ipsecesp(7P)
NAME
ipsecesp, ESP - IPsec Encapsulating Security Payload
SYNOPSIS
drv/ipsecesp
DESCRIPTION
The ipsecesp module provides confidentiality, integrity,
authentication, and partial sequence integrity (replay pro-
tection) to IP datagrams. The encapsulating security payload
(ESP) encapsulates its data, enabling it to protect data
that follows in the datagram. For TCP packets, ESP encapsu-
lates the TCP header and its data only. If the packet is an
IP in IP datagram, ESP protects the inner IP datagram. Per-
socket policy allows "self-encapsulation" so ESP can encap-
sulate IP options when necessary. See ipsec(7P).
Unlike the authentication header (AH), ESP allows multiple
varieties of datagram protection. (Using a single datagram
protection form can expose vulnerabilities.) For example,
only ESP can be used to provide confidentiality. But pro-
tecting confidentiality alone exposes vulnerabilities in
both replay attacks and cut-and-paste attacks. Similarly,
if ESP protects only integrity and does not fully protect
against eavesdropping, it may provide weaker protection than
AH. See ipsecah(7P).
Algorithms and the ESP Device
ESP is implemented as a module that is auto-pushed on top of
IP. Use the /dev/ipsecesp entry to tune ESP with ndd(1M), as
well as to allow future algorithms to be loaded on top of
ESP. ESP allows encryption algorithms to be pushed on top
of it, in addition to the authentication algorithms that can
be used in AH. Authentication algorithms include HMAC-MD5
and HMAC-SHA-1. See authmd5h(7M) and authsha1(7M). Encryp-
tion algorithms include DES, Triple-DES, Blowfish and AES.
See encrdes(7M), encr3des(7M), encrbfsh(7M) and encraes(7M).
Each authentication and encryption algorithm contain key
size and key format properties. Because of export laws in
the United States, not all encryption algorithms are avail-
able outside of the United States.
Security Considerations
ESP without authentication exposes vulnerabilities to cut-
and-paste cryptographic attacks as well as eavesdropping
attacks. Like AH, ESP is vulnerable to eavesdropping when
used without confidentiality.
ATTRIBUTES
See attributes(5) for descriptions of the following attri-
butes:
____________________________________________________________
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
|_____________________________|_____________________________|
| Availability | SUNWcsr (32-bit) |
|_____________________________|_____________________________|
| | SUNWcarx (64-bit) |
|_____________________________|_____________________________|
| Interface Stability | Evolving |
|_____________________________|_____________________________|
SEE ALSO
ipsecconf(1M), ndd(1M), attributes(5), authmd5h(5),
authsha1(7M), encrdes(7M), encr3des(7M), encrbfsh(7M),
ip(7P), ipsec(7P), ipsecah(7P)
Kent, S. and Atkinson, R.RFC 2406, IP Encapsulating Security
Payload (ESP), The Internet Society, 1998.
NOTES
Due to United States export control laws, encryption
strength available on ESP varies for versions of the SunOS
sold outside the United States.
See authmd5h(7M) and authsha1(7M). Encryption algorithms
include DES, Triple-DES, Blowfish and AES. See encrdes(7M),
encr3des(7M), and encrbfsh(7M).
Man(1) output converted with
man2html