Virtual private network
This presentation is the property of its rightful owner.
Sponsored Links
1 / 58

Virtual Private Network PowerPoint PPT Presentation


  • 81 Views
  • Uploaded on
  • Presentation posted in: General

In the Name of Allah. Virtual Private Network. Present by Ali Fanian. Introduction What security problems do VPNs solve ? What security problems are not solved by VPNs ? VPN Principles of operation: tunneling , encapsulation, encryption and authentication

Download Presentation

Virtual Private Network

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Virtual private network

In the Name of Allah

Virtual Private Network

Present by

Ali Fanian


Virtual private networks

Introduction

What security problems do VPNs solve ?

What security problems are not solved by VPNs ?

VPN Principles of operation: tunneling, encapsulation, encryption and authentication

VPN Technologies: Microsoft PPTP, L2TP and IPsec

Virtual Private Networks


History and background of vpns 1

Internet multi-site organisations operated private networks using leased lines. This approach was expensive and inflexible.

It became cheaper to use shared Internet than dedicated.

Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate

VPNs enabled more flexible use of larger networks by removing network geography constraints from shared-insider LAN/Intranet associations and services.

With cryptography as part of a VPN, a travelling saleseman could communicate with head office at lower risk from spying competitors etc.

History and background of VPNs 1


What problems do vpns solve

Avoiding costs of fixed lines.

Extending security context of LAN across sites, regardless of geography, including to mobile users.

Authentication: knowing who your users are.

Encryption: preventing monitoring of use of insecure client server applications at the network level.

What problems do VPNs solve ?


What security problems do vpns not solve

Having a VPN which isn't secure and not knowing this is probably worse than having no VPN

Traffic analysis: monitoring of packet sizes, network usage times, endpoints of conversation etc.

VPNs can be used to pierce firewalls, by encapsulating traffic prohibited by organisation policy within a firewalled perimeter which the firewall can't inspect or control.

What security problems do VPNs not solve ?


Tunneling

Typically a VPN consists of a set of point to point connections tunnelled over the Internet.

The routers carrying this traffic over the Internet see each P2P connection externally as a sequence of packets routed between endpoints.

Tunneling


Vpn architecture

VPN Architecture

ISP

Access

Server

VPN

Device

leased circuits

Telephone

Line

Office

VPN

Device

Employee’s

Home

Internet

Backbone

VPN Tunnel

VPN Tunnel

Office

VPN

Device

  • VPN is transparent to the users, ISP, and the Internet as a whole;

  • It appears to be simply a stream of packets moving across the Internet

Backbone


Encapsulation

In order to achieve tunnelling, the packets including payloads, to and from addresses, port numbers and other standard protocol packet headers are encapsulated as the payload of packets as seen by the external routers carrying the connection.

Encapsulation


Authentication

A digital signing scheme is typically used to enable verification of the VPN principals. Note that both the client and the server need to authenticate each other.

Message authentication codes, hashes or checksums are typically used to authenticate message contents.

Authentication


Encryption

To protect the privacy of the connection from external snooping, the payload of the packets visible externally will be encrypted.

To enable routing over conventional networks, the packet headers of the encapsulating packets are not encrypted, but the packet headers of the encapsulated packets are encrypted along with their contents.

Encryption


Vpn topology types of vpns

VPN Topology: Types of VPNs

  • Remote access VPN

  • Site-to-Site VPN


Types of vpns

Types of VPNs

  • Remote Access VPN

    • Provides access to internal corporate network over the Internet.

    • Reduces long distance, modem bank, and technical support costs.

Corporate

Site

Internet


Types of vpns1

Types of VPNs

Corporate

Site

  • Remote Access VPN

  • Site-to-Site VPN

    • Connects multiple offices over Internet

    • Reduces dependencies on frame relay and leased lines

Internet

Branch

Office


Types of vpns2

Types of VPNs

Corporate

Site

  • Remote Access VPN

  • Site-to-Site VPN

    • Extranet VPN

      • Provides business partners access to critical information (leads, sales tools, etc)

      • Reduces transaction and operational costs

Internet

Partner #2

Partner #1


Types of vpns3

Types of VPNs

  • Remote Access VPN

  • Site-to-Site VPN

    • Extranet VPN

    • Intranet VPN:

      Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections.

Database Server

LAN clients

Internet

LAN clients with sensitive data


Vpn topology how it works

VPN Topology: How it works

  • Operates at layer 2 or 3 of OSI model

    • Layer 2 frame – Ethernet

    • Layer 3 packet – IP


Vpn components protocols

VPN Components: Protocols

  • IP Security (IPSec)

    • Transport mode

    • Tunnel mode

  • Point-to-Point Tunneling Protocol (PPTP)

    • Uses PPP (Point-to-Point Protocol)


Vpn components protocols1

VPN Components: Protocols

  • Layer 2 Tunneling Protocol (L2TP)

    • Exists at the data link layer of OSI

    • Composed from PPTP and L2F (Layer 2 Forwarding)

    • Compulsory tunneling method


Point to point tunneling protocol pptp

Internet

Point-to-Point Tunneling Protocol (PPTP)

  • Layer 2 remote access VPN distributed with Windows product family

    • Based on Point-to-Point Protocol (PPP)

  • Uses proprietary authentication and encryption

  • Limited user management and scalability

Corporate Network

Remote PPTP Client

PPTP RAS Server

ISP Remote Access

Switch


Virtual private network

PPP

  • Point-to-Point Protocol (PPP)

    • PPP was created for dialing into a local RAS server

    • But the site’s RAS may be far away

    • Long-distance calls are expensive

RAS

Long-Distance Call


Virtual private network

PPTP

  • Point-to-Point Tunneling Protocol (PPTP)

    • We would like PPP to work over the Internet to avoid long-distance telephone charges

    • But PPP is only a data link layer protocol

    • It is only good for transmission within a subnet (single network)

RAS


Virtual private network

PPTP

  • The Point-to-Point Tunneling Protocol (PPTP) makes this possible

    • Created by Microsoft

    • Widely used

Access

Concentrator

RAS


Virtual private network

PPTP

  • PPTP Operation

    • User dials into local PPTP access concentrator host

    • User sends the access concentrator a PPP frame within an IP packet

Access

Concentrator

RAS

Packet


Virtual private network

PPTP

  • PPTP Operation

    • Access concentrator places incoming IP packet within another IP packet

    • Sends packet to the distant RAS

Access

Concentrator

RAS

Encapsulated Packet


Virtual private network

PPTP

  • PPTP Operation

    • Distant RAS removes the original packet

    • Deals with the PPP frame within the packet

RAS


Virtual private network

PPTP

  • PPTP Encapsulation

    • Access concentrator receives the original IP packet, which has the IP address of the access concentrator

    • Adds an enhanced general routing encapsulation (GRE) header for security

    • Adds a new IP header with the IP address of the RAS

RAS

Original IP Packet

Enhanced

GRE Header

New

IP Header

Tunnel

Access

Concentrator


Ipsec

IPSec

  • General IP Security mechanisms

  • Provides

    • authentication

    • confidentiality

    • key management

  • Applicable to use over LANs, across public & private WANs, & for the Internet


Ipsec uses

Transparency

IPSec Uses


Benefits of ipsec

Benefits of IPSec

  • Is below transport layer, hence transparent to applications

  • Can be transparent to end users

  • Can provide security for individual users


Architecture concepts

Architecture & Concepts

  • Tunnel vs. Transport mode

  • Security association (SA)

    • Security parameter index (SPI)

    • Security policy database (SPD)

    • SA database (SAD)

  • Authentication header (AH) Protocol

  • Encapsulating security payload (ESP) Protocol


Virtual private network

Transport Mode vs. Tunnel Mode

New IP Header

AH or ESP Header

Orig IP Header

TCP

Data

  • Transport mode: host -> host

  • Tunnel mode: host->gateway or gateway->gateway

Encrypted Tunnel

Gateway 1

Gateway 2

Encrypted

Unencrypted

Unencrypted

A

B


Transport mode

Transport Mode

  • ESP protects higher layer payload only

  • AH can protect IP headers as well as higher layer payload

IP

header

IP

options

IPSec

header

Higher

layer protocol

ESP

Real IP

destination

AH


Tunnel mode

Tunnel Mode

  • ESP applies only to the tunneled packet

  • AH can be applied to portions of the outer header

Outer IP

header

IPSec

header

Inner IP

header

Higher

layer protocol

ESP

Real IP destination

Destination

IPSec

entity

AH


Security association sa

Security Association (SA)

  • حاوي

    • الگوريتم ها

    • كليدهاي مورد نياز

    • پروتكل AH يا ESP

    • زمان انقضاء كليد

    • پنجره جلوگيري از حمله تكرار

    • شماره آخرين بسته سالم دريافت شده

    • SPI

    • مشخصات ترافيكي كه SA براي آن توليد شده است شامل:

      • آدرس مبدا و مقصد بسته

      • پروتكل لايه بالاتر

      • پورت هاي پروتكل لايه بالاتر


Security association sa1

Security Association (SA)

  • در يك جدول به نام SAD نگاه داري مي گردد

  • انديس SA در جدول فوق توسط SPI مشخص مي شود

  • اتصال يك طرفه از فرستنده به گيرنده

    • براي ارتباط دو طرفه، دو SA مورد نياز است

  • كليدها بايستي به نحوي مذاكره شود

    • Pre-shared key

    • IKE


Virtual private network

جلوگيري از حمله تكرار

  • اختصاص يك شمارنده با مقدار صفر به هر SA

  • افزايش شمارنده به ازاي هر بسته جديد كه با اين SA فرستاده مي شود


Virtual private network

پروتكل مبادله كليد اينترنت (IKE)

  • برای برقراری ارتباط بين دو طرف لازم است که يك SA بين طرفين ايجاد شود.

  • برقراری و تجديد اين SA ها می تواند بصورت دستی يا خودکار انجام گردد.

  • پروتکلی که اين وظيفه را (بصورت خودکار) در اينترنت به عهده دارد IKE می باشد


Virtual private network

پروتكل مبادله كليد اينترنت (IKE)

  • معرفي IKE

  • پروتكل اصلي براي ايجاد و ابقاء IPSec SA

  • پيش فرض IPSec براي مبادله امن كليد

  • فراهم كردن يك ارتباط امن بين طرفين باتوافق بر روي كليدهاي جلسه

  • متكي به مكانيزمهاي رمز كليد عمومي و توابع درهم كليددار


Virtual private network

روشهاي احراز اصالت

  • روشهاي احراز اصالت در IKE

1- روش كليد از پيش مشترك(Preshared Key )

2- روش امضاي كليد عمومي( Public Key Signature )

3- روش رمزكليد عمومي( Public Key Encryption )

4- روش رمزكليد عمومي اصلاح شده(Public Key Encryption Revised)


Virtual private network

پايگاه سياست هاي امنيتي (SPD)

  • SPD در يك جدول كه توسط راهبر سيستم تعريف شده است قرار دارد.

  • ركوردهاي آن براي هر بسته وارد شده و در حال خروج سياست امنيتي را مشخص مي كند:

    • حفاظت (Apply)

    • عبور بدون حفاظت (Bypass)

    • دور انداختن (Reject)


Virtual private network

پايگاه سياست هاي امنيتي (SPD)

  • هر ركورد حاوي

    • مشخصات بسته هايي است كه بايد سياست خاصي در مورد آنها اعمال شود. پارامترهاي انتخاب سياست عبارتند از:

      • مشخصات آدرس مبدا و مقصد بسته

        • Range

        • Subnet

      • مشخصات پروتكل لايه بالاتر

        • TCP,UDP,..

      • در صورت TCP يا UDP بودن، مشخصات پورتها


Virtual private network

پايگاه سياست هاي امنيتي (SPD)

  • هر ركورد حاوي

    • سياست امنيتي

      • Apply

      • Reject

      • Bypass

    • و در صورت Apply مشتمل بر:

      • طرف مقابل در برقراري ارتباط

      • پروتكل AH يا ESP يا هردو

      • الگوريتم هاي قابل قبول براي احراز اصالت و رمزنگاري

      • طول مدت قابل قبول براي SA(SA Life Time)


Ipsec1

معماري IPSec

IPsec module 1

IPsec module 2

SPD

SPD

IKE

IKE

Inbound

Outbound

Inbound

Outbound

SAD

SAD

SA


Outbound process

Outbound Process


Outbound processing

Outbound Processing

Outbound packet (on A)

A

B

IP Packet

SPD(Policy)

SA Database

SPI & IPSec Packet

Send to B

Is it for IPSec?If so, which policy

entry to select?

IPSec processing

Determine the SA and its SPI


Inbound processing

Inbound Processing

A

B

Inbound packet (on B)

SPD(Policy)

From A

SPI & Packet

SA Database

Use SPI to

index the SAD

Was packet properly

secured?

Original IP Packet

“un-process”


How they fit together

How They Fit Together

SPD

SA-1

SA-2

SADB

SPI

SPI


Spd and sadb example

SPD and SADB Example

TransportMode

A’s SPD

A

B

C

D

Tunnel Mode

A’s SADB

C’sSPD

Asub

Bsub

C’s SADB

Asub

Bsub


Virtual private network

پروتكل مبادله كليد اينترنت (IKE)

  • برای برقراری ارتباط بين دو طرف لازم است که يك SA بين طرفين ايجاد شود.

  • برقراری و تجديد اين SA ها می تواند بصورت دستی يا خودکار انجام گردد.

  • پروتکلی که اين وظيفه را (بصورت خودکار) در اينترنت به عهده دارد IKE می باشد


Virtual private network

پروتكل مبادله كليد اينترنت (IKE)

  • معرفي IKE

  • پروتكل اصلي براي ايجاد و ابقاء IPSec SA

  • پيش فرض IPSec براي مبادله امن كليد

  • فراهم كردن يك ارتباط امن بين طرفين باتوافق بر روي كليدهاي جلسه

  • متكي به مكانيزمهاي رمز كليد عمومي و توابع درهم كليددار

  • چارچوب IKE بر اساس پروتكل ISAKMP

  • (Internet SA Key Management Protocol)


Virtual private network

فازهاي IKE

  • IKE داراي دو فاز مي باشد :

  • فاز I : برپايي ISAKMPSA (IKESA)

  • برپايي يك كانال امن احراز اصالتشده بين دو طرف

  • فاز II : برپايي IPSecSA

  • استفاده از كانال امن ايجاد شده در فاز 1 براي ارائهسرويسهاي امنيتي IPSec

  • فاز I : مي تواند به دو روش انجام شود:

  • مبادله مود اصلي ( Main mode)

  • مبادله مود اعلان شناسه ها ( Aggressive mode )

  • فاز II : به روش زير انجام مي شود:

  • مبادله مود سريع ( Quick mode )


Virtual private network

روشهاي احراز اصالت

  • روشهاي احراز اصالت در مبادلات فاز I :

1- روش كليد از پيش مشترك(Preshared Key )

2- روش امضاي كليد عمومي( Public Key Signature )

3- روش رمزكليد عمومي( Public Key Encryption )

4- روش رمزكليد عمومي اصلاح شده(Public Key Encryption Revised)


Virtual private network

پروتكل بر اساس روش امضاء( مود اصلي )

  • احراز اصالت توسط امضاي ديجيتال

مخاطبآغازگر

Header , SAproposal

Header , SAchoice

Header , gi , Ni

Header , gr , Nr

Header , { IDi , [certi] , SIGi }SKEYID-e

Header , { IDr , [certr] , SIGr }SKEYID-e


Ike 2

پروتكل IKE در فاز 2 ( مود سريع )

مخاطب آغازگر

Header ,{Hash1 , SAproposal , Ni , [gi] , [IDui , IDur]}SKEYID-e

Header ,{Hash2 , SAchoice , Nr , [gr] , [IDur , IDui]}SKEYID-e

Header , {Hash3}SKEYID-e

Hash1 = prf (SKEYID-a , Message ID SANi [gi] [IDuiIDur] )

Hash2 = prf (SKEYID-a , Message ID Ni SA Nr[gi] [IDuiIDur] )

Hash3 = prf (SKEYID-a , Message ID Ni Nr)

KEYMAT = prf ( SKEYID-d , [ gi ] protocol SPI Ni Nr )


Virtual private network

وجود نقاط ضعف در IKE

  • درپروتکل معرفی شدةIKE نقاط ضعفی به چشم می خورد:

    • تعداد زياد پيام

    • پيچيدگی مشخصات

    • عملکرد ضعيف در برابر حملات DoS

پروتکلهای جايگزين


Virtual private network

پروتكلهاي جايگزين IKE

  • معرفی پروتکل IKEv2 (2001 )

JFKr

  • معرفی پروتکل JFK (2002 )

JFKi

Full-SIGMA

  • معرفی پروتکل SIGMA (2002 )

SIGMA-0


  • Login