Research Report about IPsec VPN
|
|
|
- Magnus Warren
- 9 years ago
- Views:
Transcription
1 Research Report about IPsec VPN Twan Jonel Fangbin, Abstract IPsec VPN supplies a secure transport medium for the private network in a public environment. In this case research, different aspects of IPsec VPN has been investigated, such as the implementation of IPsec VPN, scalability and security. Although, IPsec supplies a secure transfer method over the internet, it is still vulnerable for some certain sort of attack such as sniffing and so forth. Also, the scalability of IPsec VPN is a big problem for its success, although it achieves a low cost through applying the pubic network medium. 1
2 Contents 1 Introduction What is VPN? What is IPsec Why IPsec Components of IPsec VPN IPsec Protocols IKE Management Building an IPsec connection Transport or tunnel-mode NAT traversal IPsec between two hosts or networks Linux to Linux Windows to Windows Linux to Windows Scalability of IPsec VPN 9 5 Security of IPsec VPN ISAKMP Vulnerability Id: Recommendations Vulnerability Advisory IPSEC id: Solution Weak Encryption The algorithm Authentication cracking tool How IKECrack works Microsoft PPTP protocol used with VPN Conclusion 13 2
3 1 Introduction 1.1 What is VPN? VPN is an abbreviation for Virtual Private Network. VPN is built up on the basis of the existing network. Through transferring the private data over public domain, the cost for it is reduced significantly. Since data is transferred over a public medium, the confidentiality must be protected. Various kinds of encryption can be used by VPN. There are two main ways of encryptions, Symmetric Cryptography and Asymmetric Cryptography. With symmetric cryptography, the same key is used for both of encrypting and decrypting the messages. On the other hand, with asymmetric cryptography, two keys are used for encryption and decryption. In most of cases, the asymmetric encryption is used to authenticating each other, while the symmetric encryption is applied to supply the confidentiality of the data. Some popular symmetric encryption algorithms include DES, AES, 3DES and so forth. Some famous asymmetric algorithm consists of such as RSA, DSA, and so forth. 1.2 What is IPsec IPsec is a collection of some special internet protocols to supply a secure data transfer over the network layer. The standard IP (Internet Protocol) supports no security mechanism when it was designated firstly. With the increasing demands of the internet security, some new protocol have been developed for the network layer, such as AH, ESP, and so forth. IPsec becomes the name of the collection of all these protocols. Therefore, IPsec can be utilized in multiple application for security purpose. For example, the confidentiality and integrity of data transferred over the network can be guaranteed, the authentication of data sender can be realized, the relay and the analysis of the data transferred over the public internet can be prevented, and so forth. 1.3 Why IPsec IPsec has became a much more popular VPN security technology than many other concurrent such as PPTP, L2TP, and so forth because of some utility 3
4 advantages supplied by it. Firstly, many VPN product vendors support these protocol, since these protocol is compatible with many other protocols. In this way, the vendor s products will be quite compatible with other vendor s product. Further, the automatic key exchange mechanism make the integrating of new equipment into the VPN network much easier. Another significant advantage IPsec supplies is that, it works in the network layer, which means that the user application will not need to apply this protocol, they can just enjoy a secure network transfer transparently. All the way, the IPsec has been a standard method for the VPN technologies. 2 Components of IPsec VPN In this section, the main working theory of IPsec by VPN will be introduced. IPsec uses various protocols to process different kinds of security tasks, such as origin authentication, data confidentiality keeping, access control and so forth. Further, two main transfer modes are used within IPsec which are transport mode and tunnel mode. These two modes are used for various links over the transfer parties. Also, to establish a secure data transfer, a confidential key exchange mechanism is used by IPsec. Finally, various implementation modes of IPsec are supplied for various purposes. 2.1 IPsec Protocols There are two main protocols to support the security on IPsec. The first one is AH standing for Authentication Header, and the other is ESP for Encapsulated Security Payload. AH is used for the transport origin authentication, further the access control and anti-replay protection and so forth. The ESP can be used to supply a secure link to transfer confidentiality data, and to achieve a limited traffic flow confidentiality. These two protocols can be used individually as well as be used together. When used individually, a secure communication link can be built up for the transfer parties. When used with each other, a combination of security service can be supplied. 4
5 For the authentication, a key exchange algorithm must be implemented so that the confidentiality and integrity can be kept. The method for key exchange will be discussed in the coming chapters. 2.2 IKE Management As mentioned in the previous section, both of the transfer parties need to authenticate each other before a confidentiality transfer can be initiated. For this purpose, a special protocol called Internet Key Exchange is used for communication parties to negotiate, create and process the security associations used for their transfer. With Security Association, a number of security policies is defined, for the connections. There are two phases needed to build up a secure communication link. In the first phase, the goal is to establish a secure transfer channel so that in the second phase, the IPsec security associations can be exchanged safely. In the second phase, the real IPsec security associations are negotiated and built up. In each of these two phases, various mode is used such as main mode or passive mode. Also various protection algorithm is used for each mode, such as AES, DES, Deffie-Hellman for various goals. 3 Building an IPsec connection Before encrypted data can travel from one side to the other, a number of key exchanges has to be done. These exchanges, necessary to negotiate a session key, are called phases. The first, main phase is mainly responsible for the encryption negotiation. The second, quick phase initializes the SA s, Security Association, with the pre-shared keys or certificates. The SA s are the IPsec end-points and encrypt data with a session key. When a IPsec connection expires, only the quick phase is needed to negotiate a new session key and rebuild the connection. This expiring is critical, because excessive use of the same session key will weaken the encryption. The key exchange in the first, main phase can be done in main-mode or aggressive-mode. The aggressive-mode skips the encryption mechanism negotiation, thus it is recommended to use main-mode. Main-mode also makes eaves-dropping more difficult (see chapter 5.1.1). This alone makes its use preferred. 5
6 There are several ways to define keys. Keys can be pre-shared and used as a shared secret or another way is the use of the public/private key mechanism. The last mechanism is also known as certificates and is the most recommended method while it reveals the least about the cipher. That way it s more difficult to crack the connection. Thus to establish a VPN connection, the following procedures are executed: IKE: Phase 1: main-mode or aggressive-mode (encryption negotiation) IKE: Phase 2: quick-mode (setup of SA s) IPsec: starting tunnel (network data traffic) 3.1 Transport or tunnel-mode IPsec can be utilized for multiple sorts of transfer endpoints. This can be either encryption in transport-mode or tunnel-mode. Tunnel-mode is useful when encryption is only needed between two firewalls (site to site). An example is a network connection between two remote sites. The traffic between these to sites has to be secure. In this mode, the protection of data is not fully provided, on the other hand, a host does not need to know about IPsec, which makes security easy and invisible. Transport-mode encrypts the data stream completely and adds an new IP header in front of the ESP packet. Transport-mode is recommended when users work off-site on a foreign network. This method is also referred as end to end encryption. The data stream that leaves a host is yet encrypted and can not be sniffed. This can lead to some error prone situations, especially when the network s firewall or router is blocking certain ports or uses NAT. To work around the problem with NAT, NAT traversal, also known as NAT-T was invented. 3.2 NAT traversal Many experts believe that NAT is an bad solution to the IP shortage due to IPv4. IETF designed IPsec that way that it shouldn t work over a NAT router. That way they thought that people would move to IPv6 - designed by the IETF as well - sooner. Unfortunately IPv4 was propagated that much 6
7 that people circumvented this problem instead of moving to IPv6. To solve issues with NAT routers, ESP has to travel through like other TCP or UDP packets. So instead of being used as a protocol equally like IP, ESP is encapsulated in an UDP packet. This way it is possible to connect VPN s over a NAT setup. The use of NAT-T is not recommended. It makes things more complicated than they already are. When a situation arises where a VPN must be build over a NAT router, a better solution is to let the NAT router forward all the incoming traffic to a default host. This host then can handle the ESP traffic and do firewalling. There are NAT routers available on the market that are IPsec aware. These routers can handle ESP traffic in a more delicate way without bludging it into UDP streams. They can even build the transport-mode tunnel with the other side. [6] 3.3 IPsec between two hosts or networks A SA, Security Authority, that connects a VPN to a LAN is also known as a VPN gateway. This is because of its gateway-ing nature. The gateway can connect one LAN to another. Multiple hosts can by this gateway connect to the other side Linux to Linux.or unix to unix. To build a VPN connection between to Linux hosts is simple. Only IPsec is needed with a pre-shared key as minimum. When using Kernel 2.6 the setup of IPsec is even more convenient because of the build-in encryption capabilities. Kernel 2.4 needs to be patched against the userland sources to fully support IPsec. Independent of kernel version, Openswan or FreeSwan is necessary to build the meant connection. Although both kernels work, version 2.6 is recommended. [18] Windows to Windows VPN technology was made available to Windows 2000 and XP out-of-thebox. It s fairly easy to interconnect modern Windows machines. With some extra software it is also possible to connect Windows 98 and ME as well. There s a lot of third-party software on the market that does the same thing as the already available implementation. This software on the other hand 7
8 can come in handy when creating certificates (discussed later). The authentication of the underlaying IPsec connection is done primarily by PKCS12-certificates, although XP (not 2000) supports pre-shared keys. The creation of certificates is the hardest part of setting up a VPN connection. Openssl on a Linux box can be useful when creating certificates. The Microsoft implementation of VPN differs somewhat from the standard implementation. Microsoft uses an additional tunnel over IPsec to establish a connection. This extra tunnel is created by PPTP or L2TP. The reason why Microsoft had choosen to do things this way, is that they believe that certificates can only be used to authenticate hosts, not humans. PAP or CHAP are used to check user credentials and therefor an extra layer, PPTP or L2TP is needed. [16] Thus to establish a VPN connection, the following procedures are executed: IKE: Phase 1: main-mode or aggressive-mode (negotiation) IKE: Phase 2: quick-mode (SA setup, host authentication) IPsec: starting tunnel (underlaying tunnel) L2TP: starting additional tunnel (network data transfer. user authentication) Linux to Windows As said before, Windows uses an extra tunnel, authenticated with PAP or CHAP, over the IPsec connection. PPTP is known to be insecure (see chapter 5.5), which makes L2TP the preferred standard. Thus, when it comes to connecting Windows machines to Linux, extra software is needed. This software establishes the PPP connection over this tunnel, so that Linux can talk to the Windows host. The PAP or CHAP authentication can be done by the very available PPPd, bundled with every linux or unix distribution. Further L2TPd is needed, which is available as a RPM package. When PAP authentication is used, one can use a single daemon, L2TPNSd, to do both creating a L2TP tunnel and do the PPP authentication. One drawback of PAP is that it isn t encrypted. Although this isn t a big issue, because of the underlaying 8
9 IPsec tunnel, it is not recommended. Instead, CHAP or MS-CHAP is the preferred standard. Microsoft tends to use own products or standards and therefor MS-CHAP has somewhat better support.[16] It is also recommended to setup the IPsec connection with certificates. The only difference is that on Linux, PEM certificates can be used. Even DER format is supported on Linux. To make the IPsec connection work, one has to be sure that on both ends, the same root certificate is used to sign the individual ones. To eliminate problems, it is possible to use the same certificate on both Linux and Windows. The Windows variant still has to be in PKCS12 format.[17] The IPsec tunnel across Internet must be setup with routable Internet addresses, but the PPTP or L2TP tunnel can be established with private or non-routable addresses. When the latter is the case, it has the advantage that the connection is assured. It s certain that the non-routable traffic will not get to the other side without the L2TP tunnel. When routable addresses are used, traffic can still reach another host without the use of the tunnel. So it is recommended that PPTP or L2TP tunnels are made with private, non-routable Internet addresses. 4 Scalability of IPsec VPN Although the IPsec supplies a good protection for the confidentiality data transferred over the public network, it has also raised some drawback for its application. One of them is the limitation on the scalability of IPsec over VPN. Since IPsec VPN is implemented by the tunnel transfer mode, the tunnel server for the package processing will be extremely loaded when multiple packages need to be sent to local endpoints. Another drawback is that IPsec VPN does not support broadcast. IPsec VPN is designated for the point-to-point communication which is secured with tunnel mode. With this mode, the message sent over the internet are all the unicast. This characteristic also make the relay operation for the message impossible since the whole body of the original data is encrypted and packaged with the IPsec package as explained in the section 3.1. Also the bandwidth will be affected by the multiple unicast package. 9
10 5 Security of IPsec VPN 5.1 ISAKMP Vulnerability Id: A group at the University of Oulu (Finland)[7] developed a test suite called OUSPG PROTOS ISAKMP to generate abnormal ISAKMP traffic. As they used this test suite against various IPSEC implementations, they found them to be vulnerable[8]. The severity of these vulnerabilities varies by vendor. These flaws may expose denial-of-service conditions, formatproven very susceptible to attack string vulnerabilities, and buffer overflows. All these could shut down devices and slow transmission of data across the Internet. In some cases, they could also allow hackers to execute code and hijack a device. Cisco and Juniper, two of the largest networking technology vendors, acknowledged that some of their products are at risk. OpenSWAN an open source software, may be used in many Linux and BSD based appliances is also vulnerable. The OUSPG PROTOS ISAKMP Test Suite does not test Internet Key Exchange version 2 (IKEv2), it is based on IKEv1. ISAKMP consists of two phases. In phase 1, the two parties negotiate a SA to agree on how to protect the traffic in the next phase. In phase 2 keying material is derived and the policy to share it is negotiated. In this way, security associations for other security protocols are established. Multiple ISAKMP implementations behave in anomalous way when they receive and handle ISAKMP Phase 1 packets with invalid and/or abnormal contents. By applying the OUSPG PROTOS ISAKMP Test Suite to a variety of products, several vulnerabilities can be revealed that can have varying effects Recommendations These are the suggestions recommended by the NISCC[9] when mitigate to IPSec against the issues discussed in this advisory: If possible, use packet filters and accepts ISAKMP negotiations only from trusted IP-addresses 10
11 Avoid using aggressive mode* in phase 1 [*In aggressive mode, fewer exchanges are made and with fewer packets during the negotiation stage. The weakness of using this mode is that both sides have exchanged information before there is a secure channel.] The solution to this situation is by looking at the Vendor Information. They came out with patches for platform specific remediation. 5.2 Vulnerability Advisory IPSEC id: In May 2005 a vulnerable[10] was identified about three attacks that apply to certain configurations of IPsec. These configurations use Encapsulating Security Payload (ESP) in tunnel mode with confidentiality only, or with integrity protection being provided by a higher layer protocol. Some configurations using AH to provide integrity protection are also vulnerable. In these configurations, an attacker can modify sections of the IPsec packet, causing either the clear text inner packet to be redirected or a network host to generate an error message. In the latter case, these errors are relayed via the Internet Control Message Protocol (ICMP); because of the design of ICMP, these messages directly reveal segments of the header and payload of the inner datagram in clear text. An attacker who can intercept the ICMP messages can then retrieve plaintext data. The attacks have been implemented and demonstrated to work under realistic conditions Solution Any of the following methods[11] can be used to rectify this issue: 1. Configure ESP to use both confidentiality and integrity protection. This is the recommended solution. 2. Use the AH protocol alongside ESP to provide integrity protection. However, this must be done carefully: for example, the configuration where AH in transport mode is applied end-to-end and tunneled inside ESP is still vulnerable. 3. Remove the error reporting by restricting the generation of ICMP messages or by filtering these messages at a firewall or security gateway. 11
12 5.3 Weak Encryption In some cases an IPSec connection is made with the use of client software. The user and group password are mostly store in the local user profile file. If a weak encryption is used it can be revealed with the knowledge of a good cryptographer. In this article some describe that he has found a way how to reveal the password of a Cisco VPN Client. He describes[12]: The main problem of the method used to encrypt the passwords is, that the whole procedure is deterministically and no user input is used. This effectively means that the encryption keys the Cisco Client calculates can also be calculated by any other program whensoever this program knows the algorithm. This algorithm was now reversed The algorithm The algorithm which is used to encrypt a given user/group password is shown below The current date as a string is retrieved (e.g. Mon Sep 19 20:00: ) Then a SHA-1 Hash h1 is computed (20 Bytes) h1 is modified and a new Hash h2 is calculated h1 is again modified and h3 is calculated The 3DES key is made of h2 and the first 4 bytes of h3 The password is encrypted using 3DES in CBC Mode. The IV consists of the first 8 bytes from h1. The algorithm computes a last hash h4 from the encrypted password The key enc UserPassword in our profile file now looks like this: h1 h4 encrypted password 5.4 Authentication cracking tool A tool who can crack the IKE/IPSec authentication is IKECrack. It is an open source tools which is design to brute force or dictionary attack the password key/password used with Pre-Shared Key [PKE] IKE authentication. This tool was built to demonstrate proof-of-concept ad will work with RFC 2409 based aggressive mode PSK authentication. 12
13 5.4.1 How IKECrack works IKE Aggressive Mode BruteForce Summary Aggressive Mode IKE authentication is composed of the following steps[13]: 1. Initiating client sends encryption options proposal, DH public key, random number [nonce i], and an ID in an un-encrypted packet to the gateway/responder. 2. Responder creates a DH public value, another random number [nonce r], and calculates a HASH that is sent back to the initiator in an unencrypted packet. This hash is used to authenticate the parties to each other, and is based on the exchange nonces, DH public values, the initiator ID, other values from the initiator packet, and the Pre- Shared-Key [PSK]. 3. The Initiating client sends a reply packet also containing a HASH, but this response is normally sent in an encrypted packet. 5.5 Microsoft PPTP protocol used with VPN PPTP (Point-to-Point Tunneling Protocol) is a Microsoft VPN protocol published as an RFC in 1999 for secure remote access. This protocol has en is been used in many Microsoft based networks, firewall appliances, and even pure Linux and Open Source environments[14]. In 2003 Joshua Wright created ASLEAP[15] tools to prove that a password based authentication system like Cisco LEAP is not a secure because of one glaring weakness, it relies on humans to memorize strong passwords. ASLEAP just happens to make that point abundantly clear since it had the ability to scan through a 4 GB pre-computed password hash table at a rate of 45 million passwords a second using a common desktop computer for cracking passwords. Better Solution is to use L2TP (Layer 2 Tunneling Protocol) protocol with VPN. 6 Conclusion IPsec is very useful, if used the right way. Use main-mode, not aggressivemode. When connecting Windows to Windows or Windows to Linux, use 13
14 L2TP instead of PPTP. Last but not least, use CHAP or MS-CHAP instead of PAP. IPsec is most proper to be applied in the communication of point-topoint type. As a result, the scalability of IPsec has been limited with more number of nodes added to the network. Also, since IPsec supply the confidentiality and integrity of the original data through encrypt them and adding its new header, many process options in the original header can not be accessed when the package is transferred in the network. IPsec provide a nice way to secure the data when it is transferred through the public network through building up a secure link between sender and receiver. But, on the other hand, it is still possible to be attacked by some kind of sniffing attack, or man-in-the-middle attack for example on the local network of the each end point before data is sent by the gateway over the network. Using the well known encryption algorithms is better than making your own encryption algorithm. Because those well known algorithms have been and are tried to be cracked by thousand of people everyday. This is why it s better using known encryption algorithms. Second in many cases people make mistakes in the implementation of those encryptions algorithms in their product. Now a day MD5 hash algorithm is considered cracked. For the implementation for IPSec (HMAC) it would be better to use SHA-1 or other strong hash algorithms. The same for DES encryption, it is also consider cracked. AES and RSA are stronger encryption. Despite of the complexity, IPsec has been able to work together with many other services supplied by multiple network infrastructures, such as. Therefore, IPsec has became almost a standard secure communication services. 14
15 References [1] Wipul Jayawickrama: Demystifying IPSec, Information Security Management System, 2003 [2] Sheila Frankel, Karen Kent, Ryan Lewkowski, Angela D. Orebaugh, Ronald W. Ritchey, Steven R. Sharma: Guide to IPsec VPNs, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, MD , January 2005 [3] The Illusion of Security: Using IPsec VPNs to Secure the Air, Trapeze Networks, [4] George Hadjichristofi: IPSec Interoperability and Scalability, Computer Engineering, Virginia Tech, 2003 [5] Prakash Iyer, Victor Lortz, Ylian Saint-Hilaire: Scalable Deployment of IPsec in Corporate Intranets, Intel Architecture Labs Internet Building Blocks Initiative, 2000 [6] Charlie Kaufman, Radia Perlman, Mike Speciner: Network Security, Private Communication in a PUBLIC World, second edition 2002 [7] PROTOS Test-Suite: c09-isakmp, University of Oulu, November 2005, [8] IPSEC / ISAKMP Vulnerability wrapup, SANS, November 2005, [9] Vulnerability Advisory /NISCC/ISAKMP, NISCC, November 2005, [10] Bill Brenner, News Writer: High-severity vulnerability in IPsec, Search- Security.com, May 2005, [11] NISCC Vulnerability Advisory IPSEC , NISCC, May 2005 [12] Geschrieben von HAL: Cisco Password Encryption reversed, EvilScientists, October 2005 [13] Anton T. Rager: IKECrack, [14] George Ou: PPTP VPN authentication protocol proven very susceptible to attack, ZDnet.com, December
16 [15] Joshua Wright: Asleap behind the wheel, sourceforge.net, 2004, [16] Jacco de Leeuw: Using a Linux L2TP/IPsec VPN server, [17] Nate Carlson: Configuring an ipsec tunnel between openswan and windows 2000 / xp, [18] Xelerance Corporation: Openswan, 16
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Protocol Security Where?
IPsec: AH and ESP 1 Protocol Security Where? Application layer: (+) easy access to user credentials, extend without waiting for OS vendor, understand data; (-) design again and again; e.g., PGP, ssh, Kerberos
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers
IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers Application Note Revision 1.0 10 February 2011 Copyright 2011. Aruba Networks, Inc. All rights reserved. IPsec VPN Security
Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF
Building scalable IPSec infrastructure with MikroTik IPSec, L2TP/IPSec, OSPF Presenter information Tomas Kirnak Network design Security, wireless Servers Virtualization MikroTik Certified Trainer Atris,
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Virtual Private Network and Remote Access Setup
CHAPTER 10 Virtual Private Network and Remote Access Setup 10.1 Introduction A Virtual Private Network (VPN) is the extension of a private network that encompasses links across shared or public networks
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
How To Fix A Username Enumeration On A Vpn On A Pc Or Ipv (Vpn) On A Password Protected Ipv 2 (Vvv) On An Ipv 3 (Vp) On Pc Or Password Protected (V
Common VPN Security Flaws Roy Hills, NTA Monitor Ltd. http://www.nta-monitor.com/ January 2005 Abstract This paper outlines some of the common VPN security flaws that NTA Monitor have found during the
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
ASA and Native L2TP IPSec Android Client Configuration Example
ASA and Native L2TP IPSec Android Client Configuration Example Document ID: 113572 Contributed by Atri Basu and Rahul Govindan, Cisco TAC Engineers. Oct 29, 2013 Contents Introduction Prerequisites Requirements
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
How to configure VPN function on TP-LINK Routers
How to configure VPN function on TP-LINK Routers 1. VPN Overview... 2 2. How to configure LAN-to-LAN IPsec VPN on TP-LINK Router... 3 3. How to configure GreenBow IPsec VPN Client with a TP-LINK VPN Router...
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
How to configure VPN function on TP-LINK Routers
How to configure VPN function on TP-LINK Routers 1. VPN Overview... 2 2. How to configure LAN-to-LAN IPsec VPN on TP-LINK Router... 3 3. How to configure GreenBow IPsec VPN Client with a TP-LINK VPN Router...
Chapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Remote user access VPN with IPsec
Remote user access VPN with IPsec Emmanuel Dreyfus October 24, 2005 Abstract IPsec is a set of Internet Protocol (IP) extensions used to bring secure communication to the network level. IPsec can be used
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6
Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6 Ahmed A. Joha, Fathi Ben Shatwan, Majdi Ashibani The Higher Institute of Industry Misurata, Libya [email protected]
Cryptography and network security CNET4523
1. Name of Course 2. Course Code 3. Name(s) of academic staff 4. Rationale for the inclusion of the course/module in the programme Cryptography and network security CNET4523 Major The Great use of local
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Virtual Private Networks: IPSec vs. SSL
Virtual Private Networks: IPSec vs. SSL IPSec SSL Michael Daye Jr. Instructor: Dr. Lunsford ICTN 4040-001 April 16 th 2007 Virtual Private Networks: IPSec vs. SSL In today s society organizations and companies
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1
Michal Ludvig, SUSE Labs, 01/30/2004, Secure networking, 1 Communication between User and Server: In the form of packets. Traverse several Routers. Can be intercepted by a BadBoy. Michal Ludvig, SUSE Labs,
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :
Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh Written Exam in Network Security ANSWERS May 28, 2009. Allowed aid: Writing material. Name (in block letters)
Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities
SSL/TLS Today s Topics Server Certificates Client Certificates Certification Authorities Trust Registration Authorities VPN IPSec Client tunnels LAN-to-LAN tunnels Secure Sockets Layer Secure Sockets Layer
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
Chapter 5: Network Layer Security
Managing and Securing Computer Networks Guy Leduc Mainly based on Network Security - PRIVATE Communication in a PUBLIC World C. Kaufman, R. Pearlman, M. Speciner Pearson Education, 2002. (chapters 17 and
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Vodafone MachineLink 3G. IPSec VPN Configuration Guide
Vodafone MachineLink 3G IPSec VPN Configuration Guide Copyright Copyright 2013 NetComm Wireless Limited. All rights reserved. Copyright 2013 Vodafone Group Plc. All rights reserved. The information contained
Joe Davies Principal Writer Windows Server Documentation
Joe Davies Principal Writer Windows Server Documentation Presented at Seattle Windows Networking User Group monthly meeting September 1, 2010 Agenda Brief VPN technology overview VPN features in Windows
I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:
Table of Content I. What is VPN?... 2 II. Types of VPN connection... 2 III. Types of VPN Protocol... 3 IV. Remote Access VPN configuration... 4 a. PPTP protocol configuration... 4 Network Topology... 4
Virtual Private Networks
Virtual Private Networks Jonathan Reed [email protected] MIT IS&T VPN Release Team Overview Basic Networking Terms General Concepts How the VPN works Why it s useful What to watch out for Q&A Networking 101
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
Firewalls. Outlines: By: Arash Habibi Lashkari July 2010. Network Security 06
Firewalls Outlines: What is a firewall Why an organization ation needs a firewall Types of firewalls and technologies Deploying a firewall What is a VPN By: Arash Habibi Lashkari July 2010 1 Introduction
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
Study on Remote Access for Library Based on SSL VPN
, pp.111-122 http://dx.doi.org/10.14257/ijca.2016.9.1.11 Study on Remote Access for Library Based on SSL VPN Mei Zhang Library, Linyi University, Shandong, 276000, China [email protected] Abstract With
Branch Office VPN Tunnels and Mobile VPN
WatchGuard Certified Training Branch Office VPN Tunnels and Mobile VPN Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Notice to Users Information
Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway
Fireware How To VPN How do I set up a manual branch office VPN tunnel? Introduction You use Branch Office VPN (BOVPN) with manual IPSec to make encrypted tunnels between a Firebox and a second IPSec-compliant
FortiOS Handbook IPsec VPN for FortiOS 5.0
FortiOS Handbook IPsec VPN for FortiOS 5.0 IPsec VPN for FortiOS 5.0 26 August 2015 01-504-112804-20150826 Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard, are registered
CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks
CS 393/682 Network Security Nasir Memon Polytechnic University Module 7 Virtual Private Networks Course Logistics Midterm next week. Old exams posted Brief review at end of this module HW 4 assigned, due
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Virtual Private Networks
Virtual Private Networks The Ohio State University Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
GPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Overview. Protocols. VPN and Firewalls
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls VPN-Definition VPNs (Virtual Private Networks)
Dr. Arjan Durresi. Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/
Set of Problems 2 Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana State University
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"
To Study the Overall Cloud Computing Security Using Virtual Private Network. Aparna Gaurav Jaisingpure/Gulhane Email id: [email protected] Dr.D.Y.Patil Vidya Pratishthan s Dr. D.Y Patil College of
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
Virtual Private Network and Remote Access
Virtual Private Network and Remote Access Introduction A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
VPN Solutions. Lesson 10. etoken Certification Course. April 2004
VPN Solutions Lesson 10 April 2004 etoken Certification Course VPN Overview Lesson 10a April 2004 etoken Certification Course Virtual Private Network A Virtual Private Network (VPN) is a private data network
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999
Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer February 3, 1999 Frame Relay Frame Relay is an international standard for high-speed access to public wide area data networks
CS 494/594 Computer and Network Security
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Exercise: Chapters 13, 15-18 18 1. [Kaufman] 13.1
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client
Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client Generally speaking, remote users need to use a VPN client software for establishing a VPN connection to their home/work router
Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview
Configuration Guide How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios Overview The iphone is a line of smartphones designed and marketed by Apple Inc. It runs Apple s IOS mobile
Introduction to Computer Security
Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation
Virtual Private Networks
Virtual Private Networks Rene Bahena Felipe Flores COEN 150 Project Report Chapter 1: What is a VPN? VPN stands for Virtual Private Network and is a way of making a secure remote connection to a private
Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels
Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels This article provides a reference for deploying a Barracuda Link Balancer under the following conditions: 1. 2. In transparent (firewall-disabled)
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
SECURITY CONCERNS OF THE CISCO ASA USING MICROSOFT IAS RADIUS
SECURITY CONCERNS OF THE CISCO ASA USING MICROSOFT IAS RADIUS Christopher Landman Center for Cybersecurity Education College of Business, University of Dallas 2324 Tall Grass Circle, Bossier City, LA 71111
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces
Introduction An Overview of the D Industrial Router Product Line Secure Access with VPN Technology in Industrial Networks Outlining the IPsec and VPN capabilities available in the GarrettCom D series of
Configuring L2TP over IPsec
CHAPTER 65 This chapter describes how to configure L2TP over IPsec/IKEv1 on the ASA. This chapter includes the following topics: Information About L2TP over IPsec/IKEv1, page 65-1 Licensing Requirements
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
