Tuesday, May 19, 2020

Ipsec tunnel mode vs transport mode (with ESP) question

Greetings everyone,

Anyone could point me out why would we want to use "tunnel" mode to add an extra IP header?

From what I saw if we look and analyze a packet in wireshark:

This is Transport mode:

https://scontent-vie1-1.xx.fbcdn.net/v/t1.15752-9/98065733_265413391269414_5199767491944906752_n.png?_nc_cat=107&_nc_sid=b96e70&_nc_ohc=7YElVVBDy04AX9rwP7O&_nc_ht=scontent-vie1-1.xx&oh=273bc37cddc4668868ddaa6b93cf9860&oe=5EE8F29E

And this is Tunnel mode:

https://scontent-vie1-1.xx.fbcdn.net/v/t1.15752-9/98114771_244528820299832_2444806594471395328_n.png?_nc_cat=102&_nc_sid=b96e70&_nc_ohc=fbFgp3hkORoAX8rHdW-&_nc_ht=scontent-vie1-1.xx&oh=5afea1c28bbf69d29de147548ed182e9&oe=5EE8E64B

Now, either wireshark is bugged, or there is absolutely ZERO difference between the two packet.

They say that in "tunnel mode" there is an additional new IP header that was generated.
(So in "Tunnel mode" we had an original header and another totally same new header was replicated and put in front of the whole encrypted packet? or what the hell.)

Why would we replicate and put the totall same header in front of our encrypted packet?
Because we could make sure that the "original encrypted header would be fully untouched"? or something?

Anyone could help me out with this?

Point out whats the difference between the two wireshark packet capture?



No comments:

Post a Comment