Home work assignment 1 - due in class on Feb. 9, 2004 P. 52 2.6, 2.7, 2.8, 2.9 , 2.10 Home work assignment 2 - due in class on Feb. 16, 2004 P. 100 3.3, 3.4 Home work assignment 3 - due in class on Feb. 23, 2004 P. 102 3.15, 3.16, 3.17 PP. 198 - 199 6.1, 6.2, 6.6, 6.7, 6.8 Home work assignment 4 - due in class on March 8, 2004 P. 228 7.1 P. 229 7.2, 7.3, 7.4 P. 230 7.6 Open book mid-term on March 22, 2004 Home work assignment 5 - due in class on March 22, 2004 P. 254 8.2, 8.3, 8.4, 8.6 P. 280 9.2, 9.3, 9.4, 9.7, 9.8 P. 281 9.12 Home work assignment 6 - due in class on April 12, 2004 P. 309 10.1, 10.2, 10.3 P. 339 11.1, 11.2 Home work assignment 7 - due in clas on May 3, 2004 1) Why do you need to look up in the policy database for an incoming unencrypted packet? 2) If AH and ESP are to be used together to encrypt an outgoing packet, which protocol should be applied first, for both security and efficiency? 3) On page 503 of the textbook, there are 4 cases of IPSec tunneling illustrated. For each case, diagram the packet that is sent from the host in the left to the host in the right. Assume only ESP is used at each level. Ex: ------------------------------------- | IP | ESP | Data | ESP Trailer | | header | header| | | ------------------------------------- 4) Why is the SPI needed for inbound packets but not outbound packets for looking up in the SADB? 5) If you are implementing an application that requires security from end-to-end - ie. host to another, which methodology is preferred - SSL or IPSec? Why? 6) If your organization has a firewall, how should you deal with incoming IPSec Packets? Where would you put the IPSec gateway?