BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Security Flaws in Tunnel Mode IPsec - Kenny Paterson\, Royal Hollo
 way\, University of London
DTSTART:20060307T161500Z
DTEND:20060307T171500Z
UID:TALK5483@talks.cam.ac.uk
CONTACT:Saar Drimer
DESCRIPTION:We present a variety of attacks that efficiently extract plain
 text data from IP datagrams that are protected using the IPsec protocol ES
 P in tunnel mode. In contrast to earlier attacks of Bellovin\, our attacks
  require only small amounts of time and network bandwidth to be successful
 . The attacks apply in situations where the IP packets are not integrity p
 rotected\, or where integrity protection is supplied only by a higher laye
 r protocol. While strongly discouraged by experts\, these configurations o
 f IPsec are still allowed by the relevant IPsec standards. In addition\, w
 e believe that these configurations may be widely used in practice. We rep
 ort on successful implementation of the attacks against an IPsec VPN built
  using the native implementation of IPsec in Linux.\n\nJoint work with Arn
 old K.L. Yau.
LOCATION:FW11\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
