Skip to main content

IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution

  • Conference paper
  • First Online:
Policies for Distributed Systems and Networks (POLICY 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1995))

Abstract

IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inefficient and error-prone. An erroneous policy could lead to communication blockade or serious security breach. In addition, even if policies are specified correctly in each domain, the diversified regional security policy enforcement can create significant problems for end-to-end communication because of interaction among policies in different domains. A policy management system is, therefore, demanded to systematically manage and verify various IPSec policies in order to ensure an end-to-end security service. This paper contributes to the development of an IPSec policy management system in two aspects. First, we defined a high-level security requirement, which not only is an essential component to automate the policy specification process of transforming from security requirements to specific IPSec policies but also can be used as criteria to detect conflicts among IPSec policies, i.e. policies are correct only if they satisfy all requirements. Second, we developed mechanisms to detect and resolve conflicts among IPSec policies in both intra-domain and inter-domain environment.

This Research is supported in part by the U.S. Department of Defense Advanced Research Projects Agency under contract DABT63-97-C-0045 and in part by Nortel Networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC-2401, IETF, Nov. 1998.

    Google Scholar 

  2. Moffett, J. D., Sloman, M. S.: Policy Hierarchies for Distributed Systems Management. IEEE Journal on Selected Areas in Communication, vol. 11, pp. 1404–1414, 1993

    Article  Google Scholar 

  3. Condell, M., Lynn, C., Zao, J.: Security Policy Specification Language. Internet Draft, 〈draft-ietf-ipsp-spsl-00.txt〉, March, 2000

    Google Scholar 

  4. Jason, J.: IPsec Configuration Policy Model. Internet Draft 〈draft-ietf-ipsp-config-policy-model-00.txt〉, March, 2000

    Google Scholar 

  5. Pereira, R., Bhattacharya, P., IPSec Policy Data Model. Internet Draft 〈draft-ietf-ipsec-policy-model-00.txt〉, Feb. 1998

    Google Scholar 

  6. Moffett, J. D.: Requirements and Policies. Position paper for Policy Workshop 1999

    Google Scholar 

  7. Horowitz, E., Sahni, S.: Fundamentals of Computer Algorithms. Computer Science Press Inc.,1978.

    Google Scholar 

  8. Gen, M., Cheng, R.: Genetic Algorithms & Engineering Optimization. Wiley-Interscience, 2000

    Google Scholar 

  9. Xu, C., Gong, F., Baldine, I., Sargor, C., Jou, F., Wu, S. F., Fu, Z., Huang, H.: Celestial Security Management System. DARPA Information Survivability Conference and Exposition, 2000. DISCEX’ 00. Proceedings, Volume: 1, 1999, Page(s): 162–172 vol.1

    Google Scholar 

  10. Fu, Z., Huang, H., Wu, T., Wu, S.F., Gong, F., Xu, C., Baldine, I: ISCP: Design and Implementation of An Inter-Domain Security Management Agent (SMA) Coordination Protocol. Proceedings, NOMS 2000, Pages 565–578.

    Google Scholar 

  11. Sanchez, L.A., Condell, M.N: Security Policy System. Internet Draft, 〈draft-ietf-ipsec-sps-00.txt〉, Nov. 1998

    Google Scholar 

  12. Zao, J., Sanchez, L., Condell, M. Lyn, C., Fredette, M., Helinek, P., Krishnan, P., Jackson, A., Mankins, D., Shepard, M., Kent, S.: Domain Based Internet Security Policy Management. DARPA Information Survivability Conference and Exposition, 2000. DISCEX’ 00. Proceedings,1999, Pages: 41–53 vol.1

    Google Scholar 

  13. Lupu, E.C., Sloman, M: Conflict Analysis for Management Polcies. Proc. 5th IFIP/IEEE International Symposium on Integrated Network Management, pages 430–443, 1997

    Google Scholar 

  14. Lupu E.C., Sloman, M: Conflicts in Policy-Based Distributed Systems Management. IEEE Transaction on Software Engineering. Vol. 25, No. 6, pages 852–869, Nov./Dec. 1999

    Article  Google Scholar 

  15. Cholvy L. and Cuppens, F.: Analyzing Consistency of Security Policies. IEEE Symposium on Security and Privacy, 1997, Proceedings

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fu, Z. et al. (2001). IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. In: Sloman, M., Lupu, E.C., Lobo, J. (eds) Policies for Distributed Systems and Networks. POLICY 2001. Lecture Notes in Computer Science, vol 1995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44569-2_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-44569-2_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41610-4

  • Online ISBN: 978-3-540-44569-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics