Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities



Similar documents
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Chapter 10. Network Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Web Security Considerations

Network Security Fundamentals

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Chapter 7 Transport-Level Security

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Introduction to Security and PIX Firewall

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Communication Systems SSL

Overview. SSL Cryptography Overview CHAPTER 1

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

VPN. VPN For BIPAC 741/743GE

Case Study for Layer 3 Authentication and Encryption

How To Understand And Understand The Ssl Protocol ( And Its Security Features (Protocol)

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Certificates and network security

Communication Security for Applications

Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security

Overview. Protocols. VPN and Firewalls

Transport Level Security

Protocol Rollback and Network Security

Chapter 17. Transport-Level Security

Network Security Part II: Standards

Authenticity of Public Keys

Chapter 32 Internet Security

VPN. Date: 4/15/2004 By: Heena Patel

Security vulnerabilities in the Internet and possible solutions

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

How To Understand And Understand The Security Of A Key Infrastructure

Network Security. Lecture 3

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

T Cryptography and Data Security

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Network Security Essentials Chapter 5

Software Engineering 4C03 Research Project. An Overview of Secure Transmission on the World Wide Web. Sean MacDonald

Lecture 10: Communications Security

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Application Note: Onsight Device VPN Configuration V1.1

Secure Sockets Layer

Virtual Private Networks

CCNA Security 1.1 Instructional Resource

Outline. Transport Layer Security (TLS) Security Protocols (bmevihim132)

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Cisco Which VPN Solution is Right for You?

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

7.1. Remote Access Connection

Virtual Private Networks

Secure Socket Layer. Security Threat Classifications

Site to Site Virtual Private Networks (VPNs):

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Securing IP Networks with Implementation of IPv6

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Lecture 7: Transport Level Security SSL/TLS. Course Admin

Network Access Security. Lesson 10

Study on Remote Access for Library Based on SSL VPN

IP Security. Ola Flygt Växjö University, Sweden

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Security Engineering Part III Network Security. Security Protocols (I): SSL/TLS

Virtual Private Networks: IPSec vs. SSL

Secure Socket Layer (SSL) and Transport Layer Security (TLS)

Managing and Securing Computer Networks. Guy Leduc. Chapter 4: Securing TCP. connections. connections. Chapter goals: security in practice:

Computer and Network Security

Security. Learning Objectives. This module will help you...

Security Protocols and Infrastructures. h_da, Winter Term 2011/2012

TLS/SSL in distributed systems. Eugen Babinciuc

Cryptography and Network Security Sicurezza delle reti e dei sistemi informatici SSL/TSL

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Implementing and Managing Security for Network Communications

TLS and SRTP for Skype Connect. Technical Datasheet

SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS

ETSF10 Part 3 Lect 2

Cornerstones of Security

As enterprises conduct more and more

Branch Office VPN Tunnels and Mobile VPN

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

Secure Socket Layer/ Transport Layer Security (SSL/TLS)

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

Secure Socket Layer (TLS) Carlo U. Nicola, SGI FHNW With extracts from publications of : William Stallings.

Internet Privacy Options

Transcription:

SSL/TLS Today s Topics Server Certificates Client Certificates Certification Authorities Trust Registration Authorities VPN IPSec Client tunnels LAN-to-LAN tunnels

Secure Sockets Layer Secure Sockets Layer (version 3.0) According to the specification The primary goal of the SSL Protocol is to provide privacy and reliability between two communicating applications. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.

Secure Sockets Layer Designed with four basic goals Cryptographic security Interoperability Extensibility Relative efficiency

Secure Sockets Layer SSL has three basic properties: The connection is private. Encryption is used after an initial handshake to define a secret key. Symmetric cryptography is used for data encryption (e.g., DES, RC4, etc.) The peer's identity can be authenticated using asymmetric, or public key, cryptography (e.g., RSA, DSS, etc.). The connection is reliable. Message transport includes a message integrity check using a keyed MAC. Secure hash functions (e.g., SHA, MD5, etc.) are used for MAC computations.

SSL/TLS Well then, what is TLS? Transport Layer Security (version 1.0) SSL was developed by Netscape. The standards community wanted their own version, free from any patents/restrictions Thus was born TLS IETF changed the name to avoid showing bias I ll use the two terms interchangeably

SSL/TLS ftp://ftp.isi.edu/in-notes/rfc2246.txt The TLS protocol provides communications privacy over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. Sound familiar? TLS v1.0 == SSL v3.1

SSL/TLS Users want to connect to servers without the connection being listened to Electronic commerce Grades Health care Other Every server has a certificate Basically a public key Signed by a trusted third party

Server Certificates X509 version 3 is the current specification Certs hold three important bits of info Name of Server Public Key of Server Issued by a trusted organization

X509 Certificates: example Version Serial Number Algorithm ID Issuer (DN) Period of Validity Subject Subject s Public Key Extensions Issuers Signature 3 04:60:00:00:02 md5withrsaencryption C=US,O=FooBar, OU=my CA Not Before: Nov 17 00:00:00 1999 GMT Not After : Nov 17 00:00:00 2003 GMT C=US,O=MyDomain,CN=www.domain.co m 00:e1:73:65:2d:00:77 CA:False 51:e4:df:76:c3:97:20:6c So, What does a certificate look like?

-----BEGIN CERTIFICATE----- MIIEpDCCA4ygAwIBAgIBATANBgkqhkiG9w0BAQUFADCBizELMAkGA1UEBhMCVV MxFjAUBgNVBAgTDU1hc3NhY2h1c2V0dHMxGDAWBgNVBAoTD0NQTSBFbnRlcnB yaxnlczelmcmga1ueaxmcq1bnievudgvychjpc2vzierlbw8gq0egdjaumtejmce GCSqGSIb3DQEJARYUY21pc3JhQG9pdC51bWFzcy5lZHUwHhcNMDIwMzA0MTc1 NTIxWhcNMDQxMTI4MTc1NTIxWjCBgzELMAkGA1UEBhMCVVMxFjAUBgNVBAgTD U1hc3NhY2h1c2V0dHMxGDAWBgNVBAoTD0NQTSBFbnRlcnByaXNlczEdMBsGA1U EAxMUZW5pZ21hLm9pdC51bWFzcy5lZHUxIzAhBgkqhkiG9w0BCQEWFGNtaXNyYU BvaXQudW1hc3MuZWR1MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA ze2xp8yzjkua+ya+8qgaksaa82m2crg0k45qkjf/4fugkmh1cchvafgyohtsnz3xpik BgOdvBBve6sivyXuTlIEpfNhERLYsbXRPR5XLWzaB9610r82OIuiMEoMiWw+5+OMx ONO5i48jgLh6R9AO4Ybr7guo2xqkd53Erh+6gmfh73TYWIJm/FQnVw2/CD3LiFA6Be8 TgCBMhSH8eM68vKiHt3DPmFXqPqCX9kqawrgRYjNPIaHD4oFgPi48scXdgD0gaBqC f8onn3clxn9mghu0t/bzjrmhaujftpclrhag82psvyk9wpu7t6beinh2kdnteenlo DskAdRogzVHgwIDAQABo4IBFzCCARMwCQYDVR0TBAIwADAsBglghkgBhvhCAQ0 EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0OBBYEFP8 o/sagvvyad9964jdtygkpcemvmig4bgnvhsmegbawga2afj/zwxogiwdxdsv2hsc gzx3slkz8oygrpigomiglmqswcqydvqqgewjvuzewmbqga1uecbmntwfz c2fjahvzzxr0czeymbyga1uechmpq1bnievudgvychjpc2vzmsuwiwydvqqde xxdue0grw50zxjwcmlzzxmgrgvtbybdqsb2mc4xmsmwiqyjkozihvcnaqkbfh RjbWlzcmFAb2l0LnVtYXNzLmVkdYIBADANBgkqhkiG9w0BAQUFAAOCAQEAyPzrNS 01hNpWDjxwJsu3ouF0t8cNpzpyLBpx5flLmWFSfU7LRtfJtr5yVxXbtDqHbAhfDpsgT6o1 UoUbsJUevCR/u81pC8UHuSsXrXxbxxZbvLlr6RWFKMMLjjGPIyFi2U9NpNOEIcOx9e7 nm/duhx4mwz0jn9xwlkgsxzlsgdz0+wyvdr0z1xvjqa4hpt2xed4bmu8nsqufzm+ okgrbwkwlgdlizejrazaduvb1tzpuoifnpp0o2kh2jqv/pph6uj8ywdfpyoji9ibkyoilot g36tzfje92exmugreeoluormujbgf1kesl6coeoytprxzimwcpu86vbnexp2oq4w== -----END CERTIFICATE-----

Certificate: Data: Version: 3 (0x2) Serial Number: 1234567 (0xabcdef) Signature Algorithm: sha1withrsaencryption Issuer: C=US, ST=Massachusetts, O=Trusted CA Company, CN=Trusted CA v0.1/email=pkimaster@trust.com Validity: Not Before: Mar 4 17:55:21 2002 GMT Not After : Nov 28 17:55:21 2004 GMT Subject: C=US, ST=Massachusetts, O=My Enterprises, CN=www.myent.com/Email=pki@myent.com Subject Public Key Info: Public Key Algorithm: rsaencryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:cc:4d:97:a7:c6:<.>:f9:35:47:83 Exponent: 65537 (0x10001) X509v3 Basic Constraints: CA:FALSE Certificate: Signature Algorithm: sha1withrsaencryption c8:fc:eb:35:2d:ce:95:< >:6e:71:31:3f:6a:10:e3

RSA Public key = (n,e) Private key = (n,d) Encryption of a character M i C i = M ie (mod n) Decryption of a cipher character C i n M i = C i d (mod n) e Modulus (2048 bit): 00:e2:62:13:dc:ab:73:f8:42:d8:13:bb:6e:09:19: 75:2e:d8:2b:9f:31:d7:d4:7e:b3:12:84:21:d3:91: 5d:46:99:be:eb:eb:94:38:b5:15:cd:29:4f:e2:20: 8e:01:c9:ce:a9:20:cc:99:1f:33:e5:6b:51:fe:c7: 99:54:31:73:ab:f5:19:92:79:46:a4:7e:da:74:ad: 66:d2:77:ce:85:9f:be:b8:27:2f:77:d4:5d:c2:41: b7:f4:06:10:ea:6d:d0:1d:07:c4:d5:41:fe:28:9f: a7:0e:b2:ed:7b:14:18:3f:1d:af:81:65:97:16:ad: 63:f6:e0:2f:5e:84:75:8a:d3:67:21:c4:ba:a4:5b: 24:d7:34:2c:7a:4a:c7:b4:76:e3:d8:f0:ab:50:81: e8:d0:fc:10:2b:33:56:7b:74:03:d9:31:d5:f1:f4: e4:f2:e5:db:29:ba:7a:29:5f:ac:07:f7:f2:84:4d: 4a:2b Exponent: 65537 (0x10001)

SSL/TLS Application Protocol (e.g. http) ChangeCiphe r Alert Record Layer Handshake } SSL/TLS TCP IP SSL consists of two protocol layers The Record Layer encapsulates all messages The ChangeCipherSpec protocol indicates the channel is ready for secure communications The Alert protocol indicates errors or other caution conditions have occurred in the connection The Handshake protocol negotiates all options of the session

SSL Session Negotiation: Server Authentication Client Server ClientHello ServerHello Certificate ServerHelloDone ClientKeyExchange ChangeCipherSpec Finish ChangeCipherSpec Finish Client is responsible for checking: If the Issuer s signature on the certificate is valid If the certificate is within the period of validity If the Subject (CN) is identical to the server DNS name

Client Certificates Basically they are the same as server certs Are you really any different than a server? Again, they need to be signed by a trusted third party (the Issuer) Who do you trust? But, how do we name everyone uniquely? Problem, big problem

SSL Session Negotiation: Client and Server Authentication Client ClientHello Server ServerHello Certificate Certificate Request ServerHelloDone Certificate ClientKeyExchange CertificateVerify ChangeCipherSpec Finish ChangeCipherSpec Finish

Certification Authority (CA) The CA is the trusted third party We ve talked about trust before All certificates are signed with the CA s private key Including the CA s signing cert Better protect that private key pretty well Can you spell liability? CP/CPS

Who do you trust? subject=/c=us/o=verisign, Inc./OU=Class 1 Public Primary Certification Authority - G2/OU=(c) 1998 VeriSign, Inc. - For authorized use only/ou=verisign Trust Network issuer= /C=US/O=VeriSign, Inc./OU=Class 1 Public Primary Certification Authority - G2/OU=(c) 1998 VeriSign, Inc. - For authorized use only/ou=verisign Trust Network subject=/l=internet/o=verisign, Inc./OU=VeriSign Individual Software Publishers CA issuer= /L=Internet/O=VeriSign, Inc./OU=VeriSign Individual Software Publishers CA subject=/c=za/st=western Cape/L=Cape Town/O=Thawte Consulting cc/ou=certification Services Division/CN=Thawte Server CA/Email=server-certs@thawte.com issuer= /C=ZA/ST=Western Cape/L=Cape Town/O=Thawte Consulting cc/ou=certification Services Division/CN=Thawte Server CA/Email=server-certs@thawte.com subject=/c=us/o=rsa Data Security, Inc./OU=Secure Server Certification Authority issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority subject=/cn=root SGC Authority issuer= /CN=Root SGC Authority subject=/ou=copyright (c) 1997 Microsoft Corp./OU=Microsoft Corporation/CN=Microsoft Root Authority issuer= /OU=Copyright (c) 1997 Microsoft Corp./OU=Microsoft Corporation/CN=Microsoft Root Authority subject=/c=us/o=msft/cn=microsoft Authenticode(tm) Root Authority issuer= /C=US/O=MSFT/CN=Microsoft Authenticode(tm) Root Authority subject=/c=us/o=mci/ou=internetmci/ou=mall issuer= /C=US/O=MCI/OU=internetMCI/OU=MALL subject=/c=ca/cn=keywitness Canada Inc. keywitness@keywitness.ca issuer= /C=CA/CN=Keywitness Canada Inc. keywitness@keywitness.ca subject=/c=us/o=keywitness International, Inc./dnQualifier=OID.1.2.840.113549.1.1.1/CN=KeyWitness 2048 Root issuer= /C=US/O=KeyWitness International, Inc./dnQualifier=OID.1.2.840.113549.1.1.1/CN=KeyWitness 2048 Root subject=/c=us/o=gte Corporation/CN=GTE CyberTrust Root issuer= /C=US/O=GTE Corporation/CN=GTE CyberTrust Root subject=/c=us/o=gte Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE CyberTrust Global Root issuer= /C=US/O=GTE Corporation/OU=GTE CyberTrust Solutions, Inc./CN=GTE CyberTrust Global Root subject=/c=us/o=at&t/ou=directory Services issuer= /C=US/O=AT&T/OU=Directory Services subject=/o=microsoft Trust Network/OU=Microsoft Corporation/OU=Microsoft Time Stamping Service Root/OU=Copyright (c) 1997 Microsoft Corp. issuer= /O=Microsoft Trust Network/OU=Microsoft Corporation/OU=Microsoft Time Stamping Service Root/OU=Copyright (c) 1997 Microsoft Corp. subject=/c=us/o=verisign, Inc./OU=Class 1 Public Primary Certification Authority issuer= /C=US/O=VeriSign, Inc./OU=Class 1 Public Primary Certification Authority subject=/c=us/o=at&t/ou=certificate Services issuer= /C=US/O=AT&T/OU=Certificate Services

Courtesy Netscape

Virtual Private Networks (VPN) What is a VPN? a group of two or more computer systems, typically connected to a private network with limited public-network access, that communicates securely over a public network. A combination of tunneling, encryption, authentication and access control technologies and services used to carry traffic over an IP network Encrypted Tunnel Trusted User Untrusted Network Firewall Trusted Server

Virtual Private Networks (VPN) What makes a VPN secure? Encryption Strong authentication of remote users and hosts. Mechanisms for hiding or masking information about the private network topology from potential attackers Three basic types: Hardware-based Firewall-based Standalone/Software-based

IPSec IPSec is the IP Security standard from the IETF (the people that standardize the Internet) rfc1825 IPSec consists of two different headers Authentication Header (AH) protocol Encapsulating Security Payload (ESP) protocol Both protocols assume the peers using the protocol have a shared key.

IPSec Both protocols assume the peers using the protocol share authentication information. In addition there is a protocol for distributing keys called IKE. Internet Key Exchange Why was IPSec designed as two protocols? To encourage wide deployment, even where there are import, export, and usage restrictions on encryption. Cryptoraphy is covered under ITAR.

IP Authentication Header (AH) Designed to provide Integrity Authentication Does not provide Confidentiality AH header includes: connection identifier authentication data: signed message digest, calculated over original IP datagram, providing source authentication, data integrity. Next header field: specifies type of data (TCP, UDP, ICMP, etc.) IP Header AH Header TCP/UPD seg Protocol=51 This is a network-layer protocol! Not an application-level protocol.

IP Encapsulating Security Payload (ESP) Designed to provide Integrity Authentication Confidentiality Data, ESP trailer encrypted. Next header field is in ESP trailer. ESP authentication field is similar to AH authentication field. Protocol = 50. authenticated IP Header ESP Header TCP/UPD seg ESP trailer ESP Auth Protocol=50 encrypted

IKE A hybrid protocol designed to negotiate and provide authenticated keying material for security associations (SA) in a protected manner. An SA is a set of policy and keys used to protect information Based on three previous protocols ISAKMP A framework for authentication and key exchanges, but does not define them. Oakley A described series of key exchanges and the services provided by them. SKEME A versatile key exchange technique providing anonymity, repudiability, and quick key refreshment. IKE is a protocol using part of Oakley and part of SKEME in conjunction with ISAKMP to obtain authenticated keying material. IKE is one implementation of ISAKMP to be used with IPSec

IPSec Security Why don t we cover IKE? The protocol is very complex Security s worst enemy is complexity (the) chief complaint in this tract is the minnumbing complexity of the IPSec standards document, and indeed in the protocol itself There is a great deal of known plaintext in IPSec traffic Encrypted TCP/IP header field data.

IPSec Security The protocol is very complex Security s worst enemy is complexity (the) chief complaint in this tract is the minnumbing complexity of the IPSec standards document, and indeed in the protocol itself There is a great deal of known plaintext in IPSec traffic Encrypted TCP/IP header field data.

Client Tunnels Client runs VPN software IP traffic between Trusted user and VPN concentrator Can establish normally blocked connections between trusted user and server Border firewall only needs to allow VPN traffic destined for the VPN concentrator Encrypted Tunnel Local ISP VPN Concentrator Trusted User Border Router Firewall Firewall Trusted Server WebServer

Client Tunnels Client initiates VPN session (204.10.1.2 128.119.100.2) Client establishes session key with 128.119.100.2 Client encapsulates traffic 204.10.1.2(500) 128.119.100.2(80) E s { (10.1.1.103 10.1.1.2) } The whole packet incl. Headers is encapsulated Note: we can only use ESP tunnel-mode here, not AH since we are doing NAT. Local ISP 128.119.100.2 10.1.1.100 Trusted User System IP: 204.10.1.2 VPN IP: 10.1.1.103 Border Router Firewall Firewall Trusted Server 10.1.1.2 WebServer

Authentication Client Tunnels Shared secret All the standard scalability problems Client certificates Storage of client certificates potentially insecure Requires a Certification Authority. Trust???

Other VPN Protocols In addition to IPSec, there are a few other protocols worth mentioning PPTP L2F L2TP

PPTP Point-to-Point Tunneling protocol PPP encapsulated over IP PPTP was originally developed by a consortium including Microsoft. The protocol was originally designed as an encapsulation mechanism, to allow the transport of non-tcp/ip protocols (such as IPX) over the Internet using Generic Routing Encapsulation (GRE). Version 1 was full of security holes Flawed encryption mechanism non-random keys, session keys weak hash of user password, key lengths too short (non-configurable) Bad password management in mixed Win95/NT environment; static passwords easily compromised Vulnerable to server spoofing attacks because packet authentication not implemented, easy denial-of-service attacks even inside firewalls

Other Protcols L2F -- Layer 2 Forwarding Media independent layer 2 tunneling protocol from Cisco A standards based tunneling mechanism for transporting link-layer frames (e.g. HDLC, PPP, SLIP over higher-layer protcols L2TP Layer 2 Transport Protocol Encapsulates PPP frames to be sent over IP, X25, Frame Relay or ATM networks. Requires IPSec to secure underlying IP transport Take one part PPTP, one part L2F, shake liberally

LAN-to-LAN Tunnels Sometimes we want to tunnel more than one computer over a single logical link Only the remote concentrator needs a routable IP Generally, this is a whole lot cheaper than leased lines to n different remote offices Sometime referred to as node-to-node tunnels VPN Concentrator Encrypted Tunnel Corporate VPN Local ISP Border Router/ Firewall Border Router Firewall Firewall Trusted Server 10.1.1.2 WebServer

VPN Summary There are a lot of products out there, the trick is picking the good ones. Encryption is a necessary, but not sufficient condition for security Security is a process, not a product Don t trust vendors claims (PPTP) A VPN is not a substitute for policies and auditing Better make sure you secure that VPN concentrator.