Top Banner
Virtual Private Networks Fred Baker
50

Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Mar 27, 2015

Download

Documents

Brandon Nichols
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Virtual Private Networks

Fred Baker

Page 2: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

What is a VPN

Public networks are used to move information between trusted network segments using

shared facilities like frame relay or atm

A VIRTUAL Private Network replaces all of the above utilizing the public Internet Performance and availability depend on your ISP and the Internet

Page 3: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Why?

Page 4: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

HomeNet to the office.

Page 5: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

VPN Types

Page 6: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

VPN Implementations

Page 7: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

VPN as your Intranet

Page 8: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

What a VPN needs

• VPNs must be encrypted – so no one can read it

• VPNs must be authenticated• No one outside the VPN can alter the VPN• All parties to the VPN must agree on the security

properties

Page 9: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

VPN Components

Page 10: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Parts of a VPN

Page 11: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

VPN works via crypto/Encapsulation

Page 12: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

EncryptionEncryption

Encryption and DecryptionClear-Text Clear-Text

Cipher Text

Bob Is a

Fink

8vyaleh31&d

ktu.dtrw8743

$Fie*nP093h

Bob Is a

Fink

DecryptionDecryption

Page 13: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Basic Crypto – Keys are key

Page 14: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

2 Kinds Key Systems

Page 15: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Symmetric Key Algorithms

• DES—56-bit key• Triple-DES—encrypt, decrypt,

encrypt, using either two or three 56-bit keys

• IDEA—128-bit key• Blowfish—variable-length key,

up to 448 bits

Page 16: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Public Key Encryption Example

MessageAlice Bob

EncryptedMessage

Message

Bob’s Public Key

Bob’s Private Key

Decrypt

• Alice wants to send Bob encrypted data– Alice gets Bob’s public key

– Alice encrypts the data with Bob’s public key

– Alice sends the encrypted data to Bob

• Bob decrypts the data with his private key

Encryption

Page 17: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

PKI vs Symmetric Key

• PKI easier as you don’t have to manage keys on a per user basis

• But MUCH more compute intensive (up to 1000 times faster)

• Many systems do a combination I.e. PGP

–Use PKI to send a symmetric key

–Then use the symmetric key to crypto the data

Page 18: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Using Crypto in real life

Page 19: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

PKI to send Private Keys

Page 20: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

PKI Certs a way to authenticate

Page 21: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Prove the user cert Certificates of authority

Page 22: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Digital Signature to verify data not changed in transit

Page 23: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

PKI the full picture

Page 24: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Where you do Crypto

Page 25: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Technologies

Page 26: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Application Layer: SSL

Page 27: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Transport Layer: IPSEC

• A standard

• is composed of:– Diffie-Huffman key exchange– PKI for the DH exchanges– DES and other bulk encryption– Hash to authenticate packets– Digital Certificates to validate keys

Page 28: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Transport Layer: IPSEC VPNs3 parts

Page 29: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Tunnel vs Transport

• Transport– Implemented by the end point systems– Real address to real address– Cannot ‘go through’ other networks

• Tunnel– Encapsulation of the original IP packet in another

packet– Can ‘go through’ other networks– End systems need not support this– Often PC to a box on the ‘inside’

Page 30: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Diffie-Hellman Key Exchange (1976)

• By openly exchanging non-secret numbers, two people can compute a unique shared secret number known only to them

Page 31: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Modular Exponentiation

• Generator, gg

• Modulus (prime), pp

• YY = ggXX mod pp

22^237276162930753723237276162930753723 mod 7992739798459792657265179927397984597926572651

Both g g and p p Are Shared and Well-Known

Page 32: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Diffie-HellmanPublic Key Exchange

Private Value, XXAA

Public Value, YYAA

Private Value, XXBB

Public Value, YYBB

(shared secret)

AliceAlice BobBob

YYBB mod p = g mod p = Y YAA mod p XXBBXXAA XXBB

YYAA

YYBB

YYBB = g mod pXXBBYYAA =g mod pXXAA

XXAA

Page 33: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Security Association is the agreement on how to secure

Page 34: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

create the ISAKMP SA (Internet Security Association Key

Management Protocol)

Page 35: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

IPSEC Key Exchange (IKE)

Page 36: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

IKE allows scale as I do not need to hard code passwords for each pair

Page 37: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Link Layer: L2TP for VPDN (Vir Pvt Dial Net)

Page 38: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

PPTP: Free from Microsoft

Page 39: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

PPTP: Security

Page 40: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

VPN Comparisons

Page 41: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

So why have a private network: QOS not fully cooked

• Very dependent on your ISP• Real hard to do across ISPs• So no guarantee of performance

Page 42: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Other Issues

Page 43: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Like Nat

Page 44: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Wireless: a new big driver, WAS (Work At Starbucks)

Page 45: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Many security protocols, depends on deployer

Page 46: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

VPN means I don’t care how you connect

Page 47: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Example

WorldComIP

Network

ILECDSL

Network

WorldCom

DigitalAccessNetwork

WorldCom

DigitalAccessNetwork

WorldComManaged Linksand CPE at Hub

Site

WorldComManaged Links and

CPE at Hub Site

WorldComManaged Linksand CPE at Hub

Site

Primary TunnelSecondary Tunnel

Allstate AgentT-1 Sites

Allstate AgentT-1 Sites

Allstate AgentDSL Sites

Allstate DataCenters

Page 48: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

So what could be wrong?

• VPN clients hit the network stack

• May not play well with personal firewalls

• Or other software• May not need full access to the

target network just encrypted access

Page 49: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

One answer: clientless VPN• Use SSL as the transport protocol to an appliance• Can add NT authentication to the appliance• Clientless mode: Use web enabled applications over the

Internet, the appliance SSLifies web sites• Java Applet: Use an downloadable applet to send traffic

over SSL, get more support for applications.• Can work well if you want to have encrypted web based

apps without redoing the application– to use SSL you need certs and have to change EVERY link to

HTTPs– Also big hit on the server cpu

Page 50: Virtual Private Networks Fred Baker. What is a VPN Public networks are used to move information between trusted network segments using shared facilities.

Summary: VPNs

• Very big in the work access space– Exploit High speed

• Wireless – in the office

– public ‘hot spots’ like Borders

• Replaces direct dial into the work network• Replace dedicated Business partners• May replace the corporate WAN