Why SSL is better than IPsec for Fully Transparent Mobile Network Access



Similar documents
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Virtual Private Networks

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Application Note. Onsight Connect Network Requirements V6.1

ISG50 Application Note Version 1.0 June, 2011

Application Note. Onsight TeamLink And Firewall Detect v6.3

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Firewalls P+S Linux Router & Firewall 2013

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

IP Ports and Protocols used by H.323 Devices

INTRODUCTION TO FIREWALL SECURITY

Chapter 32 Internet Security

Advanced Higher Computing. Computer Networks. Homework Sheets

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security Part II: Standards

Novell Access Manager SSL Virtual Private Network

Question: 3 When using Application Intelligence, Server Time may be defined as.

OS/390 Firewall Technology Overview

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Internet Privacy Options

Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0

CHAPTER 1 INTRODUCTION

Computer Networks. Secure Systems

Application Note. Onsight Connect Network Requirements v6.3

Network Access Security. Lesson 10

Overview - Using ADAMS With a Firewall

CS5008: Internet Computing

Access Control: Firewalls (1)

Overview - Using ADAMS With a Firewall

SSL VPN Technical Primer

Chapter 9. IP Secure

Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.

21.4 Network Address Translation (NAT) NAT concept

NAT and Firewall Traversal with STUN / TURN / ICE

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica

VPN Lesson 2: VPN Implementation. Summary

Introduction to Computer Security

Corporate VPN Using Mikrotik Cloud Feature. By SOUMIL GUPTA BHAYA Mikortik Certified Trainer

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Step into the Future: HTML5 and its Impact on SSL VPNs

Cisco Which VPN Solution is Right for You?

Solution of Exercise Sheet 5

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

IP Security. Ola Flygt Växjö University, Sweden

ΕΠΛ 674: Εργαστήριο 5 Firewalls

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Introduction to Computer Security

CS 4803 Computer and Network Security

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

DrayTek Vigor High Performance Firewall Router. - VPN - Up to 200 concurrent tunnels. - Load Balancing & Failover between WAN ports

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

High Performance VPN Solutions Over Satellite Networks

Technical papers Virtual private networks

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

ISM/ISC Middleware Module

DMZ Network Visibility with Wireshark June 15, 2010

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

VPN. Date: 4/15/2004 By: Heena Patel

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Firewalls, Tunnels, and Network Intrusion Detection

Protocol Security Where?

Basic Vulnerability Issues for SIP Security

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Encapsulating Voice in IP Packets

IPSec or SSL VPN? Copyright 2004 Juniper Networks, Inc. 1

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Tel: Toll-Free: Fax: Oct Website: CAIL Security Facility

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Networking Test 4 Study Guide

LinkProof And VPN Load Balancing

TCP for Wireless Networks

Security Protocols/Standards

Application Note - Using Tenor behind a Firewall/NAT

Secure remote access to your applications and data. Secure Application Access

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

IP address format: Dotted decimal notation:

Network Address Translation (NAT) Virtual Private Networks (VPN)

Per-Flow Queuing Allot's Approach to Bandwidth Management

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

How do I get to

VegaStream Information Note Considerations for a VoIP installation

Transport Layer Protocols

Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005

Applications that Benefit from IPv6

Cisco RV180 VPN Router

Unit 23. RTP, VoIP. Shyam Parekh

Application Note Patton SmartNode in combination with a CheckPoint Firewall for Multimedia security

CSCE 465 Computer & Network Security

Transcription:

Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. aidan.gogarty@hob.de

What are we all trying to achieve? Fully transparent network access Network access with highest possible security Access where, when and how we want it 2

A quick question.. What is better for you, SSL or IPsec? Why? 3

SSL vs. IPsec Is There A Winner?

Features of SSL Session key exchange Perfect forward secrecy possible Data/message encryption Works on transport layer (Layer 4) Application used need not be specifically designed for SSL Good for high volume of sessions 5

Advantages of SSL Already included in all browsers and most web servers Ease of use for end users Web browser acts as client (clientless) Client mobility (device and platform independent) Free of connection restrictions (HTTPS) Low rollout and maintenance costs High scalability 6

Disadvantages of SSL Network access not fully transparent Not suitable for VoIP Sessions may need multiple handshakes, making a computationally heavy load for client and SSL devices The security of any client connection must be closely scrutinized Requires Java or ActiveX for access to non-web enabled applications Few applications support out-of-the-box web-based access 7

Features of IPsec Encryption Encrypts data flows Works on internet layer (Layer 3) Supports multiple encryption algorithms (AES, DES, RC4 same as SSL) Application used need not be specifically designed for IPsec Good for high volume of sessions 8

Advantages of IPsec Fully transparent network access Common solution for site-to-site VPNs Same security levels as SSL Economical if running few clients 9

Disadvantages of IPsec Inflexible - practical for site-to-site VPNs only, not mobile access Installation and updates necessary (drivers, applications) - expensive if running many clients Firewalls and proxies interrupt connection (port forwarding necessary) Data compression can make data transfer impractical (connectionless) Network address translation (NAT) issues Unless properly terminated in DMZ or firewall, IPsec effectively makes a hole in your security access to whole network, not specific servers 10

Comparing SSL & IPsec SSL Device and platform independent High scalability, low maintenance Not suitable for VoIP Heavy load for client and SSL devices IPsec Good solution for site-to-site VPNs Expensive if running many clients Must be properly terminated at both ends 11

Using Tunnels

A bit about Tunnels Tunnels deliver the communications Tunnels are direct and secure Tunnels mostly use TCP a connection-oriented protocol Compression is more efficient in TCP Data does not get lost using TCP TCP ports are normally open in firewalls Can cause bottlenecks 13

How does the TCP Tunnel work? Encapsulates the TCP sessions Application Application TCP IP TCP Tunnel TCP IP Sending Computer Receiving Computer 14

What is in the Tunnel? SIP RTP TCP UDP SSL 15

SSL Tunnel vs. IPsec Tunnel SSL Tunnel gives a secure tunnel to your application IPsec Tunnel gives a secure tunnel to your network SSL tunnel is easier to use, as Wi-Fi routers and other equipment see it as normal TCP/UDP traffic for which they were built An IPsec tunnel needs special support in the Wi-Fi routers and other equipment used 16

Why both TCP and UDP? TCP: Included in SSL encryption Proof against packet loss and disorder Possible delays and stream interruption UDP: Maximum throughput for streaming (VoIP) data No built in encryption mechanism Packet loss or disorder may affect transmission 17

So How Can We Use SSL & IPsec In A Better Way?

What can we do? Retune your system to regulate the buffer size Add 2 TCP/IP Stacks 19

Using TCP Stacks To Improve Efficiency

What is a TCP Stack? Links the application to the network interface Terminates the TCP connection Establishes the TCP Tunnel Handles the network headers and packets Handles Flow Control 21

Tunnel with additional TCP Stacks The TCP Stacks regulate the data flow Application Application TCP TCP Stack 1 TCP Stack 2 TCP Tunnel TCP IP IP Sending Computer Receiving Computer 22

So what does TCP Stack 1 do? TCP Stack 1: Receives SYN request from sender application, sends to receiving application Assesses the amount of data and compares it to the buffer size If the allowed buffer size is not exceeded: Sends End Zero Window command to TCP Stack 2 If the allowed buffer size is exceeded: Sends Zero Window command to TCP Stack 2 Waits for an acknowledgement ACK from receiving application 23

So what does TCP Stack 2 do? TCP Stack 2: Receives data from TCP Stack 1 Sends the data through an SSL tunnel to the receiving application 24

What about Real Time Streaming? Sending application performs a UDP discovery (sends a UDP packet to explore the network and see if blocked by firewalls) Receiving side also performs a UDP discovery TCP/UDP Splitter can now establish a TCP or UDP tunnel Sending application can apply SRTP encryption to the UDP stream If no UDP, then must use TCP Keep-alive packets must be regularly sent to keep connection open 25

The TCP/UDP Splitter establishes a UDP Tunnel The TCP/UDP Splitter establishes a TCP and/or a UDP tunnel Application TCP/UDP IP Sending Computer TCP UDP Splitter TCP Stack 1 TCP Stack 2 TCP Tunnel UDP Tunnel Application TCP/UDP IP Receiving Computer 26

So what has all this got to do with SSL or IPsec?

What this means for IPsec communications Inflexible - practical for site-to-site VPNs only, not mobile access? Installation and updates necessary - expensive if running many clients? Firewalls and proxies interrupt connection (port forwarding necessary)? Data compression can make data transfer very slow? Network address translation issues? Unless properly terminated in DMZ or firewall, IPsec effectively makes a hole in your security access to whole network, not specific servers? 28

What this means for SSL communications Computationally heavy load for client and SSL devices? Not as secure or as fast as IPsec? Network access not fully transparent? Not suitable for VoIP? 29

So what do you have now? All data traffic flows are fully regulated by the TCP stacks No bottlenecks or TCP meltdown Communication goes through an SSL-secured TCP/UDP tunnel Access from devices outside the network to the network application Access is fully network transparent 30

How To Put This Into Practise

All this in real life Add the TCP Stacks to a tunnel endpoint in the network Let the TCP stacks regulate the data flow The TCP Stacks split the connection using built-in TCP/UDP Splitter Data is delivered directly, securely and transparently to the receiving network application No loss of data packets or VoIP transmissions 32

Any Questions?