Font Size: a A A

Implementation For IKEv2 In Linux

Posted on:2008-07-15Degree:MasterType:Thesis
Country:ChinaCandidate:J Y LiuFull Text:PDF
GTID:2178360215472247Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the beginning, the designers of Internet take no account of the security problems. With the rapid development of Internet and network security issues are becoming increasingly prominent. To enhance network security, IETF (Internet Engineering Task Force) announced the IP security standards (IPsec) in November 1998. IPsec provides a standard, robust and inclusive mechanism. It can provide some security assurances for IP and upper protocol , such as authentication, confidentiality, and other key management, etc.IKE (Internet Key Exchange) is an important component of IPsec protocol, whose main function is to realize exchange and management of the IPsec. IKEv1 is a kind of mixed protocol composed of ISAKMP, Oakley and SKEME, with the higher demand for the performance, security, many content increased and as a result the whole protocol more and more complex, lack of consistency. Therefore, in October 2005 the IETF working group issued the second edition of IKE, IKEv2. IKEv2 simplifies the redundant function of IKEv1, enhances the security, integrate all the protocols in one document (RFC4306).At present, the study on IKEv2 in China is still in the preliminary theory stage, and the real realization is rarely. Therefore, this paper will focus on the aspects of design and realization of the IKEv2 protocol. This paper analyses IKEv2 deeply through comparing with IKEv1, including the composition of IKEv2 protocol, IKEv2 negotiation process, IKEv2 message format, IKEv2 key exchange and the security of the protocol. On the basis of study of IKEv2 protocol mechanisms and implemention technology, this paper presents a practical realization project of IKEv2, with reference of famous open source, openikev2, adopting object-oriented C++ programming language, and based on the Linux platform to achieve a safe IKEv2 system with basic functions and good expansion.The system consists of the following five subsystems: system management, network communication, message exchange, payload handling, Encryption Algorithm and kernel communication. It adopts the PF_KEYv2 socket for communication between IKE and the operating system kernel secure database. In this paper, the design concept and function of the various subsystems are described and their work processes are introduced. The test results show that exchange of the key can be completed and SA can be established.
Keywords/Search Tags:IPsec, IKEv2, Security Association, payload
PDF Full Text Request
Related items