Virtual Private Networks

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Cisco Router as a VPN Server. Agenda VPN Categories of VPN – Secure VPNs – Trusted VPN Hardware / Software Requirement Network Diagram Basic Router Configuration.
Encrypting Wireless Data with VPN Techniques
Internet Protocol Security (IP Sec)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Chapter 5 Network Security Protocols in Practice Part I
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Introduction to Cryptography
Guide to Network Defense and Countermeasures Second Edition
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Virtual Private Networking Karlene R. Samuels COSC513.
K. Salah1 Security Protocols in the Internet IPSec.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
Masud Hasan Secue VS Hushmail Project 2.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Network Security. Information secrecy-only specified parties know the information exchanged. Provided by criptography. Information integrity-the information.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
406 NW’98 1 © 1998, Cisco Systems, Inc. IPSec Loss of Privacy Security Threats Impersonation Loss of Integrity Denial of Service m-y-p-a-s-s-w-o-r-d.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Group 9 Chapter 8.3 – 8.6. Public Key Algorithms  Symmetric Key Algorithms face an inherent problem  Keys must be distributed to all parties but kept.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Virtual Private Networks
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
Chapter 8 Network Security.
Virtual Private Network (VPN)
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
VPN: Virtual Private Network
Public-Key, Digital Signatures, Management, Security
Presentation transcript:

Virtual Private Networks Fred Baker

What is a VPN Public networks are used to move information between trusted network segments using shared facilities like frame relay or atm A VIRTUAL Private Network replaces all of the above utilizing the public Internet Performance and availability depend on your ISP and the Internet

Why?

HomeNet to the office.

VPN Types

VPN Implementations

VPN as your Intranet

What a VPN needs VPNs must be encrypted VPNs must be authenticated so no one can read it VPNs must be authenticated No one outside the VPN can alter the VPN All parties to the VPN must agree on the security properties

VPN Components

Parts of a VPN

VPN works via crypto/Encapsulation

Encryption and Decryption Clear-Text Clear-Text Bob Is a Fink Bob Is a Fink 8vyaleh31&d ktu.dtrw8743 $Fie*nP093h Encryption is the masking of secret or sensitive information such that only an authorized party may view (or decrypt) it Encryption Decryption Cipher Text 43 11 43

Basic Crypto – Keys are key

2 Kinds Key Systems

Symmetric Key Algorithms DES—56-bit key Triple-DES—encrypt, decrypt, encrypt, using either two or three 56-bit keys IDEA—128-bit key Blowfish—variable-length key, up to 448 bits 15

Public Key Encryption Example Alice wants to send Bob encrypted data Alice gets Bob’s public key Alice encrypts the data with Bob’s public key Alice sends the encrypted data to Bob Bob decrypts the data with his private key Alice Bob What is encrypted with the public key can only be decrypted with the private key. Anyone can encrypt with someone’s private key but only the intended recipient can decrypt What is encrypted with the private key can only be decrypted with the public key. Only the holder of the private key can encrypt, anyone can decrypt—proof of signature. Message Encrypted Message Message Encryption Decrypt Bob’s Public Key Bob’s Private Key 13 49 49

PKI vs Symmetric Key PKI easier as you don’t have to manage keys on a per user basis But MUCH more compute intensive (up to 1000 times faster) Many systems do a combination I.e. PGP Use PKI to send a symmetric key Then use the symmetric key to crypto the data

Using Crypto in real life

PKI to send Private Keys

PKI Certs a way to authenticate

Prove the user cert Certificates of authority

Digital Signature to verify data not changed in transit

PKI the full picture

Where you do Crypto

Technologies

Application Layer: SSL

Transport Layer: IPSEC A standard is composed of: Diffie-Huffman key exchange PKI for the DH exchanges DES and other bulk encryption Hash to authenticate packets Digital Certificates to validate keys

Transport Layer: IPSEC VPNs 3 parts

Tunnel vs Transport Transport Tunnel Implemented by the end point systems Real address to real address Cannot ‘go through’ other networks Tunnel Encapsulation of the original IP packet in another packet Can ‘go through’ other networks End systems need not support this Often PC to a box on the ‘inside’

Diffie-Hellman Key Exchange (1976) By openly exchanging non-secret numbers, two people can compute a unique shared secret number known only to them Diffie-Hellman Key Generation By exchanging numbers in the clear, two entities can determine a new unique number known only to them Result is a shared secret Neither party can alone control value Neither party knows—no needs to know—private key of other 45 16 45

Modular Exponentiation Both g and p Are Shared and Well-Known Generator, g Modulus (prime), p Y = gX mod p Diffie-Hellmann exchange is based upon the concept of modular exponentiation. The prime p denotes a galois field. The numbers are HUGE—e.g,. 1024 bits 2^237276162930753723 mod 79927397984597926572651 17

Diffie-Hellman Public Key Exchange Private Value, XA Public Value, YA Private Value, XB Public Value, YB Alice Bob YA =g mod p XA YB = g mod p XB YA D-H exchange is in fact two exponentiations One exponentiation produces a “public value”. Private value is a random (but very large) number Public numbers are exchanged and another exponentiation is performed. Each party derives the same shared secret Susceptible to man-in-the-middle attack YB XA XA XB XB YB mod p = g mod p = YA mod p (shared secret) 46 18 46

Security Association is the agreement on how to secure

create the ISAKMP SA (Internet Security Association Key Management Protocol)

IPSEC Key Exchange (IKE)

IKE allows scale as I do not need to hard code passwords for each pair

Link Layer: L2TP for VPDN (Vir Pvt Dial Net)

PPTP: Free from Microsoft

PPTP: Security

VPN Comparisons

So why have a private network: QOS not fully cooked Very dependent on your ISP Real hard to do across ISPs So no guarantee of performance

Other Issues

Like Nat

Wireless: a new big driver, WAS (Work At Starbucks)

Many security protocols, depends on deployer

VPN means I don’t care how you connect

Example

So what could be wrong? VPN clients hit the network stack May not play well with personal firewalls Or other software May not need full access to the target network just encrypted access

One answer: clientless VPN Use SSL as the transport protocol to an appliance Can add NT authentication to the appliance Clientless mode: Use web enabled applications over the Internet, the appliance SSLifies web sites Java Applet: Use an downloadable applet to send traffic over SSL, get more support for applications. Can work well if you want to have encrypted web based apps without redoing the application to use SSL you need certs and have to change EVERY link to HTTPs Also big hit on the server cpu

Summary: VPNs Very big in the work access space Wireless Exploit High speed Wireless in the office public ‘hot spots’ like Borders Replaces direct dial into the work network Replace dedicated Business partners May replace the corporate WAN