Internet Protocol Security (IPsec) is a protocol suite for securing IP communications by authenticating and/or encrypting each IP packet of a communication session.
Questions tagged [ipsec]
282 questions
1
vote
0 answers
Enumerate all IPSec filters/policies from an AD Domain
We've an AD Domain on Server 2008R2 (objectVersion 47) and running at 2003 functionality. Running commands on PowerShell v5.0.10586.117
IPSec policies and associated IP filter lists are used just for IP filtering (no encryption).
I believe all IPSec…

HP_PH
- 11
- 3
1
vote
1 answer
IPSec NAT traversal
ESP transport mode is incompatible with NAT (not NAPT or PAT)
I saw on many papers that because NAT device should calculate TCP checksom so transport mode wouldn't work with NAT.
the question is - how the NAT device can differ between Transport mode…

user636415
- 11
- 1
1
vote
1 answer
XFRM Ipsec Anti-Replay detection for ESN packets
For IPSEC anti-replay detection, if the sequence number is less than the lowest sequence in the window, is the packet dropped or accepted?
I assume it should be dropped, but for ESN packets it seems that the packet is accepted.
In the xfrm…

rickest rick c132
- 21
- 3
1
vote
1 answer
ipsec encryption support in linux: SADB_EALG_NONE vs SADB_EALG_NULL
In linux/pfkeyv2.h I can see following values:
#define SADB_EALG_NONE 0
...
#define SADB_EALG_NULL 11
Anyone can explain what is the difference between those values and how specifying those values in sadb_sa.sadb_sa_encrypt would…

miradham
- 2,285
- 16
- 26
1
vote
1 answer
python error while ipsec verify under archlinux
I've been trying to setup a l2tp vpn connection for my computer, and while following the guide, I felt on a python error on line 84
link to the Openswan L2TP/IPsec VPN client setup guide.
ipsec verify
File "/usr/local/libexec/ipsec/verify", line…

MathieuAuclair
- 1,229
- 11
- 41
1
vote
3 answers
Timer not expiring precisely during sleep state in Android
We are trying to implement timer for native code in android .The timer should work precisely during wake and sleep mode .When timer expires then our native code will send DPD(Dead peer detection) messages to the network
We tried following…

somil
- 13
- 3
1
vote
1 answer
How do I determine if a connected socket uses IPSec?
I am working on a Windows server application that will transfer sensitive information to another Windows server over a socket using an HTTPClient. The servers are supposed to be configured to use IPSec. So yay, I I don't have to do anything to…

Moby Disk
- 3,761
- 1
- 19
- 38
1
vote
2 answers
OSI Layer 2 encryption
I'm currently for a side project trying to setup a VPN with 2 linux box doing the encryption/decryption.
At the moment, I work on layer 3 with the linux framework xfrm (IP packets from host 1 are transformed into ESP when passing through the first…

JB430
- 21
- 2
1
vote
1 answer
How to get the encryption domain?
we want to setup IPSec in linode to connect to a data supplier company. They require as to provide the domain ip and encryption domain. How do we get this encryption domain, is it the broadcast domain?

Mark L
- 13
- 1
- 1
- 3
1
vote
1 answer
Is it possible to get a username form a VPN (L2TP/IPSec) connection?
I am currently maintaining web applications available from a secure network. My users connect to the network within a VPN connection using L2TP/IPSec, to which they authenticate using their user id and password. When they access the web…

Greg Graham
- 473
- 7
- 18
1
vote
1 answer
What Configuration Values are available for Google Cloud VPN using IKE v1?
My client is asking me to fill out a form in order to setup the VPN and make sure that our configuration values are compatible. They've sent me a list of configuration values for the VPN using IKE v1 that they use, such as
Mode
Encryption Algorithm…

Trak
- 677
- 1
- 5
- 7
1
vote
1 answer
difference between IP security issue in authentication, data encryption, and message integration?
I am confused about these terms and what method or algorithm they used to achieved that. From what I learned, there are two ways for data encryption: symmetric key and public key; And message integration are done by using hash algorithm; And…

W.YAO
- 13
- 3
1
vote
1 answer
How can we Securely Handle liveness checking messages in IKEv2 with notify payload INVALID_IKE_SPI
This is a question hitting my mind but can not come up with solution.
Suppose there is a IKE tunnel between two peers (peer_1,peer_2). Now there is an attacker who wants to break this tunnel. What the attacker is doing is that for every keep alive…

user2940110
- 69
- 2
- 7
1
vote
1 answer
IPSEC Google App Engine
I have an app running on Google App Engine.
My app should use a SOAP web-service that exposed via IPSEC tunnel.
How can I establish this connection without any proxy in the middle?

noamcohen97
- 453
- 3
- 13
1
vote
2 answers
SIP: IPSEC vs TLS
I am new to the VOIP concepts. I just took a course on VOIP. I am interested in implementations of SIP using TLS, IPSEC and Digest as well.
I want to see if SIP signaling uses IPSEC instead of TLS, how would it effect the performance, would the…

NewStacker
- 17
- 1
- 6