播:数字水印原理:通过数字信号处理方法,在数字化的媒体文件中嵌入特定的标记。
水印分为可感知的和不易感知的两种。
其安全需求包括安全性、隐蔽性、鲁棒性,不要求可见性。
Normal 0 7.8 磅 0 2 false false false EN-US ZH-CN X-NONE 2. 单选题 根据自主可控的安全需求,近些年国密算法和标准体系受到越来越多的关注,基于国密算法的应用也得到了快速发展。
我国国密标准中的杂凑算法是( )。
问题1选项A.SM2B.SM3C.SM4D.SM9【答案】B【解析】本题考查我国密码算法方面的基础知识。
国家密码局认定的国产密码算法主要有SM1 (SCB2)、SM2、SM3、SM4、SM7、SM9、祖冲之密码算法(ZUC)等。
其中SM1、SM4、SM7、祖冲之密码(ZUC)是对称算法; SM2、SM9是非对称算法; SM3 是哈希算法。
可信度概念可信主要体现的是一种信任关系,信任关系存在于信任实体(即信任者和被信任者)之间,信任者信任被信任者,即“trustor trust trustee”,则被信任者被认为是可信的(trustworthy或者trusted)。
为了方便描述,本文将信任者实体记为trustor,被信任者实体记为trustee。
果trustee能够满足它所声明的或者trustor所期待的行为,trustor 认为truatee可信。
因此,trustor若要信任trustee,一方面trustee需要具有可信特性,包括安全性、可用性、可靠性、时效性等[28];另一方面trustor需要对trustee所声称的可信特性进行度量,从而决定是否信任 trustee,进而确定是否采用trustee的服务等。
可信度的定义如下:定义2-2:可信度是对主体(trustee)可信特性的评估,判断主体是否具有作为可信主体应具有的可信特性,其用T表示,且T∈[O,l],其值越大,可信度越高。
主体为具有可信特性,trustee需要保障机制进行支撑和维护,有了这些机制后,可以更方便地进行度量,如何保障和度量trustee具有某种可信特性,在某些研究领域己取得了卓有成效的研究成果,例如为保障安全的授权机制[29,30](包括从信任的角度研究授权问题的信任管理系统[31,32]),为保障可靠和可用的容错机制[33,34],保障网上交易可信度的信誉管理系统[35]等,但从信任角度分析这些工作存在一定的局限性,主要有:(l)这些特性和机制基本上都是从各自的角度考虑问题,难以覆盖信任的内涵。
例如,维护可靠性的容错机制如何让trustee可信?如何让trustor信任trustee?此类问题少有提及;或者,它们只是针对单一的可信特性,将信任等同于某一种特性和机制,例如授权或容错,即使像文献[31]中的信任管理系统,也只针对授权。
(2)这些可信特性彼此独立,对于有多种特性需求的系统来说(例如,有些使用者只关注系统的安全特征,而忽略时效性;有些使用者只根据可靠程度或可用程度来判定可信度;而有些使用者却可能既要求可靠性,又要求时效性,而且需求的程度不一样)很难有一致的执行效果,也缺乏统一的管理框架。
技术介绍安全和VPN 目录目录IPsec (1)IPsec简介 (1)IPsec的协议实现 (1)IPsec基本概念 (2)加密卡 (4)IPsec虚拟隧道接口 (4)使用IPsec保护IPv6路由协议 (6)IKE (6)IKE简介 (6)IKE的安全机制 (6)IKE的交换过程 (7)IKE在IPsec中的作用 (8)IPsec与IKE的关系 (8)技术介绍安全和VPN IPsec IPsecIPsec简介IPsec(IP Security)是IETF制定的三层隧道加密协议,它为Internet上传输的数据提供了高质量的、可互操作的、基于密码学的安全保证。
特定的通信方之间在IP层通过加密与数据源认证等方式,提供了以下的安全服务:数据机密性(Confidentiality):IPsec发送方在通过网络传输包前对包进行加密。
数据完整性(Data Integrity):IPsec接收方对发送方发送来的包进行认证,以确保数据在传输过程中没有被篡改。
数据来源认证(Data Authentication):IPsec在接收端可以认证发送IPsec报文的发送端是否合法。
防重放(Anti-Replay):IPsec接收方可检测并拒绝接收过时或重复的报文。
IPsec具有以下优点:支持IKE(Internet Key Exchange,因特网密钥交换),可实现密钥的自动协商功能,减少了密钥协商的开销。
可以通过IKE建立和维护SA的服务,简化了IPsec的使用和管理。
所有使用IP协议进行数据传输的应用系统和服务都可以使用IPsec,而不必对这些应用系统和服务本身做任何修改。
对数据的加密是以数据包为单位的,而不是以整个数据流为单位,这不仅灵活而且有助于进一步提高IP数据包的安全性,可以有效防范网络攻击。
IPsec的协议实现IPsec协议不是一个单独的协议,它给出了应用于IP层上网络数据安全的一整套体系结构,包括网络认证协议AH(Authentication Header,认证头)、ESP(Encapsulating Security Payload,封装安全载荷)、IKE(Internet Key Exchange,因特网密钥交换)和用于网络认证及加密的一些算法等。
中国太平洋保险(集团)股份有限公司二〇〇一年概况为推进我国保险体制改革和保险市场的发展,2001年,中国太平洋保险公司根据中国保监会批准的《中国太平洋保险公司分业经营机构体制改革实施方案》的要求,全面实施产、寿险分业经营机构体制改革。
2001年初,中国太平洋保险(集团)股份有限公司正式组建,并在国内投资控股设立中国太平洋财产保险股份有限公司和中国太平洋人寿保险股份有限公司,确立了“集团化管理、专业化经营、市场化运作”的经营管理新模式。
新组建的太平洋保险集团、太平洋产险、太平洋寿险于4月获得中国保监会颁发的“保险公司法人许可证”,并于10月完成了工商登记注册的全部手续,顺利完成了产、寿险分业经营机构体制改革。
2001年是太平洋保险集团体制改革大步向前推进、经营发展取得丰硕成果的一年。
在顺利实施产、寿险分业经营机构体制改革后,公司坚持走稳健经营之路,按照中国保监会批准的分业经营实施方案确定的职责范围,对产、寿险公司进行了有效的监督与管理,认真贯彻落实“以效益为中心、以市场为导向、以客户为基础”的经营指导思想,大力推进管理体制的改革和经营机制的转换,实现了产、寿险业务的快速健康发展。
2001年,太保全系统实现保费收入228.56亿元,同比增长49.91%,经营利润增幅连续第4年达到30%。
根据太保公司的经营实绩,商业创新方向国际组织继2000年授予太保公司“国际质量金星奖”之后,2001年再次授予太保公司“国际质量白金奖”。
在用人用工和分配机制方面,太平洋保险集团坚持培养人才与引进人才并举,内部竞聘上岗和面向海内外公开招聘的方式,使一批具有较高学历和丰富工作经验的优秀人才充实到精算、财务管理、信息技术、资金运用和电子商务等重要岗位,大大提升了人力资源的整体水平。
在风险防范方面,太平洋保险集团有计划、有层次地在全系统推行了全面预算管理方案,为加强公司对经营发展目标和财务基础工作的有效监控提供了强有力的手段。
FortiTrust User-based Security Product OfferingsIDENTITYIDENTITYMFAMobile Token with Mobile Push⃝✓Email/SMS OTP, Hardware Tokens⃝✓SMS Credits⃝✓FIDO2 Authentication/Registration Server⃝✓Third-party Application Integration⃝✓Adaptive AuthenticationIntegrated with Dynamic Policies and Fabric Connectors⃝✓Enforce based on Authorized Networks⃝✓Enforce based on User Location⃝✓Enforce based on Time of Day/Day of Week⃝✓Enforce Device Trust Policies based on Device Posture*⃝✓Cloud-hosted Identity ControllerSecure Application Access⃝✓Fortinet Single Sign On (FSSO)⃝✓Identity and Role-based Security Policies⃝✓Central User Identity Management⃝✓Certificate Management-VPN⃝✓SAML Service Provider/Identity Provider Web SSO⃝✓Open ID Connect SSO⃝✓Additional InformationFortiCare Premium Support⃝✓Order Information100-499 Users FC2-10-ACCLD-511-02-DD 500-1,999 Users FC3-10-ACCLD-511-02-DD 2,000-9,999 Users FC4-10-ACCLD-511-02-DD 10,000+ Users FC5-10-ACCLD-511-02-DD* Requires FortiClient EMSORDER LIFECYCLENew OrderExample: 350 Identity usersDirect purchase• FC2-10-ACCLD-511-02-DD (x350) Add More UsersExample: add 200 Identity users Direct purchase• FC2-10-ACCLD-511-02-DD (x200)Renew All UsersExample: renew all 550 Identity usersUse the co-term tool for all renewals. This aligns all contracts to the same expiration date and renews with the higher quantity/lower priced SKU.• FC3-10-ACCLD-511-02-DD (x550)22ORDERING GUIDE | FortiTrust User-based SecurityZTNA AND SASEZTNA SASE Remote Access and Zero TrustZTNA⃝✓⃝✓Central Management Using FortiClient Cloud⃝✓⃝✓Central Logging and Reporting⃝✓⃝✓SSL VPN ⃝✓⃝✓IPsec VPN⃝✓⃝✓CASB (Inline and Cloud API)⃝✓⃝✓IT Hygiene and Endpoint SecurityVulnerability Agent and Remediation⃝✓⃝✓FortiGuard Web Filtering⃝✓⃝✓FortiSandbox (On-premise or PaaS)⃝✓USB Device Control⃝✓Automated Endpoint Quarantine⃝✓Cloud-based Security (Inline Inspection)SSL⃝✓Antimalware⃝✓IPS⃝✓Web Filtering⃝✓DNS Filtering⃝✓Botnet/C&C⃝✓Data Leak Prevention ⃝✓Additional InformationNumber of Devices Up to 3 per-user Up to 3 per-user FortiCare Premium Support⃝✓⃝✓Order Information100-499 Users FC2-10-EMS05-509-02-DD FC2-10-EMS05-547-02-DD 500-1,999 Users FC3-10-EMS05-509-01-DD FC3-10-EMS05-547-02-DD 2,000-9,999 Users FC4-10-EMS05-509-01-DD FC4-10-EMS05-547-02-DD 10,000+ Users FC5-10-EMS05-509-01-DD FC5-10-EMS05-547-02-DDORDER LIFECYCLENew OrderExample: 350 ZTNA usersDirect purchase• FC2-10-EMS05-509-01-DD (x350) Add More UsersExample: add 200 ZTNA usersDirect purchase• FC2-10-EMS05-509-01-DD (x200)Renew All UsersExample: renew all 550 ZTNA usersUse the co-term tool for all renewals. This aligns all contracts to the same expiration date and renews with the higher quantity/lower priced SKU.• FC3-10-EMS05-509-01-DD (x550)Upgrade all Users from ZTNA to SASEExample: upgrade all 550 ZTNA users to SASEUse the co-term tool upgrade all existing users to SASE to the end of the term, and then follow regular renewal. • FC3-10-EMS05-547-02-DD (x550)3ORDERING GUIDE | FortiTrust User-based Security。
#1 Cybersecurity Company in the WorldLeading Every Evolutionof CybersecurityNearly 3x more patents than our nearest competitor~30% of Global Firewall Shipments and counting across industriesMost 3rd Party ValidatedMore tested and proven than any other network security vendorWho is Fortinet?ComplexityAdvancedThreatsValue and ROIComplexity •Attack surface is expanding and becoming harder to maintain V&C•Handing more valuable data•Lack staff to manage best-of-breed and remote locations•Managing disparate and poorly integrated solutions•Aggregating reporting / logs •Responding to conflicting alertsAdvancedThreats •Attack tech easier to use and consume •SMBs are handling more mature data and sharing like enterprises•Attackers know SMB not as many resources to stop and security not as high priority •When business shifts, security falls away •SMBs unsure whether existing security is effectiveValue and ROI•High powered firewalls are pricey •Unsure who to believe for SMB use-case•Consumer-grade tools unable to meet future growth needs (performance/function)ComplexitySMBs are consuming more tech•How well have you been able to maintain V&C through the shift?•We’re hearing a lot of issues and worry around endpoint hygiene, how are you handling?•How many different security and networking vendors are you trying tointegrate? Across how many locations?Advanced ThreatsSMBs targeted with more sophisticated threats•Others are seeing more sophisticated malware starting to come through and are evading detection –how do you feel?•How do you vet your security to know it’s working?•How much time do you have to spend checking and working on firewall administration?Value and ROIHigh costs for performance•When you were originally comparing vendors, did you look at Fortinet’s price and performance benchmarks?•Why didn’t you choose Fortinet? Willing to take another look?Performance and SecurityVisibility and ControlMaximizing ResourcesFortinet routinely performs multiple times faster than similarlypriced competitors without sacrificing securityYear after year, Fortinet is validated by third parties as one of theleading network security vendors on the marketFortinet is consistently recognized by industry leaders andanalysts including Gartner and NSS Labs as a leader incybersecurity and has higher performance than similarly pricedcompetitor devicesFortinet boasts the broadest, most integrated security platform onthe market with products designed to work together Business Challenges/ Fortinet Solutions43% of cyberattacks target SMBsFortinet SMB Security Solutions provide a path to complete protection SMBs can take advantage of tight integration , automation , and visibility cycles, and scale as the company grows89%of SMBs considercybersecurity a top priorityWith Fortinet, we can deliver complete protection , everywhere you need itAnd we’re designed to maximize simplicity performance you need to growWe deliver this through:Our missionA complete cloud-managed networking and security platform for lean IT teamsWith proven security that automatically adapts to changing business requirements and threats but doesn’t sacrifice performanceAt a price point designed to allow any size business to get the solution they need to handle modern challenges like shifting to a hybrid workforceIntelligent enough tohandle modern threatsand requirements…built to maximizelimited resourcesYou Need ASmarter ApproachProven SecurityConsolidatedManagementMaximum ValueIntent-based policiesUnified visibility controlCentralized cloud-managementof all your Switches, APs, Firewalls and SD-WAN into a single device , the FortiGate NGFWmaintain consistency with policies built around users, devices and applications that easily scale and adapt when things changegives you the freedom to manage andtroubleshoot any device, anytime, from anywhere and save money by eliminating onsite IT staff at remote locationsA complete cloud-managed networking and security platform for lean IT teamsA complete cloud-managed networking and security platform for lean IT TeamsMaintain consistency with intent-based policies built around users, devices and applications that easily scales and adapts when things changeIntent based policies and segmentation allow you to start building towards a zero-trust networkIntegrated endpoint and network visibility enables you to control endpoint hygiene and network access based on risk Build an adaptive hybrid environment with network access controls based on endpoint risk Simplify management by consolidating visibility and control of all your Switches, APs, NGFWs and SD-WAN into a single device, the FortiGate NGFW Modernize policy management by merging control of networking and security into a single, unified policy organized on a single screen and eliminate the need to shift across poorly integrated devices, management consoles and platformsBuild a smarter more secure network around how your business operates with an understanding of users, groups, devices and applications that maintains consistency and automatically adapts as your business changesFine tune application control and enable safe, business approved capabilities while blocking other risky, potentially dangerous features without shutting down access to the entire applicationA complete cloud-managed networking and security platform for lean IT TeamsCentralized cloud-management gives you the freedom to manage and troubleshoot any device, anytime, from anywhere and save money by eliminating onsite IT staff at remote locationsDesigned for growth allowing you to scale from small local deployments to large scale, diversified enterprises (FortiDeploy)Eliminate the need for on-site IT staffZTP Cut through the noise with intuitive dashboards, monitoring and centralized logging to alert you when something’s off and automate response Comprehensive monitoring integrates real-time and historical data into practical dashboards to help you quickly understand and identify key areas of improvement and understand how your network is operatingVisualize your entire network with an easy-to-use GUI, drill downs and out of the box reporting to easily explain quickly prove complianceStop endlessly hunting through policies and logs and quickly find what you’re looking for with advanced search capabilities and fully customizable time parametersMaintain performanceImplement enterprise security and automationTrustwithout an enterprise bill that delivers threatintelligence in minutes to prevent advanced threatseven with security and decryption fully engaged thanks to Fortinet’s dedication to R&D and parallel path processingin a vendor that’s been thoroughly tested and vetted by security experts and publicly validatedPeace of mind your security works and can adapt to changing businessrequirements and threatsPeace of mind your security works and can adapt to changing business requirements and threatsImplement enterprise security and automation without an enterprise bill that delivers threat intelligence in minutes to prevent advanced threatsBroadest natively integrated security platform on the market Threat intelligence automatically shared across the entire Fortinet Security Fabric in minutes, not hours or days Automation capabilities based on IoC Trust in a vendor that’s been thoroughly tested and vetted by security experts and publicly validated Leading IPS technologyGartner critical capZTPAdv. Malware ProtectionProtects against the latest viruses, spyware and otherthreats. Includes: Antivirus, Sandboxing, Anti-Botnet, VirusOutbreak ProtectionWeb & Content FilteringProvides protection through blocking access to malicious,hacked and inappropriate websitesApplication ControlQuickly create policies to allow, deny, or restrict access toindividual applications or entire categoriesIntrusion Prevention (IPS)Provides near real-time updates and threat intelligence toproactively block attacksVPN (IPsec & SSL)Creates an encrypted tunnel to enable secure remoteaccess for employees and branch locations465K+ customer networksacross all major threat vectorsInformation feeds200+100B+ EventsML and AI platform speeds detection and protectionWorldwide team of threat hunters,researchers, analysts, tool developers and data scientistsPreventionKnown attacksDetectionUnknown attacksFirewallsWebEmailsEndpointsIntelligencePlaybooks, IRThreat sharing and intelligence derived from billions of sensorsAutomated Security•Most widely deployed NGFW on themarket •Lowest cost per protected Mbps•Integrated Secure SD-WAN•Wi-Fi 6 Ready•Indoor and Outdoor options •Strong connectivity even in dense environments•Multiple Gigabit ports •Stackable•Power over Ethernet optionsFortiGate FortiSwitch FortiAPCritical networking components tightly integrated for superior performanceFortiGate 60F Security Compute Rating ComparisonSpecificationFortiGate60F (SOC4ASIC)IndustryAverageSecurityComputeRating1Palo AltoNetworksPA-220CheckpointSG-1550Cisco MerakiMX67SophosXG125SonicWallTZ400Firewall10Gbps 2.05Gbps5x0.5Gbps1Gbps0.45Gbps7 Gbps 1.3 Gbps IPsec VPN 6.5Gbps0.8Gbps8x0.1Gbps 1.3Gbps0.2Gbps 1.5 Gbps900 MbpsIPsec GW to GWtunnels200537---50-20Threatprevention0.70Gbps0.38Gbps2x0.15Gbps0.45Gbps0.3Gbps400 Mbps600 Mbps SSL Inspection0.75Gbps0.14Gbps5x0.065Gbps--170 Mbps180 MbpsConcurrentSessions700,00080,0009x64,000500,000--125,000Connections persecond35,0008,0004x4,20014,000NA-6,000 1.Security Compute Rating: Benchmark (performance multiplier) that compares FortiGate NGFW performance vs the industry average of competing products across various categories that fall within the same price bandSupport your visionDesigned for growthStretch your budgetwith right-sized solutions and purpose-built fabric connectors that deliver turnkey deployment and deeper integration vs. basic API integrationswith a trusted platform that helps you -not one that leaves you building workarounds and adding complexity as you growdon’t overpay for performance or make sacrifices when it comes to functionality, Fortinet leads the way in ROIA smarter investment to get the networking, security and performance you need today and for the futureA smarter investment to get the networking, security and performance you need today and for the futurePrice to PerformanceConsistently recognized leader by industry analysts including Gartner, NSS and of course our customersSuperior security compute ratings compared to competitors No charge Cyber Threat Assessment Program to help discover what may be lurking in your network so you can take action Designed for GrowthRight sized options and capabilities to fit your true needs with consistent look and feel enable you to expand when you’re ready from local SD-Branch deployments to large scale enterprisesFortinet’s open ecosystem architecture enables Fortinet Security Fabric to quickly integrate with other vendors and share information and perform coordinated actionsPurpose-built Fabric Connectors deliver turnkey API-based integration with as little as a single click free of charge and facilitate real-time communications and automatic updates between Fortinet and 3rd party solutionsKey DifferentiatorsAutomated SecurityBroadest Integrated Platform Industry-leading Price to PerformanceMost Deployed NGFW in the WorldSmarter Long-term InvestmentNetworking and Security Converged The FortiGate NGFW brings advanced threat protection, IPS, web filtering, SD-WAN and more in a single device without sacrificing security or adding complexityFortiSandbox Cloud is an as-a-service Sandbox that simplifies deployments and maintenance, and reducesFortinet prides itself on limited acquisitions to grow our capabilities and continues to boast the broadest offering in the industryMultiple times better performance than similarly priced competitors with the lowest total cost of ownership (TCO)Extensive security and management-as-a-service offering for SMBs looking to take advantage of cloud security and flexibility from a single vendorFortinet has more third-party validations than any other network security vendorSecurity-Driven NetworkingAdaptive Cloud SecurityFortiGuard Security ServicesOpen EcosystemFabric Management Center -NOCZero Trust AccessFabric Management Center -SOCLAN EdgeWAN EdgeDC EdgeCloud EdgeFortiGateFortiExtender FortiAPFortiSwitch FortiSASEFortiGate SD-WANFortiProxy FortiISolator NetworkPlatformApplicationsFortiGate VMFortiDDos Cloud NetworkingFortiCASBFortiCWPFortiWebFortiMailFortiADC FortiGSLBAWS Native Azure Native FortiToken FortiNACFortiClient FortiAuthenticatorFortiMonitorFortiManagerFortiCloudEndpointBreachIncident ResponseFortiXDRFortiEDRFortiAnalyzer FortiSIEMFortiISOARFortiSandboxFortiAIFortiDeceptorFortiGuard MDRServiceSOC & NOC User SecurityUser Security Device SecurityContent Security Advanced SOC/NOCWeb SecurityConnector Fabric APIDevOpsExtended Fabric Ecosystem。
T rust Management for IPsecMATT BLAZE and JOHN IOANNIDISA T&T Labs—ResearchandANGELOS D.KEROMYTISColumbia UniversityIPsec is the standard suite of protocols for network-layer confidentiality and authentication of Internet traffic.The IPsec protocols,however,do not address the policies for how protected traffic should be handled at security endpoints.This article introduces an efficient policy management scheme for IPsec,based on the principles of trust management.A compliance check is added to the IPsec architecture that tests packetfilters proposed when new security associations are cre-ated for conformance with the local security policy,based on credentials presented by the peer host. Security policies and credentials can be quite sophisticated(and specified in the trust-management language),while still allowing very efficient packet-filtering for the actual IPsec traffic.We present a practical portable implementation of this design,based on the KeyNote trust-management lan-guage,that works with a variety of UNIX-based IPsec implementations.Finally,we discuss some applications of the enhanced IPsec architecture.Categories and Subject Descriptors:C.2.0[Computer-Communication Networks]:General—security and protectionGeneral Terms:Languages,SecurityAdditional Key Words and Phrases:Credentials,IPsec,KeyNote,network security,policy,trust management1.INTRODUCTIONThe IPsec protocol suite,which provides network-layer security for the Inter-net,has recently been standardized in the IETF and is beginning to make its way into commercial implementations of desktop,server,and router operating systems.For many applications,security at the network layer has a number of advantages over security provided elsewhere in the protocol stack.The details of network semantics are usually hidden from applications,which therefore automatically and transparently take advantage of whatever network-layer This work was supported by DARPA under Contract F39502-99-1-0512-MOD P0001.A previous version of this article appeared in the Proceedings of the Network and Distributed System Security Symposium(NDSS)(Feb.2001),pp.139–151.Authors’addresses:M.Blaze,J.Ioannidis,AT&T Labs—Research,180Park Ave.,Florham,NJ 07932;email:{mab,ji}@;A.Keromytis,Columbia University,450CS Building, 1214Amsterdam Avenue,M.C.0401,New York,NY10027-7003;email:angelos@. Permission to make digital/hard copy of part or all of this work for personal or classroom use is granted without fee provided that the copies are not made or distributed for profit or commercial advantage,the copyright notice,the title of the publication,and its date appear,and notice is given that copying is by permission of the ACM,Inc.To copy otherwise,to republish,to post on servers, or to redistribute to lists,requires prior specific permission and/or a fee.C 2002ACM1094-9224/02/0500–0095$5.00ACM Transactions on Information and System Security,Vol.5,No.2,May2002,Pages95–118.96•M.Blaze et al.security services their environment provides.More important,IPsec offers a remarkableflexibility not possible at higher-or lower-layer abstractions:secu-rity can be configured end-to-end(protecting traffic between two hosts),route-to-route(protecting traffic passing over a particular set of links),edge-to-edge (protecting traffic as it passes between“trusted”networks via an“untrusted”one),or in any other configuration in which network nodes can be identified as appropriate security endpoints.Despite thisflexibility,IPsec does not itself address the problem of man-aging the policies governing the handling of traffic entering or leaving a host running the protocol.By itself,the IPsec protocol can protect packets from ex-ternal tampering and eavesdropping,but does nothing to control which hosts are authorized for particular kinds of sessions or to exchange particular kinds of traffic.In many configurations,especially when network-layer security is used to buildfirewalls and virtual private networks,such policies may necessarily be quite complex.There is no standard interface or protocol for controlling IPsec tunnel creation,and most IPsec implementations provide only rudimentary, packet-filter-based and ACL-based policy mechanisms.The crudeness of IPsec policy control,in turn,means that in spite of the availability of network-layer security,many applications are forced to duplicate at the application or transport layer cryptographic functions already provided at the network layer.There are three main contributions in this article:we introduce a new policy management architecture for IPsec,based on the principles of trust management;we present a design that integrates this architecture with the KeyNote Trust Management system;andfinally,we present a practical portable implementation of this design,currently distributed in open-source form in OpenBSD.1.1IPsec Packet Filters and Security AssociationsIPsec is based on the concept of datagram encapsulation.Cryptographically protected network-layer packets are placed inside,as the payload of,other net-work packets,making the encryption transparent to any intermediate nodes that must process packet headers for routing,and the like.Outgoing packets are encapsulated,encrypted,and authenticated(as appropriate)just before being sent to the network,and incoming packets are verified,decrypted,and decapsulated immediately upon receipt,as introduced in Ioannidis and Blaze [1993]and standardized in Kent and Atkinson[1998b].Key management in such a protocol is straightforward in the simplest case.Two hosts can use any key-agreement protocol to negotiate keys with each other,and use those keys as part of the encapsulating and decapsulating packet transforms.Let us examine the security policy decisions an IPsec processor must make. When we discuss“policy”in this article,we refer specifically to the network-layer security policies that govern theflow of traffic among networks,hosts,and applications.Observe that policy must be enforced whenever packets arrive at or are about to leave a network security endpoint(which could be an end host, a gateway,a router,or afirewall).ACM Transactions on Information and System Security,Vol.5,No.2,May2002.Trust Management for IPsec•97 IPsec“connections”are described in a data structure called a security associ-ation(SA).Encryption and authentication keys are contained in the SA at each endpoint,and each IPsec-protected packet has an SA identifier that indexes the SA database of its destination host(note that not all SAs specify both en-cryption and authentication;authentication-only SAs are commonly used,and encryption-only SAs are possible albeit considered insecure).When an incoming packet arrives from the network,the hostfirst determines the processing it requires.—If the packet is not protected,should it be accepted?This is essentially the “traditional”packetfiltering problem,as performed,for example,by network firewalls.—If the packet is encapsulated under the security protocol:—Is there correct key material(contained in the specified SA)required to decapsulate it?—Should the resulting packet(after decapsulation)be accepted?A second stage of packetfiltering occurs at this point.A packet may be successfully decapsulated and still not be acceptable(e.g.,a decapsulated packet with an invalid source address,or a packet attempting delivery to some port not permitted by the receiver’s policy).A security endpoint makes similar decisions when an outgoing packet is ready to be sent.—Is there a security association that should be applied to this packet?If there are several applicable SAs,which one should be selected?—If there is no SA available,how should the packet be handled?It may be for-warded to some network interface,dropped,or queued until an SA is made available,possibly after triggering some automated key management mech-anism such as IKE,the Internet Key Exchange protocol[Harkins and Carrel 1998].Observe that because these questions are asked on packet-by-packet basis, packet-based policyfiltering must be performed,and any related security trans-forms applied,quickly enough to keep up with network data rates.This implies that in all but the slowest network environments there is insufficient time to process elaborate security languages,perform public key operations,traverse large tables,or resolve rule conflicts in any sophisticated manner.IPsec implementations(and most other network-layer entities that enforce security policy,such asfirewalls),therefore,employ simple,filter-based lan-guages for configuring their packet-handling policies.In general,these lan-guages specify routing rules for handling packets that match bit patterns in packet headers,based on such parameters as incoming and outgoing addresses and ports,services,packet options,and so on[McCanne and Jacobson1993].IPsec policy control need not be limited to packetfiltering,however.A great deal offlexibility is available in the control of when security associations are created and what packetfilters are associated with them.ACM Transactions on Information and System Security,Vol.5,No.2,May2002.98•M.Blaze et al.Most commonly however,in current implementations,the IPsec user or ad-ministrator is forced to provide“all or nothing”access,in which holders of a set of keys(or those certified by a particular authority)are allowed to create any kind of security association they wish,and others can do nothing at all.A further issue with IPsec policy control is the need for two hosts to discover and negotiate the kind of traffic they are willing to exchange.When two hosts governed by their own policies want to communicate,they need some mecha-nism for determining what,if any,kinds of traffic the combined effects of each other’s policies are permitted.Again,IPsec itself does not provide such a mech-anism;when a host attempts to create an SA,it must know in advance that the policy on the remote host will accept it.The operation then either succeeds or fails.While this may be sufficient for small VPNs and other applications where both peers are under the same administrative control,it does not scale to larger-scale applications such as public servers.1.2Related WorkThe IKE specification[Harkins and Carrel1998]makes use of the Subject Alternate Namefield in X.509[CCITT1989;Housley et al.1999]certificates to encode the packet selector the certificate holder may use during IKE Quick Mode.Beyond this,no standard way has yet been defined for negotiating,ex-changing,and otherwise handling IPsec security policy.Sanchez and Condell[1998]define a protocol for dynamically discovering, accessing,and processing security policy information.Hosts and networks be-long to security domains,and policy servers are responsible for servicing these domains.The protocol used is similar in some ways to the DNS protocol.This protocol serves as the basis of the IETF IP Security Policy Working Group.Condell et al.[1999]describe a language for specifying communication secu-rity policies,heavily oriented toward IPsec and IKE.SPSL is based on the rout-ing policy specification language(RPSL)[Alaettinoglu et al.1998].Although SPSL offers considerableflexibility in specifying IPsec security policies,it does not address delegation of authority,nor is it easily extensible to accommodate other types of applications.Although it is possible to translate from SPSL policy statements directly to KeyNote policies(and vice versa,for local host policies),it is not possible to express trust relationships and refine the author-ity conferred to a principal(another administrator or an end-user)in SPSL alone.A number of other Internet Drafts have been published defining various directory schemata for IPsec policy.Similar directory-based work has also been started in the context of the IETF Policy Framework Working Group.It is still too early to determine what the results of that effort will be.COPS[Boyle et al.2000]defines a simple client/server protocol wherein a policy enforcement point(PEP)communicates with a policy decision point (PDP)in order to determine whether a requested action is permissible.COPS is mostly oriented toward admission control for RSVP[Braden et al.1997]or similar protocols.It is not clear what its applicability to IPsec security policy would be.ACM Transactions on Information and System Security,Vol.5,No.2,May2002.Trust Management for IPsec•99 RADIUS[Rigney et al.1997]and its proposed successor,DIAMETER [Calhoun et al.1999],are similar in some ways to COPS.They require commu-nication with a policy server,which is supplied with all necessary information and is depended upon to make a policy-based decision.Both protocols are ori-ented toward providing accounting,authentication,and authorization services for dial-up and roaming users.Wefirst proposed the notion of using a trust management system for network-layer security policy control in Blaze et al.[1999b].2.TRUST MANAGEMENT FOR IP SECA basic parameter of the packet-processing problems mentioned in the previous section is the question of whether a packet falls under the scope of some security association.SAs contain and manage the key material required to perform network-layer security protocol transforms.How then do SAs get created?The obvious approach is to trigger the creation of a new SA whenever com-munication with a new host is attempted,if that attempt would fail the packet-level security policy.The protocol could be based on a public key or Needham–Schroeder scheme[Needham and Schroeder1978].Unfortunately,protocols that merely arrange for packets to be protected un-der security associations do nothing to address the problem of enforcing a pol-icy regarding theflow of incoming or outgoing traffic.Recall that policy control is a central motivation for the use of network-layer security protocols in the first place.In general,and rather surprisingly,security association policy is largely an open problem—one with very important practical security implications and with the potential to provide a solid framework for analysis of network security properties.Fortunately,the problem of policy management for security associations can be distinguished in several important ways from the problem offiltering indi-vidual packets.—SAs tend to be rather long lived;there is locality of reference insofar as hosts that have exchanged one packet are very likely to also exchange others in the near future.—It is acceptable that policy controls on SA creation should require substan-tially more resources than could be expended on processing every packet(e.g., public key operations,several packet exchanges,policy evaluation,etc.).—The result of negotiating an SA between two hosts can provide(among other things)parameters for more efficient,lower-level packet policy(filtering) operations.The trust-management approach[Blaze et al.1996]for checking compliance with security policy provides exactly the interface and abstractions required.2.1The KeyNote T rust Management SystemBecause we make extensive use of the concepts of trust management,and espe-cially the KeyNote language,we provide a brief review of those concepts here.ACM Transactions on Information and System Security,Vol.5,No.2,May2002.100•M.Blaze et al.The notion of trust management was introduced in Blaze et al.[1996].A trust-management system provides a standard interface that applications can use to test whether potentially dangerous actions comply with local security policies.More formally,trust-management systems are characterized by:—a method for describing actions,which are operations with security conse-quences that are to be controlled by the system;—a mechanism for identifying principals,which are entities that can be autho-rized to perform actions;—a language for specifying application policies,which govern the actions that principals are authorized to perform;—a language for specifying credentials,which allow principals to delegate au-thorization to other principals;and—a compliance checker,which provides a service for determining how an ac-tion requested by principals should be handled,given a policy and a set of credentials.KeyNote is a simple andflexible trust-management system designed to work well for a variety of applications.In applications using KeyNote,policies and credentials are written in the same language.The basic unit of KeyNote pro-gramming is the assertion.Assertions contain programmable predicates that operate on the requested attribute set and limit the actions that principals are allowed to perform.KeyNote assertions are small,highly structured programs. Authority can be delegated to others;a digitally signed assertion can be sent over an untrusted network and serve the same role as traditional certificates. Unlike traditional policy systems,policy in KeyNote is expressed as a combina-tion of unsigned and signed policy assertions(signed assertions are also called credentials).There is a wide spectrum of possible combinations;at the one ex-treme,all system policy is expressed in terms of local(unsigned)assertions.At the other extreme,all policy is expressed as signed assertions,with only one rule(the root of the policy)being an unsigned assertion that delegates to one or more trusted entities.The integrity of each signed assertion is guaranteed by its signature;therefore,there is no need for these to be stored within the security perimeter of the system.KeyNote allows the creation of arbitrarily sophisticated security policies,in which entities(which can be identified by cryptographic public keys)can be granted limited authorization to perform specific kinds of trusted actions.When a“dangerous”action is requested of a KeyNote-based application,the application submits a description of the action along with a copy of its local secu-rity policy to the KeyNote interpreter.Applications describe actions to KeyNote with a set of attribute/value pairs(called an action attribute set in KeyNote terminology)that describe the context and consequences of security-critical op-erations.KeyNote then“approves”or“rejects”the action according to the rules given in the application’s local policy.KeyNote assertions are written in ASCII and contain a collection of struc-turedfields that describe which principal is being authorized(the Licensee), ACM Transactions on Information and System Security,Vol.5,No.2,May2002.Trust Management for IPsec•101 who is doing the authorizing(the Authorizer),and a predicate that tests the action attributes(the Conditions).For example:Authorizer:"POLICY"Licensees:"Boris Yeltsin"Conditions:EmailAddress=="yeltsin@kremvax.ru"means that the“POLICY”principal authorizes the“Boris Yeltsin”principal to do any action in which the attribute called“EmailAddress”is equal to the string “yeltsin@kremvax.ru”.An action is authorized if assertions that approve the ac-tion can link the“POLICY”principal with the principal that authorized the ac-tion.Principals can be public keys,which provides a natural way to use KeyNote to control operations over untrustworthy networks such as the Internet.A complete description of the KeyNote language can be found in Blaze et al. [1999a].2.2KeyNote Control for IPsecThe problem of controlling IPsec SAs is easy to formulate as a trust-management problem:the SA creation process(usually a daemon running IKE) needs to check for compliance whenever an SA is to be created.Here,the actions represent the packetfiltering rules required to allow two hosts to conform to each other’s higher-level policies.This leads naturally to a framework for trust management for IPsec.—Each host has its own KeyNote-specified policy governing SA creation.This policy describes the classes of packets and under what circumstances the host will initiate SA creation with other hosts,and also what types of SAs it is willing to allow other hosts to establish(e.g.,whether encryption will be used and if so what algorithms are acceptable).—When two hosts discover that they require an SA,they each propose to the other the“least powerful”packet-filtering rules that would enable them to ac-complish their communication objective.Each host sends proposed packetfil-ter rules,along with credentials(certificates)that support the proposal.Any delegation structure between these credentials is entirely implementation-dependent,and might include the arbitrary web-of-trust,globally trusted third parties,such as certification authorities(CAs),or anything in between.—Each host queries its KeyNote interpreter to determine whether the pro-posed packetfilters comply with local policy and,if they do,creates the SA containing the specifiedfilters.Other SA properties can also be subject to KeyNote-controlled policy.For example,the SA policy may specify acceptable cryptographic algorithms and key sizes,the lifetime of the SA,logging,and accounting requirements.Our architecture divides the problem of policy management into two com-ponents:packetfiltering,based on rules applied to every packet,and trustACM Transactions on Information and System Security,Vol.5,No.2,May2002.102•M.Blaze et al.management,based on negotiating and deciding which of these rules(and re-lated SA properties,as noted above)are trustworthy enough to install.This distinction makes it possible to perform the per-packet policy opera-tions at high data rates while effectively establishing more sophisticated trust-management-based policy controls over the traffic passing through a security endpoint.Having such controls in place makes it easier to specify security pol-icy for a large network,and makes it especially natural to integrate automated policy distribution mechanisms.2.3Policy DiscoveryAlthough the IPsec compliance-checking model described above can be used by itself to provide security policy support for IPsec,there are two additional issues that need to be addressed if such an architecture is to be deployed and used.Recall that in a trust management system such as KeyNote,the rules govern-ing any given request might be contained not only in a local policyfile but also in signed credentials,which,because they are signed,could be stored anywhere.If a credential containing a relevant clause is not available to the machine doing the compliance checking,a“legal”action might not be approved.It is therefore important to discover and acquire all the credentials required to approve an action.Although users or hosts may be expected to manage lo-cally policies and credentials that directly refer to them,they may not know of intermediate credentials(e.g.,those issued by administrative entities)that may be required by the hosts with which they want to communicate.Consider the case of a large organization,with two levels of administration;local pol-icy on thefirewalls trusts only the“corporate security”ers obtain their credentials from their local administrators,who authorize them to connect to specificfirewalls.Thus one or more intermediate credentials delegating au-thority from corporate security to the various administrators is also needed if a user is to be successfully authorized.Naturally,in more complex network configurations(such as extranets)multiple levels of administration may be present.Some method for determining what credentials are relevant and how to acquire them is needed.The most straightforward solution is top-to-bottom distribution of credentials:that is,each administrator passes to the next level (be it end-users or another administration level)the necessary credentials it received from the higher level,along with the newly minted credentials.This approach is simple and does not require any additional provisioning,however, it does not work well if the various credentials in a“bundle”expire at different times;the end-user still needs some way of acquiring a fresh version of expired credentials.One way of rectifying this is to have the host that intends to initiate an IKE exchange use a simple protocol,which we call a policy query protocol(PQP),to acquire or update credentials relevant to a specific intended IKE exchange.The initiator presents a public key to the responder and asks for any credentials where the key appears in the Licenseesfield.By starting from the initiator’s own key(or from some key that delegates to the initiator),it is possible to acquire all ACM Transactions on Information and System Security,Vol.5,No.2,May2002.Trust Management for IPsec•103 credentials that the responder has knowledge of that may be of use to the initia-tor.The responder can also provide pointers to other servers where the initiator mayfind relevant credentials;in fact,the responder can just provide a pointer to some other server that holds credentials for an administrative domain.Since the credentials themselves are signed,there is no need to provide additional security guarantees in the protocol itself.However,any local policies that the responder discloses would have to be signed prior to being sent to the initiator;the fact that a KeyNote policy“becomes”a credential simply by virtue of being signed is very useful here.Also,the PQP server can have its own policy concerning which hosts are allowed to query for credentials.As described,the PQP protocol does not use encryption;thus an eavesdropper could collect potentially sensitive information encoded in the credentials(e.g., topology and services run behind afirewall,privileges of a user,etc.).Moreover, an active attacker could determine all the privileges of a key simply by run-ning the PQP protocol against afirewall or credential repository.To avoid this the credentials sent to the client can be encrypted under thefirst public key provided in a PQP session;thus only the key holder can see these credentials. This approach works well with credential servers,where the credentials can be preencrypted and simply served to clients.Forfirewalls,or where the pre-computation or storage requirements cannot be met,PQP can be run over an IPsec-protected session;thefirewall or credential server is configured to accept IPsec SAs that can only transfer traffic from the client to the server’s PQP port; the PQP daemon can then extract the public key used for the client authenti-cation in IKE,and compare it to the initial key used in the PQP session.The second problem is determining our own capabilities based on the cre-dentials we hold.This is in some sense complementary to compliance checking; by analyzing our credentials in the context of our peer’s policy,it is possible to determine what types of actions are accepted by that peer.That is,we can dis-cover what kinds of IPsec SA proposals are accepted by a remote IKE daemon. This can assist in avoiding unnecessary IKE exchanges(if it is known in ad-vance that no SAs acceptable to both parties can be agreed upon),or narrow down the set of proposals we send to our peer.Note that if a host reveals all the relevant credentials and policies using the policy query protocol,another host can determine in advance and offline exactly what proposals that host will accept.When thefirewall policies are deemed too sensitive for disclosure,the re-sponder can either insist on running PQP over IPsec(allowing for release of such policies only to trusted clients),or can simply not reveal any sensitive in-formation.In the latter case,the capability determination process will compute capabilities based on partial information;at worst,this can cause the initiation of IKE exchanges that will ultimately fail(which,in any case,is the current state of affairs).Certain factors work in our favor here:first,the“last”credential (that issued by the last administrator in the hierarchy to an end-user)typically contains enough information to determine many of the acceptable parameters for an exchange(e.g.,see Figure8);second,since these credentials are targeted to specific users,revealing these does not have a significant impact in revealing the overall system or network stly,there has been some recent workACM Transactions on Information and System Security,Vol.5,No.2,May2002.。