Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:07 PM
Connect Directly

Another Hurdle For IPsec

Some organizations are taking a second look at IPsec for more security, but, like SSL, it also relies on a flawed trust model

With Secure Sockets Layer (SSL) continuously under siege and certificate authorities in the spotlight for data breaches, is it time for rival protocol IPsec to take center stage?

IPsec has some key features, like support for various algorithms and apps, including voice-over-IP, and it provides data packet-checking for authentication. But it has never really caught fire as a VPN protocol because of concerns about its client element and potential higher-maintenance management than SSL, which is widely available commercially. Even so, some organizations are taking a second look at IPsec and running it along with SSL for more security.

"We are seeing people returning to IPsec. They are seeing the benefits, and the pros and cons," says Rainer Enders, CTO at NCP Engineering Americas, which sells both SSL and IPsec products. "IPsec is a very robust set of protocols ... For really high security apps, IPsec makes a lot more sense. It offers more security through its design as a security protocol -- not [by] the type of encryption, but the implementation."

Enders says IPsec is actually more secure than SSL, in part because many SSL implementations still run older versions of its TLS protocol. The key exchange protocol in IPsec is better built and secured, he says. "IPsec is really more secure from a security technology perspective," he says.

But not so fast, security experts say. IPsec relies on the same web of trust that SSL does, and that model has collapsed, they say.

"I think IPsec is a perfect protocol to use, but I think we would be avoiding the real problem," says security expert Taher Elgamal, who led SSL development efforts at Netscape. "If we use IPsec, we still [need] to use some PKI. So if we do not address the real issue, which is how does a client trust a server certificate, then IPsec will have the exact same issues we have today. We can still have rogue CAs, and we would still have the MD5 problems."

Security expert Dan Kaminsky concurs. "As long as SSL is broken, IPsec isn't going to fix it," Kaminsky says. "After we fix SSL, [then] there are reasons to revisit IPsec."

The underlying problem, he says, goes beyond protocols and crypto. It's key management, which dogs both SSL and IPsec: "IPsec has the exact same key management issues as SSL, with two more problems. First, you have to get the protocol to work through NATs [network address translation] and firewalls. Second, the thing doing the encryption, the kernel, is far away from the thing that is communicating with the user, the app," Kaminsky says.

So the kernel doesn't know who to validate trust for, and the app struggles to show trust to the user, he says. "The advantage of IPsec is not that it's a better protocol. It's that without application integration, you still get crypto. To do that, though, you need amazingly robust key management so the kernel itself knows who to encrypt to," Kaminsky says.

Authenticity and confidentiality are key elements of any cryptographic system, notes Will Irace, director of research and services for Fidelis Security Systems. "What's broken is the web of trust to authenticate who you are talking to is who they say they are," Irace says. And IPsec and SSL rely on that same flawed web of trust, he says.

[ Many security experts believe the Internet's trust model is broken. Figuring out how to fix it will take time and collaboration. See The Future Of Web Authentication. ]

Fixing the certificate authority (CA) infrastructure is no small feat, however. Moxie Marlinspike has developed a Web authentication model called Convergence that uses an additional layer of oversight, known as notaries. Anyone could elect to act as a notary, but security companies and Web authentication experts would likely fill the bill there, creating histories of a website's SSL certificates and rating them for consistency. And users would decide whether to trust a website rather than rely on the browser to do it for them.

So will IPsec ever take off? "The advantage of IPsec is that it's built into IPv6," says Ben Greenberg, senior security threat researcher at Fidelis. "When enterprises go IPv6, they will already have it [built in] ... and can use it to secure internal communications."

And DNSSEC also could breathe life into IPsec. "Ultimately DNSSEC is going to be the answer for a lot of key management woes, and it will revitalize IPSec as much as it will fix SSL," Kaminsky says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio


Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
User Rank: Author
2/15/2012 | 6:59:46 PM
re: Another Hurdle For IPsec
Will Irace here. I didn't mean to suggest that IPsec has a flawed web of trust, just that there simply isn't an IPsec trust infrastructure that would allow us to abandon SSL even if we wanted to. I blogged about this very topic last fall. I do hope Dan is right about DNSSEC.
User Rank: Apprentice
2/27/2012 | 9:20:30 AM
re: Another Hurdle For IPsec

IPsec has some key features, like support for various algorithms and
apps, including voice-over-IP, and it provides data packet-checking for
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.